[Cmake-commits] CMake branch, next, updated. v3.8.0-rc1-458-gc42f62b

Brad King brad.king at kitware.com
Wed Feb 22 10:52:51 EST 2017


This is an automated email from the git hooks/post-receive script. It was
generated because a ref change was pushed to the repository containing
the project "CMake".

The branch, next has been updated
       via  c42f62b6bed8248fd99a48737c14054d09f973a7 (commit)
       via  6ab467b03702929b346cb1136092dd9417cc74fd (commit)
       via  3f92980773c8f2106f0ee2986a89fa958fc73acf (commit)
       via  0a4094564dadfd15e0daa1e95927c343cfc616a2 (commit)
       via  a59a7ee95601f3496ec9ba9ae1283a8d980460bf (commit)
       via  c206211af647dd1f7039da91c34c9c72e50aefdf (commit)
       via  cdce7c619c58ec0947c036b93013445bb93e4be8 (commit)
      from  1925f8bc2a517c051c44b29021300de2238489a2 (commit)

Those revisions listed above that are new to this repository have
not appeared on any other notification email; so we list those
revisions in full, below.

- Log -----------------------------------------------------------------
https://cmake.org/gitweb?p=cmake.git;a=commitdiff;h=c42f62b6bed8248fd99a48737c14054d09f973a7
commit c42f62b6bed8248fd99a48737c14054d09f973a7
Merge: 1925f8b 6ab467b
Author:     Brad King <brad.king at kitware.com>
AuthorDate: Wed Feb 22 10:52:45 2017 -0500
Commit:     CMake Topic Stage <kwrobot at kitware.com>
CommitDate: Wed Feb 22 10:52:45 2017 -0500

    Merge topic 'update-libarchive' into next
    
    6ab467b0 Update CMake pre-cached values for libarchive 3.3.0
    3f929807 libarchive: Fix use of ssize_t in archive_entry.h
    0a409456 libarchive: Define __LA_DEPRECATED consistently
    a59a7ee9 Merge branch 'upstream-LibArchive' into update-libarchive
    c206211a LibArchive 2017-02-19 (100ee75a)
    cdce7c61 libarchive: Update script to get 3.3.0


https://cmake.org/gitweb?p=cmake.git;a=commitdiff;h=6ab467b03702929b346cb1136092dd9417cc74fd
commit 6ab467b03702929b346cb1136092dd9417cc74fd
Author:     Brad King <brad.king at kitware.com>
AuthorDate: Mon Feb 20 09:10:11 2017 -0500
Commit:     Brad King <brad.king at kitware.com>
CommitDate: Mon Feb 20 09:10:14 2017 -0500

    Update CMake pre-cached values for libarchive 3.3.0

diff --git a/CMakeLists.txt b/CMakeLists.txt
index bec81a3..e613224 100644
--- a/CMakeLists.txt
+++ b/CMakeLists.txt
@@ -421,14 +421,15 @@ macro (CMAKE_BUILD_UTILITIES)
       if(NOT LIBLZMA_FOUND)
         message(FATAL_ERROR "CMAKE_USE_SYSTEM_LIBLZMA is ON but LibLZMA is not found!")
       endif()
-      set(LZMA_INCLUDE_DIR ${LIBLZMA_INCLUDE_DIRS})
-      set(LZMA_LIBRARY ${LIBLZMA_LIBRARIES})
     else()
       add_subdirectory(Utilities/cmliblzma)
       CMAKE_SET_TARGET_FOLDER(cmliblzma "Utilities/3rdParty")
-      set(LZMA_INCLUDE_DIR
+      set(LIBLZMA_HAS_AUTO_DECODER 1)
+      set(LIBLZMA_HAS_EASY_ENCODER 1)
+      set(LIBLZMA_HAS_LZMA_PRESET 1)
+      set(LIBLZMA_INCLUDE_DIR
         "${CMAKE_CURRENT_SOURCE_DIR}/Utilities/cmliblzma/liblzma/api")
-      set(LZMA_LIBRARY cmliblzma)
+      set(LIBLZMA_LIBRARY cmliblzma)
     endif()
   endif()
 
@@ -449,13 +450,14 @@ macro (CMAKE_BUILD_UTILITIES)
     add_definitions(-DLIBARCHIVE_STATIC)
     set(ENABLE_NETTLE OFF CACHE INTERNAL "Enable use of Nettle")
     set(ENABLE_OPENSSL ${CMAKE_USE_OPENSSL} CACHE INTERNAL "Enable use of OpenSSL")
-    set(ENABLE_LZMA ON CACHE INTERNAL "Enable the use of the system found LZMA library if found")
-    set(ENABLE_ZLIB ON CACHE INTERNAL "Enable the use of the system found ZLIB library if found")
-    set(ENABLE_BZip2 ON CACHE INTERNAL "Enable the use of the system found BZip2 library if found")
-    set(ENABLE_LIBXML2 OFF CACHE INTERNAL "Enable the use of the system found libxml2 library if found")
-    set(ENABLE_EXPAT ON CACHE INTERNAL "Enable the use of the system found EXPAT library if found")
-    set(ENABLE_PCREPOSIX OFF CACHE INTERNAL "Enable the use of the system found PCREPOSIX library if found")
-    set(ENABLE_LibGCC OFF CACHE INTERNAL "Enable the use of the system found LibGCC library if found")
+    set(ENABLE_LZMA ON CACHE INTERNAL "Enable the use of the system LZMA library if found")
+    set(ENABLE_LZO OFF CACHE INTERNAL "Enable the use of the system LZO library if found")
+    set(ENABLE_ZLIB ON CACHE INTERNAL "Enable the use of the system ZLIB library if found")
+    set(ENABLE_BZip2 ON CACHE INTERNAL "Enable the use of the system BZip2 library if found")
+    set(ENABLE_LIBXML2 OFF CACHE INTERNAL "Enable the use of the system libxml2 library if found")
+    set(ENABLE_EXPAT ON CACHE INTERNAL "Enable the use of the system EXPAT library if found")
+    set(ENABLE_PCREPOSIX OFF CACHE INTERNAL "Enable the use of the system PCREPOSIX library if found")
+    set(ENABLE_LibGCC OFF CACHE INTERNAL "Enable the use of the system LibGCC library if found")
     set(ENABLE_XATTR OFF CACHE INTERNAL "Enable extended attribute support")
     set(ENABLE_ACL OFF CACHE INTERNAL "Enable ACL support")
     set(ENABLE_ICONV OFF CACHE INTERNAL "Enable iconv support")

https://cmake.org/gitweb?p=cmake.git;a=commitdiff;h=3f92980773c8f2106f0ee2986a89fa958fc73acf
commit 3f92980773c8f2106f0ee2986a89fa958fc73acf
Author:     Brad King <brad.king at kitware.com>
AuthorDate: Mon Feb 20 09:08:29 2017 -0500
Commit:     Brad King <brad.king at kitware.com>
CommitDate: Mon Feb 20 09:10:09 2017 -0500

    libarchive: Fix use of ssize_t in archive_entry.h
    
    This type is not available on Windows compilers so for clients including
    this header we need to use `la_ssize_t` instead as we do in `archive.h`.

diff --git a/Utilities/cmlibarchive/libarchive/archive_entry.h b/Utilities/cmlibarchive/libarchive/archive_entry.h
index fe86ee3..c331117 100644
--- a/Utilities/cmlibarchive/libarchive/archive_entry.h
+++ b/Utilities/cmlibarchive/libarchive/archive_entry.h
@@ -66,6 +66,27 @@ typedef int64_t la_int64_t;
 # endif
 #endif
 
+/* The la_ssize_t should match the type used in 'struct stat' */
+#if !defined(__LA_SSIZE_T_DEFINED)
+/* Older code relied on the __LA_SSIZE_T macro; after 4.0 we'll switch to the typedef exclusively. */
+# if ARCHIVE_VERSION_NUMBER < 4000000
+#define __LA_SSIZE_T la_ssize_t
+# endif
+#define __LA_SSIZE_T_DEFINED
+# if defined(_WIN32) && !defined(__CYGWIN__) && !defined(__WATCOMC__)
+#  if defined(_SSIZE_T_DEFINED) || defined(_SSIZE_T_)
+typedef ssize_t la_ssize_t;
+#  elif defined(_WIN64)
+typedef __int64 la_ssize_t;
+#  else
+typedef long la_ssize_t;
+#  endif
+# else
+# include <unistd.h>  /* ssize_t */
+typedef ssize_t la_ssize_t;
+# endif
+#endif
+
 /* Get a suitable definition for mode_t */
 #if ARCHIVE_VERSION_NUMBER >= 3999000
 /* Switch to plain 'int' for libarchive 4.0.  It's less broken than 'mode_t' */
@@ -523,9 +544,9 @@ __LA_DECL int	 archive_entry_acl_next_w(struct archive_entry *, int /* want_type
 #define	ARCHIVE_ENTRY_ACL_STYLE_COMPACT		0x00000010
 
 __LA_DECL wchar_t *archive_entry_acl_to_text_w(struct archive_entry *,
-	    ssize_t * /* len */, int /* flags */);
+	    la_ssize_t * /* len */, int /* flags */);
 __LA_DECL char *archive_entry_acl_to_text(struct archive_entry *,
-	    ssize_t * /* len */, int /* flags */);
+	    la_ssize_t * /* len */, int /* flags */);
 __LA_DECL int archive_entry_acl_from_text_w(struct archive_entry *,
 	    const wchar_t * /* wtext */, int /* type */);
 __LA_DECL int archive_entry_acl_from_text(struct archive_entry *,

https://cmake.org/gitweb?p=cmake.git;a=commitdiff;h=0a4094564dadfd15e0daa1e95927c343cfc616a2
commit 0a4094564dadfd15e0daa1e95927c343cfc616a2
Author:     Brad King <brad.king at kitware.com>
AuthorDate: Mon Feb 20 08:10:33 2017 -0500
Commit:     Brad King <brad.king at kitware.com>
CommitDate: Mon Feb 20 08:14:31 2017 -0500

    libarchive: Define __LA_DEPRECATED consistently
    
    Upstream libarchive now defines this macro in two places with the same
    logic in both.  However, CMake's bundled copy disables this macro, so
    we need to update the new location of its definition to be consistent.

diff --git a/Utilities/cmlibarchive/libarchive/archive_entry.h b/Utilities/cmlibarchive/libarchive/archive_entry.h
index 9427413..fe86ee3 100644
--- a/Utilities/cmlibarchive/libarchive/archive_entry.h
+++ b/Utilities/cmlibarchive/libarchive/archive_entry.h
@@ -105,11 +105,8 @@ typedef int64_t la_int64_t;
 # define __LA_DECL
 #endif
 
-#if defined(__GNUC__) && __GNUC__ >= 3 && __GNUC_MINOR__ >= 1
-# define __LA_DEPRECATED __attribute__((deprecated))
-#else
-# define __LA_DEPRECATED
-#endif
+/* CMake uses some deprecated APIs to build with old libarchive versions.  */
+#define __LA_DEPRECATED
 
 #ifdef __cplusplus
 extern "C" {

https://cmake.org/gitweb?p=cmake.git;a=commitdiff;h=a59a7ee95601f3496ec9ba9ae1283a8d980460bf
commit a59a7ee95601f3496ec9ba9ae1283a8d980460bf
Merge: cdce7c6 c206211
Author:     Brad King <brad.king at kitware.com>
AuthorDate: Mon Feb 20 08:04:00 2017 -0500
Commit:     Brad King <brad.king at kitware.com>
CommitDate: Mon Feb 20 08:04:00 2017 -0500

    Merge branch 'upstream-LibArchive' into update-libarchive
    
    * upstream-LibArchive:
      LibArchive 2017-02-19 (100ee75a)

diff --cc Utilities/cmlibarchive/CMakeLists.txt
index 09bef51,0000000..56811b6
mode 100644,000000..100644
--- a/Utilities/cmlibarchive/CMakeLists.txt
+++ b/Utilities/cmlibarchive/CMakeLists.txt
@@@ -1,1407 -1,0 +1,1447 @@@
 +PROJECT(libarchive C)
 +#
 +SET(CMAKE_MODULE_PATH "${CMAKE_CURRENT_SOURCE_DIR}/build/cmake")
 +if(NOT CMAKE_RUNTIME_OUTPUT_DIRECTORY)
 +  set(CMAKE_RUNTIME_OUTPUT_DIRECTORY ${libarchive_BINARY_DIR}/bin)
 +endif()
 +
 +# On MacOS, prefer MacPorts libraries to system libraries.
 +# I haven't come up with a compelling argument for this to be conditional.
 +list(APPEND CMAKE_PREFIX_PATH /opt/local)
 +# Enable @rpath in the install name.
 +# detail in "cmake  --help-policy CMP0042"
 +SET(CMAKE_MACOSX_RPATH ON)
 +
 +#
 +# Version - read from 'version' file.
 +#
 +FILE(STRINGS ${CMAKE_CURRENT_SOURCE_DIR}/build/version _version)
 +STRING(REGEX REPLACE
 + "^([0-9])[0-9][0-9][0-9][0-9][0-9][0-9][a-z]?$" "\\1" _major ${_version})
 +STRING(REGEX REPLACE
 + "^[0-9]([0-9][0-9][0-9])[0-9][0-9][0-9][a-z]?$" "\\1" _minor ${_version})
 +STRING(REGEX REPLACE
 + "^[0-9][0-9][0-9][0-9]([0-9][0-9][0-9])[a-z]?$" "\\1" _revision ${_version})
 +STRING(REGEX REPLACE
 + "^[0-9][0-9][0-9][0-9][0-9][0-9][0-9]([a-z]?)$" "\\1" _quality ${_version})
 +SET(_version_number ${_major}${_minor}${_revision})
 +STRING(REGEX REPLACE "[0]*([^0]*[0-9])$" "\\1" _trimmed_minor ${_minor})
 +STRING(REGEX REPLACE "[0]*([^0]*[0-9])$" "\\1" _trimmed_revision ${_revision})
 +#
 +SET(VERSION                    "${_major}.${_trimmed_minor}.${_trimmed_revision}${_quality}")
 +SET(BSDCPIO_VERSION_STRING     "${VERSION}")
 +SET(BSDTAR_VERSION_STRING      "${VERSION}")
 +SET(BSDCAT_VERSION_STRING      "${VERSION}")
 +SET(LIBARCHIVE_VERSION_NUMBER  "${_version_number}")
 +SET(LIBARCHIVE_VERSION_STRING  "${VERSION}")
 +
 +# INTERFACE_VERSION increments with every release
 +# libarchive 2.7 == interface version 9 = 2 + 7
 +# libarchive 2.8 == interface version 10 = 2 + 8
 +# libarchive 2.9 == interface version 11 = 2 + 9
 +# libarchive 3.0 == interface version 12
 +# libarchive 3.1 == interface version 13
 +math(EXPR INTERFACE_VERSION  "13 + ${_minor}")
 +
 +# Set SOVERSION == Interface version
 +# ?? Should there be more here ??
 +SET(SOVERSION "${INTERFACE_VERSION}")
 +
 +# Enalbe CMAKE_PUSH_CHECK_STATE() and CMAKE_POP_CHECK_STATE() macros
 +# saving and restoring the state of the variables.
 +INCLUDE(${CMake_SOURCE_DIR}/Modules/CMakePushCheckState.cmake)
 +
 +# Initialize the state of the variables. This initialization is not
 +# necessary but this shows you what value the variables initially have.
 +SET(CMAKE_REQUIRED_DEFINITIONS)
 +SET(CMAKE_REQUIRED_INCLUDES)
 +SET(CMAKE_REQUIRED_LIBRARIES)
 +SET(CMAKE_REQUIRED_FLAGS)
 +
 +# Disable warnings to avoid changing 3rd party code.
 +IF(CMAKE_C_COMPILER_ID MATCHES
 +    "^(GNU|Clang|AppleClang|XL|VisualAge|SunPro|MIPSpro|HP|Intel)$")
 +  SET(CMAKE_C_FLAGS "${CMAKE_C_FLAGS} -w")
 +ELSEIF(CMAKE_C_COMPILER_ID STREQUAL "PathScale")
 +  SET(CMAKE_C_FLAGS "${CMAKE_C_FLAGS} -woffall")
 +ENDIF()
 +
 +# Enable CTest/CDash support
 +include(CTest)
 +
 +OPTION(ENABLE_NETTLE "Enable use of Nettle" ON)
 +OPTION(ENABLE_OPENSSL "Enable use of OpenSSL" ON)
- OPTION(ENABLE_LZMA "Enable the use of the system found LZMA library if found" ON)
- OPTION(ENABLE_ZLIB "Enable the use of the system found ZLIB library if found" ON)
- OPTION(ENABLE_BZip2 "Enable the use of the system found BZip2 library if found" ON)
- OPTION(ENABLE_LIBXML2 "Enable the use of the system found libxml2 library if found" ON)
- OPTION(ENABLE_EXPAT "Enable the use of the system found EXPAT library if found" ON)
- OPTION(ENABLE_PCREPOSIX "Enable the use of the system found PCREPOSIX library if found" ON)
- OPTION(ENABLE_LibGCC "Enable the use of the system found LibGCC library if found" ON)
++OPTION(ENABLE_LZO "Enable the use of the system LZO library if found" OFF)
++OPTION(ENABLE_LZMA "Enable the use of the system LZMA library if found" ON)
++
++OPTION(ENABLE_ZLIB "Enable the use of the system ZLIB library if found" ON)
++OPTION(ENABLE_BZip2 "Enable the use of the system BZip2 library if found" ON)
++OPTION(ENABLE_LIBXML2 "Enable the use of the system libxml2 library if found" ON)
++OPTION(ENABLE_EXPAT "Enable the use of the system EXPAT library if found" ON)
++OPTION(ENABLE_PCREPOSIX "Enable the use of the system PCREPOSIX library if found" ON)
++OPTION(ENABLE_LibGCC "Enable the use of the system LibGCC library if found" ON)
 +# CNG is used for encrypt/decrypt Zip archives on Windows.
 +OPTION(ENABLE_CNG "Enable the use of CNG(Crypto Next Generation)" ON)
 +
 +OPTION(ENABLE_XATTR "Enable extended attribute support" ON)
 +OPTION(ENABLE_ACL "Enable ACL support" ON)
 +OPTION(ENABLE_ICONV "Enable iconv support" ON)
 +
 +IF(WIN32)
 +  #ELSEIF(WINDOWS_VERSION STREQUAL "WINXP")
 +  SET(NTDDI_VERSION 0x05010000)
 +  SET(_WIN32_WINNT 0x0501)
 +  SET(WINVER 0x0501)
 +ENDIF(WIN32)
 +
 +set(HAVE_PTHREAD_H 0) # no threads in CMake
 +
 +IF("${CMAKE_C_PLATFORM_ID}" MATCHES "^(HP-UX)$")
 +  ADD_DEFINITIONS(-D_XOPEN_SOURCE=500) # Ask wchar.h for mbstate_t
 +ENDIF()
 +
 +#
 +INCLUDE(CheckCSourceCompiles)
 +INCLUDE(CheckCSourceRuns)
 +INCLUDE(CheckFileOffsetBits)
 +INCLUDE(CheckFuncs)
 +INCLUDE(CheckHeaderDirent)
 +INCLUDE(CheckIncludeFile)
 +INCLUDE(CheckIncludeFiles)
 +INCLUDE(CheckLibraryExists)
- INCLUDE(CheckStructMember)
++INCLUDE(CheckStructHasMember)
 +INCLUDE(CheckSymbolExists)
 +INCLUDE(CheckTypeExists)
 +INCLUDE(CheckTypeSize)
 +
 +#
 +# Generate list.h
 +#
 +MACRO (GENERATE_LIST_H _listfile _cmlist __list_sources)
 +  SET(_argv ${ARGV})
 +  # Remove _listfile and _cmlist from _argv
 +  LIST(REMOVE_AT _argv 0 1)
 +  IF (NOT EXISTS "${_listfile}" OR
 +     ${_cmlist} IS_NEWER_THAN "${_listfile}")
 +
 +    MESSAGE(STATUS "Generating ${_listfile}")
 +    FILE(WRITE ${_listfile} "")
 +    FOREACH (testfile ${_argv})
 +      IF (testfile MATCHES "^test_[^/]+[.]c$")
 +        FILE(STRINGS ${testfile} testvar REGEX "^DEFINE_TEST")
 +        FOREACH (deftest ${testvar})
 +          FILE(APPEND ${_listfile} "${deftest}\n")
 +        ENDFOREACH (deftest)
 +      ENDIF (testfile MATCHES "^test_[^/]+[.]c$")
 +    ENDFOREACH (testfile)
 +
 +  ENDIF (NOT EXISTS "${_listfile}" OR
 +     ${_cmlist} IS_NEWER_THAN "${_listfile}")
 +ENDMACRO (GENERATE_LIST_H)
 +#
 +# Generate installation rules for man pages.
 +#
 +MACRO (INSTALL_MAN __mans)
 +  FOREACH (_man ${ARGV})
 +    STRING(REGEX REPLACE "^.+[.]([1-9])" "\\1" _mansect ${_man})
 +    INSTALL(FILES ${_man} DESTINATION "share/man/man${_mansect}")
 +  ENDFOREACH (_man)
 +ENDMACRO (INSTALL_MAN __mans)
 +#
 +# Find out what macro is needed to use libraries on Windows.
 +#
 +MACRO (TRY_MACRO_FOR_LIBRARY INCLUDES LIBRARIES
 +       TRY_TYPE SAMPLE_SOURCE MACRO_LIST)
 +  IF(WIN32 AND NOT CYGWIN)
 +    CMAKE_PUSH_CHECK_STATE()	# Save the state of the variables
 +    SET(CMAKE_REQUIRED_INCLUDES ${INCLUDES})
 +    SET(CMAKE_REQUIRED_LIBRARIES ${LIBRARIES})
 +    FOREACH(VAR ${MACRO_LIST})
 +      # Clear ${VAR} from CACHE If the libraries which ${VAR} was
 +      # checked with are changed.
 +      SET(VAR_WITH_LIB "${VAR}_WITH_LIB")
 +      GET_PROPERTY(PREV_VAR_WITH_LIB VARIABLE PROPERTY ${VAR_WITH_LIB})
 +      IF(NOT "${PREV_VAR_WITH_LIB}" STREQUAL "${LIBRARIES}")
 +        UNSET(${VAR} CACHE)
 +      ENDIF(NOT "${PREV_VAR_WITH_LIB}" STREQUAL "${LIBRARIES}")
 +      # Check if the library can be used with the macro.
 +      IF("${TRY_TYPE}" MATCHES "COMPILES")
 +        CHECK_C_SOURCE_COMPILES("${SAMPLE_SOURCE}" ${VAR})
 +      ELSEIF("${TRY_TYPE}" MATCHES "RUNS")
 +        CHECK_C_SOURCE_RUNS("${SAMPLE_SOURCE}" ${VAR})
 +      ELSE("${TRY_TYPE}" MATCHES "COMPILES")
 +        MESSAGE(FATAL_ERROR "UNKNOWN KEYWORD \"${TRY_TYPE}\" FOR TRY_TYPE")
 +      ENDIF("${TRY_TYPE}" MATCHES "COMPILES")
 +      # Save the libraries which ${VAR} is checked with.
 +      SET(${VAR_WITH_LIB} "${LIBRARIES}" CACHE INTERNAL
 +          "Macro ${VAR} is checked with")
 +    ENDFOREACH(VAR)
 +    CMAKE_POP_CHECK_STATE()	# Restore the state of the variables
 +  ENDIF(WIN32 AND NOT CYGWIN)
 +ENDMACRO (TRY_MACRO_FOR_LIBRARY)
 +#
 +# Check compress/decompress libraries
 +#
 +IF(WIN32 AND NOT CMAKE_CL_64 AND NOT CYGWIN)
 +  # GnuWin32 is only for Win32, not Win64.
 +  SET(__GNUWIN32PATH "C:/Program Files/GnuWin32")
 +ENDIF(WIN32 AND NOT CMAKE_CL_64 AND NOT CYGWIN)
 +IF(DEFINED __GNUWIN32PATH AND EXISTS "${__GNUWIN32PATH}")
 +  # You have to add a path availabel DLL file into PATH environment variable.
 +  # Maybe DLL path is "C:/Program Files/GnuWin32/bin".
 +  # The zlib and the bzip2 Setup program have installed programs and DLLs into
 +  # "C:/Program Files/GnuWin32" by default.
 +  # This is convenience setting for Windows.
 +  SET(CMAKE_PREFIX_PATH ${__GNUWIN32PATH} $(CMAKE_PREFIX_PATH))
 +  #
 +  # If you didn't use Setup program or installed into nonstandard path,
 +  # cmake cannot find out your zlib or bzip2 libraries and include files,
 +  # you should execute cmake with  -DCMAKE_PREFIX_PATH option.
 +  #   e.g.
 +  #     cmake -DCMAKE_PREFIX_PATH=<your-GnuWin32-path> <path-to-source>
 +  #
 +  # If compiling error occurred in zconf.h, You may need patch to zconf.h.
 +  #--- zconf.h.orig	2005-07-21 00:40:26.000000000
 +  #+++ zconf.h	2009-01-19 11:39:10.093750000
 +  #@@ -286,7 +286,7 @@
 +  #
 +  # #if 1           /* HAVE_UNISTD_H -- this line is updated by ./configure */
 +  # #  include <sys/types.h> /* for off_t */
 +  #-#  include <unistd.h>    /* for SEEK_* and off_t */
 +  #+#  include <stdio.h>    /* for SEEK_* and off_t */
 +  # #  ifdef VMS
 +  # #    include <unixio.h>   /* for off_t */
 +  # #  endif
 +ENDIF(DEFINED __GNUWIN32PATH AND EXISTS "${__GNUWIN32PATH}")
 +
 +SET(ADDITIONAL_LIBS "")
 +#
 +# Find ZLIB
 +#
 +IF(ENABLE_ZLIB)
 +  FIND_PACKAGE(ZLIB)
 +ELSE()
 +  SET(ZLIB_FOUND FALSE) # Override cached value
 +ENDIF()
 +IF(ZLIB_FOUND)
 +  SET(HAVE_LIBZ 1)
 +  SET(HAVE_ZLIB_H 1)
 +  INCLUDE_DIRECTORIES(${ZLIB_INCLUDE_DIR})
 +  LIST(APPEND ADDITIONAL_LIBS ${ZLIB_LIBRARIES})
 +  IF(WIN32 AND NOT CYGWIN)
 +    #
 +    # Test if ZLIB_WINAPI macro is needed to use.
 +    #
 +    TRY_MACRO_FOR_LIBRARY(
 +      "${ZLIB_INCLUDE_DIR}" "${ZLIB_LIBRARIES}"
 +      RUNS
 +      "#include <zlib.h>\nint main() {uLong f = zlibCompileFlags(); return (f&(1U<<10))?0:-1; }"
 +      ZLIB_WINAPI)
 +    IF(ZLIB_WINAPI)
 +      ADD_DEFINITIONS(-DZLIB_WINAPI)
 +    ELSE(ZLIB_WINAPI)
 +      # Test if a macro is needed for the library.
 +      TRY_MACRO_FOR_LIBRARY(
 +        "${ZLIB_INCLUDE_DIR}" "${ZLIB_LIBRARIES}"
 +        COMPILES
 +        "#include <zlib.h>\nint main() {return zlibVersion()?1:0; }"
 +        "ZLIB_DLL;WITHOUT_ZLIB_DLL")
 +      IF(ZLIB_DLL)
 +        ADD_DEFINITIONS(-DZLIB_DLL)
 +      ENDIF(ZLIB_DLL)
 +    ENDIF(ZLIB_WINAPI)
 +  ENDIF(WIN32 AND NOT CYGWIN)
 +ELSE(ZLIB_FOUND)
 +  MESSAGE(FATAL_ERROR "CMake requires zlib to be available to libarchive")
 +ENDIF(ZLIB_FOUND)
 +#
 +# Find BZip2
 +#
 +IF(ENABLE_BZip2)
 +  FIND_PACKAGE(BZip2)
 +ELSE()
 +  SET(BZIP2_FOUND FALSE) # Override cached value
 +ENDIF()
 +IF(BZIP2_FOUND)
 +  SET(HAVE_LIBBZ2 1)
 +  SET(HAVE_BZLIB_H 1)
 +  INCLUDE_DIRECTORIES(${BZIP2_INCLUDE_DIR})
 +  LIST(APPEND ADDITIONAL_LIBS ${BZIP2_LIBRARIES})
 +  # Test if a macro is needed for the library.
 +  TRY_MACRO_FOR_LIBRARY(
 +    "${BZIP2_INCLUDE_DIR}" "${BZIP2_LIBRARIES}"
 +    COMPILES
 +    "#include <bzlib.h>\nint main() {return BZ2_bzlibVersion()?1:0; }"
 +    "USE_BZIP2_DLL;USE_BZIP2_STATIC")
 +  IF(USE_BZIP2_DLL)
 +    ADD_DEFINITIONS(-DUSE_BZIP2_DLL)
 +  ELSEIF(USE_BZIP2_STATIC)
 +    ADD_DEFINITIONS(-DUSE_BZIP2_STATIC)
 +  ENDIF(USE_BZIP2_DLL)
 +ENDIF(BZIP2_FOUND)
 +MARK_AS_ADVANCED(CLEAR BZIP2_INCLUDE_DIR)
 +MARK_AS_ADVANCED(CLEAR BZIP2_LIBRARIES)
 +
 +
 +#
 +# Find LZMA
 +#
 +IF(ENABLE_LZMA)
-   FIND_PACKAGE(LZMA)
++  FIND_PACKAGE(LibLZMA)
 +ELSE()
-   SET(LZMA_FOUND FALSE) # Override cached value
-   SET(LZMADEC_FOUND FALSE) # Override cached value
++  SET(LIBZMA_FOUND FALSE) # Override cached value
 +ENDIF()
 +
- IF(LZMA_FOUND)
++IF(LIBLZMA_FOUND)
 +  SET(HAVE_LIBLZMA 1)
 +  SET(HAVE_LZMA_H 1)
-   INCLUDE_DIRECTORIES(${LZMA_INCLUDE_DIR})
-   LIST(APPEND ADDITIONAL_LIBS ${LZMA_LIBRARIES})
++  INCLUDE_DIRECTORIES(${LIBLZMA_INCLUDE_DIRS})
++  LIST(APPEND ADDITIONAL_LIBS ${LIBLZMA_LIBRARIES})
 +  IF(CMAKE_USE_SYSTEM_LIBLZMA)
 +    # Test if a macro is needed for the library.
 +    TRY_MACRO_FOR_LIBRARY(
-       "${LZMA_INCLUDE_DIR}" "${LZMA_LIBRARIES}"
++      "${LIBLZMA_INCLUDE_DIRS}" "${LIBLZMA_LIBRARIES}"
 +      COMPILES
 +      "#include <lzma.h>\nint main() {return (int)lzma_version_number(); }"
 +      "WITHOUT_LZMA_API_STATIC;LZMA_API_STATIC")
 +    IF(NOT WITHOUT_LZMA_API_STATIC AND LZMA_API_STATIC)
 +      ADD_DEFINITIONS(-DLZMA_API_STATIC)
 +    ENDIF(NOT WITHOUT_LZMA_API_STATIC AND LZMA_API_STATIC)
 +  ELSE()
 +    ADD_DEFINITIONS(-DLZMA_API_STATIC)
 +  ENDIF()
- ELSEIF(LZMADEC_FOUND)
-   SET(HAVE_LIBLZMADEC 1)
-   SET(HAVE_LZMADEC_H 1)
-   INCLUDE_DIRECTORIES(${LZMADEC_INCLUDE_DIR})
-   LIST(APPEND ADDITIONAL_LIBS ${LZMADEC_LIBRARIES})
- ELSE(LZMA_FOUND)
++ELSE(LIBLZMA_FOUND)
 +# LZMA not found and will not be used.
- ENDIF(LZMA_FOUND)
++ENDIF(LIBLZMA_FOUND)
 +IF(0) # CMake does not need LZO2 support in libarchive
 +#
 +# Find LZO2
 +#
- IF (LZO2_INCLUDE_DIR)
-   # Already in cache, be silent
-   SET(LZO2_FIND_QUIETLY TRUE)
- ENDIF (LZO2_INCLUDE_DIR)
- 
- FIND_PATH(LZO2_INCLUDE_DIR lzo/lzoconf.h)
- FIND_LIBRARY(LZO2_LIBRARY NAMES lzo2 liblzo2)
- INCLUDE(FindPackageHandleStandardArgs)
- FIND_PACKAGE_HANDLE_STANDARD_ARGS(LZO2 DEFAULT_MSG LZO2_LIBRARY LZO2_INCLUDE_DIR)
++IF(ENABLE_LZO)
++  IF (LZO2_INCLUDE_DIR)
++    # Already in cache, be silent
++    SET(LZO2_FIND_QUIETLY TRUE)
++  ENDIF (LZO2_INCLUDE_DIR)
++
++  FIND_PATH(LZO2_INCLUDE_DIR lzo/lzoconf.h)
++  FIND_LIBRARY(LZO2_LIBRARY NAMES lzo2 liblzo2)
++  INCLUDE(FindPackageHandleStandardArgs)
++  FIND_PACKAGE_HANDLE_STANDARD_ARGS(LZO2 DEFAULT_MSG LZO2_LIBRARY LZO2_INCLUDE_DIR)
++ELSE(ENABLE_LZO)
++  SET(LIBZMA_FOUND FALSE) # Override cached value
++ENDIF(ENABLE_LZO)
 +IF(LZO2_FOUND)
 +  SET(HAVE_LIBLZO2 1)
 +  SET(HAVE_LZO_LZOCONF_H 1)
 +  SET(HAVE_LZO_LZO1X_H 1)
 +  INCLUDE_DIRECTORIES(${LZO2_INCLUDE_DIR})
 +  LIST(APPEND ADDITIONAL_LIBS ${LZO2_LIBRARY})
 +  #
 +  # TODO: test for static library.
 +  #
 +ENDIF(LZO2_FOUND)
 +MARK_AS_ADVANCED(CLEAR LZO2_INCLUDE_DIR)
 +MARK_AS_ADVANCED(CLEAR LZO2_LIBRARY)
 +ENDIF()
 +IF(0) # CMake does not need LZ4 support in libarchive
 +#
 +# Find LZ4
 +#
 +IF (LZ4_INCLUDE_DIR)
 +  # Already in cache, be silent
 +  SET(LZ4_FIND_QUIETLY TRUE)
 +ENDIF (LZ4_INCLUDE_DIR)
 +
 +FIND_PATH(LZ4_INCLUDE_DIR lz4.h)
 +FIND_LIBRARY(LZ4_LIBRARY NAMES lz4 liblz4)
 +INCLUDE(FindPackageHandleStandardArgs)
 +FIND_PACKAGE_HANDLE_STANDARD_ARGS(LZ4 DEFAULT_MSG LZ4_LIBRARY LZ4_INCLUDE_DIR)
 +IF(LZ4_FOUND)
 +  SET(HAVE_LIBLZ4 1)
 +  SET(HAVE_LZ4_H 1)
 +  CMAKE_PUSH_CHECK_STATE()	# Save the state of the variables
 +  SET(CMAKE_REQUIRED_INCLUDES ${LZ4_INCLUDE_DIR})
 +  CHECK_INCLUDE_FILES("lz4hc.h" HAVE_LZ4HC_H)
 +  CMAKE_POP_CHECK_STATE()	# Restore the state of the variables
 +  INCLUDE_DIRECTORIES(${LZ4_INCLUDE_DIR})
 +  LIST(APPEND ADDITIONAL_LIBS ${LZ4_LIBRARY})
 +  #
 +  # TODO: test for static library.
 +  #
 +ENDIF(LZ4_FOUND)
 +MARK_AS_ADVANCED(CLEAR LZ4_INCLUDE_DIR)
 +MARK_AS_ADVANCED(CLEAR LZ4_LIBRARY)
 +ENDIF()
 +
 +#
 +# Check headers
 +#
 +CHECK_HEADER_DIRENT()
 +
 +SET(INCLUDES "")
 +MACRO (LA_CHECK_INCLUDE_FILE header var)
 +      CHECK_INCLUDE_FILES("${INCLUDES};${header}" ${var})
 +      IF (${var})
 +      	 SET(INCLUDES ${INCLUDES} ${header})
 +      ENDIF (${var})
 +ENDMACRO (LA_CHECK_INCLUDE_FILE)
 +
 +# Some FreeBSD headers assume sys/types.h was already included.
 +LA_CHECK_INCLUDE_FILE("sys/types.h" HAVE_SYS_TYPES_H)
 +
 +# Alphabetize the rest unless there's a compelling reason
 +IF(ENABLE_ACL)
 +  LA_CHECK_INCLUDE_FILE("acl/libacl.h" HAVE_ACL_LIBACL_H)
 +ELSE(ENABLE_ACL)
 +  SET(HAVE_ACL_LIBACL_H FALSE)
 +ENDIF(ENABLE_ACL)
 +LA_CHECK_INCLUDE_FILE("ctype.h" HAVE_CTYPE_H)
 +LA_CHECK_INCLUDE_FILE("copyfile.h" HAVE_COPYFILE_H)
 +LA_CHECK_INCLUDE_FILE("direct.h" HAVE_DIRECT_H)
 +LA_CHECK_INCLUDE_FILE("dlfcn.h" HAVE_DLFCN_H)
 +LA_CHECK_INCLUDE_FILE("errno.h" HAVE_ERRNO_H)
 +LA_CHECK_INCLUDE_FILE("ext2fs/ext2_fs.h" HAVE_EXT2FS_EXT2_FS_H)
 +
 +CHECK_C_SOURCE_COMPILES("#include <sys/ioctl.h>
 +#include <ext2fs/ext2_fs.h>
 +int main(void) { return EXT2_IOC_GETFLAGS; }" HAVE_WORKING_EXT2_IOC_GETFLAGS)
 +
 +LA_CHECK_INCLUDE_FILE("fcntl.h" HAVE_FCNTL_H)
 +LA_CHECK_INCLUDE_FILE("grp.h" HAVE_GRP_H)
 +LA_CHECK_INCLUDE_FILE("inttypes.h" HAVE_INTTYPES_H)
 +LA_CHECK_INCLUDE_FILE("io.h" HAVE_IO_H)
 +LA_CHECK_INCLUDE_FILE("langinfo.h" HAVE_LANGINFO_H)
 +LA_CHECK_INCLUDE_FILE("limits.h" HAVE_LIMITS_H)
 +LA_CHECK_INCLUDE_FILE("linux/types.h" HAVE_LINUX_TYPES_H)
 +LA_CHECK_INCLUDE_FILE("linux/fiemap.h" HAVE_LINUX_FIEMAP_H)
 +LA_CHECK_INCLUDE_FILE("linux/fs.h" HAVE_LINUX_FS_H)
 +LA_CHECK_INCLUDE_FILE("linux/magic.h" HAVE_LINUX_MAGIC_H)
 +LA_CHECK_INCLUDE_FILE("locale.h" HAVE_LOCALE_H)
 +LA_CHECK_INCLUDE_FILE("memory.h" HAVE_MEMORY_H)
 +LA_CHECK_INCLUDE_FILE("paths.h" HAVE_PATHS_H)
 +LA_CHECK_INCLUDE_FILE("poll.h" HAVE_POLL_H)
 +LA_CHECK_INCLUDE_FILE("process.h" HAVE_PROCESS_H)
 +LA_CHECK_INCLUDE_FILE("pthread.h" HAVE_PTHREAD_H)
 +LA_CHECK_INCLUDE_FILE("pwd.h" HAVE_PWD_H)
 +LA_CHECK_INCLUDE_FILE("readpassphrase.h" HAVE_READPASSPHRASE_H)
 +LA_CHECK_INCLUDE_FILE("regex.h" HAVE_REGEX_H)
 +LA_CHECK_INCLUDE_FILE("signal.h" HAVE_SIGNAL_H)
 +LA_CHECK_INCLUDE_FILE("spawn.h" HAVE_SPAWN_H)
 +LA_CHECK_INCLUDE_FILE("stdarg.h" HAVE_STDARG_H)
 +LA_CHECK_INCLUDE_FILE("stdint.h" HAVE_STDINT_H)
 +LA_CHECK_INCLUDE_FILE("stdlib.h" HAVE_STDLIB_H)
 +LA_CHECK_INCLUDE_FILE("string.h" HAVE_STRING_H)
 +LA_CHECK_INCLUDE_FILE("strings.h" HAVE_STRINGS_H)
 +LA_CHECK_INCLUDE_FILE("sys/acl.h" HAVE_SYS_ACL_H)
 +LA_CHECK_INCLUDE_FILE("sys/cdefs.h" HAVE_SYS_CDEFS_H)
 +LA_CHECK_INCLUDE_FILE("sys/ioctl.h" HAVE_SYS_IOCTL_H)
 +LA_CHECK_INCLUDE_FILE("sys/mkdev.h" HAVE_SYS_MKDEV_H)
 +LA_CHECK_INCLUDE_FILE("sys/mount.h" HAVE_SYS_MOUNT_H)
 +LA_CHECK_INCLUDE_FILE("sys/param.h" HAVE_SYS_PARAM_H)
 +LA_CHECK_INCLUDE_FILE("sys/poll.h" HAVE_SYS_POLL_H)
 +LA_CHECK_INCLUDE_FILE("sys/select.h" HAVE_SYS_SELECT_H)
 +LA_CHECK_INCLUDE_FILE("sys/stat.h" HAVE_SYS_STAT_H)
 +LA_CHECK_INCLUDE_FILE("sys/statfs.h" HAVE_SYS_STATFS_H)
 +LA_CHECK_INCLUDE_FILE("sys/statvfs.h" HAVE_SYS_STATVFS_H)
 +LA_CHECK_INCLUDE_FILE("sys/time.h" HAVE_SYS_TIME_H)
 +LA_CHECK_INCLUDE_FILE("sys/utime.h" HAVE_SYS_UTIME_H)
 +LA_CHECK_INCLUDE_FILE("sys/utsname.h" HAVE_SYS_UTSNAME_H)
 +LA_CHECK_INCLUDE_FILE("sys/vfs.h" HAVE_SYS_VFS_H)
 +LA_CHECK_INCLUDE_FILE("sys/wait.h" HAVE_SYS_WAIT_H)
 +LA_CHECK_INCLUDE_FILE("time.h" HAVE_TIME_H)
 +LA_CHECK_INCLUDE_FILE("unistd.h" HAVE_UNISTD_H)
 +LA_CHECK_INCLUDE_FILE("utime.h" HAVE_UTIME_H)
 +LA_CHECK_INCLUDE_FILE("wchar.h" HAVE_WCHAR_H)
 +LA_CHECK_INCLUDE_FILE("wctype.h" HAVE_WCTYPE_H)
 +LA_CHECK_INCLUDE_FILE("windows.h" HAVE_WINDOWS_H)
 +IF(ENABLE_CNG)
 +  LA_CHECK_INCLUDE_FILE("Bcrypt.h" HAVE_BCRYPT_H)
 +ELSE(ENABLE_CNG)
 +  UNSET(HAVE_BCRYPT_H CACHE)
 +ENDIF(ENABLE_CNG)
- # Following files need windwos.h, so we should test it after windows.h test.
++# Following files need windows.h, so we should test it after windows.h test.
 +LA_CHECK_INCLUDE_FILE("wincrypt.h" HAVE_WINCRYPT_H)
 +LA_CHECK_INCLUDE_FILE("winioctl.h" HAVE_WINIOCTL_H)
 +
 +#
 +# Check whether use of __EXTENSIONS__ is safe.
 +# We need some macro such as _GNU_SOURCE to use extension functions.
 +#
 +SET(_INCLUDE_FILES)
 +FOREACH (it ${_HEADER})
 +   SET(_INCLUDE_FILES "${_INCLUDE_FILES}#include <${it}>\n")
 +ENDFOREACH (it)
 +
 +CHECK_C_SOURCE_COMPILES(
 +  "#define __EXTENSIONS__ 1
 +   ${_INCLUDE_FILES}
 +   int main() { return 0;}"
 + SAFE_TO_DEFINE_EXTENSIONS)
 +
 +#
 +# Find Nettle
 +#
 +IF(ENABLE_NETTLE)
 +  FIND_PACKAGE(Nettle)
 +  IF(NETTLE_FOUND)
 +    SET(HAVE_LIBNETTLE 1)
 +    LIST(APPEND ADDITIONAL_LIBS ${NETTLE_LIBRARIES})
 +    INCLUDE_DIRECTORIES(${NETTLE_INCLUDE_DIR})
 +
 +    LIST(APPEND CMAKE_REQUIRED_INCLUDES ${NETTLE_INCLUDE_DIR})
 +    LA_CHECK_INCLUDE_FILE("nettle/aes.h" HAVE_NETTLE_AES_H)
 +    LA_CHECK_INCLUDE_FILE("nettle/hmac.h" HAVE_NETTLE_HMAC_H)
 +    LA_CHECK_INCLUDE_FILE("nettle/md5.h" HAVE_NETTLE_MD5_H)
 +    LA_CHECK_INCLUDE_FILE("nettle/pbkdf2.h" HAVE_NETTLE_PBKDF2_H)
 +    LA_CHECK_INCLUDE_FILE("nettle/ripemd160.h" HAVE_NETTLE_RIPEMD160_H)
 +    LA_CHECK_INCLUDE_FILE("nettle/sha.h" HAVE_NETTLE_SHA_H)
 +
 +  ENDIF(NETTLE_FOUND)
 +  MARK_AS_ADVANCED(CLEAR NETTLE_INCLUDE_DIR)
 +  MARK_AS_ADVANCED(CLEAR NETTLE_LIBRARIES)
 +ENDIF(ENABLE_NETTLE)
 +
 +#
 +# Find OpenSSL
 +# (Except on Mac, where OpenSSL is deprecated.)
 +#
 +IF(ENABLE_OPENSSL AND NOT CMAKE_SYSTEM_NAME MATCHES "Darwin")
 +  FIND_PACKAGE(OpenSSL)
 +  IF(OPENSSL_FOUND)
 +    SET(HAVE_LIBCRYPTO 1)
 +    INCLUDE_DIRECTORIES(${OPENSSL_INCLUDE_DIR})
 +  ENDIF(OPENSSL_FOUND)
 +ELSE()
 +  SET(OPENSSL_FOUND FALSE) # Override cached value
 +ENDIF()
 +
 +# FreeBSD libmd
 +IF(NOT OPENSSL_FOUND)
 +  CHECK_LIBRARY_EXISTS(md "MD5Init" "" LIBMD_FOUND)
 +  IF(LIBMD_FOUND)
 +    CMAKE_PUSH_CHECK_STATE()	# Save the state of the variables
 +    SET(CMAKE_REQUIRED_LIBRARIES "md")
 +    FIND_LIBRARY(LIBMD_LIBRARY NAMES md)
 +    LIST(APPEND ADDITIONAL_LIBS ${LIBMD_LIBRARY})
 +    CMAKE_POP_CHECK_STATE()	# Restore the state of the variables
 +  ENDIF(LIBMD_FOUND)
 +ENDIF(NOT OPENSSL_FOUND)
 +
 +#
 +# How to prove that CRYPTO functions, which have several names on various
 +# platforms, just see if archive_digest.c can compile and link against
 +# required libraries.
 +#
 +MACRO(CHECK_CRYPTO ALGORITHMS IMPLEMENTATION)
 +    FOREACH(ALGORITHM ${ALGORITHMS})
 +      IF(NOT ARCHIVE_CRYPTO_${ALGORITHM})
 +      STRING(TOLOWER "${ALGORITHM}" lower_algorithm)
 +      STRING(TOUPPER "${ALGORITHM}" algorithm)
 +      IF ("${IMPLEMENTATION}" MATCHES "^OPENSSL$" AND NOT OPENSSL_FOUND)
 +        SET(ARCHIVE_CRYPTO_${ALGORITHM}_${IMPLEMENTATION} FALSE)
 +      ELSEIF("${IMPLEMENTATION}" MATCHES "^NETTLE$" AND NOT NETTLE_FOUND)
 +        SET(ARCHIVE_CRYPTO_${ALGORITHM}_${IMPLEMENTATION} FALSE)
 +      ENDIF("${IMPLEMENTATION}" MATCHES "^OPENSSL$" AND NOT OPENSSL_FOUND)
 +
 +      IF(NOT DEFINED ARCHIVE_CRYPTO_${ALGORITHM}_${IMPLEMENTATION})
 +        # Probe the local implementation for whether this
 +	# crypto implementation is available on this platform.
 +	SET(TRY_CRYPTO_REQUIRED_INCLUDES
 +	  "-DINCLUDE_DIRECTORIES:STRING=${CMAKE_BINARY_DIR};${CMAKE_CURRENT_SOURCE_DIR}/libarchive;${CMAKE_BINARY_DIR}${CMAKE_FILES_DIRECTORY}/CMakeTmp")
 +	SET(TRY_CRYPTO_REQUIRED_LIBS)
 +	IF ("${IMPLEMENTATION}" MATCHES "^OPENSSL$" AND OPENSSL_FOUND)
 +	    SET(TRY_CRYPTO_REQUIRED_INCLUDES
 +	      "${TRY_CRYPTO_REQUIRED_INCLUDES};${OPENSSL_INCLUDE_DIR}")
 +	    SET(TRY_CRYPTO_REQUIRED_LIBS
 +	        "-DLINK_LIBRARIES:STRING=${OPENSSL_LIBRARIES}")
 +	ELSEIF("${IMPLEMENTATION}" MATCHES "^NETTLE$" AND NETTLE_FOUND)
 +	    SET(TRY_CRYPTO_REQUIRED_INCLUDES
 +	      "${TRY_CRYPTO_REQUIRED_INCLUDES};${NETTLE_INCLUDE_DIR}")
 +	    SET(TRY_CRYPTO_REQUIRED_LIBS
 +	        "-DLINK_LIBRARIES:STRING=${NETTLE_LIBRARY}")
 +	ELSEIF("${IMPLEMENTATION}" MATCHES "^LIBMD$" AND LIBMD_FOUND)
 +	    SET(TRY_CRYPTO_REQUIRED_LIBS
 +	        "-DLINK_LIBRARIES:STRING=${LIBMD_LIBRARY}")
 +	ENDIF("${IMPLEMENTATION}" MATCHES "^OPENSSL$" AND OPENSSL_FOUND)
 +
 +    CONFIGURE_FILE(${CMAKE_CURRENT_SOURCE_DIR}/build/cmake/config.h.in
 +      ${CMAKE_BINARY_DIR}${CMAKE_FILES_DIRECTORY}/CMakeTmp/confdefs.h)
 +	FILE(READ "${CMAKE_BINARY_DIR}${CMAKE_FILES_DIRECTORY}/CMakeTmp/confdefs.h"
 +	     CONFDEFS_H)
 +	FILE(READ "${CMAKE_CURRENT_SOURCE_DIR}/libarchive/archive_digest.c"
 +	     ARCHIVE_CRYPTO_C)
 +
 +	SET(SOURCE "${CONFDEFS_H}
 +
 +#define ARCHIVE_${algorithm}_COMPILE_TEST
 +#define ARCHIVE_CRYPTO_${algorithm}_${IMPLEMENTATION}
 +#define PLATFORM_CONFIG_H \"check_crypto_md.h\"
 +
 +${ARCHIVE_CRYPTO_C}
 +
 +int
 +main(int argc, char **argv)
 +{
 +  archive_${lower_algorithm}_ctx ctx;
 +  archive_${lower_algorithm}_init(&ctx);
 +  archive_${lower_algorithm}_update(&ctx, *argv, argc);
 +  archive_${lower_algorithm}_final(&ctx, NULL);
 +  return 0;
 +}
 +")
 +
 +  FILE(WRITE "${CMAKE_BINARY_DIR}${CMAKE_FILES_DIRECTORY}/CMakeTmp/check_crypto_md.h" "")
 +	FILE(WRITE "${CMAKE_BINARY_DIR}${CMAKE_FILES_DIRECTORY}/CMakeTmp/check_crypto_md.c" "${SOURCE}")
 +	MESSAGE(STATUS "Checking support for ARCHIVE_CRYPTO_${ALGORITHM}_${IMPLEMENTATION}")
 +
 +	TRY_COMPILE(ARCHIVE_CRYPTO_${ALGORITHM}_${IMPLEMENTATION}
 +	  ${CMAKE_BINARY_DIR}
 +	  ${CMAKE_BINARY_DIR}${CMAKE_FILES_DIRECTORY}/CMakeTmp/check_crypto_md.c
 +	  CMAKE_FLAGS
 +	   "${TRY_CRYPTO_REQUIRED_LIBS}"
 +	   "${TRY_CRYPTO_REQUIRED_INCLUDES}"
 +	  OUTPUT_VARIABLE OUTPUT)
 +
 +	# Inform user whether or not we found it; if not, log why we didn't.
 +        IF (ARCHIVE_CRYPTO_${ALGORITHM}_${IMPLEMENTATION})
 +          MESSAGE(STATUS "Checking support for ARCHIVE_CRYPTO_${ALGORITHM}_${IMPLEMENTATION} -- found")
 +		  SET(ARCHIVE_CRYPTO_${ALGORITHM} 1)
 +        ELSE (ARCHIVE_CRYPTO_${ALGORITHM}_${IMPLEMENTATION})
 +          MESSAGE(STATUS "Checking support for ARCHIVE_CRYPTO_${ALGORITHM}_${IMPLEMENTATION} -- not found")
 +          FILE(APPEND ${CMAKE_BINARY_DIR}${CMAKE_FILES_DIRECTORY}/CMakeOutput.log
 +    	    "Checking support for ARCHIVE_CRYPTO_${ALGORITHM}_${IMPLEMENTATION} failed with the following output:\n"
 +    	    "${OUTPUT}\n"
 +    	    "Source file was:\n${SOURCE}\n")
 +        ENDIF (ARCHIVE_CRYPTO_${ALGORITHM}_${IMPLEMENTATION})
 +      ENDIF(NOT DEFINED ARCHIVE_CRYPTO_${ALGORITHM}_${IMPLEMENTATION})
 +
 +      # Add appropriate libs/includes depending on whether the implementation
 +      # was found on this platform.
 +      IF (ARCHIVE_CRYPTO_${ALGORITHM}_${IMPLEMENTATION})
 +        IF ("${IMPLEMENTATION}" MATCHES "^OPENSSL$" AND OPENSSL_FOUND)
 +          INCLUDE_DIRECTORIES(${OPENSSL_INCLUDE_DIR})
 +	  LIST(APPEND ADDITIONAL_LIBS ${OPENSSL_LIBRARIES})
 +	   LIST(REMOVE_DUPLICATES ADDITIONAL_LIBS)
 +        ENDIF ("${IMPLEMENTATION}" MATCHES "^OPENSSL$" AND OPENSSL_FOUND)
 +      ENDIF (ARCHIVE_CRYPTO_${ALGORITHM}_${IMPLEMENTATION})
 +      ENDIF(NOT ARCHIVE_CRYPTO_${ALGORITHM})
 +    ENDFOREACH(ALGORITHM ${ALGORITHMS})
 +ENDMACRO(CHECK_CRYPTO ALGORITHMS IMPLEMENTATION)
 +
 +#
 +# CRYPTO functions on Windows is defined at archive_windows.c, thus we do not
 +# need the test what the functions can be mapped to archive_{crypto name}_init,
 +# archive_{crypto name}_update and archive_{crypto name}_final.
 +# The functions on Windows use CALG_{crypto name} macro to create a crypt object
 +# and then we need to know what CALG_{crypto name} macros is available to show
 +# ARCHIVE_CRYPTO_{crypto name}_WIN macros because Windows 2000 and earlier version
 +# of Windows XP do not support SHA256, SHA384 and SHA512.
 +#
 +MACRO(CHECK_CRYPTO_WIN CRYPTO_LIST)
 +  IF(WIN32 AND NOT CYGWIN)
 +    FOREACH(CRYPTO ${CRYPTO_LIST})
 +      IF(NOT ARCHIVE_CRYPTO_${CRYPTO})
 +      IF(NOT DEFINED ARCHIVE_CRYPTO_${CRYPTO}_WIN)
 +	STRING(TOUPPER "${CRYPTO}" crypto)
 +	SET(ALGID "")
 +	IF ("${CRYPTO}" MATCHES "^MD5$")
 +	    SET(ALGID "CALG_MD5")
 +	ENDIF ("${CRYPTO}" MATCHES "^MD5$")
 +	IF ("${CRYPTO}" MATCHES "^SHA1$")
 +	    SET(ALGID "CALG_SHA1")
 +	ENDIF ("${CRYPTO}" MATCHES "^SHA1$")
 +	IF ("${CRYPTO}" MATCHES "^SHA256$")
 +	    SET(ALGID "CALG_SHA_256")
 +	ENDIF ("${CRYPTO}" MATCHES "^SHA256$")
 +	IF ("${CRYPTO}" MATCHES "^SHA384$")
 +	    SET(ALGID "CALG_SHA_384")
 +	ENDIF ("${CRYPTO}" MATCHES "^SHA384$")
 +	IF ("${CRYPTO}" MATCHES "^SHA512$")
 +	    SET(ALGID "CALG_SHA_512")
 +	ENDIF ("${CRYPTO}" MATCHES "^SHA512$")
 +
 +    CONFIGURE_FILE(${CMAKE_CURRENT_SOURCE_DIR}/build/cmake/config.h.in
 +      ${CMAKE_BINARY_DIR}${CMAKE_FILES_DIRECTORY}/CMakeTmp/confdefs.h)
 +	FILE(READ "${CMAKE_BINARY_DIR}${CMAKE_FILES_DIRECTORY}/CMakeTmp/confdefs.h"
 +	     CONFDEFS_H)
 +
 +	SET(SOURCE "${CONFDEFS_H}
 +
 +#define ${crypto}_COMPILE_TEST
 +#include <windows.h>
 +#include <wincrypt.h>
 +
 +int
 +main(int argc, char **argv)
 +{
 +	return ${ALGID};
 +}
 +")
 +	SET(SOURCE_FILE "${CMAKE_BINARY_DIR}${CMAKE_FILES_DIRECTORY}/CMakeTmp/check_crypto_win.c")
 +
 +	FILE(WRITE "${SOURCE_FILE}" "${SOURCE}")
 +	MESSAGE(STATUS "Checking support for ARCHIVE_CRYPTO_${CRYPTO}_WIN")
 +
 +	TRY_COMPILE(ARCHIVE_CRYPTO_${CRYPTO}_WIN
 +	  ${CMAKE_BINARY_DIR}
 +	  ${SOURCE_FILE}
 +	  CMAKE_FLAGS "-DINCLUDE_DIRECTORIES:STRING=${CMAKE_BINARY_DIR};${CMAKE_CURRENT_SOURCE_DIR}/libarchive"
 +	  OUTPUT_VARIABLE OUTPUT)
 +
 +	IF (ARCHIVE_CRYPTO_${CRYPTO}_WIN)
 +	    MESSAGE(STATUS
 +	        "Checking support for ARCHIVE_CRYPTO_${CRYPTO}_WIN -- found")
 +		SET(ARCHIVE_CRYPTO_${CRYPTO} 1)
 +	ELSE (ARCHIVE_CRYPTO_${CRYPTO}_WIN)
 +	    MESSAGE(STATUS
 +	         "Checking support for ARCHIVE_CRYPTO_${CRYPTO}_WIN -- not found")
 +    	    FILE(APPEND
 +	        ${CMAKE_BINARY_DIR}${CMAKE_FILES_DIRECTORY}/CMakeOutput.log
 +                "Checking support for ARCHIVE_CRYPTO_${CRYPTO}_WIN failed with the following output:\n"
 +        	"${OUTPUT}\n"
 +        	"Source file was:\n${SOURCE}\n")
 +	ENDIF (ARCHIVE_CRYPTO_${CRYPTO}_WIN)
 +
 +      ENDIF(NOT DEFINED ARCHIVE_CRYPTO_${CRYPTO}_WIN)
 +      ENDIF(NOT ARCHIVE_CRYPTO_${CRYPTO})
 +    ENDFOREACH(CRYPTO)
 +  ENDIF(WIN32 AND NOT CYGWIN)
 +ENDMACRO(CHECK_CRYPTO_WIN CRYPTO_LIST)
 +
 +#
 +# Find iconv
 +# POSIX defines the second arg as const char **
 +# and requires it to be in libc.  But we can accept
 +# a non-const argument here and can support iconv()
 +# being in libiconv.
 +#
 +MACRO(CHECK_ICONV LIB TRY_ICONV_CONST)
 +  IF(NOT HAVE_ICONV)
 +    CMAKE_PUSH_CHECK_STATE()	# Save the state of the variables
 +    IF (CMAKE_C_COMPILER_ID STREQUAL "GNU" OR
 +        CMAKE_C_COMPILER_ID STREQUAL "Clang")
 +      #
 +      # During checking iconv proto type, we should use -Werror to avoid the
 +      # success of iconv detection with a warnig which success is a miss
 +      # detection. So this needs for all build mode(even it's a release mode).
 +      #
 +      SET(CMAKE_REQUIRED_FLAGS "${CMAKE_REQUIRED_FLAGS} -Werror")
 +    ENDIF ()
 +    IF (CMAKE_C_COMPILER_ID STREQUAL "XL")
 +      SET(CMAKE_REQUIRED_FLAGS "${CMAKE_REQUIRED_FLAGS} -qhalt=w -qflag=w:w")
 +    ENDIF ()
 +    IF (MSVC)
 +      # NOTE: /WX option is the same as gcc's -Werror option.
 +      SET(CMAKE_REQUIRED_FLAGS "${CMAKE_REQUIRED_FLAGS} /WX")
 +    ENDIF (MSVC)
 +    #
 +    CHECK_C_SOURCE_COMPILES(
 +      "#include <stdlib.h>
 +       #include <iconv.h>
 +       int main() {
 +          ${TRY_ICONV_CONST} char *ccp;
 +          iconv_t cd = iconv_open(\"\", \"\");
 +          iconv(cd, &ccp, (size_t *)0, (char **)0, (size_t *)0);
 +          iconv_close(cd);
 +          return 0;
 +       }"
 +     HAVE_ICONV_${LIB}_${TRY_ICONV_CONST})
 +    IF(HAVE_ICONV_${LIB}_${TRY_ICONV_CONST})
 +      SET(HAVE_ICONV true)
 +      SET(ICONV_CONST ${TRY_ICONV_CONST})
 +    ENDIF(HAVE_ICONV_${LIB}_${TRY_ICONV_CONST})
 +    CMAKE_POP_CHECK_STATE()	# Restore the state of the variables
 +  ENDIF(NOT HAVE_ICONV)
 +ENDMACRO(CHECK_ICONV TRY_ICONV_CONST)
 +
 +IF(ENABLE_ICONV)
 +  CMAKE_PUSH_CHECK_STATE()	# Save the state of the variables
 +  FIND_PATH(ICONV_INCLUDE_DIR iconv.h)
 +  MARK_AS_ADVANCED(ICONV_INCLUDE_DIR)
 +  IF(ICONV_INCLUDE_DIR)
 +    #SET(INCLUDES ${INCLUDES} "iconv.h")
 +    SET(HAVE_ICONV_H 1)
 +    INCLUDE_DIRECTORIES(${ICONV_INCLUDE_DIR})
 +    SET(CMAKE_REQUIRED_INCLUDES ${ICONV_INCLUDE_DIR})
 +    CHECK_ICONV("libc" "const")
 +    CHECK_ICONV("libc" "")
 +
 +    # If iconv isn't in libc and we have a libiconv, try that.
 +    FIND_LIBRARY(LIBICONV_PATH NAMES iconv libiconv)
 +    IF(NOT HAVE_ICONV AND LIBICONV_PATH)
 +      LIST(APPEND CMAKE_REQUIRED_LIBRARIES ${LIBICONV_PATH})
 +      # Test if a macro is needed for the library.
 +      TRY_MACRO_FOR_LIBRARY(
 +        "${ICONV_INCLUDE_DIR}" "${LIBICONV_PATH}"
 +        COMPILES
 +        "#include <iconv.h>\nint main() {return iconv_close((iconv_t)0);}"
 +        "WITHOUT_LIBICONV_STATIC;LIBICONV_STATIC")
 +      IF(NOT WITHOUT_LIBICONV_STATIC AND LIBICONV_STATIC)
 +        ADD_DEFINITIONS(-DLIBICONV_STATIC)
 +      ENDIF(NOT WITHOUT_LIBICONV_STATIC AND LIBICONV_STATIC)
 +      #
 +      # Set up CMAKE_REQUIRED_* for CHECK_ICONV
 +      #
 +      SET(CMAKE_REQUIRED_INCLUDES ${ICONV_INCLUDE_DIR})
 +      SET(CMAKE_REQUIRED_LIBRARIES ${LIBICONV_PATH})
 +      IF(LIBICONV_STATIC)
 +        # LIBICONV_STATIC is necessary for the success of CHECK_ICONV
 +        # on Windows.
 +        SET(CMAKE_REQUIRED_DEFINITIONS "-DLIBICONV_STATIC")
 +      ELSE(LIBICONV_STATIC)
 +        SET(CMAKE_REQUIRED_DEFINITIONS)
 +      ENDIF(LIBICONV_STATIC)
 +      CHECK_ICONV("libiconv" "const")
 +      CHECK_ICONV("libiconv" "")
 +      IF (HAVE_ICONV)
 +        LIST(APPEND ADDITIONAL_LIBS ${LIBICONV_PATH})
 +      ENDIF(HAVE_ICONV)
 +    ENDIF(NOT HAVE_ICONV AND LIBICONV_PATH)
 +  ENDIF(ICONV_INCLUDE_DIR)
 +  #
 +  # Find locale_charset() for libiconv.
 +  #
 +  IF(LIBICONV_PATH)
 +    SET(CMAKE_REQUIRED_DEFINITIONS)
 +    SET(CMAKE_REQUIRED_INCLUDES ${ICONV_INCLUDE_DIR})
 +    SET(CMAKE_REQUIRED_LIBRARIES)
 +    CHECK_INCLUDE_FILES("localcharset.h" HAVE_LOCALCHARSET_H)
 +    FIND_LIBRARY(LIBCHARSET_PATH NAMES charset libcharset)
 +    IF(LIBCHARSET_PATH)
 +      SET(CMAKE_REQUIRED_LIBRARIES ${LIBCHARSET_PATH})
 +      IF(WIN32 AND NOT CYGWIN)
 +        # Test if a macro is needed for the library.
 +        TRY_MACRO_FOR_LIBRARY(
 +          "${ICONV_INCLUDE_DIR}" "${LIBCHARSET_PATH}"
 +          COMPILES
 +          "#include <localcharset.h>\nint main() {return locale_charset()?1:0;}"
 +          "WITHOUT_LIBCHARSET_STATIC;LIBCHARSET_STATIC")
 +        IF(NOT WITHOUT_LIBCHARSET_STATIC AND LIBCHARSET_STATIC)
 +          ADD_DEFINITIONS(-DLIBCHARSET_STATIC)
 +        ENDIF(NOT WITHOUT_LIBCHARSET_STATIC AND LIBCHARSET_STATIC)
 +        IF(WITHOUT_LIBCHARSET_STATIC OR LIBCHARSET_STATIC)
 +          SET(HAVE_LOCALE_CHARSET ON CACHE INTERNAL
 +              "Have function locale_charset")
 +        ENDIF(WITHOUT_LIBCHARSET_STATIC OR LIBCHARSET_STATIC)
 +      ELSE(WIN32 AND NOT CYGWIN)
 +        CHECK_FUNCTION_EXISTS_GLIBC(locale_charset HAVE_LOCALE_CHARSET)
 +      ENDIF(WIN32 AND NOT CYGWIN)
 +      IF(HAVE_LOCALE_CHARSET)
 +        LIST(APPEND ADDITIONAL_LIBS ${LIBCHARSET_PATH})
 +      ENDIF(HAVE_LOCALE_CHARSET)
 +    ENDIF(LIBCHARSET_PATH)
 +  ENDIF(LIBICONV_PATH)
 +  CMAKE_POP_CHECK_STATE()	# Restore the state of the variables
 +ELSE(ENABLE_ICONV)
 +  # Make sure ICONV variables are not in CACHE after ENABLE_ICONV disabled
 +  # (once enabled).
 +  UNSET(HAVE_LOCALE_CHARSET CACHE)
 +  UNSET(HAVE_ICONV CACHE)
 +  UNSET(HAVE_ICONV_libc_ CACHE)
 +  UNSET(HAVE_ICONV_libc_const CACHE)
 +  UNSET(HAVE_ICONV_libiconv_ CACHE)
 +  UNSET(HAVE_ICONV_libiconv_const CACHE)
 +  UNSET(ICONV_INCLUDE_DIR CACHE)
 +  UNSET(LIBICONV_PATH CACHE)
 +  UNSET(LIBICONV_DLL CACHE)
 +  UNSET(LIBICONV_STATIC CACHE)
 +  UNSET(LIBCHARSET_DLL CACHE)
 +  UNSET(LIBCHARSET_STATIC CACHE)
 +ENDIF(ENABLE_ICONV)
 +
 +IF(0) # CMake does not need XML support in libarchive
 +#
 +# Find Libxml2
 +#
 +IF(ENABLE_LIBXML2)
 +  FIND_PACKAGE(LibXml2)
 +ELSE()
 +  SET(LIBXML2_FOUND FALSE)
 +ENDIF()
 +IF(LIBXML2_FOUND)
 +  CMAKE_PUSH_CHECK_STATE()	# Save the state of the variables
 +  INCLUDE_DIRECTORIES(${LIBXML2_INCLUDE_DIR})
 +  LIST(APPEND ADDITIONAL_LIBS ${LIBXML2_LIBRARIES})
 +  SET(HAVE_LIBXML2 1)
 +  # libxml2's include files use iconv.h
 +  SET(CMAKE_REQUIRED_INCLUDES ${ICONV_INCLUDE_DIR} ${LIBXML2_INCLUDE_DIR})
 +  CHECK_INCLUDE_FILES("libxml/xmlreader.h" HAVE_LIBXML_XMLREADER_H)
 +  CHECK_INCLUDE_FILES("libxml/xmlwriter.h" HAVE_LIBXML_XMLWRITER_H)
 +  # Test if a macro is needed for the library.
 +  TRY_MACRO_FOR_LIBRARY(
 +    "${ICONV_INCLUDE_DIR};${LIBXML2_INCLUDE_DIR}"
 +    "ws2_32.lib;${ZLIB_LIBRARIES};${LIBICONV_PATH};${LIBXML2_LIBRARIES}"
 +    COMPILES
 +    "#include <stddef.h>\n#include <libxml/xmlreader.h>\nint main() {return xmlTextReaderRead((xmlTextReaderPtr)(void *)0);}"
 +    "WITHOUT_LIBXML_STATIC;LIBXML_STATIC")
 +  IF(NOT WITHOUT_LIBXML_STATIC AND LIBXML_STATIC)
 +    ADD_DEFINITIONS(-DLIBXML_STATIC)
 +  ENDIF(NOT WITHOUT_LIBXML_STATIC AND LIBXML_STATIC)
 +  CMAKE_POP_CHECK_STATE()	# Restore the state of the variables
 +ELSE(LIBXML2_FOUND)
 +  #
 +  # Find Expat
 +  #
 +  IF(ENABLE_EXPAT)
 +    FIND_PACKAGE(EXPAT)
 +  ELSE()
 +    SET(EXPAT_FOUND FALSE)
 +  ENDIF()
 +  IF(EXPAT_FOUND)
 +    CMAKE_PUSH_CHECK_STATE()	# Save the state of the variables
 +    INCLUDE_DIRECTORIES(${EXPAT_INCLUDE_DIR})
 +    LIST(APPEND ADDITIONAL_LIBS ${EXPAT_LIBRARIES})
 +    SET(HAVE_LIBEXPAT 1)
 +    LA_CHECK_INCLUDE_FILE("expat.h" HAVE_EXPAT_H)
 +    CMAKE_POP_CHECK_STATE()	# Restore the state of the variables
 +  ENDIF(EXPAT_FOUND)
 +ENDIF(LIBXML2_FOUND)
 +MARK_AS_ADVANCED(CLEAR LIBXML2_INCLUDE_DIR)
 +MARK_AS_ADVANCED(CLEAR LIBXML2_LIBRARIES)
 +ENDIF()
 +
 +#
 +# Check functions
 +#
 +CMAKE_PUSH_CHECK_STATE()	# Save the state of the variables
 +IF (CMAKE_C_COMPILER_ID STREQUAL "GNU" OR
 +    CMAKE_C_COMPILER_ID STREQUAL "Clang")
 +  #
 +  # During checking functions, we should use -fno-builtin to avoid the
 +  # failure of function detection which failure is an error "conflicting
 +  # types for built-in function" caused by using -Werror option.
 +  #
 +  SET(CMAKE_REQUIRED_FLAGS "${CMAKE_REQUIRED_FLAGS} -fno-builtin")
 +ENDIF ()
 +CHECK_SYMBOL_EXISTS(_CrtSetReportMode "crtdbg.h" HAVE__CrtSetReportMode)
 +CHECK_FUNCTION_EXISTS_GLIBC(arc4random_buf HAVE_ARC4RANDOM_BUF)
 +CHECK_FUNCTION_EXISTS_GLIBC(chflags HAVE_CHFLAGS)
 +CHECK_FUNCTION_EXISTS_GLIBC(chown HAVE_CHOWN)
 +CHECK_FUNCTION_EXISTS_GLIBC(chroot HAVE_CHROOT)
 +CHECK_FUNCTION_EXISTS_GLIBC(ctime_r HAVE_CTIME_R)
 +CHECK_FUNCTION_EXISTS_GLIBC(dirfd HAVE_DIRFD)
 +CHECK_FUNCTION_EXISTS_GLIBC(fchdir HAVE_FCHDIR)
 +CHECK_FUNCTION_EXISTS_GLIBC(fchflags HAVE_FCHFLAGS)
 +CHECK_FUNCTION_EXISTS_GLIBC(fchmod HAVE_FCHMOD)
 +CHECK_FUNCTION_EXISTS_GLIBC(fchown HAVE_FCHOWN)
 +CHECK_FUNCTION_EXISTS_GLIBC(fcntl HAVE_FCNTL)
 +CHECK_FUNCTION_EXISTS_GLIBC(fdopendir HAVE_FDOPENDIR)
 +CHECK_FUNCTION_EXISTS_GLIBC(fork HAVE_FORK)
 +CHECK_FUNCTION_EXISTS_GLIBC(fstat HAVE_FSTAT)
 +CHECK_FUNCTION_EXISTS_GLIBC(fstatat HAVE_FSTATAT)
 +CHECK_FUNCTION_EXISTS_GLIBC(fstatfs HAVE_FSTATFS)
 +CHECK_FUNCTION_EXISTS_GLIBC(fstatvfs HAVE_FSTATVFS)
 +CHECK_FUNCTION_EXISTS_GLIBC(ftruncate HAVE_FTRUNCATE)
 +CHECK_FUNCTION_EXISTS_GLIBC(futimens HAVE_FUTIMENS)
 +CHECK_FUNCTION_EXISTS_GLIBC(futimes HAVE_FUTIMES)
 +CHECK_FUNCTION_EXISTS_GLIBC(futimesat HAVE_FUTIMESAT)
 +CHECK_FUNCTION_EXISTS_GLIBC(geteuid HAVE_GETEUID)
 +CHECK_FUNCTION_EXISTS_GLIBC(getgrgid_r HAVE_GETGRGID_R)
 +CHECK_FUNCTION_EXISTS_GLIBC(getgrnam_r HAVE_GETGRNAM_R)
 +CHECK_FUNCTION_EXISTS_GLIBC(getpwnam_r HAVE_GETPWNAM_R)
 +CHECK_FUNCTION_EXISTS_GLIBC(getpwuid_r HAVE_GETPWUID_R)
 +CHECK_FUNCTION_EXISTS_GLIBC(getpid HAVE_GETPID)
 +CHECK_FUNCTION_EXISTS_GLIBC(getvfsbyname HAVE_GETVFSBYNAME)
 +CHECK_FUNCTION_EXISTS_GLIBC(gmtime_r HAVE_GMTIME_R)
 +CHECK_FUNCTION_EXISTS_GLIBC(lchflags HAVE_LCHFLAGS)
 +CHECK_FUNCTION_EXISTS_GLIBC(lchmod HAVE_LCHMOD)
 +CHECK_FUNCTION_EXISTS_GLIBC(lchown HAVE_LCHOWN)
 +CHECK_FUNCTION_EXISTS_GLIBC(link HAVE_LINK)
 +CHECK_FUNCTION_EXISTS_GLIBC(localtime_r HAVE_LOCALTIME_R)
 +CHECK_FUNCTION_EXISTS_GLIBC(lstat HAVE_LSTAT)
 +CHECK_FUNCTION_EXISTS_GLIBC(lutimes HAVE_LUTIMES)
 +CHECK_FUNCTION_EXISTS_GLIBC(mbrtowc HAVE_MBRTOWC)
 +CHECK_FUNCTION_EXISTS_GLIBC(memmove HAVE_MEMMOVE)
 +CHECK_FUNCTION_EXISTS_GLIBC(mkdir HAVE_MKDIR)
 +CHECK_FUNCTION_EXISTS_GLIBC(mkfifo HAVE_MKFIFO)
 +CHECK_FUNCTION_EXISTS_GLIBC(mknod HAVE_MKNOD)
 +CHECK_FUNCTION_EXISTS_GLIBC(mkstemp HAVE_MKSTEMP)
 +CHECK_FUNCTION_EXISTS_GLIBC(nl_langinfo HAVE_NL_LANGINFO)
 +CHECK_FUNCTION_EXISTS_GLIBC(openat HAVE_OPENAT)
 +CHECK_FUNCTION_EXISTS_GLIBC(pipe HAVE_PIPE)
 +CHECK_FUNCTION_EXISTS_GLIBC(poll HAVE_POLL)
 +CHECK_FUNCTION_EXISTS_GLIBC(posix_spawnp HAVE_POSIX_SPAWNP)
 +CHECK_FUNCTION_EXISTS_GLIBC(readlink HAVE_READLINK)
 +CHECK_FUNCTION_EXISTS_GLIBC(readpassphrase HAVE_READPASSPHRASE)
 +CHECK_FUNCTION_EXISTS_GLIBC(select HAVE_SELECT)
 +CHECK_FUNCTION_EXISTS_GLIBC(setenv HAVE_SETENV)
 +CHECK_FUNCTION_EXISTS_GLIBC(setlocale HAVE_SETLOCALE)
 +CHECK_FUNCTION_EXISTS_GLIBC(sigaction HAVE_SIGACTION)
 +CHECK_FUNCTION_EXISTS_GLIBC(statfs HAVE_STATFS)
 +CHECK_FUNCTION_EXISTS_GLIBC(statvfs HAVE_STATVFS)
 +CHECK_FUNCTION_EXISTS_GLIBC(strchr HAVE_STRCHR)
 +CHECK_FUNCTION_EXISTS_GLIBC(strdup HAVE_STRDUP)
 +CHECK_FUNCTION_EXISTS_GLIBC(strerror HAVE_STRERROR)
 +CHECK_FUNCTION_EXISTS_GLIBC(strncpy_s HAVE_STRNCPY_S)
 +CHECK_FUNCTION_EXISTS_GLIBC(strrchr HAVE_STRRCHR)
 +CHECK_FUNCTION_EXISTS_GLIBC(symlink HAVE_SYMLINK)
 +CHECK_FUNCTION_EXISTS_GLIBC(timegm HAVE_TIMEGM)
 +CHECK_FUNCTION_EXISTS_GLIBC(tzset HAVE_TZSET)
 +CHECK_FUNCTION_EXISTS_GLIBC(unsetenv HAVE_UNSETENV)
 +CHECK_FUNCTION_EXISTS_GLIBC(utime HAVE_UTIME)
 +CHECK_FUNCTION_EXISTS_GLIBC(utimes HAVE_UTIMES)
 +CHECK_FUNCTION_EXISTS_GLIBC(utimensat HAVE_UTIMENSAT)
 +CHECK_FUNCTION_EXISTS_GLIBC(vfork HAVE_VFORK)
 +CHECK_FUNCTION_EXISTS_GLIBC(wcrtomb HAVE_WCRTOMB)
 +CHECK_FUNCTION_EXISTS_GLIBC(wcscmp HAVE_WCSCMP)
 +CHECK_FUNCTION_EXISTS_GLIBC(wcscpy HAVE_WCSCPY)
 +CHECK_FUNCTION_EXISTS_GLIBC(wcslen HAVE_WCSLEN)
 +CHECK_FUNCTION_EXISTS_GLIBC(wctomb HAVE_WCTOMB)
 +CHECK_FUNCTION_EXISTS_GLIBC(_ctime64_s HAVE__CTIME64_S)
 +CHECK_FUNCTION_EXISTS_GLIBC(_fseeki64 HAVE__FSEEKI64)
 +CHECK_FUNCTION_EXISTS_GLIBC(_get_timezone HAVE__GET_TIMEZONE)
 +CHECK_FUNCTION_EXISTS_GLIBC(_localtime64_s HAVE__LOCALTIME64_S)
 +CHECK_FUNCTION_EXISTS_GLIBC(_mkgmtime64 HAVE__MKGMTIME64)
 +
 +SET(CMAKE_REQUIRED_LIBRARIES "")
 +CHECK_FUNCTION_EXISTS(cygwin_conv_path HAVE_CYGWIN_CONV_PATH)
 +CHECK_FUNCTION_EXISTS(fseeko HAVE_FSEEKO)
 +CHECK_FUNCTION_EXISTS(strerror_r HAVE_STRERROR_R)
 +CHECK_FUNCTION_EXISTS(strftime HAVE_STRFTIME)
 +CHECK_FUNCTION_EXISTS(vprintf HAVE_VPRINTF)
 +CHECK_FUNCTION_EXISTS(wmemcmp HAVE_WMEMCMP)
 +CHECK_FUNCTION_EXISTS(wmemcpy HAVE_WMEMCPY)
 +CHECK_FUNCTION_EXISTS(wmemmove HAVE_WMEMMOVE)
 +
 +CMAKE_POP_CHECK_STATE()	# Restore the state of the variables
 +
++CHECK_C_SOURCE_COMPILES(
++  "#include <sys/types.h>\n#include <sys/mount.h>\nint main(void) { struct vfsconf v; return sizeof(v);}"
++  HAVE_STRUCT_VFSCONF)
++
++CHECK_C_SOURCE_COMPILES(
++  "#include <sys/types.h>\n#include <sys/mount.h>\nint main(void) { struct xvfsconf v; return sizeof(v);}"
++  HAVE_STRUCT_XVFSCONF)
++
 +# Make sure we have the POSIX version of readdir_r, not the
 +# older 2-argument version.
 +CHECK_C_SOURCE_COMPILES(
 +  "#include <dirent.h>\nint main() {DIR *d = opendir(\".\"); struct dirent e,*r; return readdir_r(d,&e,&r);}"
 +  HAVE_READDIR_R)
 +
 +
 +# Only detect readlinkat() if we also have AT_FDCWD in unistd.h.
 +# NOTE: linux requires fcntl.h for AT_FDCWD.
 +CHECK_C_SOURCE_COMPILES(
 +  "#include <fcntl.h>\n#include <unistd.h>\nint main() {char buf[10]; return readlinkat(AT_FDCWD, \"\", buf, 0);}"
 +  HAVE_READLINKAT)
 +
 +
 +# To verify major(), we need to both include the header
 +# of interest and verify that the result can be linked.
 +# CHECK_FUNCTION_EXISTS doesn't accept a header argument,
 +# CHECK_SYMBOL_EXISTS doesn't test linkage.
 +CHECK_C_SOURCE_COMPILES(
 +  "#include <sys/mkdev.h>\nint main() { return major(256); }"
 +  MAJOR_IN_MKDEV)
 +CHECK_C_SOURCE_COMPILES(
 +  "#include <sys/sysmacros.h>\nint main() { return major(256); }"
 +  MAJOR_IN_SYSMACROS)
 +
++CHECK_C_SOURCE_COMPILES(
++  "#include <lzma.h>\n#if LZMA_VERSION < 50020000\n#error unsupported\n#endif\nint main(void){lzma_stream_encoder_mt(0, 0); return 0;}"
++  HAVE_LZMA_STREAM_ENCODER_MT)
++
 +IF(HAVE_STRERROR_R)
 +  SET(HAVE_DECL_STRERROR_R 1)
 +ENDIF(HAVE_STRERROR_R)
 +
 +#
 +# Check defines
 +#
 +SET(headers "limits.h")
 +IF(HAVE_STDINT_H)
 +  LIST(APPEND headers "stdint.h")
 +ENDIF(HAVE_STDINT_H)
 +IF(HAVE_INTTYPES_H)
 +  LIST(APPEND headers "inttypes.h")
 +ENDIF(HAVE_INTTYPES_H)
 +CHECK_SYMBOL_EXISTS(EFTYPE           "errno.h"    HAVE_EFTYPE)
 +CHECK_SYMBOL_EXISTS(EILSEQ           "errno.h"    HAVE_EILSEQ)
 +CHECK_SYMBOL_EXISTS(D_MD_ORDER       "langinfo.h" HAVE_D_MD_ORDER)
 +CHECK_SYMBOL_EXISTS(INT32_MAX        "${headers}" HAVE_DECL_INT32_MAX)
 +CHECK_SYMBOL_EXISTS(INT32_MIN        "${headers}" HAVE_DECL_INT32_MIN)
 +CHECK_SYMBOL_EXISTS(INT64_MAX        "${headers}" HAVE_DECL_INT64_MAX)
 +CHECK_SYMBOL_EXISTS(INT64_MIN        "${headers}" HAVE_DECL_INT64_MIN)
 +CHECK_SYMBOL_EXISTS(INTMAX_MAX       "${headers}" HAVE_DECL_INTMAX_MAX)
 +CHECK_SYMBOL_EXISTS(INTMAX_MIN       "${headers}" HAVE_DECL_INTMAX_MIN)
 +CHECK_SYMBOL_EXISTS(UINT32_MAX       "${headers}" HAVE_DECL_UINT32_MAX)
 +CHECK_SYMBOL_EXISTS(UINT64_MAX       "${headers}" HAVE_DECL_UINT64_MAX)
 +CHECK_SYMBOL_EXISTS(UINTMAX_MAX      "${headers}" HAVE_DECL_UINTMAX_MAX)
 +CHECK_SYMBOL_EXISTS(SIZE_MAX         "${headers}" HAVE_DECL_SIZE_MAX)
 +CHECK_SYMBOL_EXISTS(SSIZE_MAX        "limits.h"   HAVE_DECL_SSIZE_MAX)
 +
 +#
 +# Check struct members
 +#
 +# Check for tm_gmtoff in struct tm
- CHECK_STRUCT_MEMBER("struct tm" tm_gmtoff
++CHECK_STRUCT_HAS_MEMBER("struct tm" tm_gmtoff
 +    "time.h" HAVE_STRUCT_TM_TM_GMTOFF)
- CHECK_STRUCT_MEMBER("struct tm" __tm_gmtoff
++CHECK_STRUCT_HAS_MEMBER("struct tm" __tm_gmtoff
 +    "time.h" HAVE_STRUCT_TM___TM_GMTOFF)
 +
 +# Check for f_namemax in struct statfs
- CHECK_STRUCT_MEMBER("struct statfs" f_namemax
++CHECK_STRUCT_HAS_MEMBER("struct statfs" f_namemax
 +    "sys/param.h;sys/mount.h" HAVE_STRUCT_STATFS_F_NAMEMAX)
 +
 +# Check for birthtime in struct stat
- CHECK_STRUCT_MEMBER("struct stat" st_birthtime
++CHECK_STRUCT_HAS_MEMBER("struct stat" st_birthtime
 +    "sys/types.h;sys/stat.h" HAVE_STRUCT_STAT_ST_BIRTHTIME)
 +
 +# Check for high-resolution timestamps in struct stat
- CHECK_STRUCT_MEMBER("struct stat" st_birthtimespec.tv_nsec
++CHECK_STRUCT_HAS_MEMBER("struct stat" st_birthtimespec.tv_nsec
 +    "sys/types.h;sys/stat.h" HAVE_STRUCT_STAT_ST_BIRTHTIMESPEC_TV_NSEC)
- CHECK_STRUCT_MEMBER("struct stat" st_mtimespec.tv_nsec
++CHECK_STRUCT_HAS_MEMBER("struct stat" st_mtimespec.tv_nsec
 +    "sys/types.h;sys/stat.h" HAVE_STRUCT_STAT_ST_MTIMESPEC_TV_NSEC)
- CHECK_STRUCT_MEMBER("struct stat" st_mtim.tv_nsec
++CHECK_STRUCT_HAS_MEMBER("struct stat" st_mtim.tv_nsec
 +    "sys/types.h;sys/stat.h" HAVE_STRUCT_STAT_ST_MTIM_TV_NSEC)
- CHECK_STRUCT_MEMBER("struct stat" st_mtime_n
++CHECK_STRUCT_HAS_MEMBER("struct stat" st_mtime_n
 +    "sys/types.h;sys/stat.h" HAVE_STRUCT_STAT_ST_MTIME_N)
- CHECK_STRUCT_MEMBER("struct stat" st_umtime
++CHECK_STRUCT_HAS_MEMBER("struct stat" st_umtime
 +    "sys/types.h;sys/stat.h" HAVE_STRUCT_STAT_ST_UMTIME)
- CHECK_STRUCT_MEMBER("struct stat" st_mtime_usec
++CHECK_STRUCT_HAS_MEMBER("struct stat" st_mtime_usec
 +    "sys/types.h;sys/stat.h" HAVE_STRUCT_STAT_ST_MTIME_USEC)
 +# Check for block size support in struct stat
- CHECK_STRUCT_MEMBER("struct stat" st_blksize
++CHECK_STRUCT_HAS_MEMBER("struct stat" st_blksize
 +    "sys/types.h;sys/stat.h" HAVE_STRUCT_STAT_ST_BLKSIZE)
 +# Check for st_flags in struct stat (BSD fflags)
- CHECK_STRUCT_MEMBER("struct stat" st_flags
++CHECK_STRUCT_HAS_MEMBER("struct stat" st_flags
 +    "sys/types.h;sys/stat.h" HAVE_STRUCT_STAT_ST_FLAGS)
 +
 +IF(HAVE_SYS_STATVFS_H)
-   CHECK_STRUCT_MEMBER("struct statvfs" f_iosize
++  CHECK_STRUCT_HAS_MEMBER("struct statvfs" f_iosize
 +    "sys/types.h;sys/statvfs.h" HAVE_STRUCT_STATVFS_F_IOSIZE)
 +ENDIF()
 +
 +#
 +#
- CHECK_STRUCT_MEMBER("struct tm" tm_sec
++CHECK_STRUCT_HAS_MEMBER("struct tm" tm_sec
 +    "sys/types.h;sys/time.h;time.h" TIME_WITH_SYS_TIME)
 +
 +#
 +# Check for integer types
 +#
 +#
 +CHECK_TYPE_SIZE("short" SIZE_OF_SHORT)
 +CHECK_TYPE_SIZE("int" SIZE_OF_INT)
 +CHECK_TYPE_SIZE("long" SIZE_OF_LONG)
 +CHECK_TYPE_SIZE("long long"     SIZE_OF_LONG_LONG)
 +
 +CHECK_TYPE_SIZE("unsigned short" SIZE_OF_UNSIGNED_SHORT)
 +CHECK_TYPE_SIZE("unsigned" SIZE_OF_UNSIGNED)
 +CHECK_TYPE_SIZE("unsigned long" SIZE_OF_UNSIGNED_LONG)
 +CHECK_TYPE_SIZE("unsigned long long" SIZE_OF_UNSIGNED_LONG_LONG)
 +
 +CHECK_TYPE_SIZE("__int64" __INT64)
 +CHECK_TYPE_SIZE("unsigned __int64" UNSIGNED___INT64)
 +
 +CHECK_TYPE_SIZE(int16_t INT16_T)
 +CHECK_TYPE_SIZE(int32_t INT32_T)
 +CHECK_TYPE_SIZE(int64_t INT64_T)
 +CHECK_TYPE_SIZE(intmax_t INTMAX_T)
 +CHECK_TYPE_SIZE(uint8_t UINT8_T)
 +CHECK_TYPE_SIZE(uint16_t UINT16_T)
 +CHECK_TYPE_SIZE(uint32_t UINT32_T)
 +CHECK_TYPE_SIZE(uint64_t UINT64_T)
 +CHECK_TYPE_SIZE(uintmax_t UINTMAX_T)
 +
 +CHECK_TYPE_SIZE(dev_t       DEV_T)
 +IF(NOT HAVE_DEV_T)
 +  IF(MSVC)
 +    SET(dev_t "unsigned int")
 +  ENDIF(MSVC)
 +ENDIF(NOT HAVE_DEV_T)
 +#
 +CHECK_TYPE_SIZE(gid_t       GID_T)
 +IF(NOT HAVE_GID_T)
 +  IF(WIN32)
 +    SET(gid_t "short")
 +  ELSE(WIN32)
 +    SET(gid_t "unsigned int")
 +  ENDIF(WIN32)
 +ENDIF(NOT HAVE_GID_T)
 +#
 +CHECK_TYPE_SIZE(id_t        ID_T)
 +IF(NOT HAVE_ID_T)
 +  IF(WIN32)
 +    SET(id_t "short")
 +  ELSE(WIN32)
 +    SET(id_t "unsigned int")
 +  ENDIF(WIN32)
 +ENDIF(NOT HAVE_ID_T)
 +#
 +CHECK_TYPE_SIZE(mode_t      MODE_T)
 +IF(NOT HAVE_MODE_T)
 +  IF(WIN32)
 +    SET(mode_t "unsigned short")
 +  ELSE(WIN32)
 +    SET(mode_t "int")
 +  ENDIF(WIN32)
 +ENDIF(NOT HAVE_MODE_T)
 +#
 +CHECK_TYPE_SIZE(off_t       OFF_T)
 +IF(NOT HAVE_OFF_T)
 +  SET(off_t "__int64")
 +ENDIF(NOT HAVE_OFF_T)
 +#
 +CHECK_TYPE_SIZE(size_t      SIZE_T)
 +IF(NOT HAVE_SIZE_T)
 +  IF("${CMAKE_SIZEOF_VOID_P}" EQUAL 8)
 +    SET(size_t "uint64_t")
 +  ELSE("${CMAKE_SIZEOF_VOID_P}" EQUAL 8)
 +    SET(size_t   "uint32_t")
 +  ENDIF("${CMAKE_SIZEOF_VOID_P}" EQUAL 8)
 +ENDIF(NOT HAVE_SIZE_T)
 +#
 +CHECK_TYPE_SIZE(ssize_t     SSIZE_T)
 +IF(NOT HAVE_SSIZE_T)
 +  IF("${CMAKE_SIZEOF_VOID_P}" EQUAL 8)
 +    SET(ssize_t "int64_t")
 +  ELSE("${CMAKE_SIZEOF_VOID_P}" EQUAL 8)
 +    SET(ssize_t "long")
 +  ENDIF("${CMAKE_SIZEOF_VOID_P}" EQUAL 8)
 +ENDIF(NOT HAVE_SSIZE_T)
 +#
 +CHECK_TYPE_SIZE(uid_t       UID_T)
 +IF(NOT HAVE_UID_T)
 +  IF(WIN32)
 +    SET(uid_t "short")
 +  ELSE(WIN32)
 +    SET(uid_t "unsigned int")
 +  ENDIF(WIN32)
 +ENDIF(NOT HAVE_UID_T)
 +#
 +CHECK_TYPE_SIZE(pid_t       PID_T)
 +IF(NOT HAVE_PID_T)
 +  IF(WIN32)
 +    SET(pid_t "int")
 +  ELSE(WIN32)
 +    MESSAGE(FATAL_ERROR "pid_t doesn't exist on this platform?")
 +  ENDIF(WIN32)
 +ENDIF(NOT HAVE_PID_T)
 +#
 +CHECK_TYPE_SIZE(intptr_t   INTPTR_T)
 +IF(NOT HAVE_INTPTR_T)
 +  IF("${CMAKE_SIZEOF_VOID_P}" EQUAL 8)
 +    SET(intptr_t "int64_t")
 +  ELSE()
 +    SET(intptr_t "int32_t")
 +  ENDIF()
 +ENDIF(NOT HAVE_INTPTR_T)
 +#
 +CHECK_TYPE_SIZE(uintptr_t   UINTPTR_T)
 +IF(NOT HAVE_UINTPTR_T)
 +  IF("${CMAKE_SIZEOF_VOID_P}" EQUAL 8)
 +    SET(uintptr_t "uint64_t")
 +  ELSE()
 +    SET(uintptr_t "uint32_t")
 +  ENDIF()
 +ENDIF(NOT HAVE_UINTPTR_T)
 +#
 +CHECK_TYPE_SIZE(wchar_t     SIZEOF_WCHAR_T)
 +IF(HAVE_SIZEOF_WCHAR_T)
 +  SET(HAVE_WCHAR_T 1)
 +ENDIF(HAVE_SIZEOF_WCHAR_T)
 +#
 +# Check if _FILE_OFFSET_BITS macro needed for large files
 +#
 +CHECK_FILE_OFFSET_BITS()
 +
 +#
 +# Check for Extended Attribute libraries, headers, and functions
 +#
 +IF(ENABLE_XATTR)
 +  LA_CHECK_INCLUDE_FILE(attr/xattr.h     HAVE_ATTR_XATTR_H)
 +  LA_CHECK_INCLUDE_FILE(sys/xattr.h      HAVE_SYS_XATTR_H)
 +  LA_CHECK_INCLUDE_FILE(sys/extattr.h      HAVE_SYS_EXTATTR_H)
 +  CHECK_LIBRARY_EXISTS(attr "setxattr" "" HAVE_LIBATTR)
 +  IF(HAVE_LIBATTR)
 +    SET(CMAKE_REQUIRED_LIBRARIES "attr")
 +  ENDIF(HAVE_LIBATTR)
 +  CHECK_SYMBOL_EXISTS(EXTATTR_NAMESPACE_USER "sys/types.h;sys/extattr.h" HAVE_DECL_EXTATTR_NAMESPACE_USER)
 +  CHECK_FUNCTION_EXISTS_GLIBC(extattr_get_file HAVE_EXTATTR_GET_FILE)
 +  CHECK_FUNCTION_EXISTS_GLIBC(extattr_list_file HAVE_EXTATTR_LIST_FILE)
 +  CHECK_FUNCTION_EXISTS_GLIBC(extattr_set_fd HAVE_EXTATTR_SET_FD)
 +  CHECK_FUNCTION_EXISTS_GLIBC(extattr_set_file HAVE_EXTATTR_SET_FILE)
 +  CHECK_FUNCTION_EXISTS_GLIBC(fgetxattr HAVE_FGETXATTR)
 +  CHECK_FUNCTION_EXISTS_GLIBC(flistxattr HAVE_FLISTXATTR)
 +  CHECK_FUNCTION_EXISTS_GLIBC(fsetxattr HAVE_FSETXATTR)
 +  CHECK_FUNCTION_EXISTS_GLIBC(getxattr HAVE_GETXATTR)
 +  CHECK_FUNCTION_EXISTS_GLIBC(lgetxattr HAVE_LGETXATTR)
 +  CHECK_FUNCTION_EXISTS_GLIBC(listxattr HAVE_LISTXATTR)
 +  CHECK_FUNCTION_EXISTS_GLIBC(llistxattr HAVE_LLISTXATTR)
 +  CHECK_FUNCTION_EXISTS_GLIBC(lsetxattr HAVE_LSETXATTR)
 +  CHECK_FUNCTION_EXISTS_GLIBC(fgetea HAVE_FGETEA)
 +  CHECK_FUNCTION_EXISTS_GLIBC(flistea HAVE_FLISTEA)
 +  CHECK_FUNCTION_EXISTS_GLIBC(fsetea HAVE_FSETEA)
 +  CHECK_FUNCTION_EXISTS_GLIBC(getea HAVE_GETEA)
 +  CHECK_FUNCTION_EXISTS_GLIBC(lgetea HAVE_LGETEA)
 +  CHECK_FUNCTION_EXISTS_GLIBC(listea HAVE_LISTEA)
 +  CHECK_FUNCTION_EXISTS_GLIBC(llistea HAVE_LLISTEA)
 +  CHECK_FUNCTION_EXISTS_GLIBC(lsetea HAVE_LSETEA)
 +ELSE(ENABLE_XATTR)
 +  SET(HAVE_ATTR_LIB FALSE)
 +  SET(HAVE_ATTR_XATTR_H FALSE)
 +  SET(HAVE_DECL_EXTATTR_NAMESPACE_USER FALSE)
 +  SET(HAVE_EXTATTR_GET_FILE FALSE)
 +  SET(HAVE_EXTATTR_LIST_FILE FALSE)
 +  SET(HAVE_EXTATTR_SET_FD FALSE)
 +  SET(HAVE_EXTATTR_SET_FILE FALSE)
 +  SET(HAVE_FGETEA FALSE)
 +  SET(HAVE_FGETXATTR FALSE)
 +  SET(HAVE_FLISTEA FALSE)
 +  SET(HAVE_FLISTXATTR FALSE)
 +  SET(HAVE_FSETEA FALSE)
 +  SET(HAVE_FSETXATTR FALSE)
 +  SET(HAVE_GETEA FALSE)
 +  SET(HAVE_GETXATTR FALSE)
 +  SET(HAVE_LGETEA FALSE)
 +  SET(HAVE_LGETXATTR FALSE)
 +  SET(HAVE_LISTEA FALSE)
 +  SET(HAVE_LISTXATTR FALSE)
 +  SET(HAVE_LLISTEA FALSE)
 +  SET(HAVE_LLISTXATTR FALSE)
 +  SET(HAVE_LSETEA FALSE)
 +  SET(HAVE_LSETXATTR FALSE)
 +  SET(HAVE_SYS_EXTATTR_H FALSE)
 +  SET(HAVE_SYS_XATTR_H FALSE)
 +ENDIF(ENABLE_XATTR)
 +
 +#
 +# Check for ACL libraries, headers, and functions
 +#
 +# The ACL support in libarchive is written against the POSIX1e draft,
 +# which was never officially approved and varies quite a bit across
 +# platforms.  Worse, some systems have completely non-POSIX acl functions,
 +# which makes the following checks rather more complex than I would like.
 +#
 +IF(ENABLE_ACL)
 +  CHECK_LIBRARY_EXISTS(acl "acl_get_file" "" HAVE_LIBACL)
 +  IF(HAVE_LIBACL)
 +    SET(CMAKE_REQUIRED_LIBRARIES "acl")
 +    FIND_LIBRARY(ACL_LIBRARY NAMES acl)
 +    LIST(APPEND ADDITIONAL_LIBS ${ACL_LIBRARY})
 +  ENDIF(HAVE_LIBACL)
 +  #
 +  CHECK_FUNCTION_EXISTS_GLIBC(acl_create_entry HAVE_ACL_CREATE_ENTRY)
 +  CHECK_FUNCTION_EXISTS_GLIBC(acl_init HAVE_ACL_INIT)
 +  CHECK_FUNCTION_EXISTS_GLIBC(acl_set_fd HAVE_ACL_SET_FD)
 +  CHECK_FUNCTION_EXISTS_GLIBC(acl_set_fd_np HAVE_ACL_SET_FD_NP)
 +  CHECK_FUNCTION_EXISTS_GLIBC(acl_set_file HAVE_ACL_SET_FILE)
 +  CHECK_TYPE_EXISTS(acl_permset_t "${INCLUDES}"    HAVE_ACL_PERMSET_T)
 +
 +  # The "acl_get_perm()" function was omitted from the POSIX draft.
 +  # (It's a pretty obvious oversight; otherwise, there's no way to
 +  # test for specific permissions in a permset.)  Linux uses the obvious
 +  # name, FreeBSD adds _np to mark it as "non-Posix extension."
 +  # Test for both as a double-check that we really have POSIX-style ACL support.
++  CHECK_FUNCTION_EXISTS(acl_get_fd_np HAVE_ACL_GET_FD_NP)
 +  CHECK_FUNCTION_EXISTS(acl_get_perm HAVE_ACL_GET_PERM)
 +  CHECK_FUNCTION_EXISTS(acl_get_perm_np HAVE_ACL_GET_PERM_NP)
 +  CHECK_FUNCTION_EXISTS(acl_get_link HAVE_ACL_GET_LINK)
 +  CHECK_FUNCTION_EXISTS(acl_get_link_np HAVE_ACL_GET_LINK_NP)
 +  CHECK_FUNCTION_EXISTS(acl_is_trivial_np HAVE_ACL_IS_TRIVIAL_NP)
 +  CHECK_FUNCTION_EXISTS(acl_set_link_np HAVE_ACL_SET_LINK_NP)
++  CHECK_SYMBOL_EXISTS(ACL_TYPE_NFS4 "${INCLUDES}" HAVE_ACL_TYPE_NFS4)
 +
 +  # MacOS has an acl.h that isn't POSIX.  It can be detected by
 +  # checking for ACL_USER
 +  CHECK_SYMBOL_EXISTS(ACL_USER "${INCLUDES}" HAVE_ACL_USER)
++  CHECK_C_SOURCE_COMPILES("#include <sys/types.h>
++#include <sys/acl.h>
++int main(void) { return ACL_TYPE_EXTENDED; }" HAVE_ACL_TYPE_EXTENDED)
++
++  # Solaris and derivates ACLs
++  CHECK_LIBRARY_EXISTS(sec "acl_get" "" HAVE_LIBSEC)
++  IF(HAVE_LIBSEC)
++    SET(CMAKE_REQUIRED_LIBRARIES "sec")
++    FIND_LIBRARY(SEC_LIBRARY NAMES sec)
++    LIST(APPEND ADDITIONAL_LIBS ${SEC_LIBRARY})
++  ENDIF(HAVE_LIBSEC)
++  #
++  CHECK_TYPE_EXISTS(aclent_t "${INCLUDES}" HAVE_ACLENT_T)
++  CHECK_TYPE_EXISTS(ace_t "${INCLUDES}" HAVE_ACE_T)
++  CHECK_FUNCTION_EXISTS(acl_get HAVE_FACL_GET)
++  CHECK_FUNCTION_EXISTS(facl_get HAVE_FACL_GET)
++  CHECK_FUNCTION_EXISTS(acl_set HAVE_FACL_SET)
++  CHECK_FUNCTION_EXISTS(facl_set HAVE_FACL_SET)
 +ELSE(ENABLE_ACL)
 +  # If someone runs cmake, then disables ACL support, we need
 +  # to forcibly override the cached values for these.
 +  SET(HAVE_ACL_CREATE_ENTRY FALSE)
 +  SET(HAVE_ACL_GET_LINK FALSE)
 +  SET(HAVE_ACL_GET_LINK_NP FALSE)
 +  SET(HAVE_ACL_GET_PERM FALSE)
 +  SET(HAVE_ACL_GET_PERM_NP FALSE)
 +  SET(HAVE_ACL_INIT FALSE)
 +  SET(HAVE_ACL_LIB FALSE)
 +  SET(HAVE_ACL_PERMSET_T FALSE)
 +  SET(HAVE_ACL_SET_FD FALSE)
 +  SET(HAVE_ACL_SET_FD_NP FALSE)
 +  SET(HAVE_ACL_SET_FILE FALSE)
++  SET(HAVE_ACL_TYPE_NFS4 FALSE)
 +  SET(HAVE_ACL_USER FALSE)
++  SET(HAVE_ACL_TYPE_EXTENDED FALSE)
++  SET(HAVE_ACL_GET FALSE)
++  SET(HAVE_ACLENT_T FALSE)
++  SET(HAVE_ACE_T FALSE)
++  SET(HAVE_FACL_GET FALSE)
++  SET(HAVE_ACL_SET FALSE)
++  SET(HAVE_FACL_SET FALSE)
 +ENDIF(ENABLE_ACL)
 +
 +#
 +# Check MD5/RMD160/SHA support
 +# NOTE: Crypto checks must be run last before generating config.h
 +#
 +CHECK_CRYPTO("MD5;RMD160;SHA1;SHA256;SHA384;SHA512" LIBC)
 +CHECK_CRYPTO("SHA256;SHA384;SHA512" LIBC2)
 +CHECK_CRYPTO("SHA256;SHA384;SHA512" LIBC3)
 +CHECK_CRYPTO("MD5;SHA1;SHA256;SHA384;SHA512" LIBSYSTEM)
 +CHECK_CRYPTO("MD5;RMD160;SHA1;SHA256;SHA384;SHA512" NETTLE)
 +CHECK_CRYPTO("MD5;RMD160;SHA1;SHA256;SHA384;SHA512" OPENSSL)
 +
 +# Libmd has to be probed after OpenSSL.
 +CHECK_CRYPTO("MD5;RMD160;SHA1;SHA256;SHA512" LIBMD)
 +
 +CHECK_CRYPTO_WIN("MD5;SHA1;SHA256;SHA384;SHA512")
 +
 +# Generate "config.h" from "build/cmake/config.h.in"
 +CONFIGURE_FILE(${CMAKE_CURRENT_SOURCE_DIR}/build/cmake/config.h.in
 +	${CMAKE_CURRENT_BINARY_DIR}/config.h)
 +INCLUDE_DIRECTORIES(BEFORE ${CMAKE_CURRENT_BINARY_DIR})
 +ADD_DEFINITIONS(-DHAVE_CONFIG_H)
 +
 +#
 +# Register installation of PDF documents.
 +#
 +IF(WIN32 AND NOT CYGWIN)
 +  #
 +  # On Windows platform, It's better that we install PDF documents
 +  # on one's computer.
 +  # These PDF documents are available in the release package.
 +  #
 +  IF(EXISTS ${CMAKE_CURRENT_SOURCE_DIR}/doc/pdf)
 +    INSTALL(DIRECTORY ${CMAKE_CURRENT_SOURCE_DIR}/doc/pdf
 +            DESTINATION share/man
 +            FILES_MATCHING PATTERN "*.pdf"
 +    )
 +  ENDIF(EXISTS ${CMAKE_CURRENT_SOURCE_DIR}/doc/pdf)
 +ENDIF(WIN32 AND NOT CYGWIN)
 +#
 +#
 +#
 +INCLUDE_DIRECTORIES(BEFORE ${CMAKE_CURRENT_SOURCE_DIR}/libarchive)
 +#
 +IF(MSVC)
 +  ADD_DEFINITIONS(-D_CRT_SECURE_NO_DEPRECATE)
 +ENDIF(MSVC)
 +
 +# We need CoreServices on Mac OS.
 +IF(APPLE)
 +  LIST(APPEND ADDITIONAL_LIBS "-framework CoreServices")
 +ENDIF(APPLE)
 +
 +add_subdirectory(libarchive)
 +
 +install(FILES COPYING DESTINATION ${CMAKE_DOC_DIR}/cmlibarchive)
diff --cc Utilities/cmlibarchive/build/cmake/config.h.in
index 9843875,0000000..fc248b3
mode 100644,000000..100644
--- a/Utilities/cmlibarchive/build/cmake/config.h.in
+++ b/Utilities/cmlibarchive/build/cmake/config.h.in
@@@ -1,1224 -1,0 +1,1242 @@@
 +/* config.h.  Generated from build/cmake/config.h.in by cmake configure */
 +#if defined(__osf__)
 +# define _OSF_SOURCE
 +#endif
 +
 +/*
 + * Ensure we have C99-style int64_t, etc, all defined.
 + */
 +
 +/* First, we need to know if the system has already defined them. */
 +#cmakedefine HAVE_INT16_T
 +#cmakedefine HAVE_INT32_T
 +#cmakedefine HAVE_INT64_T
 +#cmakedefine HAVE_INTMAX_T
 +
 +#cmakedefine HAVE_UINT8_T
 +#cmakedefine HAVE_UINT16_T
 +#cmakedefine HAVE_UINT32_T
 +#cmakedefine HAVE_UINT64_T
 +#cmakedefine HAVE_UINTMAX_T
 +
 +/* We might have the types we want under other spellings. */
 +#cmakedefine HAVE___INT64
 +#cmakedefine HAVE_U_INT64_T
 +#cmakedefine HAVE_UNSIGNED___INT64
 +
 +/* The sizes of various standard integer types. */
 + at SIZE_OF_SHORT_CODE@
 + at SIZE_OF_INT_CODE@
 + at SIZE_OF_LONG_CODE@
 + at SIZE_OF_LONG_LONG_CODE@
 + at SIZE_OF_UNSIGNED_SHORT_CODE@
 + at SIZE_OF_UNSIGNED_CODE@
 + at SIZE_OF_UNSIGNED_LONG_CODE@
 + at SIZE_OF_UNSIGNED_LONG_LONG_CODE@
 +
 +/*
 + * If we lack int64_t, define it to the first of __int64, int, long, and long long
 + * that exists and is the right size.
 + */
 +#if !defined(HAVE_INT64_T) && defined(HAVE___INT64)
 +typedef __int64 int64_t;
 +#define HAVE_INT64_T
 +#endif
 +
 +#if !defined(HAVE_INT64_T) && SIZE_OF_INT == 8
 +typedef int int64_t;
 +#define HAVE_INT64_T
 +#endif
 +
 +#if !defined(HAVE_INT64_T) && SIZE_OF_LONG == 8
 +typedef long int64_t;
 +#define HAVE_INT64_T
 +#endif
 +
 +#if !defined(HAVE_INT64_T) && SIZE_OF_LONG_LONG == 8
 +typedef long long int64_t;
 +#define HAVE_INT64_T
 +#endif
 +
 +#if !defined(HAVE_INT64_T)
 +#error No 64-bit integer type was found.
 +#endif
 +
 +/*
 + * Similarly for int32_t
 + */
 +#if !defined(HAVE_INT32_T) && SIZE_OF_INT == 4
 +typedef int int32_t;
 +#define HAVE_INT32_T
 +#endif
 +
 +#if !defined(HAVE_INT32_T) && SIZE_OF_LONG == 4
 +typedef long int32_t;
 +#define HAVE_INT32_T
 +#endif
 +
 +#if !defined(HAVE_INT32_T)
 +#error No 32-bit integer type was found.
 +#endif
 +
 +/*
 + * Similarly for int16_t
 + */
 +#if !defined(HAVE_INT16_T) && SIZE_OF_INT == 2
 +typedef int int16_t;
 +#define HAVE_INT16_T
 +#endif
 +
 +#if !defined(HAVE_INT16_T) && SIZE_OF_SHORT == 2
 +typedef short int16_t;
 +#define HAVE_INT16_T
 +#endif
 +
 +#if !defined(HAVE_INT16_T)
 +#error No 16-bit integer type was found.
 +#endif
 +
 +/*
 + * Similarly for uint64_t
 + */
 +#if !defined(HAVE_UINT64_T) && defined(HAVE_UNSIGNED___INT64)
 +typedef unsigned __int64 uint64_t;
 +#define HAVE_UINT64_T
 +#endif
 +
 +#if !defined(HAVE_UINT64_T) && SIZE_OF_UNSIGNED == 8
 +typedef unsigned uint64_t;
 +#define HAVE_UINT64_T
 +#endif
 +
 +#if !defined(HAVE_UINT64_T) && SIZE_OF_UNSIGNED_LONG == 8
 +typedef unsigned long uint64_t;
 +#define HAVE_UINT64_T
 +#endif
 +
 +#if !defined(HAVE_UINT64_T) && SIZE_OF_UNSIGNED_LONG_LONG == 8
 +typedef unsigned long long uint64_t;
 +#define HAVE_UINT64_T
 +#endif
 +
 +#if !defined(HAVE_UINT64_T)
 +#error No 64-bit unsigned integer type was found.
 +#endif
 +
 +
 +/*
 + * Similarly for uint32_t
 + */
 +#if !defined(HAVE_UINT32_T) && SIZE_OF_UNSIGNED == 4
 +typedef unsigned uint32_t;
 +#define HAVE_UINT32_T
 +#endif
 +
 +#if !defined(HAVE_UINT32_T) && SIZE_OF_UNSIGNED_LONG == 4
 +typedef unsigned long uint32_t;
 +#define HAVE_UINT32_T
 +#endif
 +
 +#if !defined(HAVE_UINT32_T)
 +#error No 32-bit unsigned integer type was found.
 +#endif
 +
 +/*
 + * Similarly for uint16_t
 + */
 +#if !defined(HAVE_UINT16_T) && SIZE_OF_UNSIGNED == 2
 +typedef unsigned uint16_t;
 +#define HAVE_UINT16_T
 +#endif
 +
 +#if !defined(HAVE_UINT16_T) && SIZE_OF_UNSIGNED_SHORT == 2
 +typedef unsigned short uint16_t;
 +#define HAVE_UINT16_T
 +#endif
 +
 +#if !defined(HAVE_UINT16_T)
 +#error No 16-bit unsigned integer type was found.
 +#endif
 +
 +/*
 + * Similarly for uint8_t
 + */
 +#if !defined(HAVE_UINT8_T)
 +typedef unsigned char uint8_t;
 +#define HAVE_UINT8_T
 +#endif
 +
 +#if !defined(HAVE_UINT16_T)
 +#error No 8-bit unsigned integer type was found.
 +#endif
 +
 +/* Define intmax_t and uintmax_t if they are not already defined. */
 +#if !defined(HAVE_INTMAX_T)
 +typedef int64_t intmax_t;
 +#endif
 +
 +#if !defined(HAVE_UINTMAX_T)
 +typedef uint64_t uintmax_t;
 +#endif
 +
 +/* Define ZLIB_WINAPI if zlib was built on Visual Studio. */
 +#cmakedefine ZLIB_WINAPI 1
 +
 +/* MD5 via ARCHIVE_CRYPTO_MD5_LIBC supported. */
 +#cmakedefine ARCHIVE_CRYPTO_MD5_LIBC 1
 +
 +/* MD5 via ARCHIVE_CRYPTO_MD5_LIBSYSTEM supported. */
 +#cmakedefine ARCHIVE_CRYPTO_MD5_LIBSYSTEM 1
 +
 +/* MD5 via ARCHIVE_CRYPTO_MD5_NETTLE supported. */
 +#cmakedefine ARCHIVE_CRYPTO_MD5_NETTLE 1
 +
 +/* MD5 via ARCHIVE_CRYPTO_MD5_OPENSSL supported. */
 +#cmakedefine ARCHIVE_CRYPTO_MD5_OPENSSL 1
 +
 +/* MD5 via ARCHIVE_CRYPTO_MD5_WIN supported. */
 +#cmakedefine ARCHIVE_CRYPTO_MD5_WIN 1
 +
 +/* RMD160 via ARCHIVE_CRYPTO_RMD160_LIBC supported. */
 +#cmakedefine ARCHIVE_CRYPTO_RMD160_LIBC 1
 +
 +/* RMD160 via ARCHIVE_CRYPTO_RMD160_NETTLE supported. */
 +#cmakedefine ARCHIVE_CRYPTO_RMD160_NETTLE 1
 +
 +/* RMD160 via ARCHIVE_CRYPTO_RMD160_OPENSSL supported. */
 +#cmakedefine ARCHIVE_CRYPTO_RMD160_OPENSSL 1
 +
 +/* SHA1 via ARCHIVE_CRYPTO_SHA1_LIBC supported. */
 +#cmakedefine ARCHIVE_CRYPTO_SHA1_LIBC 1
 +
 +/* SHA1 via ARCHIVE_CRYPTO_SHA1_LIBSYSTEM supported. */
 +#cmakedefine ARCHIVE_CRYPTO_SHA1_LIBSYSTEM 1
 +
 +/* SHA1 via ARCHIVE_CRYPTO_SHA1_NETTLE supported. */
 +#cmakedefine ARCHIVE_CRYPTO_SHA1_NETTLE 1
 +
 +/* SHA1 via ARCHIVE_CRYPTO_SHA1_OPENSSL supported. */
 +#cmakedefine ARCHIVE_CRYPTO_SHA1_OPENSSL 1
 +
 +/* SHA1 via ARCHIVE_CRYPTO_SHA1_WIN supported. */
 +#cmakedefine ARCHIVE_CRYPTO_SHA1_WIN 1
 +
 +/* SHA256 via ARCHIVE_CRYPTO_SHA256_LIBC supported. */
 +#cmakedefine ARCHIVE_CRYPTO_SHA256_LIBC 1
 +
 +/* SHA256 via ARCHIVE_CRYPTO_SHA256_LIBC2 supported. */
 +#cmakedefine ARCHIVE_CRYPTO_SHA256_LIBC2 1
 +
 +/* SHA256 via ARCHIVE_CRYPTO_SHA256_LIBC3 supported. */
 +#cmakedefine ARCHIVE_CRYPTO_SHA256_LIBC3 1
 +
 +/* SHA256 via ARCHIVE_CRYPTO_SHA256_LIBSYSTEM supported. */
 +#cmakedefine ARCHIVE_CRYPTO_SHA256_LIBSYSTEM 1
 +
 +/* SHA256 via ARCHIVE_CRYPTO_SHA256_NETTLE supported. */
 +#cmakedefine ARCHIVE_CRYPTO_SHA256_NETTLE 1
 +
 +/* SHA256 via ARCHIVE_CRYPTO_SHA256_OPENSSL supported. */
 +#cmakedefine ARCHIVE_CRYPTO_SHA256_OPENSSL 1
 +
 +/* SHA256 via ARCHIVE_CRYPTO_SHA256_WIN supported. */
 +#cmakedefine ARCHIVE_CRYPTO_SHA256_WIN 1
 +
 +/* SHA384 via ARCHIVE_CRYPTO_SHA384_LIBC supported. */
 +#cmakedefine ARCHIVE_CRYPTO_SHA384_LIBC 1
 +
 +/* SHA384 via ARCHIVE_CRYPTO_SHA384_LIBC2 supported. */
 +#cmakedefine ARCHIVE_CRYPTO_SHA384_LIBC2 1
 +
 +/* SHA384 via ARCHIVE_CRYPTO_SHA384_LIBC3 supported. */
 +#cmakedefine ARCHIVE_CRYPTO_SHA384_LIBC3 1
 +
 +/* SHA384 via ARCHIVE_CRYPTO_SHA384_LIBSYSTEM supported. */
 +#cmakedefine ARCHIVE_CRYPTO_SHA384_LIBSYSTEM 1
 +
 +/* SHA384 via ARCHIVE_CRYPTO_SHA384_NETTLE supported. */
 +#cmakedefine ARCHIVE_CRYPTO_SHA384_NETTLE 1
 +
 +/* SHA384 via ARCHIVE_CRYPTO_SHA384_OPENSSL supported. */
 +#cmakedefine ARCHIVE_CRYPTO_SHA384_OPENSSL 1
 +
 +/* SHA384 via ARCHIVE_CRYPTO_SHA384_WIN supported. */
 +#cmakedefine ARCHIVE_CRYPTO_SHA384_WIN 1
 +
 +/* SHA512 via ARCHIVE_CRYPTO_SHA512_LIBC supported. */
 +#cmakedefine ARCHIVE_CRYPTO_SHA512_LIBC 1
 +
 +/* SHA512 via ARCHIVE_CRYPTO_SHA512_LIBC2 supported. */
 +#cmakedefine ARCHIVE_CRYPTO_SHA512_LIBC2 1
 +
 +/* SHA512 via ARCHIVE_CRYPTO_SHA512_LIBC3 supported. */
 +#cmakedefine ARCHIVE_CRYPTO_SHA512_LIBC3 1
 +
 +/* SHA512 via ARCHIVE_CRYPTO_SHA512_LIBSYSTEM supported. */
 +#cmakedefine ARCHIVE_CRYPTO_SHA512_LIBSYSTEM 1
 +
 +/* SHA512 via ARCHIVE_CRYPTO_SHA512_NETTLE supported. */
 +#cmakedefine ARCHIVE_CRYPTO_SHA512_NETTLE 1
 +
 +/* SHA512 via ARCHIVE_CRYPTO_SHA512_OPENSSL supported. */
 +#cmakedefine ARCHIVE_CRYPTO_SHA512_OPENSSL 1
 +
 +/* SHA512 via ARCHIVE_CRYPTO_SHA512_WIN supported. */
 +#cmakedefine ARCHIVE_CRYPTO_SHA512_WIN 1
 +
 +/* Version number of bsdcpio */
 +#cmakedefine BSDCPIO_VERSION_STRING "${BSDCPIO_VERSION_STRING}"
 +
 +/* Version number of bsdtar */
 +#cmakedefine BSDTAR_VERSION_STRING "${BSDTAR_VERSION_STRING}"
 +
 +/* Version number of bsdcat */
 +#cmakedefine BSDCAT_VERSION_STRING "${BSDCAT_VERSION_STRING}"
 +
 +/* Define to 1 if you have the `acl_create_entry' function. */
 +#cmakedefine HAVE_ACL_CREATE_ENTRY 1
 +
++/* Define to 1 if you have the `acl_get_fd_np' function. */
++#cmakedefine HAVE_ACL_GET_FD_NP 1
++
 +/* Define to 1 if you have the `acl_get_link' function. */
 +#cmakedefine HAVE_ACL_GET_LINK 1
 +
 +/* Define to 1 if you have the `acl_get_link_np' function. */
 +#cmakedefine HAVE_ACL_GET_LINK_NP 1
 +
 +/* Define to 1 if you have the `acl_get_perm' function. */
 +#cmakedefine HAVE_ACL_GET_PERM 1
 +
 +/* Define to 1 if you have the `acl_get_perm_np' function. */
 +#cmakedefine HAVE_ACL_GET_PERM_NP 1
 +
 +/* Define to 1 if you have the `acl_init' function. */
 +#cmakedefine HAVE_ACL_INIT 1
 +
 +/* Define to 1 if you have the <acl/libacl.h> header file. */
 +#cmakedefine HAVE_ACL_LIBACL_H 1
 +
 +/* Define to 1 if the system has the type `acl_permset_t'. */
 +#cmakedefine HAVE_ACL_PERMSET_T 1
 +
 +/* Define to 1 if you have the `acl_set_fd' function. */
 +#cmakedefine HAVE_ACL_SET_FD 1
 +
 +/* Define to 1 if you have the `acl_set_fd_np' function. */
 +#cmakedefine HAVE_ACL_SET_FD_NP 1
 +
 +/* Define to 1 if you have the `acl_set_file' function. */
 +#cmakedefine HAVE_ACL_SET_FILE 1
 +
++/* True for FreeBSD with NFSv4 ACL support */
++#cmakedefine HAVE_ACL_TYPE_NFS4 1
++
++/* True for MacOS ACL support */
++#cmakedefine HAVE_ACL_TYPE_EXTENDED 1
++
 +/* True for systems with POSIX ACL support */
 +#cmakedefine HAVE_ACL_USER 1
 +
 +/* Define to 1 if you have the `arc4random_buf' function. */
 +#cmakedefine HAVE_ARC4RANDOM_BUF 1
 +
 +/* Define to 1 if you have the <attr/xattr.h> header file. */
 +#cmakedefine HAVE_ATTR_XATTR_H 1
 +
 +/* Define to 1 if you have the <Bcrypt.h> header file. */
 +#cmakedefine HAVE_BCRYPT_H 1
 +
 +/* Define to 1 if you have the <bsdxml.h> header file. */
 +#cmakedefine HAVE_BSDXML_H 1
 +
 +/* Define to 1 if you have the <bzlib.h> header file. */
 +#cmakedefine HAVE_BZLIB_H 1
 +
 +/* Define to 1 if you have the `chflags' function. */
 +#cmakedefine HAVE_CHFLAGS 1
 +
 +/* Define to 1 if you have the `chown' function. */
 +#cmakedefine HAVE_CHOWN 1
 +
 +/* Define to 1 if you have the `chroot' function. */
 +#cmakedefine HAVE_CHROOT 1
 +
 +/* Define to 1 if you have the <copyfile.h> header file. */
 +#cmakedefine HAVE_COPYFILE_H 1
 +
 +/* Define to 1 if you have the `ctime_r' function. */
 +#cmakedefine HAVE_CTIME_R 1
 +
 +/* Define to 1 if you have the <ctype.h> header file. */
 +#cmakedefine HAVE_CTYPE_H 1
 +
 +/* Define to 1 if you have the `cygwin_conv_path' function. */
 +#cmakedefine HAVE_CYGWIN_CONV_PATH 1
 +
 +/* Define to 1 if you have the declaration of `INT32_MAX', and to 0 if you
 +   don't. */
 +#cmakedefine HAVE_DECL_INT32_MAX 1
 +
 +/* Define to 1 if you have the declaration of `INT32_MIN', and to 0 if you
 +   don't. */
 +#cmakedefine HAVE_DECL_INT32_MIN 1
 +
 +/* Define to 1 if you have the declaration of `INT64_MAX', and to 0 if you
 +   don't. */
 +#cmakedefine HAVE_DECL_INT64_MAX 1
 +
 +/* Define to 1 if you have the declaration of `INT64_MIN', and to 0 if you
 +   don't. */
 +#cmakedefine HAVE_DECL_INT64_MIN 1
 +
 +/* Define to 1 if you have the declaration of `INTMAX_MAX', and to 0 if you
 +   don't. */
 +#cmakedefine HAVE_DECL_INTMAX_MAX 1
 +
 +/* Define to 1 if you have the declaration of `INTMAX_MIN', and to 0 if you
 +   don't. */
 +#cmakedefine HAVE_DECL_INTMAX_MIN 1
 +
 +/* Define to 1 if you have the declaration of `SIZE_MAX', and to 0 if you
 +   don't. */
 +#cmakedefine HAVE_DECL_SIZE_MAX 1
 +
 +/* Define to 1 if you have the declaration of `SSIZE_MAX', and to 0 if you
 +   don't. */
 +#cmakedefine HAVE_DECL_SSIZE_MAX 1
 +
 +/* Define to 1 if you have the declaration of `strerror_r', and to 0 if you
 +   don't. */
 +#cmakedefine HAVE_DECL_STRERROR_R 1
 +
 +/* Define to 1 if you have the declaration of `UINT32_MAX', and to 0 if you
 +   don't. */
 +#cmakedefine HAVE_DECL_UINT32_MAX 1
 +
 +/* Define to 1 if you have the declaration of `UINT64_MAX', and to 0 if you
 +   don't. */
 +#cmakedefine HAVE_DECL_UINT64_MAX 1
 +
 +/* Define to 1 if you have the declaration of `UINTMAX_MAX', and to 0 if you
 +   don't. */
 +#cmakedefine HAVE_DECL_UINTMAX_MAX 1
 +
 +/* Define to 1 if you have the <direct.h> header file. */
 +#cmakedefine HAVE_DIRECT_H 1
 +
 +/* Define to 1 if you have the <dirent.h> header file, and it defines `DIR'.
 +   */
 +#cmakedefine HAVE_DIRENT_H 1
 +
 +/* Define to 1 if you have the `dirfd' function. */
 +#cmakedefine HAVE_DIRFD 1
 +
 +/* Define to 1 if you have the <dlfcn.h> header file. */
 +#cmakedefine HAVE_DLFCN_H 1
 +
 +/* Define to 1 if you don't have `vprintf' but do have `_doprnt.' */
 +#cmakedefine HAVE_DOPRNT 1
 +
 +/* Define to 1 if nl_langinfo supports D_MD_ORDER */
 +#cmakedefine HAVE_D_MD_ORDER 1
 +
 +/* A possible errno value for invalid file format errors */
 +#cmakedefine HAVE_EFTYPE 1
 +
 +/* A possible errno value for invalid file format errors */
 +#cmakedefine HAVE_EILSEQ 1
 +
 +/* Define to 1 if you have the <errno.h> header file. */
 +#cmakedefine HAVE_ERRNO_H 1
 +
 +/* Define to 1 if you have the <expat.h> header file. */
 +#cmakedefine HAVE_EXPAT_H 1
 +
 +/* Define to 1 if you have the <ext2fs/ext2_fs.h> header file. */
 +#cmakedefine HAVE_EXT2FS_EXT2_FS_H 1
 +
 +/* Define to 1 if you have the `extattr_get_file' function. */
 +#cmakedefine HAVE_EXTATTR_GET_FILE 1
 +
 +/* Define to 1 if you have the `extattr_list_file' function. */
 +#cmakedefine HAVE_EXTATTR_LIST_FILE 1
 +
 +/* Define to 1 if you have the `extattr_set_fd' function. */
 +#cmakedefine HAVE_EXTATTR_SET_FD 1
 +
 +/* Define to 1 if you have the `extattr_set_file' function. */
 +#cmakedefine HAVE_EXTATTR_SET_FILE 1
 +
 +/* Define to 1 if EXTATTR_NAMESPACE_USER is defined in sys/extattr.h. */
 +#cmakedefine HAVE_DECL_EXTATTR_NAMESPACE_USER 1
 +
 +/* Define to 1 if you have the `fchdir' function. */
 +#cmakedefine HAVE_FCHDIR 1
 +
 +/* Define to 1 if you have the `fchflags' function. */
 +#cmakedefine HAVE_FCHFLAGS 1
 +
 +/* Define to 1 if you have the `fchmod' function. */
 +#cmakedefine HAVE_FCHMOD 1
 +
 +/* Define to 1 if you have the `fchown' function. */
 +#cmakedefine HAVE_FCHOWN 1
 +
 +/* Define to 1 if you have the `fcntl' function. */
 +#cmakedefine HAVE_FCNTL 1
 +
 +/* Define to 1 if you have the <fcntl.h> header file. */
 +#cmakedefine HAVE_FCNTL_H 1
 +
 +/* Define to 1 if you have the `fdopendir' function. */
 +#cmakedefine HAVE_FDOPENDIR 1
 +
 +/* Define to 1 if you have the `fgetea' function. */
 +#cmakedefine HAVE_FGETEA 1
 +
 +/* Define to 1 if you have the `fgetxattr' function. */
 +#cmakedefine HAVE_FGETXATTR 1
 +
 +/* Define to 1 if you have the `flistea' function. */
 +#cmakedefine HAVE_FLISTEA 1
 +
 +/* Define to 1 if you have the `flistxattr' function. */
 +#cmakedefine HAVE_FLISTXATTR 1
 +
 +/* Define to 1 if you have the `fork' function. */
 +#cmakedefine HAVE_FORK 1
 +
 +/* Define to 1 if fseeko (and presumably ftello) exists and is declared. */
 +#cmakedefine HAVE_FSEEKO 1
 +
 +/* Define to 1 if you have the `fsetea' function. */
 +#cmakedefine HAVE_FSETEA 1
 +
 +/* Define to 1 if you have the `fsetxattr' function. */
 +#cmakedefine HAVE_FSETXATTR 1
 +
 +/* Define to 1 if you have the `fstat' function. */
 +#cmakedefine HAVE_FSTAT 1
 +
 +/* Define to 1 if you have the `fstatat' function. */
 +#cmakedefine HAVE_FSTATAT 1
 +
 +/* Define to 1 if you have the `fstatfs' function. */
 +#cmakedefine HAVE_FSTATFS 1
 +
 +/* Define to 1 if you have the `fstatvfs' function. */
 +#cmakedefine HAVE_FSTATVFS 1
 +
 +/* Define to 1 if you have the `ftruncate' function. */
 +#cmakedefine HAVE_FTRUNCATE 1
 +
 +/* Define to 1 if you have the `futimens' function. */
 +#cmakedefine HAVE_FUTIMENS 1
 +
 +/* Define to 1 if you have the `futimes' function. */
 +#cmakedefine HAVE_FUTIMES 1
 +
 +/* Define to 1 if you have the `futimesat' function. */
 +#cmakedefine HAVE_FUTIMESAT 1
 +
 +/* Define to 1 if you have the `getea' function. */
 +#cmakedefine HAVE_GETEA 1
 +
 +/* Define to 1 if you have the `geteuid' function. */
 +#cmakedefine HAVE_GETEUID 1
 +
 +/* Define to 1 if you have the `getgrgid_r' function. */
 +#cmakedefine HAVE_GETGRGID_R 1
 +
 +/* Define to 1 if you have the `getgrnam_r' function. */
 +#cmakedefine HAVE_GETGRNAM_R 1
 +
 +/* Define to 1 if you have the `getpid' function. */
 +#cmakedefine HAVE_GETPID 1
 +
 +/* Define to 1 if you have the `getpwnam_r' function. */
 +#cmakedefine HAVE_GETPWNAM_R 1
 +
 +/* Define to 1 if you have the `getpwuid_r' function. */
 +#cmakedefine HAVE_GETPWUID_R 1
 +
 +/* Define to 1 if you have the `getvfsbyname' function. */
 +#cmakedefine HAVE_GETVFSBYNAME 1
 +
 +/* Define to 1 if you have the `getxattr' function. */
 +#cmakedefine HAVE_GETXATTR 1
 +
 +/* Define to 1 if you have the `gmtime_r' function. */
 +#cmakedefine HAVE_GMTIME_R 1
 +
 +/* Define to 1 if you have the <grp.h> header file. */
 +#cmakedefine HAVE_GRP_H 1
 +
 +/* Define to 1 if you have the `iconv' function. */
 +#cmakedefine HAVE_ICONV 1
 +
 +/* Define to 1 if you have the <iconv.h> header file. */
 +#cmakedefine HAVE_ICONV_H 1
 +
 +/* Define to 1 if you have the <inttypes.h> header file. */
 +#cmakedefine HAVE_INTTYPES_H 1
 +
 +/* Define to 1 if you have the <io.h> header file. */
 +#cmakedefine HAVE_IO_H 1
 +
 +/* Define to 1 if you have the <langinfo.h> header file. */
 +#cmakedefine HAVE_LANGINFO_H 1
 +
 +/* Define to 1 if you have the `lchflags' function. */
 +#cmakedefine HAVE_LCHFLAGS 1
 +
 +/* Define to 1 if you have the `lchmod' function. */
 +#cmakedefine HAVE_LCHMOD 1
 +
 +/* Define to 1 if you have the `lchown' function. */
 +#cmakedefine HAVE_LCHOWN 1
 +
 +/* Define to 1 if you have the `lgetea' function. */
 +#cmakedefine HAVE_LGETEA 1
 +
 +/* Define to 1 if you have the `lgetxattr' function. */
 +#cmakedefine HAVE_LGETXATTR 1
 +
 +/* Define to 1 if you have the `acl' library (-lacl). */
 +#cmakedefine HAVE_LIBACL 1
 +
 +/* Define to 1 if you have the `attr' library (-lattr). */
 +#cmakedefine HAVE_LIBATTR 1
 +
 +/* Define to 1 if you have the `bsdxml' library (-lbsdxml). */
 +#cmakedefine HAVE_LIBBSDXML 1
 +
 +/* Define to 1 if you have the `bz2' library (-lbz2). */
 +#cmakedefine HAVE_LIBBZ2 1
 +
 +/* Define to 1 if you have the `charset' library (-lcharset). */
 +#cmakedefine HAVE_LIBCHARSET 1
 +
 +/* Define to 1 if you have the `crypto' library (-lcrypto). */
 +#cmakedefine HAVE_LIBCRYPTO 1
 +
 +/* Define to 1 if you have the `expat' library (-lexpat). */
 +#cmakedefine HAVE_LIBEXPAT 1
 +
 +/* Define to 1 if you have the `gcc' library (-lgcc). */
 +#cmakedefine HAVE_LIBGCC 1
 +
 +/* Define to 1 if you have the `lz4' library (-llz4). */
 +#cmakedefine HAVE_LIBLZ4 1
 +
 +/* Define to 1 if you have the `lzma' library (-llzma). */
 +#cmakedefine HAVE_LIBLZMA 1
 +
 +/* Define to 1 if you have the `lzmadec' library (-llzmadec). */
 +#cmakedefine HAVE_LIBLZMADEC 1
 +
 +/* Define to 1 if you have the `lzo2' library (-llzo2). */
 +#cmakedefine HAVE_LIBLZO2 1
 +
 +/* Define to 1 if you have the `nettle' library (-lnettle). */
 +#cmakedefine HAVE_LIBNETTLE 1
 +
 +/* Define to 1 if you have the `pcre' library (-lpcre). */
 +#cmakedefine HAVE_LIBPCRE 1
 +
 +/* Define to 1 if you have the `pcreposix' library (-lpcreposix). */
 +#cmakedefine HAVE_LIBPCREPOSIX 1
 +
 +/* Define to 1 if you have the `xml2' library (-lxml2). */
 +#cmakedefine HAVE_LIBXML2 1
 +
 +/* Define to 1 if you have the <libxml/xmlreader.h> header file. */
 +#cmakedefine HAVE_LIBXML_XMLREADER_H 1
 +
 +/* Define to 1 if you have the <libxml/xmlwriter.h> header file. */
 +#cmakedefine HAVE_LIBXML_XMLWRITER_H 1
 +
 +/* Define to 1 if you have the `z' library (-lz). */
 +#cmakedefine HAVE_LIBZ 1
 +
 +/* Define to 1 if you have the <limits.h> header file. */
 +#cmakedefine HAVE_LIMITS_H 1
 +
 +/* Define to 1 if you have the `link' function. */
 +#cmakedefine HAVE_LINK 1
 +
 +/* Define to 1 if you have the <linux/types.h> header file. */
 +#cmakedefine HAVE_LINUX_TYPES_H 1
 +
 +/* Define to 1 if you have the <linux/fiemap.h> header file. */
 +#cmakedefine HAVE_LINUX_FIEMAP_H 1
 +
 +/* Define to 1 if you have the <linux/fs.h> header file. */
 +#cmakedefine HAVE_LINUX_FS_H 1
 +
 +/* Define to 1 if you have the <linux/magic.h> header file. */
 +#cmakedefine HAVE_LINUX_MAGIC_H 1
 +
 +/* Define to 1 if you have the <linux/types.h> header file. */
 +#cmakedefine HAVE_LINUX_TYPES_H 1
 +
 +/* Define to 1 if you have the `listea' function. */
 +#cmakedefine HAVE_LISTEA 1
 +
 +/* Define to 1 if you have the `listxattr' function. */
 +#cmakedefine HAVE_LISTXATTR 1
 +
 +/* Define to 1 if you have the `llistea' function. */
 +#cmakedefine HAVE_LLISTEA 1
 +
 +/* Define to 1 if you have the `llistxattr' function. */
 +#cmakedefine HAVE_LLISTXATTR 1
 +
 +/* Define to 1 if you have the <localcharset.h> header file. */
 +#cmakedefine HAVE_LOCALCHARSET_H 1
 +
 +/* Define to 1 if you have the `locale_charset' function. */
 +#cmakedefine HAVE_LOCALE_CHARSET 1
 +
 +/* Define to 1 if you have the <locale.h> header file. */
 +#cmakedefine HAVE_LOCALE_H 1
 +
 +/* Define to 1 if you have the `localtime_r' function. */
 +#cmakedefine HAVE_LOCALTIME_R 1
 +
 +/* Define to 1 if the system has the type `long long int'. */
 +#cmakedefine HAVE_LONG_LONG_INT 1
 +
 +/* Define to 1 if you have the `lsetea' function. */
 +#cmakedefine HAVE_LSETEA 1
 +
 +/* Define to 1 if you have the `lsetxattr' function. */
 +#cmakedefine HAVE_LSETXATTR 1
 +
 +/* Define to 1 if you have the `lstat' function. */
 +#cmakedefine HAVE_LSTAT 1
 +
 +/* Define to 1 if `lstat' has the bug that it succeeds when given the
 +   zero-length file name argument. */
 +#cmakedefine HAVE_LSTAT_EMPTY_STRING_BUG 1
 +
 +/* Define to 1 if you have the `lutimes' function. */
 +#cmakedefine HAVE_LUTIMES 1
 +
 +/* Define to 1 if you have the <lz4hc.h> header file. */
 +#cmakedefine HAVE_LZ4HC_H 1
 +
 +/* Define to 1 if you have the <lz4.h> header file. */
 +#cmakedefine HAVE_LZ4_H 1
 +
 +/* Define to 1 if you have the <lzmadec.h> header file. */
 +#cmakedefine HAVE_LZMADEC_H 1
 +
 +/* Define to 1 if you have the <lzma.h> header file. */
 +#cmakedefine HAVE_LZMA_H 1
 +
++/* Define to 1 if you have a working `lzma_stream_encoder_mt' function. */
++#cmakedefine HAVE_LZMA_STREAM_ENCODER_MT 1
++
 +/* Define to 1 if you have the <lzo/lzo1x.h> header file. */
 +#cmakedefine HAVE_LZO_LZO1X_H 1
 +
 +/* Define to 1 if you have the <lzo/lzoconf.h> header file. */
 +#cmakedefine HAVE_LZO_LZOCONF_H 1
 +
 +/* Define to 1 if you have the `mbrtowc' function. */
 +#cmakedefine HAVE_MBRTOWC 1
 +
 +/* Define to 1 if you have the `memmove' function. */
 +#cmakedefine HAVE_MEMMOVE 1
 +
 +/* Define to 1 if you have the <memory.h> header file. */
 +#cmakedefine HAVE_MEMORY_H 1
 +
 +/* Define to 1 if you have the `mkdir' function. */
 +#cmakedefine HAVE_MKDIR 1
 +
 +/* Define to 1 if you have the `mkfifo' function. */
 +#cmakedefine HAVE_MKFIFO 1
 +
 +/* Define to 1 if you have the `mknod' function. */
 +#cmakedefine HAVE_MKNOD 1
 +
 +/* Define to 1 if you have the `mkstemp' function. */
 +#cmakedefine HAVE_MKSTEMP 1
 +
 +/* Define to 1 if you have the <ndir.h> header file, and it defines `DIR'. */
 +#cmakedefine HAVE_NDIR_H 1
 +
 +/* Define to 1 if you have the <nettle/aes.h> header file. */
 +#cmakedefine HAVE_NETTLE_AES_H 1
 +
 +/* Define to 1 if you have the <nettle/hmac.h> header file. */
 +#cmakedefine HAVE_NETTLE_HMAC_H 1
 +
 +/* Define to 1 if you have the <nettle/md5.h> header file. */
 +#cmakedefine HAVE_NETTLE_MD5_H 1
 +
 +/* Define to 1 if you have the <nettle/pbkdf2.h> header file. */
 +#cmakedefine HAVE_NETTLE_PBKDF2_H 1
 +
 +/* Define to 1 if you have the <nettle/ripemd160.h> header file. */
 +#cmakedefine HAVE_NETTLE_RIPEMD160_H 1
 +
 +/* Define to 1 if you have the <nettle/sha.h> header file. */
 +#cmakedefine HAVE_NETTLE_SHA_H 1
 +
 +/* Define to 1 if you have the `nl_langinfo' function. */
 +#cmakedefine HAVE_NL_LANGINFO 1
 +
 +/* Define to 1 if you have the `openat' function. */
 +#cmakedefine HAVE_OPENAT 1
 +
 +/* Define to 1 if you have the <paths.h> header file. */
 +#cmakedefine HAVE_PATHS_H 1
 +
 +/* Define to 1 if you have the <pcreposix.h> header file. */
 +#cmakedefine HAVE_PCREPOSIX_H 1
 +
 +/* Define to 1 if you have the `pipe' function. */
 +#cmakedefine HAVE_PIPE 1
 +
 +/* Define to 1 if you have the `PKCS5_PBKDF2_HMAC_SHA1' function. */
 +#cmakedefine HAVE_PKCS5_PBKDF2_HMAC_SHA1 1
 +
 +/* Define to 1 if you have the `poll' function. */
 +#cmakedefine HAVE_POLL 1
 +
 +/* Define to 1 if you have the <poll.h> header file. */
 +#cmakedefine HAVE_POLL_H 1
 +
 +/* Define to 1 if you have the `posix_spawnp' function. */
 +#cmakedefine HAVE_POSIX_SPAWNP 1
 +
 +/* Define to 1 if you have the <process.h> header file. */
 +#cmakedefine HAVE_PROCESS_H 1
 +
 +/* Define to 1 if you have the <pthread.h> header file. */
 +#cmakedefine HAVE_PTHREAD_H 1
 +
 +/* Define to 1 if you have the <pwd.h> header file. */
 +#cmakedefine HAVE_PWD_H 1
 +
 +/* Define to 1 if you have the `readdir_r' function. */
 +#cmakedefine HAVE_READDIR_R 1
 +
 +/* Define to 1 if you have the `readlink' function. */
 +#cmakedefine HAVE_READLINK 1
 +
 +/* Define to 1 if you have the `readlinkat' function. */
 +#cmakedefine HAVE_READLINKAT 1
 +
 +/* Define to 1 if you have the `readpassphrase' function. */
 +#cmakedefine HAVE_READPASSPHRASE 1
 +
 +/* Define to 1 if you have the <readpassphrase.h> header file. */
 +#cmakedefine HAVE_READPASSPHRASE_H 1
 +
 +/* Define to 1 if you have the <regex.h> header file. */
 +#cmakedefine HAVE_REGEX_H 1
 +
 +/* Define to 1 if you have the `select' function. */
 +#cmakedefine HAVE_SELECT 1
 +
 +/* Define to 1 if you have the `setenv' function. */
 +#cmakedefine HAVE_SETENV 1
 +
 +/* Define to 1 if you have the `setlocale' function. */
 +#cmakedefine HAVE_SETLOCALE 1
 +
 +/* Define to 1 if you have the `sigaction' function. */
 +#cmakedefine HAVE_SIGACTION 1
 +
 +/* Define to 1 if you have the <signal.h> header file. */
 +#cmakedefine HAVE_SIGNAL_H 1
 +
 +/* Define to 1 if you have the <spawn.h> header file. */
 +#cmakedefine HAVE_SPAWN_H 1
 +
 +/* Define to 1 if you have the `statfs' function. */
 +#cmakedefine HAVE_STATFS 1
 +
 +/* Define to 1 if you have the `statvfs' function. */
 +#cmakedefine HAVE_STATVFS 1
 +
 +/* Define to 1 if `stat' has the bug that it succeeds when given the
 +   zero-length file name argument. */
 +#cmakedefine HAVE_STAT_EMPTY_STRING_BUG 1
 +
 +/* Define to 1 if you have the <stdarg.h> header file. */
 +#cmakedefine HAVE_STDARG_H 1
 +
 +/* Define to 1 if you have the <stdint.h> header file. */
 +#cmakedefine HAVE_STDINT_H 1
 +
 +/* Define to 1 if you have the <stdlib.h> header file. */
 +#cmakedefine HAVE_STDLIB_H 1
 +
 +/* Define to 1 if you have the `strchr' function. */
 +#cmakedefine HAVE_STRCHR 1
 +
 +/* Define to 1 if you have the `strdup' function. */
 +#cmakedefine HAVE_STRDUP 1
 +
 +/* Define to 1 if you have the `strerror' function. */
 +#cmakedefine HAVE_STRERROR 1
 +
 +/* Define to 1 if you have the `strerror_r' function. */
 +#cmakedefine HAVE_STRERROR_R 1
 +
 +/* Define to 1 if you have the `strftime' function. */
 +#cmakedefine HAVE_STRFTIME 1
 +
 +/* Define to 1 if you have the <strings.h> header file. */
 +#cmakedefine HAVE_STRINGS_H 1
 +
 +/* Define to 1 if you have the <string.h> header file. */
 +#cmakedefine HAVE_STRING_H 1
 +
 +/* Define to 1 if you have the `strrchr' function. */
 +#cmakedefine HAVE_STRRCHR 1
 +
 +/* Define to 1 if `f_namemax' is a member of `struct statfs'. */
 +#cmakedefine HAVE_STRUCT_STATFS_F_NAMEMAX 1
 +
 +/* Define to 1 if `f_iosize' is a member of `struct statvfs'. */
 +#cmakedefine HAVE_STRUCT_STATVFS_F_IOSIZE 1
 +
 +/* Define to 1 if `st_birthtime' is a member of `struct stat'. */
 +#cmakedefine HAVE_STRUCT_STAT_ST_BIRTHTIME 1
 +
 +/* Define to 1 if `st_birthtimespec.tv_nsec' is a member of `struct stat'. */
 +#cmakedefine HAVE_STRUCT_STAT_ST_BIRTHTIMESPEC_TV_NSEC 1
 +
 +/* Define to 1 if `st_blksize' is a member of `struct stat'. */
 +#cmakedefine HAVE_STRUCT_STAT_ST_BLKSIZE 1
 +
 +/* Define to 1 if `st_flags' is a member of `struct stat'. */
 +#cmakedefine HAVE_STRUCT_STAT_ST_FLAGS 1
 +
 +/* Define to 1 if `st_mtimespec.tv_nsec' is a member of `struct stat'. */
 +#cmakedefine HAVE_STRUCT_STAT_ST_MTIMESPEC_TV_NSEC 1
 +
 +/* Define to 1 if `st_mtime_n' is a member of `struct stat'. */
 +#cmakedefine HAVE_STRUCT_STAT_ST_MTIME_N 1
 +
 +/* Define to 1 if `st_mtime_usec' is a member of `struct stat'. */
 +#cmakedefine HAVE_STRUCT_STAT_ST_MTIME_USEC 1
 +
 +/* Define to 1 if `st_mtim.tv_nsec' is a member of `struct stat'. */
 +#cmakedefine HAVE_STRUCT_STAT_ST_MTIM_TV_NSEC 1
 +
 +/* Define to 1 if `st_umtime' is a member of `struct stat'. */
 +#cmakedefine HAVE_STRUCT_STAT_ST_UMTIME 1
 +
 +/* Define to 1 if `tm_gmtoff' is a member of `struct tm'. */
 +#cmakedefine HAVE_STRUCT_TM_TM_GMTOFF 1
 +
 +/* Define to 1 if `__tm_gmtoff' is a member of `struct tm'. */
 +#cmakedefine HAVE_STRUCT_TM___TM_GMTOFF 1
 +
++/* Define to 1 if you have `struct vfsconf'. */
++#cmakedefine HAVE_STRUCT_VFSCONF 1
++
++/* Define to 1 if you have `struct xvfsconf'. */
++#cmakedefine HAVE_STRUCT_XVFSCONF 1
++
 +/* Define to 1 if you have the `symlink' function. */
 +#cmakedefine HAVE_SYMLINK 1
 +
 +/* Define to 1 if you have the <sys/acl.h> header file. */
 +#cmakedefine HAVE_SYS_ACL_H 1
 +
 +/* Define to 1 if you have the <sys/cdefs.h> header file. */
 +#cmakedefine HAVE_SYS_CDEFS_H 1
 +
 +/* Define to 1 if you have the <sys/dir.h> header file, and it defines `DIR'.
 +   */
 +#cmakedefine HAVE_SYS_DIR_H 1
 +
 +/* Define to 1 if you have the <sys/ea.h> header file. */
 +#cmakedefine HAVE_SYS_EA_H 1
 +
 +/* Define to 1 if you have the <sys/extattr.h> header file. */
 +#cmakedefine HAVE_SYS_EXTATTR_H 1
 +
 +/* Define to 1 if you have the <sys/ioctl.h> header file. */
 +#cmakedefine HAVE_SYS_IOCTL_H 1
 +
 +/* Define to 1 if you have the <sys/mkdev.h> header file. */
 +#cmakedefine HAVE_SYS_MKDEV_H 1
 +
 +/* Define to 1 if you have the <sys/mount.h> header file. */
 +#cmakedefine HAVE_SYS_MOUNT_H 1
 +
 +/* Define to 1 if you have the <sys/ndir.h> header file, and it defines `DIR'.
 +   */
 +#cmakedefine HAVE_SYS_NDIR_H 1
 +
 +/* Define to 1 if you have the <sys/param.h> header file. */
 +#cmakedefine HAVE_SYS_PARAM_H 1
 +
 +/* Define to 1 if you have the <sys/poll.h> header file. */
 +#cmakedefine HAVE_SYS_POLL_H 1
 +
 +/* Define to 1 if you have the <sys/select.h> header file. */
 +#cmakedefine HAVE_SYS_SELECT_H 1
 +
 +/* Define to 1 if you have the <sys/statfs.h> header file. */
 +#cmakedefine HAVE_SYS_STATFS_H 1
 +
 +/* Define to 1 if you have the <sys/statvfs.h> header file. */
 +#cmakedefine HAVE_SYS_STATVFS_H 1
 +
 +/* Define to 1 if you have the <sys/stat.h> header file. */
 +#cmakedefine HAVE_SYS_STAT_H 1
 +
 +/* Define to 1 if you have the <sys/time.h> header file. */
 +#cmakedefine HAVE_SYS_TIME_H 1
 +
 +/* Define to 1 if you have the <sys/types.h> header file. */
 +#cmakedefine HAVE_SYS_TYPES_H 1
 +
 +/* Define to 1 if you have the <sys/utime.h> header file. */
 +#cmakedefine HAVE_SYS_UTIME_H 1
 +
 +/* Define to 1 if you have the <sys/utsname.h> header file. */
 +#cmakedefine HAVE_SYS_UTSNAME_H 1
 +
 +/* Define to 1 if you have the <sys/vfs.h> header file. */
 +#cmakedefine HAVE_SYS_VFS_H 1
 +
 +/* Define to 1 if you have <sys/wait.h> that is POSIX.1 compatible. */
 +#cmakedefine HAVE_SYS_WAIT_H 1
 +
 +/* Define to 1 if you have the <sys/xattr.h> header file. */
 +#cmakedefine HAVE_SYS_XATTR_H 1
 +
 +/* Define to 1 if you have the `timegm' function. */
 +#cmakedefine HAVE_TIMEGM 1
 +
 +/* Define to 1 if you have the <time.h> header file. */
 +#cmakedefine HAVE_TIME_H 1
 +
 +/* Define to 1 if you have the `tzset' function. */
 +#cmakedefine HAVE_TZSET 1
 +
 +/* Define to 1 if you have the <unistd.h> header file. */
 +#cmakedefine HAVE_UNISTD_H 1
 +
 +/* Define to 1 if you have the `unsetenv' function. */
 +#cmakedefine HAVE_UNSETENV 1
 +
 +/* Define to 1 if the system has the type `unsigned long long'. */
 +#cmakedefine HAVE_UNSIGNED_LONG_LONG 1
 +
 +/* Define to 1 if the system has the type `unsigned long long int'. */
 +#cmakedefine HAVE_UNSIGNED_LONG_LONG_INT 1
 +
 +/* Define to 1 if you have the `utime' function. */
 +#cmakedefine HAVE_UTIME 1
 +
 +/* Define to 1 if you have the `utimensat' function. */
 +#cmakedefine HAVE_UTIMENSAT 1
 +
 +/* Define to 1 if you have the `utimes' function. */
 +#cmakedefine HAVE_UTIMES 1
 +
 +/* Define to 1 if you have the <utime.h> header file. */
 +#cmakedefine HAVE_UTIME_H 1
 +
 +/* Define to 1 if you have the `vfork' function. */
 +#cmakedefine HAVE_VFORK 1
 +
 +/* Define to 1 if you have the `vprintf' function. */
 +#cmakedefine HAVE_VPRINTF 1
 +
 +/* Define to 1 if you have the <wchar.h> header file. */
 +#cmakedefine HAVE_WCHAR_H 1
 +
 +/* Define to 1 if the system has the type `wchar_t'. */
 +#cmakedefine HAVE_WCHAR_T 1
 +
 +/* Define to 1 if you have the `wcrtomb' function. */
 +#cmakedefine HAVE_WCRTOMB 1
 +
 +/* Define to 1 if you have the `wcscmp' function. */
 +#cmakedefine HAVE_WCSCMP 1
 +
 +/* Define to 1 if you have the `wcscpy' function. */
 +#cmakedefine HAVE_WCSCPY 1
 +
 +/* Define to 1 if you have the `wcslen' function. */
 +#cmakedefine HAVE_WCSLEN 1
 +
 +/* Define to 1 if you have the `wctomb' function. */
 +#cmakedefine HAVE_WCTOMB 1
 +
 +/* Define to 1 if you have the <wctype.h> header file. */
 +#cmakedefine HAVE_WCTYPE_H 1
 +
 +/* Define to 1 if you have the <wincrypt.h> header file. */
 +#cmakedefine HAVE_WINCRYPT_H 1
 +
 +/* Define to 1 if you have the <windows.h> header file. */
 +#cmakedefine HAVE_WINDOWS_H 1
 +
 +/* Define to 1 if you have the <winioctl.h> header file. */
 +#cmakedefine HAVE_WINIOCTL_H 1
 +
 +/* Define to 1 if you have _CrtSetReportMode in <crtdbg.h>  */
 +#cmakedefine HAVE__CrtSetReportMode 1
 +
 +/* Define to 1 if you have the `wmemcmp' function. */
 +#cmakedefine HAVE_WMEMCMP 1
 +
 +/* Define to 1 if you have the `wmemcpy' function. */
 +#cmakedefine HAVE_WMEMCPY 1
 +
 +/* Define to 1 if you have the `wmemmove' function. */
 +#cmakedefine HAVE_WMEMMOVE 1
 +
 +/* Define to 1 if you have a working EXT2_IOC_GETFLAGS */
 +#cmakedefine HAVE_WORKING_EXT2_IOC_GETFLAGS 1
 +
 +/* Define to 1 if you have the <zlib.h> header file. */
 +#cmakedefine HAVE_ZLIB_H 1
 +
 +/* Define to 1 if you have the `_ctime64_s' function. */
 +#cmakedefine HAVE__CTIME64_S 1
 +
 +/* Define to 1 if you have the `_fseeki64' function. */
 +#cmakedefine HAVE__FSEEKI64 1
 +
 +/* Define to 1 if you have the `_get_timezone' function. */
 +#cmakedefine HAVE__GET_TIMEZONE 1
 +
 +/* Define to 1 if you have the `_localtime64_s' function. */
 +#cmakedefine HAVE__LOCALTIME64_S 1
 +
 +/* Define to 1 if you have the `_mkgmtime64' function. */
 +#cmakedefine HAVE__MKGMTIME64 1
 +
 +/* Define as const if the declaration of iconv() needs const. */
 +#define ICONV_CONST ${ICONV_CONST}
 +
 +/* Version number of libarchive as a single integer */
 +#cmakedefine LIBARCHIVE_VERSION_NUMBER "${LIBARCHIVE_VERSION_NUMBER}"
 +
 +/* Version number of libarchive */
 +#cmakedefine LIBARCHIVE_VERSION_STRING "${LIBARCHIVE_VERSION_STRING}"
 +
 +/* Define to 1 if `lstat' dereferences a symlink specified with a trailing
 +   slash. */
 +#cmakedefine LSTAT_FOLLOWS_SLASHED_SYMLINK 1
 +
 +/* Define to 1 if `major', `minor', and `makedev' are declared in <mkdev.h>.
 +   */
 +#cmakedefine MAJOR_IN_MKDEV 1
 +
 +/* Define to 1 if `major', `minor', and `makedev' are declared in
 +   <sysmacros.h>. */
 +#cmakedefine MAJOR_IN_SYSMACROS 1
 +
 +/* Define to 1 if your C compiler doesn't accept -c and -o together. */
 +#cmakedefine NO_MINUS_C_MINUS_O 1
 +
 +/* The size of `wchar_t', as computed by sizeof. */
 +#cmakedefine SIZEOF_WCHAR_T ${SIZEOF_WCHAR_T}
 +
 +/* Define to 1 if strerror_r returns char *. */
 +#cmakedefine STRERROR_R_CHAR_P 1
 +
 +/* Define to 1 if you can safely include both <sys/time.h> and <time.h>. */
 +#cmakedefine TIME_WITH_SYS_TIME 1
 +
 +/*
 + * Some platform requires a macro to use extension functions.
 + */
 +#cmakedefine SAFE_TO_DEFINE_EXTENSIONS 1
 +#ifdef SAFE_TO_DEFINE_EXTENSIONS
 +/* Enable extensions on AIX 3, Interix.  */
 +#ifndef _ALL_SOURCE
 +# define _ALL_SOURCE 1
 +#endif
 +/* Enable GNU extensions on systems that have them.  */
 +#ifndef _GNU_SOURCE
 +# define _GNU_SOURCE 1
 +#endif
 +/* Enable threading extensions on Solaris.  */
 +#ifndef _POSIX_PTHREAD_SEMANTICS
 +# define _POSIX_PTHREAD_SEMANTICS 1
 +#endif
 +/* Enable extensions on HP NonStop.  */
 +#ifndef _TANDEM_SOURCE
 +# define _TANDEM_SOURCE 1
 +#endif
 +/* Enable general extensions on Solaris.  */
 +#ifndef __EXTENSIONS__
 +# define __EXTENSIONS__ 1
 +#endif
 +#endif /* SAFE_TO_DEFINE_EXTENSIONS */
 +
 +/* Version number of package */
 +#cmakedefine VERSION "${VERSION}"
 +
 +/* Number of bits in a file offset, on hosts where this is settable. */
 +#cmakedefine _FILE_OFFSET_BITS ${_FILE_OFFSET_BITS}
 +
 +/* Define to 1 to make fseeko visible on some hosts (e.g. glibc 2.2). */
 +#cmakedefine _LARGEFILE_SOURCE 1
 +
 +/* Define for large files, on AIX-style hosts. */
 +#cmakedefine _LARGE_FILES ${_LARGE_FILES}
 +
 +/* Define to control Windows SDK version */
 +#ifndef NTDDI_VERSION
 +#cmakedefine NTDDI_VERSION ${NTDDI_VERSION}
 +#endif // NTDDI_VERSION
 +
 +#ifndef _WIN32_WINNT
 +#cmakedefine _WIN32_WINNT ${_WIN32_WINNT}
 +#endif // _WIN32_WINNT
 +
 +#ifndef WINVER
 +#cmakedefine WINVER ${WINVER}
 +#endif // WINVER
 +
 +/* Define to empty if `const' does not conform to ANSI C. */
 +#cmakedefine const ${const}
 +
 +/* Define to `int' if <sys/types.h> doesn't define. */
 +#cmakedefine gid_t ${gid_t}
 +
 +/* Define to `unsigned long' if <sys/types.h> does not define. */
 +#cmakedefine id_t ${id_t}
 +
 +/* Define to `int' if <sys/types.h> does not define. */
 +#cmakedefine mode_t ${mode_t}
 +
 +/* Define to `long long' if <sys/types.h> does not define. */
 +#cmakedefine off_t ${off_t}
 +
 +/* Define to `int' if <sys/types.h> doesn't define. */
 +#cmakedefine pid_t ${pid_t}
 +
 +/* Define to `unsigned int' if <sys/types.h> does not define. */
 +#cmakedefine size_t ${size_t}
 +
 +/* Define to `int' if <sys/types.h> does not define. */
 +#cmakedefine ssize_t ${ssize_t}
 +
 +/* Define to `int' if <sys/types.h> doesn't define. */
 +#cmakedefine uid_t ${uid_t}
 +
 +/* Define to `int' if <sys/types.h> does not define. */
 +#cmakedefine intptr_t ${intptr_t}
 +
 +/* Define to `unsigned int' if <sys/types.h> does not define. */
 +#cmakedefine uintptr_t ${uintptr_t}
diff --cc Utilities/cmlibarchive/libarchive/CMakeLists.txt
index eaa7b20,0000000..d412c80
mode 100644,000000..100644
--- a/Utilities/cmlibarchive/libarchive/CMakeLists.txt
+++ b/Utilities/cmlibarchive/libarchive/CMakeLists.txt
@@@ -1,197 -1,0 +1,215 @@@
 +
 +############################################
 +#
 +# How to build libarchive
 +#
 +############################################
 +
 +# Public headers
 +SET(include_HEADERS
 +  archive.h
 +  archive_entry.h
 +)
 +
 +# Sources and private headers
 +SET(libarchive_SOURCES
 +  archive_acl.c
 +  archive_check_magic.c
 +  archive_cmdline.c
 +  archive_cmdline_private.h
 +  archive_crc32.h
 +  archive_cryptor.c
 +  archive_cryptor_private.h
 +  archive_digest.c
 +  archive_digest_private.h
 +  archive_endian.h
 +  archive_entry.c
 +  archive_entry.h
 +  archive_entry_copy_stat.c
 +  archive_entry_link_resolver.c
 +  archive_entry_locale.h
 +  archive_entry_private.h
 +  archive_entry_sparse.c
 +  archive_entry_stat.c
 +  archive_entry_strmode.c
 +  archive_entry_xattr.c
 +  archive_getdate.c
 +  archive_getdate.h
 +  archive_hmac.c
 +  archive_hmac_private.h
 +  archive_match.c
 +  archive_openssl_evp_private.h
 +  archive_openssl_hmac_private.h
 +  archive_options.c
 +  archive_options_private.h
 +  archive_pack_dev.h
 +  archive_pack_dev.c
 +  archive_pathmatch.c
 +  archive_pathmatch.h
 +  archive_platform.h
 +  archive_ppmd_private.h
 +  archive_ppmd7.c
 +  archive_ppmd7_private.h
 +  archive_private.h
 +  archive_random.c
 +  archive_random_private.h
 +  archive_rb.c
 +  archive_rb.h
 +  archive_read.c
 +  archive_read_add_passphrase.c
 +  archive_read_append_filter.c
 +  archive_read_data_into_fd.c
 +  archive_read_disk_entry_from_file.c
 +  archive_read_disk_posix.c
 +  archive_read_disk_private.h
 +  archive_read_disk_set_standard_lookup.c
 +  archive_read_extract.c
 +  archive_read_extract2.c
 +  archive_read_open_fd.c
 +  archive_read_open_file.c
 +  archive_read_open_filename.c
 +  archive_read_open_memory.c
 +  archive_read_private.h
 +  archive_read_set_format.c
 +  archive_read_set_options.c
 +  archive_read_support_filter_all.c
 +  archive_read_support_filter_bzip2.c
 +  archive_read_support_filter_compress.c
 +  archive_read_support_filter_gzip.c
 +  archive_read_support_filter_grzip.c
 +  archive_read_support_filter_lrzip.c
 +  archive_read_support_filter_lz4.c
 +  archive_read_support_filter_lzop.c
 +  archive_read_support_filter_none.c
 +  archive_read_support_filter_program.c
 +  archive_read_support_filter_rpm.c
 +  archive_read_support_filter_uu.c
 +  archive_read_support_filter_xz.c
 +  archive_read_support_format_7zip.c
 +  archive_read_support_format_all.c
 +  archive_read_support_format_ar.c
 +  archive_read_support_format_by_code.c
 +  archive_read_support_format_cab.c
 +  archive_read_support_format_cpio.c
 +  archive_read_support_format_empty.c
 +  archive_read_support_format_iso9660.c
 +  archive_read_support_format_lha.c
 +  archive_read_support_format_mtree.c
 +  archive_read_support_format_rar.c
 +  archive_read_support_format_raw.c
 +  archive_read_support_format_tar.c
 +  archive_read_support_format_warc.c
 +  archive_read_support_format_xar.c
 +  archive_read_support_format_zip.c
 +  archive_string.c
 +  archive_string.h
 +  archive_string_composition.h
 +  archive_string_sprintf.c
 +  archive_util.c
 +  archive_virtual.c
 +  archive_write.c
 +  archive_write_disk_acl.c
 +  archive_write_disk_posix.c
 +  archive_write_disk_private.h
 +  archive_write_disk_set_standard_lookup.c
 +  archive_write_private.h
 +  archive_write_open_fd.c
 +  archive_write_open_file.c
 +  archive_write_open_filename.c
 +  archive_write_open_memory.c
 +  archive_write_add_filter.c
 +  archive_write_add_filter_b64encode.c
 +  archive_write_add_filter_by_name.c
 +  archive_write_add_filter_bzip2.c
 +  archive_write_add_filter_compress.c
 +  archive_write_add_filter_grzip.c
 +  archive_write_add_filter_gzip.c
 +  archive_write_add_filter_lrzip.c
 +  archive_write_add_filter_lz4.c
 +  archive_write_add_filter_lzop.c
 +  archive_write_add_filter_none.c
 +  archive_write_add_filter_program.c
 +  archive_write_add_filter_uuencode.c
 +  archive_write_add_filter_xz.c
 +  archive_write_set_format.c
 +  archive_write_set_format_7zip.c
 +  archive_write_set_format_ar.c
 +  archive_write_set_format_by_name.c
 +  archive_write_set_format_cpio.c
 +  archive_write_set_format_cpio_newc.c
 +  archive_write_set_format_filter_by_ext.c
 +  archive_write_set_format_gnutar.c
 +  archive_write_set_format_iso9660.c
 +  archive_write_set_format_mtree.c
 +  archive_write_set_format_pax.c
 +  archive_write_set_format_raw.c
 +  archive_write_set_format_shar.c
 +  archive_write_set_format_ustar.c
 +  archive_write_set_format_v7tar.c
 +  archive_write_set_format_warc.c
 +  archive_write_set_format_xar.c
 +  archive_write_set_format_zip.c
 +  archive_write_set_options.c
 +  archive_write_set_passphrase.c
 +  archive_xxhash.h
 +  filter_fork_posix.c
 +  filter_fork.h
 +  xxhash.c
 +)
 +
 +# Man pages
 +SET(libarchive_MANS
 +  archive_entry.3
 +  archive_entry_acl.3
 +  archive_entry_linkify.3
 +  archive_entry_paths.3
 +  archive_entry_perms.3
 +  archive_entry_stat.3
 +  archive_entry_time.3
 +  archive_read.3
 +  archive_read_add_passphrase.3
++  archive_read_data.3
 +  archive_read_disk.3
++  archive_read_extract.3
++  archive_read_filter.3
++  archive_read_format.3
++  archive_read_free.3
++  archive_read_header.3
++  archive_read_new.3
++  archive_read_open.3
 +  archive_read_set_options.3
 +  archive_util.3
 +  archive_write.3
++  archive_write_blocksize.3
++  archive_write_data.3
 +  archive_write_disk.3
++  archive_write_filter.3
++  archive_write_finish_entry.3
++  archive_write_format.3
++  archive_write_free.3
++  archive_write_header.3
++  archive_write_new.3
++  archive_write_open.3
 +  archive_write_set_options.3
 +  archive_write_set_passphrase.3
 +  cpio.5
 +  libarchive.3
++  libarchive_changes.3
 +  libarchive_internals.3
 +  libarchive-formats.5
 +  mtree.5
 +  tar.5
 +)
 +
 +IF(WIN32 AND NOT CYGWIN)
 +  LIST(APPEND libarchive_SOURCES archive_entry_copy_bhfi.c)
 +  LIST(APPEND libarchive_SOURCES archive_read_disk_windows.c)
 +  LIST(APPEND libarchive_SOURCES archive_windows.c)
 +  LIST(APPEND libarchive_SOURCES archive_windows.h)
 +  LIST(APPEND libarchive_SOURCES archive_write_disk_windows.c)
 +  LIST(APPEND libarchive_SOURCES filter_fork_windows.c)
 +ENDIF(WIN32 AND NOT CYGWIN)
 +
 +# CMake needs just one static "cmlibarchive" library.
 +ADD_LIBRARY(cmlibarchive STATIC ${libarchive_SOURCES} ${include_HEADERS})
 +TARGET_LINK_LIBRARIES(cmlibarchive ${ADDITIONAL_LIBS})
diff --cc Utilities/cmlibarchive/libarchive/archive.h
index 3b5104b,0000000..040f151
mode 100644,000000..100644
--- a/Utilities/cmlibarchive/libarchive/archive.h
+++ b/Utilities/cmlibarchive/libarchive/archive.h
@@@ -1,1180 -1,0 +1,1180 @@@
 +/*-
 + * Copyright (c) 2003-2010 Tim Kientzle
 + * All rights reserved.
 + *
 + * Redistribution and use in source and binary forms, with or without
 + * modification, are permitted provided that the following conditions
 + * are met:
 + * 1. Redistributions of source code must retain the above copyright
 + *    notice, this list of conditions and the following disclaimer.
 + * 2. Redistributions in binary form must reproduce the above copyright
 + *    notice, this list of conditions and the following disclaimer in the
 + *    documentation and/or other materials provided with the distribution.
 + *
 + * THIS SOFTWARE IS PROVIDED BY THE AUTHOR(S) ``AS IS'' AND ANY EXPRESS OR
 + * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
 + * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
 + * IN NO EVENT SHALL THE AUTHOR(S) BE LIABLE FOR ANY DIRECT, INDIRECT,
 + * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
 + * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
 + * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
 + * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
 + * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
 + * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
 + *
 + * $FreeBSD: src/lib/libarchive/archive.h.in,v 1.50 2008/05/26 17:00:22 kientzle Exp $
 + */
 +
 +#ifndef ARCHIVE_H_INCLUDED
 +#define	ARCHIVE_H_INCLUDED
 +
 +/*
 + * The version number is expressed as a single integer that makes it
 + * easy to compare versions at build time: for version a.b.c, the
 + * version number is printf("%d%03d%03d",a,b,c).  For example, if you
 + * know your application requires version 2.12.108 or later, you can
 + * assert that ARCHIVE_VERSION_NUMBER >= 2012108.
 + */
 +/* Note: Compiler will complain if this does not match archive_entry.h! */
- #define	ARCHIVE_VERSION_NUMBER 3002001
++#define	ARCHIVE_VERSION_NUMBER 3003000
 +
 +#include <sys/stat.h>
 +#include <stddef.h>  /* for wchar_t */
 +#include <stdio.h> /* For FILE * */
 +#include <time.h> /* For time_t */
 +
 +/*
 + * Note: archive.h is for use outside of libarchive; the configuration
 + * headers (config.h, archive_platform.h, etc.) are purely internal.
 + * Do NOT use HAVE_XXX configuration macros to control the behavior of
 + * this header!  If you must conditionalize, use predefined compiler and/or
 + * platform macros.
 + */
 +#if defined(__BORLANDC__) && __BORLANDC__ >= 0x560
 +# include <stdint.h>
 +#elif !defined(__WATCOMC__) && !defined(_MSC_VER) && !defined(__INTERIX) && !defined(__BORLANDC__) && !defined(_SCO_DS) && !defined(__osf__)
 +# include <inttypes.h>
 +#endif
 +
 +/* Get appropriate definitions of 64-bit integer */
 +#if !defined(__LA_INT64_T_DEFINED)
 +/* Older code relied on the __LA_INT64_T macro; after 4.0 we'll switch to the typedef exclusively. */
 +# if ARCHIVE_VERSION_NUMBER < 4000000
 +#define __LA_INT64_T la_int64_t
 +# endif
 +#define __LA_INT64_T_DEFINED
 +# if defined(_WIN32) && !defined(__CYGWIN__) && !defined(__WATCOMC__)
 +typedef __int64 la_int64_t;
 +# else
 +# include <unistd.h>  /* ssize_t */
 +#  if defined(_SCO_DS) || defined(__osf__)
 +typedef long long la_int64_t;
 +#  else
 +typedef int64_t la_int64_t;
 +#  endif
 +# endif
 +#endif
 +
 +/* The la_ssize_t should match the type used in 'struct stat' */
 +#if !defined(__LA_SSIZE_T_DEFINED)
 +/* Older code relied on the __LA_SSIZE_T macro; after 4.0 we'll switch to the typedef exclusively. */
 +# if ARCHIVE_VERSION_NUMBER < 4000000
 +#define __LA_SSIZE_T la_ssize_t
 +# endif
 +#define __LA_SSIZE_T_DEFINED
 +# if defined(_WIN32) && !defined(__CYGWIN__) && !defined(__WATCOMC__)
 +#  if defined(_SSIZE_T_DEFINED) || defined(_SSIZE_T_)
 +typedef ssize_t la_ssize_t;
 +#  elif defined(_WIN64)
 +typedef __int64 la_ssize_t;
 +#  else
 +typedef long la_ssize_t;
 +#  endif
 +# else
 +# include <unistd.h>  /* ssize_t */
 +typedef ssize_t la_ssize_t;
 +# endif
 +#endif
 +
 +/* Large file support for Android */
 +#ifdef __ANDROID__
 +#include "android_lf.h"
 +#endif
 +
 +/*
 + * On Windows, define LIBARCHIVE_STATIC if you're building or using a
 + * .lib.  The default here assumes you're building a DLL.  Only
 + * libarchive source should ever define __LIBARCHIVE_BUILD.
 + */
 +#if ((defined __WIN32__) || (defined _WIN32) || defined(__CYGWIN__)) && (!defined LIBARCHIVE_STATIC)
 +# ifdef __LIBARCHIVE_BUILD
 +#  ifdef __GNUC__
 +#   define __LA_DECL	__attribute__((dllexport)) extern
 +#  else
 +#   define __LA_DECL	__declspec(dllexport)
 +#  endif
 +# else
 +#  ifdef __GNUC__
 +#   define __LA_DECL
 +#  else
 +#   define __LA_DECL	__declspec(dllimport)
 +#  endif
 +# endif
 +#else
 +/* Static libraries or non-Windows needs no special declaration. */
 +# define __LA_DECL
 +#endif
 +
 +#if defined(__GNUC__) && __GNUC__ >= 3 && !defined(__MINGW32__)
 +#define	__LA_PRINTF(fmtarg, firstvararg) \
 +	__attribute__((__format__ (__printf__, fmtarg, firstvararg)))
 +#else
 +#define	__LA_PRINTF(fmtarg, firstvararg)	/* nothing */
 +#endif
 +
 +/* CMake uses some deprecated APIs to build with old libarchive versions.  */
 +#define __LA_DEPRECATED
 +
 +#ifdef __cplusplus
 +extern "C" {
 +#endif
 +
 +/*
 + * The version number is provided as both a macro and a function.
 + * The macro identifies the installed header; the function identifies
 + * the library version (which may not be the same if you're using a
 + * dynamically-linked version of the library).  Of course, if the
 + * header and library are very different, you should expect some
 + * strangeness.  Don't do that.
 + */
 +__LA_DECL int		archive_version_number(void);
 +
 +/*
 + * Textual name/version of the library, useful for version displays.
 + */
- #define	ARCHIVE_VERSION_ONLY_STRING "3.2.1"
++#define	ARCHIVE_VERSION_ONLY_STRING "3.3.0"
 +#define	ARCHIVE_VERSION_STRING "libarchive " ARCHIVE_VERSION_ONLY_STRING
 +__LA_DECL const char *	archive_version_string(void);
 +
 +/*
 + * Detailed textual name/version of the library and its dependencies.
 + * This has the form:
 + *    "libarchive x.y.z zlib/a.b.c liblzma/d.e.f ... etc ..."
 + * the list of libraries described here will vary depending on how
 + * libarchive was compiled.
 + */
 +__LA_DECL const char *	archive_version_details(void);
 +
 +/*
 + * Returns NULL if libarchive was compiled without the associated library.
 + * Otherwise, returns the version number that libarchive was compiled
 + * against.
 + */
 +__LA_DECL const char *  archive_zlib_version(void);
 +__LA_DECL const char *  archive_liblzma_version(void);
 +__LA_DECL const char *  archive_bzlib_version(void);
 +__LA_DECL const char *  archive_liblz4_version(void);
 +
 +/* Declare our basic types. */
 +struct archive;
 +struct archive_entry;
 +
 +/*
 + * Error codes: Use archive_errno() and archive_error_string()
 + * to retrieve details.  Unless specified otherwise, all functions
 + * that return 'int' use these codes.
 + */
 +#define	ARCHIVE_EOF	  1	/* Found end of archive. */
 +#define	ARCHIVE_OK	  0	/* Operation was successful. */
 +#define	ARCHIVE_RETRY	(-10)	/* Retry might succeed. */
 +#define	ARCHIVE_WARN	(-20)	/* Partial success. */
 +/* For example, if write_header "fails", then you can't push data. */
 +#define	ARCHIVE_FAILED	(-25)	/* Current operation cannot complete. */
 +/* But if write_header is "fatal," then this archive is dead and useless. */
 +#define	ARCHIVE_FATAL	(-30)	/* No more operations are possible. */
 +
 +/*
 + * As far as possible, archive_errno returns standard platform errno codes.
 + * Of course, the details vary by platform, so the actual definitions
 + * here are stored in "archive_platform.h".  The symbols are listed here
 + * for reference; as a rule, clients should not need to know the exact
 + * platform-dependent error code.
 + */
 +/* Unrecognized or invalid file format. */
 +/* #define	ARCHIVE_ERRNO_FILE_FORMAT */
 +/* Illegal usage of the library. */
 +/* #define	ARCHIVE_ERRNO_PROGRAMMER_ERROR */
 +/* Unknown or unclassified error. */
 +/* #define	ARCHIVE_ERRNO_MISC */
 +
 +/*
 + * Callbacks are invoked to automatically read/skip/write/open/close the
 + * archive. You can provide your own for complex tasks (like breaking
 + * archives across multiple tapes) or use standard ones built into the
 + * library.
 + */
 +
 +/* Returns pointer and size of next block of data from archive. */
 +typedef la_ssize_t	archive_read_callback(struct archive *,
 +			    void *_client_data, const void **_buffer);
 +
 +/* Skips at most request bytes from archive and returns the skipped amount.
 + * This may skip fewer bytes than requested; it may even skip zero bytes.
 + * If you do skip fewer bytes than requested, libarchive will invoke your
 + * read callback and discard data as necessary to make up the full skip.
 + */
 +typedef la_int64_t	archive_skip_callback(struct archive *,
 +			    void *_client_data, la_int64_t request);
 +
 +/* Seeks to specified location in the file and returns the position.
 + * Whence values are SEEK_SET, SEEK_CUR, SEEK_END from stdio.h.
 + * Return ARCHIVE_FATAL if the seek fails for any reason.
 + */
 +typedef la_int64_t	archive_seek_callback(struct archive *,
 +    void *_client_data, la_int64_t offset, int whence);
 +
 +/* Returns size actually written, zero on EOF, -1 on error. */
 +typedef la_ssize_t	archive_write_callback(struct archive *,
 +			    void *_client_data,
 +			    const void *_buffer, size_t _length);
 +
 +typedef int	archive_open_callback(struct archive *, void *_client_data);
 +
 +typedef int	archive_close_callback(struct archive *, void *_client_data);
 +
 +/* Switches from one client data object to the next/prev client data object.
 + * This is useful for reading from different data blocks such as a set of files
 + * that make up one large file.
 + */
 +typedef int archive_switch_callback(struct archive *, void *_client_data1,
 +			    void *_client_data2);
 +
 +/*
 + * Returns a passphrase used for encryption or decryption, NULL on nothing
 + * to do and give it up.
 + */
 +typedef const char *archive_passphrase_callback(struct archive *,
 +			    void *_client_data);
 +
 +/*
 + * Codes to identify various stream filters.
 + */
 +#define	ARCHIVE_FILTER_NONE	0
 +#define	ARCHIVE_FILTER_GZIP	1
 +#define	ARCHIVE_FILTER_BZIP2	2
 +#define	ARCHIVE_FILTER_COMPRESS	3
 +#define	ARCHIVE_FILTER_PROGRAM	4
 +#define	ARCHIVE_FILTER_LZMA	5
 +#define	ARCHIVE_FILTER_XZ	6
 +#define	ARCHIVE_FILTER_UU	7
 +#define	ARCHIVE_FILTER_RPM	8
 +#define	ARCHIVE_FILTER_LZIP	9
 +#define	ARCHIVE_FILTER_LRZIP	10
 +#define	ARCHIVE_FILTER_LZOP	11
 +#define	ARCHIVE_FILTER_GRZIP	12
 +#define	ARCHIVE_FILTER_LZ4	13
 +
 +#if ARCHIVE_VERSION_NUMBER < 4000000
 +#define	ARCHIVE_COMPRESSION_NONE	ARCHIVE_FILTER_NONE
 +#define	ARCHIVE_COMPRESSION_GZIP	ARCHIVE_FILTER_GZIP
 +#define	ARCHIVE_COMPRESSION_BZIP2	ARCHIVE_FILTER_BZIP2
 +#define	ARCHIVE_COMPRESSION_COMPRESS	ARCHIVE_FILTER_COMPRESS
 +#define	ARCHIVE_COMPRESSION_PROGRAM	ARCHIVE_FILTER_PROGRAM
 +#define	ARCHIVE_COMPRESSION_LZMA	ARCHIVE_FILTER_LZMA
 +#define	ARCHIVE_COMPRESSION_XZ		ARCHIVE_FILTER_XZ
 +#define	ARCHIVE_COMPRESSION_UU		ARCHIVE_FILTER_UU
 +#define	ARCHIVE_COMPRESSION_RPM		ARCHIVE_FILTER_RPM
 +#define	ARCHIVE_COMPRESSION_LZIP	ARCHIVE_FILTER_LZIP
 +#define	ARCHIVE_COMPRESSION_LRZIP	ARCHIVE_FILTER_LRZIP
 +#endif
 +
 +/*
 + * Codes returned by archive_format.
 + *
 + * Top 16 bits identifies the format family (e.g., "tar"); lower
 + * 16 bits indicate the variant.  This is updated by read_next_header.
 + * Note that the lower 16 bits will often vary from entry to entry.
 + * In some cases, this variation occurs as libarchive learns more about
 + * the archive (for example, later entries might utilize extensions that
 + * weren't necessary earlier in the archive; in this case, libarchive
 + * will change the format code to indicate the extended format that
 + * was used).  In other cases, it's because different tools have
 + * modified the archive and so different parts of the archive
 + * actually have slightly different formats.  (Both tar and cpio store
 + * format codes in each entry, so it is quite possible for each
 + * entry to be in a different format.)
 + */
 +#define	ARCHIVE_FORMAT_BASE_MASK		0xff0000
 +#define	ARCHIVE_FORMAT_CPIO			0x10000
 +#define	ARCHIVE_FORMAT_CPIO_POSIX		(ARCHIVE_FORMAT_CPIO | 1)
 +#define	ARCHIVE_FORMAT_CPIO_BIN_LE		(ARCHIVE_FORMAT_CPIO | 2)
 +#define	ARCHIVE_FORMAT_CPIO_BIN_BE		(ARCHIVE_FORMAT_CPIO | 3)
 +#define	ARCHIVE_FORMAT_CPIO_SVR4_NOCRC		(ARCHIVE_FORMAT_CPIO | 4)
 +#define	ARCHIVE_FORMAT_CPIO_SVR4_CRC		(ARCHIVE_FORMAT_CPIO | 5)
 +#define	ARCHIVE_FORMAT_CPIO_AFIO_LARGE		(ARCHIVE_FORMAT_CPIO | 6)
 +#define	ARCHIVE_FORMAT_SHAR			0x20000
 +#define	ARCHIVE_FORMAT_SHAR_BASE		(ARCHIVE_FORMAT_SHAR | 1)
 +#define	ARCHIVE_FORMAT_SHAR_DUMP		(ARCHIVE_FORMAT_SHAR | 2)
 +#define	ARCHIVE_FORMAT_TAR			0x30000
 +#define	ARCHIVE_FORMAT_TAR_USTAR		(ARCHIVE_FORMAT_TAR | 1)
 +#define	ARCHIVE_FORMAT_TAR_PAX_INTERCHANGE	(ARCHIVE_FORMAT_TAR | 2)
 +#define	ARCHIVE_FORMAT_TAR_PAX_RESTRICTED	(ARCHIVE_FORMAT_TAR | 3)
 +#define	ARCHIVE_FORMAT_TAR_GNUTAR		(ARCHIVE_FORMAT_TAR | 4)
 +#define	ARCHIVE_FORMAT_ISO9660			0x40000
 +#define	ARCHIVE_FORMAT_ISO9660_ROCKRIDGE	(ARCHIVE_FORMAT_ISO9660 | 1)
 +#define	ARCHIVE_FORMAT_ZIP			0x50000
 +#define	ARCHIVE_FORMAT_EMPTY			0x60000
 +#define	ARCHIVE_FORMAT_AR			0x70000
 +#define	ARCHIVE_FORMAT_AR_GNU			(ARCHIVE_FORMAT_AR | 1)
 +#define	ARCHIVE_FORMAT_AR_BSD			(ARCHIVE_FORMAT_AR | 2)
 +#define	ARCHIVE_FORMAT_MTREE			0x80000
 +#define	ARCHIVE_FORMAT_RAW			0x90000
 +#define	ARCHIVE_FORMAT_XAR			0xA0000
 +#define	ARCHIVE_FORMAT_LHA			0xB0000
 +#define	ARCHIVE_FORMAT_CAB			0xC0000
 +#define	ARCHIVE_FORMAT_RAR			0xD0000
 +#define	ARCHIVE_FORMAT_7ZIP			0xE0000
 +#define	ARCHIVE_FORMAT_WARC			0xF0000
 +
 +/*
 + * Codes returned by archive_read_format_capabilities().
 + *
 + * This list can be extended with values between 0 and 0xffff.
 + * The original purpose of this list was to let different archive
 + * format readers expose their general capabilities in terms of
 + * encryption.
 + */
 +#define ARCHIVE_READ_FORMAT_CAPS_NONE (0) /* no special capabilities */
 +#define ARCHIVE_READ_FORMAT_CAPS_ENCRYPT_DATA (1<<0)  /* reader can detect encrypted data */
 +#define ARCHIVE_READ_FORMAT_CAPS_ENCRYPT_METADATA (1<<1)  /* reader can detect encryptable metadata (pathname, mtime, etc.) */
 +
 +/*
 + * Codes returned by archive_read_has_encrypted_entries().
 + *
 + * In case the archive does not support encryption detection at all
 + * ARCHIVE_READ_FORMAT_ENCRYPTION_UNSUPPORTED is returned. If the reader
 + * for some other reason (e.g. not enough bytes read) cannot say if
 + * there are encrypted entries, ARCHIVE_READ_FORMAT_ENCRYPTION_DONT_KNOW
 + * is returned.
 + */
 +#define ARCHIVE_READ_FORMAT_ENCRYPTION_UNSUPPORTED -2
 +#define ARCHIVE_READ_FORMAT_ENCRYPTION_DONT_KNOW -1
 +
 +/*-
 + * Basic outline for reading an archive:
 + *   1) Ask archive_read_new for an archive reader object.
 + *   2) Update any global properties as appropriate.
 + *      In particular, you'll certainly want to call appropriate
 + *      archive_read_support_XXX functions.
 + *   3) Call archive_read_open_XXX to open the archive
 + *   4) Repeatedly call archive_read_next_header to get information about
 + *      successive archive entries.  Call archive_read_data to extract
 + *      data for entries of interest.
-  *   5) Call archive_read_finish to end processing.
++ *   5) Call archive_read_free to end processing.
 + */
 +__LA_DECL struct archive	*archive_read_new(void);
 +
 +/*
 + * The archive_read_support_XXX calls enable auto-detect for this
 + * archive handle.  They also link in the necessary support code.
 + * For example, if you don't want bzlib linked in, don't invoke
 + * support_compression_bzip2().  The "all" functions provide the
 + * obvious shorthand.
 + */
 +
 +#if ARCHIVE_VERSION_NUMBER < 4000000
 +__LA_DECL int archive_read_support_compression_all(struct archive *)
 +		__LA_DEPRECATED;
 +__LA_DECL int archive_read_support_compression_bzip2(struct archive *)
 +		__LA_DEPRECATED;
 +__LA_DECL int archive_read_support_compression_compress(struct archive *)
 +		__LA_DEPRECATED;
 +__LA_DECL int archive_read_support_compression_gzip(struct archive *)
 +		__LA_DEPRECATED;
 +__LA_DECL int archive_read_support_compression_lzip(struct archive *)
 +		__LA_DEPRECATED;
 +__LA_DECL int archive_read_support_compression_lzma(struct archive *)
 +		__LA_DEPRECATED;
 +__LA_DECL int archive_read_support_compression_none(struct archive *)
 +		__LA_DEPRECATED;
 +__LA_DECL int archive_read_support_compression_program(struct archive *,
 +		     const char *command) __LA_DEPRECATED;
 +__LA_DECL int archive_read_support_compression_program_signature
 +		(struct archive *, const char *,
 +		 const void * /* match */, size_t) __LA_DEPRECATED;
 +
 +__LA_DECL int archive_read_support_compression_rpm(struct archive *)
 +		__LA_DEPRECATED;
 +__LA_DECL int archive_read_support_compression_uu(struct archive *)
 +		__LA_DEPRECATED;
 +__LA_DECL int archive_read_support_compression_xz(struct archive *)
 +		__LA_DEPRECATED;
 +#endif
 +
 +__LA_DECL int archive_read_support_filter_all(struct archive *);
 +__LA_DECL int archive_read_support_filter_bzip2(struct archive *);
 +__LA_DECL int archive_read_support_filter_compress(struct archive *);
 +__LA_DECL int archive_read_support_filter_gzip(struct archive *);
 +__LA_DECL int archive_read_support_filter_grzip(struct archive *);
 +__LA_DECL int archive_read_support_filter_lrzip(struct archive *);
 +__LA_DECL int archive_read_support_filter_lz4(struct archive *);
 +__LA_DECL int archive_read_support_filter_lzip(struct archive *);
 +__LA_DECL int archive_read_support_filter_lzma(struct archive *);
 +__LA_DECL int archive_read_support_filter_lzop(struct archive *);
 +__LA_DECL int archive_read_support_filter_none(struct archive *);
 +__LA_DECL int archive_read_support_filter_program(struct archive *,
 +		     const char *command);
 +__LA_DECL int archive_read_support_filter_program_signature
 +		(struct archive *, const char * /* cmd */,
 +				    const void * /* match */, size_t);
 +__LA_DECL int archive_read_support_filter_rpm(struct archive *);
 +__LA_DECL int archive_read_support_filter_uu(struct archive *);
 +__LA_DECL int archive_read_support_filter_xz(struct archive *);
 +
 +__LA_DECL int archive_read_support_format_7zip(struct archive *);
 +__LA_DECL int archive_read_support_format_all(struct archive *);
 +__LA_DECL int archive_read_support_format_ar(struct archive *);
 +__LA_DECL int archive_read_support_format_by_code(struct archive *, int);
 +__LA_DECL int archive_read_support_format_cab(struct archive *);
 +__LA_DECL int archive_read_support_format_cpio(struct archive *);
 +__LA_DECL int archive_read_support_format_empty(struct archive *);
 +__LA_DECL int archive_read_support_format_gnutar(struct archive *);
 +__LA_DECL int archive_read_support_format_iso9660(struct archive *);
 +__LA_DECL int archive_read_support_format_lha(struct archive *);
 +__LA_DECL int archive_read_support_format_mtree(struct archive *);
 +__LA_DECL int archive_read_support_format_rar(struct archive *);
 +__LA_DECL int archive_read_support_format_raw(struct archive *);
 +__LA_DECL int archive_read_support_format_tar(struct archive *);
 +__LA_DECL int archive_read_support_format_warc(struct archive *);
 +__LA_DECL int archive_read_support_format_xar(struct archive *);
 +/* archive_read_support_format_zip() enables both streamable and seekable
 + * zip readers. */
 +__LA_DECL int archive_read_support_format_zip(struct archive *);
 +/* Reads Zip archives as stream from beginning to end.  Doesn't
 + * correctly handle SFX ZIP files or ZIP archives that have been modified
 + * in-place. */
 +__LA_DECL int archive_read_support_format_zip_streamable(struct archive *);
 +/* Reads starting from central directory; requires seekable input. */
 +__LA_DECL int archive_read_support_format_zip_seekable(struct archive *);
 +
 +/* Functions to manually set the format and filters to be used. This is
 + * useful to bypass the bidding process when the format and filters to use
 + * is known in advance.
 + */
 +__LA_DECL int archive_read_set_format(struct archive *, int);
 +__LA_DECL int archive_read_append_filter(struct archive *, int);
 +__LA_DECL int archive_read_append_filter_program(struct archive *,
 +    const char *);
 +__LA_DECL int archive_read_append_filter_program_signature
 +    (struct archive *, const char *, const void * /* match */, size_t);
 +
 +/* Set various callbacks. */
 +__LA_DECL int archive_read_set_open_callback(struct archive *,
 +    archive_open_callback *);
 +__LA_DECL int archive_read_set_read_callback(struct archive *,
 +    archive_read_callback *);
 +__LA_DECL int archive_read_set_seek_callback(struct archive *,
 +    archive_seek_callback *);
 +__LA_DECL int archive_read_set_skip_callback(struct archive *,
 +    archive_skip_callback *);
 +__LA_DECL int archive_read_set_close_callback(struct archive *,
 +    archive_close_callback *);
 +/* Callback used to switch between one data object to the next */
 +__LA_DECL int archive_read_set_switch_callback(struct archive *,
 +    archive_switch_callback *);
 +
 +/* This sets the first data object. */
 +__LA_DECL int archive_read_set_callback_data(struct archive *, void *);
 +/* This sets data object at specified index */
 +__LA_DECL int archive_read_set_callback_data2(struct archive *, void *,
 +    unsigned int);
 +/* This adds a data object at the specified index. */
 +__LA_DECL int archive_read_add_callback_data(struct archive *, void *,
 +    unsigned int);
 +/* This appends a data object to the end of list */
 +__LA_DECL int archive_read_append_callback_data(struct archive *, void *);
 +/* This prepends a data object to the beginning of list */
 +__LA_DECL int archive_read_prepend_callback_data(struct archive *, void *);
 +
 +/* Opening freezes the callbacks. */
 +__LA_DECL int archive_read_open1(struct archive *);
 +
 +/* Convenience wrappers around the above. */
 +__LA_DECL int archive_read_open(struct archive *, void *_client_data,
 +		     archive_open_callback *, archive_read_callback *,
 +		     archive_close_callback *);
 +__LA_DECL int archive_read_open2(struct archive *, void *_client_data,
 +		     archive_open_callback *, archive_read_callback *,
 +		     archive_skip_callback *, archive_close_callback *);
 +
 +/*
 + * A variety of shortcuts that invoke archive_read_open() with
 + * canned callbacks suitable for common situations.  The ones that
 + * accept a block size handle tape blocking correctly.
 + */
 +/* Use this if you know the filename.  Note: NULL indicates stdin. */
 +__LA_DECL int archive_read_open_filename(struct archive *,
 +		     const char *_filename, size_t _block_size);
 +/* Use this for reading multivolume files by filenames.
 + * NOTE: Must be NULL terminated. Sorting is NOT done. */
 +__LA_DECL int archive_read_open_filenames(struct archive *,
 +		     const char **_filenames, size_t _block_size);
 +__LA_DECL int archive_read_open_filename_w(struct archive *,
 +		     const wchar_t *_filename, size_t _block_size);
 +/* archive_read_open_file() is a deprecated synonym for ..._open_filename(). */
 +__LA_DECL int archive_read_open_file(struct archive *,
 +		     const char *_filename, size_t _block_size) __LA_DEPRECATED;
 +/* Read an archive that's stored in memory. */
 +__LA_DECL int archive_read_open_memory(struct archive *,
 +		     const void * buff, size_t size);
 +/* A more involved version that is only used for internal testing. */
 +__LA_DECL int archive_read_open_memory2(struct archive *a, const void *buff,
 +		     size_t size, size_t read_size);
 +/* Read an archive that's already open, using the file descriptor. */
 +__LA_DECL int archive_read_open_fd(struct archive *, int _fd,
 +		     size_t _block_size);
 +/* Read an archive that's already open, using a FILE *. */
 +/* Note: DO NOT use this with tape drives. */
 +__LA_DECL int archive_read_open_FILE(struct archive *, FILE *_file);
 +
 +/* Parses and returns next entry header. */
 +__LA_DECL int archive_read_next_header(struct archive *,
 +		     struct archive_entry **);
 +
 +/* Parses and returns next entry header using the archive_entry passed in */
 +__LA_DECL int archive_read_next_header2(struct archive *,
 +		     struct archive_entry *);
 +
 +/*
 + * Retrieve the byte offset in UNCOMPRESSED data where last-read
 + * header started.
 + */
 +__LA_DECL la_int64_t		 archive_read_header_position(struct archive *);
 +
 +/*
 + * Returns 1 if the archive contains at least one encrypted entry.
 + * If the archive format not support encryption at all
 + * ARCHIVE_READ_FORMAT_ENCRYPTION_UNSUPPORTED is returned.
 + * If for any other reason (e.g. not enough data read so far)
 + * we cannot say whether there are encrypted entries, then
 + * ARCHIVE_READ_FORMAT_ENCRYPTION_DONT_KNOW is returned.
 + * In general, this function will return values below zero when the
-  * reader is uncertain or totally uncapable of encryption support.
++ * reader is uncertain or totally incapable of encryption support.
 + * When this function returns 0 you can be sure that the reader
 + * supports encryption detection but no encrypted entries have
 + * been found yet.
 + *
 + * NOTE: If the metadata/header of an archive is also encrypted, you
 + * cannot rely on the number of encrypted entries. That is why this
 + * function does not return the number of encrypted entries but#
 + * just shows that there are some.
 + */
 +__LA_DECL int	archive_read_has_encrypted_entries(struct archive *);
 +
 +/*
 + * Returns a bitmask of capabilities that are supported by the archive format reader.
 + * If the reader has no special capabilities, ARCHIVE_READ_FORMAT_CAPS_NONE is returned.
 + */
 +__LA_DECL int		 archive_read_format_capabilities(struct archive *);
 +
 +/* Read data from the body of an entry.  Similar to read(2). */
 +__LA_DECL la_ssize_t		 archive_read_data(struct archive *,
 +				    void *, size_t);
 +
 +/* Seek within the body of an entry.  Similar to lseek(2). */
 +__LA_DECL la_int64_t archive_seek_data(struct archive *, la_int64_t, int);
 +
 +/*
 + * A zero-copy version of archive_read_data that also exposes the file offset
 + * of each returned block.  Note that the client has no way to specify
 + * the desired size of the block.  The API does guarantee that offsets will
 + * be strictly increasing and that returned blocks will not overlap.
 + */
 +__LA_DECL int archive_read_data_block(struct archive *a,
 +		    const void **buff, size_t *size, la_int64_t *offset);
 +
 +/*-
 + * Some convenience functions that are built on archive_read_data:
 + *  'skip': skips entire entry
 + *  'into_buffer': writes data into memory buffer that you provide
 + *  'into_fd': writes data to specified filedes
 + */
 +__LA_DECL int archive_read_data_skip(struct archive *);
 +__LA_DECL int archive_read_data_into_fd(struct archive *, int fd);
 +
 +/*
 + * Set read options.
 + */
 +/* Apply option to the format only. */
 +__LA_DECL int archive_read_set_format_option(struct archive *_a,
 +			    const char *m, const char *o,
 +			    const char *v);
 +/* Apply option to the filter only. */
 +__LA_DECL int archive_read_set_filter_option(struct archive *_a,
 +			    const char *m, const char *o,
 +			    const char *v);
 +/* Apply option to both the format and the filter. */
 +__LA_DECL int archive_read_set_option(struct archive *_a,
 +			    const char *m, const char *o,
 +			    const char *v);
 +/* Apply option string to both the format and the filter. */
 +__LA_DECL int archive_read_set_options(struct archive *_a,
 +			    const char *opts);
 +
 +/*
 + * Add a decryption passphrase.
 + */
 +__LA_DECL int archive_read_add_passphrase(struct archive *, const char *);
 +__LA_DECL int archive_read_set_passphrase_callback(struct archive *,
 +			    void *client_data, archive_passphrase_callback *);
 +
 +
 +/*-
 + * Convenience function to recreate the current entry (whose header
 + * has just been read) on disk.
 + *
 + * This does quite a bit more than just copy data to disk. It also:
 + *  - Creates intermediate directories as required.
 + *  - Manages directory permissions:  non-writable directories will
 + *    be initially created with write permission enabled; when the
 + *    archive is closed, dir permissions are edited to the values specified
 + *    in the archive.
 + *  - Checks hardlinks:  hardlinks will not be extracted unless the
 + *    linked-to file was also extracted within the same session. (TODO)
 + */
 +
 +/* The "flags" argument selects optional behavior, 'OR' the flags you want. */
 +
 +/* Default: Do not try to set owner/group. */
 +#define	ARCHIVE_EXTRACT_OWNER			(0x0001)
 +/* Default: Do obey umask, do not restore SUID/SGID/SVTX bits. */
 +#define	ARCHIVE_EXTRACT_PERM			(0x0002)
 +/* Default: Do not restore mtime/atime. */
 +#define	ARCHIVE_EXTRACT_TIME			(0x0004)
 +/* Default: Replace existing files. */
 +#define	ARCHIVE_EXTRACT_NO_OVERWRITE 		(0x0008)
 +/* Default: Try create first, unlink only if create fails with EEXIST. */
 +#define	ARCHIVE_EXTRACT_UNLINK			(0x0010)
 +/* Default: Do not restore ACLs. */
 +#define	ARCHIVE_EXTRACT_ACL			(0x0020)
 +/* Default: Do not restore fflags. */
 +#define	ARCHIVE_EXTRACT_FFLAGS			(0x0040)
 +/* Default: Do not restore xattrs. */
 +#define	ARCHIVE_EXTRACT_XATTR 			(0x0080)
 +/* Default: Do not try to guard against extracts redirected by symlinks. */
 +/* Note: With ARCHIVE_EXTRACT_UNLINK, will remove any intermediate symlink. */
 +#define	ARCHIVE_EXTRACT_SECURE_SYMLINKS		(0x0100)
 +/* Default: Do not reject entries with '..' as path elements. */
 +#define	ARCHIVE_EXTRACT_SECURE_NODOTDOT		(0x0200)
 +/* Default: Create parent directories as needed. */
 +#define	ARCHIVE_EXTRACT_NO_AUTODIR		(0x0400)
 +/* Default: Overwrite files, even if one on disk is newer. */
 +#define	ARCHIVE_EXTRACT_NO_OVERWRITE_NEWER	(0x0800)
 +/* Detect blocks of 0 and write holes instead. */
 +#define	ARCHIVE_EXTRACT_SPARSE			(0x1000)
 +/* Default: Do not restore Mac extended metadata. */
 +/* This has no effect except on Mac OS. */
 +#define	ARCHIVE_EXTRACT_MAC_METADATA		(0x2000)
 +/* Default: Use HFS+ compression if it was compressed. */
 +/* This has no effect except on Mac OS v10.6 or later. */
 +#define	ARCHIVE_EXTRACT_NO_HFS_COMPRESSION	(0x4000)
 +/* Default: Do not use HFS+ compression if it was not compressed. */
 +/* This has no effect except on Mac OS v10.6 or later. */
 +#define	ARCHIVE_EXTRACT_HFS_COMPRESSION_FORCED	(0x8000)
 +/* Default: Do not reject entries with absolute paths */
 +#define ARCHIVE_EXTRACT_SECURE_NOABSOLUTEPATHS (0x10000)
 +/* Default: Do not clear no-change flags when unlinking object */
 +#define	ARCHIVE_EXTRACT_CLEAR_NOCHANGE_FFLAGS	(0x20000)
 +
 +__LA_DECL int archive_read_extract(struct archive *, struct archive_entry *,
 +		     int flags);
 +__LA_DECL int archive_read_extract2(struct archive *, struct archive_entry *,
 +		     struct archive * /* dest */);
 +__LA_DECL void	 archive_read_extract_set_progress_callback(struct archive *,
 +		     void (*_progress_func)(void *), void *_user_data);
 +
 +/* Record the dev/ino of a file that will not be written.  This is
 + * generally set to the dev/ino of the archive being read. */
 +__LA_DECL void		archive_read_extract_set_skip_file(struct archive *,
 +		     la_int64_t, la_int64_t);
 +
 +/* Close the file and release most resources. */
 +__LA_DECL int		 archive_read_close(struct archive *);
 +/* Release all resources and destroy the object. */
 +/* Note that archive_read_free will call archive_read_close for you. */
 +__LA_DECL int		 archive_read_free(struct archive *);
 +#if ARCHIVE_VERSION_NUMBER < 4000000
 +/* Synonym for archive_read_free() for backwards compatibility. */
 +__LA_DECL int		 archive_read_finish(struct archive *) __LA_DEPRECATED;
 +#endif
 +
 +/*-
 + * To create an archive:
 + *   1) Ask archive_write_new for an archive writer object.
 + *   2) Set any global properties.  In particular, you should set
 + *      the compression and format to use.
 + *   3) Call archive_write_open to open the file (most people
 + *       will use archive_write_open_file or archive_write_open_fd,
 + *       which provide convenient canned I/O callbacks for you).
 + *   4) For each entry:
 + *      - construct an appropriate struct archive_entry structure
 + *      - archive_write_header to write the header
 + *      - archive_write_data to write the entry data
 + *   5) archive_write_close to close the output
 + *   6) archive_write_free to cleanup the writer and release resources
 + */
 +__LA_DECL struct archive	*archive_write_new(void);
 +__LA_DECL int archive_write_set_bytes_per_block(struct archive *,
 +		     int bytes_per_block);
 +__LA_DECL int archive_write_get_bytes_per_block(struct archive *);
 +/* XXX This is badly misnamed; suggestions appreciated. XXX */
 +__LA_DECL int archive_write_set_bytes_in_last_block(struct archive *,
 +		     int bytes_in_last_block);
 +__LA_DECL int archive_write_get_bytes_in_last_block(struct archive *);
 +
 +/* The dev/ino of a file that won't be archived.  This is used
 + * to avoid recursively adding an archive to itself. */
 +__LA_DECL int archive_write_set_skip_file(struct archive *,
 +    la_int64_t, la_int64_t);
 +
 +#if ARCHIVE_VERSION_NUMBER < 4000000
 +__LA_DECL int archive_write_set_compression_bzip2(struct archive *)
 +		__LA_DEPRECATED;
 +__LA_DECL int archive_write_set_compression_compress(struct archive *)
 +		__LA_DEPRECATED;
 +__LA_DECL int archive_write_set_compression_gzip(struct archive *)
 +		__LA_DEPRECATED;
 +__LA_DECL int archive_write_set_compression_lzip(struct archive *)
 +		__LA_DEPRECATED;
 +__LA_DECL int archive_write_set_compression_lzma(struct archive *)
 +		__LA_DEPRECATED;
 +__LA_DECL int archive_write_set_compression_none(struct archive *)
 +		__LA_DEPRECATED;
 +__LA_DECL int archive_write_set_compression_program(struct archive *,
 +		     const char *cmd) __LA_DEPRECATED;
 +__LA_DECL int archive_write_set_compression_xz(struct archive *)
 +		__LA_DEPRECATED;
 +#endif
 +
 +/* A convenience function to set the filter based on the code. */
 +__LA_DECL int archive_write_add_filter(struct archive *, int filter_code);
 +__LA_DECL int archive_write_add_filter_by_name(struct archive *,
 +		     const char *name);
 +__LA_DECL int archive_write_add_filter_b64encode(struct archive *);
 +__LA_DECL int archive_write_add_filter_bzip2(struct archive *);
 +__LA_DECL int archive_write_add_filter_compress(struct archive *);
 +__LA_DECL int archive_write_add_filter_grzip(struct archive *);
 +__LA_DECL int archive_write_add_filter_gzip(struct archive *);
 +__LA_DECL int archive_write_add_filter_lrzip(struct archive *);
 +__LA_DECL int archive_write_add_filter_lz4(struct archive *);
 +__LA_DECL int archive_write_add_filter_lzip(struct archive *);
 +__LA_DECL int archive_write_add_filter_lzma(struct archive *);
 +__LA_DECL int archive_write_add_filter_lzop(struct archive *);
 +__LA_DECL int archive_write_add_filter_none(struct archive *);
 +__LA_DECL int archive_write_add_filter_program(struct archive *,
 +		     const char *cmd);
 +__LA_DECL int archive_write_add_filter_uuencode(struct archive *);
 +__LA_DECL int archive_write_add_filter_xz(struct archive *);
 +
 +
 +/* A convenience function to set the format based on the code or name. */
 +__LA_DECL int archive_write_set_format(struct archive *, int format_code);
 +__LA_DECL int archive_write_set_format_by_name(struct archive *,
 +		     const char *name);
 +/* To minimize link pollution, use one or more of the following. */
 +__LA_DECL int archive_write_set_format_7zip(struct archive *);
 +__LA_DECL int archive_write_set_format_ar_bsd(struct archive *);
 +__LA_DECL int archive_write_set_format_ar_svr4(struct archive *);
 +__LA_DECL int archive_write_set_format_cpio(struct archive *);
 +__LA_DECL int archive_write_set_format_cpio_newc(struct archive *);
 +__LA_DECL int archive_write_set_format_gnutar(struct archive *);
 +__LA_DECL int archive_write_set_format_iso9660(struct archive *);
 +__LA_DECL int archive_write_set_format_mtree(struct archive *);
 +__LA_DECL int archive_write_set_format_mtree_classic(struct archive *);
 +/* TODO: int archive_write_set_format_old_tar(struct archive *); */
 +__LA_DECL int archive_write_set_format_pax(struct archive *);
 +__LA_DECL int archive_write_set_format_pax_restricted(struct archive *);
 +__LA_DECL int archive_write_set_format_raw(struct archive *);
 +__LA_DECL int archive_write_set_format_shar(struct archive *);
 +__LA_DECL int archive_write_set_format_shar_dump(struct archive *);
 +__LA_DECL int archive_write_set_format_ustar(struct archive *);
 +__LA_DECL int archive_write_set_format_v7tar(struct archive *);
 +__LA_DECL int archive_write_set_format_warc(struct archive *);
 +__LA_DECL int archive_write_set_format_xar(struct archive *);
 +__LA_DECL int archive_write_set_format_zip(struct archive *);
 +__LA_DECL int archive_write_set_format_filter_by_ext(struct archive *a, const char *filename);
 +__LA_DECL int archive_write_set_format_filter_by_ext_def(struct archive *a, const char *filename, const char * def_ext);
 +__LA_DECL int archive_write_zip_set_compression_deflate(struct archive *);
 +__LA_DECL int archive_write_zip_set_compression_store(struct archive *);
 +__LA_DECL int archive_write_open(struct archive *, void *,
 +		     archive_open_callback *, archive_write_callback *,
 +		     archive_close_callback *);
 +__LA_DECL int archive_write_open_fd(struct archive *, int _fd);
 +__LA_DECL int archive_write_open_filename(struct archive *, const char *_file);
 +__LA_DECL int archive_write_open_filename_w(struct archive *,
 +		     const wchar_t *_file);
 +/* A deprecated synonym for archive_write_open_filename() */
 +__LA_DECL int archive_write_open_file(struct archive *, const char *_file)
 +		__LA_DEPRECATED;
 +__LA_DECL int archive_write_open_FILE(struct archive *, FILE *);
 +/* _buffSize is the size of the buffer, _used refers to a variable that
 + * will be updated after each write into the buffer. */
 +__LA_DECL int archive_write_open_memory(struct archive *,
 +			void *_buffer, size_t _buffSize, size_t *_used);
 +
 +/*
 + * Note that the library will truncate writes beyond the size provided
 + * to archive_write_header or pad if the provided data is short.
 + */
 +__LA_DECL int archive_write_header(struct archive *,
 +		     struct archive_entry *);
 +__LA_DECL la_ssize_t	archive_write_data(struct archive *,
 +			    const void *, size_t);
 +
 +/* This interface is currently only available for archive_write_disk handles.  */
 +__LA_DECL la_ssize_t	 archive_write_data_block(struct archive *,
 +				    const void *, size_t, la_int64_t);
 +
 +__LA_DECL int		 archive_write_finish_entry(struct archive *);
 +__LA_DECL int		 archive_write_close(struct archive *);
 +/* Marks the archive as FATAL so that a subsequent free() operation
 + * won't try to close() cleanly.  Provides a fast abort capability
 + * when the client discovers that things have gone wrong. */
 +__LA_DECL int            archive_write_fail(struct archive *);
 +/* This can fail if the archive wasn't already closed, in which case
 + * archive_write_free() will implicitly call archive_write_close(). */
 +__LA_DECL int		 archive_write_free(struct archive *);
 +#if ARCHIVE_VERSION_NUMBER < 4000000
 +/* Synonym for archive_write_free() for backwards compatibility. */
 +__LA_DECL int		 archive_write_finish(struct archive *) __LA_DEPRECATED;
 +#endif
 +
 +/*
 + * Set write options.
 + */
 +/* Apply option to the format only. */
 +__LA_DECL int archive_write_set_format_option(struct archive *_a,
 +			    const char *m, const char *o,
 +			    const char *v);
 +/* Apply option to the filter only. */
 +__LA_DECL int archive_write_set_filter_option(struct archive *_a,
 +			    const char *m, const char *o,
 +			    const char *v);
 +/* Apply option to both the format and the filter. */
 +__LA_DECL int archive_write_set_option(struct archive *_a,
 +			    const char *m, const char *o,
 +			    const char *v);
 +/* Apply option string to both the format and the filter. */
 +__LA_DECL int archive_write_set_options(struct archive *_a,
 +			    const char *opts);
 +
 +/*
 + * Set a encryption passphrase.
 + */
 +__LA_DECL int archive_write_set_passphrase(struct archive *_a, const char *p);
 +__LA_DECL int archive_write_set_passphrase_callback(struct archive *,
 +			    void *client_data, archive_passphrase_callback *);
 +
 +/*-
 + * ARCHIVE_WRITE_DISK API
 + *
 + * To create objects on disk:
 + *   1) Ask archive_write_disk_new for a new archive_write_disk object.
 + *   2) Set any global properties.  In particular, you probably
 + *      want to set the options.
 + *   3) For each entry:
 + *      - construct an appropriate struct archive_entry structure
 + *      - archive_write_header to create the file/dir/etc on disk
 + *      - archive_write_data to write the entry data
 + *   4) archive_write_free to cleanup the writer and release resources
 + *
 + * In particular, you can use this in conjunction with archive_read()
 + * to pull entries out of an archive and create them on disk.
 + */
 +__LA_DECL struct archive	*archive_write_disk_new(void);
 +/* This file will not be overwritten. */
 +__LA_DECL int archive_write_disk_set_skip_file(struct archive *,
 +    la_int64_t, la_int64_t);
 +/* Set flags to control how the next item gets created.
 + * This accepts a bitmask of ARCHIVE_EXTRACT_XXX flags defined above. */
 +__LA_DECL int		 archive_write_disk_set_options(struct archive *,
 +		     int flags);
 +/*
 + * The lookup functions are given uname/uid (or gname/gid) pairs and
 + * return a uid (gid) suitable for this system.  These are used for
 + * restoring ownership and for setting ACLs.  The default functions
 + * are naive, they just return the uid/gid.  These are small, so reasonable
 + * for applications that don't need to preserve ownership; they
 + * are probably also appropriate for applications that are doing
 + * same-system backup and restore.
 + */
 +/*
 + * The "standard" lookup functions use common system calls to lookup
 + * the uname/gname, falling back to the uid/gid if the names can't be
 + * found.  They cache lookups and are reasonably fast, but can be very
 + * large, so they are not used unless you ask for them.  In
 + * particular, these match the specifications of POSIX "pax" and old
 + * POSIX "tar".
 + */
 +__LA_DECL int	 archive_write_disk_set_standard_lookup(struct archive *);
 +/*
 + * If neither the default (naive) nor the standard (big) functions suit
 + * your needs, you can write your own and register them.  Be sure to
 + * include a cleanup function if you have allocated private data.
 + */
 +__LA_DECL int archive_write_disk_set_group_lookup(struct archive *,
 +    void * /* private_data */,
 +    la_int64_t (*)(void *, const char *, la_int64_t),
 +    void (* /* cleanup */)(void *));
 +__LA_DECL int archive_write_disk_set_user_lookup(struct archive *,
 +    void * /* private_data */,
 +    la_int64_t (*)(void *, const char *, la_int64_t),
 +    void (* /* cleanup */)(void *));
 +__LA_DECL la_int64_t archive_write_disk_gid(struct archive *, const char *, la_int64_t);
 +__LA_DECL la_int64_t archive_write_disk_uid(struct archive *, const char *, la_int64_t);
 +
 +/*
 + * ARCHIVE_READ_DISK API
 + *
 + * This is still evolving and somewhat experimental.
 + */
 +__LA_DECL struct archive *archive_read_disk_new(void);
 +/* The names for symlink modes here correspond to an old BSD
 + * command-line argument convention: -L, -P, -H */
 +/* Follow all symlinks. */
 +__LA_DECL int archive_read_disk_set_symlink_logical(struct archive *);
 +/* Follow no symlinks. */
 +__LA_DECL int archive_read_disk_set_symlink_physical(struct archive *);
 +/* Follow symlink initially, then not. */
 +__LA_DECL int archive_read_disk_set_symlink_hybrid(struct archive *);
 +/* TODO: Handle Linux stat32/stat64 ugliness. <sigh> */
 +__LA_DECL int archive_read_disk_entry_from_file(struct archive *,
 +    struct archive_entry *, int /* fd */, const struct stat *);
 +/* Look up gname for gid or uname for uid. */
 +/* Default implementations are very, very stupid. */
 +__LA_DECL const char *archive_read_disk_gname(struct archive *, la_int64_t);
 +__LA_DECL const char *archive_read_disk_uname(struct archive *, la_int64_t);
 +/* "Standard" implementation uses getpwuid_r, getgrgid_r and caches the
 + * results for performance. */
 +__LA_DECL int	archive_read_disk_set_standard_lookup(struct archive *);
 +/* You can install your own lookups if you like. */
 +__LA_DECL int	archive_read_disk_set_gname_lookup(struct archive *,
 +    void * /* private_data */,
 +    const char *(* /* lookup_fn */)(void *, la_int64_t),
 +    void (* /* cleanup_fn */)(void *));
 +__LA_DECL int	archive_read_disk_set_uname_lookup(struct archive *,
 +    void * /* private_data */,
 +    const char *(* /* lookup_fn */)(void *, la_int64_t),
 +    void (* /* cleanup_fn */)(void *));
 +/* Start traversal. */
 +__LA_DECL int	archive_read_disk_open(struct archive *, const char *);
 +__LA_DECL int	archive_read_disk_open_w(struct archive *, const wchar_t *);
 +/*
 + * Request that current entry be visited.  If you invoke it on every
 + * directory, you'll get a physical traversal.  This is ignored if the
 + * current entry isn't a directory or a link to a directory.  So, if
 + * you invoke this on every returned path, you'll get a full logical
 + * traversal.
 + */
 +__LA_DECL int	archive_read_disk_descend(struct archive *);
 +__LA_DECL int	archive_read_disk_can_descend(struct archive *);
 +__LA_DECL int	archive_read_disk_current_filesystem(struct archive *);
 +__LA_DECL int	archive_read_disk_current_filesystem_is_synthetic(struct archive *);
 +__LA_DECL int	archive_read_disk_current_filesystem_is_remote(struct archive *);
- /* Request that the access time of the entry visited by travesal be restored. */
++/* Request that the access time of the entry visited by traversal be restored. */
 +__LA_DECL int  archive_read_disk_set_atime_restored(struct archive *);
 +/*
 + * Set behavior. The "flags" argument selects optional behavior.
 + */
- /* Request that the access time of the entry visited by travesal be restored.
++/* Request that the access time of the entry visited by traversal be restored.
 + * This is the same as archive_read_disk_set_atime_restored. */
 +#define	ARCHIVE_READDISK_RESTORE_ATIME		(0x0001)
 +/* Default: Do not skip an entry which has nodump flags. */
 +#define	ARCHIVE_READDISK_HONOR_NODUMP		(0x0002)
 +/* Default: Skip a mac resource fork file whose prefix is "._" because of
 + * using copyfile. */
 +#define	ARCHIVE_READDISK_MAC_COPYFILE		(0x0004)
 +/* Default: Traverse mount points. */
 +#define	ARCHIVE_READDISK_NO_TRAVERSE_MOUNTS	(0x0008)
 +/* Default: Xattrs are read from disk. */
 +#define	ARCHIVE_READDISK_NO_XATTR		(0x0010)
 +
 +__LA_DECL int  archive_read_disk_set_behavior(struct archive *,
 +		    int flags);
 +
 +/*
 + * Set archive_match object that will be used in archive_read_disk to
 + * know whether an entry should be skipped. The callback function
 + * _excluded_func will be invoked when an entry is skipped by the result
 + * of archive_match.
 + */
 +__LA_DECL int	archive_read_disk_set_matching(struct archive *,
 +		    struct archive *_matching, void (*_excluded_func)
 +		    (struct archive *, void *, struct archive_entry *),
 +		    void *_client_data);
 +__LA_DECL int	archive_read_disk_set_metadata_filter_callback(struct archive *,
 +		    int (*_metadata_filter_func)(struct archive *, void *,
 +		    	struct archive_entry *), void *_client_data);
 +
 +/* Simplified cleanup interface;
 + * This calls archive_read_free() or archive_write_free() as needed. */
 +__LA_DECL int	archive_free(struct archive *);
 +
 +/*
 + * Accessor functions to read/set various information in
 + * the struct archive object:
 + */
 +
 +/* Number of filters in the current filter pipeline. */
 +/* Filter #0 is the one closest to the format, -1 is a synonym for the
 + * last filter, which is always the pseudo-filter that wraps the
 + * client callbacks. */
 +__LA_DECL int		 archive_filter_count(struct archive *);
 +__LA_DECL la_int64_t	 archive_filter_bytes(struct archive *, int);
 +__LA_DECL int		 archive_filter_code(struct archive *, int);
 +__LA_DECL const char *	 archive_filter_name(struct archive *, int);
 +
 +#if ARCHIVE_VERSION_NUMBER < 4000000
 +/* These don't properly handle multiple filters, so are deprecated and
 + * will eventually be removed. */
 +/* As of libarchive 3.0, this is an alias for archive_filter_bytes(a, -1); */
 +__LA_DECL la_int64_t	 archive_position_compressed(struct archive *)
 +				__LA_DEPRECATED;
 +/* As of libarchive 3.0, this is an alias for archive_filter_bytes(a, 0); */
 +__LA_DECL la_int64_t	 archive_position_uncompressed(struct archive *)
 +				__LA_DEPRECATED;
 +/* As of libarchive 3.0, this is an alias for archive_filter_name(a, 0); */
 +__LA_DECL const char	*archive_compression_name(struct archive *)
 +				__LA_DEPRECATED;
 +/* As of libarchive 3.0, this is an alias for archive_filter_code(a, 0); */
 +__LA_DECL int		 archive_compression(struct archive *)
 +				__LA_DEPRECATED;
 +#endif
 +
 +__LA_DECL int		 archive_errno(struct archive *);
 +__LA_DECL const char	*archive_error_string(struct archive *);
 +__LA_DECL const char	*archive_format_name(struct archive *);
 +__LA_DECL int		 archive_format(struct archive *);
 +__LA_DECL void		 archive_clear_error(struct archive *);
 +__LA_DECL void		 archive_set_error(struct archive *, int _err,
 +			    const char *fmt, ...) __LA_PRINTF(3, 4);
 +__LA_DECL void		 archive_copy_error(struct archive *dest,
 +			    struct archive *src);
 +__LA_DECL int		 archive_file_count(struct archive *);
 +
 +/*
 + * ARCHIVE_MATCH API
 + */
 +__LA_DECL struct archive *archive_match_new(void);
 +__LA_DECL int	archive_match_free(struct archive *);
 +
 +/*
 + * Test if archive_entry is excluded.
 + * This is a convenience function. This is the same as calling all
 + * archive_match_path_excluded, archive_match_time_excluded
 + * and archive_match_owner_excluded.
 + */
 +__LA_DECL int	archive_match_excluded(struct archive *,
 +		    struct archive_entry *);
 +
 +/*
 + * Test if pathname is excluded. The conditions are set by following functions.
 + */
 +__LA_DECL int	archive_match_path_excluded(struct archive *,
 +		    struct archive_entry *);
 +/* Add exclusion pathname pattern. */
 +__LA_DECL int	archive_match_exclude_pattern(struct archive *, const char *);
 +__LA_DECL int	archive_match_exclude_pattern_w(struct archive *,
 +		    const wchar_t *);
 +/* Add exclusion pathname pattern from file. */
 +__LA_DECL int	archive_match_exclude_pattern_from_file(struct archive *,
 +		    const char *, int _nullSeparator);
 +__LA_DECL int	archive_match_exclude_pattern_from_file_w(struct archive *,
 +		    const wchar_t *, int _nullSeparator);
 +/* Add inclusion pathname pattern. */
 +__LA_DECL int	archive_match_include_pattern(struct archive *, const char *);
 +__LA_DECL int	archive_match_include_pattern_w(struct archive *,
 +		    const wchar_t *);
 +/* Add inclusion pathname pattern from file. */
 +__LA_DECL int	archive_match_include_pattern_from_file(struct archive *,
 +		    const char *, int _nullSeparator);
 +__LA_DECL int	archive_match_include_pattern_from_file_w(struct archive *,
 +		    const wchar_t *, int _nullSeparator);
 +/*
 + * How to get statistic information for inclusion patterns.
 + */
 +/* Return the amount number of unmatched inclusion patterns. */
 +__LA_DECL int	archive_match_path_unmatched_inclusions(struct archive *);
 +/* Return the pattern of unmatched inclusion with ARCHIVE_OK.
 + * Return ARCHIVE_EOF if there is no inclusion pattern. */
 +__LA_DECL int	archive_match_path_unmatched_inclusions_next(
 +		    struct archive *, const char **);
 +__LA_DECL int	archive_match_path_unmatched_inclusions_next_w(
 +		    struct archive *, const wchar_t **);
 +
 +/*
 + * Test if a file is excluded by its time stamp.
 + * The conditions are set by following functions.
 + */
 +__LA_DECL int	archive_match_time_excluded(struct archive *,
 +		    struct archive_entry *);
 +
 +/*
 + * Flags to tell a matching type of time stamps. These are used for
-  * following functinos.
++ * following functions.
 + */
 +/* Time flag: mtime to be tested. */
 +#define ARCHIVE_MATCH_MTIME	(0x0100)
 +/* Time flag: ctime to be tested. */
 +#define ARCHIVE_MATCH_CTIME	(0x0200)
 +/* Comparison flag: Match the time if it is newer than. */
 +#define ARCHIVE_MATCH_NEWER	(0x0001)
 +/* Comparison flag: Match the time if it is older than. */
 +#define ARCHIVE_MATCH_OLDER	(0x0002)
 +/* Comparison flag: Match the time if it is equal to. */
 +#define ARCHIVE_MATCH_EQUAL	(0x0010)
 +/* Set inclusion time. */
 +__LA_DECL int	archive_match_include_time(struct archive *, int _flag,
 +		    time_t _sec, long _nsec);
 +/* Set inclusion time by a date string. */
 +__LA_DECL int	archive_match_include_date(struct archive *, int _flag,
 +		    const char *_datestr);
 +__LA_DECL int	archive_match_include_date_w(struct archive *, int _flag,
 +		    const wchar_t *_datestr);
- /* Set inclusion time by a particluar file. */
++/* Set inclusion time by a particular file. */
 +__LA_DECL int	archive_match_include_file_time(struct archive *,
 +		    int _flag, const char *_pathname);
 +__LA_DECL int	archive_match_include_file_time_w(struct archive *,
 +		    int _flag, const wchar_t *_pathname);
 +/* Add exclusion entry. */
 +__LA_DECL int	archive_match_exclude_entry(struct archive *,
 +		    int _flag, struct archive_entry *);
 +
 +/*
 + * Test if a file is excluded by its uid ,gid, uname or gname.
 + * The conditions are set by following functions.
 + */
 +__LA_DECL int	archive_match_owner_excluded(struct archive *,
 +		    struct archive_entry *);
 +/* Add inclusion uid, gid, uname and gname. */
 +__LA_DECL int	archive_match_include_uid(struct archive *, la_int64_t);
 +__LA_DECL int	archive_match_include_gid(struct archive *, la_int64_t);
 +__LA_DECL int	archive_match_include_uname(struct archive *, const char *);
 +__LA_DECL int	archive_match_include_uname_w(struct archive *,
 +		    const wchar_t *);
 +__LA_DECL int	archive_match_include_gname(struct archive *, const char *);
 +__LA_DECL int	archive_match_include_gname_w(struct archive *,
 +		    const wchar_t *);
 +
 +/* Utility functions */
 +/* Convenience function to sort a NULL terminated list of strings */
 +__LA_DECL int archive_utility_string_sort(char **);
 +
 +#ifdef __cplusplus
 +}
 +#endif
 +
 +/* These are meaningless outside of this header. */
 +#undef __LA_DECL
 +
 +#endif /* !ARCHIVE_H_INCLUDED */
diff --cc Utilities/cmlibarchive/libarchive/archive_entry.h
index 81cd425,0000000..9427413
mode 100644,000000..100644
--- a/Utilities/cmlibarchive/libarchive/archive_entry.h
+++ b/Utilities/cmlibarchive/libarchive/archive_entry.h
@@@ -1,642 -1,0 +1,681 @@@
 +/*-
 + * Copyright (c) 2003-2008 Tim Kientzle
++ * Copyright (c) 2016 Martin Matuska
 + * All rights reserved.
 + *
 + * Redistribution and use in source and binary forms, with or without
 + * modification, are permitted provided that the following conditions
 + * are met:
 + * 1. Redistributions of source code must retain the above copyright
 + *    notice, this list of conditions and the following disclaimer.
 + * 2. Redistributions in binary form must reproduce the above copyright
 + *    notice, this list of conditions and the following disclaimer in the
 + *    documentation and/or other materials provided with the distribution.
 + *
 + * THIS SOFTWARE IS PROVIDED BY THE AUTHOR(S) ``AS IS'' AND ANY EXPRESS OR
 + * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
 + * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
 + * IN NO EVENT SHALL THE AUTHOR(S) BE LIABLE FOR ANY DIRECT, INDIRECT,
 + * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
 + * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
 + * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
 + * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
 + * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
 + * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
 + *
 + * $FreeBSD: head/lib/libarchive/archive_entry.h 201096 2009-12-28 02:41:27Z kientzle $
 + */
 +
 +#ifndef ARCHIVE_ENTRY_H_INCLUDED
 +#define	ARCHIVE_ENTRY_H_INCLUDED
 +
 +/* Note: Compiler will complain if this does not match archive.h! */
- #define	ARCHIVE_VERSION_NUMBER 3002001
++#define	ARCHIVE_VERSION_NUMBER 3003000
 +
 +/*
 + * Note: archive_entry.h is for use outside of libarchive; the
 + * configuration headers (config.h, archive_platform.h, etc.) are
 + * purely internal.  Do NOT use HAVE_XXX configuration macros to
 + * control the behavior of this header!  If you must conditionalize,
 + * use predefined compiler and/or platform macros.
 + */
 +
 +#include <sys/types.h>
 +#include <stddef.h>  /* for wchar_t */
 +#include <time.h>
 +
 +#if defined(_WIN32) && !defined(__CYGWIN__)
 +#include <windows.h>
 +#endif
 +
 +/* Get a suitable 64-bit integer type. */
 +#if !defined(__LA_INT64_T_DEFINED)
 +# if ARCHIVE_VERSION_NUMBER < 4000000
 +#define __LA_INT64_T la_int64_t
 +# endif
 +#define __LA_INT64_T_DEFINED
 +# if defined(_WIN32) && !defined(__CYGWIN__) && !defined(__WATCOMC__)
 +typedef __int64 la_int64_t;
 +# else
 +#include <unistd.h>
 +#  if defined(_SCO_DS) || defined(__osf__)
 +typedef long long la_int64_t;
 +#  else
 +typedef int64_t la_int64_t;
 +#  endif
 +# endif
 +#endif
 +
 +/* Get a suitable definition for mode_t */
 +#if ARCHIVE_VERSION_NUMBER >= 3999000
 +/* Switch to plain 'int' for libarchive 4.0.  It's less broken than 'mode_t' */
 +# define	__LA_MODE_T	int
 +#elif defined(_WIN32) && !defined(__CYGWIN__) && !defined(__BORLANDC__) && !defined(__WATCOMC__)
 +# define	__LA_MODE_T	unsigned short
 +#else
 +# define	__LA_MODE_T	mode_t
 +#endif
 +
 +/* Large file support for Android */
 +#ifdef __ANDROID__
 +#include "android_lf.h"
 +#endif
 +
 +/*
 + * On Windows, define LIBARCHIVE_STATIC if you're building or using a
 + * .lib.  The default here assumes you're building a DLL.  Only
 + * libarchive source should ever define __LIBARCHIVE_BUILD.
 + */
 +#if ((defined __WIN32__) || (defined _WIN32) || defined(__CYGWIN__)) && (!defined LIBARCHIVE_STATIC)
 +# ifdef __LIBARCHIVE_BUILD
 +#  ifdef __GNUC__
 +#   define __LA_DECL	__attribute__((dllexport)) extern
 +#  else
 +#   define __LA_DECL	__declspec(dllexport)
 +#  endif
 +# else
 +#  ifdef __GNUC__
 +#   define __LA_DECL
 +#  else
 +#   define __LA_DECL	__declspec(dllimport)
 +#  endif
 +# endif
 +#else
 +/* Static libraries on all platforms and shared libraries on non-Windows. */
 +# define __LA_DECL
 +#endif
 +
++#if defined(__GNUC__) && __GNUC__ >= 3 && __GNUC_MINOR__ >= 1
++# define __LA_DEPRECATED __attribute__((deprecated))
++#else
++# define __LA_DEPRECATED
++#endif
++
 +#ifdef __cplusplus
 +extern "C" {
 +#endif
 +
 +/*
 + * Description of an archive entry.
 + *
 + * You can think of this as "struct stat" with some text fields added in.
 + *
 + * TODO: Add "comment", "charset", and possibly other entries that are
 + * supported by "pax interchange" format.  However, GNU, ustar, cpio,
 + * and other variants don't support these features, so they're not an
 + * excruciatingly high priority right now.
 + *
 + * TODO: "pax interchange" format allows essentially arbitrary
 + * key/value attributes to be attached to any entry.  Supporting
 + * such extensions may make this library useful for special
 + * applications (e.g., a package manager could attach special
 + * package-management attributes to each entry).
 + */
 +struct archive;
 +struct archive_entry;
 +
 +/*
 + * File-type constants.  These are returned from archive_entry_filetype()
 + * and passed to archive_entry_set_filetype().
 + *
 + * These values match S_XXX defines on every platform I've checked,
 + * including Windows, AIX, Linux, Solaris, and BSD.  They're
 + * (re)defined here because platforms generally don't define the ones
 + * they don't support.  For example, Windows doesn't define S_IFLNK or
 + * S_IFBLK.  Instead of having a mass of conditional logic and system
 + * checks to define any S_XXX values that aren't supported locally,
 + * I've just defined a new set of such constants so that
 + * libarchive-based applications can manipulate and identify archive
 + * entries properly even if the hosting platform can't store them on
 + * disk.
 + *
 + * These values are also used directly within some portable formats,
 + * such as cpio.  If you find a platform that varies from these, the
 + * correct solution is to leave these alone and translate from these
 + * portable values to platform-native values when entries are read from
 + * or written to disk.
 + */
 +/*
 + * In libarchive 4.0, we can drop the casts here.
 + * They're needed to work around Borland C's broken mode_t.
 + */
 +#define AE_IFMT		((__LA_MODE_T)0170000)
 +#define AE_IFREG	((__LA_MODE_T)0100000)
 +#define AE_IFLNK	((__LA_MODE_T)0120000)
 +#define AE_IFSOCK	((__LA_MODE_T)0140000)
 +#define AE_IFCHR	((__LA_MODE_T)0020000)
 +#define AE_IFBLK	((__LA_MODE_T)0060000)
 +#define AE_IFDIR	((__LA_MODE_T)0040000)
 +#define AE_IFIFO	((__LA_MODE_T)0010000)
 +
 +/*
 + * Basic object manipulation
 + */
 +
 +__LA_DECL struct archive_entry	*archive_entry_clear(struct archive_entry *);
 +/* The 'clone' function does a deep copy; all of the strings are copied too. */
 +__LA_DECL struct archive_entry	*archive_entry_clone(struct archive_entry *);
 +__LA_DECL void			 archive_entry_free(struct archive_entry *);
 +__LA_DECL struct archive_entry	*archive_entry_new(void);
 +
 +/*
 + * This form of archive_entry_new2() will pull character-set
 + * conversion information from the specified archive handle.  The
 + * older archive_entry_new(void) form is equivalent to calling
 + * archive_entry_new2(NULL) and will result in the use of an internal
 + * default character-set conversion.
 + */
 +__LA_DECL struct archive_entry	*archive_entry_new2(struct archive *);
 +
 +/*
 + * Retrieve fields from an archive_entry.
 + *
 + * There are a number of implicit conversions among these fields.  For
 + * example, if a regular string field is set and you read the _w wide
 + * character field, the entry will implicitly convert narrow-to-wide
 + * using the current locale.  Similarly, dev values are automatically
 + * updated when you write devmajor or devminor and vice versa.
 + *
 + * In addition, fields can be "set" or "unset."  Unset string fields
 + * return NULL, non-string fields have _is_set() functions to test
 + * whether they've been set.  You can "unset" a string field by
 + * assigning NULL; non-string fields have _unset() functions to
 + * unset them.
 + *
 + * Note: There is one ambiguity in the above; string fields will
 + * also return NULL when implicit character set conversions fail.
 + * This is usually what you want.
 + */
 +__LA_DECL time_t	 archive_entry_atime(struct archive_entry *);
 +__LA_DECL long		 archive_entry_atime_nsec(struct archive_entry *);
 +__LA_DECL int		 archive_entry_atime_is_set(struct archive_entry *);
 +__LA_DECL time_t	 archive_entry_birthtime(struct archive_entry *);
 +__LA_DECL long		 archive_entry_birthtime_nsec(struct archive_entry *);
 +__LA_DECL int		 archive_entry_birthtime_is_set(struct archive_entry *);
 +__LA_DECL time_t	 archive_entry_ctime(struct archive_entry *);
 +__LA_DECL long		 archive_entry_ctime_nsec(struct archive_entry *);
 +__LA_DECL int		 archive_entry_ctime_is_set(struct archive_entry *);
 +__LA_DECL dev_t		 archive_entry_dev(struct archive_entry *);
 +__LA_DECL int		 archive_entry_dev_is_set(struct archive_entry *);
 +__LA_DECL dev_t		 archive_entry_devmajor(struct archive_entry *);
 +__LA_DECL dev_t		 archive_entry_devminor(struct archive_entry *);
 +__LA_DECL __LA_MODE_T	 archive_entry_filetype(struct archive_entry *);
 +__LA_DECL void		 archive_entry_fflags(struct archive_entry *,
 +			    unsigned long * /* set */,
 +			    unsigned long * /* clear */);
 +__LA_DECL const char	*archive_entry_fflags_text(struct archive_entry *);
 +__LA_DECL la_int64_t	 archive_entry_gid(struct archive_entry *);
 +__LA_DECL const char	*archive_entry_gname(struct archive_entry *);
 +__LA_DECL const char	*archive_entry_gname_utf8(struct archive_entry *);
 +__LA_DECL const wchar_t	*archive_entry_gname_w(struct archive_entry *);
 +__LA_DECL const char	*archive_entry_hardlink(struct archive_entry *);
 +__LA_DECL const char	*archive_entry_hardlink_utf8(struct archive_entry *);
 +__LA_DECL const wchar_t	*archive_entry_hardlink_w(struct archive_entry *);
 +__LA_DECL la_int64_t	 archive_entry_ino(struct archive_entry *);
 +__LA_DECL la_int64_t	 archive_entry_ino64(struct archive_entry *);
 +__LA_DECL int		 archive_entry_ino_is_set(struct archive_entry *);
 +__LA_DECL __LA_MODE_T	 archive_entry_mode(struct archive_entry *);
 +__LA_DECL time_t	 archive_entry_mtime(struct archive_entry *);
 +__LA_DECL long		 archive_entry_mtime_nsec(struct archive_entry *);
 +__LA_DECL int		 archive_entry_mtime_is_set(struct archive_entry *);
 +__LA_DECL unsigned int	 archive_entry_nlink(struct archive_entry *);
 +__LA_DECL const char	*archive_entry_pathname(struct archive_entry *);
 +__LA_DECL const char	*archive_entry_pathname_utf8(struct archive_entry *);
 +__LA_DECL const wchar_t	*archive_entry_pathname_w(struct archive_entry *);
 +__LA_DECL __LA_MODE_T	 archive_entry_perm(struct archive_entry *);
 +__LA_DECL dev_t		 archive_entry_rdev(struct archive_entry *);
 +__LA_DECL dev_t		 archive_entry_rdevmajor(struct archive_entry *);
 +__LA_DECL dev_t		 archive_entry_rdevminor(struct archive_entry *);
 +__LA_DECL const char	*archive_entry_sourcepath(struct archive_entry *);
 +__LA_DECL const wchar_t	*archive_entry_sourcepath_w(struct archive_entry *);
 +__LA_DECL la_int64_t	 archive_entry_size(struct archive_entry *);
 +__LA_DECL int		 archive_entry_size_is_set(struct archive_entry *);
 +__LA_DECL const char	*archive_entry_strmode(struct archive_entry *);
 +__LA_DECL const char	*archive_entry_symlink(struct archive_entry *);
 +__LA_DECL const char	*archive_entry_symlink_utf8(struct archive_entry *);
 +__LA_DECL const wchar_t	*archive_entry_symlink_w(struct archive_entry *);
 +__LA_DECL la_int64_t	 archive_entry_uid(struct archive_entry *);
 +__LA_DECL const char	*archive_entry_uname(struct archive_entry *);
 +__LA_DECL const char	*archive_entry_uname_utf8(struct archive_entry *);
 +__LA_DECL const wchar_t	*archive_entry_uname_w(struct archive_entry *);
 +__LA_DECL int archive_entry_is_data_encrypted(struct archive_entry *);
 +__LA_DECL int archive_entry_is_metadata_encrypted(struct archive_entry *);
 +__LA_DECL int archive_entry_is_encrypted(struct archive_entry *);
 +
 +/*
 + * Set fields in an archive_entry.
 + *
 + * Note: Before libarchive 2.4, there were 'set' and 'copy' versions
 + * of the string setters.  'copy' copied the actual string, 'set' just
 + * stored the pointer.  In libarchive 2.4 and later, strings are
 + * always copied.
 + */
 +
 +__LA_DECL void	archive_entry_set_atime(struct archive_entry *, time_t, long);
 +__LA_DECL void  archive_entry_unset_atime(struct archive_entry *);
 +#if defined(_WIN32) && !defined(__CYGWIN__)
 +__LA_DECL void archive_entry_copy_bhfi(struct archive_entry *, struct _BY_HANDLE_FILE_INFORMATION *);
 +#endif
 +__LA_DECL void	archive_entry_set_birthtime(struct archive_entry *, time_t, long);
 +__LA_DECL void  archive_entry_unset_birthtime(struct archive_entry *);
 +__LA_DECL void	archive_entry_set_ctime(struct archive_entry *, time_t, long);
 +__LA_DECL void  archive_entry_unset_ctime(struct archive_entry *);
 +__LA_DECL void	archive_entry_set_dev(struct archive_entry *, dev_t);
 +__LA_DECL void	archive_entry_set_devmajor(struct archive_entry *, dev_t);
 +__LA_DECL void	archive_entry_set_devminor(struct archive_entry *, dev_t);
 +__LA_DECL void	archive_entry_set_filetype(struct archive_entry *, unsigned int);
 +__LA_DECL void	archive_entry_set_fflags(struct archive_entry *,
 +	    unsigned long /* set */, unsigned long /* clear */);
 +/* Returns pointer to start of first invalid token, or NULL if none. */
 +/* Note that all recognized tokens are processed, regardless. */
 +__LA_DECL const char *archive_entry_copy_fflags_text(struct archive_entry *,
 +	    const char *);
 +__LA_DECL const wchar_t *archive_entry_copy_fflags_text_w(struct archive_entry *,
 +	    const wchar_t *);
 +__LA_DECL void	archive_entry_set_gid(struct archive_entry *, la_int64_t);
 +__LA_DECL void	archive_entry_set_gname(struct archive_entry *, const char *);
 +__LA_DECL void	archive_entry_set_gname_utf8(struct archive_entry *, const char *);
 +__LA_DECL void	archive_entry_copy_gname(struct archive_entry *, const char *);
 +__LA_DECL void	archive_entry_copy_gname_w(struct archive_entry *, const wchar_t *);
 +__LA_DECL int	archive_entry_update_gname_utf8(struct archive_entry *, const char *);
 +__LA_DECL void	archive_entry_set_hardlink(struct archive_entry *, const char *);
 +__LA_DECL void	archive_entry_set_hardlink_utf8(struct archive_entry *, const char *);
 +__LA_DECL void	archive_entry_copy_hardlink(struct archive_entry *, const char *);
 +__LA_DECL void	archive_entry_copy_hardlink_w(struct archive_entry *, const wchar_t *);
 +__LA_DECL int	archive_entry_update_hardlink_utf8(struct archive_entry *, const char *);
 +__LA_DECL void	archive_entry_set_ino(struct archive_entry *, la_int64_t);
 +__LA_DECL void	archive_entry_set_ino64(struct archive_entry *, la_int64_t);
 +__LA_DECL void	archive_entry_set_link(struct archive_entry *, const char *);
 +__LA_DECL void	archive_entry_set_link_utf8(struct archive_entry *, const char *);
 +__LA_DECL void	archive_entry_copy_link(struct archive_entry *, const char *);
 +__LA_DECL void	archive_entry_copy_link_w(struct archive_entry *, const wchar_t *);
 +__LA_DECL int	archive_entry_update_link_utf8(struct archive_entry *, const char *);
 +__LA_DECL void	archive_entry_set_mode(struct archive_entry *, __LA_MODE_T);
 +__LA_DECL void	archive_entry_set_mtime(struct archive_entry *, time_t, long);
 +__LA_DECL void  archive_entry_unset_mtime(struct archive_entry *);
 +__LA_DECL void	archive_entry_set_nlink(struct archive_entry *, unsigned int);
 +__LA_DECL void	archive_entry_set_pathname(struct archive_entry *, const char *);
 +__LA_DECL void	archive_entry_set_pathname_utf8(struct archive_entry *, const char *);
 +__LA_DECL void	archive_entry_copy_pathname(struct archive_entry *, const char *);
 +__LA_DECL void	archive_entry_copy_pathname_w(struct archive_entry *, const wchar_t *);
 +__LA_DECL int	archive_entry_update_pathname_utf8(struct archive_entry *, const char *);
 +__LA_DECL void	archive_entry_set_perm(struct archive_entry *, __LA_MODE_T);
 +__LA_DECL void	archive_entry_set_rdev(struct archive_entry *, dev_t);
 +__LA_DECL void	archive_entry_set_rdevmajor(struct archive_entry *, dev_t);
 +__LA_DECL void	archive_entry_set_rdevminor(struct archive_entry *, dev_t);
 +__LA_DECL void	archive_entry_set_size(struct archive_entry *, la_int64_t);
 +__LA_DECL void	archive_entry_unset_size(struct archive_entry *);
 +__LA_DECL void	archive_entry_copy_sourcepath(struct archive_entry *, const char *);
 +__LA_DECL void	archive_entry_copy_sourcepath_w(struct archive_entry *, const wchar_t *);
 +__LA_DECL void	archive_entry_set_symlink(struct archive_entry *, const char *);
 +__LA_DECL void	archive_entry_set_symlink_utf8(struct archive_entry *, const char *);
 +__LA_DECL void	archive_entry_copy_symlink(struct archive_entry *, const char *);
 +__LA_DECL void	archive_entry_copy_symlink_w(struct archive_entry *, const wchar_t *);
 +__LA_DECL int	archive_entry_update_symlink_utf8(struct archive_entry *, const char *);
 +__LA_DECL void	archive_entry_set_uid(struct archive_entry *, la_int64_t);
 +__LA_DECL void	archive_entry_set_uname(struct archive_entry *, const char *);
 +__LA_DECL void	archive_entry_set_uname_utf8(struct archive_entry *, const char *);
 +__LA_DECL void	archive_entry_copy_uname(struct archive_entry *, const char *);
 +__LA_DECL void	archive_entry_copy_uname_w(struct archive_entry *, const wchar_t *);
 +__LA_DECL int	archive_entry_update_uname_utf8(struct archive_entry *, const char *);
 +__LA_DECL void	archive_entry_set_is_data_encrypted(struct archive_entry *, char is_encrypted);
 +__LA_DECL void	archive_entry_set_is_metadata_encrypted(struct archive_entry *, char is_encrypted);
 +/*
 + * Routines to bulk copy fields to/from a platform-native "struct
 + * stat."  Libarchive used to just store a struct stat inside of each
 + * archive_entry object, but this created issues when trying to
 + * manipulate archives on systems different than the ones they were
 + * created on.
 + *
 + * TODO: On Linux and other LFS systems, provide both stat32 and
 + * stat64 versions of these functions and all of the macro glue so
 + * that archive_entry_stat is magically defined to
 + * archive_entry_stat32 or archive_entry_stat64 as appropriate.
 + */
 +__LA_DECL const struct stat	*archive_entry_stat(struct archive_entry *);
 +__LA_DECL void	archive_entry_copy_stat(struct archive_entry *, const struct stat *);
 +
 +/*
 + * Storage for Mac OS-specific AppleDouble metadata information.
 + * Apple-format tar files store a separate binary blob containing
 + * encoded metadata with ACL, extended attributes, etc.
 + * This provides a place to store that blob.
 + */
 +
 +__LA_DECL const void * archive_entry_mac_metadata(struct archive_entry *, size_t *);
 +__LA_DECL void archive_entry_copy_mac_metadata(struct archive_entry *, const void *, size_t);
 +
 +/*
 + * ACL routines.  This used to simply store and return text-format ACL
 + * strings, but that proved insufficient for a number of reasons:
 + *   = clients need control over uname/uid and gname/gid mappings
 + *   = there are many different ACL text formats
 + *   = would like to be able to read/convert archives containing ACLs
 + *     on platforms that lack ACL libraries
 + *
 + *  This last point, in particular, forces me to implement a reasonably
 + *  complete set of ACL support routines.
 + */
 +
 +/*
 + * Permission bits.
 + */
 +#define	ARCHIVE_ENTRY_ACL_EXECUTE             0x00000001
 +#define	ARCHIVE_ENTRY_ACL_WRITE               0x00000002
 +#define	ARCHIVE_ENTRY_ACL_READ                0x00000004
 +#define	ARCHIVE_ENTRY_ACL_READ_DATA           0x00000008
 +#define	ARCHIVE_ENTRY_ACL_LIST_DIRECTORY      0x00000008
 +#define	ARCHIVE_ENTRY_ACL_WRITE_DATA          0x00000010
 +#define	ARCHIVE_ENTRY_ACL_ADD_FILE            0x00000010
 +#define	ARCHIVE_ENTRY_ACL_APPEND_DATA         0x00000020
 +#define	ARCHIVE_ENTRY_ACL_ADD_SUBDIRECTORY    0x00000020
 +#define	ARCHIVE_ENTRY_ACL_READ_NAMED_ATTRS    0x00000040
 +#define	ARCHIVE_ENTRY_ACL_WRITE_NAMED_ATTRS   0x00000080
 +#define	ARCHIVE_ENTRY_ACL_DELETE_CHILD        0x00000100
 +#define	ARCHIVE_ENTRY_ACL_READ_ATTRIBUTES     0x00000200
 +#define	ARCHIVE_ENTRY_ACL_WRITE_ATTRIBUTES    0x00000400
 +#define	ARCHIVE_ENTRY_ACL_DELETE              0x00000800
 +#define	ARCHIVE_ENTRY_ACL_READ_ACL            0x00001000
 +#define	ARCHIVE_ENTRY_ACL_WRITE_ACL           0x00002000
 +#define	ARCHIVE_ENTRY_ACL_WRITE_OWNER         0x00004000
 +#define	ARCHIVE_ENTRY_ACL_SYNCHRONIZE         0x00008000
 +
 +#define	ARCHIVE_ENTRY_ACL_PERMS_POSIX1E			\
 +	(ARCHIVE_ENTRY_ACL_EXECUTE			\
 +	    | ARCHIVE_ENTRY_ACL_WRITE			\
 +	    | ARCHIVE_ENTRY_ACL_READ)
 +
 +#define ARCHIVE_ENTRY_ACL_PERMS_NFS4			\
 +	(ARCHIVE_ENTRY_ACL_EXECUTE			\
 +	    | ARCHIVE_ENTRY_ACL_READ_DATA		\
 +	    | ARCHIVE_ENTRY_ACL_LIST_DIRECTORY 		\
 +	    | ARCHIVE_ENTRY_ACL_WRITE_DATA		\
 +	    | ARCHIVE_ENTRY_ACL_ADD_FILE		\
 +	    | ARCHIVE_ENTRY_ACL_APPEND_DATA		\
 +	    | ARCHIVE_ENTRY_ACL_ADD_SUBDIRECTORY	\
 +	    | ARCHIVE_ENTRY_ACL_READ_NAMED_ATTRS	\
 +	    | ARCHIVE_ENTRY_ACL_WRITE_NAMED_ATTRS	\
 +	    | ARCHIVE_ENTRY_ACL_DELETE_CHILD		\
 +	    | ARCHIVE_ENTRY_ACL_READ_ATTRIBUTES		\
 +	    | ARCHIVE_ENTRY_ACL_WRITE_ATTRIBUTES	\
 +	    | ARCHIVE_ENTRY_ACL_DELETE			\
 +	    | ARCHIVE_ENTRY_ACL_READ_ACL		\
 +	    | ARCHIVE_ENTRY_ACL_WRITE_ACL		\
 +	    | ARCHIVE_ENTRY_ACL_WRITE_OWNER		\
 +	    | ARCHIVE_ENTRY_ACL_SYNCHRONIZE)
 +
 +/*
 + * Inheritance values (NFS4 ACLs only); included in permset.
 + */
++#define	ARCHIVE_ENTRY_ACL_ENTRY_INHERITED                   0x01000000
 +#define	ARCHIVE_ENTRY_ACL_ENTRY_FILE_INHERIT                0x02000000
 +#define	ARCHIVE_ENTRY_ACL_ENTRY_DIRECTORY_INHERIT           0x04000000
 +#define	ARCHIVE_ENTRY_ACL_ENTRY_NO_PROPAGATE_INHERIT        0x08000000
 +#define	ARCHIVE_ENTRY_ACL_ENTRY_INHERIT_ONLY                0x10000000
 +#define	ARCHIVE_ENTRY_ACL_ENTRY_SUCCESSFUL_ACCESS           0x20000000
 +#define	ARCHIVE_ENTRY_ACL_ENTRY_FAILED_ACCESS               0x40000000
 +
 +#define	ARCHIVE_ENTRY_ACL_INHERITANCE_NFS4			\
 +	(ARCHIVE_ENTRY_ACL_ENTRY_FILE_INHERIT			\
 +	    | ARCHIVE_ENTRY_ACL_ENTRY_DIRECTORY_INHERIT		\
 +	    | ARCHIVE_ENTRY_ACL_ENTRY_NO_PROPAGATE_INHERIT	\
 +	    | ARCHIVE_ENTRY_ACL_ENTRY_INHERIT_ONLY		\
 +	    | ARCHIVE_ENTRY_ACL_ENTRY_SUCCESSFUL_ACCESS		\
- 	    | ARCHIVE_ENTRY_ACL_ENTRY_FAILED_ACCESS)
++	    | ARCHIVE_ENTRY_ACL_ENTRY_FAILED_ACCESS		\
++	    | ARCHIVE_ENTRY_ACL_ENTRY_INHERITED)
 +
 +/* We need to be able to specify combinations of these. */
- #define	ARCHIVE_ENTRY_ACL_TYPE_ACCESS	256  /* POSIX.1e only */
- #define	ARCHIVE_ENTRY_ACL_TYPE_DEFAULT	512  /* POSIX.1e only */
- #define	ARCHIVE_ENTRY_ACL_TYPE_ALLOW	1024 /* NFS4 only */
- #define	ARCHIVE_ENTRY_ACL_TYPE_DENY	2048 /* NFS4 only */
- #define	ARCHIVE_ENTRY_ACL_TYPE_AUDIT	4096 /* NFS4 only */
- #define	ARCHIVE_ENTRY_ACL_TYPE_ALARM	8192 /* NFS4 only */
++#define	ARCHIVE_ENTRY_ACL_TYPE_ACCESS	0x00000100  /* POSIX.1e only */
++#define	ARCHIVE_ENTRY_ACL_TYPE_DEFAULT	0x00000200  /* POSIX.1e only */
++#define	ARCHIVE_ENTRY_ACL_TYPE_ALLOW	0x00000400 /* NFS4 only */
++#define	ARCHIVE_ENTRY_ACL_TYPE_DENY	0x00000800 /* NFS4 only */
++#define	ARCHIVE_ENTRY_ACL_TYPE_AUDIT	0x00001000 /* NFS4 only */
++#define	ARCHIVE_ENTRY_ACL_TYPE_ALARM	0x00002000 /* NFS4 only */
 +#define	ARCHIVE_ENTRY_ACL_TYPE_POSIX1E	(ARCHIVE_ENTRY_ACL_TYPE_ACCESS \
 +	    | ARCHIVE_ENTRY_ACL_TYPE_DEFAULT)
 +#define	ARCHIVE_ENTRY_ACL_TYPE_NFS4	(ARCHIVE_ENTRY_ACL_TYPE_ALLOW \
 +	    | ARCHIVE_ENTRY_ACL_TYPE_DENY \
 +	    | ARCHIVE_ENTRY_ACL_TYPE_AUDIT \
 +	    | ARCHIVE_ENTRY_ACL_TYPE_ALARM)
 +
 +/* Tag values mimic POSIX.1e */
 +#define	ARCHIVE_ENTRY_ACL_USER		10001	/* Specified user. */
 +#define	ARCHIVE_ENTRY_ACL_USER_OBJ 	10002	/* User who owns the file. */
 +#define	ARCHIVE_ENTRY_ACL_GROUP		10003	/* Specified group. */
 +#define	ARCHIVE_ENTRY_ACL_GROUP_OBJ	10004	/* Group who owns the file. */
 +#define	ARCHIVE_ENTRY_ACL_MASK		10005	/* Modify group access (POSIX.1e only) */
 +#define	ARCHIVE_ENTRY_ACL_OTHER		10006	/* Public (POSIX.1e only) */
 +#define	ARCHIVE_ENTRY_ACL_EVERYONE	10107   /* Everyone (NFS4 only) */
 +
 +/*
 + * Set the ACL by clearing it and adding entries one at a time.
 + * Unlike the POSIX.1e ACL routines, you must specify the type
 + * (access/default) for each entry.  Internally, the ACL data is just
 + * a soup of entries.  API calls here allow you to retrieve just the
 + * entries of interest.  This design (which goes against the spirit of
 + * POSIX.1e) is useful for handling archive formats that combine
 + * default and access information in a single ACL list.
 + */
 +__LA_DECL void	 archive_entry_acl_clear(struct archive_entry *);
 +__LA_DECL int	 archive_entry_acl_add_entry(struct archive_entry *,
 +	    int /* type */, int /* permset */, int /* tag */,
 +	    int /* qual */, const char * /* name */);
 +__LA_DECL int	 archive_entry_acl_add_entry_w(struct archive_entry *,
 +	    int /* type */, int /* permset */, int /* tag */,
 +	    int /* qual */, const wchar_t * /* name */);
 +
 +/*
 + * To retrieve the ACL, first "reset", then repeatedly ask for the
 + * "next" entry.  The want_type parameter allows you to request only
 + * certain types of entries.
 + */
 +__LA_DECL int	 archive_entry_acl_reset(struct archive_entry *, int /* want_type */);
 +__LA_DECL int	 archive_entry_acl_next(struct archive_entry *, int /* want_type */,
 +	    int * /* type */, int * /* permset */, int * /* tag */,
 +	    int * /* qual */, const char ** /* name */);
 +__LA_DECL int	 archive_entry_acl_next_w(struct archive_entry *, int /* want_type */,
 +	    int * /* type */, int * /* permset */, int * /* tag */,
 +	    int * /* qual */, const wchar_t ** /* name */);
 +
 +/*
 + * Construct a text-format ACL.  The flags argument is a bitmask that
 + * can include any of the following:
 + *
++ * Flags only for archive entries with POSIX.1e ACL:
 + * ARCHIVE_ENTRY_ACL_TYPE_ACCESS - Include POSIX.1e "access" entries.
 + * ARCHIVE_ENTRY_ACL_TYPE_DEFAULT - Include POSIX.1e "default" entries.
-  * ARCHIVE_ENTRY_ACL_TYPE_NFS4 - Include NFS4 entries.
-  * ARCHIVE_ENTRY_ACL_STYLE_EXTRA_ID - Include extra numeric ID field in
-  *    each ACL entry.  ('star' introduced this for POSIX.1e, this flag
-  *    also applies to NFS4.)
 + * ARCHIVE_ENTRY_ACL_STYLE_MARK_DEFAULT - Include "default:" before each
-  *    default ACL entry, as used in old Solaris ACLs.
++ *    default ACL entry.
++ * ARCHIVE_ENTRY_ACL_STYLE_SOLARIS - Output only one colon after "other" and
++ *    "mask" entries.
++ *
++ * Flags only for archive entries with NFSv4 ACL:
++ * ARCHIVE_ENTRY_ACL_STYLE_COMPACT - Do not output the minus character for
++ *    unset permissions and flags in NFSv4 ACL permission and flag fields
++ *
++ * Flags for for archive entries with POSIX.1e ACL or NFSv4 ACL:
++ * ARCHIVE_ENTRY_ACL_STYLE_EXTRA_ID - Include extra numeric ID field in
++ *    each ACL entry.
++ * ARCHIVE_ENTRY_ACL_STYLE_SEPARATOR_COMMA - Separate entries with comma
++ *    instead of newline.
 + */
- #define	ARCHIVE_ENTRY_ACL_STYLE_EXTRA_ID	1024
- #define	ARCHIVE_ENTRY_ACL_STYLE_MARK_DEFAULT	2048
++#define	ARCHIVE_ENTRY_ACL_STYLE_EXTRA_ID	0x00000001
++#define	ARCHIVE_ENTRY_ACL_STYLE_MARK_DEFAULT	0x00000002
++#define	ARCHIVE_ENTRY_ACL_STYLE_SOLARIS		0x00000004
++#define	ARCHIVE_ENTRY_ACL_STYLE_SEPARATOR_COMMA	0x00000008
++#define	ARCHIVE_ENTRY_ACL_STYLE_COMPACT		0x00000010
++
++__LA_DECL wchar_t *archive_entry_acl_to_text_w(struct archive_entry *,
++	    ssize_t * /* len */, int /* flags */);
++__LA_DECL char *archive_entry_acl_to_text(struct archive_entry *,
++	    ssize_t * /* len */, int /* flags */);
++__LA_DECL int archive_entry_acl_from_text_w(struct archive_entry *,
++	    const wchar_t * /* wtext */, int /* type */);
++__LA_DECL int archive_entry_acl_from_text(struct archive_entry *,
++	    const char * /* text */, int /* type */);
++
++/* Deprecated constants */
++#define	OLD_ARCHIVE_ENTRY_ACL_STYLE_EXTRA_ID		1024
++#define	OLD_ARCHIVE_ENTRY_ACL_STYLE_MARK_DEFAULT	2048
++
++/* Deprecated functions */
 +__LA_DECL const wchar_t	*archive_entry_acl_text_w(struct archive_entry *,
- 		    int /* flags */);
++		    int /* flags */) __LA_DEPRECATED;
 +__LA_DECL const char *archive_entry_acl_text(struct archive_entry *,
- 		    int /* flags */);
++		    int /* flags */) __LA_DEPRECATED;
++
++/* Return bitmask of ACL types in an archive entry */
++__LA_DECL int	 archive_entry_acl_types(struct archive_entry *);
 +
 +/* Return a count of entries matching 'want_type' */
 +__LA_DECL int	 archive_entry_acl_count(struct archive_entry *, int /* want_type */);
 +
 +/* Return an opaque ACL object. */
 +/* There's not yet anything clients can actually do with this... */
 +struct archive_acl;
 +__LA_DECL struct archive_acl *archive_entry_acl(struct archive_entry *);
 +
 +/*
 + * extended attributes
 + */
 +
 +__LA_DECL void	 archive_entry_xattr_clear(struct archive_entry *);
 +__LA_DECL void	 archive_entry_xattr_add_entry(struct archive_entry *,
 +	    const char * /* name */, const void * /* value */,
 +	    size_t /* size */);
 +
 +/*
 + * To retrieve the xattr list, first "reset", then repeatedly ask for the
 + * "next" entry.
 + */
 +
 +__LA_DECL int	archive_entry_xattr_count(struct archive_entry *);
 +__LA_DECL int	archive_entry_xattr_reset(struct archive_entry *);
 +__LA_DECL int	archive_entry_xattr_next(struct archive_entry *,
 +	    const char ** /* name */, const void ** /* value */, size_t *);
 +
 +/*
 + * sparse
 + */
 +
 +__LA_DECL void	 archive_entry_sparse_clear(struct archive_entry *);
 +__LA_DECL void	 archive_entry_sparse_add_entry(struct archive_entry *,
 +	    la_int64_t /* offset */, la_int64_t /* length */);
 +
 +/*
 + * To retrieve the xattr list, first "reset", then repeatedly ask for the
 + * "next" entry.
 + */
 +
 +__LA_DECL int	archive_entry_sparse_count(struct archive_entry *);
 +__LA_DECL int	archive_entry_sparse_reset(struct archive_entry *);
 +__LA_DECL int	archive_entry_sparse_next(struct archive_entry *,
 +	    la_int64_t * /* offset */, la_int64_t * /* length */);
 +
 +/*
 + * Utility to match up hardlinks.
 + *
 + * The 'struct archive_entry_linkresolver' is a cache of archive entries
 + * for files with multiple links.  Here's how to use it:
 + *   1. Create a lookup object with archive_entry_linkresolver_new()
 + *   2. Tell it the archive format you're using.
 + *   3. Hand each archive_entry to archive_entry_linkify().
 + *      That function will return 0, 1, or 2 entries that should
 + *      be written.
 + *   4. Call archive_entry_linkify(resolver, NULL) until
 + *      no more entries are returned.
 + *   5. Call archive_entry_linkresolver_free(resolver) to free resources.
 + *
 + * The entries returned have their hardlink and size fields updated
 + * appropriately.  If an entry is passed in that does not refer to
 + * a file with multiple links, it is returned unchanged.  The intention
 + * is that you should be able to simply filter all entries through
 + * this machine.
 + *
 + * To make things more efficient, be sure that each entry has a valid
 + * nlinks value.  The hardlink cache uses this to track when all links
 + * have been found.  If the nlinks value is zero, it will keep every
 + * name in the cache indefinitely, which can use a lot of memory.
 + *
 + * Note that archive_entry_size() is reset to zero if the file
 + * body should not be written to the archive.  Pay attention!
 + */
 +struct archive_entry_linkresolver;
 +
 +/*
 + * There are three different strategies for marking hardlinks.
 + * The descriptions below name them after the best-known
 + * formats that rely on each strategy:
 + *
 + * "Old cpio" is the simplest, it always returns any entry unmodified.
 + *    As far as I know, only cpio formats use this.  Old cpio archives
 + *    store every link with the full body; the onus is on the dearchiver
 + *    to detect and properly link the files as they are restored.
 + * "tar" is also pretty simple; it caches a copy the first time it sees
 + *    any link.  Subsequent appearances are modified to be hardlink
 + *    references to the first one without any body.  Used by all tar
 + *    formats, although the newest tar formats permit the "old cpio" strategy
 + *    as well.  This strategy is very simple for the dearchiver,
 + *    and reasonably straightforward for the archiver.
 + * "new cpio" is trickier.  It stores the body only with the last
 + *    occurrence.  The complication is that we might not
 + *    see every link to a particular file in a single session, so
 + *    there's no easy way to know when we've seen the last occurrence.
 + *    The solution here is to queue one link until we see the next.
 + *    At the end of the session, you can enumerate any remaining
 + *    entries by calling archive_entry_linkify(NULL) and store those
 + *    bodies.  If you have a file with three links l1, l2, and l3,
 + *    you'll get the following behavior if you see all three links:
 + *           linkify(l1) => NULL   (the resolver stores l1 internally)
 + *           linkify(l2) => l1     (resolver stores l2, you write l1)
 + *           linkify(l3) => l2, l3 (all links seen, you can write both).
 + *    If you only see l1 and l2, you'll get this behavior:
 + *           linkify(l1) => NULL
 + *           linkify(l2) => l1
 + *           linkify(NULL) => l2   (at end, you retrieve remaining links)
 + *    As the name suggests, this strategy is used by newer cpio variants.
 + *    It's noticeably more complex for the archiver, slightly more complex
 + *    for the dearchiver than the tar strategy, but makes it straightforward
 + *    to restore a file using any link by simply continuing to scan until
 + *    you see a link that is stored with a body.  In contrast, the tar
 + *    strategy requires you to rescan the archive from the beginning to
 + *    correctly extract an arbitrary link.
 + */
 +
 +__LA_DECL struct archive_entry_linkresolver *archive_entry_linkresolver_new(void);
 +__LA_DECL void archive_entry_linkresolver_set_strategy(
 +	struct archive_entry_linkresolver *, int /* format_code */);
 +__LA_DECL void archive_entry_linkresolver_free(struct archive_entry_linkresolver *);
 +__LA_DECL void archive_entry_linkify(struct archive_entry_linkresolver *,
 +    struct archive_entry **, struct archive_entry **);
 +__LA_DECL struct archive_entry *archive_entry_partial_links(
 +    struct archive_entry_linkresolver *res, unsigned int *links);
 +
 +#ifdef __cplusplus
 +}
 +#endif
 +
 +/* This is meaningless outside of this header. */
 +#undef __LA_DECL
 +
 +#endif /* !ARCHIVE_ENTRY_H_INCLUDED */
diff --cc Utilities/cmlibarchive/libarchive/archive_platform.h
index 08a384c,0000000..47d144b
mode 100644,000000..100644
--- a/Utilities/cmlibarchive/libarchive/archive_platform.h
+++ b/Utilities/cmlibarchive/libarchive/archive_platform.h
@@@ -1,188 -1,0 +1,214 @@@
 +/*-
 + * Copyright (c) 2003-2007 Tim Kientzle
 + * All rights reserved.
 + *
 + * Redistribution and use in source and binary forms, with or without
 + * modification, are permitted provided that the following conditions
 + * are met:
 + * 1. Redistributions of source code must retain the above copyright
 + *    notice, this list of conditions and the following disclaimer.
 + * 2. Redistributions in binary form must reproduce the above copyright
 + *    notice, this list of conditions and the following disclaimer in the
 + *    documentation and/or other materials provided with the distribution.
 + *
 + * THIS SOFTWARE IS PROVIDED BY THE AUTHOR(S) ``AS IS'' AND ANY EXPRESS OR
 + * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
 + * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
 + * IN NO EVENT SHALL THE AUTHOR(S) BE LIABLE FOR ANY DIRECT, INDIRECT,
 + * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
 + * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
 + * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
 + * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
 + * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
 + * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
 + *
 + * $FreeBSD: head/lib/libarchive/archive_platform.h 201090 2009-12-28 02:22:04Z kientzle $
 + */
 +
 +/* !!ONLY FOR USE INTERNALLY TO LIBARCHIVE!! */
 +
 +/*
 + * This header is the first thing included in any of the libarchive
 + * source files.  As far as possible, platform-specific issues should
 + * be dealt with here and not within individual source files.  I'm
 + * actively trying to minimize #if blocks within the main source,
 + * since they obfuscate the code.
 + */
 +
 +#ifndef ARCHIVE_PLATFORM_H_INCLUDED
 +#define	ARCHIVE_PLATFORM_H_INCLUDED
 +
 +/* archive.h and archive_entry.h require this. */
 +#define	__LIBARCHIVE_BUILD 1
 +
 +#if defined(PLATFORM_CONFIG_H)
 +/* Use hand-built config.h in environments that need it. */
 +#include PLATFORM_CONFIG_H
 +#elif defined(HAVE_CONFIG_H)
 +/* Most POSIX platforms use the 'configure' script to build config.h */
 +#include "config.h"
 +#else
 +/* Warn if the library hasn't been (automatically or manually) configured. */
 +#error Oops: No config.h and no pre-built configuration in archive_platform.h.
 +#endif
 +
 +/* It should be possible to get rid of this by extending the feature-test
 + * macros to cover Windows API functions, probably along with non-trivial
 + * refactoring of code to find structures that sit more cleanly on top of
 + * either Windows or Posix APIs. */
 +#if (defined(__WIN32__) || defined(_WIN32) || defined(__WIN32)) && !defined(__CYGWIN__)
 +#include "archive_windows.h"
 +#endif
 +
 +/*
 + * The config files define a lot of feature macros.  The following
 + * uses those macros to select/define replacements and include key
 + * headers as required.
 + */
 +
 +/* Get a real definition for __FBSDID or __RCSID if we can */
 +#if HAVE_SYS_CDEFS_H
 +#include <sys/cdefs.h>
 +#endif
 +
 +/* If not, define them so as to avoid dangling semicolons. */
 +#ifndef __FBSDID
 +#define	__FBSDID(a)     struct _undefined_hack
 +#endif
 +#ifndef __RCSID
 +#define	__RCSID(a)     struct _undefined_hack
 +#endif
 +
 +/* Old glibc mbsnrtowcs fails assertions in our use case.  */
 +#if defined(__GLIBC__) && __GLIBC__ == 2 && __GLIBC_MINOR__ <= 1
 +# undef HAVE_MBSNRTOWCS
 +#endif
 +
 +/* Try to get standard C99-style integer type definitions. */
 +#if HAVE_INTTYPES_H
 +#include <inttypes.h>
 +#endif
 +#if HAVE_STDINT_H
 +#include <stdint.h>
 +#endif
 +
 +/* Borland warns about its own constants!  */
 +#if defined(__BORLANDC__)
 +# if HAVE_DECL_UINT64_MAX
 +#  undef	UINT64_MAX
 +#  undef	HAVE_DECL_UINT64_MAX
 +# endif
 +# if HAVE_DECL_UINT64_MIN
 +#  undef	UINT64_MIN
 +#  undef	HAVE_DECL_UINT64_MIN
 +# endif
 +# if HAVE_DECL_INT64_MAX
 +#  undef	INT64_MAX
 +#  undef	HAVE_DECL_INT64_MAX
 +# endif
 +# if HAVE_DECL_INT64_MIN
 +#  undef	INT64_MIN
 +#  undef	HAVE_DECL_INT64_MIN
 +# endif
 +#endif
 +
 +/* Some platforms lack the standard *_MAX definitions. */
 +#if !HAVE_DECL_SIZE_MAX
 +#define	SIZE_MAX (~(size_t)0)
 +#endif
 +#if !HAVE_DECL_SSIZE_MAX
 +#define	SSIZE_MAX ((ssize_t)(SIZE_MAX >> 1))
 +#endif
 +#if !HAVE_DECL_UINT32_MAX
 +#define	UINT32_MAX (~(uint32_t)0)
 +#endif
 +#if !HAVE_DECL_INT32_MAX
 +#define	INT32_MAX ((int32_t)(UINT32_MAX >> 1))
 +#endif
 +#if !HAVE_DECL_INT32_MIN
 +#define	INT32_MIN ((int32_t)(~INT32_MAX))
 +#endif
 +#if !HAVE_DECL_UINT64_MAX
 +#define	UINT64_MAX (~(uint64_t)0)
 +#endif
 +#if !HAVE_DECL_INT64_MAX
 +#define	INT64_MAX ((int64_t)(UINT64_MAX >> 1))
 +#endif
 +#if !HAVE_DECL_INT64_MIN
 +#define	INT64_MIN ((int64_t)(~INT64_MAX))
 +#endif
 +#if !HAVE_DECL_UINTMAX_MAX
 +#define	UINTMAX_MAX (~(uintmax_t)0)
 +#endif
 +#if !HAVE_DECL_INTMAX_MAX
 +#define	INTMAX_MAX ((intmax_t)(UINTMAX_MAX >> 1))
 +#endif
 +#if !HAVE_DECL_INTMAX_MIN
 +#define	INTMAX_MIN ((intmax_t)(~INTMAX_MAX))
 +#endif
 +
 +/*
 + * If this platform has <sys/acl.h>, acl_create(), acl_init(),
 + * acl_set_file(), and ACL_USER, we assume it has the rest of the
 + * POSIX.1e draft functions used in archive_read_extract.c.
 + */
- #if HAVE_SYS_ACL_H && HAVE_ACL_CREATE_ENTRY && HAVE_ACL_INIT && HAVE_ACL_SET_FILE && HAVE_ACL_USER
++#if HAVE_SYS_ACL_H && HAVE_ACL_CREATE_ENTRY && HAVE_ACL_INIT && HAVE_ACL_SET_FILE
++#if HAVE_ACL_USER
 +#define	HAVE_POSIX_ACL	1
++#elif HAVE_ACL_TYPE_EXTENDED
++#define HAVE_DARWIN_ACL 1
++#endif
++#endif
++
++/*
++ * If this platform has <sys/acl.h>, acl_get(), facl_get(), acl_set(),
++ * facl_set() and types aclent_t and ace_t it uses Solaris-style ACL functions
++ */
++#if HAVE_SYS_ACL_H && HAVE_ACL_GET && HAVE_FACL_GET && HAVE_ACL_SET && HAVE_FACL_SET && HAVE_ACLENT_T && HAVE_ACE_T
++#define	HAVE_SUN_ACL	1
++#endif
++
++/* Define if platform supports NFSv4 ACLs */
++#if (HAVE_POSIX_ACL && HAVE_ACL_TYPE_NFS4) || HAVE_SUN_ACL || HAVE_DARWIN_ACL
++#define HAVE_NFS4_ACL	1
 +#endif
 +
 +/*
 + * If we can't restore metadata using a file descriptor, then
 + * for compatibility's sake, close files before trying to restore metadata.
 + */
 +#if defined(HAVE_FCHMOD) || defined(HAVE_FUTIMES) || defined(HAVE_ACL_SET_FD) || defined(HAVE_ACL_SET_FD_NP) || defined(HAVE_FCHOWN)
 +#define	CAN_RESTORE_METADATA_FD
 +#endif
 +
++/*
++ * glibc 2.24 deprecates readdir_r
++ */
++#if defined(HAVE_READDIR_R) && (!defined(__GLIBC__) || !defined(__GLIBC_MINOR__) || __GLIBC__ < 2 || (__GLIBC__ == 2 && __GLIBC_MINOR__ < 24))
++#define	USE_READDIR_R	1
++#else
++#undef	USE_READDIR_R
++#endif
++
 +/* Set up defaults for internal error codes. */
 +#ifndef ARCHIVE_ERRNO_FILE_FORMAT
 +#if HAVE_EFTYPE
 +#define	ARCHIVE_ERRNO_FILE_FORMAT EFTYPE
 +#else
 +#if HAVE_EILSEQ
 +#define	ARCHIVE_ERRNO_FILE_FORMAT EILSEQ
 +#else
 +#define	ARCHIVE_ERRNO_FILE_FORMAT EINVAL
 +#endif
 +#endif
 +#endif
 +
 +#ifndef ARCHIVE_ERRNO_PROGRAMMER
 +#define	ARCHIVE_ERRNO_PROGRAMMER EINVAL
 +#endif
 +
 +#ifndef ARCHIVE_ERRNO_MISC
 +#define	ARCHIVE_ERRNO_MISC (-1)
 +#endif
 +
 +#endif /* !ARCHIVE_PLATFORM_H_INCLUDED */
diff --cc Utilities/cmlibarchive/libarchive/archive_read_support_filter_lzop.c
index 23c18c7,0000000..4356b82
mode 100644,000000..100644
--- a/Utilities/cmlibarchive/libarchive/archive_read_support_filter_lzop.c
+++ b/Utilities/cmlibarchive/libarchive/archive_read_support_filter_lzop.c
@@@ -1,494 -1,0 +1,494 @@@
 +/*-
 + * Copyright (c) 2003-2007 Tim Kientzle
 + * Copyright (c) 2012 Michihiro NAKAJIMA
 + * All rights reserved.
 + *
 + * Redistribution and use in source and binary forms, with or without
 + * modification, are permitted provided that the following conditions
 + * are met:
 + * 1. Redistributions of source code must retain the above copyright
 + *    notice, this list of conditions and the following disclaimer.
 + * 2. Redistributions in binary form must reproduce the above copyright
 + *    notice, this list of conditions and the following disclaimer in the
 + *    documentation and/or other materials provided with the distribution.
 + *
 + * THIS SOFTWARE IS PROVIDED BY THE AUTHOR(S) ``AS IS'' AND ANY EXPRESS OR
 + * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
 + * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
 + * IN NO EVENT SHALL THE AUTHOR(S) BE LIABLE FOR ANY DIRECT, INDIRECT,
 + * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
 + * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
 + * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
 + * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
 + * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
 + * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
 + */
 +
 +#include "archive_platform.h"
 +
 +__FBSDID("$FreeBSD$");
 +
 +#ifdef HAVE_UNISTD_H
 +#include <unistd.h>
 +#endif
 +#ifdef HAVE_ERRNO_H
 +#include <errno.h>
 +#endif
 +#ifdef HAVE_STDLIB_H
 +#include <stdlib.h>
 +#endif
 +#ifdef HAVE_STRING_H
 +#include <string.h>
 +#endif
 +#ifdef HAVE_UNISTD_H
 +#include <unistd.h>
 +#endif
 +#ifdef HAVE_LZO_LZOCONF_H
 +#include <lzo/lzoconf.h>
 +#endif
 +#ifdef HAVE_LZO_LZO1X_H
 +#include <lzo/lzo1x.h>
 +#endif
 +#ifdef HAVE_ZLIB_H
 +#include <cm_zlib.h> /* for crc32 and adler32 */
 +#endif
 +
 +#include "archive.h"
 +#if !defined(HAVE_ZLIB_H) &&\
 +     defined(HAVE_LZO_LZOCONF_H) && defined(HAVE_LZO_LZO1X_H)
 +#include "archive_crc32.h"
 +#endif
 +#include "archive_endian.h"
 +#include "archive_private.h"
 +#include "archive_read_private.h"
 +
 +#ifndef HAVE_ZLIB_H
 +#define adler32	lzo_adler32
 +#endif
 +
 +#define LZOP_HEADER_MAGIC "\x89\x4c\x5a\x4f\x00\x0d\x0a\x1a\x0a"
 +#define LZOP_HEADER_MAGIC_LEN 9
 +
 +#if defined(HAVE_LZO_LZOCONF_H) && defined(HAVE_LZO_LZO1X_H)
 +struct read_lzop {
 +	unsigned char	*out_block;
 +	size_t		 out_block_size;
 +	int64_t		 total_out;
 +	int		 flags;
 +	uint32_t	 compressed_cksum;
 +	uint32_t	 uncompressed_cksum;
 +	size_t		 compressed_size;
 +	size_t		 uncompressed_size;
 +	size_t		 unconsumed_bytes;
 +	char		 in_stream;
 +	char		 eof; /* True = found end of compressed data. */
 +};
 +
 +#define FILTER			0x0800
 +#define CRC32_HEADER		0x1000
 +#define EXTRA_FIELD		0x0040
 +#define ADLER32_UNCOMPRESSED	0x0001
 +#define ADLER32_COMPRESSED	0x0002
 +#define CRC32_UNCOMPRESSED	0x0100
 +#define CRC32_COMPRESSED	0x0200
 +#define MAX_BLOCK_SIZE		(64 * 1024 * 1024)
 +
 +static ssize_t  lzop_filter_read(struct archive_read_filter *, const void **);
 +static int	lzop_filter_close(struct archive_read_filter *);
 +#endif
 +
 +static int lzop_bidder_bid(struct archive_read_filter_bidder *,
 +    struct archive_read_filter *);
 +static int lzop_bidder_init(struct archive_read_filter *);
 +
 +int
 +archive_read_support_filter_lzop(struct archive *_a)
 +{
 +	struct archive_read *a = (struct archive_read *)_a;
 +	struct archive_read_filter_bidder *reader;
 +
 +	archive_check_magic(_a, ARCHIVE_READ_MAGIC,
 +	    ARCHIVE_STATE_NEW, "archive_read_support_filter_lzop");
 +
 +	if (__archive_read_get_bidder(a, &reader) != ARCHIVE_OK)
 +		return (ARCHIVE_FATAL);
 +
 +	reader->data = NULL;
 +	reader->bid = lzop_bidder_bid;
 +	reader->init = lzop_bidder_init;
 +	reader->options = NULL;
 +	reader->free = NULL;
 +	/* Signal the extent of lzop support with the return value here. */
 +#if defined(HAVE_LZO_LZOCONF_H) && defined(HAVE_LZO_LZO1X_H)
 +	return (ARCHIVE_OK);
 +#else
 +	/* Return ARCHIVE_WARN since this always uses an external program. */
 +	archive_set_error(_a, ARCHIVE_ERRNO_MISC,
 +	    "Using external lzop program for lzop decompression");
 +	return (ARCHIVE_WARN);
 +#endif
 +}
 +
 +/*
 + * Bidder just verifies the header and returns the number of verified bits.
 + */
 +static int
 +lzop_bidder_bid(struct archive_read_filter_bidder *self,
 +    struct archive_read_filter *filter)
 +{
 +	const unsigned char *p;
 +	ssize_t avail;
 +
 +	(void)self; /* UNUSED */
 +
 +	p = __archive_read_filter_ahead(filter, LZOP_HEADER_MAGIC_LEN, &avail);
 +	if (p == NULL || avail == 0)
 +		return (0);
 +
 +	if (memcmp(p, LZOP_HEADER_MAGIC, LZOP_HEADER_MAGIC_LEN))
 +		return (0);
 +
 +	return (LZOP_HEADER_MAGIC_LEN * 8);
 +}
 +
 +#if !defined(HAVE_LZO_LZOCONF_H) || !defined(HAVE_LZO_LZO1X_H)
 +/*
 + * If we don't have the library on this system, we can't do the
 + * decompression directly.  We can, however, try to run "lzop -d"
 + * in case that's available.
 + */
 +static int
 +lzop_bidder_init(struct archive_read_filter *self)
 +{
 +	int r;
 +
 +	r = __archive_read_program(self, "lzop -d");
 +	/* Note: We set the format here even if __archive_read_program()
 +	 * above fails.  We do, after all, know what the format is
 +	 * even if we weren't able to read it. */
 +	self->code = ARCHIVE_FILTER_LZOP;
 +	self->name = "lzop";
 +	return (r);
 +}
 +#else
 +/*
 + * Initialize the filter object.
 + */
 +static int
 +lzop_bidder_init(struct archive_read_filter *self)
 +{
 +	struct read_lzop *state;
 +
 +	self->code = ARCHIVE_FILTER_LZOP;
 +	self->name = "lzop";
 +
 +	state = (struct read_lzop *)calloc(sizeof(*state), 1);
 +	if (state == NULL) {
 +		archive_set_error(&self->archive->archive, ENOMEM,
 +		    "Can't allocate data for lzop decompression");
 +		return (ARCHIVE_FATAL);
 +	}
 +
 +	self->data = state;
 +	self->read = lzop_filter_read;
 +	self->skip = NULL; /* not supported */
 +	self->close = lzop_filter_close;
 +
 +	return (ARCHIVE_OK);
 +}
 +
 +static int
 +consume_header(struct archive_read_filter *self)
 +{
 +	struct read_lzop *state = (struct read_lzop *)self->data;
 +	const unsigned char *p, *_p;
 +	unsigned checksum, flags, len, method, version;
 +
 +	/*
 +	 * Check LZOP magic code.
 +	 */
 +	p = __archive_read_filter_ahead(self->upstream,
 +		LZOP_HEADER_MAGIC_LEN, NULL);
 +	if (p == NULL)
 +		return (ARCHIVE_EOF);
 +
 +	if (memcmp(p, LZOP_HEADER_MAGIC, LZOP_HEADER_MAGIC_LEN))
 +		return (ARCHIVE_EOF);
 +	__archive_read_filter_consume(self->upstream,
 +	    LZOP_HEADER_MAGIC_LEN);
 +
 +	p = __archive_read_filter_ahead(self->upstream, 29, NULL);
 +	if (p == NULL)
 +		goto truncated;
 +	_p = p;
 +	version = archive_be16dec(p);
 +	p += 4;/* version(2 bytes) + library version(2 bytes) */
 +
 +	if (version >= 0x940) {
 +		unsigned reqversion = archive_be16dec(p); p += 2;
 +		if (reqversion < 0x900) {
 +			archive_set_error(&self->archive->archive,
 +			    ARCHIVE_ERRNO_MISC, "Invalid required version");
 +			return (ARCHIVE_FAILED);
 +		}
 +	}
 +
 +	method = *p++;
 +	if (method < 1 || method > 3) {
 +		archive_set_error(&self->archive->archive, ARCHIVE_ERRNO_MISC,
 +		    "Unsupported method");
 +		return (ARCHIVE_FAILED);
 +	}
 +
 +	if (version >= 0x940) {
 +		unsigned level = *p++;
 +#if 0
 +		unsigned default_level[] = {0, 3, 1, 9};
 +#endif
 +		if (level == 0)
 +			/* Method is 1..3 here due to check above. */
 +#if 0	/* Avoid an error Clang Static Analyzer claims
 +	  "Value stored to 'level' is never read". */
 +			level = default_level[method];
 +#else
 +			;/* NOP */
 +#endif
 +		else if (level > 9) {
 +			archive_set_error(&self->archive->archive,
 +			    ARCHIVE_ERRNO_MISC, "Invalid level");
 +			return (ARCHIVE_FAILED);
 +		}
 +	}
 +
 +	flags = archive_be32dec(p); p += 4;
 +
 +	if (flags & FILTER)
 +		p += 4; /* Skip filter */
 +	p += 4; /* Skip mode */
 +	if (version >= 0x940)
 +		p += 8; /* Skip mtime */
 +	else
 +		p += 4; /* Skip mtime */
 +	len = *p++; /* Read filename length */
 +	len += p - _p;
 +	/* Make sure we have all bytes we need to calculate checksum. */
 +	p = __archive_read_filter_ahead(self->upstream, len + 4, NULL);
 +	if (p == NULL)
 +		goto truncated;
 +	if (flags & CRC32_HEADER)
 +		checksum = crc32(crc32(0, NULL, 0), p, len);
 +	else
 +		checksum = adler32(adler32(0, NULL, 0), p, len);
 +	if (archive_be32dec(p + len) != checksum)
 +		goto corrupted;
 +	__archive_read_filter_consume(self->upstream, len + 4);
 +	if (flags & EXTRA_FIELD) {
 +		/* Skip extra field */
 +		p = __archive_read_filter_ahead(self->upstream, 4, NULL);
 +		if (p == NULL)
 +			goto truncated;
 +		len = archive_be32dec(p);
 +		__archive_read_filter_consume(self->upstream, len + 4 + 4);
 +	}
 +	state->flags = flags;
 +	state->in_stream = 1;
 +	return (ARCHIVE_OK);
 +truncated:
 +	archive_set_error(&self->archive->archive,
 +	    ARCHIVE_ERRNO_FILE_FORMAT, "Truncated lzop data");
 +	return (ARCHIVE_FAILED);
 +corrupted:
 +	archive_set_error(&self->archive->archive,
 +	    ARCHIVE_ERRNO_FILE_FORMAT, "Corrupted lzop header");
 +	return (ARCHIVE_FAILED);
 +}
 +
 +static int
 +consume_block_info(struct archive_read_filter *self)
 +{
 +	struct read_lzop *state = (struct read_lzop *)self->data;
 +	const unsigned char *p;
 +	unsigned flags = state->flags;
 +
 +	p = __archive_read_filter_ahead(self->upstream, 4, NULL);
 +	if (p == NULL)
 +		goto truncated;
 +	state->uncompressed_size = archive_be32dec(p);
 +	__archive_read_filter_consume(self->upstream, 4);
 +	if (state->uncompressed_size == 0)
 +		return (ARCHIVE_EOF);
 +	if (state->uncompressed_size > MAX_BLOCK_SIZE)
 +		goto corrupted;
 +
 +	p = __archive_read_filter_ahead(self->upstream, 4, NULL);
 +	if (p == NULL)
 +		goto truncated;
 +	state->compressed_size = archive_be32dec(p);
 +	__archive_read_filter_consume(self->upstream, 4);
 +	if (state->compressed_size > state->uncompressed_size)
 +		goto corrupted;
 +
 +	if (flags & (CRC32_UNCOMPRESSED | ADLER32_UNCOMPRESSED)) {
 +		p = __archive_read_filter_ahead(self->upstream, 4, NULL);
 +		if (p == NULL)
 +			goto truncated;
 +		state->compressed_cksum = state->uncompressed_cksum =
 +		    archive_be32dec(p);
 +		__archive_read_filter_consume(self->upstream, 4);
 +	}
 +	if ((flags & (CRC32_COMPRESSED | ADLER32_COMPRESSED)) &&
 +	    state->compressed_size < state->uncompressed_size) {
 +		p = __archive_read_filter_ahead(self->upstream, 4, NULL);
 +		if (p == NULL)
 +			goto truncated;
 +		state->compressed_cksum = archive_be32dec(p);
 +		__archive_read_filter_consume(self->upstream, 4);
 +	}
 +	return (ARCHIVE_OK);
 +truncated:
 +	archive_set_error(&self->archive->archive,
 +	    ARCHIVE_ERRNO_FILE_FORMAT, "Truncated lzop data");
 +	return (ARCHIVE_FAILED);
 +corrupted:
 +	archive_set_error(&self->archive->archive,
 +	    ARCHIVE_ERRNO_FILE_FORMAT, "Corrupted lzop header");
 +	return (ARCHIVE_FAILED);
 +}
 +
 +static ssize_t
 +lzop_filter_read(struct archive_read_filter *self, const void **p)
 +{
 +	struct read_lzop *state = (struct read_lzop *)self->data;
 +	const void *b;
 +	lzo_uint out_size;
 +	uint32_t cksum;
 +	int ret, r;
 +
 +	if (state->unconsumed_bytes) {
 +		__archive_read_filter_consume(self->upstream,
 +		    state->unconsumed_bytes);
 +		state->unconsumed_bytes = 0;
 +	}
 +	if (state->eof)
 +		return (0);
 +
 +	for (;;) {
 +		if (!state->in_stream) {
 +			ret = consume_header(self);
 +			if (ret < ARCHIVE_OK)
 +				return (ret);
 +			if (ret == ARCHIVE_EOF) {
 +				state->eof = 1;
 +				return (0);
 +			}
 +		}
 +		ret = consume_block_info(self);
 +		if (ret < ARCHIVE_OK)
 +			return (ret);
 +		if (ret == ARCHIVE_EOF)
 +			state->in_stream = 0;
 +		else
 +			break;
 +	}
 +
 +	if (state->out_block == NULL ||
 +	    state->out_block_size < state->uncompressed_size) {
 +		void *new_block;
 +
 +		new_block = realloc(state->out_block, state->uncompressed_size);
 +		if (new_block == NULL) {
 +			archive_set_error(&self->archive->archive, ENOMEM,
 +			    "Can't allocate data for lzop decompression");
 +			return (ARCHIVE_FATAL);
 +		}
 +		state->out_block = new_block;
 +		state->out_block_size = state->uncompressed_size;
 +	}
 +
 +	b = __archive_read_filter_ahead(self->upstream,
 +		state->compressed_size, NULL);
 +	if (b == NULL) {
 +		archive_set_error(&self->archive->archive,
 +		    ARCHIVE_ERRNO_FILE_FORMAT, "Truncated lzop data");
 +		return (ARCHIVE_FATAL);
 +	}
 +	if (state->flags & CRC32_COMPRESSED)
 +		cksum = crc32(crc32(0, NULL, 0), b, state->compressed_size);
 +	else if (state->flags & ADLER32_COMPRESSED)
 +		cksum = adler32(adler32(0, NULL, 0), b, state->compressed_size);
 +	else
 +		cksum = state->compressed_cksum;
 +	if (cksum != state->compressed_cksum) {
 +		archive_set_error(&self->archive->archive,
 +		    ARCHIVE_ERRNO_MISC, "Corrupted data");
 +		return (ARCHIVE_FATAL);
 +	}
 +
 +	/*
 +	 * If the both uncompressed size and compressed size are the same,
 +	 * we do not decompress this block.
 +	 */
 +	if (state->uncompressed_size == state->compressed_size) {
 +		*p = b;
 +		state->total_out += state->compressed_size;
 +		state->unconsumed_bytes = state->compressed_size;
 +		return ((ssize_t)state->uncompressed_size);
 +	}
 +
 +	/*
- 	 * Drive lzo uncompresison.
++	 * Drive lzo uncompression.
 +	 */
 +	out_size = (lzo_uint)state->uncompressed_size;
 +	r = lzo1x_decompress_safe(b, (lzo_uint)state->compressed_size,
 +		state->out_block, &out_size, NULL);
 +	switch (r) {
 +	case LZO_E_OK:
 +		if (out_size == state->uncompressed_size)
 +			break;
 +		archive_set_error(&self->archive->archive,
 +		    ARCHIVE_ERRNO_MISC, "Corrupted data");
 +		return (ARCHIVE_FATAL);
 +	case LZO_E_OUT_OF_MEMORY:
 +		archive_set_error(&self->archive->archive, ENOMEM,
 +		    "lzop decompression failed: out of memory");
 +		return (ARCHIVE_FATAL);
 +	default:
 +		archive_set_error(&self->archive->archive, ARCHIVE_ERRNO_MISC,
 +		    "lzop decompression failed: %d", r);
 +		return (ARCHIVE_FATAL);
 +	}
 +
 +	if (state->flags & CRC32_UNCOMPRESSED)
 +		cksum = crc32(crc32(0, NULL, 0), state->out_block,
 +		    state->uncompressed_size);
 +	else if (state->flags & ADLER32_UNCOMPRESSED)
 +		cksum = adler32(adler32(0, NULL, 0), state->out_block,
 +		    state->uncompressed_size);
 +	else
 +		cksum = state->uncompressed_cksum;
 +	if (cksum != state->uncompressed_cksum) {
 +		archive_set_error(&self->archive->archive,
 +		    ARCHIVE_ERRNO_MISC, "Corrupted data");
 +		return (ARCHIVE_FATAL);
 +	}
 +
 +	__archive_read_filter_consume(self->upstream, state->compressed_size);
 +	*p = state->out_block;
 +	state->total_out += out_size;
 +	return ((ssize_t)out_size);
 +}
 +
 +/*
 + * Clean up the decompressor.
 + */
 +static int
 +lzop_filter_close(struct archive_read_filter *self)
 +{
 +	struct read_lzop *state = (struct read_lzop *)self->data;
 +
 +	free(state->out_block);
 +	free(state);
 +	return (ARCHIVE_OK);
 +}
 +
 +#endif
diff --cc Utilities/cmlibarchive/libarchive/archive_read_support_filter_xz.c
index 8f48273,0000000..a188186
mode 100644,000000..100644
--- a/Utilities/cmlibarchive/libarchive/archive_read_support_filter_xz.c
+++ b/Utilities/cmlibarchive/libarchive/archive_read_support_filter_xz.c
@@@ -1,988 -1,0 +1,796 @@@
 +/*-
 + * Copyright (c) 2009-2011 Michihiro NAKAJIMA
 + * Copyright (c) 2003-2008 Tim Kientzle and Miklos Vajna
 + * All rights reserved.
 + *
 + * Redistribution and use in source and binary forms, with or without
 + * modification, are permitted provided that the following conditions
 + * are met:
 + * 1. Redistributions of source code must retain the above copyright
 + *    notice, this list of conditions and the following disclaimer.
 + * 2. Redistributions in binary form must reproduce the above copyright
 + *    notice, this list of conditions and the following disclaimer in the
 + *    documentation and/or other materials provided with the distribution.
 + *
 + * THIS SOFTWARE IS PROVIDED BY THE AUTHOR(S) ``AS IS'' AND ANY EXPRESS OR
 + * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
 + * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
 + * IN NO EVENT SHALL THE AUTHOR(S) BE LIABLE FOR ANY DIRECT, INDIRECT,
 + * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
 + * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
 + * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
 + * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
 + * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
 + * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
 + */
 +
 +#include "archive_platform.h"
 +
 +__FBSDID("$FreeBSD$");
 +
 +#ifdef HAVE_ERRNO_H
 +#include <errno.h>
 +#endif
 +#include <stdio.h>
 +#ifdef HAVE_STDLIB_H
 +#include <stdlib.h>
 +#endif
 +#ifdef HAVE_STRING_H
 +#include <string.h>
 +#endif
 +#ifdef HAVE_UNISTD_H
 +#include <unistd.h>
 +#endif
 +#if HAVE_LZMA_H
 +#include <cm_lzma.h>
- #elif HAVE_LZMADEC_H
- #include <lzmadec.h>
 +#endif
 +
 +#include "archive.h"
 +#include "archive_endian.h"
 +#include "archive_private.h"
 +#include "archive_read_private.h"
 +
 +#if HAVE_LZMA_H && HAVE_LIBLZMA
 +
 +struct private_data {
 +	lzma_stream	 stream;
 +	unsigned char	*out_block;
 +	size_t		 out_block_size;
 +	int64_t		 total_out;
 +	char		 eof; /* True = found end of compressed data. */
 +	char		 in_stream;
 +
 +	/* Following variables are used for lzip only. */
 +	char		 lzip_ver;
 +	uint32_t	 crc32;
 +	int64_t		 member_in;
 +	int64_t		 member_out;
 +};
 +
 +#if LZMA_VERSION_MAJOR >= 5
 +/* Effectively disable the limiter. */
 +#define LZMA_MEMLIMIT	UINT64_MAX
 +#else
 +/* NOTE: This needs to check memory size which running system has. */
 +#define LZMA_MEMLIMIT	(1U << 30)
 +#endif
 +
 +/* Combined lzip/lzma/xz filter */
 +static ssize_t	xz_filter_read(struct archive_read_filter *, const void **);
 +static int	xz_filter_close(struct archive_read_filter *);
 +static int	xz_lzma_bidder_init(struct archive_read_filter *);
 +
- #elif HAVE_LZMADEC_H && HAVE_LIBLZMADEC
- 
- struct private_data {
- 	lzmadec_stream	 stream;
- 	unsigned char	*out_block;
- 	size_t		 out_block_size;
- 	int64_t		 total_out;
- 	char		 eof; /* True = found end of compressed data. */
- };
- 
- /* Lzma-only filter */
- static ssize_t	lzma_filter_read(struct archive_read_filter *, const void **);
- static int	lzma_filter_close(struct archive_read_filter *);
 +#endif
 +
 +/*
 + * Note that we can detect xz and lzma compressed files even if we
 + * can't decompress them.  (In fact, we like detecting them because we
 + * can give better error messages.)  So the bid framework here gets
 + * compiled even if no lzma library is available.
 + */
 +static int	xz_bidder_bid(struct archive_read_filter_bidder *,
 +		    struct archive_read_filter *);
 +static int	xz_bidder_init(struct archive_read_filter *);
 +static int	lzma_bidder_bid(struct archive_read_filter_bidder *,
 +		    struct archive_read_filter *);
 +static int	lzma_bidder_init(struct archive_read_filter *);
 +static int	lzip_has_member(struct archive_read_filter *);
 +static int	lzip_bidder_bid(struct archive_read_filter_bidder *,
 +		    struct archive_read_filter *);
 +static int	lzip_bidder_init(struct archive_read_filter *);
 +
 +#if ARCHIVE_VERSION_NUMBER < 4000000
 +/* Deprecated; remove in libarchive 4.0 */
 +int
 +archive_read_support_compression_xz(struct archive *a)
 +{
 +	return archive_read_support_filter_xz(a);
 +}
 +#endif
 +
 +int
 +archive_read_support_filter_xz(struct archive *_a)
 +{
 +	struct archive_read *a = (struct archive_read *)_a;
 +	struct archive_read_filter_bidder *bidder;
 +
 +	archive_check_magic(_a, ARCHIVE_READ_MAGIC,
 +	    ARCHIVE_STATE_NEW, "archive_read_support_filter_xz");
 +
 +	if (__archive_read_get_bidder(a, &bidder) != ARCHIVE_OK)
 +		return (ARCHIVE_FATAL);
 +
 +	bidder->data = NULL;
 +	bidder->name = "xz";
 +	bidder->bid = xz_bidder_bid;
 +	bidder->init = xz_bidder_init;
 +	bidder->options = NULL;
 +	bidder->free = NULL;
 +#if HAVE_LZMA_H && HAVE_LIBLZMA
 +	return (ARCHIVE_OK);
 +#else
 +	archive_set_error(_a, ARCHIVE_ERRNO_MISC,
 +	    "Using external xz program for xz decompression");
 +	return (ARCHIVE_WARN);
 +#endif
 +}
 +
 +#if ARCHIVE_VERSION_NUMBER < 4000000
 +int
 +archive_read_support_compression_lzma(struct archive *a)
 +{
 +	return archive_read_support_filter_lzma(a);
 +}
 +#endif
 +
 +int
 +archive_read_support_filter_lzma(struct archive *_a)
 +{
 +	struct archive_read *a = (struct archive_read *)_a;
 +	struct archive_read_filter_bidder *bidder;
 +
 +	archive_check_magic(_a, ARCHIVE_READ_MAGIC,
 +	    ARCHIVE_STATE_NEW, "archive_read_support_filter_lzma");
 +
 +	if (__archive_read_get_bidder(a, &bidder) != ARCHIVE_OK)
 +		return (ARCHIVE_FATAL);
 +
 +	bidder->data = NULL;
 +	bidder->name = "lzma";
 +	bidder->bid = lzma_bidder_bid;
 +	bidder->init = lzma_bidder_init;
 +	bidder->options = NULL;
 +	bidder->free = NULL;
 +#if HAVE_LZMA_H && HAVE_LIBLZMA
 +	return (ARCHIVE_OK);
- #elif HAVE_LZMADEC_H && HAVE_LIBLZMADEC
- 	return (ARCHIVE_OK);
 +#else
 +	archive_set_error(_a, ARCHIVE_ERRNO_MISC,
 +	    "Using external lzma program for lzma decompression");
 +	return (ARCHIVE_WARN);
 +#endif
 +}
 +
 +
 +#if ARCHIVE_VERSION_NUMBER < 4000000
 +int
 +archive_read_support_compression_lzip(struct archive *a)
 +{
 +	return archive_read_support_filter_lzip(a);
 +}
 +#endif
 +
 +int
 +archive_read_support_filter_lzip(struct archive *_a)
 +{
 +	struct archive_read *a = (struct archive_read *)_a;
 +	struct archive_read_filter_bidder *bidder;
 +
 +	archive_check_magic(_a, ARCHIVE_READ_MAGIC,
 +	    ARCHIVE_STATE_NEW, "archive_read_support_filter_lzip");
 +
 +	if (__archive_read_get_bidder(a, &bidder) != ARCHIVE_OK)
 +		return (ARCHIVE_FATAL);
 +
 +	bidder->data = NULL;
 +	bidder->name = "lzip";
 +	bidder->bid = lzip_bidder_bid;
 +	bidder->init = lzip_bidder_init;
 +	bidder->options = NULL;
 +	bidder->free = NULL;
 +#if HAVE_LZMA_H && HAVE_LIBLZMA
 +	return (ARCHIVE_OK);
 +#else
 +	archive_set_error(_a, ARCHIVE_ERRNO_MISC,
 +	    "Using external lzip program for lzip decompression");
 +	return (ARCHIVE_WARN);
 +#endif
 +}
 +
 +/*
 + * Test whether we can handle this data.
 + */
 +static int
 +xz_bidder_bid(struct archive_read_filter_bidder *self,
 +    struct archive_read_filter *filter)
 +{
 +	const unsigned char *buffer;
 +	ssize_t avail;
 +
 +	(void)self; /* UNUSED */
 +
 +	buffer = __archive_read_filter_ahead(filter, 6, &avail);
 +	if (buffer == NULL)
 +		return (0);
 +
 +	/*
 +	 * Verify Header Magic Bytes : FD 37 7A 58 5A 00
 +	 */
 +	if (memcmp(buffer, "\xFD\x37\x7A\x58\x5A\x00", 6) != 0)
 +		return (0);
 +
 +	return (48);
 +}
 +
 +/*
 + * Test whether we can handle this data.
 + *
 + * <sigh> LZMA has a rather poor file signature.  Zeros do not
 + * make good signature bytes as a rule, and the only non-zero byte
 + * here is an ASCII character.  For example, an uncompressed tar
 + * archive whose first file is ']' would satisfy this check.  It may
 + * be necessary to exclude LZMA from compression_all() because of
 + * this.  Clients of libarchive would then have to explicitly enable
 + * LZMA checking instead of (or in addition to) compression_all() when
 + * they have other evidence (file name, command-line option) to go on.
 + */
 +static int
 +lzma_bidder_bid(struct archive_read_filter_bidder *self,
 +    struct archive_read_filter *filter)
 +{
 +	const unsigned char *buffer;
 +	ssize_t avail;
 +	uint32_t dicsize;
 +	uint64_t uncompressed_size;
 +	int bits_checked;
 +
 +	(void)self; /* UNUSED */
 +
 +	buffer = __archive_read_filter_ahead(filter, 14, &avail);
 +	if (buffer == NULL)
 +		return (0);
 +
 +	/* First byte of raw LZMA stream is commonly 0x5d.
 +	 * The first byte is a special number, which consists of
 +	 * three parameters of LZMA compression, a number of literal
 +	 * context bits(which is from 0 to 8, default is 3), a number
 +	 * of literal pos bits(which is from 0 to 4, default is 0),
 +	 * a number of pos bits(which is from 0 to 4, default is 2).
 +	 * The first byte is made by
 +	 * (pos bits * 5 + literal pos bit) * 9 + * literal contest bit,
 +	 * and so the default value in this field is
 +	 * (2 * 5 + 0) * 9 + 3 = 0x5d.
 +	 * lzma of LZMA SDK has options to change those parameters.
 +	 * It means a range of this field is from 0 to 224. And lzma of
 +	 * XZ Utils with option -e records 0x5e in this field. */
 +	/* NOTE: If this checking of the first byte increases false
 +	 * recognition, we should allow only 0x5d and 0x5e for the first
 +	 * byte of LZMA stream. */
 +	bits_checked = 0;
 +	if (buffer[0] > (4 * 5 + 4) * 9 + 8)
 +		return (0);
 +	/* Most likely value in the first byte of LZMA stream. */
 +	if (buffer[0] == 0x5d || buffer[0] == 0x5e)
 +		bits_checked += 8;
 +
 +	/* Sixth through fourteenth bytes are uncompressed size,
 +	 * stored in little-endian order. `-1' means uncompressed
 +	 * size is unknown and lzma of XZ Utils always records `-1'
 +	 * in this field. */
 +	uncompressed_size = archive_le64dec(buffer+5);
 +	if (uncompressed_size == (uint64_t)ARCHIVE_LITERAL_LL(-1))
 +		bits_checked += 64;
 +
 +	/* Second through fifth bytes are dictionary size, stored in
 +	 * little-endian order. The minimum dictionary size is
 +	 * 1 << 12(4KiB) which the lzma of LZMA SDK uses with option
- 	 * -d12 and the maxinam dictionary size is 1 << 27(128MiB)
++	 * -d12 and the maximum dictionary size is 1 << 27(128MiB)
 +	 * which the one uses with option -d27.
 +	 * NOTE: A comment of LZMA SDK source code says this dictionary
 +	 * range is from 1 << 12 to 1 << 30. */
 +	dicsize = archive_le32dec(buffer+1);
 +	switch (dicsize) {
 +	case 0x00001000:/* lzma of LZMA SDK option -d12. */
 +	case 0x00002000:/* lzma of LZMA SDK option -d13. */
 +	case 0x00004000:/* lzma of LZMA SDK option -d14. */
 +	case 0x00008000:/* lzma of LZMA SDK option -d15. */
 +	case 0x00010000:/* lzma of XZ Utils option -0 and -1.
 +			 * lzma of LZMA SDK option -d16. */
 +	case 0x00020000:/* lzma of LZMA SDK option -d17. */
 +	case 0x00040000:/* lzma of LZMA SDK option -d18. */
 +	case 0x00080000:/* lzma of XZ Utils option -2.
 +			 * lzma of LZMA SDK option -d19. */
 +	case 0x00100000:/* lzma of XZ Utils option -3.
 +			 * lzma of LZMA SDK option -d20. */
 +	case 0x00200000:/* lzma of XZ Utils option -4.
 +			 * lzma of LZMA SDK option -d21. */
 +	case 0x00400000:/* lzma of XZ Utils option -5.
 +			 * lzma of LZMA SDK option -d22. */
 +	case 0x00800000:/* lzma of XZ Utils option -6.
 +			 * lzma of LZMA SDK option -d23. */
 +	case 0x01000000:/* lzma of XZ Utils option -7.
 +			 * lzma of LZMA SDK option -d24. */
 +	case 0x02000000:/* lzma of XZ Utils option -8.
 +			 * lzma of LZMA SDK option -d25. */
 +	case 0x04000000:/* lzma of XZ Utils option -9.
 +			 * lzma of LZMA SDK option -d26. */
 +	case 0x08000000:/* lzma of LZMA SDK option -d27. */
 +		bits_checked += 32;
 +		break;
 +	default:
 +		/* If a memory usage for encoding was not enough on
 +		 * the platform where LZMA stream was made, lzma of
 +		 * XZ Utils automatically decreased the dictionary
 +		 * size to enough memory for encoding by 1Mi bytes
 +		 * (1 << 20).*/
 +		if (dicsize <= 0x03F00000 && dicsize >= 0x00300000 &&
 +		    (dicsize & ((1 << 20)-1)) == 0 &&
 +		    bits_checked == 8 + 64) {
 +			bits_checked += 32;
 +			break;
 +		}
 +		/* Otherwise dictionary size is unlikely. But it is
 +		 * possible that someone makes lzma stream with
 +		 * liblzma/LZMA SDK in one's dictionary size. */
 +		return (0);
 +	}
 +
 +	/* TODO: The above test is still very weak.  It would be
 +	 * good to do better. */
 +
 +	return (bits_checked);
 +}
 +
 +static int
 +lzip_has_member(struct archive_read_filter *filter)
 +{
 +	const unsigned char *buffer;
 +	ssize_t avail;
 +	int bits_checked;
 +	int log2dic;
 +
 +	buffer = __archive_read_filter_ahead(filter, 6, &avail);
 +	if (buffer == NULL)
 +		return (0);
 +
 +	/*
 +	 * Verify Header Magic Bytes : 4C 5A 49 50 (`LZIP')
 +	 */
 +	bits_checked = 0;
 +	if (memcmp(buffer, "LZIP", 4) != 0)
 +		return (0);
 +	bits_checked += 32;
 +
 +	/* A version number must be 0 or 1 */
 +	if (buffer[4] != 0 && buffer[4] != 1)
 +		return (0);
 +	bits_checked += 8;
 +
 +	/* Dictionary size. */
 +	log2dic = buffer[5] & 0x1f;
 +	if (log2dic < 12 || log2dic > 27)
 +		return (0);
 +	bits_checked += 8;
 +
 +	return (bits_checked);
 +}
 +
 +static int
 +lzip_bidder_bid(struct archive_read_filter_bidder *self,
 +    struct archive_read_filter *filter)
 +{
 +
 +	(void)self; /* UNUSED */
 +	return (lzip_has_member(filter));
 +}
 +
 +#if HAVE_LZMA_H && HAVE_LIBLZMA
 +
 +/*
 + * liblzma 4.999.7 and later support both lzma and xz streams.
 + */
 +static int
 +xz_bidder_init(struct archive_read_filter *self)
 +{
 +	self->code = ARCHIVE_FILTER_XZ;
 +	self->name = "xz";
 +	return (xz_lzma_bidder_init(self));
 +}
 +
 +static int
 +lzma_bidder_init(struct archive_read_filter *self)
 +{
 +	self->code = ARCHIVE_FILTER_LZMA;
 +	self->name = "lzma";
 +	return (xz_lzma_bidder_init(self));
 +}
 +
 +static int
 +lzip_bidder_init(struct archive_read_filter *self)
 +{
 +	self->code = ARCHIVE_FILTER_LZIP;
 +	self->name = "lzip";
 +	return (xz_lzma_bidder_init(self));
 +}
 +
 +/*
 + * Set an error code and choose an error message
 + */
 +static void
 +set_error(struct archive_read_filter *self, int ret)
 +{
 +
 +	switch (ret) {
 +	case LZMA_STREAM_END: /* Found end of stream. */
 +	case LZMA_OK: /* Decompressor made some progress. */
 +		break;
 +	case LZMA_MEM_ERROR:
 +		archive_set_error(&self->archive->archive, ENOMEM,
 +		    "Lzma library error: Cannot allocate memory");
 +		break;
 +	case LZMA_MEMLIMIT_ERROR:
 +		archive_set_error(&self->archive->archive, ENOMEM,
 +		    "Lzma library error: Out of memory");
 +		break;
 +	case LZMA_FORMAT_ERROR:
 +		archive_set_error(&self->archive->archive,
 +		    ARCHIVE_ERRNO_MISC,
 +		    "Lzma library error: format not recognized");
 +		break;
 +	case LZMA_OPTIONS_ERROR:
 +		archive_set_error(&self->archive->archive,
 +		    ARCHIVE_ERRNO_MISC,
 +		    "Lzma library error: Invalid options");
 +		break;
 +	case LZMA_DATA_ERROR:
 +		archive_set_error(&self->archive->archive,
 +		    ARCHIVE_ERRNO_MISC,
 +		    "Lzma library error: Corrupted input data");
 +		break;
 +	case LZMA_BUF_ERROR:
 +		archive_set_error(&self->archive->archive,
 +		    ARCHIVE_ERRNO_MISC,
 +		    "Lzma library error:  No progress is possible");
 +		break;
 +	default:
 +		/* Return an error. */
 +		archive_set_error(&self->archive->archive,
 +		    ARCHIVE_ERRNO_MISC,
 +		    "Lzma decompression failed:  Unknown error");
 +		break;
 +	}
 +}
 +
 +/*
 + * Setup the callbacks.
 + */
 +static int
 +xz_lzma_bidder_init(struct archive_read_filter *self)
 +{
 +	static const size_t out_block_size = 64 * 1024;
 +	void *out_block;
 +	struct private_data *state;
 +	int ret;
 +
 +	state = (struct private_data *)calloc(sizeof(*state), 1);
 +	out_block = (unsigned char *)malloc(out_block_size);
 +	if (state == NULL || out_block == NULL) {
 +		archive_set_error(&self->archive->archive, ENOMEM,
 +		    "Can't allocate data for xz decompression");
 +		free(out_block);
 +		free(state);
 +		return (ARCHIVE_FATAL);
 +	}
 +
 +	self->data = state;
 +	state->out_block_size = out_block_size;
 +	state->out_block = out_block;
 +	self->read = xz_filter_read;
 +	self->skip = NULL; /* not supported */
 +	self->close = xz_filter_close;
 +
 +	state->stream.avail_in = 0;
 +
 +	state->stream.next_out = state->out_block;
 +	state->stream.avail_out = state->out_block_size;
 +
 +	state->crc32 = 0;
 +	if (self->code == ARCHIVE_FILTER_LZIP) {
 +		/*
 +		 * We have to read a lzip header and use it to initialize
 +		 * compression library, thus we cannot initialize the
 +		 * library for lzip here.
 +		 */
 +		state->in_stream = 0;
 +		return (ARCHIVE_OK);
 +	} else
 +		state->in_stream = 1;
 +
 +	/* Initialize compression library. */
 +	if (self->code == ARCHIVE_FILTER_XZ)
 +		ret = lzma_stream_decoder(&(state->stream),
 +		    LZMA_MEMLIMIT,/* memlimit */
 +		    LZMA_CONCATENATED);
 +	else
 +		ret = lzma_alone_decoder(&(state->stream),
 +		    LZMA_MEMLIMIT);/* memlimit */
 +
 +	if (ret == LZMA_OK)
 +		return (ARCHIVE_OK);
 +
 +	/* Library setup failed: Choose an error message and clean up. */
 +	set_error(self, ret);
 +
 +	free(state->out_block);
 +	free(state);
 +	self->data = NULL;
 +	return (ARCHIVE_FATAL);
 +}
 +
 +static int
 +lzip_init(struct archive_read_filter *self)
 +{
 +	struct private_data *state;
 +	const unsigned char *h;
 +	lzma_filter filters[2];
 +	unsigned char props[5];
 +	ssize_t avail_in;
 +	uint32_t dicsize;
 +	int log2dic, ret;
 +
 +	state = (struct private_data *)self->data;
 +	h = __archive_read_filter_ahead(self->upstream, 6, &avail_in);
 +	if (h == NULL)
 +		return (ARCHIVE_FATAL);
 +
 +	/* Get a version number. */
 +	state->lzip_ver = h[4];
 +
 +	/*
 +	 * Setup lzma property.
 +	 */
 +	props[0] = 0x5d;
 +
 +	/* Get dictionary size. */
 +	log2dic = h[5] & 0x1f;
 +	if (log2dic < 12 || log2dic > 27)
 +		return (ARCHIVE_FATAL);
 +	dicsize = 1U << log2dic;
 +	if (log2dic > 12)
 +		dicsize -= (dicsize / 16) * (h[5] >> 5);
 +	archive_le32enc(props+1, dicsize);
 +
 +	/* Consume lzip header. */
 +	__archive_read_filter_consume(self->upstream, 6);
 +	state->member_in = 6;
 +
 +	filters[0].id = LZMA_FILTER_LZMA1;
 +	filters[0].options = NULL;
 +	filters[1].id = LZMA_VLI_UNKNOWN;
 +	filters[1].options = NULL;
 +
 +	ret = lzma_properties_decode(&filters[0], NULL, props, sizeof(props));
 +	if (ret != LZMA_OK) {
 +		set_error(self, ret);
 +		return (ARCHIVE_FATAL);
 +	}
 +	ret = lzma_raw_decoder(&(state->stream), filters);
- #if LZMA_VERSION < 50010000
 +	free(filters[0].options);
- #endif
 +	if (ret != LZMA_OK) {
 +		set_error(self, ret);
 +		return (ARCHIVE_FATAL);
 +	}
 +	return (ARCHIVE_OK);
 +}
 +
 +static int
 +lzip_tail(struct archive_read_filter *self)
 +{
 +	struct private_data *state;
 +	const unsigned char *f;
 +	ssize_t avail_in;
 +	int tail;
 +
 +	state = (struct private_data *)self->data;
 +	if (state->lzip_ver == 0)
 +		tail = 12;
 +	else
 +		tail = 20;
 +	f = __archive_read_filter_ahead(self->upstream, tail, &avail_in);
 +	if (f == NULL && avail_in < 0)
 +		return (ARCHIVE_FATAL);
 +	if (f == NULL || avail_in < tail) {
 +		archive_set_error(&self->archive->archive, ARCHIVE_ERRNO_MISC,
 +		    "Lzip: Remaining data is less bytes");
 +		return (ARCHIVE_FAILED);
 +	}
 +
 +	/* Check the crc32 value of the uncompressed data of the current
 +	 * member */
 +	if (state->crc32 != archive_le32dec(f)) {
 +		archive_set_error(&self->archive->archive, ARCHIVE_ERRNO_MISC,
 +		    "Lzip: CRC32 error");
 +		return (ARCHIVE_FAILED);
 +	}
 +
 +	/* Check the uncompressed size of the current member */
 +	if ((uint64_t)state->member_out != archive_le64dec(f + 4)) {
 +		archive_set_error(&self->archive->archive, ARCHIVE_ERRNO_MISC,
 +		    "Lzip: Uncompressed size error");
 +		return (ARCHIVE_FAILED);
 +	}
 +
 +	/* Check the total size of the current member */
 +	if (state->lzip_ver == 1 &&
 +	    (uint64_t)state->member_in + tail != archive_le64dec(f + 12)) {
 +		archive_set_error(&self->archive->archive, ARCHIVE_ERRNO_MISC,
 +		    "Lzip: Member size error");
 +		return (ARCHIVE_FAILED);
 +	}
 +	__archive_read_filter_consume(self->upstream, tail);
 +
 +	/* If current lzip data consists of multi member, try decompressing
 +	 * a next member. */
 +	if (lzip_has_member(self->upstream) != 0) {
 +		state->in_stream = 0;
 +		state->crc32 = 0;
 +		state->member_out = 0;
 +		state->member_in = 0;
 +		state->eof = 0;
 +	}
 +	return (ARCHIVE_OK);
 +}
 +
 +/*
 + * Return the next block of decompressed data.
 + */
 +static ssize_t
 +xz_filter_read(struct archive_read_filter *self, const void **p)
 +{
 +	struct private_data *state;
 +	size_t decompressed;
 +	ssize_t avail_in;
 +	int ret;
 +
 +	state = (struct private_data *)self->data;
 +
 +	/* Empty our output buffer. */
 +	state->stream.next_out = state->out_block;
 +	state->stream.avail_out = state->out_block_size;
 +
 +	/* Try to fill the output buffer. */
 +	while (state->stream.avail_out > 0 && !state->eof) {
 +		if (!state->in_stream) {
 +			/*
 +			 * Initialize liblzma for lzip
 +			 */
 +			ret = lzip_init(self);
 +			if (ret != ARCHIVE_OK)
 +				return (ret);
 +			state->in_stream = 1;
 +		}
 +		state->stream.next_in =
 +		    __archive_read_filter_ahead(self->upstream, 1, &avail_in);
 +		if (state->stream.next_in == NULL && avail_in < 0) {
 +			archive_set_error(&self->archive->archive,
 +			    ARCHIVE_ERRNO_MISC,
 +			    "truncated input");
 +			return (ARCHIVE_FATAL);
 +		}
 +		state->stream.avail_in = avail_in;
 +
 +		/* Decompress as much as we can in one pass. */
 +		ret = lzma_code(&(state->stream),
 +		    (state->stream.avail_in == 0)? LZMA_FINISH: LZMA_RUN);
 +		switch (ret) {
 +		case LZMA_STREAM_END: /* Found end of stream. */
 +			state->eof = 1;
 +			/* FALL THROUGH */
 +		case LZMA_OK: /* Decompressor made some progress. */
 +			__archive_read_filter_consume(self->upstream,
 +			    avail_in - state->stream.avail_in);
 +			state->member_in +=
 +			    avail_in - state->stream.avail_in;
 +			break;
 +		default:
 +			set_error(self, ret);
 +			return (ARCHIVE_FATAL);
 +		}
 +	}
 +
 +	decompressed = state->stream.next_out - state->out_block;
 +	state->total_out += decompressed;
 +	state->member_out += decompressed;
 +	if (decompressed == 0)
 +		*p = NULL;
 +	else {
 +		*p = state->out_block;
 +		if (self->code == ARCHIVE_FILTER_LZIP) {
 +			state->crc32 = lzma_crc32(state->out_block,
 +			    decompressed, state->crc32);
 +			if (state->eof) {
 +				ret = lzip_tail(self);
 +				if (ret != ARCHIVE_OK)
 +					return (ret);
 +			}
 +		}
 +	}
 +	return (decompressed);
 +}
 +
 +/*
 + * Clean up the decompressor.
 + */
 +static int
 +xz_filter_close(struct archive_read_filter *self)
 +{
 +	struct private_data *state;
 +
 +	state = (struct private_data *)self->data;
 +	lzma_end(&(state->stream));
 +	free(state->out_block);
 +	free(state);
 +	return (ARCHIVE_OK);
 +}
 +
 +#else
 +
- #if HAVE_LZMADEC_H && HAVE_LIBLZMADEC
- 
- /*
-  * If we have the older liblzmadec library, then we can handle
-  * LZMA streams but not XZ streams.
-  */
- 
- /*
-  * Setup the callbacks.
-  */
- static int
- lzma_bidder_init(struct archive_read_filter *self)
- {
- 	static const size_t out_block_size = 64 * 1024;
- 	void *out_block;
- 	struct private_data *state;
- 	ssize_t ret, avail_in;
- 
- 	self->code = ARCHIVE_FILTER_LZMA;
- 	self->name = "lzma";
- 
- 	state = (struct private_data *)calloc(sizeof(*state), 1);
- 	out_block = (unsigned char *)malloc(out_block_size);
- 	if (state == NULL || out_block == NULL) {
- 		archive_set_error(&self->archive->archive, ENOMEM,
- 		    "Can't allocate data for lzma decompression");
- 		free(out_block);
- 		free(state);
- 		return (ARCHIVE_FATAL);
- 	}
- 
- 	self->data = state;
- 	state->out_block_size = out_block_size;
- 	state->out_block = out_block;
- 	self->read = lzma_filter_read;
- 	self->skip = NULL; /* not supported */
- 	self->close = lzma_filter_close;
- 
- 	/* Prime the lzma library with 18 bytes of input. */
- 	state->stream.next_in = (unsigned char *)(uintptr_t)
- 	    __archive_read_filter_ahead(self->upstream, 18, &avail_in);
- 	if (state->stream.next_in == NULL)
- 		return (ARCHIVE_FATAL);
- 	state->stream.avail_in = avail_in;
- 	state->stream.next_out = state->out_block;
- 	state->stream.avail_out = state->out_block_size;
- 
- 	/* Initialize compression library. */
- 	ret = lzmadec_init(&(state->stream));
- 	__archive_read_filter_consume(self->upstream,
- 	    avail_in - state->stream.avail_in);
- 	if (ret == LZMADEC_OK)
- 		return (ARCHIVE_OK);
- 
- 	/* Library setup failed: Clean up. */
- 	archive_set_error(&self->archive->archive, ARCHIVE_ERRNO_MISC,
- 	    "Internal error initializing lzma library");
- 
- 	/* Override the error message if we know what really went wrong. */
- 	switch (ret) {
- 	case LZMADEC_HEADER_ERROR:
- 		archive_set_error(&self->archive->archive,
- 		    ARCHIVE_ERRNO_MISC,
- 		    "Internal error initializing compression library: "
- 		    "invalid header");
- 		break;
- 	case LZMADEC_MEM_ERROR:
- 		archive_set_error(&self->archive->archive, ENOMEM,
- 		    "Internal error initializing compression library: "
- 		    "out of memory");
- 		break;
- 	}
- 
- 	free(state->out_block);
- 	free(state);
- 	self->data = NULL;
- 	return (ARCHIVE_FATAL);
- }
- 
- /*
-  * Return the next block of decompressed data.
-  */
- static ssize_t
- lzma_filter_read(struct archive_read_filter *self, const void **p)
- {
- 	struct private_data *state;
- 	size_t decompressed;
- 	ssize_t avail_in, ret;
- 
- 	state = (struct private_data *)self->data;
- 
- 	/* Empty our output buffer. */
- 	state->stream.next_out = state->out_block;
- 	state->stream.avail_out = state->out_block_size;
- 
- 	/* Try to fill the output buffer. */
- 	while (state->stream.avail_out > 0 && !state->eof) {
- 		state->stream.next_in = (unsigned char *)(uintptr_t)
- 		    __archive_read_filter_ahead(self->upstream, 1, &avail_in);
- 		if (state->stream.next_in == NULL && avail_in < 0) {
- 			archive_set_error(&self->archive->archive,
- 			    ARCHIVE_ERRNO_MISC,
- 			    "truncated lzma input");
- 			return (ARCHIVE_FATAL);
- 		}
- 		state->stream.avail_in = avail_in;
- 
- 		/* Decompress as much as we can in one pass. */
- 		ret = lzmadec_decode(&(state->stream), avail_in == 0);
- 		switch (ret) {
- 		case LZMADEC_STREAM_END: /* Found end of stream. */
- 			state->eof = 1;
- 			/* FALL THROUGH */
- 		case LZMADEC_OK: /* Decompressor made some progress. */
- 			__archive_read_filter_consume(self->upstream,
- 			    avail_in - state->stream.avail_in);
- 			break;
- 		case LZMADEC_BUF_ERROR: /* Insufficient input data? */
- 			archive_set_error(&self->archive->archive,
- 			    ARCHIVE_ERRNO_MISC,
- 			    "Insufficient compressed data");
- 			return (ARCHIVE_FATAL);
- 		default:
- 			/* Return an error. */
- 			archive_set_error(&self->archive->archive,
- 			    ARCHIVE_ERRNO_MISC,
- 			    "Lzma decompression failed");
- 			return (ARCHIVE_FATAL);
- 		}
- 	}
- 
- 	decompressed = state->stream.next_out - state->out_block;
- 	state->total_out += decompressed;
- 	if (decompressed == 0)
- 		*p = NULL;
- 	else
- 		*p = state->out_block;
- 	return (decompressed);
- }
- 
- /*
-  * Clean up the decompressor.
-  */
- static int
- lzma_filter_close(struct archive_read_filter *self)
- {
- 	struct private_data *state;
- 	int ret;
- 
- 	state = (struct private_data *)self->data;
- 	ret = ARCHIVE_OK;
- 	switch (lzmadec_end(&(state->stream))) {
- 	case LZMADEC_OK:
- 		break;
- 	default:
- 		archive_set_error(&(self->archive->archive),
- 		    ARCHIVE_ERRNO_MISC,
- 		    "Failed to clean up %s compressor",
- 		    self->archive->archive.compression_name);
- 		ret = ARCHIVE_FATAL;
- 	}
- 
- 	free(state->out_block);
- 	free(state);
- 	return (ret);
- }
- 
- #else
- 
 +/*
 + *
 + * If we have no suitable library on this system, we can't actually do
 + * the decompression.  We can, however, still detect compressed
 + * archives and emit a useful message.
 + *
 + */
 +static int
 +lzma_bidder_init(struct archive_read_filter *self)
 +{
 +	int r;
 +
 +	r = __archive_read_program(self, "lzma -d -qq");
 +	/* Note: We set the format here even if __archive_read_program()
 +	 * above fails.  We do, after all, know what the format is
 +	 * even if we weren't able to read it. */
 +	self->code = ARCHIVE_FILTER_LZMA;
 +	self->name = "lzma";
 +	return (r);
 +}
 +
- #endif /* HAVE_LZMADEC_H */
- 
- 
 +static int
 +xz_bidder_init(struct archive_read_filter *self)
 +{
 +	int r;
 +
 +	r = __archive_read_program(self, "xz -d -qq");
 +	/* Note: We set the format here even if __archive_read_program()
 +	 * above fails.  We do, after all, know what the format is
 +	 * even if we weren't able to read it. */
 +	self->code = ARCHIVE_FILTER_XZ;
 +	self->name = "xz";
 +	return (r);
 +}
 +
 +static int
 +lzip_bidder_init(struct archive_read_filter *self)
 +{
 +	int r;
 +
 +	r = __archive_read_program(self, "lzip -d -q");
 +	/* Note: We set the format here even if __archive_read_program()
 +	 * above fails.  We do, after all, know what the format is
 +	 * even if we weren't able to read it. */
 +	self->code = ARCHIVE_FILTER_LZIP;
 +	self->name = "lzip";
 +	return (r);
 +}
 +
- 
 +#endif /* HAVE_LZMA_H */
diff --cc Utilities/cmlibarchive/libarchive/archive_read_support_format_7zip.c
index a33ea4f,0000000..96774f4
mode 100644,000000..100644
--- a/Utilities/cmlibarchive/libarchive/archive_read_support_format_7zip.c
+++ b/Utilities/cmlibarchive/libarchive/archive_read_support_format_7zip.c
@@@ -1,3883 -1,0 +1,3886 @@@
 +/*-
 + * Copyright (c) 2011 Michihiro NAKAJIMA
 + * All rights reserved.
 + *
 + * Redistribution and use in source and binary forms, with or without
 + * modification, are permitted provided that the following conditions
 + * are met:
 + * 1. Redistributions of source code must retain the above copyright
 + *    notice, this list of conditions and the following disclaimer.
 + * 2. Redistributions in binary form must reproduce the above copyright
 + *    notice, this list of conditions and the following disclaimer in the
 + *    documentation and/or other materials provided with the distribution.
 + *
 + * THIS SOFTWARE IS PROVIDED BY THE AUTHOR(S) ``AS IS'' AND ANY EXPRESS OR
 + * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
 + * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
 + * IN NO EVENT SHALL THE AUTHOR(S) BE LIABLE FOR ANY DIRECT, INDIRECT,
 + * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
 + * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
 + * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
 + * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
 + * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
 + * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
 + */
 +
 +#include "archive_platform.h"
 +__FBSDID("$FreeBSD$");
 +
 +#ifdef HAVE_ERRNO_H
 +#include <errno.h>
 +#endif
 +#ifdef HAVE_STDLIB_H
 +#include <stdlib.h>
 +#endif
 +#ifdef HAVE_BZLIB_H
 +#include <cm_bzlib.h>
 +#endif
 +#ifdef HAVE_LZMA_H
 +#include <cm_lzma.h>
 +#endif
 +#ifdef HAVE_ZLIB_H
 +#include <cm_zlib.h>
 +#endif
 +
 +#include "archive.h"
 +#include "archive_entry.h"
 +#include "archive_entry_locale.h"
 +#include "archive_ppmd7_private.h"
 +#include "archive_private.h"
 +#include "archive_read_private.h"
 +#include "archive_endian.h"
 +
 +#ifndef HAVE_ZLIB_H
 +#include "archive_crc32.h"
 +#endif
 +
 +#define _7ZIP_SIGNATURE	"7z\xBC\xAF\x27\x1C"
 +#define SFX_MIN_ADDR	0x27000
 +#define SFX_MAX_ADDR	0x60000
 +
 +
 +/*
 + * Codec ID
 + */
 +#define _7Z_COPY	0
 +#define _7Z_LZMA	0x030101
 +#define _7Z_LZMA2	0x21
 +#define _7Z_DEFLATE	0x040108
 +#define _7Z_BZ2		0x040202
 +#define _7Z_PPMD	0x030401
 +#define _7Z_DELTA	0x03
 +#define _7Z_CRYPTO_MAIN_ZIP			0x06F10101 /* Main Zip crypto algo */
 +#define _7Z_CRYPTO_RAR_29			0x06F10303 /* Rar29 AES-128 + (modified SHA-1) */
 +#define _7Z_CRYPTO_AES_256_SHA_256	0x06F10701 /* AES-256 + SHA-256 */
 +
 +
 +#define _7Z_X86		0x03030103
 +#define _7Z_X86_BCJ2	0x0303011B
 +#define _7Z_POWERPC	0x03030205
 +#define _7Z_IA64	0x03030401
 +#define _7Z_ARM		0x03030501
 +#define _7Z_ARMTHUMB	0x03030701
 +#define _7Z_SPARC	0x03030805
 +
 +/*
 + * 7-Zip header property IDs.
 + */
 +#define kEnd			0x00
 +#define kHeader			0x01
 +#define kArchiveProperties	0x02
 +#define kAdditionalStreamsInfo	0x03
 +#define kMainStreamsInfo	0x04
 +#define kFilesInfo		0x05
 +#define kPackInfo		0x06
 +#define kUnPackInfo		0x07
 +#define kSubStreamsInfo		0x08
 +#define kSize			0x09
 +#define kCRC			0x0A
 +#define kFolder			0x0B
 +#define kCodersUnPackSize	0x0C
 +#define kNumUnPackStream	0x0D
 +#define kEmptyStream		0x0E
 +#define kEmptyFile		0x0F
 +#define kAnti			0x10
 +#define kName			0x11
 +#define kCTime			0x12
 +#define kATime			0x13
 +#define kMTime			0x14
 +#define kAttributes		0x15
 +#define kEncodedHeader		0x17
 +#define kDummy			0x19
 +
 +struct _7z_digests {
 +	unsigned char	*defineds;
 +	uint32_t	*digests;
 +};
 +
 +
 +struct _7z_folder {
 +	uint64_t		 numCoders;
 +	struct _7z_coder {
 +		unsigned long	 codec;
 +		uint64_t	 numInStreams;
 +		uint64_t	 numOutStreams;
 +		uint64_t	 propertiesSize;
 +		unsigned char	*properties;
 +	} *coders;
 +	uint64_t		 numBindPairs;
 +	struct {
 +		uint64_t	 inIndex;
 +		uint64_t	 outIndex;
 +	} *bindPairs;
 +	uint64_t		 numPackedStreams;
 +	uint64_t		*packedStreams;
 +	uint64_t		 numInStreams;
 +	uint64_t		 numOutStreams;
 +	uint64_t		*unPackSize;
 +	unsigned char		 digest_defined;
 +	uint32_t		 digest;
 +	uint64_t		 numUnpackStreams;
 +	uint32_t		 packIndex;
 +	/* Unoperated bytes. */
 +	uint64_t		 skipped_bytes;
 +};
 +
 +struct _7z_coders_info {
 +	uint64_t		 numFolders;
 +	struct _7z_folder	*folders;
 +	uint64_t		 dataStreamIndex;
 +};
 +
 +struct _7z_pack_info {
 +	uint64_t		 pos;
 +	uint64_t		 numPackStreams;
 +	uint64_t		*sizes;
 +	struct _7z_digests	 digest;
 +	/* Calculated from pos and numPackStreams. */
 +	uint64_t		*positions;
 +};
 +
 +struct _7z_substream_info {
 +	size_t			 unpack_streams;
 +	uint64_t		*unpackSizes;
 +	unsigned char		*digestsDefined;
 +	uint32_t		*digests;
 +};
 +
 +struct _7z_stream_info {
 +	struct _7z_pack_info	 pi;
 +	struct _7z_coders_info	 ci;
 +	struct _7z_substream_info ss;
 +};
 +
 +struct _7z_header_info {
 +	uint64_t		 dataIndex;
 +
 +	unsigned char		*emptyStreamBools;
 +	unsigned char		*emptyFileBools;
 +	unsigned char		*antiBools;
 +	unsigned char		*attrBools;
 +};
 +
 +struct _7zip_entry {
 +	size_t			 name_len;
 +	unsigned char		*utf16name;
 +#if defined(_WIN32) && !defined(__CYGWIN__) && defined(_DEBUG)
 +	const wchar_t		*wname;
 +#endif
 +	uint32_t		 folderIndex;
 +	uint32_t		 ssIndex;
 +	unsigned		 flg;
 +#define MTIME_IS_SET	(1<<0)
 +#define ATIME_IS_SET	(1<<1)
 +#define CTIME_IS_SET	(1<<2)
 +#define CRC32_IS_SET	(1<<3)
 +#define HAS_STREAM	(1<<4)
 +
 +	time_t			 mtime;
 +	time_t			 atime;
 +	time_t			 ctime;
 +	long			 mtime_ns;
 +	long			 atime_ns;
 +	long			 ctime_ns;
 +	uint32_t		 mode;
 +	uint32_t		 attr;
 +};
 +
 +struct _7zip {
 +	/* Structural information about the archive. */
 +	struct _7z_stream_info	 si;
 +
 +	int			 header_is_being_read;
 +	int			 header_is_encoded;
 +	uint64_t		 header_bytes_remaining;
 +	unsigned long		 header_crc32;
- 	/* Header offset to check that reading pointes of the file contens
++	/* Header offset to check that reading points of the file contents
 +	 * will not exceed the header. */
 +	uint64_t		 header_offset;
 +	/* Base offset of the archive file for a seek in case reading SFX. */
 +	uint64_t		 seek_base;
 +
 +	/* List of entries */
 +	size_t			 entries_remaining;
 +	uint64_t		 numFiles;
 +	struct _7zip_entry	*entries;
 +	struct _7zip_entry	*entry;
 +	unsigned char		*entry_names;
 +
 +	/* entry_bytes_remaining is the number of bytes we expect. */
 +	int64_t			 entry_offset;
 +	uint64_t		 entry_bytes_remaining;
 +
 +	/* Running CRC32 of the decompressed data */
 +	unsigned long		 entry_crc32;
 +
 +	/* Flags to mark progress of decompression. */
 +	char			 end_of_entry;
 +
 +	/* Uncompressed buffer control.  */
 +#define UBUFF_SIZE	(64 * 1024)
 +	unsigned char 		*uncompressed_buffer;
 +	unsigned char 		*uncompressed_buffer_pointer;
 +	size_t 			 uncompressed_buffer_size;
 +	size_t			 uncompressed_buffer_bytes_remaining;
 +
 +	/* Offset of the compressed data. */
 +	int64_t			 stream_offset;
 +
 +	/*
 +	 * Decompressing control data.
 +	 */
 +	unsigned		 folder_index;
 +	uint64_t		 folder_outbytes_remaining;
 +	unsigned		 pack_stream_index;
 +	unsigned		 pack_stream_remaining;
 +	uint64_t		 pack_stream_inbytes_remaining;
 +	size_t			 pack_stream_bytes_unconsumed;
 +
 +	/* The codec information of a folder. */
 +	unsigned long		 codec;
 +	unsigned long		 codec2;
 +
 +	/*
 +	 * Decompressor controllers.
 +	 */
- 	/* Decording LZMA1 and LZMA2 data. */
++	/* Decoding LZMA1 and LZMA2 data. */
 +#ifdef HAVE_LZMA_H
 +	lzma_stream		 lzstream;
 +	int			 lzstream_valid;
 +#endif
- 	/* Decording bzip2 data. */
++	/* Decoding bzip2 data. */
 +#if defined(HAVE_BZLIB_H) && defined(BZ_CONFIG_ERROR)
 +	bz_stream		 bzstream;
 +	int			 bzstream_valid;
 +#endif
- 	/* Decording deflate data. */
++	/* Decoding deflate data. */
 +#ifdef HAVE_ZLIB_H
 +	z_stream		 stream;
 +	int			 stream_valid;
 +#endif
- 	/* Decording PPMd data. */
++	/* Decoding PPMd data. */
 +	int			 ppmd7_stat;
 +	CPpmd7			 ppmd7_context;
 +	CPpmd7z_RangeDec	 range_dec;
 +	IByteIn			 bytein;
 +	struct {
 +		const unsigned char	*next_in;
 +		int64_t			 avail_in;
 +		int64_t			 total_in;
 +		unsigned char		*next_out;
 +		int64_t			 avail_out;
 +		int64_t			 total_out;
 +		int			 overconsumed;
 +	} ppstream;
 +	int			 ppmd7_valid;
 +
 +	/* Decoding BCJ and BCJ2 data. */
 +	uint32_t		 bcj_state;
 +	size_t			 odd_bcj_size;
 +	unsigned char		 odd_bcj[4];
 +	/* Decoding BCJ data. */
 +	size_t			 bcj_prevPosT;
 +	uint32_t		 bcj_prevMask;
 +	uint32_t		 bcj_ip;
 +
 +	/* Decoding BCJ2 data. */
 +	size_t			 main_stream_bytes_remaining;
 +	unsigned char		*sub_stream_buff[3];
 +	size_t			 sub_stream_size[3];
 +	size_t			 sub_stream_bytes_remaining[3];
 +	unsigned char		*tmp_stream_buff;
 +	size_t			 tmp_stream_buff_size;
 +	size_t			 tmp_stream_bytes_avail;
 +	size_t			 tmp_stream_bytes_remaining;
 +#ifdef _LZMA_PROB32
 +#define CProb uint32_t
 +#else
 +#define CProb uint16_t
 +#endif
 +	CProb			 bcj2_p[256 + 2];
 +	uint8_t			 bcj2_prevByte;
 +	uint32_t		 bcj2_range;
 +	uint32_t		 bcj2_code;
 +	uint64_t		 bcj2_outPos;
 +
 +	/* Filename character-set conversion data. */
 +	struct archive_string_conv *sconv;
 +
 +	char			 format_name[64];
 +
 +	/* Custom value that is non-zero if this archive contains encrypted entries. */
 +	int			 has_encrypted_entries;
 +};
 +
 +/* Maximum entry size. This limitation prevents reading intentional
 + * corrupted 7-zip files on assuming there are not so many entries in
 + * the files. */
 +#define UMAX_ENTRY	ARCHIVE_LITERAL_ULL(100000000)
 +
 +static int	archive_read_format_7zip_has_encrypted_entries(struct archive_read *);
 +static int	archive_read_support_format_7zip_capabilities(struct archive_read *a);
 +static int	archive_read_format_7zip_bid(struct archive_read *, int);
 +static int	archive_read_format_7zip_cleanup(struct archive_read *);
 +static int	archive_read_format_7zip_read_data(struct archive_read *,
 +		    const void **, size_t *, int64_t *);
 +static int	archive_read_format_7zip_read_data_skip(struct archive_read *);
 +static int	archive_read_format_7zip_read_header(struct archive_read *,
 +		    struct archive_entry *);
 +static int	check_7zip_header_in_sfx(const char *);
 +static unsigned long decode_codec_id(const unsigned char *, size_t);
 +static int	decode_encoded_header_info(struct archive_read *,
 +		    struct _7z_stream_info *);
 +static int	decompress(struct archive_read *, struct _7zip *,
 +		    void *, size_t *, const void *, size_t *);
 +static ssize_t	extract_pack_stream(struct archive_read *, size_t);
 +static void	fileTimeToUtc(uint64_t, time_t *, long *);
 +static uint64_t folder_uncompressed_size(struct _7z_folder *);
 +static void	free_CodersInfo(struct _7z_coders_info *);
 +static void	free_Digest(struct _7z_digests *);
 +static void	free_Folder(struct _7z_folder *);
 +static void	free_Header(struct _7z_header_info *);
 +static void	free_PackInfo(struct _7z_pack_info *);
 +static void	free_StreamsInfo(struct _7z_stream_info *);
 +static void	free_SubStreamsInfo(struct _7z_substream_info *);
 +static int	free_decompression(struct archive_read *, struct _7zip *);
 +static ssize_t	get_uncompressed_data(struct archive_read *, const void **,
 +		    size_t, size_t);
 +static const unsigned char * header_bytes(struct archive_read *, size_t);
 +static int	init_decompression(struct archive_read *, struct _7zip *,
 +		    const struct _7z_coder *, const struct _7z_coder *);
 +static int	parse_7zip_uint64(struct archive_read *, uint64_t *);
 +static int	read_Bools(struct archive_read *, unsigned char *, size_t);
 +static int	read_CodersInfo(struct archive_read *,
 +		    struct _7z_coders_info *);
 +static int	read_Digests(struct archive_read *, struct _7z_digests *,
 +		    size_t);
 +static int	read_Folder(struct archive_read *, struct _7z_folder *);
 +static int	read_Header(struct archive_read *, struct _7z_header_info *,
 +		    int);
 +static int	read_PackInfo(struct archive_read *, struct _7z_pack_info *);
 +static int	read_StreamsInfo(struct archive_read *,
 +		    struct _7z_stream_info *);
 +static int	read_SubStreamsInfo(struct archive_read *,
 +		    struct _7z_substream_info *, struct _7z_folder *, size_t);
 +static int	read_Times(struct archive_read *, struct _7z_header_info *,
 +		    int);
 +static void	read_consume(struct archive_read *);
 +static ssize_t	read_stream(struct archive_read *, const void **, size_t,
 +		    size_t);
 +static int	seek_pack(struct archive_read *);
 +static int64_t	skip_stream(struct archive_read *, size_t);
 +static int	skip_sfx(struct archive_read *, ssize_t);
 +static int	slurp_central_directory(struct archive_read *, struct _7zip *,
 +		    struct _7z_header_info *);
 +static int	setup_decode_folder(struct archive_read *, struct _7z_folder *,
 +		    int);
 +static void	x86_Init(struct _7zip *);
 +static size_t	x86_Convert(struct _7zip *, uint8_t *, size_t);
 +static ssize_t		Bcj2_Decode(struct _7zip *, uint8_t *, size_t);
 +
 +
 +int
 +archive_read_support_format_7zip(struct archive *_a)
 +{
 +	struct archive_read *a = (struct archive_read *)_a;
 +	struct _7zip *zip;
 +	int r;
 +
 +	archive_check_magic(_a, ARCHIVE_READ_MAGIC,
 +	    ARCHIVE_STATE_NEW, "archive_read_support_format_7zip");
 +
 +	zip = calloc(1, sizeof(*zip));
 +	if (zip == NULL) {
 +		archive_set_error(&a->archive, ENOMEM,
 +		    "Can't allocate 7zip data");
 +		return (ARCHIVE_FATAL);
 +	}
 +
 +	/*
 +	 * Until enough data has been read, we cannot tell about
 +	 * any encrypted entries yet.
 +	 */
 +	zip->has_encrypted_entries = ARCHIVE_READ_FORMAT_ENCRYPTION_DONT_KNOW;
 +
 +
 +	r = __archive_read_register_format(a,
 +	    zip,
 +	    "7zip",
 +	    archive_read_format_7zip_bid,
 +	    NULL,
 +	    archive_read_format_7zip_read_header,
 +	    archive_read_format_7zip_read_data,
 +	    archive_read_format_7zip_read_data_skip,
 +	    NULL,
 +	    archive_read_format_7zip_cleanup,
 +	    archive_read_support_format_7zip_capabilities,
 +	    archive_read_format_7zip_has_encrypted_entries);
 +
 +	if (r != ARCHIVE_OK)
 +		free(zip);
 +	return (ARCHIVE_OK);
 +}
 +
 +static int
 +archive_read_support_format_7zip_capabilities(struct archive_read * a)
 +{
 +	(void)a; /* UNUSED */
 +	return (ARCHIVE_READ_FORMAT_CAPS_ENCRYPT_DATA |
 +			ARCHIVE_READ_FORMAT_CAPS_ENCRYPT_METADATA);
 +}
 +
 +
 +static int
 +archive_read_format_7zip_has_encrypted_entries(struct archive_read *_a)
 +{
 +	if (_a && _a->format) {
 +		struct _7zip * zip = (struct _7zip *)_a->format->data;
 +		if (zip) {
 +			return zip->has_encrypted_entries;
 +		}
 +	}
 +	return ARCHIVE_READ_FORMAT_ENCRYPTION_DONT_KNOW;
 +}
 +
 +static int
 +archive_read_format_7zip_bid(struct archive_read *a, int best_bid)
 +{
 +	const char *p;
 +
 +	/* If someone has already bid more than 32, then avoid
 +	   trashing the look-ahead buffers with a seek. */
 +	if (best_bid > 32)
 +		return (-1);
 +
 +	if ((p = __archive_read_ahead(a, 6, NULL)) == NULL)
 +		return (0);
 +
 +	/* If first six bytes are the 7-Zip signature,
 +	 * return the bid right now. */
 +	if (memcmp(p, _7ZIP_SIGNATURE, 6) == 0)
 +		return (48);
 +
 +	/*
 +	 * It may a 7-Zip SFX archive file. If first two bytes are
 +	 * 'M' and 'Z' available on Windows or first four bytes are
 +	 * "\x7F\x45LF" available on posix like system, seek the 7-Zip
 +	 * signature. Although we will perform a seek when reading
 +	 * a header, what we do not use __archive_read_seek() here is
 +	 * due to a bidding performance.
 +	 */
 +	if ((p[0] == 'M' && p[1] == 'Z') || memcmp(p, "\x7F\x45LF", 4) == 0) {
 +		ssize_t offset = SFX_MIN_ADDR;
 +		ssize_t window = 4096;
 +		ssize_t bytes_avail;
 +		while (offset + window <= (SFX_MAX_ADDR)) {
 +			const char *buff = __archive_read_ahead(a,
 +					offset + window, &bytes_avail);
 +			if (buff == NULL) {
 +				/* Remaining bytes are less than window. */
 +				window >>= 1;
 +				if (window < 0x40)
 +					return (0);
 +				continue;
 +			}
 +			p = buff + offset;
 +			while (p + 32 < buff + bytes_avail) {
 +				int step = check_7zip_header_in_sfx(p);
 +				if (step == 0)
 +					return (48);
 +				p += step;
 +			}
 +			offset = p - buff;
 +		}
 +	}
 +	return (0);
 +}
 +
 +static int
 +check_7zip_header_in_sfx(const char *p)
 +{
 +	switch ((unsigned char)p[5]) {
 +	case 0x1C:
 +		if (memcmp(p, _7ZIP_SIGNATURE, 6) != 0)
 +			return (6);
 +		/*
 +		 * Test the CRC because its extraction code has 7-Zip
 +		 * Magic Code, so we should do this in order not to
 +		 * make a mis-detection.
 +		 */
 +		if (crc32(0, (const unsigned char *)p + 12, 20)
 +			!= archive_le32dec(p + 8))
 +			return (6);
 +		/* Hit the header! */
 +		return (0);
 +	case 0x37: return (5);
 +	case 0x7A: return (4);
 +	case 0xBC: return (3);
 +	case 0xAF: return (2);
 +	case 0x27: return (1);
 +	default: return (6);
 +	}
 +}
 +
 +static int
 +skip_sfx(struct archive_read *a, ssize_t bytes_avail)
 +{
 +	const void *h;
 +	const char *p, *q;
 +	size_t skip, offset;
 +	ssize_t bytes, window;
 +
 +	/*
 +	 * If bytes_avail > SFX_MIN_ADDR we do not have to call
 +	 * __archive_read_seek() at this time since we have
- 	 * alredy had enough data.
++	 * already had enough data.
 +	 */
 +	if (bytes_avail > SFX_MIN_ADDR)
 +		__archive_read_consume(a, SFX_MIN_ADDR);
 +	else if (__archive_read_seek(a, SFX_MIN_ADDR, SEEK_SET) < 0)
 +		return (ARCHIVE_FATAL);
 +
 +	offset = 0;
 +	window = 1;
 +	while (offset + window <= SFX_MAX_ADDR - SFX_MIN_ADDR) {
 +		h = __archive_read_ahead(a, window, &bytes);
 +		if (h == NULL) {
 +			/* Remaining bytes are less than window. */
 +			window >>= 1;
 +			if (window < 0x40)
 +				goto fatal;
 +			continue;
 +		}
 +		if (bytes < 6) {
 +			/* This case might happen when window == 1. */
 +			window = 4096;
 +			continue;
 +		}
 +		p = (const char *)h;
 +		q = p + bytes;
 +
 +		/*
 +		 * Scan ahead until we find something that looks
 +		 * like the 7-Zip header.
 +		 */
 +		while (p + 32 < q) {
 +			int step = check_7zip_header_in_sfx(p);
 +			if (step == 0) {
 +				struct _7zip *zip =
 +				    (struct _7zip *)a->format->data;
 +				skip = p - (const char *)h;
 +				__archive_read_consume(a, skip);
 +				zip->seek_base = SFX_MIN_ADDR + offset + skip;
 +				return (ARCHIVE_OK);
 +			}
 +			p += step;
 +		}
 +		skip = p - (const char *)h;
 +		__archive_read_consume(a, skip);
 +		offset += skip;
 +		if (window == 1)
 +			window = 4096;
 +	}
 +fatal:
 +	archive_set_error(&a->archive, ARCHIVE_ERRNO_FILE_FORMAT,
 +	    "Couldn't find out 7-Zip header");
 +	return (ARCHIVE_FATAL);
 +}
 +
 +static int
 +archive_read_format_7zip_read_header(struct archive_read *a,
 +	struct archive_entry *entry)
 +{
 +	struct _7zip *zip = (struct _7zip *)a->format->data;
 +	struct _7zip_entry *zip_entry;
 +	int r, ret = ARCHIVE_OK;
 +	struct _7z_folder *folder = 0;
 +	uint64_t fidx = 0;
 +
 +	/*
 +	 * It should be sufficient to call archive_read_next_header() for
 +	 * a reader to determine if an entry is encrypted or not. If the
 +	 * encryption of an entry is only detectable when calling
 +	 * archive_read_data(), so be it. We'll do the same check there
 +	 * as well.
 +	 */
 +	if (zip->has_encrypted_entries == ARCHIVE_READ_FORMAT_ENCRYPTION_DONT_KNOW) {
 +		zip->has_encrypted_entries = 0;
 +	}
 +
 +	a->archive.archive_format = ARCHIVE_FORMAT_7ZIP;
 +	if (a->archive.archive_format_name == NULL)
 +		a->archive.archive_format_name = "7-Zip";
 +
 +	if (zip->entries == NULL) {
 +		struct _7z_header_info header;
 +
 +		memset(&header, 0, sizeof(header));
 +		r = slurp_central_directory(a, zip, &header);
 +		free_Header(&header);
 +		if (r != ARCHIVE_OK)
 +			return (r);
 +		zip->entries_remaining = (size_t)zip->numFiles;
 +		zip->entry = zip->entries;
 +	} else {
 +		++zip->entry;
 +	}
 +	zip_entry = zip->entry;
 +
 +	if (zip->entries_remaining <= 0 || zip_entry == NULL)
 +		return ARCHIVE_EOF;
 +	--zip->entries_remaining;
 +
 +	zip->entry_offset = 0;
 +	zip->end_of_entry = 0;
 +	zip->entry_crc32 = crc32(0, NULL, 0);
 +
 +	/* Setup a string conversion for a filename. */
 +	if (zip->sconv == NULL) {
 +		zip->sconv = archive_string_conversion_from_charset(
 +		    &a->archive, "UTF-16LE", 1);
 +		if (zip->sconv == NULL)
 +			return (ARCHIVE_FATAL);
 +	}
 +
 +	/* Figure out if the entry is encrypted by looking at the folder
 +	   that is associated to the current 7zip entry. If the folder
 +	   has a coder with a _7Z_CRYPTO codec then the folder is encrypted.
 +	   Hence the entry must also be encrypted. */
 +	if (zip_entry && zip_entry->folderIndex < zip->si.ci.numFolders) {
 +		folder = &(zip->si.ci.folders[zip_entry->folderIndex]);
 +		for (fidx=0; folder && fidx<folder->numCoders; fidx++) {
 +			switch(folder->coders[fidx].codec) {
 +				case _7Z_CRYPTO_MAIN_ZIP:
 +				case _7Z_CRYPTO_RAR_29:
 +				case _7Z_CRYPTO_AES_256_SHA_256: {
 +					archive_entry_set_is_data_encrypted(entry, 1);
 +					zip->has_encrypted_entries = 1;
 +					break;
 +				}
 +			}
 +		}
 +	}
 +
 +	/* Now that we've checked for encryption, if there were still no
 +	 * encrypted entries found we can say for sure that there are none.
 +	 */
 +	if (zip->has_encrypted_entries == ARCHIVE_READ_FORMAT_ENCRYPTION_DONT_KNOW) {
 +		zip->has_encrypted_entries = 0;
 +	}
 +
 +	if (archive_entry_copy_pathname_l(entry,
 +	    (const char *)zip_entry->utf16name,
 +	    zip_entry->name_len, zip->sconv) != 0) {
 +		if (errno == ENOMEM) {
 +			archive_set_error(&a->archive, ENOMEM,
 +			    "Can't allocate memory for Pathname");
 +			return (ARCHIVE_FATAL);
 +		}
 +		archive_set_error(&a->archive,
 +		    ARCHIVE_ERRNO_FILE_FORMAT,
 +		    "Pathname cannot be converted "
 +		    "from %s to current locale.",
 +		    archive_string_conversion_charset_name(zip->sconv));
 +		ret = ARCHIVE_WARN;
 +	}
 +
 +	/* Populate some additional entry fields: */
 +	archive_entry_set_mode(entry, zip_entry->mode);
 +	if (zip_entry->flg & MTIME_IS_SET)
 +		archive_entry_set_mtime(entry, zip_entry->mtime,
 +			zip_entry->mtime_ns);
 +	if (zip_entry->flg & CTIME_IS_SET)
 +		archive_entry_set_ctime(entry, zip_entry->ctime,
 +		    zip_entry->ctime_ns);
 +	if (zip_entry->flg & ATIME_IS_SET)
 +		archive_entry_set_atime(entry, zip_entry->atime,
 +		    zip_entry->atime_ns);
 +	if (zip_entry->ssIndex != (uint32_t)-1) {
 +		zip->entry_bytes_remaining =
 +		    zip->si.ss.unpackSizes[zip_entry->ssIndex];
 +		archive_entry_set_size(entry, zip->entry_bytes_remaining);
 +	} else {
 +		zip->entry_bytes_remaining = 0;
 +		archive_entry_set_size(entry, 0);
 +	}
 +
 +	/* If there's no body, force read_data() to return EOF immediately. */
 +	if (zip->entry_bytes_remaining < 1)
 +		zip->end_of_entry = 1;
 +
 +	if ((zip_entry->mode & AE_IFMT) == AE_IFLNK) {
 +		unsigned char *symname = NULL;
 +		size_t symsize = 0;
 +
 +		/*
 +		 * Symbolic-name is recorded as its contents. We have to
 +		 * read the contents at this time.
 +		 */
 +		while (zip->entry_bytes_remaining > 0) {
 +			const void *buff;
 +			unsigned char *mem;
 +			size_t size;
 +			int64_t offset;
 +
 +			r = archive_read_format_7zip_read_data(a, &buff,
 +				&size, &offset);
 +			if (r < ARCHIVE_WARN) {
 +				free(symname);
 +				return (r);
 +			}
 +			mem = realloc(symname, symsize + size + 1);
 +			if (mem == NULL) {
 +				free(symname);
 +				archive_set_error(&a->archive, ENOMEM,
 +				    "Can't allocate memory for Symname");
 +				return (ARCHIVE_FATAL);
 +			}
 +			symname = mem;
 +			memcpy(symname+symsize, buff, size);
 +			symsize += size;
 +		}
 +		if (symsize == 0) {
- 			/* If there is no synname, handle it as a regular
++			/* If there is no symname, handle it as a regular
 +			 * file. */
 +			zip_entry->mode &= ~AE_IFMT;
 +			zip_entry->mode |= AE_IFREG;
 +			archive_entry_set_mode(entry, zip_entry->mode);
 +		} else {
 +			symname[symsize] = '\0';
 +			archive_entry_copy_symlink(entry,
 +			    (const char *)symname);
 +		}
 +		free(symname);
 +		archive_entry_set_size(entry, 0);
 +	}
 +
 +	/* Set up a more descriptive format name. */
 +	sprintf(zip->format_name, "7-Zip");
 +	a->archive.archive_format_name = zip->format_name;
 +
 +	return (ret);
 +}
 +
 +static int
 +archive_read_format_7zip_read_data(struct archive_read *a,
 +    const void **buff, size_t *size, int64_t *offset)
 +{
 +	struct _7zip *zip;
 +	ssize_t bytes;
 +	int ret = ARCHIVE_OK;
 +
 +	zip = (struct _7zip *)(a->format->data);
 +
 +	if (zip->has_encrypted_entries == ARCHIVE_READ_FORMAT_ENCRYPTION_DONT_KNOW) {
 +		zip->has_encrypted_entries = 0;
 +	}
 +
 +	if (zip->pack_stream_bytes_unconsumed)
 +		read_consume(a);
 +
 +	*offset = zip->entry_offset;
 +	*size = 0;
 +	*buff = NULL;
 +	/*
 +	 * If we hit end-of-entry last time, clean up and return
 +	 * ARCHIVE_EOF this time.
 +	 */
 +	if (zip->end_of_entry)
 +		return (ARCHIVE_EOF);
 +
 +	bytes = read_stream(a, buff,
 +		(size_t)zip->entry_bytes_remaining, 0);
 +	if (bytes < 0)
 +		return ((int)bytes);
 +	if (bytes == 0) {
 +		archive_set_error(&a->archive,
 +		    ARCHIVE_ERRNO_FILE_FORMAT,
 +		    "Truncated 7-Zip file body");
 +		return (ARCHIVE_FATAL);
 +	}
 +	zip->entry_bytes_remaining -= bytes;
 +	if (zip->entry_bytes_remaining == 0)
 +		zip->end_of_entry = 1;
 +
 +	/* Update checksum */
 +	if ((zip->entry->flg & CRC32_IS_SET) && bytes)
 +		zip->entry_crc32 = crc32(zip->entry_crc32, *buff,
 +		    (unsigned)bytes);
 +
 +	/* If we hit the end, swallow any end-of-data marker. */
 +	if (zip->end_of_entry) {
 +		/* Check computed CRC against file contents. */
 +		if ((zip->entry->flg & CRC32_IS_SET) &&
 +			zip->si.ss.digests[zip->entry->ssIndex] !=
 +		    zip->entry_crc32) {
 +			archive_set_error(&a->archive, ARCHIVE_ERRNO_MISC,
 +			    "7-Zip bad CRC: 0x%lx should be 0x%lx",
 +			    (unsigned long)zip->entry_crc32,
 +			    (unsigned long)zip->si.ss.digests[
 +			    		zip->entry->ssIndex]);
 +			ret = ARCHIVE_WARN;
 +		}
 +	}
 +
 +	*size = bytes;
 +	*offset = zip->entry_offset;
 +	zip->entry_offset += bytes;
 +
 +	return (ret);
 +}
 +
 +static int
 +archive_read_format_7zip_read_data_skip(struct archive_read *a)
 +{
 +	struct _7zip *zip;
 +	int64_t bytes_skipped;
 +
 +	zip = (struct _7zip *)(a->format->data);
 +
 +	if (zip->pack_stream_bytes_unconsumed)
 +		read_consume(a);
 +
 +	/* If we've already read to end of data, we're done. */
 +	if (zip->end_of_entry)
 +		return (ARCHIVE_OK);
 +
 +	/*
 +	 * If the length is at the beginning, we can skip the
 +	 * compressed data much more quickly.
 +	 */
 +	bytes_skipped = skip_stream(a, (size_t)zip->entry_bytes_remaining);
 +	if (bytes_skipped < 0)
 +		return (ARCHIVE_FATAL);
 +	zip->entry_bytes_remaining = 0;
 +
 +	/* This entry is finished and done. */
 +	zip->end_of_entry = 1;
 +	return (ARCHIVE_OK);
 +}
 +
 +static int
 +archive_read_format_7zip_cleanup(struct archive_read *a)
 +{
 +	struct _7zip *zip;
 +
 +	zip = (struct _7zip *)(a->format->data);
 +	free_StreamsInfo(&(zip->si));
 +	free(zip->entries);
 +	free(zip->entry_names);
 +	free_decompression(a, zip);
 +	free(zip->uncompressed_buffer);
 +	free(zip->sub_stream_buff[0]);
 +	free(zip->sub_stream_buff[1]);
 +	free(zip->sub_stream_buff[2]);
 +	free(zip->tmp_stream_buff);
 +	free(zip);
 +	(a->format->data) = NULL;
 +	return (ARCHIVE_OK);
 +}
 +
 +static void
 +read_consume(struct archive_read *a)
 +{
 +	struct _7zip *zip = (struct _7zip *)a->format->data;
 +
 +	if (zip->pack_stream_bytes_unconsumed) {
 +		__archive_read_consume(a, zip->pack_stream_bytes_unconsumed);
 +		zip->stream_offset += zip->pack_stream_bytes_unconsumed;
 +		zip->pack_stream_bytes_unconsumed = 0;
 +	}
 +}
 +
 +#ifdef HAVE_LZMA_H
 +
 +/*
 + * Set an error code and choose an error message for liblzma.
 + */
 +static void
 +set_error(struct archive_read *a, int ret)
 +{
 +
 +	switch (ret) {
 +	case LZMA_STREAM_END: /* Found end of stream. */
 +	case LZMA_OK: /* Decompressor made some progress. */
 +		break;
 +	case LZMA_MEM_ERROR:
 +		archive_set_error(&a->archive, ENOMEM,
 +		    "Lzma library error: Cannot allocate memory");
 +		break;
 +	case LZMA_MEMLIMIT_ERROR:
 +		archive_set_error(&a->archive, ENOMEM,
 +		    "Lzma library error: Out of memory");
 +		break;
 +	case LZMA_FORMAT_ERROR:
 +		archive_set_error(&a->archive,
 +		    ARCHIVE_ERRNO_MISC,
 +		    "Lzma library error: format not recognized");
 +		break;
 +	case LZMA_OPTIONS_ERROR:
 +		archive_set_error(&a->archive,
 +		    ARCHIVE_ERRNO_MISC,
 +		    "Lzma library error: Invalid options");
 +		break;
 +	case LZMA_DATA_ERROR:
 +		archive_set_error(&a->archive,
 +		    ARCHIVE_ERRNO_MISC,
 +		    "Lzma library error: Corrupted input data");
 +		break;
 +	case LZMA_BUF_ERROR:
 +		archive_set_error(&a->archive,
 +		    ARCHIVE_ERRNO_MISC,
 +		    "Lzma library error:  No progress is possible");
 +		break;
 +	default:
 +		/* Return an error. */
 +		archive_set_error(&a->archive,
 +		    ARCHIVE_ERRNO_MISC,
 +		    "Lzma decompression failed:  Unknown error");
 +		break;
 +	}
 +}
 +
 +#endif
 +
 +static unsigned long
 +decode_codec_id(const unsigned char *codecId, size_t id_size)
 +{
 +	unsigned i;
 +	unsigned long id = 0;
 +
 +	for (i = 0; i < id_size; i++) {
 +		id <<= 8;
 +		id += codecId[i];
 +	}
 +	return (id);
 +}
 +
 +static void *
 +ppmd_alloc(void *p, size_t size)
 +{
 +	(void)p;
 +	return malloc(size);
 +}
 +static void
 +ppmd_free(void *p, void *address)
 +{
 +	(void)p;
 +	free(address);
 +}
 +static Byte
 +ppmd_read(void *p)
 +{
 +	struct archive_read *a = ((IByteIn*)p)->a;
 +	struct _7zip *zip = (struct _7zip *)(a->format->data);
 +	Byte b;
 +
 +	if (zip->ppstream.avail_in == 0) {
 +		archive_set_error(&a->archive, ARCHIVE_ERRNO_FILE_FORMAT,
 +		    "Truncated RAR file data");
 +		zip->ppstream.overconsumed = 1;
 +		return (0);
 +	}
 +	b = *zip->ppstream.next_in++;
 +	zip->ppstream.avail_in--;
 +	zip->ppstream.total_in++;
 +	return (b);
 +}
 +
 +static ISzAlloc g_szalloc = { ppmd_alloc, ppmd_free };
 +
 +static int
 +init_decompression(struct archive_read *a, struct _7zip *zip,
 +    const struct _7z_coder *coder1, const struct _7z_coder *coder2)
 +{
 +	int r;
 +
 +	zip->codec = coder1->codec;
 +	zip->codec2 = -1;
 +
 +	switch (zip->codec) {
 +	case _7Z_COPY:
 +	case _7Z_BZ2:
 +	case _7Z_DEFLATE:
 +	case _7Z_PPMD:
 +		if (coder2 != NULL) {
 +			if (coder2->codec != _7Z_X86 &&
 +			    coder2->codec != _7Z_X86_BCJ2) {
 +				archive_set_error(&a->archive,
 +				    ARCHIVE_ERRNO_MISC,
 +				    "Unsupported filter %lx for %lx",
 +				    coder2->codec, coder1->codec);
 +				return (ARCHIVE_FAILED);
 +			}
 +			zip->codec2 = coder2->codec;
 +			zip->bcj_state = 0;
 +			if (coder2->codec == _7Z_X86)
 +				x86_Init(zip);
 +		}
 +		break;
 +	default:
 +		break;
 +	}
 +
 +	switch (zip->codec) {
 +	case _7Z_COPY:
 +		break;
 +
 +	case _7Z_LZMA: case _7Z_LZMA2:
 +#ifdef HAVE_LZMA_H
 +#if LZMA_VERSION_MAJOR >= 5
 +/* Effectively disable the limiter. */
 +#define LZMA_MEMLIMIT   UINT64_MAX
 +#else
 +/* NOTE: This needs to check memory size which running system has. */
 +#define LZMA_MEMLIMIT   (1U << 30)
 +#endif
 +	{
 +		lzma_options_delta delta_opt;
- 		lzma_filter filters[LZMA_FILTERS_MAX];
- #if LZMA_VERSION < 50010000
- 		lzma_filter *ff;
- #endif
++		lzma_filter filters[LZMA_FILTERS_MAX], *ff;
 +		int fi = 0;
 +
 +		if (zip->lzstream_valid) {
 +			lzma_end(&(zip->lzstream));
 +			zip->lzstream_valid = 0;
 +		}
 +
 +		/*
 +		 * NOTE: liblzma incompletely handle the BCJ+LZMA compressed
 +		 * data made by 7-Zip because 7-Zip does not add End-Of-
 +		 * Payload Marker(EOPM) at the end of LZMA compressed data,
 +		 * and so liblzma cannot know the end of the compressed data
 +		 * without EOPM. So consequently liblzma will not return last
 +		 * three or four bytes of uncompressed data because
 +		 * LZMA_FILTER_X86 filter does not handle input data if its
 +		 * data size is less than five bytes. If liblzma detect EOPM
 +		 * or know the uncompressed data size, liblzma will flush out
 +		 * the remaining that three or four bytes of uncompressed
 +		 * data. That is why we have to use our converting program
 +		 * for BCJ+LZMA. If we were able to tell the uncompressed
 +		 * size to liblzma when using lzma_raw_decoder() liblzma
 +		 * could correctly deal with BCJ+LZMA. But unfortunately
 +		 * there is no way to do that.
 +		 * Discussion about this can be found at XZ Utils forum.
 +		 */
 +		if (coder2 != NULL) {
 +			zip->codec2 = coder2->codec;
 +
 +			filters[fi].options = NULL;
 +			switch (zip->codec2) {
 +			case _7Z_X86:
 +				if (zip->codec == _7Z_LZMA2) {
 +					filters[fi].id = LZMA_FILTER_X86;
 +					fi++;
 +				} else
 +					/* Use our filter. */
 +					x86_Init(zip);
 +				break;
 +			case _7Z_X86_BCJ2:
 +				/* Use our filter. */
 +				zip->bcj_state = 0;
 +				break;
 +			case _7Z_DELTA:
 +				filters[fi].id = LZMA_FILTER_DELTA;
 +				memset(&delta_opt, 0, sizeof(delta_opt));
 +				delta_opt.type = LZMA_DELTA_TYPE_BYTE;
 +				delta_opt.dist = 1;
 +				filters[fi].options = &delta_opt;
 +				fi++;
 +				break;
 +			/* Following filters have not been tested yet. */
 +			case _7Z_POWERPC:
 +				filters[fi].id = LZMA_FILTER_POWERPC;
 +				fi++;
 +				break;
 +			case _7Z_IA64:
 +				filters[fi].id = LZMA_FILTER_IA64;
 +				fi++;
 +				break;
 +			case _7Z_ARM:
 +				filters[fi].id = LZMA_FILTER_ARM;
 +				fi++;
 +				break;
 +			case _7Z_ARMTHUMB:
 +				filters[fi].id = LZMA_FILTER_ARMTHUMB;
 +				fi++;
 +				break;
 +			case _7Z_SPARC:
 +				filters[fi].id = LZMA_FILTER_SPARC;
 +				fi++;
 +				break;
 +			default:
 +				archive_set_error(&a->archive,
 +				    ARCHIVE_ERRNO_MISC,
 +				    "Unexpected codec ID: %lX", zip->codec2);
 +				return (ARCHIVE_FAILED);
 +			}
 +		}
 +
 +		if (zip->codec == _7Z_LZMA2)
 +			filters[fi].id = LZMA_FILTER_LZMA2;
 +		else
 +			filters[fi].id = LZMA_FILTER_LZMA1;
 +		filters[fi].options = NULL;
- #if LZMA_VERSION < 50010000
 +		ff = &filters[fi];
- #endif
 +		r = lzma_properties_decode(&filters[fi], NULL,
 +		    coder1->properties, (size_t)coder1->propertiesSize);
 +		if (r != LZMA_OK) {
 +			set_error(a, r);
 +			return (ARCHIVE_FAILED);
 +		}
 +		fi++;
 +
 +		filters[fi].id = LZMA_VLI_UNKNOWN;
 +		filters[fi].options = NULL;
 +		r = lzma_raw_decoder(&(zip->lzstream), filters);
- #if LZMA_VERSION < 50010000
 +		free(ff->options);
- #endif
 +		if (r != LZMA_OK) {
 +			set_error(a, r);
 +			return (ARCHIVE_FAILED);
 +		}
 +		zip->lzstream_valid = 1;
 +		zip->lzstream.total_in = 0;
 +		zip->lzstream.total_out = 0;
 +		break;
 +	}
 +#else
 +		archive_set_error(&a->archive, ARCHIVE_ERRNO_MISC,
 +		    "LZMA codec is unsupported");
 +		return (ARCHIVE_FAILED);
 +#endif
 +	case _7Z_BZ2:
 +#if defined(HAVE_BZLIB_H) && defined(BZ_CONFIG_ERROR)
 +		if (zip->bzstream_valid) {
 +			BZ2_bzDecompressEnd(&(zip->bzstream));
 +			zip->bzstream_valid = 0;
 +		}
 +		r = BZ2_bzDecompressInit(&(zip->bzstream), 0, 0);
 +		if (r == BZ_MEM_ERROR)
 +			r = BZ2_bzDecompressInit(&(zip->bzstream), 0, 1);
 +		if (r != BZ_OK) {
 +			int err = ARCHIVE_ERRNO_MISC;
 +			const char *detail = NULL;
 +			switch (r) {
 +			case BZ_PARAM_ERROR:
 +				detail = "invalid setup parameter";
 +				break;
 +			case BZ_MEM_ERROR:
 +				err = ENOMEM;
 +				detail = "out of memory";
 +				break;
 +			case BZ_CONFIG_ERROR:
 +				detail = "mis-compiled library";
 +				break;
 +			}
 +			archive_set_error(&a->archive, err,
 +			    "Internal error initializing decompressor: %s",
 +			    detail != NULL ? detail : "??");
 +			zip->bzstream_valid = 0;
 +			return (ARCHIVE_FAILED);
 +		}
 +		zip->bzstream_valid = 1;
 +		zip->bzstream.total_in_lo32 = 0;
 +		zip->bzstream.total_in_hi32 = 0;
 +		zip->bzstream.total_out_lo32 = 0;
 +		zip->bzstream.total_out_hi32 = 0;
 +		break;
 +#else
 +		archive_set_error(&a->archive, ARCHIVE_ERRNO_MISC,
 +		    "BZ2 codec is unsupported");
 +		return (ARCHIVE_FAILED);
 +#endif
 +	case _7Z_DEFLATE:
 +#ifdef HAVE_ZLIB_H
 +		if (zip->stream_valid)
 +			r = inflateReset(&(zip->stream));
 +		else
 +			r = inflateInit2(&(zip->stream),
 +			    -15 /* Don't check for zlib header */);
 +		if (r != Z_OK) {
 +			archive_set_error(&a->archive, ARCHIVE_ERRNO_MISC,
 +			    "Couldn't initialize zlib stream.");
 +			return (ARCHIVE_FAILED);
 +		}
 +		zip->stream_valid = 1;
 +		zip->stream.total_in = 0;
 +		zip->stream.total_out = 0;
 +		break;
 +#else
 +		archive_set_error(&a->archive, ARCHIVE_ERRNO_MISC,
 +		    "DEFLATE codec is unsupported");
 +		return (ARCHIVE_FAILED);
 +#endif
 +	case _7Z_PPMD:
 +	{
 +		unsigned order;
 +		uint32_t msize;
 +
 +		if (zip->ppmd7_valid) {
 +			__archive_ppmd7_functions.Ppmd7_Free(
 +			    &zip->ppmd7_context, &g_szalloc);
 +			zip->ppmd7_valid = 0;
 +		}
 +
 +		if (coder1->propertiesSize < 5) {
 +			archive_set_error(&a->archive, ARCHIVE_ERRNO_MISC,
 +			    "Malformed PPMd parameter");
 +			return (ARCHIVE_FAILED);
 +		}
 +		order = coder1->properties[0];
 +		msize = archive_le32dec(&(coder1->properties[1]));
 +		if (order < PPMD7_MIN_ORDER || order > PPMD7_MAX_ORDER ||
 +		    msize < PPMD7_MIN_MEM_SIZE || msize > PPMD7_MAX_MEM_SIZE) {
 +			archive_set_error(&a->archive, ARCHIVE_ERRNO_MISC,
 +			    "Malformed PPMd parameter");
 +			return (ARCHIVE_FAILED);
 +		}
 +		__archive_ppmd7_functions.Ppmd7_Construct(&zip->ppmd7_context);
 +		r = __archive_ppmd7_functions.Ppmd7_Alloc(
 +			&zip->ppmd7_context, msize, &g_szalloc);
 +		if (r == 0) {
 +			archive_set_error(&a->archive, ENOMEM,
 +			    "Coludn't allocate memory for PPMd");
 +			return (ARCHIVE_FATAL);
 +		}
 +		__archive_ppmd7_functions.Ppmd7_Init(
 +			&zip->ppmd7_context, order);
 +		__archive_ppmd7_functions.Ppmd7z_RangeDec_CreateVTable(
 +			&zip->range_dec);
 +		zip->ppmd7_valid = 1;
 +		zip->ppmd7_stat = 0;
 +		zip->ppstream.overconsumed = 0;
 +		zip->ppstream.total_in = 0;
 +		zip->ppstream.total_out = 0;
 +		break;
 +	}
 +	case _7Z_X86:
 +	case _7Z_X86_BCJ2:
 +	case _7Z_POWERPC:
 +	case _7Z_IA64:
 +	case _7Z_ARM:
 +	case _7Z_ARMTHUMB:
 +	case _7Z_SPARC:
 +	case _7Z_DELTA:
 +		archive_set_error(&a->archive, ARCHIVE_ERRNO_MISC,
 +		    "Unexpected codec ID: %lX", zip->codec);
 +		return (ARCHIVE_FAILED);
 +	case _7Z_CRYPTO_MAIN_ZIP:
 +	case _7Z_CRYPTO_RAR_29:
 +	case _7Z_CRYPTO_AES_256_SHA_256:
 +		if (a->entry) {
 +			archive_entry_set_is_metadata_encrypted(a->entry, 1);
 +			archive_entry_set_is_data_encrypted(a->entry, 1);
 +			zip->has_encrypted_entries = 1;
 +		}
 +		archive_set_error(&a->archive, ARCHIVE_ERRNO_MISC,
 +		    "Crypto codec not supported yet (ID: 0x%lX)", zip->codec);
 +		return (ARCHIVE_FAILED);
 +	default:
 +		archive_set_error(&a->archive, ARCHIVE_ERRNO_MISC,
 +		    "Unknown codec ID: %lX", zip->codec);
 +		return (ARCHIVE_FAILED);
 +	}
 +
 +	return (ARCHIVE_OK);
 +}
 +
 +static int
 +decompress(struct archive_read *a, struct _7zip *zip,
 +    void *buff, size_t *outbytes, const void *b, size_t *used)
 +{
 +	const uint8_t *t_next_in;
 +	uint8_t *t_next_out;
 +	size_t o_avail_in, o_avail_out;
 +	size_t t_avail_in, t_avail_out;
 +	uint8_t *bcj2_next_out;
 +	size_t bcj2_avail_out;
 +	int r, ret = ARCHIVE_OK;
 +
 +	t_avail_in = o_avail_in = *used;
 +	t_avail_out = o_avail_out = *outbytes;
 +	t_next_in = b;
 +	t_next_out = buff;
 +
 +	if (zip->codec != _7Z_LZMA2 && zip->codec2 == _7Z_X86) {
 +		int i;
 +
 +		/* Do not copy out the BCJ remaining bytes when the output
 +		 * buffer size is less than five bytes. */
 +		if (o_avail_in != 0 && t_avail_out < 5 && zip->odd_bcj_size) {
 +			*used = 0;
 +			*outbytes = 0;
 +			return (ret);
 +		}
 +		for (i = 0; zip->odd_bcj_size > 0 && t_avail_out; i++) {
 +			*t_next_out++ = zip->odd_bcj[i];
 +			t_avail_out--;
 +			zip->odd_bcj_size--;
 +		}
 +		if (o_avail_in == 0 || t_avail_out == 0) {
 +			*used = o_avail_in - t_avail_in;
 +			*outbytes = o_avail_out - t_avail_out;
 +			if (o_avail_in == 0)
 +				ret = ARCHIVE_EOF;
 +			return (ret);
 +		}
 +	}
 +
 +	bcj2_next_out = t_next_out;
 +	bcj2_avail_out = t_avail_out;
 +	if (zip->codec2 == _7Z_X86_BCJ2) {
 +		/*
 +		 * Decord a remaining decompressed main stream for BCJ2.
 +		 */
 +		if (zip->tmp_stream_bytes_remaining) {
 +			ssize_t bytes;
 +			size_t remaining = zip->tmp_stream_bytes_remaining;
 +			bytes = Bcj2_Decode(zip, t_next_out, t_avail_out);
 +			if (bytes < 0) {
 +				archive_set_error(&(a->archive),
 +				    ARCHIVE_ERRNO_MISC,
 +				    "BCJ2 conversion Failed");
 +				return (ARCHIVE_FAILED);
 +			}
 +			zip->main_stream_bytes_remaining -=
 +			    remaining - zip->tmp_stream_bytes_remaining;
 +			t_avail_out -= bytes;
 +			if (o_avail_in == 0 || t_avail_out == 0) {
 +				*used = 0;
 +				*outbytes = o_avail_out - t_avail_out;
 +				if (o_avail_in == 0 &&
 +				    zip->tmp_stream_bytes_remaining)
 +					ret = ARCHIVE_EOF;
 +				return (ret);
 +			}
 +			t_next_out += bytes;
 +			bcj2_next_out = t_next_out;
 +			bcj2_avail_out = t_avail_out;
 +		}
 +		t_next_out = zip->tmp_stream_buff;
 +		t_avail_out = zip->tmp_stream_buff_size;
 +	}
 +
 +	switch (zip->codec) {
 +	case _7Z_COPY:
 +	{
 +		size_t bytes =
 +		    (t_avail_in > t_avail_out)?t_avail_out:t_avail_in;
 +
 +		memcpy(t_next_out, t_next_in, bytes);
 +		t_avail_in -= bytes;
 +		t_avail_out -= bytes;
 +		if (o_avail_in == 0)
 +			ret = ARCHIVE_EOF;
 +		break;
 +	}
 +#ifdef HAVE_LZMA_H
 +	case _7Z_LZMA: case _7Z_LZMA2:
 +		zip->lzstream.next_in = t_next_in;
 +		zip->lzstream.avail_in = t_avail_in;
 +		zip->lzstream.next_out = t_next_out;
 +		zip->lzstream.avail_out = t_avail_out;
 +
 +		r = lzma_code(&(zip->lzstream), LZMA_RUN);
 +		switch (r) {
 +		case LZMA_STREAM_END: /* Found end of stream. */
 +			lzma_end(&(zip->lzstream));
 +			zip->lzstream_valid = 0;
 +			ret = ARCHIVE_EOF;
 +			break;
 +		case LZMA_OK: /* Decompressor made some progress. */
 +			break;
 +		default:
 +			archive_set_error(&(a->archive),
 +			    ARCHIVE_ERRNO_MISC,
 +				"Decompression failed(%d)",
 +			    r);
 +			return (ARCHIVE_FAILED);
 +		}
 +		t_avail_in = zip->lzstream.avail_in;
 +		t_avail_out = zip->lzstream.avail_out;
 +		break;
 +#endif
 +#if defined(HAVE_BZLIB_H) && defined(BZ_CONFIG_ERROR)
 +	case _7Z_BZ2:
 +		zip->bzstream.next_in = (char *)(uintptr_t)t_next_in;
 +		zip->bzstream.avail_in = t_avail_in;
 +		zip->bzstream.next_out = (char *)(uintptr_t)t_next_out;
 +		zip->bzstream.avail_out = t_avail_out;
 +		r = BZ2_bzDecompress(&(zip->bzstream));
 +		switch (r) {
 +		case BZ_STREAM_END: /* Found end of stream. */
 +			switch (BZ2_bzDecompressEnd(&(zip->bzstream))) {
 +			case BZ_OK:
 +				break;
 +			default:
 +				archive_set_error(&(a->archive),
 +				    ARCHIVE_ERRNO_MISC,
 +				    "Failed to clean up decompressor");
 +				return (ARCHIVE_FAILED);
 +			}
 +			zip->bzstream_valid = 0;
 +			ret = ARCHIVE_EOF;
 +			break;
 +		case BZ_OK: /* Decompressor made some progress. */
 +			break;
 +		default:
 +			archive_set_error(&(a->archive),
 +			    ARCHIVE_ERRNO_MISC,
 +			    "bzip decompression failed");
 +			return (ARCHIVE_FAILED);
 +		}
 +		t_avail_in = zip->bzstream.avail_in;
 +		t_avail_out = zip->bzstream.avail_out;
 +		break;
 +#endif
 +#ifdef HAVE_ZLIB_H
 +	case _7Z_DEFLATE:
 +		zip->stream.next_in = (Bytef *)(uintptr_t)t_next_in;
 +		zip->stream.avail_in = (uInt)t_avail_in;
 +		zip->stream.next_out = t_next_out;
 +		zip->stream.avail_out = (uInt)t_avail_out;
 +		r = inflate(&(zip->stream), 0);
 +		switch (r) {
 +		case Z_STREAM_END: /* Found end of stream. */
 +			ret = ARCHIVE_EOF;
 +			break;
 +		case Z_OK: /* Decompressor made some progress.*/
 +			break;
 +		default:
 +			archive_set_error(&a->archive, ARCHIVE_ERRNO_MISC,
 +			    "File decompression failed (%d)", r);
 +			return (ARCHIVE_FAILED);
 +		}
 +		t_avail_in = zip->stream.avail_in;
 +		t_avail_out = zip->stream.avail_out;
 +		break;
 +#endif
 +	case _7Z_PPMD:
 +	{
 +		uint64_t flush_bytes;
 +
 +		if (!zip->ppmd7_valid || zip->ppmd7_stat < 0 ||
 +		    t_avail_out <= 0) {
 +			archive_set_error(&(a->archive),
 +			    ARCHIVE_ERRNO_MISC,
 +			    "Decompression internal error");
 +			return (ARCHIVE_FAILED);
 +		}
 +		zip->ppstream.next_in = t_next_in;
 +		zip->ppstream.avail_in = t_avail_in;
 +		zip->ppstream.next_out = t_next_out;
 +		zip->ppstream.avail_out = t_avail_out;
 +		if (zip->ppmd7_stat == 0) {
 +			zip->bytein.a = a;
 +			zip->bytein.Read = &ppmd_read;
 +			zip->range_dec.Stream = &zip->bytein;
 +			r = __archive_ppmd7_functions.Ppmd7z_RangeDec_Init(
 +				&(zip->range_dec));
 +			if (r == 0) {
 +				zip->ppmd7_stat = -1;
 +				archive_set_error(&a->archive,
 +				    ARCHIVE_ERRNO_MISC,
 +				    "Failed to initialize PPMd range decorder");
 +				return (ARCHIVE_FAILED);
 +			}
 +			if (zip->ppstream.overconsumed) {
 +				zip->ppmd7_stat = -1;
 +				return (ARCHIVE_FAILED);
 +			}
 +			zip->ppmd7_stat = 1;
 +		}
 +
 +		if (t_avail_in == 0)
 +			/* XXX Flush out remaining decoded data XXX */
 +			flush_bytes = zip->folder_outbytes_remaining;
 +		else
 +			flush_bytes = 0;
 +
 +		do {
 +			int sym;
 +
 +			sym = __archive_ppmd7_functions.Ppmd7_DecodeSymbol(
 +				&(zip->ppmd7_context), &(zip->range_dec.p));
 +			if (sym < 0) {
 +				zip->ppmd7_stat = -1;
 +				archive_set_error(&a->archive,
 +				    ARCHIVE_ERRNO_FILE_FORMAT,
 +				    "Failed to decode PPMd");
 +				return (ARCHIVE_FAILED);
 +			}
 +			if (zip->ppstream.overconsumed) {
 +				zip->ppmd7_stat = -1;
 +				return (ARCHIVE_FAILED);
 +			}
 +			*zip->ppstream.next_out++ = (unsigned char)sym;
 +			zip->ppstream.avail_out--;
 +			zip->ppstream.total_out++;
 +			if (flush_bytes)
 +				flush_bytes--;
 +		} while (zip->ppstream.avail_out &&
 +			(zip->ppstream.avail_in || flush_bytes));
 +
 +		t_avail_in = (size_t)zip->ppstream.avail_in;
 +		t_avail_out = (size_t)zip->ppstream.avail_out;
 +		break;
 +	}
 +	default:
 +		archive_set_error(&(a->archive), ARCHIVE_ERRNO_MISC,
 +		    "Decompression internal error");
 +		return (ARCHIVE_FAILED);
 +	}
 +	if (ret != ARCHIVE_OK && ret != ARCHIVE_EOF)
 +		return (ret);
 +
 +	*used = o_avail_in - t_avail_in;
 +	*outbytes = o_avail_out - t_avail_out;
 +
 +	/*
 +	 * Decord BCJ.
 +	 */
 +	if (zip->codec != _7Z_LZMA2 && zip->codec2 == _7Z_X86) {
 +		size_t l = x86_Convert(zip, buff, *outbytes);
 +		zip->odd_bcj_size = *outbytes - l;
 +		if (zip->odd_bcj_size > 0 && zip->odd_bcj_size <= 4 &&
 +		    o_avail_in && ret != ARCHIVE_EOF) {
 +			memcpy(zip->odd_bcj, ((unsigned char *)buff) + l,
 +			    zip->odd_bcj_size);
 +			*outbytes = l;
 +		} else
 +			zip->odd_bcj_size = 0;
 +	}
 +
 +	/*
 +	 * Decord BCJ2 with a decompressed main stream.
 +	 */
 +	if (zip->codec2 == _7Z_X86_BCJ2) {
 +		ssize_t bytes;
 +
 +		zip->tmp_stream_bytes_avail =
 +		    zip->tmp_stream_buff_size - t_avail_out;
 +		if (zip->tmp_stream_bytes_avail >
 +		      zip->main_stream_bytes_remaining)
 +			zip->tmp_stream_bytes_avail =
 +			    zip->main_stream_bytes_remaining;
 +		zip->tmp_stream_bytes_remaining = zip->tmp_stream_bytes_avail;
 +		bytes = Bcj2_Decode(zip, bcj2_next_out, bcj2_avail_out);
 +		if (bytes < 0) {
 +			archive_set_error(&(a->archive),
 +			    ARCHIVE_ERRNO_MISC, "BCJ2 conversion Failed");
 +			return (ARCHIVE_FAILED);
 +		}
 +		zip->main_stream_bytes_remaining -=
 +		    zip->tmp_stream_bytes_avail
 +		      - zip->tmp_stream_bytes_remaining;
 +		bcj2_avail_out -= bytes;
 +		*outbytes = o_avail_out - bcj2_avail_out;
 +	}
 +
 +	return (ret);
 +}
 +
 +static int
 +free_decompression(struct archive_read *a, struct _7zip *zip)
 +{
 +	int r = ARCHIVE_OK;
 +
 +#if !defined(HAVE_ZLIB_H) &&\
 +	!(defined(HAVE_BZLIB_H) && defined(BZ_CONFIG_ERROR))
 +	(void)a;/* UNUSED */
 +#endif
 +#ifdef HAVE_LZMA_H
 +	if (zip->lzstream_valid)
 +		lzma_end(&(zip->lzstream));
 +#endif
 +#if defined(HAVE_BZLIB_H) && defined(BZ_CONFIG_ERROR)
 +	if (zip->bzstream_valid) {
 +		if (BZ2_bzDecompressEnd(&(zip->bzstream)) != BZ_OK) {
 +			archive_set_error(&a->archive,
 +			    ARCHIVE_ERRNO_MISC,
 +			    "Failed to clean up bzip2 decompressor");
 +			r = ARCHIVE_FATAL;
 +		}
 +		zip->bzstream_valid = 0;
 +	}
 +#endif
 +#ifdef HAVE_ZLIB_H
 +	if (zip->stream_valid) {
 +		if (inflateEnd(&(zip->stream)) != Z_OK) {
 +			archive_set_error(&a->archive,
 +			    ARCHIVE_ERRNO_MISC,
 +			    "Failed to clean up zlib decompressor");
 +			r = ARCHIVE_FATAL;
 +		}
 +		zip->stream_valid = 0;
 +	}
 +#endif
 +	if (zip->ppmd7_valid) {
 +		__archive_ppmd7_functions.Ppmd7_Free(
 +			&zip->ppmd7_context, &g_szalloc);
 +		zip->ppmd7_valid = 0;
 +	}
 +	return (r);
 +}
 +
 +static int
 +parse_7zip_uint64(struct archive_read *a, uint64_t *val)
 +{
 +	const unsigned char *p;
 +	unsigned char avail, mask;
 +	int i;
 +
 +	if ((p = header_bytes(a, 1)) == NULL)
 +		return (-1);
 +	avail = *p;
 +	mask = 0x80;
 +	*val = 0;
 +	for (i = 0; i < 8; i++) {
 +		if (avail & mask) {
 +			if ((p = header_bytes(a, 1)) == NULL)
 +				return (-1);
 +			*val |= ((uint64_t)*p) << (8 * i);
 +			mask >>= 1;
 +			continue;
 +		}
 +		*val += ((uint64_t)(avail & (mask -1))) << (8 * i);
 +		break;
 +	}
 +	return (0);
 +}
 +
 +static int
 +read_Bools(struct archive_read *a, unsigned char *data, size_t num)
 +{
 +	const unsigned char *p;
 +	unsigned i, mask = 0, avail = 0;
 +
 +	for (i = 0; i < num; i++) {
 +		if (mask == 0) {
 +			if ((p = header_bytes(a, 1)) == NULL)
 +				return (-1);
 +			avail = *p;
 +			mask = 0x80;
 +		}
 +		data[i] = (avail & mask)?1:0;
 +		mask >>= 1;
 +	}
 +	return (0);
 +}
 +
 +static void
 +free_Digest(struct _7z_digests *d)
 +{
 +	free(d->defineds);
 +	free(d->digests);
 +}
 +
 +static int
 +read_Digests(struct archive_read *a, struct _7z_digests *d, size_t num)
 +{
 +	const unsigned char *p;
 +	unsigned i;
 +
 +	if (num == 0)
 +		return (-1);
 +	memset(d, 0, sizeof(*d));
 +
 +	d->defineds = malloc(num);
 +	if (d->defineds == NULL)
 +		return (-1);
 +	/*
 +	 * Read Bools.
 +	 */
 +	if ((p = header_bytes(a, 1)) == NULL)
 +		return (-1);
 +	if (*p == 0) {
 +		if (read_Bools(a, d->defineds, num) < 0)
 +			return (-1);
 +	} else
 +		/* All are defined */
 +		memset(d->defineds, 1, num);
 +
 +	d->digests = calloc(num, sizeof(*d->digests));
 +	if (d->digests == NULL)
 +		return (-1);
 +	for (i = 0; i < num; i++) {
 +		if (d->defineds[i]) {
 +			if ((p = header_bytes(a, 4)) == NULL)
 +				return (-1);
 +			d->digests[i] = archive_le32dec(p);
 +		}
 +	}
 +
 +	return (0);
 +}
 +
 +static void
 +free_PackInfo(struct _7z_pack_info *pi)
 +{
 +	free(pi->sizes);
 +	free(pi->positions);
 +	free_Digest(&(pi->digest));
 +}
 +
 +static int
 +read_PackInfo(struct archive_read *a, struct _7z_pack_info *pi)
 +{
 +	const unsigned char *p;
 +	unsigned i;
 +
 +	memset(pi, 0, sizeof(*pi));
 +
 +	/*
 +	 * Read PackPos.
 +	 */
 +	if (parse_7zip_uint64(a, &(pi->pos)) < 0)
 +		return (-1);
 +
 +	/*
 +	 * Read NumPackStreams.
 +	 */
 +	if (parse_7zip_uint64(a, &(pi->numPackStreams)) < 0)
 +		return (-1);
 +	if (pi->numPackStreams == 0)
 +		return (-1);
 +	if (UMAX_ENTRY < pi->numPackStreams)
 +		return (-1);
 +
 +	/*
 +	 * Read PackSizes[num]
 +	 */
 +	if ((p = header_bytes(a, 1)) == NULL)
 +		return (-1);
 +	if (*p == kEnd)
 +		/* PackSizes[num] are not present. */
 +		return (0);
 +	if (*p != kSize)
 +		return (-1);
 +	pi->sizes = calloc((size_t)pi->numPackStreams, sizeof(uint64_t));
 +	pi->positions = calloc((size_t)pi->numPackStreams, sizeof(uint64_t));
 +	if (pi->sizes == NULL || pi->positions == NULL)
 +		return (-1);
 +
 +	for (i = 0; i < pi->numPackStreams; i++) {
 +		if (parse_7zip_uint64(a, &(pi->sizes[i])) < 0)
 +			return (-1);
 +	}
 +
 +	/*
 +	 * Read PackStreamDigests[num]
 +	 */
 +	if ((p = header_bytes(a, 1)) == NULL)
 +		return (-1);
 +	if (*p == kEnd) {
 +		/* PackStreamDigests[num] are not present. */
 +		pi->digest.defineds =
 +		    calloc((size_t)pi->numPackStreams, sizeof(*pi->digest.defineds));
 +		pi->digest.digests =
 +		    calloc((size_t)pi->numPackStreams, sizeof(*pi->digest.digests));
 +		if (pi->digest.defineds == NULL || pi->digest.digests == NULL)
 +			return (-1);
 +		return (0);
 +	}
 +
 +	if (*p != kSize)
 +		return (-1);
 +
 +	if (read_Digests(a, &(pi->digest), (size_t)pi->numPackStreams) < 0)
 +		return (-1);
 +
 +	/*
 +	 *  Must be marked by kEnd.
 +	 */
 +	if ((p = header_bytes(a, 1)) == NULL)
 +		return (-1);
 +	if (*p != kEnd)
 +		return (-1);
 +	return (0);
 +}
 +
 +static void
 +free_Folder(struct _7z_folder *f)
 +{
 +	unsigned i;
 +
 +	if (f->coders) {
 +		for (i = 0; i< f->numCoders; i++) {
 +			free(f->coders[i].properties);
 +		}
 +		free(f->coders);
 +	}
 +	free(f->bindPairs);
 +	free(f->packedStreams);
 +	free(f->unPackSize);
 +}
 +
 +static int
 +read_Folder(struct archive_read *a, struct _7z_folder *f)
 +{
 +	struct _7zip *zip = (struct _7zip *)a->format->data;
 +	const unsigned char *p;
 +	uint64_t numInStreamsTotal = 0;
 +	uint64_t numOutStreamsTotal = 0;
 +	unsigned i;
 +
 +	memset(f, 0, sizeof(*f));
 +
 +	/*
 +	 * Read NumCoders.
 +	 */
 +	if (parse_7zip_uint64(a, &(f->numCoders)) < 0)
 +		return (-1);
 +	if (f->numCoders > 4)
 +		/* Too many coders. */
 +		return (-1);
 +
 +	f->coders = calloc((size_t)f->numCoders, sizeof(*f->coders));
 +	if (f->coders == NULL)
 +		return (-1);
 +	for (i = 0; i< f->numCoders; i++) {
 +		size_t codec_size;
 +		int simple, attr;
 +
 +		if ((p = header_bytes(a, 1)) == NULL)
 +			return (-1);
 +		/*
 +		 * 0:3 CodecIdSize
 +		 * 4:  0 - IsSimple
 +		 *     1 - Is not Simple
 +		 * 5:  0 - No Attributes
 +		 *     1 - There are Attributes;
 +		 * 7:  Must be zero.
 +		 */
 +		codec_size = *p & 0xf;
 +		simple = (*p & 0x10)?0:1;
 +		attr = *p & 0x20;
 +		if (*p & 0x80)
 +			return (-1);/* Not supported. */
 +
 +		/*
 +		 * Read Decompression Method IDs.
 +		 */
 +		if ((p = header_bytes(a, codec_size)) == NULL)
 +			return (-1);
 +
 +		f->coders[i].codec = decode_codec_id(p, codec_size);
 +
 +		if (simple) {
 +			f->coders[i].numInStreams = 1;
 +			f->coders[i].numOutStreams = 1;
 +		} else {
 +			if (parse_7zip_uint64(
 +			    a, &(f->coders[i].numInStreams)) < 0)
 +				return (-1);
 +			if (UMAX_ENTRY < f->coders[i].numInStreams)
 +				return (-1);
 +			if (parse_7zip_uint64(
 +			    a, &(f->coders[i].numOutStreams)) < 0)
 +				return (-1);
 +			if (UMAX_ENTRY < f->coders[i].numOutStreams)
 +				return (-1);
 +		}
 +
 +		if (attr) {
 +			if (parse_7zip_uint64(
 +			    a, &(f->coders[i].propertiesSize)) < 0)
 +				return (-1);
 +			if ((p = header_bytes(
 +			    a, (size_t)f->coders[i].propertiesSize)) == NULL)
 +				return (-1);
 +			f->coders[i].properties =
 +			    malloc((size_t)f->coders[i].propertiesSize);
 +			if (f->coders[i].properties == NULL)
 +				return (-1);
 +			memcpy(f->coders[i].properties, p,
 +			    (size_t)f->coders[i].propertiesSize);
 +		}
 +
 +		numInStreamsTotal += f->coders[i].numInStreams;
 +		numOutStreamsTotal += f->coders[i].numOutStreams;
 +	}
 +
 +	if (numOutStreamsTotal == 0 ||
 +	    numInStreamsTotal < numOutStreamsTotal-1)
 +		return (-1);
 +
 +	f->numBindPairs = numOutStreamsTotal - 1;
 +	if (zip->header_bytes_remaining < f->numBindPairs)
 +			return (-1);
 +	if (f->numBindPairs > 0) {
 +		f->bindPairs =
 +			calloc((size_t)f->numBindPairs, sizeof(*f->bindPairs));
 +		if (f->bindPairs == NULL)
 +			return (-1);
 +	} else
 +		f->bindPairs = NULL;
 +	for (i = 0; i < f->numBindPairs; i++) {
 +		if (parse_7zip_uint64(a, &(f->bindPairs[i].inIndex)) < 0)
 +			return (-1);
 +		if (UMAX_ENTRY < f->bindPairs[i].inIndex)
 +			return (-1);
 +		if (parse_7zip_uint64(a, &(f->bindPairs[i].outIndex)) < 0)
 +			return (-1);
 +		if (UMAX_ENTRY < f->bindPairs[i].outIndex)
 +			return (-1);
 +	}
 +
 +	f->numPackedStreams = numInStreamsTotal - f->numBindPairs;
 +	f->packedStreams =
 +	    calloc((size_t)f->numPackedStreams, sizeof(*f->packedStreams));
 +	if (f->packedStreams == NULL)
 +		return (-1);
 +	if (f->numPackedStreams == 1) {
 +		for (i = 0; i < numInStreamsTotal; i++) {
 +			unsigned j;
 +			for (j = 0; j < f->numBindPairs; j++) {
 +				if (f->bindPairs[j].inIndex == i)
 +					break;
 +			}
 +			if (j == f->numBindPairs)
 +				break;
 +		}
 +		if (i == numInStreamsTotal)
 +			return (-1);
 +		f->packedStreams[0] = i;
 +	} else {
 +		for (i = 0; i < f->numPackedStreams; i++) {
 +			if (parse_7zip_uint64(a, &(f->packedStreams[i])) < 0)
 +				return (-1);
 +			if (UMAX_ENTRY < f->packedStreams[i])
 +				return (-1);
 +		}
 +	}
 +	f->numInStreams = numInStreamsTotal;
 +	f->numOutStreams = numOutStreamsTotal;
 +
 +	return (0);
 +}
 +
 +static void
 +free_CodersInfo(struct _7z_coders_info *ci)
 +{
 +	unsigned i;
 +
 +	if (ci->folders) {
 +		for (i = 0; i < ci->numFolders; i++)
 +			free_Folder(&(ci->folders[i]));
 +		free(ci->folders);
 +	}
 +}
 +
 +static int
 +read_CodersInfo(struct archive_read *a, struct _7z_coders_info *ci)
 +{
 +	const unsigned char *p;
 +	struct _7z_digests digest;
 +	unsigned i;
 +
 +	memset(ci, 0, sizeof(*ci));
 +	memset(&digest, 0, sizeof(digest));
 +
 +	if ((p = header_bytes(a, 1)) == NULL)
 +		goto failed;
 +	if (*p != kFolder)
 +		goto failed;
 +
 +	/*
 +	 * Read NumFolders.
 +	 */
 +	if (parse_7zip_uint64(a, &(ci->numFolders)) < 0)
 +		goto failed;
 +	if (UMAX_ENTRY < ci->numFolders)
 +		return (-1);
 +
 +	/*
 +	 * Read External.
 +	 */
 +	if ((p = header_bytes(a, 1)) == NULL)
 +		goto failed;
 +	switch (*p) {
 +	case 0:
 +		ci->folders =
 +			calloc((size_t)ci->numFolders, sizeof(*ci->folders));
 +		if (ci->folders == NULL)
 +			return (-1);
 +		for (i = 0; i < ci->numFolders; i++) {
 +			if (read_Folder(a, &(ci->folders[i])) < 0)
 +				goto failed;
 +		}
 +		break;
 +	case 1:
 +		if (parse_7zip_uint64(a, &(ci->dataStreamIndex)) < 0)
 +			return (-1);
 +		if (UMAX_ENTRY < ci->dataStreamIndex)
 +			return (-1);
 +		if (ci->numFolders > 0) {
 +			archive_set_error(&a->archive, -1,
 +			    "Malformed 7-Zip archive");
 +			goto failed;
 +		}
 +		break;
 +	default:
 +		archive_set_error(&a->archive, -1,
 +		    "Malformed 7-Zip archive");
 +		goto failed;
 +	}
 +
 +	if ((p = header_bytes(a, 1)) == NULL)
 +		goto failed;
 +	if (*p != kCodersUnPackSize)
 +		goto failed;
 +
 +	for (i = 0; i < ci->numFolders; i++) {
 +		struct _7z_folder *folder = &(ci->folders[i]);
 +		unsigned j;
 +
 +		folder->unPackSize =
 +		    calloc((size_t)folder->numOutStreams, sizeof(*folder->unPackSize));
 +		if (folder->unPackSize == NULL)
 +			goto failed;
 +		for (j = 0; j < folder->numOutStreams; j++) {
 +			if (parse_7zip_uint64(a, &(folder->unPackSize[j])) < 0)
 +				goto failed;
 +		}
 +	}
 +
 +	/*
 +	 * Read CRCs.
 +	 */
 +	if ((p = header_bytes(a, 1)) == NULL)
 +		goto failed;
 +	if (*p == kEnd)
 +		return (0);
 +	if (*p != kCRC)
 +		goto failed;
 +	if (read_Digests(a, &digest, (size_t)ci->numFolders) < 0)
 +		goto failed;
 +	for (i = 0; i < ci->numFolders; i++) {
 +		ci->folders[i].digest_defined = digest.defineds[i];
 +		ci->folders[i].digest = digest.digests[i];
 +	}
 +
 +	/*
 +	 *  Must be kEnd.
 +	 */
 +	if ((p = header_bytes(a, 1)) == NULL)
 +		goto failed;
 +	if (*p != kEnd)
 +		goto failed;
 +	free_Digest(&digest);
 +	return (0);
 +failed:
 +	free_Digest(&digest);
 +	return (-1);
 +}
 +
 +static uint64_t
 +folder_uncompressed_size(struct _7z_folder *f)
 +{
 +	int n = (int)f->numOutStreams;
 +	unsigned pairs = (unsigned)f->numBindPairs;
 +
 +	while (--n >= 0) {
 +		unsigned i;
 +		for (i = 0; i < pairs; i++) {
 +			if (f->bindPairs[i].outIndex == (uint64_t)n)
 +				break;
 +		}
 +		if (i >= pairs)
 +			return (f->unPackSize[n]);
 +	}
 +	return (0);
 +}
 +
 +static void
 +free_SubStreamsInfo(struct _7z_substream_info *ss)
 +{
 +	free(ss->unpackSizes);
 +	free(ss->digestsDefined);
 +	free(ss->digests);
 +}
 +
 +static int
 +read_SubStreamsInfo(struct archive_read *a, struct _7z_substream_info *ss,
 +    struct _7z_folder *f, size_t numFolders)
 +{
 +	const unsigned char *p;
 +	uint64_t *usizes;
 +	size_t unpack_streams;
 +	int type;
 +	unsigned i;
 +	uint32_t numDigests;
 +
 +	memset(ss, 0, sizeof(*ss));
 +
 +	for (i = 0; i < numFolders; i++)
 +		f[i].numUnpackStreams = 1;
 +
 +	if ((p = header_bytes(a, 1)) == NULL)
 +		return (-1);
 +	type = *p;
 +
 +	if (type == kNumUnPackStream) {
 +		unpack_streams = 0;
 +		for (i = 0; i < numFolders; i++) {
 +			if (parse_7zip_uint64(a, &(f[i].numUnpackStreams)) < 0)
 +				return (-1);
 +			if (UMAX_ENTRY < f[i].numUnpackStreams)
 +				return (-1);
 +			if (unpack_streams > SIZE_MAX - UMAX_ENTRY) {
 +				return (-1);
 +			}
 +			unpack_streams += (size_t)f[i].numUnpackStreams;
 +		}
 +		if ((p = header_bytes(a, 1)) == NULL)
 +			return (-1);
 +		type = *p;
 +	} else
 +		unpack_streams = numFolders;
 +
 +	ss->unpack_streams = unpack_streams;
 +	if (unpack_streams) {
 +		ss->unpackSizes = calloc(unpack_streams,
 +		    sizeof(*ss->unpackSizes));
 +		ss->digestsDefined = calloc(unpack_streams,
 +		    sizeof(*ss->digestsDefined));
 +		ss->digests = calloc(unpack_streams,
 +		    sizeof(*ss->digests));
 +		if (ss->unpackSizes == NULL || ss->digestsDefined == NULL ||
 +		    ss->digests == NULL)
 +			return (-1);
 +	}
 +
 +	usizes = ss->unpackSizes;
 +	for (i = 0; i < numFolders; i++) {
 +		unsigned pack;
 +		uint64_t sum;
 +
 +		if (f[i].numUnpackStreams == 0)
 +			continue;
 +
 +		sum = 0;
 +		if (type == kSize) {
 +			for (pack = 1; pack < f[i].numUnpackStreams; pack++) {
 +				if (parse_7zip_uint64(a, usizes) < 0)
 +					return (-1);
 +				sum += *usizes++;
 +			}
 +		}
 +		*usizes++ = folder_uncompressed_size(&f[i]) - sum;
 +	}
 +
 +	if (type == kSize) {
 +		if ((p = header_bytes(a, 1)) == NULL)
 +			return (-1);
 +		type = *p;
 +	}
 +
 +	for (i = 0; i < unpack_streams; i++) {
 +		ss->digestsDefined[i] = 0;
 +		ss->digests[i] = 0;
 +	}
 +
 +	numDigests = 0;
 +	for (i = 0; i < numFolders; i++) {
 +		if (f[i].numUnpackStreams != 1 || !f[i].digest_defined)
 +			numDigests += (uint32_t)f[i].numUnpackStreams;
 +	}
 +
 +	if (type == kCRC) {
 +		struct _7z_digests tmpDigests;
 +		unsigned char *digestsDefined = ss->digestsDefined;
 +		uint32_t * digests = ss->digests;
 +		int di = 0;
 +
 +		memset(&tmpDigests, 0, sizeof(tmpDigests));
 +		if (read_Digests(a, &(tmpDigests), numDigests) < 0) {
 +			free_Digest(&tmpDigests);
 +			return (-1);
 +		}
 +		for (i = 0; i < numFolders; i++) {
 +			if (f[i].numUnpackStreams == 1 && f[i].digest_defined) {
 +				*digestsDefined++ = 1;
 +				*digests++ = f[i].digest;
 +			} else {
 +				unsigned j;
 +
 +				for (j = 0; j < f[i].numUnpackStreams;
 +				    j++, di++) {
 +					*digestsDefined++ =
 +					    tmpDigests.defineds[di];
 +					*digests++ =
 +					    tmpDigests.digests[di];
 +				}
 +			}
 +		}
 +		free_Digest(&tmpDigests);
 +		if ((p = header_bytes(a, 1)) == NULL)
 +			return (-1);
 +		type = *p;
 +	}
 +
 +	/*
 +	 *  Must be kEnd.
 +	 */
 +	if (type != kEnd)
 +		return (-1);
 +	return (0);
 +}
 +
 +static void
 +free_StreamsInfo(struct _7z_stream_info *si)
 +{
 +	free_PackInfo(&(si->pi));
 +	free_CodersInfo(&(si->ci));
 +	free_SubStreamsInfo(&(si->ss));
 +}
 +
 +static int
 +read_StreamsInfo(struct archive_read *a, struct _7z_stream_info *si)
 +{
 +	struct _7zip *zip = (struct _7zip *)a->format->data;
 +	const unsigned char *p;
 +	unsigned i;
 +
 +	memset(si, 0, sizeof(*si));
 +
 +	if ((p = header_bytes(a, 1)) == NULL)
 +		return (-1);
 +	if (*p == kPackInfo) {
 +		uint64_t packPos;
 +
 +		if (read_PackInfo(a, &(si->pi)) < 0)
 +			return (-1);
 +
 +		if (si->pi.positions == NULL || si->pi.sizes == NULL)
 +			return (-1);
 +		/*
 +		 * Calculate packed stream positions.
 +		 */
 +		packPos = si->pi.pos;
 +		for (i = 0; i < si->pi.numPackStreams; i++) {
 +			si->pi.positions[i] = packPos;
 +			packPos += si->pi.sizes[i];
 +			if (packPos > zip->header_offset)
 +				return (-1);
 +		}
 +		if ((p = header_bytes(a, 1)) == NULL)
 +			return (-1);
 +	}
 +	if (*p == kUnPackInfo) {
 +		uint32_t packIndex;
 +		struct _7z_folder *f;
 +
 +		if (read_CodersInfo(a, &(si->ci)) < 0)
 +			return (-1);
 +
 +		/*
 +		 * Calculate packed stream indexes.
 +		 */
 +		packIndex = 0;
 +		f = si->ci.folders;
 +		for (i = 0; i < si->ci.numFolders; i++) {
 +			f[i].packIndex = packIndex;
 +			packIndex += (uint32_t)f[i].numPackedStreams;
 +			if (packIndex > si->pi.numPackStreams)
 +				return (-1);
 +		}
 +		if ((p = header_bytes(a, 1)) == NULL)
 +			return (-1);
 +	}
 +
 +	if (*p == kSubStreamsInfo) {
 +		if (read_SubStreamsInfo(a, &(si->ss),
 +		    si->ci.folders, (size_t)si->ci.numFolders) < 0)
 +			return (-1);
 +		if ((p = header_bytes(a, 1)) == NULL)
 +			return (-1);
 +	}
 +
 +	/*
 +	 *  Must be kEnd.
 +	 */
 +	if (*p != kEnd)
 +		return (-1);
 +	return (0);
 +}
 +
 +static void
 +free_Header(struct _7z_header_info *h)
 +{
 +	free(h->emptyStreamBools);
 +	free(h->emptyFileBools);
 +	free(h->antiBools);
 +	free(h->attrBools);
 +}
 +
 +static int
 +read_Header(struct archive_read *a, struct _7z_header_info *h,
 +    int check_header_id)
 +{
 +	struct _7zip *zip = (struct _7zip *)a->format->data;
 +	const unsigned char *p;
 +	struct _7z_folder *folders;
 +	struct _7z_stream_info *si = &(zip->si);
 +	struct _7zip_entry *entries;
 +	uint32_t folderIndex, indexInFolder;
 +	unsigned i;
 +	int eindex, empty_streams, sindex;
 +
 +	if (check_header_id) {
 +		/*
 +		 * Read Header.
 +		 */
 +		if ((p = header_bytes(a, 1)) == NULL)
 +			return (-1);
 +		if (*p != kHeader)
 +			return (-1);
 +	}
 +
 +	/*
 +	 * Read ArchiveProperties.
 +	 */
 +	if ((p = header_bytes(a, 1)) == NULL)
 +		return (-1);
 +	if (*p == kArchiveProperties) {
 +		for (;;) {
 +			uint64_t size;
 +			if ((p = header_bytes(a, 1)) == NULL)
 +				return (-1);
 +			if (*p == 0)
 +				break;
 +			if (parse_7zip_uint64(a, &size) < 0)
 +				return (-1);
 +		}
 +		if ((p = header_bytes(a, 1)) == NULL)
 +			return (-1);
 +	}
 +
 +	/*
 +	 * Read MainStreamsInfo.
 +	 */
 +	if (*p == kMainStreamsInfo) {
 +		if (read_StreamsInfo(a, &(zip->si)) < 0)
 +			return (-1);
 +		if ((p = header_bytes(a, 1)) == NULL)
 +			return (-1);
 +	}
 +	if (*p == kEnd)
 +		return (0);
 +
 +	/*
 +	 * Read FilesInfo.
 +	 */
 +	if (*p != kFilesInfo)
 +		return (-1);
 +
 +	if (parse_7zip_uint64(a, &(zip->numFiles)) < 0)
 +		return (-1);
 +	if (UMAX_ENTRY < zip->numFiles)
 +		return (-1);
 +
 +	zip->entries = calloc((size_t)zip->numFiles, sizeof(*zip->entries));
 +	if (zip->entries == NULL)
 +		return (-1);
 +	entries = zip->entries;
 +
 +	empty_streams = 0;
 +	for (;;) {
 +		int type;
 +		uint64_t size;
 +		size_t ll;
 +
 +		if ((p = header_bytes(a, 1)) == NULL)
 +			return (-1);
 +		type = *p;
 +		if (type == kEnd)
 +			break;
 +
 +		if (parse_7zip_uint64(a, &size) < 0)
 +			return (-1);
 +		if (zip->header_bytes_remaining < size)
 +			return (-1);
 +		ll = (size_t)size;
 +
 +		switch (type) {
 +		case kEmptyStream:
++			if (h->emptyStreamBools != NULL)
++				return (-1);
 +			h->emptyStreamBools = calloc((size_t)zip->numFiles,
 +			    sizeof(*h->emptyStreamBools));
 +			if (h->emptyStreamBools == NULL)
 +				return (-1);
 +			if (read_Bools(
 +			    a, h->emptyStreamBools, (size_t)zip->numFiles) < 0)
 +				return (-1);
 +			empty_streams = 0;
 +			for (i = 0; i < zip->numFiles; i++) {
 +				if (h->emptyStreamBools[i])
 +					empty_streams++;
 +			}
 +			break;
 +		case kEmptyFile:
 +			if (empty_streams <= 0) {
 +				/* Unexcepted sequence. Skip this. */
 +				if (header_bytes(a, ll) == NULL)
 +					return (-1);
 +				break;
 +			}
++			if (h->emptyFileBools != NULL)
++				return (-1);
 +			h->emptyFileBools = calloc(empty_streams,
 +			    sizeof(*h->emptyFileBools));
 +			if (h->emptyFileBools == NULL)
 +				return (-1);
 +			if (read_Bools(a, h->emptyFileBools, empty_streams) < 0)
 +				return (-1);
 +			break;
 +		case kAnti:
 +			if (empty_streams <= 0) {
 +				/* Unexcepted sequence. Skip this. */
 +				if (header_bytes(a, ll) == NULL)
 +					return (-1);
 +				break;
 +			}
++			if (h->antiBools != NULL)
++				return (-1);
 +			h->antiBools = calloc(empty_streams,
 +			    sizeof(*h->antiBools));
 +			if (h->antiBools == NULL)
 +				return (-1);
 +			if (read_Bools(a, h->antiBools, empty_streams) < 0)
 +				return (-1);
 +			break;
 +		case kCTime:
 +		case kATime:
 +		case kMTime:
 +			if (read_Times(a, h, type) < 0)
 +				return (-1);
 +			break;
 +		case kName:
 +		{
 +			unsigned char *np;
 +			size_t nl, nb;
 +
 +			/* Skip one byte. */
 +			if ((p = header_bytes(a, 1)) == NULL)
 +				return (-1);
 +			ll--;
 +
 +			if ((ll & 1) || ll < zip->numFiles * 4)
 +				return (-1);
 +
++			if (zip->entry_names != NULL)
++				return (-1);
 +			zip->entry_names = malloc(ll);
 +			if (zip->entry_names == NULL)
 +				return (-1);
 +			np = zip->entry_names;
 +			nb = ll;
 +			/*
 +			 * Copy whole file names.
 +			 * NOTE: This loop prevents from expanding
 +			 * the uncompressed buffer in order not to
 +			 * use extra memory resource.
 +			 */
 +			while (nb) {
 +				size_t b;
 +				if (nb > UBUFF_SIZE)
 +					b = UBUFF_SIZE;
 +				else
 +					b = nb;
 +				if ((p = header_bytes(a, b)) == NULL)
 +					return (-1);
 +				memcpy(np, p, b);
 +				np += b;
 +				nb -= b;
 +			}
 +			np = zip->entry_names;
 +			nl = ll;
 +
 +			for (i = 0; i < zip->numFiles; i++) {
 +				entries[i].utf16name = np;
 +#if defined(_WIN32) && !defined(__CYGWIN__) && defined(_DEBUG)
 +				entries[i].wname = (wchar_t *)np;
 +#endif
 +
 +				/* Find a terminator. */
 +				while (nl >= 2 && (np[0] || np[1])) {
 +					np += 2;
 +					nl -= 2;
 +				}
 +				if (nl < 2)
 +					return (-1);/* Terminator not found */
 +				entries[i].name_len = np - entries[i].utf16name;
 +				np += 2;
 +				nl -= 2;
 +			}
 +			break;
 +		}
 +		case kAttributes:
 +		{
 +			int allAreDefined;
 +
 +			if ((p = header_bytes(a, 2)) == NULL)
 +				return (-1);
 +			allAreDefined = *p;
++			if (h->attrBools != NULL)
++				return (-1);
 +			h->attrBools = calloc((size_t)zip->numFiles,
 +			    sizeof(*h->attrBools));
 +			if (h->attrBools == NULL)
 +				return (-1);
 +			if (allAreDefined)
 +				memset(h->attrBools, 1, (size_t)zip->numFiles);
 +			else {
 +				if (read_Bools(a, h->attrBools,
 +				      (size_t)zip->numFiles) < 0)
 +					return (-1);
 +			}
 +			for (i = 0; i < zip->numFiles; i++) {
 +				if (h->attrBools[i]) {
 +					if ((p = header_bytes(a, 4)) == NULL)
 +						return (-1);
 +					entries[i].attr = archive_le32dec(p);
 +				}
 +			}
 +			break;
 +		}
 +		case kDummy:
 +			if (ll == 0)
 +				break;
 +		default:
 +			if (header_bytes(a, ll) == NULL)
 +				return (-1);
 +			break;
 +		}
 +	}
 +
 +	/*
 +	 * Set up entry's attributes.
 +	 */
 +	folders = si->ci.folders;
 +	eindex = sindex = 0;
 +	folderIndex = indexInFolder = 0;
 +	for (i = 0; i < zip->numFiles; i++) {
 +		if (h->emptyStreamBools == NULL || h->emptyStreamBools[i] == 0)
 +			entries[i].flg |= HAS_STREAM;
 +		/* The high 16 bits of attributes is a posix file mode. */
 +		entries[i].mode = entries[i].attr >> 16;
 +		if (entries[i].flg & HAS_STREAM) {
 +			if ((size_t)sindex >= si->ss.unpack_streams)
 +				return (-1);
 +			if (entries[i].mode == 0)
 +				entries[i].mode = AE_IFREG | 0666;
 +			if (si->ss.digestsDefined[sindex])
 +				entries[i].flg |= CRC32_IS_SET;
 +			entries[i].ssIndex = sindex;
 +			sindex++;
 +		} else {
 +			int dir;
 +			if (h->emptyFileBools == NULL)
 +				dir = 1;
 +			else {
 +				if (h->emptyFileBools[eindex])
 +					dir = 0;
 +				else
 +					dir = 1;
 +				eindex++;
 +			}
 +			if (entries[i].mode == 0) {
 +				if (dir)
 +					entries[i].mode = AE_IFDIR | 0777;
 +				else
 +					entries[i].mode = AE_IFREG | 0666;
 +			} else if (dir &&
 +			    (entries[i].mode & AE_IFMT) != AE_IFDIR) {
 +				entries[i].mode &= ~AE_IFMT;
 +				entries[i].mode |= AE_IFDIR;
 +			}
 +			if ((entries[i].mode & AE_IFMT) == AE_IFDIR &&
 +			    entries[i].name_len >= 2 &&
 +			    (entries[i].utf16name[entries[i].name_len-2] != '/' ||
 +			     entries[i].utf16name[entries[i].name_len-1] != 0)) {
 +				entries[i].utf16name[entries[i].name_len] = '/';
 +				entries[i].utf16name[entries[i].name_len+1] = 0;
 +				entries[i].name_len += 2;
 +			}
 +			entries[i].ssIndex = -1;
 +		}
 +		if (entries[i].attr & 0x01)
 +			entries[i].mode &= ~0222;/* Read only. */
 +
 +		if ((entries[i].flg & HAS_STREAM) == 0 && indexInFolder == 0) {
 +			/*
 +			 * The entry is an empty file or a directory file,
 +			 * those both have no contents.
 +			 */
 +			entries[i].folderIndex = -1;
 +			continue;
 +		}
 +		if (indexInFolder == 0) {
 +			for (;;) {
 +				if (folderIndex >= si->ci.numFolders)
 +					return (-1);
 +				if (folders[folderIndex].numUnpackStreams)
 +					break;
 +				folderIndex++;
 +			}
 +		}
 +		entries[i].folderIndex = folderIndex;
 +		if ((entries[i].flg & HAS_STREAM) == 0)
 +			continue;
 +		indexInFolder++;
 +		if (indexInFolder >= folders[folderIndex].numUnpackStreams) {
 +			folderIndex++;
 +			indexInFolder = 0;
 +		}
 +	}
 +
 +	return (0);
 +}
 +
 +#define EPOC_TIME ARCHIVE_LITERAL_ULL(116444736000000000)
 +static void
 +fileTimeToUtc(uint64_t fileTime, time_t *timep, long *ns)
 +{
 +
 +	if (fileTime >= EPOC_TIME) {
 +		fileTime -= EPOC_TIME;
 +		/* milli seconds base */
 +		*timep = (time_t)(fileTime / 10000000);
 +		/* nano seconds base */
 +		*ns = (long)(fileTime % 10000000) * 100;
 +	} else {
 +		*timep = 0;
 +		*ns = 0;
 +	}
 +}
 +
 +static int
 +read_Times(struct archive_read *a, struct _7z_header_info *h, int type)
 +{
 +	struct _7zip *zip = (struct _7zip *)a->format->data;
 +	const unsigned char *p;
 +	struct _7zip_entry *entries = zip->entries;
 +	unsigned char *timeBools;
 +	int allAreDefined;
 +	unsigned i;
 +
 +	timeBools = calloc((size_t)zip->numFiles, sizeof(*timeBools));
 +	if (timeBools == NULL)
 +		return (-1);
 +
 +	/* Read allAreDefined. */
 +	if ((p = header_bytes(a, 1)) == NULL)
 +		goto failed;
 +	allAreDefined = *p;
 +	if (allAreDefined)
 +		memset(timeBools, 1, (size_t)zip->numFiles);
 +	else {
 +		if (read_Bools(a, timeBools, (size_t)zip->numFiles) < 0)
 +			goto failed;
 +	}
 +
 +	/* Read external. */
 +	if ((p = header_bytes(a, 1)) == NULL)
 +		goto failed;
 +	if (*p) {
 +		if (parse_7zip_uint64(a, &(h->dataIndex)) < 0)
 +			goto failed;
 +		if (UMAX_ENTRY < h->dataIndex)
 +			goto failed;
 +	}
 +
 +	for (i = 0; i < zip->numFiles; i++) {
 +		if (!timeBools[i])
 +			continue;
 +		if ((p = header_bytes(a, 8)) == NULL)
 +			goto failed;
 +		switch (type) {
 +		case kCTime:
 +			fileTimeToUtc(archive_le64dec(p),
 +			    &(entries[i].ctime),
 +			    &(entries[i].ctime_ns));
 +			entries[i].flg |= CTIME_IS_SET;
 +			break;
 +		case kATime:
 +			fileTimeToUtc(archive_le64dec(p),
 +			    &(entries[i].atime),
 +			    &(entries[i].atime_ns));
 +			entries[i].flg |= ATIME_IS_SET;
 +			break;
 +		case kMTime:
 +			fileTimeToUtc(archive_le64dec(p),
 +			    &(entries[i].mtime),
 +			    &(entries[i].mtime_ns));
 +			entries[i].flg |= MTIME_IS_SET;
 +			break;
 +		}
 +	}
 +
 +	free(timeBools);
 +	return (0);
 +failed:
 +	free(timeBools);
 +	return (-1);
 +}
 +
 +static int
 +decode_encoded_header_info(struct archive_read *a, struct _7z_stream_info *si)
 +{
 +	struct _7zip *zip = (struct _7zip *)a->format->data;
 +
 +	errno = 0;
 +	if (read_StreamsInfo(a, si) < 0) {
 +		if (errno == ENOMEM)
 +			archive_set_error(&a->archive, -1,
 +			    "Couldn't allocate memory");
 +		else
 +			archive_set_error(&a->archive, -1,
 +			    "Malformed 7-Zip archive");
 +		return (ARCHIVE_FATAL);
 +	}
 +
 +	if (si->pi.numPackStreams == 0 || si->ci.numFolders == 0) {
 +		archive_set_error(&a->archive, -1, "Malformed 7-Zip archive");
 +		return (ARCHIVE_FATAL);
 +	}
 +
 +	if (zip->header_offset < si->pi.pos + si->pi.sizes[0] ||
 +	    (int64_t)(si->pi.pos + si->pi.sizes[0]) < 0 ||
 +	    si->pi.sizes[0] == 0 || (int64_t)si->pi.pos < 0) {
 +		archive_set_error(&a->archive, -1, "Malformed Header offset");
 +		return (ARCHIVE_FATAL);
 +	}
 +
 +	return (ARCHIVE_OK);
 +}
 +
 +static const unsigned char *
 +header_bytes(struct archive_read *a, size_t rbytes)
 +{
 +	struct _7zip *zip = (struct _7zip *)a->format->data;
 +	const unsigned char *p;
 +
 +	if (zip->header_bytes_remaining < rbytes)
 +		return (NULL);
 +	if (zip->pack_stream_bytes_unconsumed)
 +		read_consume(a);
 +
 +	if (zip->header_is_encoded == 0) {
 +		p = __archive_read_ahead(a, rbytes, NULL);
 +		if (p == NULL)
 +			return (NULL);
 +		zip->header_bytes_remaining -= rbytes;
 +		zip->pack_stream_bytes_unconsumed = rbytes;
 +	} else {
 +		const void *buff;
 +		ssize_t bytes;
 +
 +		bytes = read_stream(a, &buff, rbytes, rbytes);
 +		if (bytes <= 0)
 +			return (NULL);
 +		zip->header_bytes_remaining -= bytes;
 +		p = buff;
 +	}
 +
 +	/* Update checksum */
 +	zip->header_crc32 = crc32(zip->header_crc32, p, (unsigned)rbytes);
 +	return (p);
 +}
 +
 +static int
 +slurp_central_directory(struct archive_read *a, struct _7zip *zip,
 +    struct _7z_header_info *header)
 +{
 +	const unsigned char *p;
 +	uint64_t next_header_offset;
 +	uint64_t next_header_size;
 +	uint32_t next_header_crc;
 +	ssize_t bytes_avail;
 +	int check_header_crc, r;
 +
 +	if ((p = __archive_read_ahead(a, 32, &bytes_avail)) == NULL)
 +		return (ARCHIVE_FATAL);
 +
 +	if ((p[0] == 'M' && p[1] == 'Z') || memcmp(p, "\x7F\x45LF", 4) == 0) {
 +		/* This is an executable ? Must be self-extracting... */
 +		r = skip_sfx(a, bytes_avail);
 +		if (r < ARCHIVE_WARN)
 +			return (r);
 +		if ((p = __archive_read_ahead(a, 32, &bytes_avail)) == NULL)
 +			return (ARCHIVE_FATAL);
 +	}
 +	zip->seek_base += 32;
 +
 +	if (memcmp(p, _7ZIP_SIGNATURE, 6) != 0) {
 +		archive_set_error(&a->archive, -1, "Not 7-Zip archive file");
 +		return (ARCHIVE_FATAL);
 +	}
 +
 +	/* CRC check. */
 +	if (crc32(0, (const unsigned char *)p + 12, 20)
 +	    != archive_le32dec(p + 8)) {
 +		archive_set_error(&a->archive, -1, "Header CRC error");
 +		return (ARCHIVE_FATAL);
 +	}
 +
 +	next_header_offset = archive_le64dec(p + 12);
 +	next_header_size = archive_le64dec(p + 20);
 +	next_header_crc = archive_le32dec(p + 28);
 +
 +	if (next_header_size == 0)
 +		/* There is no entry in an archive file. */
 +		return (ARCHIVE_EOF);
 +
 +	if (((int64_t)next_header_offset) < 0) {
 +		archive_set_error(&a->archive, -1, "Malformed 7-Zip archive");
 +		return (ARCHIVE_FATAL);
 +	}
 +	__archive_read_consume(a, 32);
 +	if (next_header_offset != 0) {
 +		if (bytes_avail >= (ssize_t)next_header_offset)
 +			__archive_read_consume(a, next_header_offset);
 +		else if (__archive_read_seek(a,
 +		    next_header_offset + zip->seek_base, SEEK_SET) < 0)
 +			return (ARCHIVE_FATAL);
 +	}
 +	zip->stream_offset = next_header_offset;
 +	zip->header_offset = next_header_offset;
 +	zip->header_bytes_remaining = next_header_size;
 +	zip->header_crc32 = 0;
 +	zip->header_is_encoded = 0;
 +	zip->header_is_being_read = 1;
 +	zip->has_encrypted_entries = 0;
 +	check_header_crc = 1;
 +
 +	if ((p = header_bytes(a, 1)) == NULL) {
 +		archive_set_error(&a->archive,
 +		    ARCHIVE_ERRNO_FILE_FORMAT,
 +		    "Truncated 7-Zip file body");
 +		return (ARCHIVE_FATAL);
 +	}
 +	/* Parse ArchiveProperties. */
 +	switch (p[0]) {
 +	case kEncodedHeader:
 +		/*
 +		 * The archive has an encoded header and we have to decode it
 +		 * in order to parse the header correctly.
 +		 */
 +		r = decode_encoded_header_info(a, &(zip->si));
 +
 +		/* Check the EncodedHeader CRC.*/
 +		if (r == 0 && zip->header_crc32 != next_header_crc) {
 +			archive_set_error(&a->archive, -1,
 +			    "Damaged 7-Zip archive");
 +			r = -1;
 +		}
 +		if (r == 0) {
 +			if (zip->si.ci.folders[0].digest_defined)
 +				next_header_crc = zip->si.ci.folders[0].digest;
 +			else
 +				check_header_crc = 0;
 +			if (zip->pack_stream_bytes_unconsumed)
 +				read_consume(a);
 +			r = setup_decode_folder(a, zip->si.ci.folders, 1);
 +			if (r == 0) {
 +				zip->header_bytes_remaining =
 +					zip->folder_outbytes_remaining;
 +				r = seek_pack(a);
 +			}
 +		}
 +		/* Clean up StreamsInfo. */
 +		free_StreamsInfo(&(zip->si));
 +		memset(&(zip->si), 0, sizeof(zip->si));
 +		if (r < 0)
 +			return (ARCHIVE_FATAL);
 +		zip->header_is_encoded = 1;
 +		zip->header_crc32 = 0;
 +		/* FALL THROUGH */
 +	case kHeader:
 +		/*
 +		 * Parse the header.
 +		 */
 +		errno = 0;
 +		r = read_Header(a, header, zip->header_is_encoded);
 +		if (r < 0) {
 +			if (errno == ENOMEM)
 +				archive_set_error(&a->archive, -1,
 +				    "Couldn't allocate memory");
 +			else
 +				archive_set_error(&a->archive, -1,
 +				    "Damaged 7-Zip archive");
 +			return (ARCHIVE_FATAL);
 +		}
 +
 +		/*
 +		 *  Must be kEnd.
 +		 */
 +		if ((p = header_bytes(a, 1)) == NULL ||*p != kEnd) {
 +			archive_set_error(&a->archive, -1,
 +			    "Malformed 7-Zip archive");
 +			return (ARCHIVE_FATAL);
 +		}
 +
 +		/* Check the Header CRC.*/
 +		if (check_header_crc && zip->header_crc32 != next_header_crc) {
 +			archive_set_error(&a->archive, -1,
 +			    "Malformed 7-Zip archive");
 +			return (ARCHIVE_FATAL);
 +		}
 +		break;
 +	default:
 +		archive_set_error(&a->archive, -1,
 +		    "Unexpected Property ID = %X", p[0]);
 +		return (ARCHIVE_FATAL);
 +	}
 +
 +	/* Clean up variables be used for decoding the archive header */
 +	zip->pack_stream_remaining = 0;
 +	zip->pack_stream_index = 0;
 +	zip->folder_outbytes_remaining = 0;
 +	zip->uncompressed_buffer_bytes_remaining = 0;
 +	zip->pack_stream_bytes_unconsumed = 0;
 +	zip->header_is_being_read = 0;
 +
 +	return (ARCHIVE_OK);
 +}
 +
 +static ssize_t
 +get_uncompressed_data(struct archive_read *a, const void **buff, size_t size,
 +    size_t minimum)
 +{
 +	struct _7zip *zip = (struct _7zip *)a->format->data;
 +	ssize_t bytes_avail;
 +
 +	if (zip->codec == _7Z_COPY && zip->codec2 == (unsigned long)-1) {
 +		/* Copy mode. */
 +
 +		/*
 +		 * Note: '1' here is a performance optimization.
 +		 * Recall that the decompression layer returns a count of
 +		 * available bytes; asking for more than that forces the
 +		 * decompressor to combine reads by copying data.
 +		 */
 +		*buff = __archive_read_ahead(a, 1, &bytes_avail);
 +		if (bytes_avail <= 0) {
 +			archive_set_error(&a->archive,
 +			    ARCHIVE_ERRNO_FILE_FORMAT,
 +			    "Truncated 7-Zip file data");
 +			return (ARCHIVE_FATAL);
 +		}
 +		if ((size_t)bytes_avail >
 +		    zip->uncompressed_buffer_bytes_remaining)
 +			bytes_avail = (ssize_t)
 +			    zip->uncompressed_buffer_bytes_remaining;
 +		if ((size_t)bytes_avail > size)
 +			bytes_avail = (ssize_t)size;
 +
 +		zip->pack_stream_bytes_unconsumed = bytes_avail;
 +	} else if (zip->uncompressed_buffer_pointer == NULL) {
 +		/* Decompression has failed. */
 +		archive_set_error(&(a->archive),
 +		    ARCHIVE_ERRNO_MISC, "Damaged 7-Zip archive");
 +		return (ARCHIVE_FATAL);
 +	} else {
 +		/* Packed mode. */
 +		if (minimum > zip->uncompressed_buffer_bytes_remaining) {
 +			/*
 +			 * If remaining uncompressed data size is less than
 +			 * the minimum size, fill the buffer up to the
 +			 * minimum size.
 +			 */
 +			if (extract_pack_stream(a, minimum) < 0)
 +				return (ARCHIVE_FATAL);
 +		}
 +		if (size > zip->uncompressed_buffer_bytes_remaining)
 +			bytes_avail = (ssize_t)
 +			    zip->uncompressed_buffer_bytes_remaining;
 +		else
 +			bytes_avail = (ssize_t)size;
 +		*buff = zip->uncompressed_buffer_pointer;
 +		zip->uncompressed_buffer_pointer += bytes_avail;
 +	}
 +	zip->uncompressed_buffer_bytes_remaining -= bytes_avail;
 +	return (bytes_avail);
 +}
 +
 +static ssize_t
 +extract_pack_stream(struct archive_read *a, size_t minimum)
 +{
 +	struct _7zip *zip = (struct _7zip *)a->format->data;
 +	ssize_t bytes_avail;
 +	int r;
 +
 +	if (zip->codec == _7Z_COPY && zip->codec2 == (unsigned long)-1) {
 +		if (minimum == 0)
 +			minimum = 1;
 +		if (__archive_read_ahead(a, minimum, &bytes_avail) == NULL
 +		    || bytes_avail <= 0) {
 +			archive_set_error(&a->archive,
 +			    ARCHIVE_ERRNO_FILE_FORMAT,
 +			    "Truncated 7-Zip file body");
 +			return (ARCHIVE_FATAL);
 +		}
 +		if (bytes_avail > (ssize_t)zip->pack_stream_inbytes_remaining)
 +			bytes_avail = (ssize_t)zip->pack_stream_inbytes_remaining;
 +		zip->pack_stream_inbytes_remaining -= bytes_avail;
 +		if (bytes_avail > (ssize_t)zip->folder_outbytes_remaining)
 +			bytes_avail = (ssize_t)zip->folder_outbytes_remaining;
 +		zip->folder_outbytes_remaining -= bytes_avail;
 +		zip->uncompressed_buffer_bytes_remaining = bytes_avail;
 +		return (ARCHIVE_OK);
 +	}
 +
 +	/* If the buffer hasn't been allocated, allocate it now. */
 +	if (zip->uncompressed_buffer == NULL) {
 +		zip->uncompressed_buffer_size = UBUFF_SIZE;
 +		if (zip->uncompressed_buffer_size < minimum) {
 +			zip->uncompressed_buffer_size = minimum + 1023;
 +			zip->uncompressed_buffer_size &= ~0x3ff;
 +		}
 +		zip->uncompressed_buffer =
 +		    malloc(zip->uncompressed_buffer_size);
 +		if (zip->uncompressed_buffer == NULL) {
 +			archive_set_error(&a->archive, ENOMEM,
 +			    "No memory for 7-Zip decompression");
 +			return (ARCHIVE_FATAL);
 +		}
 +		zip->uncompressed_buffer_bytes_remaining = 0;
 +	} else if (zip->uncompressed_buffer_size < minimum ||
 +	    zip->uncompressed_buffer_bytes_remaining < minimum) {
 +		/*
 +		 * Make sure the uncompressed buffer can have bytes
 +		 * at least `minimum' bytes.
 +		 * NOTE: This case happen when reading the header.
 +		 */
 +		size_t used;
 +		if (zip->uncompressed_buffer_pointer != 0)
 +			used = zip->uncompressed_buffer_pointer -
 +				zip->uncompressed_buffer;
 +		else
 +			used = 0;
 +		if (zip->uncompressed_buffer_size < minimum) {
 +			/*
 +			 * Expand the uncompressed buffer up to
 +			 * the minimum size.
 +			 */
 +			void *p;
 +			size_t new_size;
 +
 +			new_size = minimum + 1023;
 +			new_size &= ~0x3ff;
 +			p = realloc(zip->uncompressed_buffer, new_size);
 +			if (p == NULL) {
 +				archive_set_error(&a->archive, ENOMEM,
 +				    "No memory for 7-Zip decompression");
 +				return (ARCHIVE_FATAL);
 +			}
 +			zip->uncompressed_buffer = (unsigned char *)p;
 +			zip->uncompressed_buffer_size = new_size;
 +		}
 +		/*
 +		 * Move unconsumed bytes to the head.
 +		 */
 +		if (used) {
 +			memmove(zip->uncompressed_buffer,
 +				zip->uncompressed_buffer + used,
 +				zip->uncompressed_buffer_bytes_remaining);
 +		}
 +	} else
 +		zip->uncompressed_buffer_bytes_remaining = 0;
 +	zip->uncompressed_buffer_pointer = NULL;
 +	for (;;) {
 +		size_t bytes_in, bytes_out;
 +		const void *buff_in;
 +		unsigned char *buff_out;
 +		int end_of_data;
 +
 +		/*
 +		 * Note: '1' here is a performance optimization.
 +		 * Recall that the decompression layer returns a count of
 +		 * available bytes; asking for more than that forces the
 +		 * decompressor to combine reads by copying data.
 +		 */
 +		buff_in = __archive_read_ahead(a, 1, &bytes_avail);
 +		if (bytes_avail <= 0) {
 +			archive_set_error(&a->archive,
 +			    ARCHIVE_ERRNO_FILE_FORMAT,
 +			    "Truncated 7-Zip file body");
 +			return (ARCHIVE_FATAL);
 +		}
 +
 +		buff_out = zip->uncompressed_buffer
 +			+ zip->uncompressed_buffer_bytes_remaining;
 +		bytes_out = zip->uncompressed_buffer_size
 +			- zip->uncompressed_buffer_bytes_remaining;
 +		bytes_in = bytes_avail;
 +		if (bytes_in > zip->pack_stream_inbytes_remaining)
 +			bytes_in = (size_t)zip->pack_stream_inbytes_remaining;
 +		/* Drive decompression. */
 +		r = decompress(a, zip, buff_out, &bytes_out,
 +			buff_in, &bytes_in);
 +		switch (r) {
 +		case ARCHIVE_OK:
 +			end_of_data = 0;
 +			break;
 +		case ARCHIVE_EOF:
 +			end_of_data = 1;
 +			break;
 +		default:
 +			return (ARCHIVE_FATAL);
 +		}
 +		zip->pack_stream_inbytes_remaining -= bytes_in;
 +		if (bytes_out > zip->folder_outbytes_remaining)
 +			bytes_out = (size_t)zip->folder_outbytes_remaining;
 +		zip->folder_outbytes_remaining -= bytes_out;
 +		zip->uncompressed_buffer_bytes_remaining += bytes_out;
 +		zip->pack_stream_bytes_unconsumed = bytes_in;
 +
 +		/*
 +		 * Continue decompression until uncompressed_buffer is full.
 +		 */
 +		if (zip->uncompressed_buffer_bytes_remaining ==
 +		    zip->uncompressed_buffer_size)
 +			break;
 +		if (zip->codec2 == _7Z_X86 && zip->odd_bcj_size &&
 +		    zip->uncompressed_buffer_bytes_remaining + 5 >
 +		    zip->uncompressed_buffer_size)
 +			break;
 +		if (zip->pack_stream_inbytes_remaining == 0 &&
 +		    zip->folder_outbytes_remaining == 0)
 +			break;
 +		if (end_of_data || (bytes_in == 0 && bytes_out == 0)) {
 +			archive_set_error(&(a->archive),
 +			    ARCHIVE_ERRNO_MISC, "Damaged 7-Zip archive");
 +			return (ARCHIVE_FATAL);
 +		}
 +		read_consume(a);
 +	}
 +	if (zip->uncompressed_buffer_bytes_remaining < minimum) {
 +		archive_set_error(&(a->archive),
 +		    ARCHIVE_ERRNO_MISC, "Damaged 7-Zip archive");
 +		return (ARCHIVE_FATAL);
 +	}
 +	zip->uncompressed_buffer_pointer = zip->uncompressed_buffer;
 +	return (ARCHIVE_OK);
 +}
 +
 +static int
 +seek_pack(struct archive_read *a)
 +{
 +	struct _7zip *zip = (struct _7zip *)a->format->data;
 +	int64_t pack_offset;
 +
 +	if (zip->pack_stream_remaining <= 0) {
 +		archive_set_error(&(a->archive),
 +		    ARCHIVE_ERRNO_MISC, "Damaged 7-Zip archive");
 +		return (ARCHIVE_FATAL);
 +	}
 +	zip->pack_stream_inbytes_remaining =
 +	    zip->si.pi.sizes[zip->pack_stream_index];
 +	pack_offset = zip->si.pi.positions[zip->pack_stream_index];
 +	if (zip->stream_offset != pack_offset) {
 +		if (0 > __archive_read_seek(a, pack_offset + zip->seek_base,
 +		    SEEK_SET))
 +			return (ARCHIVE_FATAL);
 +		zip->stream_offset = pack_offset;
 +	}
 +	zip->pack_stream_index++;
 +	zip->pack_stream_remaining--;
 +	return (ARCHIVE_OK);
 +}
 +
 +static ssize_t
 +read_stream(struct archive_read *a, const void **buff, size_t size,
 +    size_t minimum)
 +{
 +	struct _7zip *zip = (struct _7zip *)a->format->data;
 +	uint64_t skip_bytes = 0;
 +	ssize_t r;
 +
 +	if (zip->uncompressed_buffer_bytes_remaining == 0) {
 +		if (zip->pack_stream_inbytes_remaining > 0) {
 +			r = extract_pack_stream(a, 0);
 +			if (r < 0)
 +				return (r);
 +			return (get_uncompressed_data(a, buff, size, minimum));
 +		} else if (zip->folder_outbytes_remaining > 0) {
 +			/* Extract a remaining pack stream. */
 +			r = extract_pack_stream(a, 0);
 +			if (r < 0)
 +				return (r);
 +			return (get_uncompressed_data(a, buff, size, minimum));
 +		}
 +	} else
 +		return (get_uncompressed_data(a, buff, size, minimum));
 +
 +	/*
 +	 * Current pack stream has been consumed.
 +	 */
 +	if (zip->pack_stream_remaining == 0) {
 +		if (zip->header_is_being_read) {
 +			/* Invalid sequence. This might happen when
 +			 * reading a malformed archive. */
 +			archive_set_error(&(a->archive),
 +			    ARCHIVE_ERRNO_MISC, "Malformed 7-Zip archive");
 +			return (ARCHIVE_FATAL);
 +		}
 +
 +		/*
 +		 * All current folder's pack streams have been
 +		 * consumed. Switch to next folder.
 +		 */
 +		if (zip->folder_index == 0 &&
 +		    (zip->si.ci.folders[zip->entry->folderIndex].skipped_bytes
 +		     || zip->folder_index != zip->entry->folderIndex)) {
 +			zip->folder_index = zip->entry->folderIndex;
 +			skip_bytes =
 +			    zip->si.ci.folders[zip->folder_index].skipped_bytes;
 +		}
 +
 +		if (zip->folder_index >= zip->si.ci.numFolders) {
 +			/*
 +			 * We have consumed all folders and its pack streams.
 +			 */
 +			*buff = NULL;
 +			return (0);
 +		}
 +		r = setup_decode_folder(a,
 +			&(zip->si.ci.folders[zip->folder_index]), 0);
 +		if (r != ARCHIVE_OK)
 +			return (ARCHIVE_FATAL);
 +
 +		zip->folder_index++;
 +	}
 +
 +	/*
 +	 * Switch to next pack stream.
 +	 */
 +	r = seek_pack(a);
 +	if (r < 0)
 +		return (r);
 +
 +	/* Extract a new pack stream. */
 +	r = extract_pack_stream(a, 0);
 +	if (r < 0)
 +		return (r);
 +
 +	/*
- 	 * Skip the bytes we alrady has skipped in skip_stream().
++	 * Skip the bytes we already has skipped in skip_stream().
 +	 */
 +	while (skip_bytes) {
 +		ssize_t skipped;
 +
 +		if (zip->uncompressed_buffer_bytes_remaining == 0) {
 +			if (zip->pack_stream_inbytes_remaining > 0) {
 +				r = extract_pack_stream(a, 0);
 +				if (r < 0)
 +					return (r);
 +			} else if (zip->folder_outbytes_remaining > 0) {
 +				/* Extract a remaining pack stream. */
 +				r = extract_pack_stream(a, 0);
 +				if (r < 0)
 +					return (r);
 +			} else {
 +				archive_set_error(&a->archive,
 +				    ARCHIVE_ERRNO_FILE_FORMAT,
 +				    "Truncated 7-Zip file body");
 +				return (ARCHIVE_FATAL);
 +			}
 +		}
 +		skipped = get_uncompressed_data(
 +			a, buff, (size_t)skip_bytes, 0);
 +		if (skipped < 0)
 +			return (skipped);
 +		skip_bytes -= skipped;
 +		if (zip->pack_stream_bytes_unconsumed)
 +			read_consume(a);
 +	}
 +
 +	return (get_uncompressed_data(a, buff, size, minimum));
 +}
 +
 +static int
 +setup_decode_folder(struct archive_read *a, struct _7z_folder *folder,
 +    int header)
 +{
 +	struct _7zip *zip = (struct _7zip *)a->format->data;
 +	const struct _7z_coder *coder1, *coder2;
 +	const char *cname = (header)?"archive header":"file content";
 +	unsigned i;
 +	int r, found_bcj2 = 0;
 +
 +	/*
 +	 * Release the memory which the previous folder used for BCJ2.
 +	 */
 +	for (i = 0; i < 3; i++) {
 +		if (zip->sub_stream_buff[i] != NULL)
 +			free(zip->sub_stream_buff[i]);
 +		zip->sub_stream_buff[i] = NULL;
 +	}
 +
 +	/*
 +	 * Initialize a stream reader.
 +	 */
 +	zip->pack_stream_remaining = (unsigned)folder->numPackedStreams;
 +	zip->pack_stream_index = (unsigned)folder->packIndex;
 +	zip->folder_outbytes_remaining = folder_uncompressed_size(folder);
 +	zip->uncompressed_buffer_bytes_remaining = 0;
 +
 +	/*
 +	 * Check coder types.
 +	 */
 +	for (i = 0; i < folder->numCoders; i++) {
 +		switch(folder->coders[i].codec) {
 +			case _7Z_CRYPTO_MAIN_ZIP:
 +			case _7Z_CRYPTO_RAR_29:
 +			case _7Z_CRYPTO_AES_256_SHA_256: {
 +				/* For entry that is associated with this folder, mark
 +				   it as encrypted (data+metadata). */
 +				zip->has_encrypted_entries = 1;
 +				if (a->entry) {
 +					archive_entry_set_is_data_encrypted(a->entry, 1);
 +					archive_entry_set_is_metadata_encrypted(a->entry, 1);
 +				}
 +				archive_set_error(&(a->archive),
 +					ARCHIVE_ERRNO_MISC,
 +					"The %s is encrypted, "
 +					"but currently not supported", cname);
 +				return (ARCHIVE_FATAL);
 +			}
 +			case _7Z_X86_BCJ2: {
 +				found_bcj2++;
 +				break;
 +			}
 +		}
 +	}
 +	/* Now that we've checked for encryption, if there were still no
 +	 * encrypted entries found we can say for sure that there are none.
 +	 */
 +	if (zip->has_encrypted_entries == ARCHIVE_READ_FORMAT_ENCRYPTION_DONT_KNOW) {
 +		zip->has_encrypted_entries = 0;
 +	}
 +
 +	if ((folder->numCoders > 2 && !found_bcj2) || found_bcj2 > 1) {
 +		archive_set_error(&(a->archive),
 +		    ARCHIVE_ERRNO_MISC,
 +		    "The %s is encoded with many filters, "
 +		    "but currently not supported", cname);
 +		return (ARCHIVE_FATAL);
 +	}
 +	coder1 = &(folder->coders[0]);
 +	if (folder->numCoders == 2)
 +		coder2 = &(folder->coders[1]);
 +	else
 +		coder2 = NULL;
 +
 +	if (found_bcj2) {
 +		/*
 +		 * Preparation to decode BCJ2.
 +		 * Decoding BCJ2 requires four sources. Those are at least,
 +		 * as far as I know, two types of the storage form.
 +		 */
 +		const struct _7z_coder *fc = folder->coders;
 +		static const struct _7z_coder coder_copy = {0, 1, 1, 0, NULL};
 +		const struct _7z_coder *scoder[3] =
 +			{&coder_copy, &coder_copy, &coder_copy};
 +		const void *buff;
 +		ssize_t bytes;
 +		unsigned char *b[3] = {NULL, NULL, NULL};
 +		uint64_t sunpack[3] ={-1, -1, -1};
 +		size_t s[3] = {0, 0, 0};
 +		int idx[3] = {0, 1, 2};
 +
 +		if (folder->numCoders == 4 && fc[3].codec == _7Z_X86_BCJ2 &&
 +		    folder->numInStreams == 7 && folder->numOutStreams == 4 &&
 +		    zip->pack_stream_remaining == 4) {
 +			/* Source type 1 made by 7zr or 7z with -m options. */
 +			if (folder->bindPairs[0].inIndex == 5) {
 +				/* The form made by 7zr */
 +				idx[0] = 1; idx[1] = 2; idx[2] = 0;
 +				scoder[1] = &(fc[1]);
 +				scoder[2] = &(fc[0]);
 +				sunpack[1] = folder->unPackSize[1];
 +				sunpack[2] = folder->unPackSize[0];
 +				coder1 = &(fc[2]);
 +			} else {
 +				/*
 +				 * NOTE: Some patterns do not work.
 +				 * work:
 +				 *  7z a -m0=BCJ2 -m1=COPY -m2=COPY
 +				 *       -m3=(any)
 +				 *  7z a -m0=BCJ2 -m1=COPY -m2=(any)
 +				 *       -m3=COPY
 +				 *  7z a -m0=BCJ2 -m1=(any) -m2=COPY
 +				 *       -m3=COPY
 +				 * not work:
 +				 *  other patterns.
 +				 *
 +				 * We have to handle this like `pipe' or
 +				 * our libarchive7s filter frame work,
 +				 * decoding the BCJ2 main stream sequentially,
 +				 * m3 -> m2 -> m1 -> BCJ2.
 +				 *
 +				 */
 +				if (fc[0].codec == _7Z_COPY &&
 +				    fc[1].codec == _7Z_COPY)
 +					coder1 = &(folder->coders[2]);
 +				else if (fc[0].codec == _7Z_COPY &&
 +				    fc[2].codec == _7Z_COPY)
 +					coder1 = &(folder->coders[1]);
 +				else if (fc[1].codec == _7Z_COPY &&
 +				    fc[2].codec == _7Z_COPY)
 +					coder1 = &(folder->coders[0]);
 +				else {
 +					archive_set_error(&(a->archive),
 +					    ARCHIVE_ERRNO_MISC,
 +					    "Unsupported form of "
 +					    "BCJ2 streams");
 +					return (ARCHIVE_FATAL);
 +				}
 +			}
 +			coder2 = &(fc[3]);
 +			zip->main_stream_bytes_remaining =
 +				(size_t)folder->unPackSize[2];
 +		} else if (coder2 != NULL && coder2->codec == _7Z_X86_BCJ2 &&
 +		    zip->pack_stream_remaining == 4 &&
 +		    folder->numInStreams == 5 && folder->numOutStreams == 2) {
 +			/* Source type 0 made by 7z */
 +			zip->main_stream_bytes_remaining =
 +				(size_t)folder->unPackSize[0];
 +		} else {
 +			/* We got an unexpected form. */
 +			archive_set_error(&(a->archive),
 +			    ARCHIVE_ERRNO_MISC,
 +			    "Unsupported form of BCJ2 streams");
 +			return (ARCHIVE_FATAL);
 +		}
 +
 +		/* Skip the main stream at this time. */
 +		if ((r = seek_pack(a)) < 0)
 +			return (r);
 +		zip->pack_stream_bytes_unconsumed =
 +		    (size_t)zip->pack_stream_inbytes_remaining;
 +		read_consume(a);
 +
 +		/* Read following three sub streams. */
 +		for (i = 0; i < 3; i++) {
 +			const struct _7z_coder *coder = scoder[i];
 +
 +			if ((r = seek_pack(a)) < 0) {
 +				free(b[0]); free(b[1]); free(b[2]);
 +				return (r);
 +			}
 +
 +			if (sunpack[i] == (uint64_t)-1)
 +				zip->folder_outbytes_remaining =
 +				    zip->pack_stream_inbytes_remaining;
 +			else
 +				zip->folder_outbytes_remaining = sunpack[i];
 +
 +			r = init_decompression(a, zip, coder, NULL);
 +			if (r != ARCHIVE_OK) {
 +				free(b[0]); free(b[1]); free(b[2]);
 +				return (ARCHIVE_FATAL);
 +			}
 +
- 			/* Allocate memory for the decorded data of a sub
++			/* Allocate memory for the decoded data of a sub
 +			 * stream. */
 +			b[i] = malloc((size_t)zip->folder_outbytes_remaining);
 +			if (b[i] == NULL) {
 +				free(b[0]); free(b[1]); free(b[2]);
 +				archive_set_error(&a->archive, ENOMEM,
 +				    "No memory for 7-Zip decompression");
 +				return (ARCHIVE_FATAL);
 +			}
 +
 +			/* Extract a sub stream. */
 +			while (zip->pack_stream_inbytes_remaining > 0) {
 +				r = (int)extract_pack_stream(a, 0);
 +				if (r < 0) {
 +					free(b[0]); free(b[1]); free(b[2]);
 +					return (r);
 +				}
 +				bytes = get_uncompressed_data(a, &buff,
 +				    zip->uncompressed_buffer_bytes_remaining,
 +				    0);
 +				if (bytes < 0) {
 +					free(b[0]); free(b[1]); free(b[2]);
 +					return ((int)bytes);
 +				}
 +				memcpy(b[i]+s[i], buff, bytes);
 +				s[i] += bytes;
 +				if (zip->pack_stream_bytes_unconsumed)
 +					read_consume(a);
 +			}
 +		}
 +
 +		/* Set the sub streams to the right place. */
 +		for (i = 0; i < 3; i++) {
 +			zip->sub_stream_buff[i] = b[idx[i]];
 +			zip->sub_stream_size[i] = s[idx[i]];
 +			zip->sub_stream_bytes_remaining[i] = s[idx[i]];
 +		}
 +
 +		/* Allocate memory used for decoded main stream bytes. */
 +		if (zip->tmp_stream_buff == NULL) {
 +			zip->tmp_stream_buff_size = 32 * 1024;
 +			zip->tmp_stream_buff =
 +			    malloc(zip->tmp_stream_buff_size);
 +			if (zip->tmp_stream_buff == NULL) {
 +				archive_set_error(&a->archive, ENOMEM,
 +				    "No memory for 7-Zip decompression");
 +				return (ARCHIVE_FATAL);
 +			}
 +		}
 +		zip->tmp_stream_bytes_avail = 0;
 +		zip->tmp_stream_bytes_remaining = 0;
 +		zip->odd_bcj_size = 0;
 +		zip->bcj2_outPos = 0;
 +
 +		/*
 +		 * Reset a stream reader in order to read the main stream
 +		 * of BCJ2.
 +		 */
 +		zip->pack_stream_remaining = 1;
 +		zip->pack_stream_index = (unsigned)folder->packIndex;
 +		zip->folder_outbytes_remaining =
 +		    folder_uncompressed_size(folder);
 +		zip->uncompressed_buffer_bytes_remaining = 0;
 +	}
 +
 +	/*
 +	 * Initialize the decompressor for the new folder's pack streams.
 +	 */
 +	r = init_decompression(a, zip, coder1, coder2);
 +	if (r != ARCHIVE_OK)
 +		return (ARCHIVE_FATAL);
 +	return (ARCHIVE_OK);
 +}
 +
 +static int64_t
 +skip_stream(struct archive_read *a, size_t skip_bytes)
 +{
 +	struct _7zip *zip = (struct _7zip *)a->format->data;
 +	const void *p;
 +	int64_t skipped_bytes;
 +	size_t bytes = skip_bytes;
 +
 +	if (zip->folder_index == 0) {
 +		/*
 +		 * Optimization for a list mode.
- 		 * Avoid unncecessary decoding operations.
++		 * Avoid unnecessary decoding operations.
 +		 */
 +		zip->si.ci.folders[zip->entry->folderIndex].skipped_bytes
 +		    += skip_bytes;
 +		return (skip_bytes);
 +	}
 +
 +	while (bytes) {
 +		skipped_bytes = read_stream(a, &p, bytes, 0);
 +		if (skipped_bytes < 0)
 +			return (skipped_bytes);
 +		if (skipped_bytes == 0) {
 +			archive_set_error(&a->archive,
 +			    ARCHIVE_ERRNO_FILE_FORMAT,
 +			    "Truncated 7-Zip file body");
 +			return (ARCHIVE_FATAL);
 +		}
 +		bytes -= (size_t)skipped_bytes;
 +		if (zip->pack_stream_bytes_unconsumed)
 +			read_consume(a);
 +	}
 +	return (skip_bytes);
 +}
 +
 +/*
 + * Brought from LZMA SDK.
 + *
 + * Bra86.c -- Converter for x86 code (BCJ)
 + * 2008-10-04 : Igor Pavlov : Public domain
 + *
 + */
 +
 +#define Test86MSByte(b) ((b) == 0 || (b) == 0xFF)
 +
 +static void
 +x86_Init(struct _7zip *zip)
 +{
 +	zip->bcj_state = 0;
 +	zip->bcj_prevPosT = (size_t)0 - 1;
 +	zip->bcj_prevMask = 0;
 +	zip->bcj_ip = 5;
 +}
 +
 +static size_t
 +x86_Convert(struct _7zip *zip, uint8_t *data, size_t size)
 +{
 +	static const uint8_t kMaskToAllowedStatus[8] = {1, 1, 1, 0, 1, 0, 0, 0};
 +	static const uint8_t kMaskToBitNumber[8] = {0, 1, 2, 2, 3, 3, 3, 3};
 +	size_t bufferPos, prevPosT;
 +	uint32_t ip, prevMask;
 +
 +	if (size < 5)
 +		return 0;
 +
 +	bufferPos = 0;
 +	prevPosT = zip->bcj_prevPosT;
 +	prevMask = zip->bcj_prevMask;
 +	ip = zip->bcj_ip;
 +
 +	for (;;) {
 +		uint8_t *p = data + bufferPos;
 +		uint8_t *limit = data + size - 4;
 +
 +		for (; p < limit; p++)
 +			if ((*p & 0xFE) == 0xE8)
 +				break;
 +		bufferPos = (size_t)(p - data);
 +		if (p >= limit)
 +			break;
 +		prevPosT = bufferPos - prevPosT;
 +		if (prevPosT > 3)
 +			prevMask = 0;
 +		else {
 +			prevMask = (prevMask << ((int)prevPosT - 1)) & 0x7;
 +			if (prevMask != 0) {
 +				unsigned char b =
 +					p[4 - kMaskToBitNumber[prevMask]];
 +				if (!kMaskToAllowedStatus[prevMask] ||
 +				    Test86MSByte(b)) {
 +					prevPosT = bufferPos;
 +					prevMask = ((prevMask << 1) & 0x7) | 1;
 +					bufferPos++;
 +					continue;
 +				}
 +			}
 +		}
 +		prevPosT = bufferPos;
 +
 +		if (Test86MSByte(p[4])) {
 +			uint32_t src = ((uint32_t)p[4] << 24) |
 +				((uint32_t)p[3] << 16) | ((uint32_t)p[2] << 8) |
 +				((uint32_t)p[1]);
 +			uint32_t dest;
 +			for (;;) {
 +				uint8_t b;
 +				int b_index;
 +
 +				dest = src - (ip + (uint32_t)bufferPos);
 +				if (prevMask == 0)
 +					break;
 +				b_index = kMaskToBitNumber[prevMask] * 8;
 +				b = (uint8_t)(dest >> (24 - b_index));
 +				if (!Test86MSByte(b))
 +					break;
 +				src = dest ^ ((1 << (32 - b_index)) - 1);
 +			}
 +			p[4] = (uint8_t)(~(((dest >> 24) & 1) - 1));
 +			p[3] = (uint8_t)(dest >> 16);
 +			p[2] = (uint8_t)(dest >> 8);
 +			p[1] = (uint8_t)dest;
 +			bufferPos += 5;
 +		} else {
 +			prevMask = ((prevMask << 1) & 0x7) | 1;
 +			bufferPos++;
 +		}
 +	}
 +	zip->bcj_prevPosT = prevPosT;
 +	zip->bcj_prevMask = prevMask;
 +	zip->bcj_ip += (uint32_t)bufferPos;
 +	return (bufferPos);
 +}
 +
 +/*
 + * Brought from LZMA SDK.
 + *
 + * Bcj2.c -- Converter for x86 code (BCJ2)
 + * 2008-10-04 : Igor Pavlov : Public domain
 + *
 + */
 +
 +#define SZ_ERROR_DATA	 ARCHIVE_FAILED
 +
 +#define IsJcc(b0, b1) ((b0) == 0x0F && ((b1) & 0xF0) == 0x80)
 +#define IsJ(b0, b1) ((b1 & 0xFE) == 0xE8 || IsJcc(b0, b1))
 +
 +#define kNumTopBits 24
 +#define kTopValue ((uint32_t)1 << kNumTopBits)
 +
 +#define kNumBitModelTotalBits 11
 +#define kBitModelTotal (1 << kNumBitModelTotalBits)
 +#define kNumMoveBits 5
 +
 +#define RC_READ_BYTE (*buffer++)
 +#define RC_TEST { if (buffer == bufferLim) return SZ_ERROR_DATA; }
 +#define RC_INIT2 zip->bcj2_code = 0; zip->bcj2_range = 0xFFFFFFFF; \
 +  { int ii; for (ii = 0; ii < 5; ii++) { RC_TEST; zip->bcj2_code = (zip->bcj2_code << 8) | RC_READ_BYTE; }}
 +
 +#define NORMALIZE if (zip->bcj2_range < kTopValue) { RC_TEST; zip->bcj2_range <<= 8; zip->bcj2_code = (zip->bcj2_code << 8) | RC_READ_BYTE; }
 +
 +#define IF_BIT_0(p) ttt = *(p); bound = (zip->bcj2_range >> kNumBitModelTotalBits) * ttt; if (zip->bcj2_code < bound)
 +#define UPDATE_0(p) zip->bcj2_range = bound; *(p) = (CProb)(ttt + ((kBitModelTotal - ttt) >> kNumMoveBits)); NORMALIZE;
 +#define UPDATE_1(p) zip->bcj2_range -= bound; zip->bcj2_code -= bound; *(p) = (CProb)(ttt - (ttt >> kNumMoveBits)); NORMALIZE;
 +
 +static ssize_t
 +Bcj2_Decode(struct _7zip *zip, uint8_t *outBuf, size_t outSize)
 +{
 +	size_t inPos = 0, outPos = 0;
 +	const uint8_t *buf0, *buf1, *buf2, *buf3;
 +	size_t size0, size1, size2, size3;
 +	const uint8_t *buffer, *bufferLim;
 +	unsigned int i, j;
 +
 +	size0 = zip->tmp_stream_bytes_remaining;
 +	buf0 = zip->tmp_stream_buff + zip->tmp_stream_bytes_avail - size0;
 +	size1 = zip->sub_stream_bytes_remaining[0];
 +	buf1 = zip->sub_stream_buff[0] + zip->sub_stream_size[0] - size1;
 +	size2 = zip->sub_stream_bytes_remaining[1];
 +	buf2 = zip->sub_stream_buff[1] + zip->sub_stream_size[1] - size2;
 +	size3 = zip->sub_stream_bytes_remaining[2];
 +	buf3 = zip->sub_stream_buff[2] + zip->sub_stream_size[2] - size3;
 +
 +	buffer = buf3;
 +	bufferLim = buffer + size3;
 +
 +	if (zip->bcj_state == 0) {
 +		/*
 +		 * Initialize.
 +		 */
 +		zip->bcj2_prevByte = 0;
 +		for (i = 0;
 +		    i < sizeof(zip->bcj2_p) / sizeof(zip->bcj2_p[0]); i++)
 +			zip->bcj2_p[i] = kBitModelTotal >> 1;
 +		RC_INIT2;
 +		zip->bcj_state = 1;
 +	}
 +
 +	/*
 +	 * Gather the odd bytes of a previous call.
 +	 */
 +	for (i = 0; zip->odd_bcj_size > 0 && outPos < outSize; i++) {
 +		outBuf[outPos++] = zip->odd_bcj[i];
 +		zip->odd_bcj_size--;
 +	}
 +
 +	if (outSize == 0) {
 +		zip->bcj2_outPos += outPos;
 +		return (outPos);
 +	}
 +
 +	for (;;) {
 +		uint8_t b;
 +		CProb *prob;
 +		uint32_t bound;
 +		uint32_t ttt;
 +
 +		size_t limit = size0 - inPos;
 +		if (outSize - outPos < limit)
 +			limit = outSize - outPos;
 +
 +		if (zip->bcj_state == 1) {
 +			while (limit != 0) {
 +				uint8_t bb = buf0[inPos];
 +				outBuf[outPos++] = bb;
 +				if (IsJ(zip->bcj2_prevByte, bb)) {
 +					zip->bcj_state = 2;
 +					break;
 +				}
 +				inPos++;
 +				zip->bcj2_prevByte = bb;
 +				limit--;
 +			}
 +		}
 +
 +		if (limit == 0 || outPos == outSize)
 +			break;
 +		zip->bcj_state = 1;
 +
 +		b = buf0[inPos++];
 +
 +		if (b == 0xE8)
 +			prob = zip->bcj2_p + zip->bcj2_prevByte;
 +		else if (b == 0xE9)
 +			prob = zip->bcj2_p + 256;
 +		else
 +			prob = zip->bcj2_p + 257;
 +
 +		IF_BIT_0(prob) {
 +			UPDATE_0(prob)
 +			zip->bcj2_prevByte = b;
 +		} else {
 +			uint32_t dest;
 +			const uint8_t *v;
 +			uint8_t out[4];
 +
 +			UPDATE_1(prob)
 +			if (b == 0xE8) {
 +				v = buf1;
 +				if (size1 < 4)
 +					return SZ_ERROR_DATA;
 +				buf1 += 4;
 +				size1 -= 4;
 +			} else {
 +				v = buf2;
 +				if (size2 < 4)
 +					return SZ_ERROR_DATA;
 +				buf2 += 4;
 +				size2 -= 4;
 +			}
 +			dest = (((uint32_t)v[0] << 24) |
 +			    ((uint32_t)v[1] << 16) |
 +			    ((uint32_t)v[2] << 8) |
 +			    ((uint32_t)v[3])) -
 +			    ((uint32_t)zip->bcj2_outPos + (uint32_t)outPos + 4);
 +			out[0] = (uint8_t)dest;
 +			out[1] = (uint8_t)(dest >> 8);
 +			out[2] = (uint8_t)(dest >> 16);
 +			out[3] = zip->bcj2_prevByte = (uint8_t)(dest >> 24);
 +
 +			for (i = 0; i < 4 && outPos < outSize; i++)
 +				outBuf[outPos++] = out[i];
 +			if (i < 4) {
 +				/*
 +				 * Save odd bytes which we could not add into
 +				 * the output buffer because of out of space.
 +				 */
 +				zip->odd_bcj_size = 4 -i;
 +				for (; i < 4; i++) {
 +					j = i - 4 + (unsigned)zip->odd_bcj_size;
 +					zip->odd_bcj[j] = out[i];
 +				}
 +				break;
 +			}
 +		}
 +	}
 +	zip->tmp_stream_bytes_remaining -= inPos;
 +	zip->sub_stream_bytes_remaining[0] = size1;
 +	zip->sub_stream_bytes_remaining[1] = size2;
 +	zip->sub_stream_bytes_remaining[2] = bufferLim - buffer;
 +	zip->bcj2_outPos += outPos;
 +
 +	return ((ssize_t)outPos);
 +}
 +
diff --cc Utilities/cmlibarchive/libarchive/archive_read_support_format_cab.c
index 6356963,0000000..20eb157
mode 100644,000000..100644
--- a/Utilities/cmlibarchive/libarchive/archive_read_support_format_cab.c
+++ b/Utilities/cmlibarchive/libarchive/archive_read_support_format_cab.c
@@@ -1,3350 -1,0 +1,3353 @@@
 +/*-
 + * Copyright (c) 2010-2012 Michihiro NAKAJIMA
 + * All rights reserved.
 + *
 + * Redistribution and use in source and binary forms, with or without
 + * modification, are permitted provided that the following conditions
 + * are met:
 + * 1. Redistributions of source code must retain the above copyright
 + *    notice, this list of conditions and the following disclaimer.
 + * 2. Redistributions in binary form must reproduce the above copyright
 + *    notice, this list of conditions and the following disclaimer in the
 + *    documentation and/or other materials provided with the distribution.
 + *
 + * THIS SOFTWARE IS PROVIDED BY THE AUTHOR(S) ``AS IS'' AND ANY EXPRESS OR
 + * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
 + * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
 + * IN NO EVENT SHALL THE AUTHOR(S) BE LIABLE FOR ANY DIRECT, INDIRECT,
 + * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
 + * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
 + * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
 + * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
 + * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
 + * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
 + */
 +
 +#include "archive_platform.h"
 +
 +#ifdef HAVE_ERRNO_H
 +#include <errno.h>
 +#endif
 +#ifdef HAVE_LIMITS_H
 +#include <limits.h>
 +#endif
 +#ifdef HAVE_STDLIB_H
 +#include <stdlib.h>
 +#endif
 +#ifdef HAVE_STRING_H
 +#include <string.h>
 +#endif
 +#ifdef HAVE_ZLIB_H
 +#include <cm_zlib.h>
 +#endif
 +
 +#include "archive.h"
 +#include "archive_entry.h"
 +#include "archive_entry_locale.h"
 +#include "archive_private.h"
 +#include "archive_read_private.h"
 +#include "archive_endian.h"
 +
 +
 +struct lzx_dec {
 +	/* Decoding status. */
 +	int     		 state;
 +
 +	/*
 +	 * Window to see last decoded data, from 32KBi to 2MBi.
 +	 */
 +	int			 w_size;
 +	int			 w_mask;
 +	/* Window buffer, which is a loop buffer. */
 +	unsigned char		*w_buff;
 +	/* The insert position to the window. */
 +	int			 w_pos;
 +	/* The position where we can copy decoded code from the window. */
 +	int     		 copy_pos;
 +	/* The length how many bytes we can copy decoded code from
 +	 * the window. */
 +	int     		 copy_len;
- 	/* Translation reversal for x86 proccessor CALL byte sequence(E8).
++	/* Translation reversal for x86 processor CALL byte sequence(E8).
 +	 * This is used for LZX only. */
 +	uint32_t		 translation_size;
 +	char			 translation;
 +	char			 block_type;
 +#define VERBATIM_BLOCK		1
 +#define ALIGNED_OFFSET_BLOCK	2
 +#define UNCOMPRESSED_BLOCK	3
 +	size_t			 block_size;
 +	size_t			 block_bytes_avail;
 +	/* Repeated offset. */
 +	int			 r0, r1, r2;
 +	unsigned char		 rbytes[4];
 +	int			 rbytes_avail;
 +	int			 length_header;
 +	int			 position_slot;
 +	int			 offset_bits;
 +
 +	struct lzx_pos_tbl {
 +		int		 base;
 +		int		 footer_bits;
 +	}			*pos_tbl;
 +	/*
 +	 * Bit stream reader.
 +	 */
 +	struct lzx_br {
 +#define CACHE_TYPE		uint64_t
 +#define CACHE_BITS		(8 * sizeof(CACHE_TYPE))
 +	 	/* Cache buffer. */
 +		CACHE_TYPE	 cache_buffer;
 +		/* Indicates how many bits avail in cache_buffer. */
 +		int		 cache_avail;
 +		unsigned char	 odd;
 +		char		 have_odd;
 +	} br;
 +
 +	/*
 +	 * Huffman coding.
 +	 */
 +	struct huffman {
 +		int		 len_size;
 +		int		 freq[17];
 +		unsigned char	*bitlen;
 +
 +		/*
 +		 * Use a index table. It's faster than searching a huffman
 +		 * coding tree, which is a binary tree. But a use of a large
 +		 * index table causes L1 cache read miss many times.
 +		 */
 +#define HTBL_BITS	10
 +		int		 max_bits;
 +		int		 shift_bits;
 +		int		 tbl_bits;
 +		int		 tree_used;
 +		int		 tree_avail;
 +		/* Direct access table. */
 +		uint16_t	*tbl;
 +		/* Binary tree table for extra bits over the direct access. */
 +		struct htree_t {
 +			uint16_t left;
 +			uint16_t right;
 +		}		*tree;
 +	}			 at, lt, mt, pt;
 +
 +	int			 loop;
 +	int			 error;
 +};
 +
 +static const int slots[] = {
 +	30, 32, 34, 36, 38, 42, 50, 66, 98, 162, 290
 +};
 +#define SLOT_BASE	15
 +#define SLOT_MAX	21/*->25*/
 +
 +struct lzx_stream {
 +	const unsigned char	*next_in;
 +	int64_t			 avail_in;
 +	int64_t			 total_in;
 +	unsigned char		*next_out;
 +	int64_t			 avail_out;
 +	int64_t			 total_out;
 +	struct lzx_dec		*ds;
 +};
 +
 +/*
 + * Cabinet file definitions.
 + */
 +/* CFHEADER offset */
 +#define CFHEADER_signature	0
 +#define CFHEADER_cbCabinet	8
 +#define CFHEADER_coffFiles	16
 +#define CFHEADER_versionMinor	24
 +#define CFHEADER_versionMajor	25
 +#define CFHEADER_cFolders	26
 +#define CFHEADER_cFiles		28
 +#define CFHEADER_flags		30
 +#define CFHEADER_setID		32
 +#define CFHEADER_iCabinet	34
 +#define CFHEADER_cbCFHeader	36
 +#define CFHEADER_cbCFFolder	38
 +#define CFHEADER_cbCFData	39
 +
 +/* CFFOLDER offset */
 +#define CFFOLDER_coffCabStart	0
 +#define CFFOLDER_cCFData	4
 +#define CFFOLDER_typeCompress	6
 +#define CFFOLDER_abReserve	8
 +
 +/* CFFILE offset */
 +#define CFFILE_cbFile		0
 +#define CFFILE_uoffFolderStart	4
 +#define CFFILE_iFolder		8
 +#define CFFILE_date_time	10
 +#define CFFILE_attribs		14
 +
 +/* CFDATA offset */
 +#define CFDATA_csum		0
 +#define CFDATA_cbData		4
 +#define CFDATA_cbUncomp		6
 +
 +static const char *compression_name[] = {
 +	"NONE",
 +	"MSZIP",
 +	"Quantum",
 +	"LZX",
 +};
 +
 +struct cfdata {
 +	/* Sum value of this CFDATA. */
 +	uint32_t		 sum;
 +	uint16_t		 compressed_size;
 +	uint16_t		 compressed_bytes_remaining;
 +	uint16_t		 uncompressed_size;
 +	uint16_t		 uncompressed_bytes_remaining;
 +	/* To know how many bytes we have decompressed. */
 +	uint16_t		 uncompressed_avail;
 +	/* Offset from the beginning of compressed data of this CFDATA */
 +	uint16_t		 read_offset;
 +	int64_t			 unconsumed;
 +	/* To keep memory image of this CFDATA to compute the sum. */
 +	size_t			 memimage_size;
 +	unsigned char		*memimage;
 +	/* Result of calculation of sum. */
 +	uint32_t		 sum_calculated;
 +	unsigned char		 sum_extra[4];
 +	int			 sum_extra_avail;
 +	const void		*sum_ptr;
 +};
 +
 +struct cffolder {
 +	uint32_t		 cfdata_offset_in_cab;
 +	uint16_t		 cfdata_count;
 +	uint16_t		 comptype;
 +#define COMPTYPE_NONE		0x0000
 +#define COMPTYPE_MSZIP		0x0001
 +#define COMPTYPE_QUANTUM	0x0002
 +#define COMPTYPE_LZX		0x0003
 +	uint16_t		 compdata;
 +	const char		*compname;
 +	/* At the time reading CFDATA */
 +	struct cfdata		 cfdata;
 +	int			 cfdata_index;
 +	/* Flags to mark progress of decompression. */
 +	char			 decompress_init;
 +};
 +
 +struct cffile {
 +	uint32_t		 uncompressed_size;
 +	uint32_t		 offset;
 +	time_t			 mtime;
 +	uint16_t	 	 folder;
 +#define iFoldCONTINUED_FROM_PREV	0xFFFD
 +#define iFoldCONTINUED_TO_NEXT		0xFFFE
 +#define iFoldCONTINUED_PREV_AND_NEXT	0xFFFF
 +	unsigned char		 attr;
 +#define ATTR_RDONLY		0x01
 +#define ATTR_NAME_IS_UTF	0x80
 +	struct archive_string 	 pathname;
 +};
 +
 +struct cfheader {
 +	/* Total bytes of all file size in a Cabinet. */
 +	uint32_t		 total_bytes;
 +	uint32_t		 files_offset;
 +	uint16_t		 folder_count;
 +	uint16_t		 file_count;
 +	uint16_t		 flags;
 +#define PREV_CABINET	0x0001
 +#define NEXT_CABINET	0x0002
 +#define RESERVE_PRESENT	0x0004
 +	uint16_t		 setid;
 +	uint16_t		 cabinet;
 +	/* Version number. */
 +	unsigned char		 major;
 +	unsigned char		 minor;
 +	unsigned char		 cffolder;
 +	unsigned char		 cfdata;
 +	/* All folders in a cabinet. */
 +	struct cffolder		*folder_array;
 +	/* All files in a cabinet. */
 +	struct cffile		*file_array;
 +	int			 file_index;
 +};
 +
 +struct cab {
 +	/* entry_bytes_remaining is the number of bytes we expect.	    */
 +	int64_t			 entry_offset;
 +	int64_t			 entry_bytes_remaining;
 +	int64_t			 entry_unconsumed;
 +	int64_t			 entry_compressed_bytes_read;
 +	int64_t			 entry_uncompressed_bytes_read;
 +	struct cffolder		*entry_cffolder;
 +	struct cffile		*entry_cffile;
 +	struct cfdata		*entry_cfdata;
 +
 +	/* Offset from beginning of a cabinet file. */
 +	int64_t			 cab_offset;
 +	struct cfheader		 cfheader;
 +	struct archive_wstring	 ws;
 +
 +	/* Flag to mark progress that an archive was read their first header.*/
 +	char			 found_header;
 +	char			 end_of_archive;
 +	char			 end_of_entry;
 +	char			 end_of_entry_cleanup;
 +	char			 read_data_invoked;
 +	int64_t			 bytes_skipped;
 +
 +	unsigned char		*uncompressed_buffer;
 +	size_t			 uncompressed_buffer_size;
 +
 +	int			 init_default_conversion;
 +	struct archive_string_conv *sconv;
 +	struct archive_string_conv *sconv_default;
 +	struct archive_string_conv *sconv_utf8;
 +	char			 format_name[64];
 +
 +#ifdef HAVE_ZLIB_H
 +	z_stream		 stream;
 +	char			 stream_valid;
 +#endif
 +	struct lzx_stream	 xstrm;
 +};
 +
 +static int	archive_read_format_cab_bid(struct archive_read *, int);
 +static int	archive_read_format_cab_options(struct archive_read *,
 +		    const char *, const char *);
 +static int	archive_read_format_cab_read_header(struct archive_read *,
 +		    struct archive_entry *);
 +static int	archive_read_format_cab_read_data(struct archive_read *,
 +		    const void **, size_t *, int64_t *);
 +static int	archive_read_format_cab_read_data_skip(struct archive_read *);
 +static int	archive_read_format_cab_cleanup(struct archive_read *);
 +
 +static int	cab_skip_sfx(struct archive_read *);
 +static time_t	cab_dos_time(const unsigned char *);
 +static int	cab_read_data(struct archive_read *, const void **,
 +		    size_t *, int64_t *);
 +static int	cab_read_header(struct archive_read *);
 +static uint32_t cab_checksum_cfdata_4(const void *, size_t bytes, uint32_t);
 +static uint32_t cab_checksum_cfdata(const void *, size_t bytes, uint32_t);
 +static void	cab_checksum_update(struct archive_read *, size_t);
 +static int	cab_checksum_finish(struct archive_read *);
 +static int	cab_next_cfdata(struct archive_read *);
 +static const void *cab_read_ahead_cfdata(struct archive_read *, ssize_t *);
 +static const void *cab_read_ahead_cfdata_none(struct archive_read *, ssize_t *);
 +static const void *cab_read_ahead_cfdata_deflate(struct archive_read *,
 +		    ssize_t *);
 +static const void *cab_read_ahead_cfdata_lzx(struct archive_read *,
 +		    ssize_t *);
 +static int64_t	cab_consume_cfdata(struct archive_read *, int64_t);
 +static int64_t	cab_minimum_consume_cfdata(struct archive_read *, int64_t);
 +static int	lzx_decode_init(struct lzx_stream *, int);
 +static int	lzx_read_blocks(struct lzx_stream *, int);
 +static int	lzx_decode_blocks(struct lzx_stream *, int);
 +static void	lzx_decode_free(struct lzx_stream *);
 +static void	lzx_translation(struct lzx_stream *, void *, size_t, uint32_t);
 +static void	lzx_cleanup_bitstream(struct lzx_stream *);
 +static int	lzx_decode(struct lzx_stream *, int);
 +static int	lzx_read_pre_tree(struct lzx_stream *);
 +static int	lzx_read_bitlen(struct lzx_stream *, struct huffman *, int);
 +static int	lzx_huffman_init(struct huffman *, size_t, int);
 +static void	lzx_huffman_free(struct huffman *);
 +static int	lzx_make_huffman_table(struct huffman *);
 +static inline int lzx_decode_huffman(struct huffman *, unsigned);
 +static int	lzx_decode_huffman_tree(struct huffman *, unsigned, int);
 +
 +
 +int
 +archive_read_support_format_cab(struct archive *_a)
 +{
 +	struct archive_read *a = (struct archive_read *)_a;
 +	struct cab *cab;
 +	int r;
 +
 +	archive_check_magic(_a, ARCHIVE_READ_MAGIC,
 +	    ARCHIVE_STATE_NEW, "archive_read_support_format_cab");
 +
 +	cab = (struct cab *)calloc(1, sizeof(*cab));
 +	if (cab == NULL) {
 +		archive_set_error(&a->archive, ENOMEM,
 +		    "Can't allocate CAB data");
 +		return (ARCHIVE_FATAL);
 +	}
 +	archive_string_init(&cab->ws);
 +	archive_wstring_ensure(&cab->ws, 256);
 +
 +	r = __archive_read_register_format(a,
 +	    cab,
 +	    "cab",
 +	    archive_read_format_cab_bid,
 +	    archive_read_format_cab_options,
 +	    archive_read_format_cab_read_header,
 +	    archive_read_format_cab_read_data,
 +	    archive_read_format_cab_read_data_skip,
 +	    NULL,
 +	    archive_read_format_cab_cleanup,
 +	    NULL,
 +	    NULL);
 +
 +	if (r != ARCHIVE_OK)
 +		free(cab);
 +	return (ARCHIVE_OK);
 +}
 +
 +static int
 +find_cab_magic(const char *p)
 +{
 +	switch (p[4]) {
 +	case 0:
 +		/*
 +		 * Note: Self-Extraction program has 'MSCF' string in their
 +		 * program. If we were finding 'MSCF' string only, we got
 +		 * wrong place for Cabinet header, thus, we have to check
 +		 * following four bytes which are reserved and must be set
 +		 * to zero.
 +		 */
 +		if (memcmp(p, "MSCF\0\0\0\0", 8) == 0)
 +			return 0;
 +		return 5;
 +	case 'F': return 1;
 +	case 'C': return 2;
 +	case 'S': return 3;
 +	case 'M': return 4;
 +	default:  return 5;
 +	}
 +}
 +
 +static int
 +archive_read_format_cab_bid(struct archive_read *a, int best_bid)
 +{
 +	const char *p;
 +	ssize_t bytes_avail, offset, window;
 +
 +	/* If there's already a better bid than we can ever
 +	   make, don't bother testing. */
 +	if (best_bid > 64)
 +		return (-1);
 +
 +	if ((p = __archive_read_ahead(a, 8, NULL)) == NULL)
 +		return (-1);
 +
 +	if (memcmp(p, "MSCF\0\0\0\0", 8) == 0)
 +		return (64);
 +
 +	/*
 +	 * Attempt to handle self-extracting archives
 +	 * by noting a PE header and searching forward
 +	 * up to 128k for a 'MSCF' marker.
 +	 */
 +	if (p[0] == 'M' && p[1] == 'Z') {
 +		offset = 0;
 +		window = 4096;
 +		while (offset < (1024 * 128)) {
 +			const char *h = __archive_read_ahead(a, offset + window,
 +			    &bytes_avail);
 +			if (h == NULL) {
 +				/* Remaining bytes are less than window. */
 +				window >>= 1;
 +				if (window < 128)
 +					return (0);
 +				continue;
 +			}
 +			p = h + offset;
 +			while (p + 8 < h + bytes_avail) {
 +				int next;
 +				if ((next = find_cab_magic(p)) == 0)
 +					return (64);
 +				p += next;
 +			}
 +			offset = p - h;
 +		}
 +	}
 +	return (0);
 +}
 +
 +static int
 +archive_read_format_cab_options(struct archive_read *a,
 +    const char *key, const char *val)
 +{
 +	struct cab *cab;
 +	int ret = ARCHIVE_FAILED;
 +
 +	cab = (struct cab *)(a->format->data);
 +	if (strcmp(key, "hdrcharset")  == 0) {
 +		if (val == NULL || val[0] == 0)
 +			archive_set_error(&a->archive, ARCHIVE_ERRNO_MISC,
 +			    "cab: hdrcharset option needs a character-set name");
 +		else {
 +			cab->sconv = archive_string_conversion_from_charset(
 +			    &a->archive, val, 0);
 +			if (cab->sconv != NULL)
 +				ret = ARCHIVE_OK;
 +			else
 +				ret = ARCHIVE_FATAL;
 +		}
 +		return (ret);
 +	}
 +
 +	/* Note: The "warn" return is just to inform the options
 +	 * supervisor that we didn't handle it.  It will generate
 +	 * a suitable error if no one used this option. */
 +	return (ARCHIVE_WARN);
 +}
 +
 +static int
 +cab_skip_sfx(struct archive_read *a)
 +{
 +	const char *p, *q;
 +	size_t skip;
 +	ssize_t bytes, window;
 +
 +	window = 4096;
 +	for (;;) {
 +		const char *h = __archive_read_ahead(a, window, &bytes);
 +		if (h == NULL) {
 +			/* Remaining size are less than window. */
 +			window >>= 1;
 +			if (window < 128) {
 +				archive_set_error(&a->archive,
 +				    ARCHIVE_ERRNO_FILE_FORMAT,
 +				    "Couldn't find out CAB header");
 +				return (ARCHIVE_FATAL);
 +			}
 +			continue;
 +		}
 +		p = h;
 +		q = p + bytes;
 +
 +		/*
 +		 * Scan ahead until we find something that looks
 +		 * like the cab header.
 +		 */
 +		while (p + 8 < q) {
 +			int next;
 +			if ((next = find_cab_magic(p)) == 0) {
 +				skip = p - h;
 +				__archive_read_consume(a, skip);
 +				return (ARCHIVE_OK);
 +			}
 +			p += next;
 +		}
 +		skip = p - h;
 +		__archive_read_consume(a, skip);
 +	}
 +}
 +
 +static int
 +truncated_error(struct archive_read *a)
 +{
 +	archive_set_error(&a->archive, ARCHIVE_ERRNO_FILE_FORMAT,
 +	    "Truncated CAB header");
 +	return (ARCHIVE_FATAL);
 +}
 +
 +static ssize_t
 +cab_strnlen(const unsigned char *p, size_t maxlen)
 +{
 +	size_t i;
 +
 +	for (i = 0; i <= maxlen; i++) {
 +		if (p[i] == 0)
 +			break;
 +	}
 +	if (i > maxlen)
 +		return (-1);/* invalid */
 +	return ((ssize_t)i);
 +}
 +
 +/* Read bytes as much as remaining. */
 +static const void *
 +cab_read_ahead_remaining(struct archive_read *a, size_t min, ssize_t *avail)
 +{
 +	const void *p;
 +
 +	while (min > 0) {
 +		p = __archive_read_ahead(a, min, avail);
 +		if (p != NULL)
 +			return (p);
 +		min--;
 +	}
 +	return (NULL);
 +}
 +
 +/* Convert a path separator '\' -> '/' */
 +static int
 +cab_convert_path_separator_1(struct archive_string *fn, unsigned char attr)
 +{
 +	size_t i;
 +	int mb;
 +
 +	/* Easy check if we have '\' in multi-byte string. */
 +	mb = 0;
 +	for (i = 0; i < archive_strlen(fn); i++) {
 +		if (fn->s[i] == '\\') {
 +			if (mb) {
 +				/* This may be second byte of multi-byte
 +				 * character. */
 +				break;
 +			}
 +			fn->s[i] = '/';
 +			mb = 0;
 +		} else if ((fn->s[i] & 0x80) && !(attr & ATTR_NAME_IS_UTF))
 +			mb = 1;
 +		else
 +			mb = 0;
 +	}
 +	if (i == archive_strlen(fn))
 +		return (0);
 +	return (-1);
 +}
 +
 +/*
 + * Replace a character '\' with '/' in wide character.
 + */
 +static void
 +cab_convert_path_separator_2(struct cab *cab, struct archive_entry *entry)
 +{
 +	const wchar_t *wp;
 +	size_t i;
 +
 +	/* If a conversion to wide character failed, force the replacement. */
 +	if ((wp = archive_entry_pathname_w(entry)) != NULL) {
 +		archive_wstrcpy(&(cab->ws), wp);
 +		for (i = 0; i < archive_strlen(&(cab->ws)); i++) {
 +			if (cab->ws.s[i] == L'\\')
 +				cab->ws.s[i] = L'/';
 +		}
 +		archive_entry_copy_pathname_w(entry, cab->ws.s);
 +	}
 +}
 +
 +/*
 + * Read CFHEADER, CFFOLDER and CFFILE.
 + */
 +static int
 +cab_read_header(struct archive_read *a)
 +{
 +	const unsigned char *p;
 +	struct cab *cab;
 +	struct cfheader *hd;
 +	size_t bytes, used;
 +	ssize_t len;
 +	int64_t skip;
 +	int err, i;
 +	int cur_folder, prev_folder;
 +	uint32_t offset32;
 +	
 +	a->archive.archive_format = ARCHIVE_FORMAT_CAB;
 +	if (a->archive.archive_format_name == NULL)
 +		a->archive.archive_format_name = "CAB";
 +
 +	if ((p = __archive_read_ahead(a, 42, NULL)) == NULL)
 +		return (truncated_error(a));
 +
 +	cab = (struct cab *)(a->format->data);
 +	if (cab->found_header == 0 &&
 +	    p[0] == 'M' && p[1] == 'Z') {
- 		/* This is an executable?  Must be self-extracting... 	*/
++		/* This is an executable?  Must be self-extracting... */
 +		err = cab_skip_sfx(a);
 +		if (err < ARCHIVE_WARN)
 +			return (err);
 +
- 		if ((p = __archive_read_ahead(a, sizeof(*p), NULL)) == NULL)
++		/* Re-read header after processing the SFX. */
++		if ((p = __archive_read_ahead(a, 42, NULL)) == NULL)
 +			return (truncated_error(a));
 +	}
 +
 +	cab->cab_offset = 0;
 +	/*
 +	 * Read CFHEADER.
 +	 */
 +	hd = &cab->cfheader;
 +	if (p[CFHEADER_signature+0] != 'M' || p[CFHEADER_signature+1] != 'S' ||
 +	    p[CFHEADER_signature+2] != 'C' || p[CFHEADER_signature+3] != 'F') {
 +		archive_set_error(&a->archive, ARCHIVE_ERRNO_FILE_FORMAT,
 +		    "Couldn't find out CAB header");
 +		return (ARCHIVE_FATAL);
 +	}
 +	hd->total_bytes = archive_le32dec(p + CFHEADER_cbCabinet);
 +	hd->files_offset = archive_le32dec(p + CFHEADER_coffFiles);
 +	hd->minor = p[CFHEADER_versionMinor];
 +	hd->major = p[CFHEADER_versionMajor];
 +	hd->folder_count = archive_le16dec(p + CFHEADER_cFolders);
 +	if (hd->folder_count == 0)
 +		goto invalid;
 +	hd->file_count = archive_le16dec(p + CFHEADER_cFiles);
 +	if (hd->file_count == 0)
 +		goto invalid;
 +	hd->flags = archive_le16dec(p + CFHEADER_flags);
 +	hd->setid = archive_le16dec(p + CFHEADER_setID);
 +	hd->cabinet = archive_le16dec(p + CFHEADER_iCabinet);
 +	used = CFHEADER_iCabinet + 2;
 +	if (hd->flags & RESERVE_PRESENT) {
 +		uint16_t cfheader;
 +		cfheader = archive_le16dec(p + CFHEADER_cbCFHeader);
 +		if (cfheader > 60000U)
 +			goto invalid;
 +		hd->cffolder = p[CFHEADER_cbCFFolder];
 +		hd->cfdata = p[CFHEADER_cbCFData];
 +		used += 4;/* cbCFHeader, cbCFFolder and cbCFData */
 +		used += cfheader;/* abReserve */
 +	} else
 +		hd->cffolder = 0;/* Avoid compiling warning. */
 +	if (hd->flags & PREV_CABINET) {
 +		/* How many bytes are used for szCabinetPrev. */
 +		if ((p = __archive_read_ahead(a, used+256, NULL)) == NULL)
 +			return (truncated_error(a));
 +		if ((len = cab_strnlen(p + used, 255)) <= 0)
 +			goto invalid;
 +		used += len + 1;
 +		/* How many bytes are used for szDiskPrev. */
 +		if ((p = __archive_read_ahead(a, used+256, NULL)) == NULL)
 +			return (truncated_error(a));
 +		if ((len = cab_strnlen(p + used, 255)) <= 0)
 +			goto invalid;
 +		used += len + 1;
 +	}
 +	if (hd->flags & NEXT_CABINET) {
 +		/* How many bytes are used for szCabinetNext. */
 +		if ((p = __archive_read_ahead(a, used+256, NULL)) == NULL)
 +			return (truncated_error(a));
 +		if ((len = cab_strnlen(p + used, 255)) <= 0)
 +			goto invalid;
 +		used += len + 1;
 +		/* How many bytes are used for szDiskNext. */
 +		if ((p = __archive_read_ahead(a, used+256, NULL)) == NULL)
 +			return (truncated_error(a));
 +		if ((len = cab_strnlen(p + used, 255)) <= 0)
 +			goto invalid;
 +		used += len + 1;
 +	}
 +	__archive_read_consume(a, used);
 +	cab->cab_offset += used;
 +	used = 0;
 +
 +	/*
 +	 * Read CFFOLDER.
 +	 */
 +	hd->folder_array = (struct cffolder *)calloc(
 +	    hd->folder_count, sizeof(struct cffolder));
 +	if (hd->folder_array == NULL)
 +		goto nomem;
 +	
 +	bytes = 8;
 +	if (hd->flags & RESERVE_PRESENT)
 +		bytes += hd->cffolder;
 +	bytes *= hd->folder_count;
 +	if ((p = __archive_read_ahead(a, bytes, NULL)) == NULL)
 +		return (truncated_error(a));
 +	offset32 = 0;
 +	for (i = 0; i < hd->folder_count; i++) {
 +		struct cffolder *folder = &(hd->folder_array[i]);
 +		folder->cfdata_offset_in_cab =
 +		    archive_le32dec(p + CFFOLDER_coffCabStart);
 +		folder->cfdata_count = archive_le16dec(p+CFFOLDER_cCFData);
 +		folder->comptype =
 +		    archive_le16dec(p+CFFOLDER_typeCompress) & 0x0F;
 +		folder->compdata =
 +		    archive_le16dec(p+CFFOLDER_typeCompress) >> 8;
 +		/* Get a compression name. */
 +		if (folder->comptype <
 +		    sizeof(compression_name) / sizeof(compression_name[0]))
 +			folder->compname = compression_name[folder->comptype];
 +		else
 +			folder->compname = "UNKNOWN";
 +		p += 8;
 +		used += 8;
 +		if (hd->flags & RESERVE_PRESENT) {
 +			p += hd->cffolder;/* abReserve */
 +			used += hd->cffolder;
 +		}
 +		/*
 +		 * Sanity check if each data is acceptable.
 +		 */
 +		if (offset32 >= folder->cfdata_offset_in_cab)
 +			goto invalid;
 +		offset32 = folder->cfdata_offset_in_cab;
 +
 +		/* Set a request to initialize zlib for the CFDATA of
 +		 * this folder. */
 +		folder->decompress_init = 0;
 +	}
 +	__archive_read_consume(a, used);
 +	cab->cab_offset += used;
 +
 +	/*
 +	 * Read CFFILE.
 +	 */
 +	/* Seek read pointer to the offset of CFFILE if needed. */
 +	skip = (int64_t)hd->files_offset - cab->cab_offset;
 +	if (skip <  0) {
 +		archive_set_error(&a->archive, ARCHIVE_ERRNO_MISC,
 +		    "Invalid offset of CFFILE %jd < %jd",
 +		    (intmax_t)hd->files_offset, (intmax_t)cab->cab_offset);
 +		return (ARCHIVE_FATAL);
 +	}
 +	if (skip) {
 +		__archive_read_consume(a, skip);
 +		cab->cab_offset += skip;
 +	}
 +	/* Allocate memory for CFDATA */
 +	hd->file_array = (struct cffile *)calloc(
 +	    hd->file_count, sizeof(struct cffile));
 +	if (hd->file_array == NULL)
 +		goto nomem;
 +
 +	prev_folder = -1;
 +	for (i = 0; i < hd->file_count; i++) {
 +		struct cffile *file = &(hd->file_array[i]);
 +		ssize_t avail;
 +
 +		if ((p = __archive_read_ahead(a, 16, NULL)) == NULL)
 +			return (truncated_error(a));
 +		file->uncompressed_size = archive_le32dec(p + CFFILE_cbFile);
 +		file->offset = archive_le32dec(p + CFFILE_uoffFolderStart);
 +		file->folder = archive_le16dec(p + CFFILE_iFolder);
 +		file->mtime = cab_dos_time(p + CFFILE_date_time);
 +		file->attr = (uint8_t)archive_le16dec(p + CFFILE_attribs);
 +		__archive_read_consume(a, 16);
 +
 +		cab->cab_offset += 16;
 +		if ((p = cab_read_ahead_remaining(a, 256, &avail)) == NULL)
 +			return (truncated_error(a));
 +		if ((len = cab_strnlen(p, avail-1)) <= 0)
 +			goto invalid;
 +
 +		/* Copy a pathname.  */
 +		archive_string_init(&(file->pathname));
 +		archive_strncpy(&(file->pathname), p, len);
 +		__archive_read_consume(a, len + 1);
 +		cab->cab_offset += len + 1;
 +
 +		/*
 +		 * Sanity check if each data is acceptable.
 +		 */
 +		if (file->uncompressed_size > 0x7FFF8000)
 +			goto invalid;/* Too large */
 +		if ((int64_t)file->offset + (int64_t)file->uncompressed_size
 +		    > ARCHIVE_LITERAL_LL(0x7FFF8000))
 +			goto invalid;/* Too large */
 +		switch (file->folder) {
 +		case iFoldCONTINUED_TO_NEXT:
 +			/* This must be last file in a folder. */
 +			if (i != hd->file_count -1)
 +				goto invalid;
 +			cur_folder = hd->folder_count -1;
 +			break;
 +		case iFoldCONTINUED_PREV_AND_NEXT:
 +			/* This must be only one file in a folder. */
 +			if (hd->file_count != 1)
 +				goto invalid;
 +			/* FALL THROUGH */
 +		case iFoldCONTINUED_FROM_PREV:
 +			/* This must be first file in a folder. */
 +			if (i != 0)
 +				goto invalid;
 +			prev_folder = cur_folder = 0;
 +			offset32 = file->offset;
 +			break;
 +		default:
 +			if (file->folder >= hd->folder_count)
 +				goto invalid;
 +			cur_folder = file->folder;
 +			break;
 +		}
 +		/* Dot not back track. */
 +		if (cur_folder < prev_folder)
 +			goto invalid;
 +		if (cur_folder != prev_folder)
 +			offset32 = 0;
 +		prev_folder = cur_folder;
 +
 +		/* Make sure there are not any blanks from last file
 +		 * contents. */
 +		if (offset32 != file->offset)
 +			goto invalid;
 +		offset32 += file->uncompressed_size;
 +
 +		/* CFDATA is available for file contents. */
 +		if (file->uncompressed_size > 0 &&
 +		    hd->folder_array[cur_folder].cfdata_count == 0)
 +			goto invalid;
 +	}
 +
 +	if (hd->cabinet != 0 || hd->flags & (PREV_CABINET | NEXT_CABINET)) {
 +		archive_set_error(&a->archive, ARCHIVE_ERRNO_FILE_FORMAT,
 +		    "Multivolume cabinet file is unsupported");
 +		return (ARCHIVE_WARN);
 +	}
 +	return (ARCHIVE_OK);
 +invalid:
 +	archive_set_error(&a->archive, ARCHIVE_ERRNO_FILE_FORMAT,
 +	    "Invalid CAB header");
 +	return (ARCHIVE_FATAL);
 +nomem:
 +	archive_set_error(&a->archive, ENOMEM,
 +	    "Can't allocate memory for CAB data");
 +	return (ARCHIVE_FATAL);
 +}
 +
 +static int
 +archive_read_format_cab_read_header(struct archive_read *a,
 +    struct archive_entry *entry)
 +{
 +	struct cab *cab;
 +	struct cfheader *hd;
 +	struct cffolder *prev_folder;
 +	struct cffile *file;
 +	struct archive_string_conv *sconv;
 +	int err = ARCHIVE_OK, r;
 +	
 +	cab = (struct cab *)(a->format->data);
 +	if (cab->found_header == 0) {
 +		err = cab_read_header(a); 
 +		if (err < ARCHIVE_WARN)
 +			return (err);
 +		/* We've found the header. */
 +		cab->found_header = 1;
 +	}
 +	hd = &cab->cfheader;
 +
 +	if (hd->file_index >= hd->file_count) {
 +		cab->end_of_archive = 1;
 +		return (ARCHIVE_EOF);
 +	}
 +	file = &hd->file_array[hd->file_index++];
 +
 +	cab->end_of_entry = 0;
 +	cab->end_of_entry_cleanup = 0;
 +	cab->entry_compressed_bytes_read = 0;
 +	cab->entry_uncompressed_bytes_read = 0;
 +	cab->entry_unconsumed = 0;
 +	cab->entry_cffile = file;
 +
 +	/*
 +	 * Choose a proper folder.
 +	 */
 +	prev_folder = cab->entry_cffolder;
 +	switch (file->folder) {
 +	case iFoldCONTINUED_FROM_PREV:
 +	case iFoldCONTINUED_PREV_AND_NEXT:
 +		cab->entry_cffolder = &hd->folder_array[0];
 +		break;
 +	case iFoldCONTINUED_TO_NEXT:
 +		cab->entry_cffolder = &hd->folder_array[hd->folder_count-1];
 +		break;
 +	default:
 +		cab->entry_cffolder = &hd->folder_array[file->folder];
 +		break;
 +	}
 +	/* If a cffolder of this file is changed, reset a cfdata to read
 +	 * file contents from next cfdata. */
 +	if (prev_folder != cab->entry_cffolder)
 +		cab->entry_cfdata = NULL;
 +
 +	/* If a pathname is UTF-8, prepare a string conversion object
 +	 * for UTF-8 and use it. */
 +	if (file->attr & ATTR_NAME_IS_UTF) {
 +		if (cab->sconv_utf8 == NULL) {
 +			cab->sconv_utf8 =
 +			    archive_string_conversion_from_charset(
 +				&(a->archive), "UTF-8", 1);
 +			if (cab->sconv_utf8 == NULL)
 +				return (ARCHIVE_FATAL);
 +		}
 +		sconv = cab->sconv_utf8;
 +	} else if (cab->sconv != NULL) {
 +		/* Choose the conversion specified by the option. */
 +		sconv = cab->sconv;
 +	} else {
 +		/* Choose the default conversion. */
 +		if (!cab->init_default_conversion) {
 +			cab->sconv_default =
 +			    archive_string_default_conversion_for_read(
 +			      &(a->archive));
 +			cab->init_default_conversion = 1;
 +		}
 +		sconv = cab->sconv_default;
 +	}
 +
 +	/*
 +	 * Set a default value and common data
 +	 */
 +	r = cab_convert_path_separator_1(&(file->pathname), file->attr);
 +	if (archive_entry_copy_pathname_l(entry, file->pathname.s,
 +	    archive_strlen(&(file->pathname)), sconv) != 0) {
 +		if (errno == ENOMEM) {
 +			archive_set_error(&a->archive, ENOMEM,
 +			    "Can't allocate memory for Pathname");
 +			return (ARCHIVE_FATAL);
 +		}
 +		archive_set_error(&a->archive,
 +		    ARCHIVE_ERRNO_FILE_FORMAT,
 +		    "Pathname cannot be converted "
 +		    "from %s to current locale.",
 +		    archive_string_conversion_charset_name(sconv));
 +		err = ARCHIVE_WARN;
 +	}
 +	if (r < 0) {
 +		/* Convert a path separator '\' -> '/' */
 +		cab_convert_path_separator_2(cab, entry);
 +	}
 +
 +	archive_entry_set_size(entry, file->uncompressed_size);
 +	if (file->attr & ATTR_RDONLY)
 +		archive_entry_set_mode(entry, AE_IFREG | 0555);
 +	else
 +		archive_entry_set_mode(entry, AE_IFREG | 0666);
 +	archive_entry_set_mtime(entry, file->mtime, 0);
 +
 +	cab->entry_bytes_remaining = file->uncompressed_size;
 +	cab->entry_offset = 0;
 +	/* We don't need compress data. */
 +	if (file->uncompressed_size == 0)
 +		cab->end_of_entry_cleanup = cab->end_of_entry = 1;
 +
 +	/* Set up a more descriptive format name. */
 +	sprintf(cab->format_name, "CAB %d.%d (%s)",
 +	    hd->major, hd->minor, cab->entry_cffolder->compname);
 +	a->archive.archive_format_name = cab->format_name;
 +
 +	return (err);
 +}
 +
 +static int
 +archive_read_format_cab_read_data(struct archive_read *a,
 +    const void **buff, size_t *size, int64_t *offset)
 +{
 +	struct cab *cab = (struct cab *)(a->format->data);
 +	int r;
 +
 +	switch (cab->entry_cffile->folder) {
 +	case iFoldCONTINUED_FROM_PREV:
 +	case iFoldCONTINUED_TO_NEXT:
 +	case iFoldCONTINUED_PREV_AND_NEXT:
 +		*buff = NULL;
 +		*size = 0;
 +		*offset = 0;
 +		archive_clear_error(&a->archive);
 +		archive_set_error(&a->archive, ARCHIVE_ERRNO_FILE_FORMAT,
 +		    "Cannot restore this file split in multivolume.");
 +		return (ARCHIVE_FAILED);
 +	default:
 +		break;
 +	}
 +	if (cab->read_data_invoked == 0) {
 +		if (cab->bytes_skipped) {
 +			if (cab->entry_cfdata == NULL) {
 +				r = cab_next_cfdata(a);
 +				if (r < 0)
 +					return (r);
 +			}
 +			if (cab_consume_cfdata(a, cab->bytes_skipped) < 0)
 +				return (ARCHIVE_FATAL);
 +			cab->bytes_skipped = 0;
 +		}
 +		cab->read_data_invoked = 1;
 +	}
 +	if (cab->entry_unconsumed) {
 +		/* Consume as much as the compressor actually used. */
 +		r = (int)cab_consume_cfdata(a, cab->entry_unconsumed);
 +		cab->entry_unconsumed = 0;
 +		if (r < 0)
 +			return (r);
 +	}
 +	if (cab->end_of_archive || cab->end_of_entry) {
 +		if (!cab->end_of_entry_cleanup) {
 +			/* End-of-entry cleanup done. */
 +			cab->end_of_entry_cleanup = 1;
 +		}
 +		*offset = cab->entry_offset;
 +		*size = 0;
 +		*buff = NULL;
 +		return (ARCHIVE_EOF);
 +	}
 +
 +	return (cab_read_data(a, buff, size, offset));
 +}
 +
 +static uint32_t
 +cab_checksum_cfdata_4(const void *p, size_t bytes, uint32_t seed)
 +{
 +	const unsigned char *b;
 +	unsigned u32num;
 +	uint32_t sum;
 +
 +	u32num = (unsigned)bytes / 4;
 +	sum = seed;
 +	b = p;
 +	for (;u32num > 0; --u32num) {
 +		sum ^= archive_le32dec(b);
 +		b += 4;
 +	}
 +	return (sum);
 +}
 +
 +static uint32_t
 +cab_checksum_cfdata(const void *p, size_t bytes, uint32_t seed)
 +{
 +	const unsigned char *b;
 +	uint32_t sum;
 +	uint32_t t;
 +
 +	sum = cab_checksum_cfdata_4(p, bytes, seed);
 +	b = p;
 +	b += bytes & ~3;
 +	t = 0;
 +	switch (bytes & 3) {
 +	case 3:
 +		t |= ((uint32_t)(*b++)) << 16;
 +		/* FALL THROUGH */
 +	case 2:
 +		t |= ((uint32_t)(*b++)) << 8;
 +		/* FALL THROUGH */
 +	case 1:
 +		t |= *b;
 +		/* FALL THROUGH */
 +	default:
 +		break;
 +	}
 +	sum ^= t;
 +
 +	return (sum);
 +}
 +
 +static void
 +cab_checksum_update(struct archive_read *a, size_t bytes)
 +{
 +	struct cab *cab = (struct cab *)(a->format->data);
 +	struct cfdata *cfdata = cab->entry_cfdata;
 +	const unsigned char *p;
 +	size_t sumbytes;
 +
 +	if (cfdata->sum == 0 || cfdata->sum_ptr == NULL)
 +		return;
 +	/*
 +	 * Calculate the sum of this CFDATA.
 +	 * Make sure CFDATA must be calculated in four bytes.
 +	 */
 +	p = cfdata->sum_ptr;
 +	sumbytes = bytes;
 +	if (cfdata->sum_extra_avail) {
 +		while (cfdata->sum_extra_avail < 4 && sumbytes > 0) {
 +			cfdata->sum_extra[
 +			    cfdata->sum_extra_avail++] = *p++;
 +			sumbytes--;
 +		}
 +		if (cfdata->sum_extra_avail == 4) {
 +			cfdata->sum_calculated = cab_checksum_cfdata_4(
 +			    cfdata->sum_extra, 4, cfdata->sum_calculated);
 +			cfdata->sum_extra_avail = 0;
 +		}
 +	}
 +	if (sumbytes) {
 +		int odd = sumbytes & 3;
 +		if (sumbytes - odd > 0)
 +			cfdata->sum_calculated = cab_checksum_cfdata_4(
 +			    p, sumbytes - odd, cfdata->sum_calculated);
 +		if (odd)
 +			memcpy(cfdata->sum_extra, p + sumbytes - odd, odd);
 +		cfdata->sum_extra_avail = odd;
 +	}
 +	cfdata->sum_ptr = NULL;
 +}
 +
 +static int
 +cab_checksum_finish(struct archive_read *a)
 +{
 +	struct cab *cab = (struct cab *)(a->format->data);
 +	struct cfdata *cfdata = cab->entry_cfdata;
 +	int l;
 +
 +	/* Do not need to compute a sum. */
 +	if (cfdata->sum == 0)
 +		return (ARCHIVE_OK);
 +
 +	/*
 +	 * Calculate the sum of remaining CFDATA.
 +	 */
 +	if (cfdata->sum_extra_avail) {
 +		cfdata->sum_calculated =
 +		    cab_checksum_cfdata(cfdata->sum_extra,
 +		       cfdata->sum_extra_avail, cfdata->sum_calculated);
 +		cfdata->sum_extra_avail = 0;
 +	}
 +
 +	l = 4;
 +	if (cab->cfheader.flags & RESERVE_PRESENT)
 +		l += cab->cfheader.cfdata;
 +	cfdata->sum_calculated = cab_checksum_cfdata(
 +	    cfdata->memimage + CFDATA_cbData, l, cfdata->sum_calculated);
 +	if (cfdata->sum_calculated != cfdata->sum) {
 +		archive_set_error(&a->archive, ARCHIVE_ERRNO_FILE_FORMAT,
 +		    "Checksum error CFDATA[%d] %x:%x in %d bytes",
 +		    cab->entry_cffolder->cfdata_index -1,
 +		    cfdata->sum, cfdata->sum_calculated,
 +		    cfdata->compressed_size);
 +		return (ARCHIVE_FAILED);
 +	}
 +	return (ARCHIVE_OK);
 +}
 +
 +/*
 + * Read CFDATA if needed.
 + */
 +static int
 +cab_next_cfdata(struct archive_read *a)
 +{
 +	struct cab *cab = (struct cab *)(a->format->data);
 +	struct cfdata *cfdata = cab->entry_cfdata;
 +
 +	/* There are remaining bytes in current CFDATA, use it first. */
 +	if (cfdata != NULL && cfdata->uncompressed_bytes_remaining > 0)
 +		return (ARCHIVE_OK);
 +
 +	if (cfdata == NULL) {
 +		int64_t skip;
 +
 +		cab->entry_cffolder->cfdata_index = 0;
 +
 +		/* Seek read pointer to the offset of CFDATA if needed. */
 +		skip = cab->entry_cffolder->cfdata_offset_in_cab
 +			- cab->cab_offset;
 +		if (skip < 0) {
 +			int folder_index;
 +			switch (cab->entry_cffile->folder) {
 +			case iFoldCONTINUED_FROM_PREV:
 +			case iFoldCONTINUED_PREV_AND_NEXT:
 +				folder_index = 0;
 +				break;
 +			case iFoldCONTINUED_TO_NEXT:
 +				folder_index = cab->cfheader.folder_count-1;
 +				break;
 +			default:
 +				folder_index = cab->entry_cffile->folder;
 +				break;
 +			}
 +			archive_set_error(&a->archive, ARCHIVE_ERRNO_MISC,
 +			    "Invalid offset of CFDATA in folder(%d) %jd < %jd",
 +			    folder_index,
 +			    (intmax_t)cab->entry_cffolder->cfdata_offset_in_cab,
 +			    (intmax_t)cab->cab_offset);
 +			return (ARCHIVE_FATAL);
 +		}
 +		if (skip > 0) {
 +			if (__archive_read_consume(a, skip) < 0)
 +				return (ARCHIVE_FATAL);
 +			cab->cab_offset =
 +			    cab->entry_cffolder->cfdata_offset_in_cab;
 +		}
 +	}
 +
 +	/*
 +	 * Read a CFDATA.
 +	 */
 +	if (cab->entry_cffolder->cfdata_index <
 +	    cab->entry_cffolder->cfdata_count) {
 +		const unsigned char *p;
 +		int l;
 +
 +		cfdata = &(cab->entry_cffolder->cfdata);
 +		cab->entry_cffolder->cfdata_index++;
 +		cab->entry_cfdata = cfdata;
 +		cfdata->sum_calculated = 0;
 +		cfdata->sum_extra_avail = 0;
 +		cfdata->sum_ptr = NULL;
 +		l = 8;
 +		if (cab->cfheader.flags & RESERVE_PRESENT)
 +			l += cab->cfheader.cfdata;
 +		if ((p = __archive_read_ahead(a, l, NULL)) == NULL)
 +			return (truncated_error(a));
 +		cfdata->sum = archive_le32dec(p + CFDATA_csum);
 +		cfdata->compressed_size = archive_le16dec(p + CFDATA_cbData);
 +		cfdata->compressed_bytes_remaining = cfdata->compressed_size;
 +		cfdata->uncompressed_size =
 +		    archive_le16dec(p + CFDATA_cbUncomp);
 +		cfdata->uncompressed_bytes_remaining =
 +		    cfdata->uncompressed_size;
 +		cfdata->uncompressed_avail = 0;
 +		cfdata->read_offset = 0;
 +		cfdata->unconsumed = 0;
 +
 +		/*
 +		 * Sanity check if data size is acceptable.
 +		 */
 +		if (cfdata->compressed_size == 0 ||
 +		    cfdata->compressed_size > (0x8000+6144))
 +			goto invalid;
 +		if (cfdata->uncompressed_size > 0x8000)
 +			goto invalid;
 +		if (cfdata->uncompressed_size == 0) {
 +			switch (cab->entry_cffile->folder) {
 +			case iFoldCONTINUED_PREV_AND_NEXT:
 +			case iFoldCONTINUED_TO_NEXT:
 +				break;
 +			case iFoldCONTINUED_FROM_PREV:
 +			default:
 +				goto invalid;
 +			}
 +		}
 +		/* If CFDATA is not last in a folder, an uncompressed
 +		 * size must be 0x8000(32KBi) */
 +		if ((cab->entry_cffolder->cfdata_index <
 +		     cab->entry_cffolder->cfdata_count) &&
 +		       cfdata->uncompressed_size != 0x8000)
 +			goto invalid;
 +
 +		/* A compressed data size and an uncompressed data size must
 +		 * be the same in no compression mode. */
 +		if (cab->entry_cffolder->comptype == COMPTYPE_NONE &&
 +		    cfdata->compressed_size != cfdata->uncompressed_size)
 +			goto invalid;
 +
 +		/*
 +		 * Save CFDATA image for sum check.
 +		 */
 +		if (cfdata->memimage_size < (size_t)l) {
 +			free(cfdata->memimage);
 +			cfdata->memimage = malloc(l);
 +			if (cfdata->memimage == NULL) {
 +				archive_set_error(&a->archive, ENOMEM,
 +				    "Can't allocate memory for CAB data");
 +				return (ARCHIVE_FATAL);
 +			}
 +			cfdata->memimage_size = l;
 +		}
 +		memcpy(cfdata->memimage, p, l);
 +
 +		/* Consume bytes as much as we used. */
 +		__archive_read_consume(a, l);
 +		cab->cab_offset += l;
 +	} else if (cab->entry_cffolder->cfdata_count > 0) {
 +		/* Run out of all CFDATA in a folder. */
 +		cfdata->compressed_size = 0;
 +		cfdata->uncompressed_size = 0;
 +		cfdata->compressed_bytes_remaining = 0;
 +		cfdata->uncompressed_bytes_remaining = 0;
 +	} else {
 +		/* Current folder does not have any CFDATA. */
 +		cfdata = &(cab->entry_cffolder->cfdata);
 +		cab->entry_cfdata = cfdata;
 +		memset(cfdata, 0, sizeof(*cfdata));
 +	}
 +	return (ARCHIVE_OK);
 +invalid:
 +	archive_set_error(&a->archive, ARCHIVE_ERRNO_FILE_FORMAT,
 +	    "Invalid CFDATA");
 +	return (ARCHIVE_FATAL);
 +}
 +
 +/*
 + * Read ahead CFDATA.
 + */
 +static const void *
 +cab_read_ahead_cfdata(struct archive_read *a, ssize_t *avail)
 +{
 +	struct cab *cab = (struct cab *)(a->format->data);
 +	int err;
 +
 +	err = cab_next_cfdata(a);
 +	if (err < ARCHIVE_OK) {
 +		*avail = err;
 +		return (NULL);
 +	}
 +
 +	switch (cab->entry_cffolder->comptype) {
 +	case COMPTYPE_NONE:
 +		return (cab_read_ahead_cfdata_none(a, avail));
 +	case COMPTYPE_MSZIP:
 +		return (cab_read_ahead_cfdata_deflate(a, avail));
 +	case COMPTYPE_LZX:
 +		return (cab_read_ahead_cfdata_lzx(a, avail));
 +	default: /* Unsupported compression. */
 +		archive_set_error(&a->archive, ARCHIVE_ERRNO_FILE_FORMAT,
 +		    "Unsupported CAB compression : %s",
 +		    cab->entry_cffolder->compname);
 +		*avail = ARCHIVE_FAILED;
 +		return (NULL);
 +	}
 +}
 +
 +/*
 + * Read ahead CFDATA as uncompressed data.
 + */
 +static const void *
 +cab_read_ahead_cfdata_none(struct archive_read *a, ssize_t *avail)
 +{
 +	struct cab *cab = (struct cab *)(a->format->data);
 +	struct cfdata *cfdata;
 +	const void *d;
 +
 +	cfdata = cab->entry_cfdata;
 +
 +	/*
 +	 * Note: '1' here is a performance optimization.
 +	 * Recall that the decompression layer returns a count of
 +	 * available bytes; asking for more than that forces the
 +	 * decompressor to combine reads by copying data.
 +	 */
 +	d = __archive_read_ahead(a, 1, avail);
 +	if (*avail <= 0) {
 +		*avail = truncated_error(a);
 +		return (NULL);
 +	}
 +	if (*avail > cfdata->uncompressed_bytes_remaining)
 +		*avail = cfdata->uncompressed_bytes_remaining;
 +	cfdata->uncompressed_avail = cfdata->uncompressed_size;
 +	cfdata->unconsumed = *avail;
 +	cfdata->sum_ptr = d;
 +	return (d);
 +}
 +
 +/*
 + * Read ahead CFDATA as deflate data.
 + */
 +#ifdef HAVE_ZLIB_H
 +static const void *
 +cab_read_ahead_cfdata_deflate(struct archive_read *a, ssize_t *avail)
 +{
 +	struct cab *cab = (struct cab *)(a->format->data);
 +	struct cfdata *cfdata;
 +	const void *d;
 +	int r, mszip;
 +	uint16_t uavail;
 +	char eod = 0;
 +
 +	cfdata = cab->entry_cfdata;
 +	/* If the buffer hasn't been allocated, allocate it now. */
 +	if (cab->uncompressed_buffer == NULL) {
 +		cab->uncompressed_buffer_size = 0x8000;
 +		cab->uncompressed_buffer
 +		    = (unsigned char *)malloc(cab->uncompressed_buffer_size);
 +		if (cab->uncompressed_buffer == NULL) {
 +			archive_set_error(&a->archive, ENOMEM,
 +			    "No memory for CAB reader");
 +			*avail = ARCHIVE_FATAL;
 +			return (NULL);
 +		}
 +	}
 +
 +	uavail = cfdata->uncompressed_avail;
 +	if (uavail == cfdata->uncompressed_size) {
 +		d = cab->uncompressed_buffer + cfdata->read_offset;
 +		*avail = uavail - cfdata->read_offset;
 +		return (d);
 +	}
 +
 +	if (!cab->entry_cffolder->decompress_init) {
 +		cab->stream.next_in = NULL;
 +		cab->stream.avail_in = 0;
 +		cab->stream.total_in = 0;
 +		cab->stream.next_out = NULL;
 +		cab->stream.avail_out = 0;
 +		cab->stream.total_out = 0;
 +		if (cab->stream_valid)
 +			r = inflateReset(&cab->stream);
 +		else
 +			r = inflateInit2(&cab->stream,
 +			    -15 /* Don't check for zlib header */);
 +		if (r != Z_OK) {
 +			archive_set_error(&a->archive, ARCHIVE_ERRNO_MISC,
 +			    "Can't initialize deflate decompression.");
 +			*avail = ARCHIVE_FATAL;
 +			return (NULL);
 +		}
 +		/* Stream structure has been set up. */
 +		cab->stream_valid = 1;
 +		/* We've initialized decompression for this stream. */
 +		cab->entry_cffolder->decompress_init = 1;
 +	}
 +
 +	if (cfdata->compressed_bytes_remaining == cfdata->compressed_size)
 +		mszip = 2;
 +	else
 +		mszip = 0;
 +	eod = 0;
 +	cab->stream.total_out = uavail;
 +	/*
 +	 * We always uncompress all data in current CFDATA.
 +	 */
 +	while (!eod && cab->stream.total_out < cfdata->uncompressed_size) {
 +		ssize_t bytes_avail;
 +
 +		cab->stream.next_out =
 +		    cab->uncompressed_buffer + cab->stream.total_out;
 +		cab->stream.avail_out =
 +		    cfdata->uncompressed_size - cab->stream.total_out;
 +
 +		d = __archive_read_ahead(a, 1, &bytes_avail);
 +		if (bytes_avail <= 0) {
 +			*avail = truncated_error(a);
 +			return (NULL);
 +		}
 +		if (bytes_avail > cfdata->compressed_bytes_remaining)
 +			bytes_avail = cfdata->compressed_bytes_remaining;
 +		/*
 +		 * A bug in zlib.h: stream.next_in should be marked 'const'
 +		 * but isn't (the library never alters data through the
 +		 * next_in pointer, only reads it).  The result: this ugly
 +		 * cast to remove 'const'.
 +		 */
 +		cab->stream.next_in = (Bytef *)(uintptr_t)d;
 +		cab->stream.avail_in = (uInt)bytes_avail;
 +		cab->stream.total_in = 0;
 +
 +		/* Cut out a tow-byte MSZIP signature(0x43, 0x4b). */
 +		if (mszip > 0) {
++			if (bytes_avail <= 0)
++				goto nomszip;
 +			if (bytes_avail <= mszip) {
 +				if (mszip == 2) {
 +					if (cab->stream.next_in[0] != 0x43)
 +						goto nomszip;
 +					if (bytes_avail > 1 &&
 +					    cab->stream.next_in[1] != 0x4b)
 +						goto nomszip;
 +				} else if (cab->stream.next_in[0] != 0x4b)
 +					goto nomszip;
 +				cfdata->unconsumed = bytes_avail;
 +				cfdata->sum_ptr = d;
 +				if (cab_minimum_consume_cfdata(
 +				    a, cfdata->unconsumed) < 0) {
 +					*avail = ARCHIVE_FATAL;
 +					return (NULL);
 +				}
 +				mszip -= (int)bytes_avail;
 +				continue;
 +			}
 +			if (mszip == 1 && cab->stream.next_in[0] != 0x4b)
 +				goto nomszip;
 +			else if (cab->stream.next_in[0] != 0x43 ||
 +			    cab->stream.next_in[1] != 0x4b)
 +				goto nomszip;
 +			cab->stream.next_in += mszip;
 +			cab->stream.avail_in -= mszip;
 +			cab->stream.total_in += mszip;
 +			mszip = 0;
 +		}
 +
 +		r = inflate(&cab->stream, 0);
 +		switch (r) {
 +		case Z_OK:
 +			break;
 +		case Z_STREAM_END:
 +			eod = 1;
 +			break;
 +		default:
 +			goto zlibfailed;
 +		}
 +		cfdata->unconsumed = cab->stream.total_in;
 +		cfdata->sum_ptr = d;
 +		if (cab_minimum_consume_cfdata(a, cfdata->unconsumed) < 0) {
 +			*avail = ARCHIVE_FATAL;
 +			return (NULL);
 +		}
 +	}
 +	uavail = (uint16_t)cab->stream.total_out;
 +
 +	if (uavail < cfdata->uncompressed_size) {
 +		archive_set_error(&a->archive, ARCHIVE_ERRNO_MISC,
 +		    "Invalid uncompressed size (%d < %d)",
 +		    uavail, cfdata->uncompressed_size);
 +		*avail = ARCHIVE_FATAL;
 +		return (NULL);
 +	}
 +
 +	/*
 +	 * Note: I suspect there is a bug in makecab.exe because, in rare
 +	 * case, compressed bytes are still remaining regardless we have
- 	 * gotten all uncompressed bytes, which size is recoded in CFDATA,
++	 * gotten all uncompressed bytes, which size is recorded in CFDATA,
 +	 * as much as we need, and we have to use the garbage so as to
 +	 * correctly compute the sum of CFDATA accordingly.
 +	 */
 +	if (cfdata->compressed_bytes_remaining > 0) {
 +		ssize_t bytes_avail;
 +
 +		d = __archive_read_ahead(a, cfdata->compressed_bytes_remaining,
 +		    &bytes_avail);
 +		if (bytes_avail <= 0) {
 +			*avail = truncated_error(a);
 +			return (NULL);
 +		}
 +		cfdata->unconsumed = cfdata->compressed_bytes_remaining;
 +		cfdata->sum_ptr = d;
 +		if (cab_minimum_consume_cfdata(a, cfdata->unconsumed) < 0) {
 +			*avail = ARCHIVE_FATAL;
 +			return (NULL);
 +		}
 +	}
 +
 +	/*
 +	 * Set dictionary data for decompressing of next CFDATA, which
 +	 * in the same folder. This is why we always do decompress CFDATA
 +	 * even if beginning CFDATA or some of CFDATA are not used in
 +	 * skipping file data.
 +	 */
 +	if (cab->entry_cffolder->cfdata_index <
 +	    cab->entry_cffolder->cfdata_count) {
 +		r = inflateReset(&cab->stream);
 +		if (r != Z_OK)
 +			goto zlibfailed;
 +		r = inflateSetDictionary(&cab->stream,
 +		    cab->uncompressed_buffer, cfdata->uncompressed_size);
 +		if (r != Z_OK)
 +			goto zlibfailed;
 +	}
 +
 +	d = cab->uncompressed_buffer + cfdata->read_offset;
 +	*avail = uavail - cfdata->read_offset;
 +	cfdata->uncompressed_avail = uavail;
 +
 +	return (d);
 +
 +zlibfailed:
 +	switch (r) {
 +	case Z_MEM_ERROR:
 +		archive_set_error(&a->archive, ENOMEM,
 +		    "Out of memory for deflate decompression");
 +		break;
 +	default:
 +		archive_set_error(&a->archive, ARCHIVE_ERRNO_MISC,
 +		    "Deflate decompression failed (%d)", r);
 +		break;
 +	}
 +	*avail = ARCHIVE_FATAL;
 +	return (NULL);
 +nomszip:
 +	archive_set_error(&a->archive, ARCHIVE_ERRNO_MISC,
 +	    "CFDATA incorrect(no MSZIP signature)");
 +	*avail = ARCHIVE_FATAL;
 +	return (NULL);
 +}
 +
 +#else /* HAVE_ZLIB_H */
 +
 +static const void *
 +cab_read_ahead_cfdata_deflate(struct archive_read *a, ssize_t *avail)
 +{
 +	*avail = ARCHIVE_FATAL;
 +	archive_set_error(&a->archive, ARCHIVE_ERRNO_MISC,
 +	    "libarchive compiled without deflate support (no libz)");
 +	return (NULL);
 +}
 +
 +#endif /* HAVE_ZLIB_H */
 +
 +static const void *
 +cab_read_ahead_cfdata_lzx(struct archive_read *a, ssize_t *avail)
 +{
 +	struct cab *cab = (struct cab *)(a->format->data);
 +	struct cfdata *cfdata;
 +	const void *d;
 +	int r;
 +	uint16_t uavail;
 +
 +	cfdata = cab->entry_cfdata;
 +	/* If the buffer hasn't been allocated, allocate it now. */
 +	if (cab->uncompressed_buffer == NULL) {
 +		cab->uncompressed_buffer_size = 0x8000;
 +		cab->uncompressed_buffer
 +		    = (unsigned char *)malloc(cab->uncompressed_buffer_size);
 +		if (cab->uncompressed_buffer == NULL) {
 +			archive_set_error(&a->archive, ENOMEM,
 +			    "No memory for CAB reader");
 +			*avail = ARCHIVE_FATAL;
 +			return (NULL);
 +		}
 +	}
 +
 +	uavail = cfdata->uncompressed_avail;
 +	if (uavail == cfdata->uncompressed_size) {
 +		d = cab->uncompressed_buffer + cfdata->read_offset;
 +		*avail = uavail - cfdata->read_offset;
 +		return (d);
 +	}
 +
 +	if (!cab->entry_cffolder->decompress_init) {
 +		r = lzx_decode_init(&cab->xstrm,
 +		    cab->entry_cffolder->compdata);
 +		if (r != ARCHIVE_OK) {
 +			archive_set_error(&a->archive, ARCHIVE_ERRNO_MISC,
 +			    "Can't initialize LZX decompression.");
 +			*avail = ARCHIVE_FATAL;
 +			return (NULL);
 +		}
 +		/* We've initialized decompression for this stream. */
 +		cab->entry_cffolder->decompress_init = 1;
 +	}
 +
 +	/* Clean up remaining bits of previous CFDATA. */
 +	lzx_cleanup_bitstream(&cab->xstrm);
 +	cab->xstrm.total_out = uavail;
 +	while (cab->xstrm.total_out < cfdata->uncompressed_size) {
 +		ssize_t bytes_avail;
 +
 +		cab->xstrm.next_out =
 +		    cab->uncompressed_buffer + cab->xstrm.total_out;
 +		cab->xstrm.avail_out =
 +		    cfdata->uncompressed_size - cab->xstrm.total_out;
 +
 +		d = __archive_read_ahead(a, 1, &bytes_avail);
 +		if (bytes_avail <= 0) {
 +			archive_set_error(&a->archive,
 +			    ARCHIVE_ERRNO_FILE_FORMAT,
 +			    "Truncated CAB file data");
 +			*avail = ARCHIVE_FATAL;
 +			return (NULL);
 +		}
 +		if (bytes_avail > cfdata->compressed_bytes_remaining)
 +			bytes_avail = cfdata->compressed_bytes_remaining;
 +
 +		cab->xstrm.next_in = d;
 +		cab->xstrm.avail_in = bytes_avail;
 +		cab->xstrm.total_in = 0;
 +		r = lzx_decode(&cab->xstrm,
 +		    cfdata->compressed_bytes_remaining == bytes_avail);
 +		switch (r) {
 +		case ARCHIVE_OK:
 +		case ARCHIVE_EOF:
 +			break;
 +		default:
 +			archive_set_error(&a->archive, ARCHIVE_ERRNO_MISC,
 +			    "LZX decompression failed (%d)", r);
 +			*avail = ARCHIVE_FATAL;
 +			return (NULL);
 +		}
 +		cfdata->unconsumed = cab->xstrm.total_in;
 +		cfdata->sum_ptr = d;
 +		if (cab_minimum_consume_cfdata(a, cfdata->unconsumed) < 0) {
 +			*avail = ARCHIVE_FATAL;
 +			return (NULL);
 +		}
 +	}
 +
 +	uavail = (uint16_t)cab->xstrm.total_out;
 +	/*
 +	 * Make sure a read pointer advances to next CFDATA.
 +	 */
 +	if (cfdata->compressed_bytes_remaining > 0) {
 +		ssize_t bytes_avail;
 +
 +		d = __archive_read_ahead(a, cfdata->compressed_bytes_remaining,
 +		    &bytes_avail);
 +		if (bytes_avail <= 0) {
 +			*avail = truncated_error(a);
 +			return (NULL);
 +		}
 +		cfdata->unconsumed = cfdata->compressed_bytes_remaining;
 +		cfdata->sum_ptr = d;
 +		if (cab_minimum_consume_cfdata(a, cfdata->unconsumed) < 0) {
 +			*avail = ARCHIVE_FATAL;
 +			return (NULL);
 +		}
 +	}
 +
 +	/*
- 	 * Translation reversal of x86 proccessor CALL byte sequence(E8).
++	 * Translation reversal of x86 processor CALL byte sequence(E8).
 +	 */
 +	lzx_translation(&cab->xstrm, cab->uncompressed_buffer,
 +	    cfdata->uncompressed_size,
 +	    (cab->entry_cffolder->cfdata_index-1) * 0x8000);
 +
 +	d = cab->uncompressed_buffer + cfdata->read_offset;
 +	*avail = uavail - cfdata->read_offset;
 +	cfdata->uncompressed_avail = uavail;
 +
 +	return (d);
 +}
 +
 +/*
 + * Consume CFDATA.
 + * We always decompress CFDATA to consume CFDATA as much as we need
 + * in uncompressed bytes because all CFDATA in a folder are related
 + * so we do not skip any CFDATA without decompressing.
 + * Note: If the folder of a CFFILE is iFoldCONTINUED_PREV_AND_NEXT or
 + * iFoldCONTINUED_FROM_PREV, we won't decompress because a CFDATA for
 + * the CFFILE is remaining bytes of previous Multivolume CAB file.
 + */
 +static int64_t
 +cab_consume_cfdata(struct archive_read *a, int64_t consumed_bytes)
 +{
 +	struct cab *cab = (struct cab *)(a->format->data);
 +	struct cfdata *cfdata;
 +	int64_t cbytes, rbytes;
 +	int err;
 +
 +	rbytes = cab_minimum_consume_cfdata(a, consumed_bytes);
 +	if (rbytes < 0)
 +		return (ARCHIVE_FATAL);
 +
 +	cfdata = cab->entry_cfdata;
 +	while (rbytes > 0) {
 +		ssize_t avail;
 +
 +		if (cfdata->compressed_size == 0) {
 +			archive_set_error(&a->archive,
 +			    ARCHIVE_ERRNO_FILE_FORMAT,
 +			    "Invalid CFDATA");
 +			return (ARCHIVE_FATAL);
 +		}
 +		cbytes = cfdata->uncompressed_bytes_remaining;
 +		if (cbytes > rbytes)
 +			cbytes = rbytes;
 +		rbytes -= cbytes;
 +
 +		if (cfdata->uncompressed_avail == 0 &&
 +		   (cab->entry_cffile->folder == iFoldCONTINUED_PREV_AND_NEXT ||
 +		    cab->entry_cffile->folder == iFoldCONTINUED_FROM_PREV)) {
 +			/* We have not read any data yet. */
 +			if (cbytes == cfdata->uncompressed_bytes_remaining) {
 +				/* Skip whole current CFDATA. */
 +				__archive_read_consume(a,
 +				    cfdata->compressed_size);
 +				cab->cab_offset += cfdata->compressed_size;
 +				cfdata->compressed_bytes_remaining = 0;
 +				cfdata->uncompressed_bytes_remaining = 0;
 +				err = cab_next_cfdata(a);
 +				if (err < 0)
 +					return (err);
 +				cfdata = cab->entry_cfdata;
 +				if (cfdata->uncompressed_size == 0) {
 +					switch (cab->entry_cffile->folder) {
 +					case iFoldCONTINUED_PREV_AND_NEXT:
 +					case iFoldCONTINUED_TO_NEXT:
 +					case iFoldCONTINUED_FROM_PREV:
 +						rbytes = 0;
 +						break;
 +					default:
 +						break;
 +					}
 +				}
 +				continue;
 +			}
 +			cfdata->read_offset += (uint16_t)cbytes;
 +			cfdata->uncompressed_bytes_remaining -= (uint16_t)cbytes;
 +			break;
 +		} else if (cbytes == 0) {
 +			err = cab_next_cfdata(a);
 +			if (err < 0)
 +				return (err);
 +			cfdata = cab->entry_cfdata;
 +			if (cfdata->uncompressed_size == 0) {
 +				switch (cab->entry_cffile->folder) {
 +				case iFoldCONTINUED_PREV_AND_NEXT:
 +				case iFoldCONTINUED_TO_NEXT:
 +				case iFoldCONTINUED_FROM_PREV:
 +					return (ARCHIVE_FATAL);
 +				default:
 +					break;
 +				}
 +			}
 +			continue;
 +		}
 +		while (cbytes > 0) {
 +			(void)cab_read_ahead_cfdata(a, &avail);
 +			if (avail <= 0)
 +				return (ARCHIVE_FATAL);
 +			if (avail > cbytes)
 +				avail = (ssize_t)cbytes;
 +			if (cab_minimum_consume_cfdata(a, avail) < 0)
 +				return (ARCHIVE_FATAL);
 +			cbytes -= avail;
 +		}
 +	}
 +	return (consumed_bytes);
 +}
 +
 +/*
 + * Consume CFDATA as much as we have already gotten and
 + * compute the sum of CFDATA.
 + */
 +static int64_t
 +cab_minimum_consume_cfdata(struct archive_read *a, int64_t consumed_bytes)
 +{
 +	struct cab *cab = (struct cab *)(a->format->data);
 +	struct cfdata *cfdata;
 +	int64_t cbytes, rbytes;
 +	int err;
 +
 +	cfdata = cab->entry_cfdata;
 +	rbytes = consumed_bytes;
 +	if (cab->entry_cffolder->comptype == COMPTYPE_NONE) {
 +		if (consumed_bytes < cfdata->unconsumed)
 +			cbytes = consumed_bytes;
 +		else
 +			cbytes = cfdata->unconsumed;
 +		rbytes -= cbytes; 
 +		cfdata->read_offset += (uint16_t)cbytes;
 +		cfdata->uncompressed_bytes_remaining -= (uint16_t)cbytes;
 +		cfdata->unconsumed -= cbytes;
 +	} else {
 +		cbytes = cfdata->uncompressed_avail - cfdata->read_offset;
 +		if (cbytes > 0) {
 +			if (consumed_bytes < cbytes)
 +				cbytes = consumed_bytes;
 +			rbytes -= cbytes;
 +			cfdata->read_offset += (uint16_t)cbytes;
 +			cfdata->uncompressed_bytes_remaining -= (uint16_t)cbytes;
 +		}
 +
 +		if (cfdata->unconsumed) {
 +			cbytes = cfdata->unconsumed;
 +			cfdata->unconsumed = 0;
 +		} else
 +			cbytes = 0;
 +	}
 +	if (cbytes) {
 +		/* Compute the sum. */
 +		cab_checksum_update(a, (size_t)cbytes);
 +
 +		/* Consume as much as the compressor actually used. */
 +		__archive_read_consume(a, cbytes);
 +		cab->cab_offset += cbytes;
 +		cfdata->compressed_bytes_remaining -= (uint16_t)cbytes;
 +		if (cfdata->compressed_bytes_remaining == 0) {
 +			err = cab_checksum_finish(a);
 +			if (err < 0)
 +				return (err);
 +		}
 +	}
 +	return (rbytes);
 +}
 +
 +/*
 + * Returns ARCHIVE_OK if successful, ARCHIVE_FATAL otherwise, sets
 + * cab->end_of_entry if it consumes all of the data.
 + */
 +static int
 +cab_read_data(struct archive_read *a, const void **buff,
 +    size_t *size, int64_t *offset)
 +{
 +	struct cab *cab = (struct cab *)(a->format->data);
 +	ssize_t bytes_avail;
 +
 +	if (cab->entry_bytes_remaining == 0) {
 +		*buff = NULL;
 +		*size = 0;
 +		*offset = cab->entry_offset;
 +		cab->end_of_entry = 1;
 +		return (ARCHIVE_OK);
 +	}
 +
 +	*buff = cab_read_ahead_cfdata(a, &bytes_avail);
 +	if (bytes_avail <= 0) {
 +		*buff = NULL;
 +		*size = 0;
 +		*offset = 0;
 +		if (bytes_avail == 0 &&
 +		    cab->entry_cfdata->uncompressed_size == 0) {
 +			/* All of CFDATA in a folder has been handled. */
 +			archive_set_error(&a->archive,
 +			    ARCHIVE_ERRNO_FILE_FORMAT, "Invalid CFDATA");
 +			return (ARCHIVE_FATAL);
 +		} else
 +			return ((int)bytes_avail);
 +	}
 +	if (bytes_avail > cab->entry_bytes_remaining)
 +		bytes_avail = (ssize_t)cab->entry_bytes_remaining;
 +
 +	*size = bytes_avail;
 +	*offset = cab->entry_offset;
 +	cab->entry_offset += bytes_avail;
 +	cab->entry_bytes_remaining -= bytes_avail;
 +	if (cab->entry_bytes_remaining == 0)
 +		cab->end_of_entry = 1;
 +	cab->entry_unconsumed = bytes_avail;
 +	if (cab->entry_cffolder->comptype == COMPTYPE_NONE) {
 +		/* Don't consume more than current entry used. */
 +		if (cab->entry_cfdata->unconsumed > cab->entry_unconsumed)
 +			cab->entry_cfdata->unconsumed = cab->entry_unconsumed;
 +	}
 +	return (ARCHIVE_OK);
 +}
 +
 +static int
 +archive_read_format_cab_read_data_skip(struct archive_read *a)
 +{
 +	struct cab *cab;
 +	int64_t bytes_skipped;
 +	int r;
 +
 +	cab = (struct cab *)(a->format->data);
 +
 +	if (cab->end_of_archive)
 +		return (ARCHIVE_EOF);
 +
 +	if (!cab->read_data_invoked) {
 +		cab->bytes_skipped += cab->entry_bytes_remaining;
 +		cab->entry_bytes_remaining = 0;
 +		/* This entry is finished and done. */
 +		cab->end_of_entry_cleanup = cab->end_of_entry = 1;
 +		return (ARCHIVE_OK);
 +	}
 +
 +	if (cab->entry_unconsumed) {
 +		/* Consume as much as the compressor actually used. */
 +		r = (int)cab_consume_cfdata(a, cab->entry_unconsumed);
 +		cab->entry_unconsumed = 0;
 +		if (r < 0)
 +			return (r);
 +	} else if (cab->entry_cfdata == NULL) {
 +		r = cab_next_cfdata(a);
 +		if (r < 0)
 +			return (r);
 +	}
 +
 +	/* if we've already read to end of data, we're done. */
 +	if (cab->end_of_entry_cleanup)
 +		return (ARCHIVE_OK);
 +
 +	/*
 +	 * If the length is at the beginning, we can skip the
 +	 * compressed data much more quickly.
 +	 */
 +	bytes_skipped = cab_consume_cfdata(a, cab->entry_bytes_remaining);
 +	if (bytes_skipped < 0)
 +		return (ARCHIVE_FATAL);
 +
 +	/* If the compression type is none(uncompressed), we've already
 +	 * consumed data as much as the current entry size. */
 +	if (cab->entry_cffolder->comptype == COMPTYPE_NONE &&
 +	    cab->entry_cfdata != NULL)
 +		cab->entry_cfdata->unconsumed = 0;
 +
 +	/* This entry is finished and done. */
 +	cab->end_of_entry_cleanup = cab->end_of_entry = 1;
 +	return (ARCHIVE_OK);
 +}
 +
 +static int
 +archive_read_format_cab_cleanup(struct archive_read *a)
 +{
 +	struct cab *cab = (struct cab *)(a->format->data);
 +	struct cfheader *hd = &cab->cfheader;
 +	int i;
 +
 +	if (hd->folder_array != NULL) {
 +		for (i = 0; i < hd->folder_count; i++)
 +			free(hd->folder_array[i].cfdata.memimage);
 +		free(hd->folder_array);
 +	}
 +	if (hd->file_array != NULL) {
 +		for (i = 0; i < cab->cfheader.file_count; i++)
 +			archive_string_free(&(hd->file_array[i].pathname));
 +		free(hd->file_array);
 +	}
 +#ifdef HAVE_ZLIB_H
 +	if (cab->stream_valid)
 +		inflateEnd(&cab->stream);
 +#endif
 +	lzx_decode_free(&cab->xstrm);
 +	archive_wstring_free(&cab->ws);
 +	free(cab->uncompressed_buffer);
 +	free(cab);
 +	(a->format->data) = NULL;
 +	return (ARCHIVE_OK);
 +}
 +
 +/* Convert an MSDOS-style date/time into Unix-style time. */
 +static time_t
 +cab_dos_time(const unsigned char *p)
 +{
 +	int msTime, msDate;
 +	struct tm ts;
 +
 +	msDate = archive_le16dec(p);
 +	msTime = archive_le16dec(p+2);
 +
 +	memset(&ts, 0, sizeof(ts));
 +	ts.tm_year = ((msDate >> 9) & 0x7f) + 80;   /* Years since 1900. */
 +	ts.tm_mon = ((msDate >> 5) & 0x0f) - 1;     /* Month number.     */
 +	ts.tm_mday = msDate & 0x1f;		    /* Day of month.     */
 +	ts.tm_hour = (msTime >> 11) & 0x1f;
 +	ts.tm_min = (msTime >> 5) & 0x3f;
 +	ts.tm_sec = (msTime << 1) & 0x3e;
 +	ts.tm_isdst = -1;
 +	return (mktime(&ts));
 +}
 +
 +/*****************************************************************
 + *
 + * LZX decompression code.
 + *
 + *****************************************************************/
 +
 +/*
 + * Initialize LZX decoder.
 + *
 + * Returns ARCHIVE_OK if initialization was successful.
 + * Returns ARCHIVE_FAILED if w_bits has unsupported value.
 + * Returns ARCHIVE_FATAL if initialization failed; memory allocation
 + * error occurred.
 + */
 +static int
 +lzx_decode_init(struct lzx_stream *strm, int w_bits)
 +{
 +	struct lzx_dec *ds;
 +	int slot, w_size, w_slot;
 +	int base, footer;
 +	int base_inc[18];
 +
 +	if (strm->ds == NULL) {
 +		strm->ds = calloc(1, sizeof(*strm->ds));
 +		if (strm->ds == NULL)
 +			return (ARCHIVE_FATAL);
 +	}
 +	ds = strm->ds;
 +	ds->error = ARCHIVE_FAILED;
 +
 +	/* Allow bits from 15(32KBi) up to 21(2MBi) */
 +	if (w_bits < SLOT_BASE || w_bits > SLOT_MAX)
 +		return (ARCHIVE_FAILED);
 +
 +	ds->error = ARCHIVE_FATAL;
 +
 +	/*
 +	 * Alloc window
 +	 */
 +	w_size = ds->w_size;
 +	w_slot = slots[w_bits - SLOT_BASE];
 +	ds->w_size = 1U << w_bits;
 +	ds->w_mask = ds->w_size -1;
 +	if (ds->w_buff == NULL || w_size != ds->w_size) {
 +		free(ds->w_buff);
 +		ds->w_buff = malloc(ds->w_size);
 +		if (ds->w_buff == NULL)
 +			return (ARCHIVE_FATAL);
 +		free(ds->pos_tbl);
 +		ds->pos_tbl = malloc(sizeof(ds->pos_tbl[0]) * w_slot);
 +		if (ds->pos_tbl == NULL)
 +			return (ARCHIVE_FATAL);
 +		lzx_huffman_free(&(ds->mt));
 +	}
 +
 +	for (footer = 0; footer < 18; footer++)
 +		base_inc[footer] = 1 << footer;
 +	base = footer = 0;
 +	for (slot = 0; slot < w_slot; slot++) {
 +		int n;
 +		if (footer == 0)
 +			base = slot;
 +		else
 +			base += base_inc[footer];
 +		if (footer < 17) {
 +			footer = -2;
 +			for (n = base; n; n >>= 1)
 +				footer++;
 +			if (footer <= 0)
 +				footer = 0;
 +		}
 +		ds->pos_tbl[slot].base = base;
 +		ds->pos_tbl[slot].footer_bits = footer;
 +	}
 +
 +	ds->w_pos = 0;
 +	ds->state = 0;
 +	ds->br.cache_buffer = 0;
 +	ds->br.cache_avail = 0;
 +	ds->r0 = ds->r1 = ds->r2 = 1;
 +
 +	/* Initialize aligned offset tree. */
 +	if (lzx_huffman_init(&(ds->at), 8, 8) != ARCHIVE_OK)
 +		return (ARCHIVE_FATAL);
 +
 +	/* Initialize pre-tree. */
 +	if (lzx_huffman_init(&(ds->pt), 20, 10) != ARCHIVE_OK)
 +		return (ARCHIVE_FATAL);
 +
 +	/* Initialize Main tree. */
 +	if (lzx_huffman_init(&(ds->mt), 256+(w_slot<<3), 16)
 +	    != ARCHIVE_OK)
 +		return (ARCHIVE_FATAL);
 +
 +	/* Initialize Length tree. */
 +	if (lzx_huffman_init(&(ds->lt), 249, 16) != ARCHIVE_OK)
 +		return (ARCHIVE_FATAL);
 +
 +	ds->error = 0;
 +
 +	return (ARCHIVE_OK);
 +}
 +
 +/*
 + * Release LZX decoder.
 + */
 +static void
 +lzx_decode_free(struct lzx_stream *strm)
 +{
 +
 +	if (strm->ds == NULL)
 +		return;
 +	free(strm->ds->w_buff);
 +	free(strm->ds->pos_tbl);
 +	lzx_huffman_free(&(strm->ds->at));
 +	lzx_huffman_free(&(strm->ds->pt));
 +	lzx_huffman_free(&(strm->ds->mt));
 +	lzx_huffman_free(&(strm->ds->lt));
 +	free(strm->ds);
 +	strm->ds = NULL;
 +}
 +
 +/*
 + * E8 Call Translation reversal.
 + */
 +static void
 +lzx_translation(struct lzx_stream *strm, void *p, size_t size, uint32_t offset)
 +{
 +	struct lzx_dec *ds = strm->ds;
 +	unsigned char *b, *end;
 +
 +	if (!ds->translation || size <= 10)
 +		return;
 +	b = p;
 +	end = b + size - 10;
 +	while (b < end && (b = memchr(b, 0xE8, end - b)) != NULL) {
 +		size_t i = b - (unsigned char *)p;
 +		int32_t cp, displacement, value;
 +
 +		cp = (int32_t)(offset + (uint32_t)i);
 +		value = archive_le32dec(&b[1]);
 +		if (value >= -cp && value < (int32_t)ds->translation_size) {
 +			if (value >= 0)
 +				displacement = value - cp;
 +			else
 +				displacement = value + ds->translation_size;
 +			archive_le32enc(&b[1], (uint32_t)displacement);
 +		}
 +		b += 5;
 +	}
 +}
 +
 +/*
 + * Bit stream reader.
 + */
 +/* Check that the cache buffer has enough bits. */
 +#define lzx_br_has(br, n)	((br)->cache_avail >= n)
 +/* Get compressed data by bit. */
 +#define lzx_br_bits(br, n)				\
 +	(((uint32_t)((br)->cache_buffer >>		\
 +		((br)->cache_avail - (n)))) & cache_masks[n])
 +#define lzx_br_bits_forced(br, n)			\
 +	(((uint32_t)((br)->cache_buffer <<		\
 +		((n) - (br)->cache_avail))) & cache_masks[n])
 +/* Read ahead to make sure the cache buffer has enough compressed data we
 + * will use.
 + *  True  : completed, there is enough data in the cache buffer.
 + *  False : we met that strm->next_in is empty, we have to get following
 + *          bytes. */
 +#define lzx_br_read_ahead_0(strm, br, n)	\
 +	(lzx_br_has((br), (n)) || lzx_br_fillup(strm, br))
 +/*  True  : the cache buffer has some bits as much as we need.
 + *  False : there are no enough bits in the cache buffer to be used,
 + *          we have to get following bytes if we could. */
 +#define lzx_br_read_ahead(strm, br, n)	\
 +	(lzx_br_read_ahead_0((strm), (br), (n)) || lzx_br_has((br), (n)))
 +
 +/* Notify how many bits we consumed. */
 +#define lzx_br_consume(br, n)	((br)->cache_avail -= (n))
 +#define lzx_br_consume_unaligned_bits(br) ((br)->cache_avail &= ~0x0f)
 +
 +#define lzx_br_is_unaligned(br)	((br)->cache_avail & 0x0f)
 +
 +static const uint32_t cache_masks[] = {
 +	0x00000000, 0x00000001, 0x00000003, 0x00000007,
 +	0x0000000F, 0x0000001F, 0x0000003F, 0x0000007F,
 +	0x000000FF, 0x000001FF, 0x000003FF, 0x000007FF,
 +	0x00000FFF, 0x00001FFF, 0x00003FFF, 0x00007FFF,
 +	0x0000FFFF, 0x0001FFFF, 0x0003FFFF, 0x0007FFFF,
 +	0x000FFFFF, 0x001FFFFF, 0x003FFFFF, 0x007FFFFF,
 +	0x00FFFFFF, 0x01FFFFFF, 0x03FFFFFF, 0x07FFFFFF,
 +	0x0FFFFFFF, 0x1FFFFFFF, 0x3FFFFFFF, 0x7FFFFFFF,
 +	0xFFFFFFFF, 0xFFFFFFFF, 0xFFFFFFFF, 0xFFFFFFFF
 +};
 +
 +/*
 + * Shift away used bits in the cache data and fill it up with following bits.
 + * Call this when cache buffer does not have enough bits you need.
 + *
 + * Returns 1 if the cache buffer is full.
 + * Returns 0 if the cache buffer is not full; input buffer is empty.
 + */
 +static int
 +lzx_br_fillup(struct lzx_stream *strm, struct lzx_br *br)
 +{
 +/*
-  * x86 proccessor family can read misaligned data without an access error.
++ * x86 processor family can read misaligned data without an access error.
 + */
 +	int n = CACHE_BITS - br->cache_avail;
 +
 +	for (;;) {
 +		switch (n >> 4) {
 +		case 4:
 +			if (strm->avail_in >= 8) {
 +				br->cache_buffer =
 +				    ((uint64_t)strm->next_in[1]) << 56 |
 +				    ((uint64_t)strm->next_in[0]) << 48 |
 +				    ((uint64_t)strm->next_in[3]) << 40 |
 +				    ((uint64_t)strm->next_in[2]) << 32 |
 +				    ((uint32_t)strm->next_in[5]) << 24 |
 +				    ((uint32_t)strm->next_in[4]) << 16 |
 +				    ((uint32_t)strm->next_in[7]) << 8 |
 +				     (uint32_t)strm->next_in[6];
 +				strm->next_in += 8;
 +				strm->avail_in -= 8;
 +				br->cache_avail += 8 * 8;
 +				return (1);
 +			}
 +			break;
 +		case 3:
 +			if (strm->avail_in >= 6) {
 +				br->cache_buffer =
 +		 		   (br->cache_buffer << 48) |
 +				    ((uint64_t)strm->next_in[1]) << 40 |
 +				    ((uint64_t)strm->next_in[0]) << 32 |
 +				    ((uint32_t)strm->next_in[3]) << 24 |
 +				    ((uint32_t)strm->next_in[2]) << 16 |
 +				    ((uint32_t)strm->next_in[5]) << 8 |
 +				     (uint32_t)strm->next_in[4];
 +				strm->next_in += 6;
 +				strm->avail_in -= 6;
 +				br->cache_avail += 6 * 8;
 +				return (1);
 +			}
 +			break;
 +		case 0:
 +			/* We have enough compressed data in
 +			 * the cache buffer.*/
 +			return (1);
 +		default:
 +			break;
 +		}
 +		if (strm->avail_in < 2) {
 +			/* There is not enough compressed data to
 +			 * fill up the cache buffer. */
 +			if (strm->avail_in == 1) {
 +				br->odd = *strm->next_in++;
 +				strm->avail_in--;
 +				br->have_odd = 1;
 +			}
 +			return (0);
 +		}
 +		br->cache_buffer =
 +		   (br->cache_buffer << 16) |
 +		    archive_le16dec(strm->next_in);
 +		strm->next_in += 2;
 +		strm->avail_in -= 2;
 +		br->cache_avail += 16;
 +		n -= 16;
 +	}
 +}
 +
 +static void
 +lzx_br_fixup(struct lzx_stream *strm, struct lzx_br *br)
 +{
 +	int n = CACHE_BITS - br->cache_avail;
 +
 +	if (br->have_odd && n >= 16 && strm->avail_in > 0) {
 +		br->cache_buffer =
 +		   (br->cache_buffer << 16) |
 +		   ((uint16_t)(*strm->next_in)) << 8 | br->odd;
 +		strm->next_in++;
 +		strm->avail_in--;
 +		br->cache_avail += 16;
 +		br->have_odd = 0;
 +	}
 +}
 +
 +static void
 +lzx_cleanup_bitstream(struct lzx_stream *strm)
 +{
 +	strm->ds->br.cache_avail = 0;
 +	strm->ds->br.have_odd = 0;
 +}
 +
 +/*
 + * Decode LZX.
 + *
 + * 1. Returns ARCHIVE_OK if output buffer or input buffer are empty.
 + *    Please set available buffer and call this function again.
 + * 2. Returns ARCHIVE_EOF if decompression has been completed.
 + * 3. Returns ARCHIVE_FAILED if an error occurred; compressed data
 + *    is broken or you do not set 'last' flag properly.
 + */
 +#define ST_RD_TRANSLATION	0
 +#define ST_RD_TRANSLATION_SIZE	1
 +#define ST_RD_BLOCK_TYPE	2
 +#define ST_RD_BLOCK_SIZE	3
 +#define ST_RD_ALIGNMENT		4
 +#define ST_RD_R0		5
 +#define ST_RD_R1		6
 +#define ST_RD_R2		7
 +#define ST_COPY_UNCOMP1		8
 +#define ST_COPY_UNCOMP2		9
 +#define ST_RD_ALIGNED_OFFSET	10
 +#define ST_RD_VERBATIM		11
 +#define ST_RD_PRE_MAIN_TREE_256	12
 +#define ST_MAIN_TREE_256	13
 +#define ST_RD_PRE_MAIN_TREE_REM	14
 +#define ST_MAIN_TREE_REM	15
 +#define ST_RD_PRE_LENGTH_TREE	16
 +#define ST_LENGTH_TREE		17
 +#define ST_MAIN			18
 +#define ST_LENGTH		19
 +#define ST_OFFSET		20
 +#define ST_REAL_POS		21
 +#define ST_COPY			22
 +
 +static int
 +lzx_decode(struct lzx_stream *strm, int last)
 +{
 +	struct lzx_dec *ds = strm->ds;
 +	int64_t avail_in;
 +	int r;
 +
 +	if (ds->error)
 +		return (ds->error);
 +
 +	avail_in = strm->avail_in;
 +	lzx_br_fixup(strm, &(ds->br));
 +	do {
 +		if (ds->state < ST_MAIN)
 +			r = lzx_read_blocks(strm, last);
 +		else {
 +			int64_t bytes_written = strm->avail_out;
 +			r = lzx_decode_blocks(strm, last);
 +			bytes_written -= strm->avail_out;
 +			strm->next_out += bytes_written;
 +			strm->total_out += bytes_written;
 +		}
 +	} while (r == 100);
 +	strm->total_in += avail_in - strm->avail_in;
 +	return (r);
 +}
 +
 +static int
 +lzx_read_blocks(struct lzx_stream *strm, int last)
 +{
 +	struct lzx_dec *ds = strm->ds;
 +	struct lzx_br *br = &(ds->br);
 +	int i, r;
 +
 +	for (;;) {
 +		switch (ds->state) {
 +		case ST_RD_TRANSLATION:
 +			if (!lzx_br_read_ahead(strm, br, 1)) {
 +				ds->state = ST_RD_TRANSLATION;
 +				if (last)
 +					goto failed;
 +				return (ARCHIVE_OK);
 +			}
 +			ds->translation = lzx_br_bits(br, 1);
 +			lzx_br_consume(br, 1);
 +			/* FALL THROUGH */
 +		case ST_RD_TRANSLATION_SIZE:
 +			if (ds->translation) {
 +				if (!lzx_br_read_ahead(strm, br, 32)) {
 +					ds->state = ST_RD_TRANSLATION_SIZE;
 +					if (last)
 +						goto failed;
 +					return (ARCHIVE_OK);
 +				}
 +				ds->translation_size = lzx_br_bits(br, 16);
 +				lzx_br_consume(br, 16);
 +				ds->translation_size <<= 16;
 +				ds->translation_size |= lzx_br_bits(br, 16);
 +				lzx_br_consume(br, 16);
 +			}
 +			/* FALL THROUGH */
 +		case ST_RD_BLOCK_TYPE:
 +			if (!lzx_br_read_ahead(strm, br, 3)) {
 +				ds->state = ST_RD_BLOCK_TYPE;
 +				if (last)
 +					goto failed;
 +				return (ARCHIVE_OK);
 +			}
 +			ds->block_type = lzx_br_bits(br, 3);
 +			lzx_br_consume(br, 3);
 +			/* Check a block type. */
 +			switch (ds->block_type) {
 +			case VERBATIM_BLOCK:
 +			case ALIGNED_OFFSET_BLOCK:
 +			case UNCOMPRESSED_BLOCK:
 +				break;
 +			default:
 +				goto failed;/* Invalid */
 +			}
 +			/* FALL THROUGH */
 +		case ST_RD_BLOCK_SIZE:
 +			if (!lzx_br_read_ahead(strm, br, 24)) {
 +				ds->state = ST_RD_BLOCK_SIZE;
 +				if (last)
 +					goto failed;
 +				return (ARCHIVE_OK);
 +			}
 +			ds->block_size = lzx_br_bits(br, 8);
 +			lzx_br_consume(br, 8);
 +			ds->block_size <<= 16;
 +			ds->block_size |= lzx_br_bits(br, 16);
 +			lzx_br_consume(br, 16);
 +			if (ds->block_size == 0)
 +				goto failed;
 +			ds->block_bytes_avail = ds->block_size;
 +			if (ds->block_type != UNCOMPRESSED_BLOCK) {
 +				if (ds->block_type == VERBATIM_BLOCK)
 +					ds->state = ST_RD_VERBATIM;
 +				else
 +					ds->state = ST_RD_ALIGNED_OFFSET;
 +				break;
 +			}
 +			/* FALL THROUGH */
 +		case ST_RD_ALIGNMENT:
 +			/*
 +			 * Handle an Uncompressed Block.
 +			 */
 +			/* Skip padding to align following field on
 +			 * 16-bit boundary. */
 +			if (lzx_br_is_unaligned(br))
 +				lzx_br_consume_unaligned_bits(br);
 +			else {
 +				if (lzx_br_read_ahead(strm, br, 16))
 +					lzx_br_consume(br, 16);
 +				else {
 +					ds->state = ST_RD_ALIGNMENT;
 +					if (last)
 +						goto failed;
 +					return (ARCHIVE_OK);
 +				}
 +			}
 +			/* Preparation to read repeated offsets R0,R1 and R2. */
 +			ds->rbytes_avail = 0;
 +			ds->state = ST_RD_R0;
 +			/* FALL THROUGH */
 +		case ST_RD_R0:
 +		case ST_RD_R1:
 +		case ST_RD_R2:
 +			do {
 +				uint16_t u16;
 +				/* Drain bits in the cache buffer of
 +				 * bit-stream. */
 +				if (lzx_br_has(br, 32)) {
 +					u16 = lzx_br_bits(br, 16);
 +					lzx_br_consume(br, 16);
 +					archive_le16enc(ds->rbytes, u16);
 +					u16 = lzx_br_bits(br, 16);
 +					lzx_br_consume(br, 16);
 +					archive_le16enc(ds->rbytes+2, u16);
 +					ds->rbytes_avail = 4;
 +				} else if (lzx_br_has(br, 16)) {
 +					u16 = lzx_br_bits(br, 16);
 +					lzx_br_consume(br, 16);
 +					archive_le16enc(ds->rbytes, u16);
 +					ds->rbytes_avail = 2;
 +				}
 +				if (ds->rbytes_avail < 4 && ds->br.have_odd) {
 +					ds->rbytes[ds->rbytes_avail++] =
 +					    ds->br.odd;
 +					ds->br.have_odd = 0;
 +				}
 +				while (ds->rbytes_avail < 4) {
 +					if (strm->avail_in <= 0) {
 +						if (last)
 +							goto failed;
 +						return (ARCHIVE_OK);
 +					}
 +					ds->rbytes[ds->rbytes_avail++] =
 +					    *strm->next_in++;
 +					strm->avail_in--;
 +				}
 +				ds->rbytes_avail = 0;
 +				if (ds->state == ST_RD_R0) {
 +					ds->r0 = archive_le32dec(ds->rbytes);
 +					if (ds->r0 < 0)
 +						goto failed;
 +					ds->state = ST_RD_R1;
 +				} else if (ds->state == ST_RD_R1) {
 +					ds->r1 = archive_le32dec(ds->rbytes);
 +					if (ds->r1 < 0)
 +						goto failed;
 +					ds->state = ST_RD_R2;
 +				} else if (ds->state == ST_RD_R2) {
 +					ds->r2 = archive_le32dec(ds->rbytes);
 +					if (ds->r2 < 0)
 +						goto failed;
 +					/* We've gotten all repeated offsets. */
 +					ds->state = ST_COPY_UNCOMP1;
 +				}
 +			} while (ds->state != ST_COPY_UNCOMP1);
 +			/* FALL THROUGH */
 +		case ST_COPY_UNCOMP1:
 +			/*
 +			 * Copy bytes form next_in to next_out directly.
 +			 */
 +			while (ds->block_bytes_avail) {
 +				int l;
 +
 +				if (strm->avail_out <= 0)
 +					/* Output buffer is empty. */
 +					return (ARCHIVE_OK);
 +				if (strm->avail_in <= 0) {
 +					/* Input buffer is empty. */
 +					if (last)
 +						goto failed;
 +					return (ARCHIVE_OK);
 +				}
 +				l = (int)ds->block_bytes_avail;
 +				if (l > ds->w_size - ds->w_pos)
 +					l = ds->w_size - ds->w_pos;
 +				if (l > strm->avail_out)
 +					l = (int)strm->avail_out;
 +				if (l > strm->avail_in)
 +					l = (int)strm->avail_in;
 +				memcpy(strm->next_out, strm->next_in, l);
 +				memcpy(&(ds->w_buff[ds->w_pos]),
 +				    strm->next_in, l);
 +				strm->next_in += l;
 +				strm->avail_in -= l;
 +				strm->next_out += l;
 +				strm->avail_out -= l;
 +				strm->total_out += l;
 +				ds->w_pos = (ds->w_pos + l) & ds->w_mask;
 +				ds->block_bytes_avail -= l;
 +			}
 +			/* FALL THROUGH */
 +		case ST_COPY_UNCOMP2:
 +			/* Re-align; skip padding byte. */
 +			if (ds->block_size & 1) {
 +				if (strm->avail_in <= 0) {
 +					/* Input buffer is empty. */
 +					ds->state = ST_COPY_UNCOMP2;
 +					if (last)
 +						goto failed;
 +					return (ARCHIVE_OK);
 +				}
 +				strm->next_in++;
 +				strm->avail_in --;
 +			}
 +			/* This block ended. */
 +			ds->state = ST_RD_BLOCK_TYPE;
 +			return (ARCHIVE_EOF);
 +			/********************/
 +		case ST_RD_ALIGNED_OFFSET:
 +			/*
 +			 * Read Aligned offset tree.
 +			 */
 +			if (!lzx_br_read_ahead(strm, br, 3 * ds->at.len_size)) {
 +				ds->state = ST_RD_ALIGNED_OFFSET;
 +				if (last)
 +					goto failed;
 +				return (ARCHIVE_OK);
 +			}
 +			memset(ds->at.freq, 0, sizeof(ds->at.freq));
 +			for (i = 0; i < ds->at.len_size; i++) {
 +				ds->at.bitlen[i] = lzx_br_bits(br, 3);
 +				ds->at.freq[ds->at.bitlen[i]]++;
 +				lzx_br_consume(br, 3);
 +			}
 +			if (!lzx_make_huffman_table(&ds->at))
 +				goto failed;
 +			/* FALL THROUGH */
 +		case ST_RD_VERBATIM:
 +			ds->loop = 0;
 +			/* FALL THROUGH */
 +		case ST_RD_PRE_MAIN_TREE_256:
 +			/*
 +			 * Read Pre-tree for first 256 elements of main tree.
 +			 */
 +			if (!lzx_read_pre_tree(strm)) {
 +				ds->state = ST_RD_PRE_MAIN_TREE_256;
 +				if (last)
 +					goto failed;
 +				return (ARCHIVE_OK);
 +			}
 +			if (!lzx_make_huffman_table(&ds->pt))
 +				goto failed;
 +			ds->loop = 0;
 +			/* FALL THROUGH */
 +		case ST_MAIN_TREE_256:
 +			/*
 +			 * Get path lengths of first 256 elements of main tree.
 +			 */
 +			r = lzx_read_bitlen(strm, &ds->mt, 256);
 +			if (r < 0)
 +				goto failed;
 +			else if (!r) {
 +				ds->state = ST_MAIN_TREE_256;
 +				if (last)
 +					goto failed;
 +				return (ARCHIVE_OK);
 +			}
 +			ds->loop = 0;
 +			/* FALL THROUGH */
 +		case ST_RD_PRE_MAIN_TREE_REM:
 +			/*
 +			 * Read Pre-tree for remaining elements of main tree.
 +			 */
 +			if (!lzx_read_pre_tree(strm)) {
 +				ds->state = ST_RD_PRE_MAIN_TREE_REM;
 +				if (last)
 +					goto failed;
 +				return (ARCHIVE_OK);
 +			}
 +			if (!lzx_make_huffman_table(&ds->pt))
 +				goto failed;
 +			ds->loop = 256;
 +			/* FALL THROUGH */
 +		case ST_MAIN_TREE_REM:
 +			/*
 +			 * Get path lengths of remaining elements of main tree.
 +			 */
 +			r = lzx_read_bitlen(strm, &ds->mt, -1);
 +			if (r < 0)
 +				goto failed;
 +			else if (!r) {
 +				ds->state = ST_MAIN_TREE_REM;
 +				if (last)
 +					goto failed;
 +				return (ARCHIVE_OK);
 +			}
 +			if (!lzx_make_huffman_table(&ds->mt))
 +				goto failed;
 +			ds->loop = 0;
 +			/* FALL THROUGH */
 +		case ST_RD_PRE_LENGTH_TREE:
 +			/*
 +			 * Read Pre-tree for remaining elements of main tree.
 +			 */
 +			if (!lzx_read_pre_tree(strm)) {
 +				ds->state = ST_RD_PRE_LENGTH_TREE;
 +				if (last)
 +					goto failed;
 +				return (ARCHIVE_OK);
 +			}
 +			if (!lzx_make_huffman_table(&ds->pt))
 +				goto failed;
 +			ds->loop = 0;
 +			/* FALL THROUGH */
 +		case ST_LENGTH_TREE:
 +			/*
 +			 * Get path lengths of remaining elements of main tree.
 +			 */
 +			r = lzx_read_bitlen(strm, &ds->lt, -1);
 +			if (r < 0)
 +				goto failed;
 +			else if (!r) {
 +				ds->state = ST_LENGTH_TREE;
 +				if (last)
 +					goto failed;
 +				return (ARCHIVE_OK);
 +			}
 +			if (!lzx_make_huffman_table(&ds->lt))
 +				goto failed;
 +			ds->state = ST_MAIN;
 +			return (100);
 +		}
 +	}
 +failed:
 +	return (ds->error = ARCHIVE_FAILED);
 +}
 +
 +static int
 +lzx_decode_blocks(struct lzx_stream *strm, int last)
 +{
 +	struct lzx_dec *ds = strm->ds;
 +	struct lzx_br bre = ds->br;
 +	struct huffman *at = &(ds->at), *lt = &(ds->lt), *mt = &(ds->mt);
 +	const struct lzx_pos_tbl *pos_tbl = ds->pos_tbl;
 +	unsigned char *noutp = strm->next_out;
 +	unsigned char *endp = noutp + strm->avail_out;
 +	unsigned char *w_buff = ds->w_buff;
 +	unsigned char *at_bitlen = at->bitlen;
 +	unsigned char *lt_bitlen = lt->bitlen;
 +	unsigned char *mt_bitlen = mt->bitlen;
 +	size_t block_bytes_avail = ds->block_bytes_avail;
 +	int at_max_bits = at->max_bits;
 +	int lt_max_bits = lt->max_bits;
 +	int mt_max_bits = mt->max_bits;
 +	int c, copy_len = ds->copy_len, copy_pos = ds->copy_pos;
 +	int w_pos = ds->w_pos, w_mask = ds->w_mask, w_size = ds->w_size;
 +	int length_header = ds->length_header;
 +	int offset_bits = ds->offset_bits;
 +	int position_slot = ds->position_slot;
 +	int r0 = ds->r0, r1 = ds->r1, r2 = ds->r2;
 +	int state = ds->state;
 +	char block_type = ds->block_type;
 +
 +	for (;;) {
 +		switch (state) {
 +		case ST_MAIN:
 +			for (;;) {
 +				if (block_bytes_avail == 0) {
 +					/* This block ended. */
 +					ds->state = ST_RD_BLOCK_TYPE;
 +					ds->br = bre;
 +					ds->block_bytes_avail =
 +					    block_bytes_avail;
 +					ds->copy_len = copy_len;
 +					ds->copy_pos = copy_pos;
 +					ds->length_header = length_header;
 +					ds->position_slot = position_slot;
 +					ds->r0 = r0; ds->r1 = r1; ds->r2 = r2;
 +					ds->w_pos = w_pos;
 +					strm->avail_out = endp - noutp;
 +					return (ARCHIVE_EOF);
 +				}
 +				if (noutp >= endp)
 +					/* Output buffer is empty. */
 +					goto next_data;
 +
 +				if (!lzx_br_read_ahead(strm, &bre,
 +				    mt_max_bits)) {
 +					if (!last)
 +						goto next_data;
 +					/* Remaining bits are less than
 +					 * maximum bits(mt.max_bits) but maybe
 +					 * it still remains as much as we need,
 +					 * so we should try to use it with
 +					 * dummy bits. */
 +					c = lzx_decode_huffman(mt,
 +					      lzx_br_bits_forced(
 +				 	        &bre, mt_max_bits));
 +					lzx_br_consume(&bre, mt_bitlen[c]);
 +					if (!lzx_br_has(&bre, 0))
 +						goto failed;/* Over read. */
 +				} else {
 +					c = lzx_decode_huffman(mt,
 +					      lzx_br_bits(&bre, mt_max_bits));
 +					lzx_br_consume(&bre, mt_bitlen[c]);
 +				}
 +				if (c > UCHAR_MAX)
 +					break;
 +				/*
 +				 * 'c' is exactly literal code.
 +				 */
 +				/* Save a decoded code to reference it
 +				 * afterward. */
 +				w_buff[w_pos] = c;
 +				w_pos = (w_pos + 1) & w_mask;
 +				/* Store the decoded code to output buffer. */
 +				*noutp++ = c;
 +				block_bytes_avail--;
 +			}
 +			/*
 +			 * Get a match code, its length and offset.
 +			 */
 +			c -= UCHAR_MAX + 1;
 +			length_header = c & 7;
 +			position_slot = c >> 3;
 +			/* FALL THROUGH */
 +		case ST_LENGTH:
 +			/*
 +			 * Get a length.
 +			 */
 +			if (length_header == 7) {
 +				if (!lzx_br_read_ahead(strm, &bre,
 +				    lt_max_bits)) {
 +					if (!last) {
 +						state = ST_LENGTH;
 +						goto next_data;
 +					}
 +					c = lzx_decode_huffman(lt,
 +					      lzx_br_bits_forced(
 +					        &bre, lt_max_bits));
 +					lzx_br_consume(&bre, lt_bitlen[c]);
 +					if (!lzx_br_has(&bre, 0))
 +						goto failed;/* Over read. */
 +				} else {
 +					c = lzx_decode_huffman(lt,
 +					    lzx_br_bits(&bre, lt_max_bits));
 +					lzx_br_consume(&bre, lt_bitlen[c]);
 +				}
 +				copy_len = c + 7 + 2;
 +			} else
 +				copy_len = length_header + 2;
 +			if ((size_t)copy_len > block_bytes_avail)
 +				goto failed;
 +			/*
 +			 * Get an offset.
 +			 */
 +			switch (position_slot) {
 +			case 0: /* Use repeated offset 0. */
 +				copy_pos = r0;
 +				state = ST_REAL_POS;
 +				continue;
 +			case 1: /* Use repeated offset 1. */
 +				copy_pos = r1;
 +				/* Swap repeated offset. */
 +				r1 = r0;
 +				r0 = copy_pos;
 +				state = ST_REAL_POS;
 +				continue;
 +			case 2: /* Use repeated offset 2. */
 +				copy_pos = r2;
 +				/* Swap repeated offset. */
 +				r2 = r0;
 +				r0 = copy_pos;
 +				state = ST_REAL_POS;
 +				continue;
 +			default:
 +				offset_bits =
 +				    pos_tbl[position_slot].footer_bits;
 +				break;
 +			}
 +			/* FALL THROUGH */
 +		case ST_OFFSET:
 +			/*
 +			 * Get the offset, which is a distance from
 +			 * current window position.
 +			 */
 +			if (block_type == ALIGNED_OFFSET_BLOCK &&
 +			    offset_bits >= 3) {
 +				int offbits = offset_bits - 3;
 +
 +				if (!lzx_br_read_ahead(strm, &bre, offbits)) {
 +					state = ST_OFFSET;
 +					if (last)
 +						goto failed;
 +					goto next_data;
 +				}
 +				copy_pos = lzx_br_bits(&bre, offbits) << 3;
 +
 +				/* Get an aligned number. */
 +				if (!lzx_br_read_ahead(strm, &bre,
 +				    offbits + at_max_bits)) {
 +					if (!last) {
 +						state = ST_OFFSET;
 +						goto next_data;
 +					}
 +					lzx_br_consume(&bre, offbits);
 +					c = lzx_decode_huffman(at,
 +					      lzx_br_bits_forced(&bre,
 +					        at_max_bits));
 +					lzx_br_consume(&bre, at_bitlen[c]);
 +					if (!lzx_br_has(&bre, 0))
 +						goto failed;/* Over read. */
 +				} else {
 +					lzx_br_consume(&bre, offbits);
 +					c = lzx_decode_huffman(at,
 +					      lzx_br_bits(&bre, at_max_bits));
 +					lzx_br_consume(&bre, at_bitlen[c]);
 +				}
 +				/* Add an aligned number. */
 +				copy_pos += c;
 +			} else {
 +				if (!lzx_br_read_ahead(strm, &bre,
 +				    offset_bits)) {
 +					state = ST_OFFSET;
 +					if (last)
 +						goto failed;
 +					goto next_data;
 +				}
 +				copy_pos = lzx_br_bits(&bre, offset_bits);
 +				lzx_br_consume(&bre, offset_bits);
 +			}
 +			copy_pos += pos_tbl[position_slot].base -2;
 +
 +			/* Update repeated offset LRU queue. */
 +			r2 = r1;
 +			r1 = r0;
 +			r0 = copy_pos;
 +			/* FALL THROUGH */
 +		case ST_REAL_POS:
 +			/*
 +			 * Compute a real position in window.
 +			 */
 +			copy_pos = (w_pos - copy_pos) & w_mask;
 +			/* FALL THROUGH */
 +		case ST_COPY:
 +			/*
 +			 * Copy several bytes as extracted data from the window
 +			 * into the output buffer.
 +			 */
 +			for (;;) {
 +				const unsigned char *s;
 +				int l;
 +
 +				l = copy_len;
 +				if (copy_pos > w_pos) {
 +					if (l > w_size - copy_pos)
 +						l = w_size - copy_pos;
 +				} else {
 +					if (l > w_size - w_pos)
 +						l = w_size - w_pos;
 +				}
 +				if (noutp + l >= endp)
 +					l = (int)(endp - noutp);
 +				s = w_buff + copy_pos;
 +				if (l >= 8 && ((copy_pos + l < w_pos)
 +				  || (w_pos + l < copy_pos))) {
 +					memcpy(w_buff + w_pos, s, l);
 +					memcpy(noutp, s, l);
 +				} else {
 +					unsigned char *d;
 +					int li;
 +
 +					d = w_buff + w_pos;
 +					for (li = 0; li < l; li++)
 +						noutp[li] = d[li] = s[li];
 +				}
 +				noutp += l;
 +				copy_pos = (copy_pos + l) & w_mask;
 +				w_pos = (w_pos + l) & w_mask;
 +				block_bytes_avail -= l;
 +				if (copy_len <= l)
 +					/* A copy of current pattern ended. */
 +					break;
 +				copy_len -= l;
 +				if (noutp >= endp) {
 +					/* Output buffer is empty. */
 +					state = ST_COPY;
 +					goto next_data;
 +				}
 +			}
 +			state = ST_MAIN;
 +			break;
 +		}
 +	}
 +failed:
 +	return (ds->error = ARCHIVE_FAILED);
 +next_data:
 +	ds->br = bre;
 +	ds->block_bytes_avail = block_bytes_avail;
 +	ds->copy_len = copy_len;
 +	ds->copy_pos = copy_pos;
 +	ds->length_header = length_header;
 +	ds->offset_bits = offset_bits;
 +	ds->position_slot = position_slot;
 +	ds->r0 = r0; ds->r1 = r1; ds->r2 = r2;
 +	ds->state = state;
 +	ds->w_pos = w_pos;
 +	strm->avail_out = endp - noutp;
 +	return (ARCHIVE_OK);
 +}
 +
 +static int
 +lzx_read_pre_tree(struct lzx_stream *strm)
 +{
 +	struct lzx_dec *ds = strm->ds;
 +	struct lzx_br *br = &(ds->br);
 +	int i;
 +
 +	if (ds->loop == 0)
 +		memset(ds->pt.freq, 0, sizeof(ds->pt.freq));
 +	for (i = ds->loop; i < ds->pt.len_size; i++) {
 +		if (!lzx_br_read_ahead(strm, br, 4)) {
 +			ds->loop = i;
 +			return (0);
 +		}
 +		ds->pt.bitlen[i] = lzx_br_bits(br, 4);
 +		ds->pt.freq[ds->pt.bitlen[i]]++;
 +		lzx_br_consume(br, 4);
 +	}
 +	ds->loop = i;
 +	return (1);
 +}
 +
 +/*
 + * Read a bunch of bit-lengths from pre-tree.
 + */
 +static int
 +lzx_read_bitlen(struct lzx_stream *strm, struct huffman *d, int end)
 +{
 +	struct lzx_dec *ds = strm->ds;
 +	struct lzx_br *br = &(ds->br);
 +	int c, i, j, ret, same;
 +	unsigned rbits;
 +
 +	i = ds->loop;
 +	if (i == 0)
 +		memset(d->freq, 0, sizeof(d->freq));
 +	ret = 0;
 +	if (end < 0)
 +		end = d->len_size;
 +	while (i < end) {
 +		ds->loop = i;
 +		if (!lzx_br_read_ahead(strm, br, ds->pt.max_bits))
 +			goto getdata;
 +		rbits = lzx_br_bits(br, ds->pt.max_bits);
 +		c = lzx_decode_huffman(&(ds->pt), rbits);
 +		switch (c) {
 +		case 17:/* several zero lengths, from 4 to 19. */
 +			if (!lzx_br_read_ahead(strm, br, ds->pt.bitlen[c]+4))
 +				goto getdata;
 +			lzx_br_consume(br, ds->pt.bitlen[c]);
 +			same = lzx_br_bits(br, 4) + 4;
 +			if (i + same > end)
 +				return (-1);/* Invalid */
 +			lzx_br_consume(br, 4);
 +			for (j = 0; j < same; j++)
 +				d->bitlen[i++] = 0;
 +			break;
 +		case 18:/* many zero lengths, from 20 to 51. */
 +			if (!lzx_br_read_ahead(strm, br, ds->pt.bitlen[c]+5))
 +				goto getdata;
 +			lzx_br_consume(br, ds->pt.bitlen[c]);
 +			same = lzx_br_bits(br, 5) + 20;
 +			if (i + same > end)
 +				return (-1);/* Invalid */
 +			lzx_br_consume(br, 5);
 +			memset(d->bitlen + i, 0, same);
 +			i += same;
 +			break;
 +		case 19:/* a few same lengths. */
 +			if (!lzx_br_read_ahead(strm, br,
 +			    ds->pt.bitlen[c]+1+ds->pt.max_bits))
 +				goto getdata;
 +			lzx_br_consume(br, ds->pt.bitlen[c]);
 +			same = lzx_br_bits(br, 1) + 4;
 +			if (i + same > end)
 +				return (-1);
 +			lzx_br_consume(br, 1);
 +			rbits = lzx_br_bits(br, ds->pt.max_bits);
 +			c = lzx_decode_huffman(&(ds->pt), rbits);
 +			lzx_br_consume(br, ds->pt.bitlen[c]);
 +			c = (d->bitlen[i] - c + 17) % 17;
 +			if (c < 0)
 +				return (-1);/* Invalid */
 +			for (j = 0; j < same; j++)
 +				d->bitlen[i++] = c;
 +			d->freq[c] += same;
 +			break;
 +		default:
 +			lzx_br_consume(br, ds->pt.bitlen[c]);
 +			c = (d->bitlen[i] - c + 17) % 17;
 +			if (c < 0)
 +				return (-1);/* Invalid */
 +			d->freq[c]++;
 +			d->bitlen[i++] = c;
 +			break;
 +		}
 +	}
 +	ret = 1;
 +getdata:
 +	ds->loop = i;
 +	return (ret);
 +}
 +
 +static int
 +lzx_huffman_init(struct huffman *hf, size_t len_size, int tbl_bits)
 +{
 +	int bits;
 +
 +	if (hf->bitlen == NULL || hf->len_size != (int)len_size) {
 +		free(hf->bitlen);
 +		hf->bitlen = calloc(len_size,  sizeof(hf->bitlen[0]));
 +		if (hf->bitlen == NULL)
 +			return (ARCHIVE_FATAL);
 +		hf->len_size = (int)len_size;
 +	} else
 +		memset(hf->bitlen, 0, len_size *  sizeof(hf->bitlen[0]));
 +	if (hf->tbl == NULL) {
 +		if (tbl_bits < HTBL_BITS)
 +			bits = tbl_bits;
 +		else
 +			bits = HTBL_BITS;
 +		hf->tbl = malloc(((size_t)1 << bits) * sizeof(hf->tbl[0]));
 +		if (hf->tbl == NULL)
 +			return (ARCHIVE_FATAL);
 +		hf->tbl_bits = tbl_bits;
 +	}
 +	if (hf->tree == NULL && tbl_bits > HTBL_BITS) {
 +		hf->tree_avail = 1 << (tbl_bits - HTBL_BITS + 4);
 +		hf->tree = malloc(hf->tree_avail * sizeof(hf->tree[0]));
 +		if (hf->tree == NULL)
 +			return (ARCHIVE_FATAL);
 +	}
 +	return (ARCHIVE_OK);
 +}
 +
 +static void
 +lzx_huffman_free(struct huffman *hf)
 +{
 +	free(hf->bitlen);
 +	free(hf->tbl);
 +	free(hf->tree);
 +}
 +
 +/*
 + * Make a huffman coding table.
 + */
 +static int
 +lzx_make_huffman_table(struct huffman *hf)
 +{
 +	uint16_t *tbl;
 +	const unsigned char *bitlen;
 +	int bitptn[17], weight[17];
 +	int i, maxbits = 0, ptn, tbl_size, w;
 +	int diffbits, len_avail;
 +
 +	/*
 +	 * Initialize bit patterns.
 +	 */
 +	ptn = 0;
 +	for (i = 1, w = 1 << 15; i <= 16; i++, w >>= 1) {
 +		bitptn[i] = ptn;
 +		weight[i] = w;
 +		if (hf->freq[i]) {
 +			ptn += hf->freq[i] * w;
 +			maxbits = i;
 +		}
 +	}
 +	if ((ptn & 0xffff) != 0 || maxbits > hf->tbl_bits)
 +		return (0);/* Invalid */
 +
 +	hf->max_bits = maxbits;
 +
 +	/*
 +	 * Cut out extra bits which we won't house in the table.
 +	 * This preparation reduces the same calculation in the for-loop
 +	 * making the table.
 +	 */
 +	if (maxbits < 16) {
 +		int ebits = 16 - maxbits;
 +		for (i = 1; i <= maxbits; i++) {
 +			bitptn[i] >>= ebits;
 +			weight[i] >>= ebits;
 +		}
 +	}
 +	if (maxbits > HTBL_BITS) {
 +		int htbl_max;
 +		uint16_t *p;
 +
 +		diffbits = maxbits - HTBL_BITS;
 +		for (i = 1; i <= HTBL_BITS; i++) {
 +			bitptn[i] >>= diffbits;
 +			weight[i] >>= diffbits;
 +		}
 +		htbl_max = bitptn[HTBL_BITS] +
 +		    weight[HTBL_BITS] * hf->freq[HTBL_BITS];
 +		p = &(hf->tbl[htbl_max]);
 +		while (p < &hf->tbl[1U<<HTBL_BITS])
 +			*p++ = 0;
 +	} else
 +		diffbits = 0;
 +	hf->shift_bits = diffbits;
 +
 +	/*
 +	 * Make the table.
 +	 */
 +	tbl_size = 1 << HTBL_BITS;
 +	tbl = hf->tbl;
 +	bitlen = hf->bitlen;
 +	len_avail = hf->len_size;
 +	hf->tree_used = 0;
 +	for (i = 0; i < len_avail; i++) {
 +		uint16_t *p;
 +		int len, cnt;
 +		uint16_t bit;
 +		int extlen;
 +		struct htree_t *ht;
 +
 +		if (bitlen[i] == 0)
 +			continue;
 +		/* Get a bit pattern */
 +		len = bitlen[i];
 +		ptn = bitptn[len];
 +		cnt = weight[len];
 +		if (len <= HTBL_BITS) {
 +			/* Calculate next bit pattern */
 +			if ((bitptn[len] = ptn + cnt) > tbl_size)
 +				return (0);/* Invalid */
 +			/* Update the table */
 +			p = &(tbl[ptn]);
 +			while (--cnt >= 0)
 +				p[cnt] = (uint16_t)i;
 +			continue;
 +		}
 +
 +		/*
 +		 * A bit length is too big to be housed to a direct table,
 +		 * so we use a tree model for its extra bits.
 +		 */
 +		bitptn[len] = ptn + cnt;
 +		bit = 1U << (diffbits -1);
 +		extlen = len - HTBL_BITS;
 +		
 +		p = &(tbl[ptn >> diffbits]);
 +		if (*p == 0) {
 +			*p = len_avail + hf->tree_used;
 +			ht = &(hf->tree[hf->tree_used++]);
 +			if (hf->tree_used > hf->tree_avail)
 +				return (0);/* Invalid */
 +			ht->left = 0;
 +			ht->right = 0;
 +		} else {
 +			if (*p < len_avail ||
 +			    *p >= (len_avail + hf->tree_used))
 +				return (0);/* Invalid */
 +			ht = &(hf->tree[*p - len_avail]);
 +		}
 +		while (--extlen > 0) {
 +			if (ptn & bit) {
 +				if (ht->left < len_avail) {
 +					ht->left = len_avail + hf->tree_used;
 +					ht = &(hf->tree[hf->tree_used++]);
 +					if (hf->tree_used > hf->tree_avail)
 +						return (0);/* Invalid */
 +					ht->left = 0;
 +					ht->right = 0;
 +				} else {
 +					ht = &(hf->tree[ht->left - len_avail]);
 +				}
 +			} else {
 +				if (ht->right < len_avail) {
 +					ht->right = len_avail + hf->tree_used;
 +					ht = &(hf->tree[hf->tree_used++]);
 +					if (hf->tree_used > hf->tree_avail)
 +						return (0);/* Invalid */
 +					ht->left = 0;
 +					ht->right = 0;
 +				} else {
 +					ht = &(hf->tree[ht->right - len_avail]);
 +				}
 +			}
 +			bit >>= 1;
 +		}
 +		if (ptn & bit) {
 +			if (ht->left != 0)
 +				return (0);/* Invalid */
 +			ht->left = (uint16_t)i;
 +		} else {
 +			if (ht->right != 0)
 +				return (0);/* Invalid */
 +			ht->right = (uint16_t)i;
 +		}
 +	}
 +	return (1);
 +}
 +
 +static int
 +lzx_decode_huffman_tree(struct huffman *hf, unsigned rbits, int c)
 +{
 +	struct htree_t *ht;
 +	int extlen;
 +
 +	ht = hf->tree;
 +	extlen = hf->shift_bits;
 +	while (c >= hf->len_size) {
 +		c -= hf->len_size;
 +		if (extlen-- <= 0 || c >= hf->tree_used)
 +			return (0);
 +		if (rbits & (1U << extlen))
 +			c = ht[c].left;
 +		else
 +			c = ht[c].right;
 +	}
 +	return (c);
 +}
 +
 +static inline int
 +lzx_decode_huffman(struct huffman *hf, unsigned rbits)
 +{
 +	int c;
 +	/*
 +	 * At first search an index table for a bit pattern.
 +	 * If it fails, search a huffman tree for.
 +	 */
 +	c = hf->tbl[rbits >> hf->shift_bits];
 +	if (c < hf->len_size)
 +		return (c);
 +	/* This bit pattern needs to be found out at a huffman tree. */
 +	return (lzx_decode_huffman_tree(hf, rbits, c));
 +}
 +
diff --cc Utilities/cmlibarchive/libarchive/archive_read_support_format_iso9660.c
index c19614a,0000000..3541330
mode 100644,000000..100644
--- a/Utilities/cmlibarchive/libarchive/archive_read_support_format_iso9660.c
+++ b/Utilities/cmlibarchive/libarchive/archive_read_support_format_iso9660.c
@@@ -1,3263 -1,0 +1,3265 @@@
 +/*-
 + * Copyright (c) 2003-2007 Tim Kientzle
 + * Copyright (c) 2009 Andreas Henriksson <andreas at fatal.se>
 + * Copyright (c) 2009-2012 Michihiro NAKAJIMA
 + * All rights reserved.
 + *
 + * Redistribution and use in source and binary forms, with or without
 + * modification, are permitted provided that the following conditions
 + * are met:
 + * 1. Redistributions of source code must retain the above copyright
 + *    notice, this list of conditions and the following disclaimer.
 + * 2. Redistributions in binary form must reproduce the above copyright
 + *    notice, this list of conditions and the following disclaimer in the
 + *    documentation and/or other materials provided with the distribution.
 + *
 + * THIS SOFTWARE IS PROVIDED BY THE AUTHOR(S) ``AS IS'' AND ANY EXPRESS OR
 + * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
 + * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
 + * IN NO EVENT SHALL THE AUTHOR(S) BE LIABLE FOR ANY DIRECT, INDIRECT,
 + * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
 + * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
 + * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
 + * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
 + * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
 + * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
 + */
 +
 +#include "archive_platform.h"
 +__FBSDID("$FreeBSD: head/lib/libarchive/archive_read_support_format_iso9660.c 201246 2009-12-30 05:30:35Z kientzle $");
 +
 +#ifdef HAVE_ERRNO_H
 +#include <errno.h>
 +#endif
 +/* #include <stdint.h> */ /* See archive_platform.h */
 +#include <stdio.h>
 +#ifdef HAVE_STDLIB_H
 +#include <stdlib.h>
 +#endif
 +#ifdef HAVE_STRING_H
 +#include <string.h>
 +#endif
 +#include <time.h>
 +#ifdef HAVE_ZLIB_H
 +#include <cm_zlib.h>
 +#endif
 +
 +#include "archive.h"
 +#include "archive_endian.h"
 +#include "archive_entry.h"
 +#include "archive_entry_locale.h"
 +#include "archive_private.h"
 +#include "archive_read_private.h"
 +#include "archive_string.h"
 +
 +/*
 + * An overview of ISO 9660 format:
 + *
 + * Each disk is laid out as follows:
 + *   * 32k reserved for private use
 + *   * Volume descriptor table.  Each volume descriptor
 + *     is 2k and specifies basic format information.
 + *     The "Primary Volume Descriptor" (PVD) is defined by the
 + *     standard and should always be present; other volume
 + *     descriptors include various vendor-specific extensions.
 + *   * Files and directories.  Each file/dir is specified by
 + *     an "extent" (starting sector and length in bytes).
 + *     Dirs are just files with directory records packed one
 + *     after another.  The PVD contains a single dir entry
 + *     specifying the location of the root directory.  Everything
 + *     else follows from there.
 + *
 + * This module works by first reading the volume descriptors, then
 + * building a list of directory entries, sorted by starting
 + * sector.  At each step, I look for the earliest dir entry that
 + * hasn't yet been read, seek forward to that location and read
 + * that entry.  If it's a dir, I slurp in the new dir entries and
 + * add them to the heap; if it's a regular file, I return the
 + * corresponding archive_entry and wait for the client to request
 + * the file body.  This strategy allows us to read most compliant
 + * CDs with a single pass through the data, as required by libarchive.
 + */
 +#define	LOGICAL_BLOCK_SIZE	2048
 +#define	SYSTEM_AREA_BLOCK	16
 +
 +/* Structure of on-disk primary volume descriptor. */
 +#define PVD_type_offset 0
 +#define PVD_type_size 1
 +#define PVD_id_offset (PVD_type_offset + PVD_type_size)
 +#define PVD_id_size 5
 +#define PVD_version_offset (PVD_id_offset + PVD_id_size)
 +#define PVD_version_size 1
 +#define PVD_reserved1_offset (PVD_version_offset + PVD_version_size)
 +#define PVD_reserved1_size 1
 +#define PVD_system_id_offset (PVD_reserved1_offset + PVD_reserved1_size)
 +#define PVD_system_id_size 32
 +#define PVD_volume_id_offset (PVD_system_id_offset + PVD_system_id_size)
 +#define PVD_volume_id_size 32
 +#define PVD_reserved2_offset (PVD_volume_id_offset + PVD_volume_id_size)
 +#define PVD_reserved2_size 8
 +#define PVD_volume_space_size_offset (PVD_reserved2_offset + PVD_reserved2_size)
 +#define PVD_volume_space_size_size 8
 +#define PVD_reserved3_offset (PVD_volume_space_size_offset + PVD_volume_space_size_size)
 +#define PVD_reserved3_size 32
 +#define PVD_volume_set_size_offset (PVD_reserved3_offset + PVD_reserved3_size)
 +#define PVD_volume_set_size_size 4
 +#define PVD_volume_sequence_number_offset (PVD_volume_set_size_offset + PVD_volume_set_size_size)
 +#define PVD_volume_sequence_number_size 4
 +#define PVD_logical_block_size_offset (PVD_volume_sequence_number_offset + PVD_volume_sequence_number_size)
 +#define PVD_logical_block_size_size 4
 +#define PVD_path_table_size_offset (PVD_logical_block_size_offset + PVD_logical_block_size_size)
 +#define PVD_path_table_size_size 8
 +#define PVD_type_1_path_table_offset (PVD_path_table_size_offset + PVD_path_table_size_size)
 +#define PVD_type_1_path_table_size 4
 +#define PVD_opt_type_1_path_table_offset (PVD_type_1_path_table_offset + PVD_type_1_path_table_size)
 +#define PVD_opt_type_1_path_table_size 4
 +#define PVD_type_m_path_table_offset (PVD_opt_type_1_path_table_offset + PVD_opt_type_1_path_table_size)
 +#define PVD_type_m_path_table_size 4
 +#define PVD_opt_type_m_path_table_offset (PVD_type_m_path_table_offset + PVD_type_m_path_table_size)
 +#define PVD_opt_type_m_path_table_size 4
 +#define PVD_root_directory_record_offset (PVD_opt_type_m_path_table_offset + PVD_opt_type_m_path_table_size)
 +#define PVD_root_directory_record_size 34
 +#define PVD_volume_set_id_offset (PVD_root_directory_record_offset + PVD_root_directory_record_size)
 +#define PVD_volume_set_id_size 128
 +#define PVD_publisher_id_offset (PVD_volume_set_id_offset + PVD_volume_set_id_size)
 +#define PVD_publisher_id_size 128
 +#define PVD_preparer_id_offset (PVD_publisher_id_offset + PVD_publisher_id_size)
 +#define PVD_preparer_id_size 128
 +#define PVD_application_id_offset (PVD_preparer_id_offset + PVD_preparer_id_size)
 +#define PVD_application_id_size 128
 +#define PVD_copyright_file_id_offset (PVD_application_id_offset + PVD_application_id_size)
 +#define PVD_copyright_file_id_size 37
 +#define PVD_abstract_file_id_offset (PVD_copyright_file_id_offset + PVD_copyright_file_id_size)
 +#define PVD_abstract_file_id_size 37
 +#define PVD_bibliographic_file_id_offset (PVD_abstract_file_id_offset + PVD_abstract_file_id_size)
 +#define PVD_bibliographic_file_id_size 37
 +#define PVD_creation_date_offset (PVD_bibliographic_file_id_offset + PVD_bibliographic_file_id_size)
 +#define PVD_creation_date_size 17
 +#define PVD_modification_date_offset (PVD_creation_date_offset + PVD_creation_date_size)
 +#define PVD_modification_date_size 17
 +#define PVD_expiration_date_offset (PVD_modification_date_offset + PVD_modification_date_size)
 +#define PVD_expiration_date_size 17
 +#define PVD_effective_date_offset (PVD_expiration_date_offset + PVD_expiration_date_size)
 +#define PVD_effective_date_size 17
 +#define PVD_file_structure_version_offset (PVD_effective_date_offset + PVD_effective_date_size)
 +#define PVD_file_structure_version_size 1
 +#define PVD_reserved4_offset (PVD_file_structure_version_offset + PVD_file_structure_version_size)
 +#define PVD_reserved4_size 1
 +#define PVD_application_data_offset (PVD_reserved4_offset + PVD_reserved4_size)
 +#define PVD_application_data_size 512
 +#define PVD_reserved5_offset (PVD_application_data_offset + PVD_application_data_size)
 +#define PVD_reserved5_size (2048 - PVD_reserved5_offset)
 +
 +/* TODO: It would make future maintenance easier to just hardcode the
 + * above values.  In particular, ECMA119 states the offsets as part of
 + * the standard.  That would eliminate the need for the following check.*/
 +#if PVD_reserved5_offset != 1395
 +#error PVD offset and size definitions are wrong.
 +#endif
 +
 +
 +/* Structure of optional on-disk supplementary volume descriptor. */
 +#define SVD_type_offset 0
 +#define SVD_type_size 1
 +#define SVD_id_offset (SVD_type_offset + SVD_type_size)
 +#define SVD_id_size 5
 +#define SVD_version_offset (SVD_id_offset + SVD_id_size)
 +#define SVD_version_size 1
 +/* ... */
 +#define SVD_reserved1_offset	72
 +#define SVD_reserved1_size	8
 +#define SVD_volume_space_size_offset 80
 +#define SVD_volume_space_size_size 8
 +#define SVD_escape_sequences_offset (SVD_volume_space_size_offset + SVD_volume_space_size_size)
 +#define SVD_escape_sequences_size 32
 +/* ... */
 +#define SVD_logical_block_size_offset 128
 +#define SVD_logical_block_size_size 4
 +#define SVD_type_L_path_table_offset 140
 +#define SVD_type_M_path_table_offset 148
 +/* ... */
 +#define SVD_root_directory_record_offset 156
 +#define SVD_root_directory_record_size 34
 +#define SVD_file_structure_version_offset 881
 +#define SVD_reserved2_offset	882
 +#define SVD_reserved2_size	1
 +#define SVD_reserved3_offset	1395
 +#define SVD_reserved3_size	653
 +/* ... */
 +/* FIXME: validate correctness of last SVD entry offset. */
 +
 +/* Structure of an on-disk directory record. */
 +/* Note:  ISO9660 stores each multi-byte integer twice, once in
 + * each byte order.  The sizes here are the size of just one
 + * of the two integers.  (This is why the offset of a field isn't
 + * the same as the offset+size of the previous field.) */
 +#define DR_length_offset 0
 +#define DR_length_size 1
 +#define DR_ext_attr_length_offset 1
 +#define DR_ext_attr_length_size 1
 +#define DR_extent_offset 2
 +#define DR_extent_size 4
 +#define DR_size_offset 10
 +#define DR_size_size 4
 +#define DR_date_offset 18
 +#define DR_date_size 7
 +#define DR_flags_offset 25
 +#define DR_flags_size 1
 +#define DR_file_unit_size_offset 26
 +#define DR_file_unit_size_size 1
 +#define DR_interleave_offset 27
 +#define DR_interleave_size 1
 +#define DR_volume_sequence_number_offset 28
 +#define DR_volume_sequence_number_size 2
 +#define DR_name_len_offset 32
 +#define DR_name_len_size 1
 +#define DR_name_offset 33
 +
 +#ifdef HAVE_ZLIB_H
 +static const unsigned char zisofs_magic[8] = {
 +	0x37, 0xE4, 0x53, 0x96, 0xC9, 0xDB, 0xD6, 0x07
 +};
 +
 +struct zisofs {
 +	/* Set 1 if this file compressed by paged zlib */
 +	int		 pz;
 +	int		 pz_log2_bs; /* Log2 of block size */
 +	uint64_t	 pz_uncompressed_size;
 +
 +	int		 initialized;
 +	unsigned char	*uncompressed_buffer;
 +	size_t		 uncompressed_buffer_size;
 +
 +	uint32_t	 pz_offset;
 +	unsigned char	 header[16];
 +	size_t		 header_avail;
 +	int		 header_passed;
 +	unsigned char	*block_pointers;
 +	size_t		 block_pointers_alloc;
 +	size_t		 block_pointers_size;
 +	size_t		 block_pointers_avail;
 +	size_t		 block_off;
 +	uint32_t	 block_avail;
 +
 +	z_stream	 stream;
 +	int		 stream_valid;
 +};
 +#else
 +struct zisofs {
 +	/* Set 1 if this file compressed by paged zlib */
 +	int		 pz;
 +};
 +#endif
 +
 +struct content {
 +	uint64_t	 offset;/* Offset on disk.		*/
 +	uint64_t	 size;	/* File size in bytes.		*/
 +	struct content	*next;
 +};
 +
 +/* In-memory storage for a directory record. */
 +struct file_info {
 +	struct file_info	*use_next;
 +	struct file_info	*parent;
 +	struct file_info	*next;
 +	struct file_info	*re_next;
 +	int		 subdirs;
 +	uint64_t	 key;		/* Heap Key.			*/
 +	uint64_t	 offset;	/* Offset on disk.		*/
 +	uint64_t	 size;		/* File size in bytes.		*/
 +	uint32_t	 ce_offset;	/* Offset of CE.		*/
 +	uint32_t	 ce_size;	/* Size of CE.			*/
 +	char		 rr_moved;	/* Flag to rr_moved.		*/
 +	char		 rr_moved_has_re_only;
 +	char		 re;		/* Having RRIP "RE" extension.	*/
 +	char		 re_descendant;
 +	uint64_t	 cl_offset;	/* Having RRIP "CL" extension.	*/
 +	int		 birthtime_is_set;
 +	time_t		 birthtime;	/* File created time.		*/
 +	time_t		 mtime;		/* File last modified time.	*/
 +	time_t		 atime;		/* File last accessed time.	*/
 +	time_t		 ctime;		/* File attribute change time.	*/
 +	uint64_t	 rdev;		/* Device number.		*/
 +	mode_t		 mode;
 +	uid_t		 uid;
 +	gid_t		 gid;
 +	int64_t		 number;
 +	int		 nlinks;
 +	struct archive_string name; /* Pathname */
 +	unsigned char	*utf16be_name;
 +	size_t		 utf16be_bytes;
 +	char		 name_continues; /* Non-zero if name continues */
 +	struct archive_string symlink;
 +	char		 symlink_continues; /* Non-zero if link continues */
 +	/* Set 1 if this file compressed by paged zlib(zisofs) */
 +	int		 pz;
 +	int		 pz_log2_bs; /* Log2 of block size */
 +	uint64_t	 pz_uncompressed_size;
 +	/* Set 1 if this file is multi extent. */
 +	int		 multi_extent;
 +	struct {
 +		struct content	*first;
 +		struct content	**last;
 +	} contents;
 +	struct {
 +		struct file_info	*first;
 +		struct file_info	**last;
 +	} rede_files;
 +};
 +
 +struct heap_queue {
 +	struct file_info **files;
 +	int		 allocated;
 +	int		 used;
 +};
 +
 +struct iso9660 {
 +	int	magic;
 +#define ISO9660_MAGIC   0x96609660
 +
 +	int opt_support_joliet;
 +	int opt_support_rockridge;
 +
 +	struct archive_string pathname;
 +	char	seenRockridge;	/* Set true if RR extensions are used. */
- 	char	seenSUSP;	/* Set true if SUSP is beging used. */
++	char	seenSUSP;	/* Set true if SUSP is being used. */
 +	char	seenJoliet;
 +
 +	unsigned char	suspOffset;
 +	struct file_info *rr_moved;
 +	struct read_ce_queue {
 +		struct read_ce_req {
 +			uint64_t	 offset;/* Offset of CE on disk. */
 +			struct file_info *file;
 +		}		*reqs;
 +		int		 cnt;
 +		int		 allocated;
 +	}	read_ce_req;
 +
 +	int64_t		previous_number;
 +	struct archive_string previous_pathname;
 +
 +	struct file_info		*use_files;
 +	struct heap_queue		 pending_files;
 +	struct {
 +		struct file_info	*first;
 +		struct file_info	**last;
 +	}	cache_files;
 +	struct {
 +		struct file_info	*first;
 +		struct file_info	**last;
 +	}	re_files;
 +
 +	uint64_t current_position;
 +	ssize_t	logical_block_size;
 +	uint64_t volume_size; /* Total size of volume in bytes. */
 +	int32_t  volume_block;/* Total size of volume in logical blocks. */
 +
 +	struct vd {
 +		int		location;	/* Location of Extent.	*/
 +		uint32_t	size;
 +	} primary, joliet;
 +
 +	int64_t	entry_sparse_offset;
 +	int64_t	entry_bytes_remaining;
 +	size_t  entry_bytes_unconsumed;
 +	struct zisofs	 entry_zisofs;
 +	struct content	*entry_content;
 +	struct archive_string_conv *sconv_utf16be;
 +	/*
 +	 * Buffers for a full pathname in UTF-16BE in Joliet extensions.
 +	 */
 +#define UTF16_NAME_MAX	1024
 +	unsigned char *utf16be_path;
 +	size_t		 utf16be_path_len;
 +	unsigned char *utf16be_previous_path;
 +	size_t		 utf16be_previous_path_len;
- 	/* Null buufer used in bidder to improve its performance. */
++	/* Null buffer used in bidder to improve its performance. */
 +	unsigned char	 null[2048];
 +};
 +
 +static int	archive_read_format_iso9660_bid(struct archive_read *, int);
 +static int	archive_read_format_iso9660_options(struct archive_read *,
 +		    const char *, const char *);
 +static int	archive_read_format_iso9660_cleanup(struct archive_read *);
 +static int	archive_read_format_iso9660_read_data(struct archive_read *,
 +		    const void **, size_t *, int64_t *);
 +static int	archive_read_format_iso9660_read_data_skip(struct archive_read *);
 +static int	archive_read_format_iso9660_read_header(struct archive_read *,
 +		    struct archive_entry *);
 +static const char *build_pathname(struct archive_string *, struct file_info *, int);
 +static int	build_pathname_utf16be(unsigned char *, size_t, size_t *,
 +		    struct file_info *);
 +#if DEBUG
 +static void	dump_isodirrec(FILE *, const unsigned char *isodirrec);
 +#endif
 +static time_t	time_from_tm(struct tm *);
 +static time_t	isodate17(const unsigned char *);
 +static time_t	isodate7(const unsigned char *);
 +static int	isBootRecord(struct iso9660 *, const unsigned char *);
 +static int	isVolumePartition(struct iso9660 *, const unsigned char *);
 +static int	isVDSetTerminator(struct iso9660 *, const unsigned char *);
 +static int	isJolietSVD(struct iso9660 *, const unsigned char *);
 +static int	isSVD(struct iso9660 *, const unsigned char *);
 +static int	isEVD(struct iso9660 *, const unsigned char *);
 +static int	isPVD(struct iso9660 *, const unsigned char *);
 +static int	next_cache_entry(struct archive_read *, struct iso9660 *,
 +		    struct file_info **);
 +static int	next_entry_seek(struct archive_read *, struct iso9660 *,
 +		    struct file_info **);
 +static struct file_info *
 +		parse_file_info(struct archive_read *a,
 +		    struct file_info *parent, const unsigned char *isodirrec);
 +static int	parse_rockridge(struct archive_read *a,
 +		    struct file_info *file, const unsigned char *start,
 +		    const unsigned char *end);
 +static int	register_CE(struct archive_read *a, int32_t location,
 +		    struct file_info *file);
 +static int	read_CE(struct archive_read *a, struct iso9660 *iso9660);
 +static void	parse_rockridge_NM1(struct file_info *,
 +		    const unsigned char *, int);
 +static void	parse_rockridge_SL1(struct file_info *,
 +		    const unsigned char *, int);
 +static void	parse_rockridge_TF1(struct file_info *,
 +		    const unsigned char *, int);
 +static void	parse_rockridge_ZF1(struct file_info *,
 +		    const unsigned char *, int);
 +static void	register_file(struct iso9660 *, struct file_info *);
 +static void	release_files(struct iso9660 *);
 +static unsigned	toi(const void *p, int n);
 +static inline void re_add_entry(struct iso9660 *, struct file_info *);
 +static inline struct file_info * re_get_entry(struct iso9660 *);
 +static inline int rede_add_entry(struct file_info *);
 +static inline struct file_info * rede_get_entry(struct file_info *);
 +static inline void cache_add_entry(struct iso9660 *iso9660,
 +		    struct file_info *file);
 +static inline struct file_info *cache_get_entry(struct iso9660 *iso9660);
 +static int	heap_add_entry(struct archive_read *a, struct heap_queue *heap,
 +		    struct file_info *file, uint64_t key);
 +static struct file_info *heap_get_entry(struct heap_queue *heap);
 +
 +#define add_entry(arch, iso9660, file)	\
 +	heap_add_entry(arch, &((iso9660)->pending_files), file, file->offset)
 +#define next_entry(iso9660)		\
 +	heap_get_entry(&((iso9660)->pending_files))
 +
 +int
 +archive_read_support_format_iso9660(struct archive *_a)
 +{
 +	struct archive_read *a = (struct archive_read *)_a;
 +	struct iso9660 *iso9660;
 +	int r;
 +
 +	archive_check_magic(_a, ARCHIVE_READ_MAGIC,
 +	    ARCHIVE_STATE_NEW, "archive_read_support_format_iso9660");
 +
 +	iso9660 = (struct iso9660 *)calloc(1, sizeof(*iso9660));
 +	if (iso9660 == NULL) {
 +		archive_set_error(&a->archive, ENOMEM,
 +		    "Can't allocate iso9660 data");
 +		return (ARCHIVE_FATAL);
 +	}
 +	iso9660->magic = ISO9660_MAGIC;
 +	iso9660->cache_files.first = NULL;
 +	iso9660->cache_files.last = &(iso9660->cache_files.first);
 +	iso9660->re_files.first = NULL;
 +	iso9660->re_files.last = &(iso9660->re_files.first);
 +	/* Enable to support Joliet extensions by default.	*/
 +	iso9660->opt_support_joliet = 1;
 +	/* Enable to support Rock Ridge extensions by default.	*/
 +	iso9660->opt_support_rockridge = 1;
 +
 +	r = __archive_read_register_format(a,
 +	    iso9660,
 +	    "iso9660",
 +	    archive_read_format_iso9660_bid,
 +	    archive_read_format_iso9660_options,
 +	    archive_read_format_iso9660_read_header,
 +	    archive_read_format_iso9660_read_data,
 +	    archive_read_format_iso9660_read_data_skip,
 +	    NULL,
 +	    archive_read_format_iso9660_cleanup,
 +	    NULL,
 +	    NULL);
 +
 +	if (r != ARCHIVE_OK) {
 +		free(iso9660);
 +		return (r);
 +	}
 +	return (ARCHIVE_OK);
 +}
 +
 +
 +static int
 +archive_read_format_iso9660_bid(struct archive_read *a, int best_bid)
 +{
 +	struct iso9660 *iso9660;
 +	ssize_t bytes_read;
 +	const unsigned char *p;
 +	int seenTerminator;
 +
 +	/* If there's already a better bid than we can ever
 +	   make, don't bother testing. */
 +	if (best_bid > 48)
 +		return (-1);
 +
 +	iso9660 = (struct iso9660 *)(a->format->data);
 +
 +	/*
 +	 * Skip the first 32k (reserved area) and get the first
 +	 * 8 sectors of the volume descriptor table.  Of course,
 +	 * if the I/O layer gives us more, we'll take it.
 +	 */
 +#define RESERVED_AREA	(SYSTEM_AREA_BLOCK * LOGICAL_BLOCK_SIZE)
 +	p = __archive_read_ahead(a,
 +	    RESERVED_AREA + 8 * LOGICAL_BLOCK_SIZE,
 +	    &bytes_read);
 +	if (p == NULL)
 +	    return (-1);
 +
 +	/* Skip the reserved area. */
 +	bytes_read -= RESERVED_AREA;
 +	p += RESERVED_AREA;
 +
 +	/* Check each volume descriptor. */
 +	seenTerminator = 0;
 +	for (; bytes_read > LOGICAL_BLOCK_SIZE;
 +	    bytes_read -= LOGICAL_BLOCK_SIZE, p += LOGICAL_BLOCK_SIZE) {
 +		/* Do not handle undefined Volume Descriptor Type. */
 +		if (p[0] >= 4 && p[0] <= 254)
 +			return (0);
 +		/* Standard Identifier must be "CD001" */
 +		if (memcmp(p + 1, "CD001", 5) != 0)
 +			return (0);
 +		if (isPVD(iso9660, p))
 +			continue;
 +		if (!iso9660->joliet.location) {
 +			if (isJolietSVD(iso9660, p))
 +				continue;
 +		}
 +		if (isBootRecord(iso9660, p))
 +			continue;
 +		if (isEVD(iso9660, p))
 +			continue;
 +		if (isSVD(iso9660, p))
 +			continue;
 +		if (isVolumePartition(iso9660, p))
 +			continue;
 +		if (isVDSetTerminator(iso9660, p)) {
 +			seenTerminator = 1;
 +			break;
 +		}
 +		return (0);
 +	}
 +	/*
 +	 * ISO 9660 format must have Primary Volume Descriptor and
 +	 * Volume Descriptor Set Terminator.
 +	 */
 +	if (seenTerminator && iso9660->primary.location > 16)
 +		return (48);
 +
 +	/* We didn't find a valid PVD; return a bid of zero. */
 +	return (0);
 +}
 +
 +static int
 +archive_read_format_iso9660_options(struct archive_read *a,
 +		const char *key, const char *val)
 +{
 +	struct iso9660 *iso9660;
 +
 +	iso9660 = (struct iso9660 *)(a->format->data);
 +
 +	if (strcmp(key, "joliet") == 0) {
 +		if (val == NULL || strcmp(val, "off") == 0 ||
 +				strcmp(val, "ignore") == 0 ||
 +				strcmp(val, "disable") == 0 ||
 +				strcmp(val, "0") == 0)
 +			iso9660->opt_support_joliet = 0;
 +		else
 +			iso9660->opt_support_joliet = 1;
 +		return (ARCHIVE_OK);
 +	}
 +	if (strcmp(key, "rockridge") == 0 ||
 +	    strcmp(key, "Rockridge") == 0) {
 +		iso9660->opt_support_rockridge = val != NULL;
 +		return (ARCHIVE_OK);
 +	}
 +
 +	/* Note: The "warn" return is just to inform the options
 +	 * supervisor that we didn't handle it.  It will generate
 +	 * a suitable error if no one used this option. */
 +	return (ARCHIVE_WARN);
 +}
 +
 +static int
 +isNull(struct iso9660 *iso9660, const unsigned char *h, unsigned offset,
 +unsigned bytes)
 +{
 +
 +	while (bytes >= sizeof(iso9660->null)) {
 +		if (!memcmp(iso9660->null, h + offset, sizeof(iso9660->null)))
 +			return (0);
 +		offset += sizeof(iso9660->null);
 +		bytes -= sizeof(iso9660->null);
 +	}
 +	if (bytes)
 +		return memcmp(iso9660->null, h + offset, bytes) == 0;
 +	else
 +		return (1);
 +}
 +
 +static int
 +isBootRecord(struct iso9660 *iso9660, const unsigned char *h)
 +{
 +	(void)iso9660; /* UNUSED */
 +
 +	/* Type of the Volume Descriptor Boot Record must be 0. */
 +	if (h[0] != 0)
 +		return (0);
 +
 +	/* Volume Descriptor Version must be 1. */
 +	if (h[6] != 1)
 +		return (0);
 +
 +	return (1);
 +}
 +
 +static int
 +isVolumePartition(struct iso9660 *iso9660, const unsigned char *h)
 +{
 +	int32_t location;
 +
 +	/* Type of the Volume Partition Descriptor must be 3. */
 +	if (h[0] != 3)
 +		return (0);
 +
 +	/* Volume Descriptor Version must be 1. */
 +	if (h[6] != 1)
 +		return (0);
 +	/* Unused Field */
 +	if (h[7] != 0)
 +		return (0);
 +
 +	location = archive_le32dec(h + 72);
 +	if (location <= SYSTEM_AREA_BLOCK ||
 +	    location >= iso9660->volume_block)
 +		return (0);
 +	if ((uint32_t)location != archive_be32dec(h + 76))
 +		return (0);
 +
 +	return (1);
 +}
 +
 +static int
 +isVDSetTerminator(struct iso9660 *iso9660, const unsigned char *h)
 +{
 +	(void)iso9660; /* UNUSED */
 +
 +	/* Type of the Volume Descriptor Set Terminator must be 255. */
 +	if (h[0] != 255)
 +		return (0);
 +
 +	/* Volume Descriptor Version must be 1. */
 +	if (h[6] != 1)
 +		return (0);
 +
 +	/* Reserved field must be 0. */
 +	if (!isNull(iso9660, h, 7, 2048-7))
 +		return (0);
 +
 +	return (1);
 +}
 +
 +static int
 +isJolietSVD(struct iso9660 *iso9660, const unsigned char *h)
 +{
 +	const unsigned char *p;
 +	ssize_t logical_block_size;
 +	int32_t volume_block;
 +
 +	/* Check if current sector is a kind of Supplementary Volume
 +	 * Descriptor. */
 +	if (!isSVD(iso9660, h))
 +		return (0);
 +
 +	/* FIXME: do more validations according to joliet spec. */
 +
 +	/* check if this SVD contains joliet extension! */
 +	p = h + SVD_escape_sequences_offset;
 +	/* N.B. Joliet spec says p[1] == '\\', but.... */
 +	if (p[0] == '%' && p[1] == '/') {
 +		int level = 0;
 +
 +		if (p[2] == '@')
 +			level = 1;
 +		else if (p[2] == 'C')
 +			level = 2;
 +		else if (p[2] == 'E')
 +			level = 3;
 +		else /* not joliet */
 +			return (0);
 +
 +		iso9660->seenJoliet = level;
 +
 +	} else /* not joliet */
 +		return (0);
 +
 +	logical_block_size =
 +	    archive_le16dec(h + SVD_logical_block_size_offset);
 +	volume_block = archive_le32dec(h + SVD_volume_space_size_offset);
 +
 +	iso9660->logical_block_size = logical_block_size;
 +	iso9660->volume_block = volume_block;
 +	iso9660->volume_size = logical_block_size * (uint64_t)volume_block;
 +	/* Read Root Directory Record in Volume Descriptor. */
 +	p = h + SVD_root_directory_record_offset;
 +	iso9660->joliet.location = archive_le32dec(p + DR_extent_offset);
 +	iso9660->joliet.size = archive_le32dec(p + DR_size_offset);
 +
 +	return (48);
 +}
 +
 +static int
 +isSVD(struct iso9660 *iso9660, const unsigned char *h)
 +{
 +	const unsigned char *p;
 +	ssize_t logical_block_size;
 +	int32_t volume_block;
 +	int32_t location;
 +
 +	(void)iso9660; /* UNUSED */
 +
 +	/* Type 2 means it's a SVD. */
 +	if (h[SVD_type_offset] != 2)
 +		return (0);
 +
 +	/* Reserved field must be 0. */
 +	if (!isNull(iso9660, h, SVD_reserved1_offset, SVD_reserved1_size))
 +		return (0);
 +	if (!isNull(iso9660, h, SVD_reserved2_offset, SVD_reserved2_size))
 +		return (0);
 +	if (!isNull(iso9660, h, SVD_reserved3_offset, SVD_reserved3_size))
 +		return (0);
 +
 +	/* File structure version must be 1 for ISO9660/ECMA119. */
 +	if (h[SVD_file_structure_version_offset] != 1)
 +		return (0);
 +
 +	logical_block_size =
 +	    archive_le16dec(h + SVD_logical_block_size_offset);
 +	if (logical_block_size <= 0)
 +		return (0);
 +
 +	volume_block = archive_le32dec(h + SVD_volume_space_size_offset);
 +	if (volume_block <= SYSTEM_AREA_BLOCK+4)
 +		return (0);
 +
 +	/* Location of Occurrence of Type L Path Table must be
 +	 * available location,
 +	 * >= SYSTEM_AREA_BLOCK(16) + 2 and < Volume Space Size. */
 +	location = archive_le32dec(h+SVD_type_L_path_table_offset);
 +	if (location < SYSTEM_AREA_BLOCK+2 || location >= volume_block)
 +		return (0);
 +
 +	/* The Type M Path Table must be at a valid location (WinISO
 +	 * and probably other programs omit this, so we allow zero)
 +	 *
 +	 * >= SYSTEM_AREA_BLOCK(16) + 2 and < Volume Space Size. */
 +	location = archive_be32dec(h+SVD_type_M_path_table_offset);
 +	if ((location > 0 && location < SYSTEM_AREA_BLOCK+2)
 +	    || location >= volume_block)
 +		return (0);
 +
 +	/* Read Root Directory Record in Volume Descriptor. */
 +	p = h + SVD_root_directory_record_offset;
 +	if (p[DR_length_offset] != 34)
 +		return (0);
 +
 +	return (48);
 +}
 +
 +static int
 +isEVD(struct iso9660 *iso9660, const unsigned char *h)
 +{
 +	const unsigned char *p;
 +	ssize_t logical_block_size;
 +	int32_t volume_block;
 +	int32_t location;
 +
 +	(void)iso9660; /* UNUSED */
 +
 +	/* Type of the Enhanced Volume Descriptor must be 2. */
 +	if (h[PVD_type_offset] != 2)
 +		return (0);
 +
 +	/* EVD version must be 2. */
 +	if (h[PVD_version_offset] != 2)
 +		return (0);
 +
 +	/* Reserved field must be 0. */
 +	if (h[PVD_reserved1_offset] != 0)
 +		return (0);
 +
 +	/* Reserved field must be 0. */
 +	if (!isNull(iso9660, h, PVD_reserved2_offset, PVD_reserved2_size))
 +		return (0);
 +
 +	/* Reserved field must be 0. */
 +	if (!isNull(iso9660, h, PVD_reserved3_offset, PVD_reserved3_size))
 +		return (0);
 +
 +	/* Logical block size must be > 0. */
 +	/* I've looked at Ecma 119 and can't find any stronger
 +	 * restriction on this field. */
 +	logical_block_size =
 +	    archive_le16dec(h + PVD_logical_block_size_offset);
 +	if (logical_block_size <= 0)
 +		return (0);
 +
 +	volume_block =
 +	    archive_le32dec(h + PVD_volume_space_size_offset);
 +	if (volume_block <= SYSTEM_AREA_BLOCK+4)
 +		return (0);
 +
 +	/* File structure version must be 2 for ISO9660:1999. */
 +	if (h[PVD_file_structure_version_offset] != 2)
 +		return (0);
 +
 +	/* Location of Occurrence of Type L Path Table must be
 +	 * available location,
 +	 * >= SYSTEM_AREA_BLOCK(16) + 2 and < Volume Space Size. */
 +	location = archive_le32dec(h+PVD_type_1_path_table_offset);
 +	if (location < SYSTEM_AREA_BLOCK+2 || location >= volume_block)
 +		return (0);
 +
 +	/* Location of Occurrence of Type M Path Table must be
 +	 * available location,
 +	 * >= SYSTEM_AREA_BLOCK(16) + 2 and < Volume Space Size. */
 +	location = archive_be32dec(h+PVD_type_m_path_table_offset);
 +	if ((location > 0 && location < SYSTEM_AREA_BLOCK+2)
 +	    || location >= volume_block)
 +		return (0);
 +
 +	/* Reserved field must be 0. */
 +	if (!isNull(iso9660, h, PVD_reserved4_offset, PVD_reserved4_size))
 +		return (0);
 +
 +	/* Reserved field must be 0. */
 +	if (!isNull(iso9660, h, PVD_reserved5_offset, PVD_reserved5_size))
 +		return (0);
 +
 +	/* Read Root Directory Record in Volume Descriptor. */
 +	p = h + PVD_root_directory_record_offset;
 +	if (p[DR_length_offset] != 34)
 +		return (0);
 +
 +	return (48);
 +}
 +
 +static int
 +isPVD(struct iso9660 *iso9660, const unsigned char *h)
 +{
 +	const unsigned char *p;
 +	ssize_t logical_block_size;
 +	int32_t volume_block;
 +	int32_t location;
 +	int i;
 +
 +	/* Type of the Primary Volume Descriptor must be 1. */
 +	if (h[PVD_type_offset] != 1)
 +		return (0);
 +
 +	/* PVD version must be 1. */
 +	if (h[PVD_version_offset] != 1)
 +		return (0);
 +
 +	/* Reserved field must be 0. */
 +	if (h[PVD_reserved1_offset] != 0)
 +		return (0);
 +
 +	/* Reserved field must be 0. */
 +	if (!isNull(iso9660, h, PVD_reserved2_offset, PVD_reserved2_size))
 +		return (0);
 +
 +	/* Reserved field must be 0. */
 +	if (!isNull(iso9660, h, PVD_reserved3_offset, PVD_reserved3_size))
 +		return (0);
 +
 +	/* Logical block size must be > 0. */
 +	/* I've looked at Ecma 119 and can't find any stronger
 +	 * restriction on this field. */
 +	logical_block_size =
 +	    archive_le16dec(h + PVD_logical_block_size_offset);
 +	if (logical_block_size <= 0)
 +		return (0);
 +
 +	volume_block = archive_le32dec(h + PVD_volume_space_size_offset);
 +	if (volume_block <= SYSTEM_AREA_BLOCK+4)
 +		return (0);
 +
 +	/* File structure version must be 1 for ISO9660/ECMA119. */
 +	if (h[PVD_file_structure_version_offset] != 1)
 +		return (0);
 +
 +	/* Location of Occurrence of Type L Path Table must be
 +	 * available location,
 +	 * > SYSTEM_AREA_BLOCK(16) + 2 and < Volume Space Size. */
 +	location = archive_le32dec(h+PVD_type_1_path_table_offset);
 +	if (location < SYSTEM_AREA_BLOCK+2 || location >= volume_block)
 +		return (0);
 +
 +	/* The Type M Path Table must also be at a valid location
 +	 * (although ECMA 119 requires a Type M Path Table, WinISO and
 +	 * probably other programs omit it, so we permit a zero here)
 +	 *
 +	 * >= SYSTEM_AREA_BLOCK(16) + 2 and < Volume Space Size. */
 +	location = archive_be32dec(h+PVD_type_m_path_table_offset);
 +	if ((location > 0 && location < SYSTEM_AREA_BLOCK+2)
 +	    || location >= volume_block)
 +		return (0);
 +
 +	/* Reserved field must be 0. */
 +	/* But accept NetBSD/FreeBSD "makefs" images with 0x20 here. */
 +	for (i = 0; i < PVD_reserved4_size; ++i)
 +		if (h[PVD_reserved4_offset + i] != 0
 +		    && h[PVD_reserved4_offset + i] != 0x20)
 +			return (0);
 +
 +	/* Reserved field must be 0. */
 +	if (!isNull(iso9660, h, PVD_reserved5_offset, PVD_reserved5_size))
 +		return (0);
 +
 +	/* XXX TODO: Check other values for sanity; reject more
 +	 * malformed PVDs. XXX */
 +
 +	/* Read Root Directory Record in Volume Descriptor. */
 +	p = h + PVD_root_directory_record_offset;
 +	if (p[DR_length_offset] != 34)
 +		return (0);
 +
 +	if (!iso9660->primary.location) {
 +		iso9660->logical_block_size = logical_block_size;
 +		iso9660->volume_block = volume_block;
 +		iso9660->volume_size =
 +		    logical_block_size * (uint64_t)volume_block;
 +		iso9660->primary.location =
 +		    archive_le32dec(p + DR_extent_offset);
 +		iso9660->primary.size = archive_le32dec(p + DR_size_offset);
 +	}
 +
 +	return (48);
 +}
 +
 +static int
 +read_children(struct archive_read *a, struct file_info *parent)
 +{
 +	struct iso9660 *iso9660;
 +	const unsigned char *b, *p;
 +	struct file_info *multi;
 +	size_t step, skip_size;
 +
 +	iso9660 = (struct iso9660 *)(a->format->data);
 +	/* flush any remaining bytes from the last round to ensure
 +	 * we're positioned */
 +	if (iso9660->entry_bytes_unconsumed) {
 +		__archive_read_consume(a, iso9660->entry_bytes_unconsumed);
 +		iso9660->entry_bytes_unconsumed = 0;
 +	}
 +	if (iso9660->current_position > parent->offset) {
 +		archive_set_error(&a->archive, ARCHIVE_ERRNO_MISC,
 +		    "Ignoring out-of-order directory (%s) %jd > %jd",
 +		    parent->name.s,
 +		    (intmax_t)iso9660->current_position,
 +		    (intmax_t)parent->offset);
 +		return (ARCHIVE_WARN);
 +	}
 +	if (parent->offset + parent->size > iso9660->volume_size) {
 +		archive_set_error(&a->archive, ARCHIVE_ERRNO_MISC,
 +		    "Directory is beyond end-of-media: %s",
 +		    parent->name.s);
 +		return (ARCHIVE_WARN);
 +	}
 +	if (iso9660->current_position < parent->offset) {
 +		int64_t skipsize;
 +
 +		skipsize = parent->offset - iso9660->current_position;
 +		skipsize = __archive_read_consume(a, skipsize);
 +		if (skipsize < 0)
 +			return ((int)skipsize);
 +		iso9660->current_position = parent->offset;
 +	}
 +
 +	step = (size_t)(((parent->size + iso9660->logical_block_size -1) /
 +	    iso9660->logical_block_size) * iso9660->logical_block_size);
 +	b = __archive_read_ahead(a, step, NULL);
 +	if (b == NULL) {
 +		archive_set_error(&a->archive, ARCHIVE_ERRNO_MISC,
 +		    "Failed to read full block when scanning "
 +		    "ISO9660 directory list");
 +		return (ARCHIVE_FATAL);
 +	}
 +	iso9660->current_position += step;
 +	multi = NULL;
 +	skip_size = step;
 +	while (step) {
 +		p = b;
 +		b += iso9660->logical_block_size;
 +		step -= iso9660->logical_block_size;
 +		for (; *p != 0 && p < b && p + *p <= b; p += *p) {
 +			struct file_info *child;
 +
 +			/* N.B.: these special directory identifiers
 +			 * are 8 bit "values" even on a
 +			 * Joliet CD with UCS-2 (16bit) encoding.
 +			 */
 +
 +			/* Skip '.' entry. */
 +			if (*(p + DR_name_len_offset) == 1
 +			    && *(p + DR_name_offset) == '\0')
 +				continue;
 +			/* Skip '..' entry. */
 +			if (*(p + DR_name_len_offset) == 1
 +			    && *(p + DR_name_offset) == '\001')
 +				continue;
 +			child = parse_file_info(a, parent, p);
 +			if (child == NULL) {
 +				__archive_read_consume(a, skip_size);
 +				return (ARCHIVE_FATAL);
 +			}
 +			if (child->cl_offset == 0 &&
 +			    (child->multi_extent || multi != NULL)) {
 +				struct content *con;
 +
 +				if (multi == NULL) {
 +					multi = child;
 +					multi->contents.first = NULL;
 +					multi->contents.last =
 +					    &(multi->contents.first);
 +				}
 +				con = malloc(sizeof(struct content));
 +				if (con == NULL) {
 +					archive_set_error(
 +					    &a->archive, ENOMEM,
 +					    "No memory for multi extent");
 +					__archive_read_consume(a, skip_size);
 +					return (ARCHIVE_FATAL);
 +				}
 +				con->offset = child->offset;
 +				con->size = child->size;
 +				con->next = NULL;
 +				*multi->contents.last = con;
 +				multi->contents.last = &(con->next);
 +				if (multi == child) {
 +					if (add_entry(a, iso9660, child)
 +					    != ARCHIVE_OK)
 +						return (ARCHIVE_FATAL);
 +				} else {
 +					multi->size += child->size;
 +					if (!child->multi_extent)
 +						multi = NULL;
 +				}
 +			} else
 +				if (add_entry(a, iso9660, child) != ARCHIVE_OK)
 +					return (ARCHIVE_FATAL);
 +		}
 +	}
 +
 +	__archive_read_consume(a, skip_size);
 +
 +	/* Read data which recorded by RRIP "CE" extension. */
 +	if (read_CE(a, iso9660) != ARCHIVE_OK)
 +		return (ARCHIVE_FATAL);
 +
 +	return (ARCHIVE_OK);
 +}
 +
 +static int
 +choose_volume(struct archive_read *a, struct iso9660 *iso9660)
 +{
 +	struct file_info *file;
 +	int64_t skipsize;
 +	struct vd *vd;
 +	const void *block;
 +	char seenJoliet;
 +
 +	vd = &(iso9660->primary);
 +	if (!iso9660->opt_support_joliet)
 +		iso9660->seenJoliet = 0;
 +	if (iso9660->seenJoliet &&
 +		vd->location > iso9660->joliet.location)
 +		/* This condition is unlikely; by way of caution. */
 +		vd = &(iso9660->joliet);
 +
 +	skipsize = LOGICAL_BLOCK_SIZE * (int64_t)vd->location;
 +	skipsize = __archive_read_consume(a, skipsize);
 +	if (skipsize < 0)
 +		return ((int)skipsize);
 +	iso9660->current_position = skipsize;
 +
 +	block = __archive_read_ahead(a, vd->size, NULL);
 +	if (block == NULL) {
 +		archive_set_error(&a->archive, ARCHIVE_ERRNO_MISC,
 +		    "Failed to read full block when scanning "
 +		    "ISO9660 directory list");
 +		return (ARCHIVE_FATAL);
 +	}
 +
 +	/*
 +	 * While reading Root Directory, flag seenJoliet must be zero to
 +	 * avoid converting special name 0x00(Current Directory) and
 +	 * next byte to UCS2.
 +	 */
 +	seenJoliet = iso9660->seenJoliet;/* Save flag. */
 +	iso9660->seenJoliet = 0;
 +	file = parse_file_info(a, NULL, block);
 +	if (file == NULL)
 +		return (ARCHIVE_FATAL);
 +	iso9660->seenJoliet = seenJoliet;
 +
 +	/*
 +	 * If the iso image has both RockRidge and Joliet, we preferentially
 +	 * use RockRidge Extensions rather than Joliet ones.
 +	 */
 +	if (vd == &(iso9660->primary) && iso9660->seenRockridge
 +	    && iso9660->seenJoliet)
 +		iso9660->seenJoliet = 0;
 +
 +	if (vd == &(iso9660->primary) && !iso9660->seenRockridge
 +	    && iso9660->seenJoliet) {
 +		/* Switch reading data from primary to joliet. */
 +		vd = &(iso9660->joliet);
 +		skipsize = LOGICAL_BLOCK_SIZE * (int64_t)vd->location;
 +		skipsize -= iso9660->current_position;
 +		skipsize = __archive_read_consume(a, skipsize);
 +		if (skipsize < 0)
 +			return ((int)skipsize);
 +		iso9660->current_position += skipsize;
 +
 +		block = __archive_read_ahead(a, vd->size, NULL);
 +		if (block == NULL) {
 +			archive_set_error(&a->archive, ARCHIVE_ERRNO_MISC,
 +			    "Failed to read full block when scanning "
 +			    "ISO9660 directory list");
 +			return (ARCHIVE_FATAL);
 +		}
 +		iso9660->seenJoliet = 0;
 +		file = parse_file_info(a, NULL, block);
 +		if (file == NULL)
 +			return (ARCHIVE_FATAL);
 +		iso9660->seenJoliet = seenJoliet;
 +	}
 +
 +	/* Store the root directory in the pending list. */
 +	if (add_entry(a, iso9660, file) != ARCHIVE_OK)
 +		return (ARCHIVE_FATAL);
 +	if (iso9660->seenRockridge) {
 +		a->archive.archive_format = ARCHIVE_FORMAT_ISO9660_ROCKRIDGE;
 +		a->archive.archive_format_name =
 +		    "ISO9660 with Rockridge extensions";
 +	}
 +
 +	return (ARCHIVE_OK);
 +}
 +
 +static int
 +archive_read_format_iso9660_read_header(struct archive_read *a,
 +    struct archive_entry *entry)
 +{
 +	struct iso9660 *iso9660;
 +	struct file_info *file;
 +	int r, rd_r = ARCHIVE_OK;
 +
 +	iso9660 = (struct iso9660 *)(a->format->data);
 +
 +	if (!a->archive.archive_format) {
 +		a->archive.archive_format = ARCHIVE_FORMAT_ISO9660;
 +		a->archive.archive_format_name = "ISO9660";
 +	}
 +
 +	if (iso9660->current_position == 0) {
 +		r = choose_volume(a, iso9660);
 +		if (r != ARCHIVE_OK)
 +			return (r);
 +	}
 +
 +	file = NULL;/* Eliminate a warning. */
 +	/* Get the next entry that appears after the current offset. */
 +	r = next_entry_seek(a, iso9660, &file);
 +	if (r != ARCHIVE_OK)
 +		return (r);
 +
 +	if (iso9660->seenJoliet) {
 +		/*
 +		 * Convert UTF-16BE of a filename to local locale MBS
 +		 * and store the result into a filename field.
 +		 */
 +		if (iso9660->sconv_utf16be == NULL) {
 +			iso9660->sconv_utf16be =
 +			    archive_string_conversion_from_charset(
 +				&(a->archive), "UTF-16BE", 1);
 +			if (iso9660->sconv_utf16be == NULL)
- 				/* Coundn't allocate memory */
++				/* Couldn't allocate memory */
 +				return (ARCHIVE_FATAL);
 +		}
 +		if (iso9660->utf16be_path == NULL) {
 +			iso9660->utf16be_path = malloc(UTF16_NAME_MAX);
 +			if (iso9660->utf16be_path == NULL) {
 +				archive_set_error(&a->archive, ENOMEM,
 +				    "No memory");
 +				return (ARCHIVE_FATAL);
 +			}
 +		}
 +		if (iso9660->utf16be_previous_path == NULL) {
 +			iso9660->utf16be_previous_path = malloc(UTF16_NAME_MAX);
 +			if (iso9660->utf16be_previous_path == NULL) {
 +				archive_set_error(&a->archive, ENOMEM,
 +				    "No memory");
 +				return (ARCHIVE_FATAL);
 +			}
 +		}
 +
 +		iso9660->utf16be_path_len = 0;
 +		if (build_pathname_utf16be(iso9660->utf16be_path,
 +		    UTF16_NAME_MAX, &(iso9660->utf16be_path_len), file) != 0) {
 +			archive_set_error(&a->archive,
 +			    ARCHIVE_ERRNO_FILE_FORMAT,
 +			    "Pathname is too long");
 +			return (ARCHIVE_FATAL);
 +		}
 +
 +		r = archive_entry_copy_pathname_l(entry,
 +		    (const char *)iso9660->utf16be_path,
 +		    iso9660->utf16be_path_len,
 +		    iso9660->sconv_utf16be);
 +		if (r != 0) {
 +			if (errno == ENOMEM) {
 +				archive_set_error(&a->archive, ENOMEM,
 +				    "No memory for Pathname");
 +				return (ARCHIVE_FATAL);
 +			}
 +			archive_set_error(&a->archive,
 +			    ARCHIVE_ERRNO_FILE_FORMAT,
 +			    "Pathname cannot be converted "
 +			    "from %s to current locale.",
 +			    archive_string_conversion_charset_name(
 +			      iso9660->sconv_utf16be));
 +
 +			rd_r = ARCHIVE_WARN;
 +		}
 +	} else {
 +		const char *path = build_pathname(&iso9660->pathname, file, 0);
 +		if (path == NULL) {
 +			archive_set_error(&a->archive,
 +			    ARCHIVE_ERRNO_FILE_FORMAT,
 +			    "Pathname is too long");
 +			return (ARCHIVE_FATAL);
 +		} else {
 +			archive_string_empty(&iso9660->pathname);
 +			archive_entry_set_pathname(entry, path);
 +		}
 +	}
 +
 +	iso9660->entry_bytes_remaining = file->size;
 +	/* Offset for sparse-file-aware clients. */
 +	iso9660->entry_sparse_offset = 0;
 +
 +	if (file->offset + file->size > iso9660->volume_size) {
 +		archive_set_error(&a->archive, ARCHIVE_ERRNO_MISC,
 +		    "File is beyond end-of-media: %s",
 +		    archive_entry_pathname(entry));
 +		iso9660->entry_bytes_remaining = 0;
 +		return (ARCHIVE_WARN);
 +	}
 +
 +	/* Set up the entry structure with information about this entry. */
 +	archive_entry_set_mode(entry, file->mode);
 +	archive_entry_set_uid(entry, file->uid);
 +	archive_entry_set_gid(entry, file->gid);
 +	archive_entry_set_nlink(entry, file->nlinks);
 +	if (file->birthtime_is_set)
 +		archive_entry_set_birthtime(entry, file->birthtime, 0);
 +	else
 +		archive_entry_unset_birthtime(entry);
 +	archive_entry_set_mtime(entry, file->mtime, 0);
 +	archive_entry_set_ctime(entry, file->ctime, 0);
 +	archive_entry_set_atime(entry, file->atime, 0);
 +	/* N.B.: Rock Ridge supports 64-bit device numbers. */
 +	archive_entry_set_rdev(entry, (dev_t)file->rdev);
 +	archive_entry_set_size(entry, iso9660->entry_bytes_remaining);
 +	if (file->symlink.s != NULL)
 +		archive_entry_copy_symlink(entry, file->symlink.s);
 +
 +	/* Note: If the input isn't seekable, we can't rewind to
 +	 * return the same body again, so if the next entry refers to
 +	 * the same data, we have to return it as a hardlink to the
 +	 * original entry. */
 +	if (file->number != -1 &&
 +	    file->number == iso9660->previous_number) {
 +		if (iso9660->seenJoliet) {
 +			r = archive_entry_copy_hardlink_l(entry,
 +			    (const char *)iso9660->utf16be_previous_path,
 +			    iso9660->utf16be_previous_path_len,
 +			    iso9660->sconv_utf16be);
 +			if (r != 0) {
 +				if (errno == ENOMEM) {
 +					archive_set_error(&a->archive, ENOMEM,
 +					    "No memory for Linkname");
 +					return (ARCHIVE_FATAL);
 +				}
 +				archive_set_error(&a->archive,
 +				    ARCHIVE_ERRNO_FILE_FORMAT,
 +				    "Linkname cannot be converted "
 +				    "from %s to current locale.",
 +				    archive_string_conversion_charset_name(
 +				      iso9660->sconv_utf16be));
 +				rd_r = ARCHIVE_WARN;
 +			}
 +		} else
 +			archive_entry_set_hardlink(entry,
 +			    iso9660->previous_pathname.s);
 +		archive_entry_unset_size(entry);
 +		iso9660->entry_bytes_remaining = 0;
 +		return (rd_r);
 +	}
 +
 +	if ((file->mode & AE_IFMT) != AE_IFDIR &&
 +	    file->offset < iso9660->current_position) {
 +		int64_t r64;
 +
 +		r64 = __archive_read_seek(a, file->offset, SEEK_SET);
 +		if (r64 != (int64_t)file->offset) {
 +			/* We can't seek backwards to extract it, so issue
 +			 * a warning.  Note that this can only happen if
 +			 * this entry was added to the heap after we passed
 +			 * this offset, that is, only if the directory
 +			 * mentioning this entry is later than the body of
 +			 * the entry. Such layouts are very unusual; most
 +			 * ISO9660 writers lay out and record all directory
 +			 * information first, then store all file bodies. */
 +			archive_set_error(&a->archive, ARCHIVE_ERRNO_MISC,
 +			    "Ignoring out-of-order file @%jx (%s) %jd < %jd",
 +			    (intmax_t)file->number,
 +			    iso9660->pathname.s,
 +			    (intmax_t)file->offset,
 +			    (intmax_t)iso9660->current_position);
 +			iso9660->entry_bytes_remaining = 0;
 +			return (ARCHIVE_WARN);
 +		}
 +		iso9660->current_position = (uint64_t)r64;
 +	}
 +
 +	/* Initialize zisofs variables. */
 +	iso9660->entry_zisofs.pz = file->pz;
 +	if (file->pz) {
 +#ifdef HAVE_ZLIB_H
 +		struct zisofs  *zisofs;
 +
 +		zisofs = &iso9660->entry_zisofs;
 +		zisofs->initialized = 0;
 +		zisofs->pz_log2_bs = file->pz_log2_bs;
 +		zisofs->pz_uncompressed_size = file->pz_uncompressed_size;
 +		zisofs->pz_offset = 0;
 +		zisofs->header_avail = 0;
 +		zisofs->header_passed = 0;
 +		zisofs->block_pointers_avail = 0;
 +#endif
 +		archive_entry_set_size(entry, file->pz_uncompressed_size);
 +	}
 +
 +	iso9660->previous_number = file->number;
 +	if (iso9660->seenJoliet) {
 +		memcpy(iso9660->utf16be_previous_path, iso9660->utf16be_path,
 +		    iso9660->utf16be_path_len);
 +		iso9660->utf16be_previous_path_len = iso9660->utf16be_path_len;
 +	} else
 +		archive_strcpy(
 +		    &iso9660->previous_pathname, iso9660->pathname.s);
 +
 +	/* Reset entry_bytes_remaining if the file is multi extent. */
 +	iso9660->entry_content = file->contents.first;
 +	if (iso9660->entry_content != NULL)
 +		iso9660->entry_bytes_remaining = iso9660->entry_content->size;
 +
 +	if (archive_entry_filetype(entry) == AE_IFDIR) {
 +		/* Overwrite nlinks by proper link number which is
 +		 * calculated from number of sub directories. */
 +		archive_entry_set_nlink(entry, 2 + file->subdirs);
 +		/* Directory data has been read completely. */
 +		iso9660->entry_bytes_remaining = 0;
 +	}
 +
 +	if (rd_r != ARCHIVE_OK)
 +		return (rd_r);
 +	return (ARCHIVE_OK);
 +}
 +
 +static int
 +archive_read_format_iso9660_read_data_skip(struct archive_read *a)
 +{
 +	/* Because read_next_header always does an explicit skip
 +	 * to the next entry, we don't need to do anything here. */
 +	(void)a; /* UNUSED */
 +	return (ARCHIVE_OK);
 +}
 +
 +#ifdef HAVE_ZLIB_H
 +
 +static int
 +zisofs_read_data(struct archive_read *a,
 +    const void **buff, size_t *size, int64_t *offset)
 +{
 +	struct iso9660 *iso9660;
 +	struct zisofs  *zisofs;
 +	const unsigned char *p;
 +	size_t avail;
 +	ssize_t bytes_read;
 +	size_t uncompressed_size;
 +	int r;
 +
 +	iso9660 = (struct iso9660 *)(a->format->data);
 +	zisofs = &iso9660->entry_zisofs;
 +
 +	p = __archive_read_ahead(a, 1, &bytes_read);
 +	if (bytes_read <= 0) {
 +		archive_set_error(&a->archive, ARCHIVE_ERRNO_FILE_FORMAT,
 +		    "Truncated zisofs file body");
 +		return (ARCHIVE_FATAL);
 +	}
 +	if (bytes_read > iso9660->entry_bytes_remaining)
 +		bytes_read = (ssize_t)iso9660->entry_bytes_remaining;
 +	avail = bytes_read;
 +	uncompressed_size = 0;
 +
 +	if (!zisofs->initialized) {
 +		size_t ceil, xsize;
 +
 +		/* Allocate block pointers buffer. */
 +		ceil = (size_t)((zisofs->pz_uncompressed_size +
 +			(((int64_t)1) << zisofs->pz_log2_bs) - 1)
 +			>> zisofs->pz_log2_bs);
 +		xsize = (ceil + 1) * 4;
 +		if (zisofs->block_pointers_alloc < xsize) {
 +			size_t alloc;
 +
 +			if (zisofs->block_pointers != NULL)
 +				free(zisofs->block_pointers);
 +			alloc = ((xsize >> 10) + 1) << 10;
 +			zisofs->block_pointers = malloc(alloc);
 +			if (zisofs->block_pointers == NULL) {
 +				archive_set_error(&a->archive, ENOMEM,
 +				    "No memory for zisofs decompression");
 +				return (ARCHIVE_FATAL);
 +			}
 +			zisofs->block_pointers_alloc = alloc;
 +		}
 +		zisofs->block_pointers_size = xsize;
 +
 +		/* Allocate uncompressed data buffer. */
 +		xsize = (size_t)1UL << zisofs->pz_log2_bs;
 +		if (zisofs->uncompressed_buffer_size < xsize) {
 +			if (zisofs->uncompressed_buffer != NULL)
 +				free(zisofs->uncompressed_buffer);
 +			zisofs->uncompressed_buffer = malloc(xsize);
 +			if (zisofs->uncompressed_buffer == NULL) {
 +				archive_set_error(&a->archive, ENOMEM,
 +				    "No memory for zisofs decompression");
 +				return (ARCHIVE_FATAL);
 +			}
 +		}
 +		zisofs->uncompressed_buffer_size = xsize;
 +
 +		/*
 +		 * Read the file header, and check the magic code of zisofs.
 +		 */
 +		if (zisofs->header_avail < sizeof(zisofs->header)) {
 +			xsize = sizeof(zisofs->header) - zisofs->header_avail;
 +			if (avail < xsize)
 +				xsize = avail;
 +			memcpy(zisofs->header + zisofs->header_avail, p, xsize);
 +			zisofs->header_avail += xsize;
 +			avail -= xsize;
 +			p += xsize;
 +		}
 +		if (!zisofs->header_passed &&
 +		    zisofs->header_avail == sizeof(zisofs->header)) {
 +			int err = 0;
 +
 +			if (memcmp(zisofs->header, zisofs_magic,
 +			    sizeof(zisofs_magic)) != 0)
 +				err = 1;
 +			if (archive_le32dec(zisofs->header + 8)
 +			    != zisofs->pz_uncompressed_size)
 +				err = 1;
 +			if (zisofs->header[12] != 4)
 +				err = 1;
 +			if (zisofs->header[13] != zisofs->pz_log2_bs)
 +				err = 1;
 +			if (err) {
 +				archive_set_error(&a->archive,
 +				    ARCHIVE_ERRNO_FILE_FORMAT,
 +				    "Illegal zisofs file body");
 +				return (ARCHIVE_FATAL);
 +			}
 +			zisofs->header_passed = 1;
 +		}
 +		/*
 +		 * Read block pointers.
 +		 */
 +		if (zisofs->header_passed &&
 +		    zisofs->block_pointers_avail < zisofs->block_pointers_size) {
 +			xsize = zisofs->block_pointers_size
 +			    - zisofs->block_pointers_avail;
 +			if (avail < xsize)
 +				xsize = avail;
 +			memcpy(zisofs->block_pointers
 +			    + zisofs->block_pointers_avail, p, xsize);
 +			zisofs->block_pointers_avail += xsize;
 +			avail -= xsize;
 +			p += xsize;
 +		    	if (zisofs->block_pointers_avail
 +			    == zisofs->block_pointers_size) {
 +				/* We've got all block pointers and initialize
 +				 * related variables.	*/
 +				zisofs->block_off = 0;
 +				zisofs->block_avail = 0;
 +				/* Complete a initialization */
 +				zisofs->initialized = 1;
 +			}
 +		}
 +
 +		if (!zisofs->initialized)
 +			goto next_data; /* We need more data. */
 +	}
 +
 +	/*
 +	 * Get block offsets from block pointers.
 +	 */
 +	if (zisofs->block_avail == 0) {
 +		uint32_t bst, bed;
 +
 +		if (zisofs->block_off + 4 >= zisofs->block_pointers_size) {
 +			/* There isn't a pair of offsets. */
 +			archive_set_error(&a->archive,
 +			    ARCHIVE_ERRNO_FILE_FORMAT,
 +			    "Illegal zisofs block pointers");
 +			return (ARCHIVE_FATAL);
 +		}
 +		bst = archive_le32dec(
 +		    zisofs->block_pointers + zisofs->block_off);
 +		if (bst != zisofs->pz_offset + (bytes_read - avail)) {
 +			/* TODO: Should we seek offset of current file
 +			 * by bst ? */
 +			archive_set_error(&a->archive,
 +			    ARCHIVE_ERRNO_FILE_FORMAT,
 +			    "Illegal zisofs block pointers(cannot seek)");
 +			return (ARCHIVE_FATAL);
 +		}
 +		bed = archive_le32dec(
 +		    zisofs->block_pointers + zisofs->block_off + 4);
 +		if (bed < bst) {
 +			archive_set_error(&a->archive,
 +			    ARCHIVE_ERRNO_FILE_FORMAT,
 +			    "Illegal zisofs block pointers");
 +			return (ARCHIVE_FATAL);
 +		}
 +		zisofs->block_avail = bed - bst;
 +		zisofs->block_off += 4;
 +
 +		/* Initialize compression library for new block. */
 +		if (zisofs->stream_valid)
 +			r = inflateReset(&zisofs->stream);
 +		else
 +			r = inflateInit(&zisofs->stream);
 +		if (r != Z_OK) {
 +			archive_set_error(&a->archive, ARCHIVE_ERRNO_MISC,
 +			    "Can't initialize zisofs decompression.");
 +			return (ARCHIVE_FATAL);
 +		}
 +		zisofs->stream_valid = 1;
 +		zisofs->stream.total_in = 0;
 +		zisofs->stream.total_out = 0;
 +	}
 +
 +	/*
 +	 * Make uncompressed data.
 +	 */
 +	if (zisofs->block_avail == 0) {
 +		memset(zisofs->uncompressed_buffer, 0,
 +		    zisofs->uncompressed_buffer_size);
 +		uncompressed_size = zisofs->uncompressed_buffer_size;
 +	} else {
 +		zisofs->stream.next_in = (Bytef *)(uintptr_t)(const void *)p;
 +		if (avail > zisofs->block_avail)
 +			zisofs->stream.avail_in = zisofs->block_avail;
 +		else
 +			zisofs->stream.avail_in = (uInt)avail;
 +		zisofs->stream.next_out = zisofs->uncompressed_buffer;
 +		zisofs->stream.avail_out =
 +		    (uInt)zisofs->uncompressed_buffer_size;
 +
 +		r = inflate(&zisofs->stream, 0);
 +		switch (r) {
 +		case Z_OK: /* Decompressor made some progress.*/
 +		case Z_STREAM_END: /* Found end of stream. */
 +			break;
 +		default:
 +			archive_set_error(&a->archive, ARCHIVE_ERRNO_MISC,
 +			    "zisofs decompression failed (%d)", r);
 +			return (ARCHIVE_FATAL);
 +		}
 +		uncompressed_size =
 +		    zisofs->uncompressed_buffer_size - zisofs->stream.avail_out;
 +		avail -= zisofs->stream.next_in - p;
 +		zisofs->block_avail -= (uint32_t)(zisofs->stream.next_in - p);
 +	}
 +next_data:
 +	bytes_read -= avail;
 +	*buff = zisofs->uncompressed_buffer;
 +	*size = uncompressed_size;
 +	*offset = iso9660->entry_sparse_offset;
 +	iso9660->entry_sparse_offset += uncompressed_size;
 +	iso9660->entry_bytes_remaining -= bytes_read;
 +	iso9660->current_position += bytes_read;
 +	zisofs->pz_offset += (uint32_t)bytes_read;
 +	iso9660->entry_bytes_unconsumed += bytes_read;
 +
 +	return (ARCHIVE_OK);
 +}
 +
 +#else /* HAVE_ZLIB_H */
 +
 +static int
 +zisofs_read_data(struct archive_read *a,
 +    const void **buff, size_t *size, int64_t *offset)
 +{
 +
 +	(void)buff;/* UNUSED */
 +	(void)size;/* UNUSED */
 +	(void)offset;/* UNUSED */
 +	archive_set_error(&a->archive, ARCHIVE_ERRNO_FILE_FORMAT,
 +	    "zisofs is not supported on this platform.");
 +	return (ARCHIVE_FAILED);
 +}
 +
 +#endif /* HAVE_ZLIB_H */
 +
 +static int
 +archive_read_format_iso9660_read_data(struct archive_read *a,
 +    const void **buff, size_t *size, int64_t *offset)
 +{
 +	ssize_t bytes_read;
 +	struct iso9660 *iso9660;
 +
 +	iso9660 = (struct iso9660 *)(a->format->data);
 +
 +	if (iso9660->entry_bytes_unconsumed) {
 +		__archive_read_consume(a, iso9660->entry_bytes_unconsumed);
 +		iso9660->entry_bytes_unconsumed = 0;
 +	}
 +
 +	if (iso9660->entry_bytes_remaining <= 0) {
 +		if (iso9660->entry_content != NULL)
 +			iso9660->entry_content = iso9660->entry_content->next;
 +		if (iso9660->entry_content == NULL) {
 +			*buff = NULL;
 +			*size = 0;
 +			*offset = iso9660->entry_sparse_offset;
 +			return (ARCHIVE_EOF);
 +		}
 +		/* Seek forward to the start of the entry. */
 +		if (iso9660->current_position < iso9660->entry_content->offset) {
 +			int64_t step;
 +
 +			step = iso9660->entry_content->offset -
 +			    iso9660->current_position;
 +			step = __archive_read_consume(a, step);
 +			if (step < 0)
 +				return ((int)step);
 +			iso9660->current_position =
 +			    iso9660->entry_content->offset;
 +		}
 +		if (iso9660->entry_content->offset < iso9660->current_position) {
 +			archive_set_error(&a->archive, ARCHIVE_ERRNO_MISC,
 +			    "Ignoring out-of-order file (%s) %jd < %jd",
 +			    iso9660->pathname.s,
 +			    (intmax_t)iso9660->entry_content->offset,
 +			    (intmax_t)iso9660->current_position);
 +			*buff = NULL;
 +			*size = 0;
 +			*offset = iso9660->entry_sparse_offset;
 +			return (ARCHIVE_WARN);
 +		}
 +		iso9660->entry_bytes_remaining = iso9660->entry_content->size;
 +	}
 +	if (iso9660->entry_zisofs.pz)
 +		return (zisofs_read_data(a, buff, size, offset));
 +
 +	*buff = __archive_read_ahead(a, 1, &bytes_read);
 +	if (bytes_read == 0)
 +		archive_set_error(&a->archive, ARCHIVE_ERRNO_MISC,
 +		    "Truncated input file");
 +	if (*buff == NULL)
 +		return (ARCHIVE_FATAL);
 +	if (bytes_read > iso9660->entry_bytes_remaining)
 +		bytes_read = (ssize_t)iso9660->entry_bytes_remaining;
 +	*size = bytes_read;
 +	*offset = iso9660->entry_sparse_offset;
 +	iso9660->entry_sparse_offset += bytes_read;
 +	iso9660->entry_bytes_remaining -= bytes_read;
 +	iso9660->entry_bytes_unconsumed = bytes_read;
 +	iso9660->current_position += bytes_read;
 +	return (ARCHIVE_OK);
 +}
 +
 +static int
 +archive_read_format_iso9660_cleanup(struct archive_read *a)
 +{
 +	struct iso9660 *iso9660;
 +	int r = ARCHIVE_OK;
 +
 +	iso9660 = (struct iso9660 *)(a->format->data);
 +	release_files(iso9660);
 +	free(iso9660->read_ce_req.reqs);
 +	archive_string_free(&iso9660->pathname);
 +	archive_string_free(&iso9660->previous_pathname);
 +	if (iso9660->pending_files.files)
 +		free(iso9660->pending_files.files);
 +#ifdef HAVE_ZLIB_H
 +	free(iso9660->entry_zisofs.uncompressed_buffer);
 +	free(iso9660->entry_zisofs.block_pointers);
 +	if (iso9660->entry_zisofs.stream_valid) {
 +		if (inflateEnd(&iso9660->entry_zisofs.stream) != Z_OK) {
 +			archive_set_error(&a->archive, ARCHIVE_ERRNO_MISC,
 +			    "Failed to clean up zlib decompressor");
 +			r = ARCHIVE_FATAL;
 +		}
 +	}
 +#endif
 +	free(iso9660->utf16be_path);
 +	free(iso9660->utf16be_previous_path);
 +	free(iso9660);
 +	(a->format->data) = NULL;
 +	return (r);
 +}
 +
 +/*
 + * This routine parses a single ISO directory record, makes sense
 + * of any extensions, and stores the result in memory.
 + */
 +static struct file_info *
 +parse_file_info(struct archive_read *a, struct file_info *parent,
 +    const unsigned char *isodirrec)
 +{
 +	struct iso9660 *iso9660;
 +	struct file_info *file, *filep;
 +	size_t name_len;
 +	const unsigned char *rr_start, *rr_end;
 +	const unsigned char *p;
 +	size_t dr_len;
 +	uint64_t fsize, offset;
 +	int32_t location;
 +	int flags;
 +
 +	iso9660 = (struct iso9660 *)(a->format->data);
 +
 +	dr_len = (size_t)isodirrec[DR_length_offset];
 +	name_len = (size_t)isodirrec[DR_name_len_offset];
 +	location = archive_le32dec(isodirrec + DR_extent_offset);
 +	fsize = toi(isodirrec + DR_size_offset, DR_size_size);
 +	/* Sanity check that dr_len needs at least 34. */
 +	if (dr_len < 34) {
 +		archive_set_error(&a->archive, ARCHIVE_ERRNO_MISC,
 +		    "Invalid length of directory record");
 +		return (NULL);
 +	}
 +	/* Sanity check that name_len doesn't exceed dr_len. */
 +	if (dr_len - 33 < name_len || name_len == 0) {
 +		archive_set_error(&a->archive, ARCHIVE_ERRNO_MISC,
 +		    "Invalid length of file identifier");
 +		return (NULL);
 +	}
 +	/* Sanity check that location doesn't exceed volume block.
 +	 * Don't check lower limit of location; it's possibility
 +	 * the location has negative value when file type is symbolic
 +	 * link or file size is zero. As far as I know latest mkisofs
 +	 * do that.
 +	 */
 +	if (location > 0 &&
 +	    (location + ((fsize + iso9660->logical_block_size -1)
 +	       / iso9660->logical_block_size))
 +			> (uint32_t)iso9660->volume_block) {
 +		archive_set_error(&a->archive, ARCHIVE_ERRNO_MISC,
 +		    "Invalid location of extent of file");
 +		return (NULL);
 +	}
 +	/* Sanity check that location doesn't have a negative value
 +	 * when the file is not empty. it's too large. */
 +	if (fsize != 0 && location < 0) {
 +		archive_set_error(&a->archive, ARCHIVE_ERRNO_MISC,
 +		    "Invalid location of extent of file");
 +		return (NULL);
 +	}
 +
 +	/* Sanity check that this entry does not create a cycle. */
 +	offset = iso9660->logical_block_size * (uint64_t)location;
 +	for (filep = parent; filep != NULL; filep = filep->parent) {
 +		if (filep->offset == offset) {
 +			archive_set_error(&a->archive, ARCHIVE_ERRNO_FILE_FORMAT,
 +			    "Directory structure contains loop");
 +			return (NULL);
 +		}
 +	}
 +
 +	/* Create a new file entry and copy data from the ISO dir record. */
 +	file = (struct file_info *)calloc(1, sizeof(*file));
 +	if (file == NULL) {
 +		archive_set_error(&a->archive, ENOMEM,
 +		    "No memory for file entry");
 +		return (NULL);
 +	}
 +	file->parent = parent;
 +	file->offset = offset;
 +	file->size = fsize;
 +	file->mtime = isodate7(isodirrec + DR_date_offset);
 +	file->ctime = file->atime = file->mtime;
 +	file->rede_files.first = NULL;
 +	file->rede_files.last = &(file->rede_files.first);
 +
 +	p = isodirrec + DR_name_offset;
 +	/* Rockridge extensions (if any) follow name.  Compute this
 +	 * before fidgeting the name_len below. */
 +	rr_start = p + name_len + (name_len & 1 ? 0 : 1);
 +	rr_end = isodirrec + dr_len;
 +
 +	if (iso9660->seenJoliet) {
 +		/* Joliet names are max 64 chars (128 bytes) according to spec,
 +		 * but genisoimage/mkisofs allows recording longer Joliet
 +		 * names which are 103 UCS2 characters(206 bytes) by their
 +		 * option '-joliet-long'.
 +		 */
 +		if (name_len > 206)
 +			name_len = 206;
 +		name_len &= ~1;
 +
 +		/* trim trailing first version and dot from filename.
 +		 *
 +		 * Remember we were in UTF-16BE land!
 +		 * SEPARATOR 1 (.) and SEPARATOR 2 (;) are both
 +		 * 16 bits big endian characters on Joliet.
 +		 *
 +		 * TODO: sanitize filename?
 +		 *       Joliet allows any UCS-2 char except:
 +		 *       *, /, :, ;, ? and \.
 +		 */
 +		/* Chop off trailing ';1' from files. */
 +		if (name_len > 4 && p[name_len-4] == 0 && p[name_len-3] == ';'
 +		    && p[name_len-2] == 0 && p[name_len-1] == '1')
 +			name_len -= 4;
 +#if 0 /* XXX: this somehow manages to strip of single-character file extensions, like '.c'. */
 +		/* Chop off trailing '.' from filenames. */
 +		if (name_len > 2 && p[name_len-2] == 0 && p[name_len-1] == '.')
 +			name_len -= 2;
 +#endif
 +		if ((file->utf16be_name = malloc(name_len)) == NULL) {
 +			archive_set_error(&a->archive, ENOMEM,
 +			    "No memory for file name");
- 			return (NULL);
++			goto fail;
 +		}
 +		memcpy(file->utf16be_name, p, name_len);
 +		file->utf16be_bytes = name_len;
 +	} else {
 +		/* Chop off trailing ';1' from files. */
 +		if (name_len > 2 && p[name_len - 2] == ';' &&
 +				p[name_len - 1] == '1')
 +			name_len -= 2;
 +		/* Chop off trailing '.' from filenames. */
 +		if (name_len > 1 && p[name_len - 1] == '.')
 +			--name_len;
 +
 +		archive_strncpy(&file->name, (const char *)p, name_len);
 +	}
 +
 +	flags = isodirrec[DR_flags_offset];
 +	if (flags & 0x02)
 +		file->mode = AE_IFDIR | 0700;
 +	else
 +		file->mode = AE_IFREG | 0400;
 +	if (flags & 0x80)
 +		file->multi_extent = 1;
 +	else
 +		file->multi_extent = 0;
 +	/*
 +	 * Use a location for the file number, which is treated as an inode
 +	 * number to find out hardlink target. If Rockridge extensions is
 +	 * being used, the file number will be overwritten by FILE SERIAL
 +	 * NUMBER of RRIP "PX" extension.
 +	 * Note: Old mkisofs did not record that FILE SERIAL NUMBER
 +	 * in ISO images.
 +	 * Note2: xorriso set 0 to the location of a symlink file. 
 +	 */
 +	if (file->size == 0 && location >= 0) {
 +		/* If file->size is zero, its location points wrong place,
 +		 * and so we should not use it for the file number.
 +		 * When the location has negative value, it can be used
 +		 * for the file number.
 +		 */
 +		file->number = -1;
 +		/* Do not appear before any directory entries. */
 +		file->offset = -1;
 +	} else
 +		file->number = (int64_t)(uint32_t)location;
 +
 +	/* Rockridge extensions overwrite information from above. */
 +	if (iso9660->opt_support_rockridge) {
 +		if (parent == NULL && rr_end - rr_start >= 7) {
 +			p = rr_start;
 +			if (memcmp(p, "SP\x07\x01\xbe\xef", 6) == 0) {
 +				/*
 +				 * SP extension stores the suspOffset
 +				 * (Number of bytes to skip between
 +				 * filename and SUSP records.)
 +				 * It is mandatory by the SUSP standard
 +				 * (IEEE 1281).
 +				 *
 +				 * It allows SUSP to coexist with
 +				 * non-SUSP uses of the System
 +				 * Use Area by placing non-SUSP data
 +				 * before SUSP data.
 +				 *
 +				 * SP extension must be in the root
 +				 * directory entry, disable all SUSP
 +				 * processing if not found.
 +				 */
 +				iso9660->suspOffset = p[6];
 +				iso9660->seenSUSP = 1;
 +				rr_start += 7;
 +			}
 +		}
 +		if (iso9660->seenSUSP) {
 +			int r;
 +
 +			file->name_continues = 0;
 +			file->symlink_continues = 0;
 +			rr_start += iso9660->suspOffset;
 +			r = parse_rockridge(a, file, rr_start, rr_end);
- 			if (r != ARCHIVE_OK) {
- 				free(file);
- 				return (NULL);
- 			}
++			if (r != ARCHIVE_OK)
++				goto fail;
 +			/*
 +			 * A file size of symbolic link files in ISO images
 +			 * made by makefs is not zero and its location is
 +			 * the same as those of next regular file. That is
 +			 * the same as hard like file and it causes unexpected
 +			 * error. 
 +			 */
 +			if (file->size > 0 &&
 +			    (file->mode & AE_IFMT) == AE_IFLNK) {
 +				file->size = 0;
 +				file->number = -1;
 +				file->offset = -1;
 +			}
 +		} else
 +			/* If there isn't SUSP, disable parsing
 +			 * rock ridge extensions. */
 +			iso9660->opt_support_rockridge = 0;
 +	}
 +
 +	file->nlinks = 1;/* Reset nlink. we'll calculate it later. */
 +	/* Tell file's parent how many children that parent has. */
 +	if (parent != NULL && (flags & 0x02))
 +		parent->subdirs++;
 +
 +	if (iso9660->seenRockridge) {
 +		if (parent != NULL && parent->parent == NULL &&
 +		    (flags & 0x02) && iso9660->rr_moved == NULL &&
 +		    file->name.s &&
 +		    (strcmp(file->name.s, "rr_moved") == 0 ||
 +		     strcmp(file->name.s, ".rr_moved") == 0)) {
 +			iso9660->rr_moved = file;
 +			file->rr_moved = 1;
 +			file->rr_moved_has_re_only = 1;
 +			file->re = 0;
 +			parent->subdirs--;
 +		} else if (file->re) {
 +			/*
 +			 * Sanity check: file's parent is rr_moved.
 +			 */
 +			if (parent == NULL || parent->rr_moved == 0) {
 +				archive_set_error(&a->archive,
 +				    ARCHIVE_ERRNO_MISC,
 +				    "Invalid Rockridge RE");
- 				return (NULL);
++				goto fail;
 +			}
 +			/*
 +			 * Sanity check: file does not have "CL" extension.
 +			 */
 +			if (file->cl_offset) {
 +				archive_set_error(&a->archive,
 +				    ARCHIVE_ERRNO_MISC,
 +				    "Invalid Rockridge RE and CL");
- 				return (NULL);
++				goto fail;
 +			}
 +			/*
 +			 * Sanity check: The file type must be a directory.
 +			 */
 +			if ((flags & 0x02) == 0) {
 +				archive_set_error(&a->archive,
 +				    ARCHIVE_ERRNO_MISC,
 +				    "Invalid Rockridge RE");
- 				return (NULL);
++				goto fail;
 +			}
 +		} else if (parent != NULL && parent->rr_moved)
 +			file->rr_moved_has_re_only = 0;
 +		else if (parent != NULL && (flags & 0x02) &&
 +		    (parent->re || parent->re_descendant))
 +			file->re_descendant = 1;
 +		if (file->cl_offset) {
 +			struct file_info *r;
 +
 +			if (parent == NULL || parent->parent == NULL) {
 +				archive_set_error(&a->archive,
 +				    ARCHIVE_ERRNO_MISC,
 +				    "Invalid Rockridge CL");
- 				return (NULL);
++				goto fail;
 +			}
 +			/*
 +			 * Sanity check: The file type must be a regular file.
 +			 */
 +			if ((flags & 0x02) != 0) {
 +				archive_set_error(&a->archive,
 +				    ARCHIVE_ERRNO_MISC,
 +				    "Invalid Rockridge CL");
- 				return (NULL);
++				goto fail;
 +			}
 +			parent->subdirs++;
 +			/* Overwrite an offset and a number of this "CL" entry
 +			 * to appear before other dirs. "+1" to those is to
 +			 * make sure to appear after "RE" entry which this
 +			 * "CL" entry should be connected with. */
 +			file->offset = file->number = file->cl_offset + 1;
 +
 +			/*
 +			 * Sanity check: cl_offset does not point at its
 +			 * the parents or itself.
 +			 */
 +			for (r = parent; r; r = r->parent) {
 +				if (r->offset == file->cl_offset) {
 +					archive_set_error(&a->archive,
 +					    ARCHIVE_ERRNO_MISC,
 +					    "Invalid Rockridge CL");
- 					return (NULL);
++					goto fail;
 +				}
 +			}
 +			if (file->cl_offset == file->offset ||
 +			    parent->rr_moved) {
 +				archive_set_error(&a->archive,
 +				    ARCHIVE_ERRNO_MISC,
 +				    "Invalid Rockridge CL");
- 				return (NULL);
++				goto fail;
 +			}
 +		}
 +	}
 +
 +#if DEBUG
 +	/* DEBUGGING: Warn about attributes I don't yet fully support. */
 +	if ((flags & ~0x02) != 0) {
 +		fprintf(stderr, "\n ** Unrecognized flag: ");
 +		dump_isodirrec(stderr, isodirrec);
 +		fprintf(stderr, "\n");
 +	} else if (toi(isodirrec + DR_volume_sequence_number_offset, 2) != 1) {
 +		fprintf(stderr, "\n ** Unrecognized sequence number: ");
 +		dump_isodirrec(stderr, isodirrec);
 +		fprintf(stderr, "\n");
 +	} else if (*(isodirrec + DR_file_unit_size_offset) != 0) {
 +		fprintf(stderr, "\n ** Unexpected file unit size: ");
 +		dump_isodirrec(stderr, isodirrec);
 +		fprintf(stderr, "\n");
 +	} else if (*(isodirrec + DR_interleave_offset) != 0) {
 +		fprintf(stderr, "\n ** Unexpected interleave: ");
 +		dump_isodirrec(stderr, isodirrec);
 +		fprintf(stderr, "\n");
 +	} else if (*(isodirrec + DR_ext_attr_length_offset) != 0) {
 +		fprintf(stderr, "\n ** Unexpected extended attribute length: ");
 +		dump_isodirrec(stderr, isodirrec);
 +		fprintf(stderr, "\n");
 +	}
 +#endif
 +	register_file(iso9660, file);
 +	return (file);
++fail:
++	archive_string_free(&file->name);
++	free(file);
++	return (NULL);
 +}
 +
 +static int
 +parse_rockridge(struct archive_read *a, struct file_info *file,
 +    const unsigned char *p, const unsigned char *end)
 +{
 +	struct iso9660 *iso9660;
 +
 +	iso9660 = (struct iso9660 *)(a->format->data);
 +
 +	while (p + 4 <= end  /* Enough space for another entry. */
 +	    && p[0] >= 'A' && p[0] <= 'Z' /* Sanity-check 1st char of name. */
 +	    && p[1] >= 'A' && p[1] <= 'Z' /* Sanity-check 2nd char of name. */
 +	    && p[2] >= 4 /* Sanity-check length. */
 +	    && p + p[2] <= end) { /* Sanity-check length. */
 +		const unsigned char *data = p + 4;
 +		int data_length = p[2] - 4;
 +		int version = p[3];
 +
 +		switch(p[0]) {
 +		case 'C':
 +			if (p[1] == 'E') {
 +				if (version == 1 && data_length == 24) {
 +					/*
 +					 * CE extension comprises:
 +					 *   8 byte sector containing extension
 +					 *   8 byte offset w/in above sector
 +					 *   8 byte length of continuation
 +					 */
 +					int32_t location =
 +					    archive_le32dec(data);
 +					file->ce_offset =
 +					    archive_le32dec(data+8);
 +					file->ce_size =
 +					    archive_le32dec(data+16);
 +					if (register_CE(a, location, file)
 +					    != ARCHIVE_OK)
 +						return (ARCHIVE_FATAL);
 +				}
 +			}
 +			else if (p[1] == 'L') {
 +				if (version == 1 && data_length == 8) {
 +					file->cl_offset = (uint64_t)
 +					    iso9660->logical_block_size *
 +					    (uint64_t)archive_le32dec(data);
 +					iso9660->seenRockridge = 1;
 +				}
 +			}
 +			break;
 +		case 'N':
 +			if (p[1] == 'M') {
 +				if (version == 1) {
 +					parse_rockridge_NM1(file,
 +					    data, data_length);
 +					iso9660->seenRockridge = 1;
 +				}
 +			}
 +			break;
 +		case 'P':
 +			/*
 +			 * PD extension is padding;
 +			 * contents are always ignored.
 +			 *
 +			 * PL extension won't appear;
 +			 * contents are always ignored.
 +			 */
 +			if (p[1] == 'N') {
 +				if (version == 1 && data_length == 16) {
 +					file->rdev = toi(data,4);
 +					file->rdev <<= 32;
 +					file->rdev |= toi(data + 8, 4);
 +					iso9660->seenRockridge = 1;
 +				}
 +			}
 +			else if (p[1] == 'X') {
 +				/*
 +				 * PX extension comprises:
 +				 *   8 bytes for mode,
 +				 *   8 bytes for nlinks,
 +				 *   8 bytes for uid,
 +				 *   8 bytes for gid,
 +				 *   8 bytes for inode.
 +				 */
 +				if (version == 1) {
 +					if (data_length >= 8)
 +						file->mode
 +						    = toi(data, 4);
 +					if (data_length >= 16)
 +						file->nlinks
 +						    = toi(data + 8, 4);
 +					if (data_length >= 24)
 +						file->uid
 +						    = toi(data + 16, 4);
 +					if (data_length >= 32)
 +						file->gid
 +						    = toi(data + 24, 4);
 +					if (data_length >= 40)
 +						file->number
 +						    = toi(data + 32, 4);
 +					iso9660->seenRockridge = 1;
 +				}
 +			}
 +			break;
 +		case 'R':
 +			if (p[1] == 'E' && version == 1) {
 +				file->re = 1;
 +				iso9660->seenRockridge = 1;
 +			}
 +			else if (p[1] == 'R' && version == 1) {
 +				/*
 +				 * RR extension comprises:
 +				 *    one byte flag value
 +				 * This extension is obsolete,
 +				 * so contents are always ignored.
 +				 */
 +			}
 +			break;
 +		case 'S':
 +			if (p[1] == 'L') {
 +				if (version == 1) {
 +					parse_rockridge_SL1(file,
 +					    data, data_length);
 +					iso9660->seenRockridge = 1;
 +				}
 +			}
 +			else if (p[1] == 'T'
 +			    && data_length == 0 && version == 1) {
 +				/*
 +				 * ST extension marks end of this
 +				 * block of SUSP entries.
 +				 *
 +				 * It allows SUSP to coexist with
 +				 * non-SUSP uses of the System
 +				 * Use Area by placing non-SUSP data
 +				 * after SUSP data.
 +				 */
 +				iso9660->seenSUSP = 0;
 +				iso9660->seenRockridge = 0;
 +				return (ARCHIVE_OK);
 +			}
 +			break;
 +		case 'T':
 +			if (p[1] == 'F') {
 +				if (version == 1) {
 +					parse_rockridge_TF1(file,
 +					    data, data_length);
 +					iso9660->seenRockridge = 1;
 +				}
 +			}
 +			break;
 +		case 'Z':
 +			if (p[1] == 'F') {
 +				if (version == 1)
 +					parse_rockridge_ZF1(file,
 +					    data, data_length);
 +			}
 +			break;
 +		default:
 +			break;
 +		}
 +
 +		p += p[2];
 +	}
 +	return (ARCHIVE_OK);
 +}
 +
 +static int
 +register_CE(struct archive_read *a, int32_t location,
 +    struct file_info *file)
 +{
 +	struct iso9660 *iso9660;
 +	struct read_ce_queue *heap;
 +	struct read_ce_req *p;
 +	uint64_t offset, parent_offset;
 +	int hole, parent;
 +
 +	iso9660 = (struct iso9660 *)(a->format->data);
 +	offset = ((uint64_t)location) * (uint64_t)iso9660->logical_block_size;
 +	if (((file->mode & AE_IFMT) == AE_IFREG &&
 +	    offset >= file->offset) ||
 +	    offset < iso9660->current_position ||
 +	    (((uint64_t)file->ce_offset) + file->ce_size)
 +	      > (uint64_t)iso9660->logical_block_size ||
 +	    offset + file->ce_offset + file->ce_size
 +		  > iso9660->volume_size) {
 +		archive_set_error(&a->archive, ARCHIVE_ERRNO_MISC,
 +		    "Invalid parameter in SUSP \"CE\" extension");
 +		return (ARCHIVE_FATAL);
 +	}
 +
 +	/* Expand our CE list as necessary. */
 +	heap = &(iso9660->read_ce_req);
 +	if (heap->cnt >= heap->allocated) {
 +		int new_size;
 +
 +		if (heap->allocated < 16)
 +			new_size = 16;
 +		else
 +			new_size = heap->allocated * 2;
 +		/* Overflow might keep us from growing the list. */
 +		if (new_size <= heap->allocated) {
 +			archive_set_error(&a->archive, ENOMEM, "Out of memory");
 +			return (ARCHIVE_FATAL);
 +		}
 +		p = calloc(new_size, sizeof(p[0]));
 +		if (p == NULL) {
 +			archive_set_error(&a->archive, ENOMEM, "Out of memory");
 +			return (ARCHIVE_FATAL);
 +		}
 +		if (heap->reqs != NULL) {
 +			memcpy(p, heap->reqs, heap->cnt * sizeof(*p));
 +			free(heap->reqs);
 +		}
 +		heap->reqs = p;
 +		heap->allocated = new_size;
 +	}
 +
 +	/*
 +	 * Start with hole at end, walk it up tree to find insertion point.
 +	 */
 +	hole = heap->cnt++;
 +	while (hole > 0) {
 +		parent = (hole - 1)/2;
 +		parent_offset = heap->reqs[parent].offset;
 +		if (offset >= parent_offset) {
 +			heap->reqs[hole].offset = offset;
 +			heap->reqs[hole].file = file;
 +			return (ARCHIVE_OK);
 +		}
 +		/* Move parent into hole <==> move hole up tree. */
 +		heap->reqs[hole] = heap->reqs[parent];
 +		hole = parent;
 +	}
 +	heap->reqs[0].offset = offset;
 +	heap->reqs[0].file = file;
 +	return (ARCHIVE_OK);
 +}
 +
 +static void
 +next_CE(struct read_ce_queue *heap)
 +{
 +	uint64_t a_offset, b_offset, c_offset;
 +	int a, b, c;
 +	struct read_ce_req tmp;
 +
 +	if (heap->cnt < 1)
 +		return;
 +
 +	/*
 +	 * Move the last item in the heap to the root of the tree
 +	 */
 +	heap->reqs[0] = heap->reqs[--(heap->cnt)];
 +
 +	/*
 +	 * Rebalance the heap.
 +	 */
 +	a = 0; /* Starting element and its offset */
 +	a_offset = heap->reqs[a].offset;
 +	for (;;) {
 +		b = a + a + 1; /* First child */
 +		if (b >= heap->cnt)
 +			return;
 +		b_offset = heap->reqs[b].offset;
 +		c = b + 1; /* Use second child if it is smaller. */
 +		if (c < heap->cnt) {
 +			c_offset = heap->reqs[c].offset;
 +			if (c_offset < b_offset) {
 +				b = c;
 +				b_offset = c_offset;
 +			}
 +		}
 +		if (a_offset <= b_offset)
 +			return;
 +		tmp = heap->reqs[a];
 +		heap->reqs[a] = heap->reqs[b];
 +		heap->reqs[b] = tmp;
 +		a = b;
 +	}
 +}
 +
 +
 +static int
 +read_CE(struct archive_read *a, struct iso9660 *iso9660)
 +{
 +	struct read_ce_queue *heap;
 +	const unsigned char *b, *p, *end;
 +	struct file_info *file;
 +	size_t step;
 +	int r;
 +
 +	/* Read data which RRIP "CE" extension points. */
 +	heap = &(iso9660->read_ce_req);
 +	step = iso9660->logical_block_size;
 +	while (heap->cnt &&
 +	    heap->reqs[0].offset == iso9660->current_position) {
 +		b = __archive_read_ahead(a, step, NULL);
 +		if (b == NULL) {
 +			archive_set_error(&a->archive,
 +			    ARCHIVE_ERRNO_MISC,
 +			    "Failed to read full block when scanning "
 +			    "ISO9660 directory list");
 +			return (ARCHIVE_FATAL);
 +		}
 +		do {
 +			file = heap->reqs[0].file;
 +			if (file->ce_offset + file->ce_size > step) {
 +				archive_set_error(&a->archive,
 +				    ARCHIVE_ERRNO_FILE_FORMAT,
 +				    "Malformed CE information");
 +				return (ARCHIVE_FATAL);
 +			}
 +			p = b + file->ce_offset;
 +			end = p + file->ce_size;
 +			next_CE(heap);
 +			r = parse_rockridge(a, file, p, end);
 +			if (r != ARCHIVE_OK)
 +				return (ARCHIVE_FATAL);
 +		} while (heap->cnt &&
 +		    heap->reqs[0].offset == iso9660->current_position);
- 		/* NOTE: Do not move this consume's code to fron of
++		/* NOTE: Do not move this consume's code to front of
 +		 * do-while loop. Registration of nested CE extension
 +		 * might cause error because of current position. */
 +		__archive_read_consume(a, step);
 +		iso9660->current_position += step;
 +	}
 +	return (ARCHIVE_OK);
 +}
 +
 +static void
 +parse_rockridge_NM1(struct file_info *file,
 +		    const unsigned char *data, int data_length)
 +{
 +	if (!file->name_continues)
 +		archive_string_empty(&file->name);
 +	file->name_continues = 0;
 +	if (data_length < 1)
 +		return;
 +	/*
 +	 * NM version 1 extension comprises:
 +	 *   1 byte flag, value is one of:
 +	 *     = 0: remainder is name
 +	 *     = 1: remainder is name, next NM entry continues name
 +	 *     = 2: "."
 +	 *     = 4: ".."
 +	 *     = 32: Implementation specific
 +	 *     All other values are reserved.
 +	 */
 +	switch(data[0]) {
 +	case 0:
 +		if (data_length < 2)
 +			return;
 +		archive_strncat(&file->name,
 +		    (const char *)data + 1, data_length - 1);
 +		break;
 +	case 1:
 +		if (data_length < 2)
 +			return;
 +		archive_strncat(&file->name,
 +		    (const char *)data + 1, data_length - 1);
 +		file->name_continues = 1;
 +		break;
 +	case 2:
 +		archive_strcat(&file->name, ".");
 +		break;
 +	case 4:
 +		archive_strcat(&file->name, "..");
 +		break;
 +	default:
 +		return;
 +	}
 +
 +}
 +
 +static void
 +parse_rockridge_TF1(struct file_info *file, const unsigned char *data,
 +    int data_length)
 +{
 +	char flag;
 +	/*
 +	 * TF extension comprises:
 +	 *   one byte flag
 +	 *   create time (optional)
 +	 *   modify time (optional)
 +	 *   access time (optional)
 +	 *   attribute time (optional)
 +	 *  Time format and presence of fields
 +	 *  is controlled by flag bits.
 +	 */
 +	if (data_length < 1)
 +		return;
 +	flag = data[0];
 +	++data;
 +	--data_length;
 +	if (flag & 0x80) {
 +		/* Use 17-byte time format. */
 +		if ((flag & 1) && data_length >= 17) {
 +			/* Create time. */
 +			file->birthtime_is_set = 1;
 +			file->birthtime = isodate17(data);
 +			data += 17;
 +			data_length -= 17;
 +		}
 +		if ((flag & 2) && data_length >= 17) {
 +			/* Modify time. */
 +			file->mtime = isodate17(data);
 +			data += 17;
 +			data_length -= 17;
 +		}
 +		if ((flag & 4) && data_length >= 17) {
 +			/* Access time. */
 +			file->atime = isodate17(data);
 +			data += 17;
 +			data_length -= 17;
 +		}
 +		if ((flag & 8) && data_length >= 17) {
 +			/* Attribute change time. */
 +			file->ctime = isodate17(data);
 +		}
 +	} else {
 +		/* Use 7-byte time format. */
 +		if ((flag & 1) && data_length >= 7) {
 +			/* Create time. */
 +			file->birthtime_is_set = 1;
 +			file->birthtime = isodate7(data);
 +			data += 7;
 +			data_length -= 7;
 +		}
 +		if ((flag & 2) && data_length >= 7) {
 +			/* Modify time. */
 +			file->mtime = isodate7(data);
 +			data += 7;
 +			data_length -= 7;
 +		}
 +		if ((flag & 4) && data_length >= 7) {
 +			/* Access time. */
 +			file->atime = isodate7(data);
 +			data += 7;
 +			data_length -= 7;
 +		}
 +		if ((flag & 8) && data_length >= 7) {
 +			/* Attribute change time. */
 +			file->ctime = isodate7(data);
 +		}
 +	}
 +}
 +
 +static void
 +parse_rockridge_SL1(struct file_info *file, const unsigned char *data,
 +    int data_length)
 +{
 +	const char *separator = "";
 +
 +	if (!file->symlink_continues || file->symlink.length < 1)
 +		archive_string_empty(&file->symlink);
 +	file->symlink_continues = 0;
 +
 +	/*
 +	 * Defined flag values:
 +	 *  0: This is the last SL record for this symbolic link
 +	 *  1: this symbolic link field continues in next SL entry
 +	 *  All other values are reserved.
 +	 */
 +	if (data_length < 1)
 +		return;
 +	switch(*data) {
 +	case 0:
 +		break;
 +	case 1:
 +		file->symlink_continues = 1;
 +		break;
 +	default:
 +		return;
 +	}
 +	++data;  /* Skip flag byte. */
 +	--data_length;
 +
 +	/*
 +	 * SL extension body stores "components".
 +	 * Basically, this is a complicated way of storing
 +	 * a POSIX path.  It also interferes with using
 +	 * symlinks for storing non-path data. <sigh>
 +	 *
 +	 * Each component is 2 bytes (flag and length)
 +	 * possibly followed by name data.
 +	 */
 +	while (data_length >= 2) {
 +		unsigned char flag = *data++;
 +		unsigned char nlen = *data++;
 +		data_length -= 2;
 +
 +		archive_strcat(&file->symlink, separator);
 +		separator = "/";
 +
 +		switch(flag) {
 +		case 0: /* Usual case, this is text. */
 +			if (data_length < nlen)
 +				return;
 +			archive_strncat(&file->symlink,
 +			    (const char *)data, nlen);
 +			break;
 +		case 0x01: /* Text continues in next component. */
 +			if (data_length < nlen)
 +				return;
 +			archive_strncat(&file->symlink,
 +			    (const char *)data, nlen);
 +			separator = "";
 +			break;
 +		case 0x02: /* Current dir. */
 +			archive_strcat(&file->symlink, ".");
 +			break;
 +		case 0x04: /* Parent dir. */
 +			archive_strcat(&file->symlink, "..");
 +			break;
 +		case 0x08: /* Root of filesystem. */
 +			archive_strcat(&file->symlink, "/");
 +			separator = "";
 +			break;
 +		case 0x10: /* Undefined (historically "volume root" */
 +			archive_string_empty(&file->symlink);
 +			archive_strcat(&file->symlink, "ROOT");
 +			break;
 +		case 0x20: /* Undefined (historically "hostname") */
 +			archive_strcat(&file->symlink, "hostname");
 +			break;
 +		default:
 +			/* TODO: issue a warning ? */
 +			return;
 +		}
 +		data += nlen;
 +		data_length -= nlen;
 +	}
 +}
 +
 +static void
 +parse_rockridge_ZF1(struct file_info *file, const unsigned char *data,
 +    int data_length)
 +{
 +
 +	if (data[0] == 0x70 && data[1] == 0x7a && data_length == 12) {
 +		/* paged zlib */
 +		file->pz = 1;
 +		file->pz_log2_bs = data[3];
 +		file->pz_uncompressed_size = archive_le32dec(&data[4]);
 +	}
 +}
 +
 +static void
 +register_file(struct iso9660 *iso9660, struct file_info *file)
 +{
 +
 +	file->use_next = iso9660->use_files;
 +	iso9660->use_files = file;
 +}
 +
 +static void
 +release_files(struct iso9660 *iso9660)
 +{
 +	struct content *con, *connext;
 +	struct file_info *file;
 +
 +	file = iso9660->use_files;
 +	while (file != NULL) {
 +		struct file_info *next = file->use_next;
 +
 +		archive_string_free(&file->name);
 +		archive_string_free(&file->symlink);
 +		free(file->utf16be_name);
 +		con = file->contents.first;
 +		while (con != NULL) {
 +			connext = con->next;
 +			free(con);
 +			con = connext;
 +		}
 +		free(file);
 +		file = next;
 +	}
 +}
 +
 +static int
 +next_entry_seek(struct archive_read *a, struct iso9660 *iso9660,
 +    struct file_info **pfile)
 +{
 +	struct file_info *file;
 +	int r;
 +
 +	r = next_cache_entry(a, iso9660, pfile);
 +	if (r != ARCHIVE_OK)
 +		return (r);
 +	file = *pfile;
 +
 +	/* Don't waste time seeking for zero-length bodies. */
 +	if (file->size == 0)
 +		file->offset = iso9660->current_position;
 +
 +	/* flush any remaining bytes from the last round to ensure
 +	 * we're positioned */
 +	if (iso9660->entry_bytes_unconsumed) {
 +		__archive_read_consume(a, iso9660->entry_bytes_unconsumed);
 +		iso9660->entry_bytes_unconsumed = 0;
 +	}
 +
 +	/* Seek forward to the start of the entry. */
 +	if (iso9660->current_position < file->offset) {
 +		int64_t step;
 +
 +		step = file->offset - iso9660->current_position;
 +		step = __archive_read_consume(a, step);
 +		if (step < 0)
 +			return ((int)step);
 +		iso9660->current_position = file->offset;
 +	}
 +
 +	/* We found body of file; handle it now. */
 +	return (ARCHIVE_OK);
 +}
 +
 +static int
 +next_cache_entry(struct archive_read *a, struct iso9660 *iso9660,
 +    struct file_info **pfile)
 +{
 +	struct file_info *file;
 +	struct {
 +		struct file_info	*first;
 +		struct file_info	**last;
 +	}	empty_files;
 +	int64_t number;
 +	int count;
 +
 +	file = cache_get_entry(iso9660);
 +	if (file != NULL) {
 +		*pfile = file;
 +		return (ARCHIVE_OK);
 +	}
 +
 +	for (;;) {
 +		struct file_info *re, *d;
 +
 +		*pfile = file = next_entry(iso9660);
 +		if (file == NULL) {
 +			/*
 +			 * If directory entries all which are descendant of
- 			 * rr_moved are stil remaning, expose their. 
++			 * rr_moved are still remaining, expose their.
 +			 */
 +			if (iso9660->re_files.first != NULL && 
 +			    iso9660->rr_moved != NULL &&
 +			    iso9660->rr_moved->rr_moved_has_re_only)
 +				/* Expose "rr_moved" entry. */
 +				cache_add_entry(iso9660, iso9660->rr_moved);
 +			while ((re = re_get_entry(iso9660)) != NULL) {
 +				/* Expose its descendant dirs. */
 +				while ((d = rede_get_entry(re)) != NULL)
 +					cache_add_entry(iso9660, d);
 +			}
 +			if (iso9660->cache_files.first != NULL)
 +				return (next_cache_entry(a, iso9660, pfile));
 +			return (ARCHIVE_EOF);
 +		}
 +
 +		if (file->cl_offset) {
 +			struct file_info *first_re = NULL;
 +			int nexted_re = 0;
 +
 +			/*
 +			 * Find "RE" dir for the current file, which
 +			 * has "CL" flag.
 +			 */
 +			while ((re = re_get_entry(iso9660))
 +			    != first_re) {
 +				if (first_re == NULL)
 +					first_re = re;
 +				if (re->offset == file->cl_offset) {
 +					re->parent->subdirs--;
 +					re->parent = file->parent;
 +					re->re = 0;
 +					if (re->parent->re_descendant) {
 +						nexted_re = 1;
 +						re->re_descendant = 1;
 +						if (rede_add_entry(re) < 0)
 +							goto fatal_rr;
 +						/* Move a list of descendants
 +						 * to a new ancestor. */
 +						while ((d = rede_get_entry(
 +						    re)) != NULL)
 +							if (rede_add_entry(d)
 +							    < 0)
 +								goto fatal_rr;
 +						break;
 +					}
 +					/* Replace the current file
 +					 * with "RE" dir */
 +					*pfile = file = re;
 +					/* Expose its descendant */
 +					while ((d = rede_get_entry(
 +					    file)) != NULL)
 +						cache_add_entry(
 +						    iso9660, d);
 +					break;
 +				} else
 +					re_add_entry(iso9660, re);
 +			}
 +			if (nexted_re) {
 +				/*
 +				 * Do not expose this at this time
 +				 * because we have not gotten its full-path
 +				 * name yet.
 +				 */
 +				continue;
 +			}
 +		} else if ((file->mode & AE_IFMT) == AE_IFDIR) {
 +			int r;
 +
 +			/* Read file entries in this dir. */
 +			r = read_children(a, file);
 +			if (r != ARCHIVE_OK)
 +				return (r);
 +
 +			/*
 +			 * Handle a special dir of Rockridge extensions,
 +			 * "rr_moved".
 +			 */
 +			if (file->rr_moved) {
 +				/*
 +				 * If this has only the subdirectories which
 +				 * have "RE" flags, do not expose at this time.
 +				 */
 +				if (file->rr_moved_has_re_only)
 +					continue;
 +				/* Otherwise expose "rr_moved" entry. */
 +			} else if (file->re) {
 +				/*
 +				 * Do not expose this at this time
 +				 * because we have not gotten its full-path
 +				 * name yet.
 +				 */
 +				re_add_entry(iso9660, file);
 +				continue;
 +			} else if (file->re_descendant) {
 +				/*
 +				 * If the top level "RE" entry of this entry
 +				 * is not exposed, we, accordingly, should not
 +				 * expose this entry at this time because
 +				 * we cannot make its proper full-path name.
 +				 */
 +				if (rede_add_entry(file) == 0)
 +					continue;
 +				/* Otherwise we can expose this entry because
 +				 * it seems its top level "RE" has already been
 +				 * exposed. */
 +			}
 +		}
 +		break;
 +	}
 +
 +	if ((file->mode & AE_IFMT) != AE_IFREG || file->number == -1)
 +		return (ARCHIVE_OK);
 +
 +	count = 0;
 +	number = file->number;
 +	iso9660->cache_files.first = NULL;
 +	iso9660->cache_files.last = &(iso9660->cache_files.first);
 +	empty_files.first = NULL;
 +	empty_files.last = &empty_files.first;
 +	/* Collect files which has the same file serial number.
 +	 * Peek pending_files so that file which number is different
- 	 * is not put bak. */
++	 * is not put back. */
 +	while (iso9660->pending_files.used > 0 &&
 +	    (iso9660->pending_files.files[0]->number == -1 ||
 +	     iso9660->pending_files.files[0]->number == number)) {
 +		if (file->number == -1) {
 +			/* This file has the same offset
 +			 * but it's wrong offset which empty files
 +			 * and symlink files have.
- 			 * NOTE: This wrong offse was recorded by
++			 * NOTE: This wrong offset was recorded by
 +			 * old mkisofs utility. If ISO images is
 +			 * created by latest mkisofs, this does not
 +			 * happen.
 +			 */
 +			file->next = NULL;
 +			*empty_files.last = file;
 +			empty_files.last = &(file->next);
 +		} else {
 +			count++;
 +			cache_add_entry(iso9660, file);
 +		}
 +		file = next_entry(iso9660);
 +	}
 +
 +	if (count == 0) {
 +		*pfile = file;
 +		return ((file == NULL)?ARCHIVE_EOF:ARCHIVE_OK);
 +	}
 +	if (file->number == -1) {
 +		file->next = NULL;
 +		*empty_files.last = file;
 +		empty_files.last = &(file->next);
 +	} else {
 +		count++;
 +		cache_add_entry(iso9660, file);
 +	}
 +
 +	if (count > 1) {
 +		/* The count is the same as number of hardlink,
 +		 * so much so that each nlinks of files in cache_file
 +		 * is overwritten by value of the count.
 +		 */
 +		for (file = iso9660->cache_files.first;
 +		    file != NULL; file = file->next)
 +			file->nlinks = count;
 +	}
 +	/* If there are empty files, that files are added
 +	 * to the tail of the cache_files. */
 +	if (empty_files.first != NULL) {
 +		*iso9660->cache_files.last = empty_files.first;
 +		iso9660->cache_files.last = empty_files.last;
 +	}
 +	*pfile = cache_get_entry(iso9660);
 +	return ((*pfile == NULL)?ARCHIVE_EOF:ARCHIVE_OK);
 +
 +fatal_rr:
 +	archive_set_error(&a->archive, ARCHIVE_ERRNO_MISC,
 +	    "Failed to connect 'CL' pointer to 'RE' rr_moved pointer of "
 +	    "Rockridge extensions: current position = %jd, CL offset = %jd",
 +	    (intmax_t)iso9660->current_position, (intmax_t)file->cl_offset);
 +	return (ARCHIVE_FATAL);
 +}
 +
 +static inline void
 +re_add_entry(struct iso9660 *iso9660, struct file_info *file)
 +{
 +	file->re_next = NULL;
 +	*iso9660->re_files.last = file;
 +	iso9660->re_files.last = &(file->re_next);
 +}
 +
 +static inline struct file_info *
 +re_get_entry(struct iso9660 *iso9660)
 +{
 +	struct file_info *file;
 +
 +	if ((file = iso9660->re_files.first) != NULL) {
 +		iso9660->re_files.first = file->re_next;
 +		if (iso9660->re_files.first == NULL)
 +			iso9660->re_files.last =
 +			    &(iso9660->re_files.first);
 +	}
 +	return (file);
 +}
 +
 +static inline int
 +rede_add_entry(struct file_info *file)
 +{
 +	struct file_info *re;
 +
 +	/*
 +	 * Find "RE" entry.
 +	 */
 +	re = file->parent;
 +	while (re != NULL && !re->re)
 +		re = re->parent;
 +	if (re == NULL)
 +		return (-1);
 +
 +	file->re_next = NULL;
 +	*re->rede_files.last = file;
 +	re->rede_files.last = &(file->re_next);
 +	return (0);
 +}
 +
 +static inline struct file_info *
 +rede_get_entry(struct file_info *re)
 +{
 +	struct file_info *file;
 +
 +	if ((file = re->rede_files.first) != NULL) {
 +		re->rede_files.first = file->re_next;
 +		if (re->rede_files.first == NULL)
 +			re->rede_files.last =
 +			    &(re->rede_files.first);
 +	}
 +	return (file);
 +}
 +
 +static inline void
 +cache_add_entry(struct iso9660 *iso9660, struct file_info *file)
 +{
 +	file->next = NULL;
 +	*iso9660->cache_files.last = file;
 +	iso9660->cache_files.last = &(file->next);
 +}
 +
 +static inline struct file_info *
 +cache_get_entry(struct iso9660 *iso9660)
 +{
 +	struct file_info *file;
 +
 +	if ((file = iso9660->cache_files.first) != NULL) {
 +		iso9660->cache_files.first = file->next;
 +		if (iso9660->cache_files.first == NULL)
 +			iso9660->cache_files.last =
 +			    &(iso9660->cache_files.first);
 +	}
 +	return (file);
 +}
 +
 +static int
 +heap_add_entry(struct archive_read *a, struct heap_queue *heap,
 +    struct file_info *file, uint64_t key)
 +{
 +	uint64_t file_key, parent_key;
 +	int hole, parent;
 +
 +	/* Expand our pending files list as necessary. */
 +	if (heap->used >= heap->allocated) {
 +		struct file_info **new_pending_files;
 +		int new_size = heap->allocated * 2;
 +
 +		if (heap->allocated < 1024)
 +			new_size = 1024;
 +		/* Overflow might keep us from growing the list. */
 +		if (new_size <= heap->allocated) {
 +			archive_set_error(&a->archive,
 +			    ENOMEM, "Out of memory");
 +			return (ARCHIVE_FATAL);
 +		}
 +		new_pending_files = (struct file_info **)
 +		    malloc(new_size * sizeof(new_pending_files[0]));
 +		if (new_pending_files == NULL) {
 +			archive_set_error(&a->archive,
 +			    ENOMEM, "Out of memory");
 +			return (ARCHIVE_FATAL);
 +		}
 +		memcpy(new_pending_files, heap->files,
 +		    heap->allocated * sizeof(new_pending_files[0]));
 +		if (heap->files != NULL)
 +			free(heap->files);
 +		heap->files = new_pending_files;
 +		heap->allocated = new_size;
 +	}
 +
 +	file_key = file->key = key;
 +
 +	/*
 +	 * Start with hole at end, walk it up tree to find insertion point.
 +	 */
 +	hole = heap->used++;
 +	while (hole > 0) {
 +		parent = (hole - 1)/2;
 +		parent_key = heap->files[parent]->key;
 +		if (file_key >= parent_key) {
 +			heap->files[hole] = file;
 +			return (ARCHIVE_OK);
 +		}
 +		/* Move parent into hole <==> move hole up tree. */
 +		heap->files[hole] = heap->files[parent];
 +		hole = parent;
 +	}
 +	heap->files[0] = file;
 +
 +	return (ARCHIVE_OK);
 +}
 +
 +static struct file_info *
 +heap_get_entry(struct heap_queue *heap)
 +{
 +	uint64_t a_key, b_key, c_key;
 +	int a, b, c;
 +	struct file_info *r, *tmp;
 +
 +	if (heap->used < 1)
 +		return (NULL);
 +
 +	/*
 +	 * The first file in the list is the earliest; we'll return this.
 +	 */
 +	r = heap->files[0];
 +
 +	/*
 +	 * Move the last item in the heap to the root of the tree
 +	 */
 +	heap->files[0] = heap->files[--(heap->used)];
 +
 +	/*
 +	 * Rebalance the heap.
 +	 */
 +	a = 0; /* Starting element and its heap key */
 +	a_key = heap->files[a]->key;
 +	for (;;) {
 +		b = a + a + 1; /* First child */
 +		if (b >= heap->used)
 +			return (r);
 +		b_key = heap->files[b]->key;
 +		c = b + 1; /* Use second child if it is smaller. */
 +		if (c < heap->used) {
 +			c_key = heap->files[c]->key;
 +			if (c_key < b_key) {
 +				b = c;
 +				b_key = c_key;
 +			}
 +		}
 +		if (a_key <= b_key)
 +			return (r);
 +		tmp = heap->files[a];
 +		heap->files[a] = heap->files[b];
 +		heap->files[b] = tmp;
 +		a = b;
 +	}
 +}
 +
 +static unsigned int
 +toi(const void *p, int n)
 +{
 +	const unsigned char *v = (const unsigned char *)p;
 +	if (n > 1)
 +		return v[0] + 256 * toi(v + 1, n - 1);
 +	if (n == 1)
 +		return v[0];
 +	return (0);
 +}
 +
 +static time_t
 +isodate7(const unsigned char *v)
 +{
 +	struct tm tm;
 +	int offset;
 +	time_t t;
 +
 +	memset(&tm, 0, sizeof(tm));
 +	tm.tm_year = v[0];
 +	tm.tm_mon = v[1] - 1;
 +	tm.tm_mday = v[2];
 +	tm.tm_hour = v[3];
 +	tm.tm_min = v[4];
 +	tm.tm_sec = v[5];
 +	/* v[6] is the signed timezone offset, in 1/4-hour increments. */
 +	offset = ((const signed char *)v)[6];
 +	if (offset > -48 && offset < 52) {
 +		tm.tm_hour -= offset / 4;
 +		tm.tm_min -= (offset % 4) * 15;
 +	}
 +	t = time_from_tm(&tm);
 +	if (t == (time_t)-1)
 +		return ((time_t)0);
 +	return (t);
 +}
 +
 +static time_t
 +isodate17(const unsigned char *v)
 +{
 +	struct tm tm;
 +	int offset;
 +	time_t t;
 +
 +	memset(&tm, 0, sizeof(tm));
 +	tm.tm_year = (v[0] - '0') * 1000 + (v[1] - '0') * 100
 +	    + (v[2] - '0') * 10 + (v[3] - '0')
 +	    - 1900;
 +	tm.tm_mon = (v[4] - '0') * 10 + (v[5] - '0');
 +	tm.tm_mday = (v[6] - '0') * 10 + (v[7] - '0');
 +	tm.tm_hour = (v[8] - '0') * 10 + (v[9] - '0');
 +	tm.tm_min = (v[10] - '0') * 10 + (v[11] - '0');
 +	tm.tm_sec = (v[12] - '0') * 10 + (v[13] - '0');
 +	/* v[16] is the signed timezone offset, in 1/4-hour increments. */
 +	offset = ((const signed char *)v)[16];
 +	if (offset > -48 && offset < 52) {
 +		tm.tm_hour -= offset / 4;
 +		tm.tm_min -= (offset % 4) * 15;
 +	}
 +	t = time_from_tm(&tm);
 +	if (t == (time_t)-1)
 +		return ((time_t)0);
 +	return (t);
 +}
 +
 +static time_t
 +time_from_tm(struct tm *t)
 +{
 +#if HAVE_TIMEGM
 +        /* Use platform timegm() if available. */
 +        return (timegm(t));
 +#elif HAVE__MKGMTIME64
 +        return (_mkgmtime64(t));
 +#else
 +        /* Else use direct calculation using POSIX assumptions. */
 +        /* First, fix up tm_yday based on the year/month/day. */
 +        if (mktime(t) == (time_t)-1)
 +                return ((time_t)-1);
 +        /* Then we can compute timegm() from first principles. */
 +        return (t->tm_sec
 +            + t->tm_min * 60
 +            + t->tm_hour * 3600
 +            + t->tm_yday * 86400
 +            + (t->tm_year - 70) * 31536000
 +            + ((t->tm_year - 69) / 4) * 86400
 +            - ((t->tm_year - 1) / 100) * 86400
 +            + ((t->tm_year + 299) / 400) * 86400);
 +#endif
 +}
 +
 +static const char *
 +build_pathname(struct archive_string *as, struct file_info *file, int depth)
 +{
 +	// Plain ISO9660 only allows 8 dir levels; if we get
 +	// to 1000, then something is very, very wrong.
 +	if (depth > 1000) {
 +		return NULL;
 +	}
 +	if (file->parent != NULL && archive_strlen(&file->parent->name) > 0) {
 +		if (build_pathname(as, file->parent, depth + 1) == NULL) {
 +			return NULL;
 +		}
 +		archive_strcat(as, "/");
 +	}
 +	if (archive_strlen(&file->name) == 0)
 +		archive_strcat(as, ".");
 +	else
 +		archive_string_concat(as, &file->name);
 +	return (as->s);
 +}
 +
 +static int
 +build_pathname_utf16be(unsigned char *p, size_t max, size_t *len,
 +    struct file_info *file)
 +{
 +	if (file->parent != NULL && file->parent->utf16be_bytes > 0) {
 +		if (build_pathname_utf16be(p, max, len, file->parent) != 0)
 +			return (-1);
 +		p[*len] = 0;
 +		p[*len + 1] = '/';
 +		*len += 2;
 +	}
 +	if (file->utf16be_bytes == 0) {
 +		if (*len + 2 > max)
 +			return (-1);/* Path is too long! */
 +		p[*len] = 0;
 +		p[*len + 1] = '.';
 +		*len += 2;
 +	} else {
 +		if (*len + file->utf16be_bytes > max)
 +			return (-1);/* Path is too long! */
 +		memcpy(p + *len, file->utf16be_name, file->utf16be_bytes);
 +		*len += file->utf16be_bytes;
 +	}
 +	return (0);
 +}
 +
 +#if DEBUG
 +static void
 +dump_isodirrec(FILE *out, const unsigned char *isodirrec)
 +{
 +	fprintf(out, " l %d,",
 +	    toi(isodirrec + DR_length_offset, DR_length_size));
 +	fprintf(out, " a %d,",
 +	    toi(isodirrec + DR_ext_attr_length_offset, DR_ext_attr_length_size));
 +	fprintf(out, " ext 0x%x,",
 +	    toi(isodirrec + DR_extent_offset, DR_extent_size));
 +	fprintf(out, " s %d,",
 +	    toi(isodirrec + DR_size_offset, DR_extent_size));
 +	fprintf(out, " f 0x%x,",
 +	    toi(isodirrec + DR_flags_offset, DR_flags_size));
 +	fprintf(out, " u %d,",
 +	    toi(isodirrec + DR_file_unit_size_offset, DR_file_unit_size_size));
 +	fprintf(out, " ilv %d,",
 +	    toi(isodirrec + DR_interleave_offset, DR_interleave_size));
 +	fprintf(out, " seq %d,",
 +	    toi(isodirrec + DR_volume_sequence_number_offset,
 +		DR_volume_sequence_number_size));
 +	fprintf(out, " nl %d:",
 +	    toi(isodirrec + DR_name_len_offset, DR_name_len_size));
 +	fprintf(out, " `%.*s'",
 +	    toi(isodirrec + DR_name_len_offset, DR_name_len_size),
 +		isodirrec + DR_name_offset);
 +}
 +#endif
diff --cc Utilities/cmlibarchive/libarchive/archive_read_support_format_lha.c
index eff02d8,0000000..ebd7f2c
mode 100644,000000..100644
--- a/Utilities/cmlibarchive/libarchive/archive_read_support_format_lha.c
+++ b/Utilities/cmlibarchive/libarchive/archive_read_support_format_lha.c
@@@ -1,2810 -1,0 +1,2817 @@@
 +/*-
 + * Copyright (c) 2008-2014 Michihiro NAKAJIMA
 + * All rights reserved.
 + *
 + * Redistribution and use in source and binary forms, with or without
 + * modification, are permitted provided that the following conditions
 + * are met:
 + * 1. Redistributions of source code must retain the above copyright
 + *    notice, this list of conditions and the following disclaimer.
 + * 2. Redistributions in binary form must reproduce the above copyright
 + *    notice, this list of conditions and the following disclaimer in the
 + *    documentation and/or other materials provided with the distribution.
 + *
 + * THIS SOFTWARE IS PROVIDED BY THE AUTHOR(S) ``AS IS'' AND ANY EXPRESS OR
 + * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
 + * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
 + * IN NO EVENT SHALL THE AUTHOR(S) BE LIABLE FOR ANY DIRECT, INDIRECT,
 + * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
 + * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
 + * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
 + * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
 + * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
 + * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
 + */
 +
 +#include "archive_platform.h"
 +
 +#ifdef HAVE_ERRNO_H
 +#include <errno.h>
 +#endif
 +#ifdef HAVE_LIMITS_H
 +#include <limits.h>
 +#endif
 +#ifdef HAVE_STDLIB_H
 +#include <stdlib.h>
 +#endif
 +#ifdef HAVE_STRING_H
 +#include <string.h>
 +#endif
 +
 +#include "archive.h"
 +#include "archive_entry.h"
 +#include "archive_entry_locale.h"
 +#include "archive_private.h"
 +#include "archive_read_private.h"
 +#include "archive_endian.h"
 +
 +
 +#define MAXMATCH		256	/* Maximum match length. */
 +#define MINMATCH		3	/* Minimum match length. */
 +/*
 + * Literal table format:
 + * +0              +256                      +510
 + * +---------------+-------------------------+
 + * | literal code  |       match length      |
 + * |   0 ... 255   |  MINMATCH ... MAXMATCH  |
 + * +---------------+-------------------------+
 + *  <---          LT_BITLEN_SIZE         --->
 + */
 +/* Literal table size. */
 +#define LT_BITLEN_SIZE		(UCHAR_MAX + 1 + MAXMATCH - MINMATCH + 1)
 +/* Position table size.
 + * Note: this used for both position table and pre literal table.*/
 +#define PT_BITLEN_SIZE		(3 + 16)
 +
 +struct lzh_dec {
 +	/* Decoding status. */
 +	int     		 state;
 +
 +	/*
 +	 * Window to see last 8Ki(lh5),32Ki(lh6),64Ki(lh7) bytes of decoded
 +	 * data.
 +	 */
 +	int			 w_size;
 +	int			 w_mask;
 +	/* Window buffer, which is a loop buffer. */
 +	unsigned char		*w_buff;
 +	/* The insert position to the window. */
 +	int			 w_pos;
 +	/* The position where we can copy decoded code from the window. */
 +	int     		 copy_pos;
 +	/* The length how many bytes we can copy decoded code from
 +	 * the window. */
 +	int     		 copy_len;
 +
 +	/*
 +	 * Bit stream reader.
 +	 */
 +	struct lzh_br {
 +#define CACHE_TYPE		uint64_t
 +#define CACHE_BITS		(8 * sizeof(CACHE_TYPE))
 +	 	/* Cache buffer. */
 +		CACHE_TYPE	 cache_buffer;
 +		/* Indicates how many bits avail in cache_buffer. */
 +		int		 cache_avail;
 +	} br;
 +
 +	/*
 +	 * Huffman coding.
 +	 */
 +	struct huffman {
 +		int		 len_size;
 +		int		 len_avail;
 +		int		 len_bits;
 +		int		 freq[17];
 +		unsigned char	*bitlen;
 +
 +		/*
 +		 * Use a index table. It's faster than searching a huffman
 +		 * coding tree, which is a binary tree. But a use of a large
 +		 * index table causes L1 cache read miss many times.
 +		 */
 +#define HTBL_BITS	10
 +		int		 max_bits;
 +		int		 shift_bits;
 +		int		 tbl_bits;
 +		int		 tree_used;
 +		int		 tree_avail;
 +		/* Direct access table. */
 +		uint16_t	*tbl;
 +		/* Binary tree table for extra bits over the direct access. */
 +		struct htree_t {
 +			uint16_t left;
 +			uint16_t right;
 +		}		*tree;
 +	}			 lt, pt;
 +
 +	int			 blocks_avail;
 +	int			 pos_pt_len_size;
 +	int			 pos_pt_len_bits;
 +	int			 literal_pt_len_size;
 +	int			 literal_pt_len_bits;
 +	int			 reading_position;
 +	int			 loop;
 +	int			 error;
 +};
 +
 +struct lzh_stream {
 +	const unsigned char	*next_in;
 +	int			 avail_in;
 +	int64_t			 total_in;
 +	const unsigned char	*ref_ptr;
 +	int			 avail_out;
 +	int64_t			 total_out;
 +	struct lzh_dec		*ds;
 +};
 +
 +struct lha {
 +	/* entry_bytes_remaining is the number of bytes we expect.	    */
 +	int64_t                  entry_offset;
 +	int64_t                  entry_bytes_remaining;
 +	int64_t			 entry_unconsumed;
 +	uint16_t		 entry_crc_calculated;
 + 
 +	size_t			 header_size;	/* header size		    */
 +	unsigned char		 level;		/* header level		    */
 +	char			 method[3];	/* compress type	    */
 +	int64_t			 compsize;	/* compressed data size	    */
 +	int64_t			 origsize;	/* original file size	    */
 +	int			 setflag;
 +#define BIRTHTIME_IS_SET	1
 +#define ATIME_IS_SET		2
 +#define UNIX_MODE_IS_SET	4
 +#define CRC_IS_SET		8
 +	time_t			 birthtime;
 +	long			 birthtime_tv_nsec;
 +	time_t			 mtime;
 +	long			 mtime_tv_nsec;
 +	time_t			 atime;
 +	long			 atime_tv_nsec;
 +	mode_t			 mode;
 +	int64_t			 uid;
 +	int64_t			 gid;
 +	struct archive_string 	 uname;
 +	struct archive_string 	 gname;
 +	uint16_t		 header_crc;
 +	uint16_t		 crc;
 +	struct archive_string_conv *sconv;
 +	struct archive_string_conv *opt_sconv;
 +
 +	struct archive_string 	 dirname;
 +	struct archive_string 	 filename;
 +	struct archive_wstring	 ws;
 +
 +	unsigned char		 dos_attr;
 +
 +	/* Flag to mark progress that an archive was read their first header.*/
 +	char			 found_first_header;
 +	/* Flag to mark that indicates an empty directory. */
 +	char			 directory;
 +
 +	/* Flags to mark progress of decompression. */
 +	char			 decompress_init;
 +	char			 end_of_entry;
 +	char			 end_of_entry_cleanup;
 +	char			 entry_is_compressed;
 +
 +	char			 format_name[64];
 +
 +	struct lzh_stream	 strm;
 +};
 +
 +/*
 + * LHA header common member offset.
 + */
 +#define H_METHOD_OFFSET	2	/* Compress type. */
 +#define H_ATTR_OFFSET	19	/* DOS attribute. */
 +#define H_LEVEL_OFFSET	20	/* Header Level.  */
 +#define H_SIZE		22	/* Minimum header size. */
 +
 +static int      archive_read_format_lha_bid(struct archive_read *, int);
 +static int      archive_read_format_lha_options(struct archive_read *,
 +		    const char *, const char *);
 +static int	archive_read_format_lha_read_header(struct archive_read *,
 +		    struct archive_entry *);
 +static int	archive_read_format_lha_read_data(struct archive_read *,
 +		    const void **, size_t *, int64_t *);
 +static int	archive_read_format_lha_read_data_skip(struct archive_read *);
 +static int	archive_read_format_lha_cleanup(struct archive_read *);
 +
 +static void	lha_replace_path_separator(struct lha *,
 +		    struct archive_entry *);
 +static int	lha_read_file_header_0(struct archive_read *, struct lha *);
 +static int	lha_read_file_header_1(struct archive_read *, struct lha *);
 +static int	lha_read_file_header_2(struct archive_read *, struct lha *);
 +static int	lha_read_file_header_3(struct archive_read *, struct lha *);
 +static int	lha_read_file_extended_header(struct archive_read *,
 +		    struct lha *, uint16_t *, int, size_t, size_t *);
 +static size_t	lha_check_header_format(const void *);
 +static int	lha_skip_sfx(struct archive_read *);
 +static time_t	lha_dos_time(const unsigned char *);
 +static time_t	lha_win_time(uint64_t, long *);
 +static unsigned char	lha_calcsum(unsigned char, const void *,
 +		    int, size_t);
 +static int	lha_parse_linkname(struct archive_string *,
 +		    struct archive_string *);
 +static int	lha_read_data_none(struct archive_read *, const void **,
 +		    size_t *, int64_t *);
 +static int	lha_read_data_lzh(struct archive_read *, const void **,
 +		    size_t *, int64_t *);
 +static void	lha_crc16_init(void);
 +static uint16_t lha_crc16(uint16_t, const void *, size_t);
 +static int	lzh_decode_init(struct lzh_stream *, const char *);
 +static void	lzh_decode_free(struct lzh_stream *);
 +static int	lzh_decode(struct lzh_stream *, int);
 +static int	lzh_br_fillup(struct lzh_stream *, struct lzh_br *);
 +static int	lzh_huffman_init(struct huffman *, size_t, int);
 +static void	lzh_huffman_free(struct huffman *);
 +static int	lzh_read_pt_bitlen(struct lzh_stream *, int start, int end);
 +static int	lzh_make_fake_table(struct huffman *, uint16_t);
 +static int	lzh_make_huffman_table(struct huffman *);
 +static inline int lzh_decode_huffman(struct huffman *, unsigned);
 +static int	lzh_decode_huffman_tree(struct huffman *, unsigned, int);
 +
 +
 +int
 +archive_read_support_format_lha(struct archive *_a)
 +{
 +	struct archive_read *a = (struct archive_read *)_a;
 +	struct lha *lha;
 +	int r;
 +
 +	archive_check_magic(_a, ARCHIVE_READ_MAGIC,
 +	    ARCHIVE_STATE_NEW, "archive_read_support_format_lha");
 +
 +	lha = (struct lha *)calloc(1, sizeof(*lha));
 +	if (lha == NULL) {
 +		archive_set_error(&a->archive, ENOMEM,
 +		    "Can't allocate lha data");
 +		return (ARCHIVE_FATAL);
 +	}
 +	archive_string_init(&lha->ws);
 +
 +	r = __archive_read_register_format(a,
 +	    lha,
 +	    "lha",
 +	    archive_read_format_lha_bid,
 +	    archive_read_format_lha_options,
 +	    archive_read_format_lha_read_header,
 +	    archive_read_format_lha_read_data,
 +	    archive_read_format_lha_read_data_skip,
 +	    NULL,
 +	    archive_read_format_lha_cleanup,
 +	    NULL,
 +	    NULL);
 +
 +	if (r != ARCHIVE_OK)
 +		free(lha);
 +	return (ARCHIVE_OK);
 +}
 +
 +static size_t
 +lha_check_header_format(const void *h)
 +{
 +	const unsigned char *p = h;
 +	size_t next_skip_bytes;
 +
 +	switch (p[H_METHOD_OFFSET+3]) {
 +	/*
 +	 * "-lh0-" ... "-lh7-" "-lhd-"
 +	 * "-lzs-" "-lz5-"
 +	 */
 +	case '0': case '1': case '2': case '3':
 +	case '4': case '5': case '6': case '7':
 +	case 'd':
 +	case 's':
 +		next_skip_bytes = 4;
 +
 +		/* b0 == 0 means the end of an LHa archive file.	*/
 +		if (p[0] == 0)
 +			break;
 +		if (p[H_METHOD_OFFSET] != '-' || p[H_METHOD_OFFSET+1] != 'l'
 +		    ||  p[H_METHOD_OFFSET+4] != '-')
 +			break;
 +
 +		if (p[H_METHOD_OFFSET+2] == 'h') {
 +			/* "-lh?-" */
 +			if (p[H_METHOD_OFFSET+3] == 's')
 +				break;
 +			if (p[H_LEVEL_OFFSET] == 0)
 +				return (0);
 +			if (p[H_LEVEL_OFFSET] <= 3 && p[H_ATTR_OFFSET] == 0x20)
 +				return (0);
 +		}
 +		if (p[H_METHOD_OFFSET+2] == 'z') {
 +			/* LArc extensions: -lzs-,-lz4- and -lz5- */
 +			if (p[H_LEVEL_OFFSET] != 0)
 +				break;
 +			if (p[H_METHOD_OFFSET+3] == 's'
 +			    || p[H_METHOD_OFFSET+3] == '4'
 +			    || p[H_METHOD_OFFSET+3] == '5')
 +				return (0);
 +		}
 +		break;
 +	case 'h': next_skip_bytes = 1; break;
 +	case 'z': next_skip_bytes = 1; break;
 +	case 'l': next_skip_bytes = 2; break;
 +	case '-': next_skip_bytes = 3; break;
 +	default : next_skip_bytes = 4; break;
 +	}
 +
 +	return (next_skip_bytes);
 +}
 +
 +static int
 +archive_read_format_lha_bid(struct archive_read *a, int best_bid)
 +{
 +	const char *p;
 +	const void *buff;
 +	ssize_t bytes_avail, offset, window;
 +	size_t next;
 +
 +	/* If there's already a better bid than we can ever
 +	   make, don't bother testing. */
 +	if (best_bid > 30)
 +		return (-1);
 +
 +	if ((p = __archive_read_ahead(a, H_SIZE, NULL)) == NULL)
 +		return (-1);
 +
 +	if (lha_check_header_format(p) == 0)
 +		return (30);
 +
 +	if (p[0] == 'M' && p[1] == 'Z') {
 +		/* PE file */
 +		offset = 0;
 +		window = 4096;
 +		while (offset < (1024 * 20)) {
 +			buff = __archive_read_ahead(a, offset + window,
 +			    &bytes_avail);
 +			if (buff == NULL) {
 +				/* Remaining bytes are less than window. */
 +				window >>= 1;
 +				if (window < (H_SIZE + 3))
 +					return (0);
 +				continue;
 +			}
 +			p = (const char *)buff + offset;
 +			while (p + H_SIZE < (const char *)buff + bytes_avail) {
 +				if ((next = lha_check_header_format(p)) == 0)
 +					return (30);
 +				p += next;
 +			}
 +			offset = p - (const char *)buff;
 +		}
 +	}
 +	return (0);
 +}
 +
 +static int
 +archive_read_format_lha_options(struct archive_read *a,
 +    const char *key, const char *val)
 +{
 +	struct lha *lha;
 +	int ret = ARCHIVE_FAILED;
 +
 +	lha = (struct lha *)(a->format->data);
 +	if (strcmp(key, "hdrcharset")  == 0) {
 +		if (val == NULL || val[0] == 0)
 +			archive_set_error(&a->archive, ARCHIVE_ERRNO_MISC,
 +			    "lha: hdrcharset option needs a character-set name");
 +		else {
 +			lha->opt_sconv =
 +			    archive_string_conversion_from_charset(
 +				&a->archive, val, 0);
 +			if (lha->opt_sconv != NULL)
 +				ret = ARCHIVE_OK;
 +			else
 +				ret = ARCHIVE_FATAL;
 +		}
 +		return (ret);
 +	}
 +
 +	/* Note: The "warn" return is just to inform the options
 +	 * supervisor that we didn't handle it.  It will generate
 +	 * a suitable error if no one used this option. */
 +	return (ARCHIVE_WARN);
 +}
 +
 +static int
 +lha_skip_sfx(struct archive_read *a)
 +{
 +	const void *h;
 +	const char *p, *q;
 +	size_t next, skip;
 +	ssize_t bytes, window;
 +
 +	window = 4096;
 +	for (;;) {
 +		h = __archive_read_ahead(a, window, &bytes);
 +		if (h == NULL) {
 +			/* Remaining bytes are less than window. */
 +			window >>= 1;
 +			if (window < (H_SIZE + 3))
 +				goto fatal;
 +			continue;
 +		}
 +		if (bytes < H_SIZE)
 +			goto fatal;
 +		p = h;
 +		q = p + bytes;
 +
 +		/*
 +		 * Scan ahead until we find something that looks
 +		 * like the lha header.
 +		 */
 +		while (p + H_SIZE < q) {
 +			if ((next = lha_check_header_format(p)) == 0) {
 +				skip = p - (const char *)h;
 +				__archive_read_consume(a, skip);
 +				return (ARCHIVE_OK);
 +			}
 +			p += next;
 +		}
 +		skip = p - (const char *)h;
 +		__archive_read_consume(a, skip);
 +	}
 +fatal:
 +	archive_set_error(&a->archive, ARCHIVE_ERRNO_FILE_FORMAT,
 +	    "Couldn't find out LHa header");
 +	return (ARCHIVE_FATAL);
 +}
 +
 +static int
 +truncated_error(struct archive_read *a)
 +{
 +	archive_set_error(&a->archive, ARCHIVE_ERRNO_FILE_FORMAT,
 +	    "Truncated LHa header");
 +	return (ARCHIVE_FATAL);
 +}
 +
 +static int
 +archive_read_format_lha_read_header(struct archive_read *a,
 +    struct archive_entry *entry)
 +{
 +	struct archive_string linkname;
 +	struct archive_string pathname;
 +	struct lha *lha;
 +	const unsigned char *p;
 +	const char *signature;
 +	int err;
 +	
 +	lha_crc16_init();
 +
 +	a->archive.archive_format = ARCHIVE_FORMAT_LHA;
 +	if (a->archive.archive_format_name == NULL)
 +		a->archive.archive_format_name = "lha";
 +
 +	lha = (struct lha *)(a->format->data);
 +	lha->decompress_init = 0;
 +	lha->end_of_entry = 0;
 +	lha->end_of_entry_cleanup = 0;
 +	lha->entry_unconsumed = 0;
 +
 +	if ((p = __archive_read_ahead(a, H_SIZE, NULL)) == NULL) {
 +		/*
 +		 * LHa archiver added 0 to the tail of its archive file as
 +		 * the mark of the end of the archive.
 +		 */
 +		signature = __archive_read_ahead(a, sizeof(signature[0]), NULL);
 +		if (signature == NULL || signature[0] == 0)
 +			return (ARCHIVE_EOF);
 +		return (truncated_error(a));
 +	}
 +
 +	signature = (const char *)p;
 +	if (lha->found_first_header == 0 &&
 +	    signature[0] == 'M' && signature[1] == 'Z') {
 +                /* This is an executable?  Must be self-extracting... 	*/
 +		err = lha_skip_sfx(a);
 +		if (err < ARCHIVE_WARN)
 +			return (err);
 +
 +		if ((p = __archive_read_ahead(a, sizeof(*p), NULL)) == NULL)
 +			return (truncated_error(a));
 +		signature = (const char *)p;
 +	}
 +	/* signature[0] == 0 means the end of an LHa archive file. */
 +	if (signature[0] == 0)
 +		return (ARCHIVE_EOF);
 +
 +	/*
 +	 * Check the header format and method type.
 +	 */
 +	if (lha_check_header_format(p) != 0) {
 +		archive_set_error(&a->archive, ARCHIVE_ERRNO_FILE_FORMAT,
 +		    "Bad LHa file");
 +		return (ARCHIVE_FATAL);
 +	}
 +
 +	/* We've found the first header. */
 +	lha->found_first_header = 1;
 +	/* Set a default value and common data */
 +	lha->header_size = 0;
 +	lha->level = p[H_LEVEL_OFFSET];
 +	lha->method[0] = p[H_METHOD_OFFSET+1];
 +	lha->method[1] = p[H_METHOD_OFFSET+2];
 +	lha->method[2] = p[H_METHOD_OFFSET+3];
 +	if (memcmp(lha->method, "lhd", 3) == 0)
 +		lha->directory = 1;
 +	else
 +		lha->directory = 0;
 +	if (memcmp(lha->method, "lh0", 3) == 0 ||
 +	    memcmp(lha->method, "lz4", 3) == 0)
 +		lha->entry_is_compressed = 0;
 +	else
 +		lha->entry_is_compressed = 1;
 +
 +	lha->compsize = 0;
 +	lha->origsize = 0;
 +	lha->setflag = 0;
 +	lha->birthtime = 0;
 +	lha->birthtime_tv_nsec = 0;
 +	lha->mtime = 0;
 +	lha->mtime_tv_nsec = 0;
 +	lha->atime = 0;
 +	lha->atime_tv_nsec = 0;
 +	lha->mode = (lha->directory)? 0777 : 0666;
 +	lha->uid = 0;
 +	lha->gid = 0;
 +	archive_string_empty(&lha->dirname);
 +	archive_string_empty(&lha->filename);
 +	lha->dos_attr = 0;
 +	if (lha->opt_sconv != NULL)
 +		lha->sconv = lha->opt_sconv;
 +	else
 +		lha->sconv = NULL;
 +
 +	switch (p[H_LEVEL_OFFSET]) {
 +	case 0:
 +		err = lha_read_file_header_0(a, lha);
 +		break;
 +	case 1:
 +		err = lha_read_file_header_1(a, lha);
 +		break;
 +	case 2:
 +		err = lha_read_file_header_2(a, lha);
 +		break;
 +	case 3:
 +		err = lha_read_file_header_3(a, lha);
 +		break;
 +	default:
 +		archive_set_error(&a->archive, ARCHIVE_ERRNO_FILE_FORMAT,
 +		    "Unsupported LHa header level %d", p[H_LEVEL_OFFSET]);
 +		err = ARCHIVE_FATAL;
 +		break;
 +	}
 +	if (err < ARCHIVE_WARN)
 +		return (err);
 +
 +
 +	if (!lha->directory && archive_strlen(&lha->filename) == 0)
 +		/* The filename has not been set */
 +		return (truncated_error(a));
 +
 +	/*
 +	 * Make a pathname from a dirname and a filename.
 +	 */
 +	archive_string_concat(&lha->dirname, &lha->filename);
 +	archive_string_init(&pathname);
 +	archive_string_init(&linkname);
 +	archive_string_copy(&pathname, &lha->dirname);
 +
 +	if ((lha->mode & AE_IFMT) == AE_IFLNK) {
 +		/*
 +	 	 * Extract the symlink-name if it's included in the pathname.
 +	 	 */
 +		if (!lha_parse_linkname(&linkname, &pathname)) {
 +			/* We couldn't get the symlink-name. */
 +			archive_set_error(&a->archive,
 +		    	    ARCHIVE_ERRNO_FILE_FORMAT,
 +			    "Unknown symlink-name");
 +			archive_string_free(&pathname);
 +			archive_string_free(&linkname);
 +			return (ARCHIVE_FAILED);
 +		}
 +	} else {
 +		/*
 +		 * Make sure a file-type is set.
 +		 * The mode has been overridden if it is in the extended data.
 +		 */
 +		lha->mode = (lha->mode & ~AE_IFMT) |
 +		    ((lha->directory)? AE_IFDIR: AE_IFREG);
 +	}
 +	if ((lha->setflag & UNIX_MODE_IS_SET) == 0 &&
 +	    (lha->dos_attr & 1) != 0)
 +		lha->mode &= ~(0222);/* read only. */
 +
 +	/*
 +	 * Set basic file parameters.
 +	 */
 +	if (archive_entry_copy_pathname_l(entry, pathname.s,
 +	    pathname.length, lha->sconv) != 0) {
 +		if (errno == ENOMEM) {
 +			archive_set_error(&a->archive, ENOMEM,
 +			    "Can't allocate memory for Pathname");
 +			return (ARCHIVE_FATAL);
 +		}
 +		archive_set_error(&a->archive,
 +		    ARCHIVE_ERRNO_FILE_FORMAT,
 +		    "Pathname cannot be converted "
 +		    "from %s to current locale.",
 +		    archive_string_conversion_charset_name(lha->sconv));
 +		err = ARCHIVE_WARN;
 +	}
 +	archive_string_free(&pathname);
 +	if (archive_strlen(&linkname) > 0) {
 +		if (archive_entry_copy_symlink_l(entry, linkname.s,
 +		    linkname.length, lha->sconv) != 0) {
 +			if (errno == ENOMEM) {
 +				archive_set_error(&a->archive, ENOMEM,
 +				    "Can't allocate memory for Linkname");
 +				return (ARCHIVE_FATAL);
 +			}
 +			archive_set_error(&a->archive,
 +			    ARCHIVE_ERRNO_FILE_FORMAT,
 +			    "Linkname cannot be converted "
 +			    "from %s to current locale.",
 +			    archive_string_conversion_charset_name(lha->sconv));
 +			err = ARCHIVE_WARN;
 +		}
 +	} else
 +		archive_entry_set_symlink(entry, NULL);
 +	archive_string_free(&linkname);
 +	/*
 +	 * When a header level is 0, there is a possibility that
 +	 * a pathname and a symlink has '\' character, a directory
 +	 * separator in DOS/Windows. So we should convert it to '/'.
 +	 */
 +	if (p[H_LEVEL_OFFSET] == 0)
 +		lha_replace_path_separator(lha, entry);
 +
 +	archive_entry_set_mode(entry, lha->mode);
 +	archive_entry_set_uid(entry, lha->uid);
 +	archive_entry_set_gid(entry, lha->gid);
 +	if (archive_strlen(&lha->uname) > 0)
 +		archive_entry_set_uname(entry, lha->uname.s);
 +	if (archive_strlen(&lha->gname) > 0)
 +		archive_entry_set_gname(entry, lha->gname.s);
 +	if (lha->setflag & BIRTHTIME_IS_SET) {
 +		archive_entry_set_birthtime(entry, lha->birthtime,
 +		    lha->birthtime_tv_nsec);
 +		archive_entry_set_ctime(entry, lha->birthtime,
 +		    lha->birthtime_tv_nsec);
 +	} else {
 +		archive_entry_unset_birthtime(entry);
 +		archive_entry_unset_ctime(entry);
 +	}
 +	archive_entry_set_mtime(entry, lha->mtime, lha->mtime_tv_nsec);
 +	if (lha->setflag & ATIME_IS_SET)
 +		archive_entry_set_atime(entry, lha->atime,
 +		    lha->atime_tv_nsec);
 +	else
 +		archive_entry_unset_atime(entry);
 +	if (lha->directory || archive_entry_symlink(entry) != NULL)
 +		archive_entry_unset_size(entry);
 +	else
 +		archive_entry_set_size(entry, lha->origsize);
 +
 +	/*
 +	 * Prepare variables used to read a file content.
 +	 */
 +	lha->entry_bytes_remaining = lha->compsize;
 +	lha->entry_offset = 0;
 +	lha->entry_crc_calculated = 0;
 +
 +	/*
 +	 * This file does not have a content.
 +	 */
 +	if (lha->directory || lha->compsize == 0)
 +		lha->end_of_entry = 1;
 +
 +	sprintf(lha->format_name, "lha -%c%c%c-",
 +	    lha->method[0], lha->method[1], lha->method[2]);
 +	a->archive.archive_format_name = lha->format_name;
 +
 +	return (err);
 +}
 +
 +/*
 + * Replace a DOS path separator '\' by a character '/'.
 + * Some multi-byte character set have  a character '\' in its second byte.
 + */
 +static void
 +lha_replace_path_separator(struct lha *lha, struct archive_entry *entry)
 +{
 +	const wchar_t *wp;
 +	size_t i;
 +
 +	if ((wp = archive_entry_pathname_w(entry)) != NULL) {
 +		archive_wstrcpy(&(lha->ws), wp);
 +		for (i = 0; i < archive_strlen(&(lha->ws)); i++) {
 +			if (lha->ws.s[i] == L'\\')
 +				lha->ws.s[i] = L'/';
 +		}
 +		archive_entry_copy_pathname_w(entry, lha->ws.s);
 +	}
 +
 +	if ((wp = archive_entry_symlink_w(entry)) != NULL) {
 +		archive_wstrcpy(&(lha->ws), wp);
 +		for (i = 0; i < archive_strlen(&(lha->ws)); i++) {
 +			if (lha->ws.s[i] == L'\\')
 +				lha->ws.s[i] = L'/';
 +		}
 +		archive_entry_copy_symlink_w(entry, lha->ws.s);
 +	}
 +}
 +
 +/*
 + * Header 0 format
 + *
 + * +0              +1         +2               +7                  +11
 + * +---------------+----------+----------------+-------------------+
 + * |header size(*1)|header sum|compression type|compressed size(*2)|
 + * +---------------+----------+----------------+-------------------+
 + *                             <---------------------(*1)----------*
 + *
 + * +11               +15       +17       +19            +20              +21
 + * +-----------------+---------+---------+--------------+----------------+
 + * |uncompressed size|time(DOS)|date(DOS)|attribute(DOS)|header level(=0)|
 + * +-----------------+---------+---------+--------------+----------------+
 + * *--------------------------------(*1)---------------------------------*
 + *
 + * +21             +22       +22+(*3)   +22+(*3)+2       +22+(*3)+2+(*4)
 + * +---------------+---------+----------+----------------+------------------+
 + * |name length(*3)|file name|file CRC16|extra header(*4)|  compressed data |
 + * +---------------+---------+----------+----------------+------------------+
 + *                  <--(*3)->                             <------(*2)------>
 + * *----------------------(*1)-------------------------->
 + *
 + */
 +#define H0_HEADER_SIZE_OFFSET	0
 +#define H0_HEADER_SUM_OFFSET	1
 +#define H0_COMP_SIZE_OFFSET	7
 +#define H0_ORIG_SIZE_OFFSET	11
 +#define H0_DOS_TIME_OFFSET	15
 +#define H0_NAME_LEN_OFFSET	21
 +#define H0_FILE_NAME_OFFSET	22
 +#define H0_FIXED_SIZE		24
 +static int
 +lha_read_file_header_0(struct archive_read *a, struct lha *lha)
 +{
 +	const unsigned char *p;
 +	int extdsize, namelen;
 +	unsigned char headersum, sum_calculated;
 +
 +	if ((p = __archive_read_ahead(a, H0_FIXED_SIZE, NULL)) == NULL)
 +		return (truncated_error(a));
 +	lha->header_size = p[H0_HEADER_SIZE_OFFSET] + 2;
 +	headersum = p[H0_HEADER_SUM_OFFSET];
 +	lha->compsize = archive_le32dec(p + H0_COMP_SIZE_OFFSET);
 +	lha->origsize = archive_le32dec(p + H0_ORIG_SIZE_OFFSET);
 +	lha->mtime = lha_dos_time(p + H0_DOS_TIME_OFFSET);
 +	namelen = p[H0_NAME_LEN_OFFSET];
 +	extdsize = (int)lha->header_size - H0_FIXED_SIZE - namelen;
 +	if ((namelen > 221 || extdsize < 0) && extdsize != -2) {
 +		archive_set_error(&a->archive, ARCHIVE_ERRNO_FILE_FORMAT,
 +		    "Invalid LHa header");
 +		return (ARCHIVE_FATAL);
 +	}
 +	if ((p = __archive_read_ahead(a, lha->header_size, NULL)) == NULL)
 +		return (truncated_error(a));
 +
 +	archive_strncpy(&lha->filename, p + H0_FILE_NAME_OFFSET, namelen);
 +	/* When extdsize == -2, A CRC16 value is not present in the header. */
 +	if (extdsize >= 0) {
 +		lha->crc = archive_le16dec(p + H0_FILE_NAME_OFFSET + namelen);
 +		lha->setflag |= CRC_IS_SET;
 +	}
 +	sum_calculated = lha_calcsum(0, p, 2, lha->header_size - 2);
 +
 +	/* Read an extended header */
 +	if (extdsize > 0) {
 +		/* This extended data is set by 'LHa for UNIX' only.
 +		 * Maybe fixed size.
 +		 */
 +		p += H0_FILE_NAME_OFFSET + namelen + 2;
 +		if (p[0] == 'U' && extdsize == 12) {
 +			/* p[1] is a minor version. */
 +			lha->mtime = archive_le32dec(&p[2]);
 +			lha->mode = archive_le16dec(&p[6]);
 +			lha->uid = archive_le16dec(&p[8]);
 +			lha->gid = archive_le16dec(&p[10]);
 +			lha->setflag |= UNIX_MODE_IS_SET;
 +		}
 +	}
 +	__archive_read_consume(a, lha->header_size);
 +
 +	if (sum_calculated != headersum) {
 +		archive_set_error(&a->archive, ARCHIVE_ERRNO_MISC,
 +		    "LHa header sum error");
 +		return (ARCHIVE_FATAL);
 +	}
 +
 +	return (ARCHIVE_OK);
 +}
 +
 +/*
 + * Header 1 format
 + *
 + * +0              +1         +2               +7            +11
 + * +---------------+----------+----------------+-------------+
 + * |header size(*1)|header sum|compression type|skip size(*2)|
 + * +---------------+----------+----------------+-------------+
 + *                             <---------------(*1)----------*
 + *
 + * +11               +15       +17       +19            +20              +21
 + * +-----------------+---------+---------+--------------+----------------+
 + * |uncompressed size|time(DOS)|date(DOS)|attribute(DOS)|header level(=1)|
 + * +-----------------+---------+---------+--------------+----------------+
 + * *-------------------------------(*1)----------------------------------*
 + *
 + * +21             +22       +22+(*3)   +22+(*3)+2  +22+(*3)+3  +22+(*3)+3+(*4)
 + * +---------------+---------+----------+-----------+-----------+
 + * |name length(*3)|file name|file CRC16|  creator  |padding(*4)|
 + * +---------------+---------+----------+-----------+-----------+
 + *                  <--(*3)->
 + * *----------------------------(*1)----------------------------*
 + *
 + * +22+(*3)+3+(*4)  +22+(*3)+3+(*4)+2     +22+(*3)+3+(*4)+2+(*5)
 + * +----------------+---------------------+------------------------+
 + * |next header size| extended header(*5) |     compressed data    |
 + * +----------------+---------------------+------------------------+
 + * *------(*1)-----> <--------------------(*2)-------------------->
 + */
 +#define H1_HEADER_SIZE_OFFSET	0
 +#define H1_HEADER_SUM_OFFSET	1
 +#define H1_COMP_SIZE_OFFSET	7
 +#define H1_ORIG_SIZE_OFFSET	11
 +#define H1_DOS_TIME_OFFSET	15
 +#define H1_NAME_LEN_OFFSET	21
 +#define H1_FILE_NAME_OFFSET	22
 +#define H1_FIXED_SIZE		27
 +static int
 +lha_read_file_header_1(struct archive_read *a, struct lha *lha)
 +{
 +	const unsigned char *p;
 +	size_t extdsize;
 +	int i, err, err2;
 +	int namelen, padding;
 +	unsigned char headersum, sum_calculated;
 +
 +	err = ARCHIVE_OK;
 +
 +	if ((p = __archive_read_ahead(a, H1_FIXED_SIZE, NULL)) == NULL)
 +		return (truncated_error(a));
 +
 +	lha->header_size = p[H1_HEADER_SIZE_OFFSET] + 2;
 +	headersum = p[H1_HEADER_SUM_OFFSET];
 +	/* Note: An extended header size is included in a compsize. */
 +	lha->compsize = archive_le32dec(p + H1_COMP_SIZE_OFFSET);
 +	lha->origsize = archive_le32dec(p + H1_ORIG_SIZE_OFFSET);
 +	lha->mtime = lha_dos_time(p + H1_DOS_TIME_OFFSET);
 +	namelen = p[H1_NAME_LEN_OFFSET];
 +	/* Calculate a padding size. The result will be normally 0 only(?) */
 +	padding = ((int)lha->header_size) - H1_FIXED_SIZE - namelen;
 +
 +	if (namelen > 230 || padding < 0)
 +		goto invalid;
 +
 +	if ((p = __archive_read_ahead(a, lha->header_size, NULL)) == NULL)
 +		return (truncated_error(a));
 +
 +	for (i = 0; i < namelen; i++) {
 +		if (p[i + H1_FILE_NAME_OFFSET] == 0xff)
 +			goto invalid;/* Invalid filename. */
 +	}
 +	archive_strncpy(&lha->filename, p + H1_FILE_NAME_OFFSET, namelen);
 +	lha->crc = archive_le16dec(p + H1_FILE_NAME_OFFSET + namelen);
 +	lha->setflag |= CRC_IS_SET;
 +
 +	sum_calculated = lha_calcsum(0, p, 2, lha->header_size - 2);
 +	/* Consume used bytes but not include `next header size' data
 +	 * since it will be consumed in lha_read_file_extended_header(). */
 +	__archive_read_consume(a, lha->header_size - 2);
 +
 +	/* Read extended headers */
 +	err2 = lha_read_file_extended_header(a, lha, NULL, 2,
 +	    (size_t)(lha->compsize + 2), &extdsize);
 +	if (err2 < ARCHIVE_WARN)
 +		return (err2);
 +	if (err2 < err)
 +		err = err2;
 +	/* Get a real compressed file size. */
 +	lha->compsize -= extdsize - 2;
 +
++	if (lha->compsize < 0)
++		goto invalid;	/* Invalid compressed file size */
++
 +	if (sum_calculated != headersum) {
 +		archive_set_error(&a->archive, ARCHIVE_ERRNO_MISC,
 +		    "LHa header sum error");
 +		return (ARCHIVE_FATAL);
 +	}
 +	return (err);
 +invalid:
 +	archive_set_error(&a->archive, ARCHIVE_ERRNO_FILE_FORMAT,
 +	    "Invalid LHa header");
 +	return (ARCHIVE_FATAL);
 +}
 +
 +/*
 + * Header 2 format
 + *
 + * +0              +2               +7                  +11               +15
 + * +---------------+----------------+-------------------+-----------------+
 + * |header size(*1)|compression type|compressed size(*2)|uncompressed size|
 + * +---------------+----------------+-------------------+-----------------+
 + *  <--------------------------------(*1)---------------------------------*
 + *
 + * +15               +19          +20              +21        +23         +24
 + * +-----------------+------------+----------------+----------+-----------+
 + * |data/time(time_t)| 0x20 fixed |header level(=2)|file CRC16|  creator  |
 + * +-----------------+------------+----------------+----------+-----------+
 + * *---------------------------------(*1)---------------------------------*
 + *
 + * +24              +26                 +26+(*3)      +26+(*3)+(*4)
 + * +----------------+-------------------+-------------+-------------------+
 + * |next header size|extended header(*3)| padding(*4) |  compressed data  |
 + * +----------------+-------------------+-------------+-------------------+
 + * *--------------------------(*1)-------------------> <------(*2)------->
 + *
 + */
 +#define H2_HEADER_SIZE_OFFSET	0
 +#define H2_COMP_SIZE_OFFSET	7
 +#define H2_ORIG_SIZE_OFFSET	11
 +#define H2_TIME_OFFSET		15
 +#define H2_CRC_OFFSET		21
 +#define H2_FIXED_SIZE		24
 +static int
 +lha_read_file_header_2(struct archive_read *a, struct lha *lha)
 +{
 +	const unsigned char *p;
 +	size_t extdsize;
 +	int err, padding;
 +	uint16_t header_crc;
 +
 +	if ((p = __archive_read_ahead(a, H2_FIXED_SIZE, NULL)) == NULL)
 +		return (truncated_error(a));
 +
 +	lha->header_size =archive_le16dec(p + H2_HEADER_SIZE_OFFSET);
 +	lha->compsize = archive_le32dec(p + H2_COMP_SIZE_OFFSET);
 +	lha->origsize = archive_le32dec(p + H2_ORIG_SIZE_OFFSET);
 +	lha->mtime = archive_le32dec(p + H2_TIME_OFFSET);
 +	lha->crc = archive_le16dec(p + H2_CRC_OFFSET);
 +	lha->setflag |= CRC_IS_SET;
 +
 +	if (lha->header_size < H2_FIXED_SIZE) {
 +		archive_set_error(&a->archive, ARCHIVE_ERRNO_FILE_FORMAT,
 +		    "Invalid LHa header size");
 +		return (ARCHIVE_FATAL);
 +	}
 +
 +	header_crc = lha_crc16(0, p, H2_FIXED_SIZE);
 +	__archive_read_consume(a, H2_FIXED_SIZE);
 +
 +	/* Read extended headers */
 +	err = lha_read_file_extended_header(a, lha, &header_crc, 2,
 +		  lha->header_size - H2_FIXED_SIZE, &extdsize);
 +	if (err < ARCHIVE_WARN)
 +		return (err);
 +
 +	/* Calculate a padding size. The result will be normally 0 or 1. */
 +	padding = (int)lha->header_size - (int)(H2_FIXED_SIZE + extdsize);
 +	if (padding > 0) {
 +		if ((p = __archive_read_ahead(a, padding, NULL)) == NULL)
 +			return (truncated_error(a));
 +		header_crc = lha_crc16(header_crc, p, padding);
 +		__archive_read_consume(a, padding);
 +	}
 +
 +	if (header_crc != lha->header_crc) {
 +		archive_set_error(&a->archive, ARCHIVE_ERRNO_FILE_FORMAT,
 +		    "LHa header CRC error");
 +		return (ARCHIVE_FATAL);
 +	}
 +	return (err);
 +}
 +
 +/*
 + * Header 3 format
 + *
 + * +0           +2               +7                  +11               +15
 + * +------------+----------------+-------------------+-----------------+
 + * | 0x04 fixed |compression type|compressed size(*2)|uncompressed size|
 + * +------------+----------------+-------------------+-----------------+
 + *  <-------------------------------(*1)-------------------------------*
 + *
 + * +15               +19          +20              +21        +23         +24
 + * +-----------------+------------+----------------+----------+-----------+
 + * |date/time(time_t)| 0x20 fixed |header level(=3)|file CRC16|  creator  |
 + * +-----------------+------------+----------------+----------+-----------+
 + * *--------------------------------(*1)----------------------------------*
 + *
 + * +24             +28              +32                 +32+(*3)
 + * +---------------+----------------+-------------------+-----------------+
 + * |header size(*1)|next header size|extended header(*3)| compressed data |
 + * +---------------+----------------+-------------------+-----------------+
 + * *------------------------(*1)-----------------------> <------(*2)----->
 + *
 + */
 +#define H3_FIELD_LEN_OFFSET	0
 +#define H3_COMP_SIZE_OFFSET	7
 +#define H3_ORIG_SIZE_OFFSET	11
 +#define H3_TIME_OFFSET		15
 +#define H3_CRC_OFFSET		21
 +#define H3_HEADER_SIZE_OFFSET	24
 +#define H3_FIXED_SIZE		28
 +static int
 +lha_read_file_header_3(struct archive_read *a, struct lha *lha)
 +{
 +	const unsigned char *p;
 +	size_t extdsize;
 +	int err;
 +	uint16_t header_crc;
 +
 +	if ((p = __archive_read_ahead(a, H3_FIXED_SIZE, NULL)) == NULL)
 +		return (truncated_error(a));
 +
 +	if (archive_le16dec(p + H3_FIELD_LEN_OFFSET) != 4)
 +		goto invalid;
 +	lha->header_size =archive_le32dec(p + H3_HEADER_SIZE_OFFSET);
 +	lha->compsize = archive_le32dec(p + H3_COMP_SIZE_OFFSET);
 +	lha->origsize = archive_le32dec(p + H3_ORIG_SIZE_OFFSET);
 +	lha->mtime = archive_le32dec(p + H3_TIME_OFFSET);
 +	lha->crc = archive_le16dec(p + H3_CRC_OFFSET);
 +	lha->setflag |= CRC_IS_SET;
 +
 +	if (lha->header_size < H3_FIXED_SIZE + 4)
 +		goto invalid;
 +	header_crc = lha_crc16(0, p, H3_FIXED_SIZE);
 +	__archive_read_consume(a, H3_FIXED_SIZE);
 +
 +	/* Read extended headers */
 +	err = lha_read_file_extended_header(a, lha, &header_crc, 4,
 +		  lha->header_size - H3_FIXED_SIZE, &extdsize);
 +	if (err < ARCHIVE_WARN)
 +		return (err);
 +
 +	if (header_crc != lha->header_crc) {
 +		archive_set_error(&a->archive, ARCHIVE_ERRNO_FILE_FORMAT,
 +		    "LHa header CRC error");
 +		return (ARCHIVE_FATAL);
 +	}
 +	return (err);
 +invalid:
 +	archive_set_error(&a->archive, ARCHIVE_ERRNO_FILE_FORMAT,
 +	    "Invalid LHa header");
 +	return (ARCHIVE_FATAL);
 +}
 +
 +/*
 + * Extended header format
 + *
 + * +0             +2        +3  -- used in header 1 and 2
 + * +0             +4        +5  -- used in header 3
 + * +--------------+---------+-------------------+--------------+--
 + * |ex-header size|header id|        data       |ex-header size| .......
 + * +--------------+---------+-------------------+--------------+--
 + *  <-------------( ex-header size)------------> <-- next extended header --*
 + *
 + * If the ex-header size is zero, it is the make of the end of extended
 + * headers.
 + *
 + */
 +static int
 +lha_read_file_extended_header(struct archive_read *a, struct lha *lha,
 +    uint16_t *crc, int sizefield_length, size_t limitsize, size_t *total_size)
 +{
 +	const void *h;
 +	const unsigned char *extdheader;
 +	size_t	extdsize;
 +	size_t	datasize;
 +	unsigned int i;
 +	unsigned char extdtype;
 +
 +#define EXT_HEADER_CRC		0x00		/* Header CRC and information*/
 +#define EXT_FILENAME		0x01		/* Filename 		    */
 +#define EXT_DIRECTORY		0x02		/* Directory name	    */
 +#define EXT_DOS_ATTR		0x40		/* MS-DOS attribute	    */
 +#define EXT_TIMESTAMP		0x41		/* Windows time stamp	    */
 +#define EXT_FILESIZE		0x42		/* Large file size	    */
 +#define EXT_TIMEZONE		0x43		/* Time zone		    */
 +#define EXT_UTF16_FILENAME	0x44		/* UTF-16 filename 	    */
 +#define EXT_UTF16_DIRECTORY	0x45		/* UTF-16 directory name    */
 +#define EXT_CODEPAGE		0x46		/* Codepage		    */
 +#define EXT_UNIX_MODE		0x50		/* File permission	    */
 +#define EXT_UNIX_GID_UID	0x51		/* gid,uid		    */
 +#define EXT_UNIX_GNAME		0x52		/* Group name		    */
 +#define EXT_UNIX_UNAME		0x53		/* User name		    */
 +#define EXT_UNIX_MTIME		0x54		/* Modified time	    */
 +#define EXT_OS2_NEW_ATTR	0x7f		/* new attribute(OS/2 only) */
 +#define EXT_NEW_ATTR		0xff		/* new attribute	    */
 +
 +	*total_size = sizefield_length;
 +
 +	for (;;) {
 +		/* Read an extended header size. */
 +		if ((h =
 +		    __archive_read_ahead(a, sizefield_length, NULL)) == NULL)
 +			return (truncated_error(a));
 +		/* Check if the size is the zero indicates the end of the
 +		 * extended header. */
 +		if (sizefield_length == sizeof(uint16_t))
 +			extdsize = archive_le16dec(h);
 +		else
 +			extdsize = archive_le32dec(h);
 +		if (extdsize == 0) {
 +			/* End of extended header */
 +			if (crc != NULL)
 +				*crc = lha_crc16(*crc, h, sizefield_length);
 +			__archive_read_consume(a, sizefield_length);
 +			return (ARCHIVE_OK);
 +		}
 +
 +		/* Sanity check to the extended header size. */
 +		if (((uint64_t)*total_size + extdsize) >
 +				    (uint64_t)limitsize ||
 +		    extdsize <= (size_t)sizefield_length)
 +			goto invalid;
 +
 +		/* Read the extended header. */
 +		if ((h = __archive_read_ahead(a, extdsize, NULL)) == NULL)
 +			return (truncated_error(a));
 +		*total_size += extdsize;
 +
 +		extdheader = (const unsigned char *)h;
 +		/* Get the extended header type. */
 +		extdtype = extdheader[sizefield_length];
 +		/* Calculate an extended data size. */
 +		datasize = extdsize - (1 + sizefield_length);
 +		/* Skip an extended header size field and type field. */
 +		extdheader += sizefield_length + 1;
 +
 +		if (crc != NULL && extdtype != EXT_HEADER_CRC)
 +			*crc = lha_crc16(*crc, h, extdsize);
 +		switch (extdtype) {
 +		case EXT_HEADER_CRC:
 +			/* We only use a header CRC. Following data will not
 +			 * be used. */
 +			if (datasize >= 2) {
 +				lha->header_crc = archive_le16dec(extdheader);
 +				if (crc != NULL) {
 +					static const char zeros[2] = {0, 0};
 +					*crc = lha_crc16(*crc, h,
 +					    extdsize - datasize);
 +					/* CRC value itself as zero */
 +					*crc = lha_crc16(*crc, zeros, 2);
 +					*crc = lha_crc16(*crc,
 +					    extdheader+2, datasize - 2);
 +				}
 +			}
 +			break;
 +		case EXT_FILENAME:
 +			if (datasize == 0) {
 +				/* maybe directory header */
 +				archive_string_empty(&lha->filename);
 +				break;
 +			}
 +			if (extdheader[0] == '\0')
 +				goto invalid;
 +			archive_strncpy(&lha->filename,
 +			    (const char *)extdheader, datasize);
 +			break;
 +		case EXT_DIRECTORY:
 +			if (datasize == 0 || extdheader[0] == '\0')
 +				/* no directory name data. exit this case. */
 +				goto invalid;
 +
 +			archive_strncpy(&lha->dirname,
 +		  	    (const char *)extdheader, datasize);
 +			/*
 +			 * Convert directory delimiter from 0xFF
 +			 * to '/' for local system.
 +	 		 */
 +			for (i = 0; i < lha->dirname.length; i++) {
 +				if ((unsigned char)lha->dirname.s[i] == 0xFF)
 +					lha->dirname.s[i] = '/';
 +			}
 +			/* Is last character directory separator? */
 +			if (lha->dirname.s[lha->dirname.length-1] != '/')
 +				/* invalid directory data */
 +				goto invalid;
 +			break;
 +		case EXT_DOS_ATTR:
 +			if (datasize == 2)
 +				lha->dos_attr = (unsigned char)
 +				    (archive_le16dec(extdheader) & 0xff);
 +			break;
 +		case EXT_TIMESTAMP:
 +			if (datasize == (sizeof(uint64_t) * 3)) {
 +				lha->birthtime = lha_win_time(
 +				    archive_le64dec(extdheader),
 +				    &lha->birthtime_tv_nsec);
 +				extdheader += sizeof(uint64_t);
 +				lha->mtime = lha_win_time(
 +				    archive_le64dec(extdheader),
 +				    &lha->mtime_tv_nsec);
 +				extdheader += sizeof(uint64_t);
 +				lha->atime = lha_win_time(
 +				    archive_le64dec(extdheader),
 +				    &lha->atime_tv_nsec);
 +				lha->setflag |= BIRTHTIME_IS_SET |
 +				    ATIME_IS_SET;
 +			}
 +			break;
 +		case EXT_FILESIZE:
 +			if (datasize == sizeof(uint64_t) * 2) {
 +				lha->compsize = archive_le64dec(extdheader);
 +				extdheader += sizeof(uint64_t);
 +				lha->origsize = archive_le64dec(extdheader);
 +			}
 +			break;
 +		case EXT_CODEPAGE:
 +			/* Get an archived filename charset from codepage.
 +			 * This overwrites the charset specified by
 +			 * hdrcharset option. */
 +			if (datasize == sizeof(uint32_t)) {
 +				struct archive_string cp;
 +				const char *charset;
 +
 +				archive_string_init(&cp);
 +				switch (archive_le32dec(extdheader)) {
 +				case 65001: /* UTF-8 */
 +					charset = "UTF-8";
 +					break;
 +				default:
 +					archive_string_sprintf(&cp, "CP%d",
 +					    (int)archive_le32dec(extdheader));
 +					charset = cp.s;
 +					break;
 +				}
 +				lha->sconv =
 +				    archive_string_conversion_from_charset(
 +					&(a->archive), charset, 1);
 +				archive_string_free(&cp);
 +				if (lha->sconv == NULL)
 +					return (ARCHIVE_FATAL);
 +			}
 +			break;
 +		case EXT_UNIX_MODE:
 +			if (datasize == sizeof(uint16_t)) {
 +				lha->mode = archive_le16dec(extdheader);
 +				lha->setflag |= UNIX_MODE_IS_SET;
 +			}
 +			break;
 +		case EXT_UNIX_GID_UID:
 +			if (datasize == (sizeof(uint16_t) * 2)) {
 +				lha->gid = archive_le16dec(extdheader);
 +				lha->uid = archive_le16dec(extdheader+2);
 +			}
 +			break;
 +		case EXT_UNIX_GNAME:
 +			if (datasize > 0)
 +				archive_strncpy(&lha->gname,
 +				    (const char *)extdheader, datasize);
 +			break;
 +		case EXT_UNIX_UNAME:
 +			if (datasize > 0)
 +				archive_strncpy(&lha->uname,
 +				    (const char *)extdheader, datasize);
 +			break;
 +		case EXT_UNIX_MTIME:
 +			if (datasize == sizeof(uint32_t))
 +				lha->mtime = archive_le32dec(extdheader);
 +			break;
 +		case EXT_OS2_NEW_ATTR:
 +			/* This extended header is OS/2 depend. */
 +			if (datasize == 16) {
 +				lha->dos_attr = (unsigned char)
 +				    (archive_le16dec(extdheader) & 0xff);
 +				lha->mode = archive_le16dec(extdheader+2);
 +				lha->gid = archive_le16dec(extdheader+4);
 +				lha->uid = archive_le16dec(extdheader+6);
 +				lha->birthtime = archive_le32dec(extdheader+8);
 +				lha->atime = archive_le32dec(extdheader+12);
 +				lha->setflag |= UNIX_MODE_IS_SET
 +				    | BIRTHTIME_IS_SET | ATIME_IS_SET;
 +			}
 +			break;
 +		case EXT_NEW_ATTR:
 +			if (datasize == 20) {
 +				lha->mode = (mode_t)archive_le32dec(extdheader);
 +				lha->gid = archive_le32dec(extdheader+4);
 +				lha->uid = archive_le32dec(extdheader+8);
 +				lha->birthtime = archive_le32dec(extdheader+12);
 +				lha->atime = archive_le32dec(extdheader+16);
 +				lha->setflag |= UNIX_MODE_IS_SET
 +				    | BIRTHTIME_IS_SET | ATIME_IS_SET;
 +			}
 +			break;
 +		case EXT_TIMEZONE:		/* Not supported */
 +		case EXT_UTF16_FILENAME:	/* Not supported */
 +		case EXT_UTF16_DIRECTORY:	/* Not supported */
 +		default:
 +			break;
 +		}
 +
 +		__archive_read_consume(a, extdsize);
 +	}
 +invalid:
 +	archive_set_error(&a->archive, ARCHIVE_ERRNO_FILE_FORMAT,
 +	    "Invalid extended LHa header");
 +	return (ARCHIVE_FATAL);
 +}
 +
 +static int
 +lha_end_of_entry(struct archive_read *a)
 +{
 +	struct lha *lha = (struct lha *)(a->format->data);
 +	int r = ARCHIVE_EOF;
 +
 +	if (!lha->end_of_entry_cleanup) {
 +		if ((lha->setflag & CRC_IS_SET) &&
 +		    lha->crc != lha->entry_crc_calculated) {
 +			archive_set_error(&a->archive, ARCHIVE_ERRNO_MISC,
 +			    "LHa data CRC error");
 +			r = ARCHIVE_WARN;
 +		}
 +
 +		/* End-of-entry cleanup done. */
 +		lha->end_of_entry_cleanup = 1;
 +	}
 +	return (r);
 +}
 +
 +static int
 +archive_read_format_lha_read_data(struct archive_read *a,
 +    const void **buff, size_t *size, int64_t *offset)
 +{
 +	struct lha *lha = (struct lha *)(a->format->data);
 +	int r;
 +
 +	if (lha->entry_unconsumed) {
 +		/* Consume as much as the decompressor actually used. */
 +		__archive_read_consume(a, lha->entry_unconsumed);
 +		lha->entry_unconsumed = 0;
 +	}
 +	if (lha->end_of_entry) {
 +		*offset = lha->entry_offset;
 +		*size = 0;
 +		*buff = NULL;
 +		return (lha_end_of_entry(a));
 +	}
 +
 +	if (lha->entry_is_compressed)
 +		r =  lha_read_data_lzh(a, buff, size, offset);
 +	else
 +		/* No compression. */
 +		r =  lha_read_data_none(a, buff, size, offset);
 +	return (r);
 +}
 +
 +/*
 + * Read a file content in no compression.
 + *
 + * Returns ARCHIVE_OK if successful, ARCHIVE_FATAL otherwise, sets
 + * lha->end_of_entry if it consumes all of the data.
 + */
 +static int
 +lha_read_data_none(struct archive_read *a, const void **buff,
 +    size_t *size, int64_t *offset)
 +{
 +	struct lha *lha = (struct lha *)(a->format->data);
 +	ssize_t bytes_avail;
 +
 +	if (lha->entry_bytes_remaining == 0) {
 +		*buff = NULL;
 +		*size = 0;
 +		*offset = lha->entry_offset;
 +		lha->end_of_entry = 1;
 +		return (ARCHIVE_OK);
 +	}
 +	/*
 +	 * Note: '1' here is a performance optimization.
 +	 * Recall that the decompression layer returns a count of
 +	 * available bytes; asking for more than that forces the
 +	 * decompressor to combine reads by copying data.
 +	 */
 +	*buff = __archive_read_ahead(a, 1, &bytes_avail);
 +	if (bytes_avail <= 0) {
 +		archive_set_error(&a->archive, ARCHIVE_ERRNO_FILE_FORMAT,
 +		    "Truncated LHa file data");
 +		return (ARCHIVE_FATAL);
 +	}
 +	if (bytes_avail > lha->entry_bytes_remaining)
 +		bytes_avail = (ssize_t)lha->entry_bytes_remaining;
 +	lha->entry_crc_calculated =
 +	    lha_crc16(lha->entry_crc_calculated, *buff, bytes_avail);
 +	*size = bytes_avail;
 +	*offset = lha->entry_offset;
 +	lha->entry_offset += bytes_avail;
 +	lha->entry_bytes_remaining -= bytes_avail;
 +	if (lha->entry_bytes_remaining == 0)
 +		lha->end_of_entry = 1;
 +	lha->entry_unconsumed = bytes_avail;
 +	return (ARCHIVE_OK);
 +}
 +
 +/*
 + * Read a file content in LZHUFF encoding.
 + *
 + * Returns ARCHIVE_OK if successful, returns ARCHIVE_WARN if compression is
 + * unsupported, ARCHIVE_FATAL otherwise, sets lha->end_of_entry if it consumes
 + * all of the data.
 + */
 +static int
 +lha_read_data_lzh(struct archive_read *a, const void **buff,
 +    size_t *size, int64_t *offset)
 +{
 +	struct lha *lha = (struct lha *)(a->format->data);
 +	ssize_t bytes_avail;
 +	int r;
 +
 +	/* If we haven't yet read any data, initialize the decompressor. */
 +	if (!lha->decompress_init) {
 +		r = lzh_decode_init(&(lha->strm), lha->method);
 +		switch (r) {
 +		case ARCHIVE_OK:
 +			break;
 +		case ARCHIVE_FAILED:
 +        		/* Unsupported compression. */
 +			*buff = NULL;
 +			*size = 0;
 +			*offset = 0;
 +			archive_set_error(&a->archive,
 +			    ARCHIVE_ERRNO_FILE_FORMAT,
 +			    "Unsupported lzh compression method -%c%c%c-",
 +			    lha->method[0], lha->method[1], lha->method[2]);
 +			/* We know compressed size; just skip it. */
 +			archive_read_format_lha_read_data_skip(a);
 +			return (ARCHIVE_WARN);
 +		default:
 +			archive_set_error(&a->archive, ENOMEM,
 +			    "Couldn't allocate memory "
 +			    "for lzh decompression");
 +			return (ARCHIVE_FATAL);
 +		}
 +		/* We've initialized decompression for this stream. */
 +		lha->decompress_init = 1;
 +		lha->strm.avail_out = 0;
 +		lha->strm.total_out = 0;
 +	}
 +
 +	/*
 +	 * Note: '1' here is a performance optimization.
 +	 * Recall that the decompression layer returns a count of
 +	 * available bytes; asking for more than that forces the
 +	 * decompressor to combine reads by copying data.
 +	 */
 +	lha->strm.next_in = __archive_read_ahead(a, 1, &bytes_avail);
 +	if (bytes_avail <= 0) {
 +		archive_set_error(&a->archive, ARCHIVE_ERRNO_FILE_FORMAT,
 +		    "Truncated LHa file body");
 +		return (ARCHIVE_FATAL);
 +	}
 +	if (bytes_avail > lha->entry_bytes_remaining)
 +		bytes_avail = (ssize_t)lha->entry_bytes_remaining;
 +
 +	lha->strm.avail_in = (int)bytes_avail;
 +	lha->strm.total_in = 0;
 +	lha->strm.avail_out = 0;
 +
 +	r = lzh_decode(&(lha->strm), bytes_avail == lha->entry_bytes_remaining);
 +	switch (r) {
 +	case ARCHIVE_OK:
 +		break;
 +	case ARCHIVE_EOF:
 +		lha->end_of_entry = 1;
 +		break;
 +	default:
 +		archive_set_error(&a->archive, ARCHIVE_ERRNO_MISC,
 +		    "Bad lzh data");
 +		return (ARCHIVE_FAILED);
 +	}
 +	lha->entry_unconsumed = lha->strm.total_in;
 +	lha->entry_bytes_remaining -= lha->strm.total_in;
 +
 +	if (lha->strm.avail_out) {
 +		*offset = lha->entry_offset;
 +		*size = lha->strm.avail_out;
 +		*buff = lha->strm.ref_ptr;
 +		lha->entry_crc_calculated =
 +		    lha_crc16(lha->entry_crc_calculated, *buff, *size);
 +		lha->entry_offset += *size;
 +	} else {
 +		*offset = lha->entry_offset;
 +		*size = 0;
 +		*buff = NULL;
 +		if (lha->end_of_entry)
 +			return (lha_end_of_entry(a));
 +	}
 +	return (ARCHIVE_OK);
 +}
 +
 +/*
 + * Skip a file content.
 + */
 +static int
 +archive_read_format_lha_read_data_skip(struct archive_read *a)
 +{
 +	struct lha *lha;
 +	int64_t bytes_skipped;
 +
 +	lha = (struct lha *)(a->format->data);
 +
 +	if (lha->entry_unconsumed) {
 +		/* Consume as much as the decompressor actually used. */
 +		__archive_read_consume(a, lha->entry_unconsumed);
 +		lha->entry_unconsumed = 0;
 +	}
 +
 +	/* if we've already read to end of data, we're done. */
 +	if (lha->end_of_entry_cleanup)
 +		return (ARCHIVE_OK);
 +
 +	/*
 +	 * If the length is at the beginning, we can skip the
 +	 * compressed data much more quickly.
 +	 */
 +	bytes_skipped = __archive_read_consume(a, lha->entry_bytes_remaining);
 +	if (bytes_skipped < 0)
 +		return (ARCHIVE_FATAL);
 +
 +	/* This entry is finished and done. */
 +	lha->end_of_entry_cleanup = lha->end_of_entry = 1;
 +	return (ARCHIVE_OK);
 +}
 +
 +static int
 +archive_read_format_lha_cleanup(struct archive_read *a)
 +{
 +	struct lha *lha = (struct lha *)(a->format->data);
 +
 +	lzh_decode_free(&(lha->strm));
 +	archive_string_free(&(lha->dirname));
 +	archive_string_free(&(lha->filename));
 +	archive_string_free(&(lha->uname));
 +	archive_string_free(&(lha->gname));
 +	archive_wstring_free(&(lha->ws));
 +	free(lha);
 +	(a->format->data) = NULL;
 +	return (ARCHIVE_OK);
 +}
 +
 +/*
 + * 'LHa for UNIX' utility has archived a symbolic-link name after
 + * a pathname with '|' character.
 + * This function extracts the symbolic-link name from the pathname.
 + *
 + * example.
 + *   1. a symbolic-name is 'aaa/bb/cc'
 + *   2. a filename is 'xxx/bbb'
 + *  then a archived pathname is 'xxx/bbb|aaa/bb/cc'
 + */
 +static int
 +lha_parse_linkname(struct archive_string *linkname,
 +    struct archive_string *pathname)
 +{
 +	char *	linkptr;
 +	size_t 	symlen;
 +
 +	linkptr = strchr(pathname->s, '|');
 +	if (linkptr != NULL) {
 +		symlen = strlen(linkptr + 1);
 +		archive_strncpy(linkname, linkptr+1, symlen);
 +
 +		*linkptr = 0;
 +		pathname->length = strlen(pathname->s);
 +
 +		return (1);
 +	}
 +	return (0);
 +}
 +
 +/* Convert an MSDOS-style date/time into Unix-style time. */
 +static time_t
 +lha_dos_time(const unsigned char *p)
 +{
 +	int msTime, msDate;
 +	struct tm ts;
 +
 +	msTime = archive_le16dec(p);
 +	msDate = archive_le16dec(p+2);
 +
 +	memset(&ts, 0, sizeof(ts));
 +	ts.tm_year = ((msDate >> 9) & 0x7f) + 80;   /* Years since 1900. */
 +	ts.tm_mon = ((msDate >> 5) & 0x0f) - 1;     /* Month number.     */
 +	ts.tm_mday = msDate & 0x1f;		    /* Day of month.     */
 +	ts.tm_hour = (msTime >> 11) & 0x1f;
 +	ts.tm_min = (msTime >> 5) & 0x3f;
 +	ts.tm_sec = (msTime << 1) & 0x3e;
 +	ts.tm_isdst = -1;
 +	return (mktime(&ts));
 +}
 +
 +/* Convert an MS-Windows-style date/time into Unix-style time. */
 +static time_t
 +lha_win_time(uint64_t wintime, long *ns)
 +{
 +#define EPOC_TIME ARCHIVE_LITERAL_ULL(116444736000000000)
 +
 +	if (wintime >= EPOC_TIME) {
 +		wintime -= EPOC_TIME;	/* 1970-01-01 00:00:00 (UTC) */
 +		if (ns != NULL)
 +			*ns = (long)(wintime % 10000000) * 100;
 +		return (wintime / 10000000);
 +	} else {
 +		if (ns != NULL)
 +			*ns = 0;
 +		return (0);
 +	}
 +}
 +
 +static unsigned char
 +lha_calcsum(unsigned char sum, const void *pp, int offset, size_t size)
 +{
 +	unsigned char const *p = (unsigned char const *)pp;
 +
 +	p += offset;
 +	for (;size > 0; --size)
 +		sum += *p++;
 +	return (sum);
 +}
 +
 +static uint16_t crc16tbl[2][256];
 +static void
 +lha_crc16_init(void)
 +{
 +	unsigned int i;
 +	static int crc16init = 0;
 +
 +	if (crc16init)
 +		return;
 +	crc16init = 1;
 +
 +	for (i = 0; i < 256; i++) {
 +		unsigned int j;
 +		uint16_t crc = (uint16_t)i;
 +		for (j = 8; j; j--)
 +			crc = (crc >> 1) ^ ((crc & 1) * 0xA001);
 +		crc16tbl[0][i] = crc;
 +	}
 +
 +	for (i = 0; i < 256; i++) {
 +		crc16tbl[1][i] = (crc16tbl[0][i] >> 8)
 +			^ crc16tbl[0][crc16tbl[0][i] & 0xff];
 +	}
 +}
 +
 +static uint16_t
 +lha_crc16(uint16_t crc, const void *pp, size_t len)
 +{
 +	const unsigned char *p = (const unsigned char *)pp;
 +	const uint16_t *buff;
 +	const union {
 +		uint32_t i;
 +		char c[4];
 +	} u = { 0x01020304 };
 +
 +	if (len == 0)
 +		return crc;
 +
 +	/* Process unaligned address. */
 +	if (((uintptr_t)p) & (uintptr_t)0x1) {
 +		crc = (crc >> 8) ^ crc16tbl[0][(crc ^ *p++) & 0xff];
 +		len--;
 +	}
 +	buff = (const uint16_t *)p;
 +	/*
 +	 * Modern C compiler such as GCC does not unroll automatically yet
 +	 * without unrolling pragma, and Clang is so. So we should
 +	 * unroll this loop for its performance.
 +	 */
 +	for (;len >= 8; len -= 8) {
 +		/* This if statement expects compiler optimization will
- 		 * remove the stament which will not be executed. */
++		 * remove the statement which will not be executed. */
++#undef bswap16
 +#ifndef __has_builtin
 +#  define __has_builtin(x) 0
 +#endif
 +#if defined(_MSC_VER) && _MSC_VER >= 1400  /* Visual Studio */
 +#  define bswap16(x) _byteswap_ushort(x)
- #elif (defined(__GNUC__) && __GNUC__ >= 4 && __GNUC_MINOR__ >= 8) \
-       || (defined(__clang__) && __has_builtin(__builtin_bswap16))
++#elif defined(__GNUC__) && ((__GNUC__ == 4 && __GNUC_MINOR__ >= 8) || __GNUC__ > 4)
++/* GCC 4.8 and later has __builtin_bswap16() */
++#  define bswap16(x) __builtin_bswap16(x)
++#elif defined(__clang__) && __has_builtin(__builtin_bswap16)
++/* All clang versions have __builtin_bswap16() */
 +#  define bswap16(x) __builtin_bswap16(x)
 +#else
 +#  define bswap16(x) ((((x) >> 8) & 0xff) | ((x) << 8))
 +#endif
 +#define CRC16W	do { 	\
 +		if(u.c[0] == 1) { /* Big endian */		\
 +			crc ^= bswap16(*buff); buff++;		\
 +		} else						\
 +			crc ^= *buff++;				\
 +		crc = crc16tbl[1][crc & 0xff] ^ crc16tbl[0][crc >> 8];\
 +} while (0)
 +		CRC16W;
 +		CRC16W;
 +		CRC16W;
 +		CRC16W;
 +#undef CRC16W
 +#undef bswap16
 +	}
 +
 +	p = (const unsigned char *)buff;
 +	for (;len; len--) {
 +		crc = (crc >> 8) ^ crc16tbl[0][(crc ^ *p++) & 0xff];
 +	}
 +	return crc;
 +}
 +
 +/*
 + * Initialize LZHUF decoder.
 + *
 + * Returns ARCHIVE_OK if initialization was successful.
 + * Returns ARCHIVE_FAILED if method is unsupported.
 + * Returns ARCHIVE_FATAL if initialization failed; memory allocation
 + * error occurred.
 + */
 +static int
 +lzh_decode_init(struct lzh_stream *strm, const char *method)
 +{
 +	struct lzh_dec *ds;
 +	int w_bits, w_size;
 +
 +	if (strm->ds == NULL) {
 +		strm->ds = calloc(1, sizeof(*strm->ds));
 +		if (strm->ds == NULL)
 +			return (ARCHIVE_FATAL);
 +	}
 +	ds = strm->ds;
 +	ds->error = ARCHIVE_FAILED;
 +	if (method == NULL || method[0] != 'l' || method[1] != 'h')
 +		return (ARCHIVE_FAILED);
 +	switch (method[2]) {
 +	case '5':
 +		w_bits = 13;/* 8KiB for window */
 +		break;
 +	case '6':
 +		w_bits = 15;/* 32KiB for window */
 +		break;
 +	case '7':
 +		w_bits = 16;/* 64KiB for window */
 +		break;
 +	default:
 +		return (ARCHIVE_FAILED);/* Not supported. */
 +	}
 +	ds->error = ARCHIVE_FATAL;
 +	/* Expand a window size up to 128 KiB for decompressing process
 +	 * performance whatever its original window size is. */
 +	ds->w_size = 1U << 17;
 +	ds->w_mask = ds->w_size -1;
 +	if (ds->w_buff == NULL) {
 +		ds->w_buff = malloc(ds->w_size);
 +		if (ds->w_buff == NULL)
 +			return (ARCHIVE_FATAL);
 +	}
 +	w_size = 1U << w_bits;
 +	memset(ds->w_buff + ds->w_size - w_size, 0x20, w_size);
 +	ds->w_pos = 0;
 +	ds->state = 0;
 +	ds->pos_pt_len_size = w_bits + 1;
 +	ds->pos_pt_len_bits = (w_bits == 15 || w_bits == 16)? 5: 4;
 +	ds->literal_pt_len_size = PT_BITLEN_SIZE;
 +	ds->literal_pt_len_bits = 5;
 +	ds->br.cache_buffer = 0;
 +	ds->br.cache_avail = 0;
 +
 +	if (lzh_huffman_init(&(ds->lt), LT_BITLEN_SIZE, 16)
 +	    != ARCHIVE_OK)
 +		return (ARCHIVE_FATAL);
 +	ds->lt.len_bits = 9;
 +	if (lzh_huffman_init(&(ds->pt), PT_BITLEN_SIZE, 16)
 +	    != ARCHIVE_OK)
 +		return (ARCHIVE_FATAL);
 +	ds->error = 0;
 +
 +	return (ARCHIVE_OK);
 +}
 +
 +/*
 + * Release LZHUF decoder.
 + */
 +static void
 +lzh_decode_free(struct lzh_stream *strm)
 +{
 +
 +	if (strm->ds == NULL)
 +		return;
 +	free(strm->ds->w_buff);
 +	lzh_huffman_free(&(strm->ds->lt));
 +	lzh_huffman_free(&(strm->ds->pt));
 +	free(strm->ds);
 +	strm->ds = NULL;
 +}
 +
 +/*
 + * Bit stream reader.
 + */
 +/* Check that the cache buffer has enough bits. */
 +#define lzh_br_has(br, n)	((br)->cache_avail >= n)
 +/* Get compressed data by bit. */
 +#define lzh_br_bits(br, n)				\
 +	(((uint16_t)((br)->cache_buffer >>		\
 +		((br)->cache_avail - (n)))) & cache_masks[n])
 +#define lzh_br_bits_forced(br, n)			\
 +	(((uint16_t)((br)->cache_buffer <<		\
 +		((n) - (br)->cache_avail))) & cache_masks[n])
 +/* Read ahead to make sure the cache buffer has enough compressed data we
 + * will use.
 + *  True  : completed, there is enough data in the cache buffer.
 + *  False : we met that strm->next_in is empty, we have to get following
 + *          bytes. */
 +#define lzh_br_read_ahead_0(strm, br, n)	\
 +	(lzh_br_has(br, (n)) || lzh_br_fillup(strm, br))
 +/*  True  : the cache buffer has some bits as much as we need.
 + *  False : there are no enough bits in the cache buffer to be used,
 + *          we have to get following bytes if we could. */
 +#define lzh_br_read_ahead(strm, br, n)	\
 +	(lzh_br_read_ahead_0((strm), (br), (n)) || lzh_br_has((br), (n)))
 +
 +/* Notify how many bits we consumed. */
 +#define lzh_br_consume(br, n)	((br)->cache_avail -= (n))
 +#define lzh_br_unconsume(br, n)	((br)->cache_avail += (n))
 +
 +static const uint16_t cache_masks[] = {
 +	0x0000, 0x0001, 0x0003, 0x0007,
 +	0x000F, 0x001F, 0x003F, 0x007F,
 +	0x00FF, 0x01FF, 0x03FF, 0x07FF,
 +	0x0FFF, 0x1FFF, 0x3FFF, 0x7FFF,
 +	0xFFFF, 0xFFFF, 0xFFFF, 0xFFFF
 +};
 +
 +/*
 + * Shift away used bits in the cache data and fill it up with following bits.
 + * Call this when cache buffer does not have enough bits you need.
 + *
 + * Returns 1 if the cache buffer is full.
 + * Returns 0 if the cache buffer is not full; input buffer is empty.
 + */
 +static int
 +lzh_br_fillup(struct lzh_stream *strm, struct lzh_br *br)
 +{
 +	int n = CACHE_BITS - br->cache_avail;
 +
 +	for (;;) {
 +		const int x = n >> 3;
 +		if (strm->avail_in >= x) {
 +			switch (x) {
 +			case 8:
 +				br->cache_buffer =
 +				    ((uint64_t)strm->next_in[0]) << 56 |
 +				    ((uint64_t)strm->next_in[1]) << 48 |
 +				    ((uint64_t)strm->next_in[2]) << 40 |
 +				    ((uint64_t)strm->next_in[3]) << 32 |
 +				    ((uint32_t)strm->next_in[4]) << 24 |
 +				    ((uint32_t)strm->next_in[5]) << 16 |
 +				    ((uint32_t)strm->next_in[6]) << 8 |
 +				     (uint32_t)strm->next_in[7];
 +				strm->next_in += 8;
 +				strm->avail_in -= 8;
 +				br->cache_avail += 8 * 8;
 +				return (1);
 +			case 7:
 +				br->cache_buffer =
 +		 		   (br->cache_buffer << 56) |
 +				    ((uint64_t)strm->next_in[0]) << 48 |
 +				    ((uint64_t)strm->next_in[1]) << 40 |
 +				    ((uint64_t)strm->next_in[2]) << 32 |
 +				    ((uint32_t)strm->next_in[3]) << 24 |
 +				    ((uint32_t)strm->next_in[4]) << 16 |
 +				    ((uint32_t)strm->next_in[5]) << 8 |
 +				     (uint32_t)strm->next_in[6];
 +				strm->next_in += 7;
 +				strm->avail_in -= 7;
 +				br->cache_avail += 7 * 8;
 +				return (1);
 +			case 6:
 +				br->cache_buffer =
 +		 		   (br->cache_buffer << 48) |
 +				    ((uint64_t)strm->next_in[0]) << 40 |
 +				    ((uint64_t)strm->next_in[1]) << 32 |
 +				    ((uint32_t)strm->next_in[2]) << 24 |
 +				    ((uint32_t)strm->next_in[3]) << 16 |
 +				    ((uint32_t)strm->next_in[4]) << 8 |
 +				     (uint32_t)strm->next_in[5];
 +				strm->next_in += 6;
 +				strm->avail_in -= 6;
 +				br->cache_avail += 6 * 8;
 +				return (1);
 +			case 0:
 +				/* We have enough compressed data in
 +				 * the cache buffer.*/
 +				return (1);
 +			default:
 +				break;
 +			}
 +		}
 +		if (strm->avail_in == 0) {
 +			/* There is not enough compressed data to fill up the
 +			 * cache buffer. */
 +			return (0);
 +		}
 +		br->cache_buffer =
 +		   (br->cache_buffer << 8) | *strm->next_in++;
 +		strm->avail_in--;
 +		br->cache_avail += 8;
 +		n -= 8;
 +	}
 +}
 +
 +/*
 + * Decode LZHUF.
 + *
 + * 1. Returns ARCHIVE_OK if output buffer or input buffer are empty.
 + *    Please set available buffer and call this function again.
 + * 2. Returns ARCHIVE_EOF if decompression has been completed.
 + * 3. Returns ARCHIVE_FAILED if an error occurred; compressed data
 + *    is broken or you do not set 'last' flag properly.
 + * 4. 'last' flag is very important, you must set 1 to the flag if there
 + *    is no input data. The lha compressed data format does not provide how
 + *    to know the compressed data is really finished.
 + *    Note: lha command utility check if the total size of output bytes is
 + *    reached the uncompressed size recorded in its header. it does not mind
 + *    that the decoding process is properly finished.
 + *    GNU ZIP can decompress another compressed file made by SCO LZH compress.
 + *    it handles EOF as null to fill read buffer with zero until the decoding
 + *    process meet 2 bytes of zeros at reading a size of a next chunk, so the
 + *    zeros are treated as the mark of the end of the data although the zeros
 + *    is dummy, not the file data.
 + */
 +static int	lzh_read_blocks(struct lzh_stream *, int);
 +static int	lzh_decode_blocks(struct lzh_stream *, int);
 +#define ST_RD_BLOCK		0
 +#define ST_RD_PT_1		1
 +#define ST_RD_PT_2		2
 +#define ST_RD_PT_3		3
 +#define ST_RD_PT_4		4
 +#define ST_RD_LITERAL_1		5
 +#define ST_RD_LITERAL_2		6
 +#define ST_RD_LITERAL_3		7
 +#define ST_RD_POS_DATA_1	8
 +#define ST_GET_LITERAL		9
 +#define ST_GET_POS_1		10
 +#define ST_GET_POS_2		11
 +#define ST_COPY_DATA		12
 +
 +static int
 +lzh_decode(struct lzh_stream *strm, int last)
 +{
 +	struct lzh_dec *ds = strm->ds;
 +	int avail_in;
 +	int r;
 +
 +	if (ds->error)
 +		return (ds->error);
 +
 +	avail_in = strm->avail_in;
 +	do {
 +		if (ds->state < ST_GET_LITERAL)
 +			r = lzh_read_blocks(strm, last);
 +		else
 +			r = lzh_decode_blocks(strm, last);
 +	} while (r == 100);
 +	strm->total_in += avail_in - strm->avail_in;
 +	return (r);
 +}
 +
 +static void
 +lzh_emit_window(struct lzh_stream *strm, size_t s)
 +{
 +	strm->ref_ptr = strm->ds->w_buff;
 +	strm->avail_out = (int)s;
 +	strm->total_out += s;
 +}
 +
 +static int
 +lzh_read_blocks(struct lzh_stream *strm, int last)
 +{
 +	struct lzh_dec *ds = strm->ds;
 +	struct lzh_br *br = &(ds->br);
 +	int c = 0, i;
 +	unsigned rbits;
 +
 +	for (;;) {
 +		switch (ds->state) {
 +		case ST_RD_BLOCK:
 +			/*
 +			 * Read a block number indicates how many blocks
 +			 * we will handle. The block is composed of a
 +			 * literal and a match, sometimes a literal only
 +			 * in particular, there are no reference data at
 +			 * the beginning of the decompression.
 +			 */
 +			if (!lzh_br_read_ahead_0(strm, br, 16)) {
 +				if (!last)
 +					/* We need following data. */
 +					return (ARCHIVE_OK);
 +				if (lzh_br_has(br, 8)) {
 +					/*
 +					 * It seems there are extra bits.
 +					 *  1. Compressed data is broken.
 +					 *  2. `last' flag does not properly
 +					 *     set.
 +					 */
 +					goto failed;
 +				}
 +				if (ds->w_pos > 0) {
 +					lzh_emit_window(strm, ds->w_pos);
 +					ds->w_pos = 0;
 +					return (ARCHIVE_OK);
 +				}
 +				/* End of compressed data; we have completely
 +				 * handled all compressed data. */
 +				return (ARCHIVE_EOF);
 +			}
 +			ds->blocks_avail = lzh_br_bits(br, 16);
 +			if (ds->blocks_avail == 0)
 +				goto failed;
 +			lzh_br_consume(br, 16);
 +			/*
 +			 * Read a literal table compressed in huffman
 +			 * coding.
 +			 */
 +			ds->pt.len_size = ds->literal_pt_len_size;
 +			ds->pt.len_bits = ds->literal_pt_len_bits;
 +			ds->reading_position = 0;
 +			/* FALL THROUGH */
 +		case ST_RD_PT_1:
 +			/* Note: ST_RD_PT_1, ST_RD_PT_2 and ST_RD_PT_4 are
 +			 * used in reading both a literal table and a
 +			 * position table. */
 +			if (!lzh_br_read_ahead(strm, br, ds->pt.len_bits)) {
 +				if (last)
 +					goto failed;/* Truncated data. */
 +				ds->state = ST_RD_PT_1;
 +				return (ARCHIVE_OK);
 +			}
 +			ds->pt.len_avail = lzh_br_bits(br, ds->pt.len_bits);
 +			lzh_br_consume(br, ds->pt.len_bits);
 +			/* FALL THROUGH */
 +		case ST_RD_PT_2:
 +			if (ds->pt.len_avail == 0) {
 +				/* There is no bitlen. */
 +				if (!lzh_br_read_ahead(strm, br,
 +				    ds->pt.len_bits)) {
 +					if (last)
 +						goto failed;/* Truncated data.*/
 +					ds->state = ST_RD_PT_2;
 +					return (ARCHIVE_OK);
 +				}
 +				if (!lzh_make_fake_table(&(ds->pt),
 +				    lzh_br_bits(br, ds->pt.len_bits)))
 +					goto failed;/* Invalid data. */
 +				lzh_br_consume(br, ds->pt.len_bits);
 +				if (ds->reading_position)
 +					ds->state = ST_GET_LITERAL;
 +				else
 +					ds->state = ST_RD_LITERAL_1;
 +				break;
 +			} else if (ds->pt.len_avail > ds->pt.len_size)
 +				goto failed;/* Invalid data. */
 +			ds->loop = 0;
 +			memset(ds->pt.freq, 0, sizeof(ds->pt.freq));
 +			if (ds->pt.len_avail < 3 ||
 +			    ds->pt.len_size == ds->pos_pt_len_size) {
 +				ds->state = ST_RD_PT_4;
 +				break;
 +			}
 +			/* FALL THROUGH */
 +		case ST_RD_PT_3:
 +			ds->loop = lzh_read_pt_bitlen(strm, ds->loop, 3);
 +			if (ds->loop < 3) {
 +				if (ds->loop < 0 || last)
 +					goto failed;/* Invalid data. */
 +				/* Not completed, get following data. */
 +				ds->state = ST_RD_PT_3;
 +				return (ARCHIVE_OK);
 +			}
 +			/* There are some null in bitlen of the literal. */
 +			if (!lzh_br_read_ahead(strm, br, 2)) {
 +				if (last)
 +					goto failed;/* Truncated data. */
 +				ds->state = ST_RD_PT_3;
 +				return (ARCHIVE_OK);
 +			}
 +			c = lzh_br_bits(br, 2);
 +			lzh_br_consume(br, 2);
 +			if (c > ds->pt.len_avail - 3)
 +				goto failed;/* Invalid data. */
 +			for (i = 3; c-- > 0 ;)
 +				ds->pt.bitlen[i++] = 0;
 +			ds->loop = i;
 +			/* FALL THROUGH */
 +		case ST_RD_PT_4:
 +			ds->loop = lzh_read_pt_bitlen(strm, ds->loop,
 +			    ds->pt.len_avail);
 +			if (ds->loop < ds->pt.len_avail) {
 +				if (ds->loop < 0 || last)
 +					goto failed;/* Invalid data. */
 +				/* Not completed, get following data. */
 +				ds->state = ST_RD_PT_4;
 +				return (ARCHIVE_OK);
 +			}
 +			if (!lzh_make_huffman_table(&(ds->pt)))
 +				goto failed;/* Invalid data */
 +			if (ds->reading_position) {
 +				ds->state = ST_GET_LITERAL;
 +				break;
 +			}
 +			/* FALL THROUGH */
 +		case ST_RD_LITERAL_1:
 +			if (!lzh_br_read_ahead(strm, br, ds->lt.len_bits)) {
 +				if (last)
 +					goto failed;/* Truncated data. */
 +				ds->state = ST_RD_LITERAL_1;
 +				return (ARCHIVE_OK);
 +			}
 +			ds->lt.len_avail = lzh_br_bits(br, ds->lt.len_bits);
 +			lzh_br_consume(br, ds->lt.len_bits);
 +			/* FALL THROUGH */
 +		case ST_RD_LITERAL_2:
 +			if (ds->lt.len_avail == 0) {
 +				/* There is no bitlen. */
 +				if (!lzh_br_read_ahead(strm, br,
 +				    ds->lt.len_bits)) {
 +					if (last)
 +						goto failed;/* Truncated data.*/
 +					ds->state = ST_RD_LITERAL_2;
 +					return (ARCHIVE_OK);
 +				}
 +				if (!lzh_make_fake_table(&(ds->lt),
 +				    lzh_br_bits(br, ds->lt.len_bits)))
 +					goto failed;/* Invalid data */
 +				lzh_br_consume(br, ds->lt.len_bits);
 +				ds->state = ST_RD_POS_DATA_1;
 +				break;
 +			} else if (ds->lt.len_avail > ds->lt.len_size)
 +				goto failed;/* Invalid data */
 +			ds->loop = 0;
 +			memset(ds->lt.freq, 0, sizeof(ds->lt.freq));
 +			/* FALL THROUGH */
 +		case ST_RD_LITERAL_3:
 +			i = ds->loop;
 +			while (i < ds->lt.len_avail) {
 +				if (!lzh_br_read_ahead(strm, br,
 +				    ds->pt.max_bits)) {
 +					if (last)
 +						goto failed;/* Truncated data.*/
 +					ds->loop = i;
 +					ds->state = ST_RD_LITERAL_3;
 +					return (ARCHIVE_OK);
 +				}
 +				rbits = lzh_br_bits(br, ds->pt.max_bits);
 +				c = lzh_decode_huffman(&(ds->pt), rbits);
 +				if (c > 2) {
 +					/* Note: 'c' will never be more than
 +					 * eighteen since it's limited by
 +					 * PT_BITLEN_SIZE, which is being set
 +					 * to ds->pt.len_size through
 +					 * ds->literal_pt_len_size. */
 +					lzh_br_consume(br, ds->pt.bitlen[c]);
 +					c -= 2;
 +					ds->lt.freq[c]++;
 +					ds->lt.bitlen[i++] = c;
 +				} else if (c == 0) {
 +					lzh_br_consume(br, ds->pt.bitlen[c]);
 +					ds->lt.bitlen[i++] = 0;
 +				} else {
 +					/* c == 1 or c == 2 */
 +					int n = (c == 1)?4:9;
 +					if (!lzh_br_read_ahead(strm, br,
 +					     ds->pt.bitlen[c] + n)) {
 +						if (last) /* Truncated data. */
 +							goto failed;
 +						ds->loop = i;
 +						ds->state = ST_RD_LITERAL_3;
 +						return (ARCHIVE_OK);
 +					}
 +					lzh_br_consume(br, ds->pt.bitlen[c]);
 +					c = lzh_br_bits(br, n);
 +					lzh_br_consume(br, n);
 +					c += (n == 4)?3:20;
 +					if (i + c > ds->lt.len_avail)
 +						goto failed;/* Invalid data */
 +					memset(&(ds->lt.bitlen[i]), 0, c);
 +					i += c;
 +				}
 +			}
 +			if (i > ds->lt.len_avail ||
 +			    !lzh_make_huffman_table(&(ds->lt)))
 +				goto failed;/* Invalid data */
 +			/* FALL THROUGH */
 +		case ST_RD_POS_DATA_1:
 +			/*
 +			 * Read a position table compressed in huffman
 +			 * coding.
 +			 */
 +			ds->pt.len_size = ds->pos_pt_len_size;
 +			ds->pt.len_bits = ds->pos_pt_len_bits;
 +			ds->reading_position = 1;
 +			ds->state = ST_RD_PT_1;
 +			break;
 +		case ST_GET_LITERAL:
 +			return (100);
 +		}
 +	}
 +failed:
 +	return (ds->error = ARCHIVE_FAILED);
 +}
 +
 +static int
 +lzh_decode_blocks(struct lzh_stream *strm, int last)
 +{
 +	struct lzh_dec *ds = strm->ds;
 +	struct lzh_br bre = ds->br;
 +	struct huffman *lt = &(ds->lt);
 +	struct huffman *pt = &(ds->pt);
 +	unsigned char *w_buff = ds->w_buff;
 +	unsigned char *lt_bitlen = lt->bitlen;
 +	unsigned char *pt_bitlen = pt->bitlen;
 +	int blocks_avail = ds->blocks_avail, c = 0;
 +	int copy_len = ds->copy_len, copy_pos = ds->copy_pos;
 +	int w_pos = ds->w_pos, w_mask = ds->w_mask, w_size = ds->w_size;
 +	int lt_max_bits = lt->max_bits, pt_max_bits = pt->max_bits;
 +	int state = ds->state;
 +
 +	for (;;) {
 +		switch (state) {
 +		case ST_GET_LITERAL:
 +			for (;;) {
 +				if (blocks_avail == 0) {
 +					/* We have decoded all blocks.
 +					 * Let's handle next blocks. */
 +					ds->state = ST_RD_BLOCK;
 +					ds->br = bre;
 +					ds->blocks_avail = 0;
 +					ds->w_pos = w_pos;
 +					ds->copy_pos = 0;
 +					return (100);
 +				}
 +
 +				/* lzh_br_read_ahead() always try to fill the
 +				 * cache buffer up. In specific situation we
 +				 * are close to the end of the data, the cache
 +				 * buffer will not be full and thus we have to
 +				 * determine if the cache buffer has some bits
 +				 * as much as we need after lzh_br_read_ahead()
 +				 * failed. */
 +				if (!lzh_br_read_ahead(strm, &bre,
 +				    lt_max_bits)) {
 +					if (!last)
 +						goto next_data;
 +					/* Remaining bits are less than
 +					 * maximum bits(lt.max_bits) but maybe
 +					 * it still remains as much as we need,
 +					 * so we should try to use it with
 +					 * dummy bits. */
 +					c = lzh_decode_huffman(lt,
 +					      lzh_br_bits_forced(&bre,
 +					        lt_max_bits));
 +					lzh_br_consume(&bre, lt_bitlen[c]);
 +					if (!lzh_br_has(&bre, 0))
 +						goto failed;/* Over read. */
 +				} else {
 +					c = lzh_decode_huffman(lt,
 +					      lzh_br_bits(&bre, lt_max_bits));
 +					lzh_br_consume(&bre, lt_bitlen[c]);
 +				}
 +				blocks_avail--;
 +				if (c > UCHAR_MAX)
 +					/* Current block is a match data. */
 +					break;
 +				/*
 +				 * 'c' is exactly a literal code.
 +				 */
 +				/* Save a decoded code to reference it
 +				 * afterward. */
 +				w_buff[w_pos] = c;
 +				if (++w_pos >= w_size) {
 +					w_pos = 0;
 +					lzh_emit_window(strm, w_size);
 +					goto next_data;
 +				}
 +			}
 +			/* 'c' is the length of a match pattern we have
 +			 * already extracted, which has be stored in
 +			 * window(ds->w_buff). */
 +			copy_len = c - (UCHAR_MAX + 1) + MINMATCH;
 +			/* FALL THROUGH */
 +		case ST_GET_POS_1:
 +			/*
 +			 * Get a reference position. 
 +			 */
 +			if (!lzh_br_read_ahead(strm, &bre, pt_max_bits)) {
 +				if (!last) {
 +					state = ST_GET_POS_1;
 +					ds->copy_len = copy_len;
 +					goto next_data;
 +				}
 +				copy_pos = lzh_decode_huffman(pt,
 +				    lzh_br_bits_forced(&bre, pt_max_bits));
 +				lzh_br_consume(&bre, pt_bitlen[copy_pos]);
 +				if (!lzh_br_has(&bre, 0))
 +					goto failed;/* Over read. */
 +			} else {
 +				copy_pos = lzh_decode_huffman(pt,
 +				    lzh_br_bits(&bre, pt_max_bits));
 +				lzh_br_consume(&bre, pt_bitlen[copy_pos]);
 +			}
 +			/* FALL THROUGH */
 +		case ST_GET_POS_2:
 +			if (copy_pos > 1) {
 +				/* We need an additional adjustment number to
 +				 * the position. */
 +				int p = copy_pos - 1;
 +				if (!lzh_br_read_ahead(strm, &bre, p)) {
 +					if (last)
 +						goto failed;/* Truncated data.*/
 +					state = ST_GET_POS_2;
 +					ds->copy_len = copy_len;
 +					ds->copy_pos = copy_pos;
 +					goto next_data;
 +				}
 +				copy_pos = (1 << p) + lzh_br_bits(&bre, p);
 +				lzh_br_consume(&bre, p);
 +			}
 +			/* The position is actually a distance from the last
 +			 * code we had extracted and thus we have to convert
 +			 * it to a position of the window. */
 +			copy_pos = (w_pos - copy_pos - 1) & w_mask;
 +			/* FALL THROUGH */
 +		case ST_COPY_DATA:
 +			/*
 +			 * Copy `copy_len' bytes as extracted data from
 +			 * the window into the output buffer.
 +			 */
 +			for (;;) {
 +				int l;
 +
 +				l = copy_len;
 +				if (copy_pos > w_pos) {
 +					if (l > w_size - copy_pos)
 +						l = w_size - copy_pos;
 +				} else {
 +					if (l > w_size - w_pos)
 +						l = w_size - w_pos;
 +				}
 +				if ((copy_pos + l < w_pos)
 +				    || (w_pos + l < copy_pos)) {
 +					/* No overlap. */
 +					memcpy(w_buff + w_pos,
 +					    w_buff + copy_pos, l);
 +				} else {
 +					const unsigned char *s;
 +					unsigned char *d;
 +					int li;
 +
 +					d = w_buff + w_pos;
 +					s = w_buff + copy_pos;
 +					for (li = 0; li < l-1;) {
 +						d[li] = s[li];li++;
 +						d[li] = s[li];li++;
 +					}
 +					if (li < l)
 +						d[li] = s[li];
 +				}
 +				w_pos += l;
 +				if (w_pos == w_size) {
 +					w_pos = 0;
 +					lzh_emit_window(strm, w_size);
 +					if (copy_len <= l)
 +						state = ST_GET_LITERAL;
 +					else {
 +						state = ST_COPY_DATA;
 +						ds->copy_len = copy_len - l;
 +						ds->copy_pos =
 +						    (copy_pos + l) & w_mask;
 +					}
 +					goto next_data;
 +				}
 +				if (copy_len <= l)
 +					/* A copy of current pattern ended. */
 +					break;
 +				copy_len -= l;
 +				copy_pos = (copy_pos + l) & w_mask;
 +			}
 +			state = ST_GET_LITERAL;
 +			break;
 +		}
 +	}
 +failed:
 +	return (ds->error = ARCHIVE_FAILED);
 +next_data:
 +	ds->br = bre;
 +	ds->blocks_avail = blocks_avail;
 +	ds->state = state;
 +	ds->w_pos = w_pos;
 +	return (ARCHIVE_OK);
 +}
 +
 +static int
 +lzh_huffman_init(struct huffman *hf, size_t len_size, int tbl_bits)
 +{
 +	int bits;
 +
 +	if (hf->bitlen == NULL) {
 +		hf->bitlen = malloc(len_size * sizeof(hf->bitlen[0]));
 +		if (hf->bitlen == NULL)
 +			return (ARCHIVE_FATAL);
 +	}
 +	if (hf->tbl == NULL) {
 +		if (tbl_bits < HTBL_BITS)
 +			bits = tbl_bits;
 +		else
 +			bits = HTBL_BITS;
 +		hf->tbl = malloc(((size_t)1 << bits) * sizeof(hf->tbl[0]));
 +		if (hf->tbl == NULL)
 +			return (ARCHIVE_FATAL);
 +	}
 +	if (hf->tree == NULL && tbl_bits > HTBL_BITS) {
 +		hf->tree_avail = 1 << (tbl_bits - HTBL_BITS + 4);
 +		hf->tree = malloc(hf->tree_avail * sizeof(hf->tree[0]));
 +		if (hf->tree == NULL)
 +			return (ARCHIVE_FATAL);
 +	}
 +	hf->len_size = (int)len_size;
 +	hf->tbl_bits = tbl_bits;
 +	return (ARCHIVE_OK);
 +}
 +
 +static void
 +lzh_huffman_free(struct huffman *hf)
 +{
 +	free(hf->bitlen);
 +	free(hf->tbl);
 +	free(hf->tree);
 +}
 +
 +static char bitlen_tbl[0x400] = {
 +	 7,  7,  7,  7,  7,  7,  7,  7,  7,  7,  7,  7,  7,  7,  7,  7,
 +	 7,  7,  7,  7,  7,  7,  7,  7,  7,  7,  7,  7,  7,  7,  7,  7,
 +	 7,  7,  7,  7,  7,  7,  7,  7,  7,  7,  7,  7,  7,  7,  7,  7,
 +	 7,  7,  7,  7,  7,  7,  7,  7,  7,  7,  7,  7,  7,  7,  7,  7,
 +	 7,  7,  7,  7,  7,  7,  7,  7,  7,  7,  7,  7,  7,  7,  7,  7,
 +	 7,  7,  7,  7,  7,  7,  7,  7,  7,  7,  7,  7,  7,  7,  7,  7,
 +	 7,  7,  7,  7,  7,  7,  7,  7,  7,  7,  7,  7,  7,  7,  7,  7,
 +	 7,  7,  7,  7,  7,  7,  7,  7,  7,  7,  7,  7,  7,  7,  7,  7,
 +	 7,  7,  7,  7,  7,  7,  7,  7,  7,  7,  7,  7,  7,  7,  7,  7,
 +	 7,  7,  7,  7,  7,  7,  7,  7,  7,  7,  7,  7,  7,  7,  7,  7,
 +	 7,  7,  7,  7,  7,  7,  7,  7,  7,  7,  7,  7,  7,  7,  7,  7,
 +	 7,  7,  7,  7,  7,  7,  7,  7,  7,  7,  7,  7,  7,  7,  7,  7,
 +	 7,  7,  7,  7,  7,  7,  7,  7,  7,  7,  7,  7,  7,  7,  7,  7,
 +	 7,  7,  7,  7,  7,  7,  7,  7,  7,  7,  7,  7,  7,  7,  7,  7,
 +	 7,  7,  7,  7,  7,  7,  7,  7,  7,  7,  7,  7,  7,  7,  7,  7,
 +	 7,  7,  7,  7,  7,  7,  7,  7,  7,  7,  7,  7,  7,  7,  7,  7,
 +	 7,  7,  7,  7,  7,  7,  7,  7,  7,  7,  7,  7,  7,  7,  7,  7,
 +	 7,  7,  7,  7,  7,  7,  7,  7,  7,  7,  7,  7,  7,  7,  7,  7,
 +	 7,  7,  7,  7,  7,  7,  7,  7,  7,  7,  7,  7,  7,  7,  7,  7,
 +	 7,  7,  7,  7,  7,  7,  7,  7,  7,  7,  7,  7,  7,  7,  7,  7,
 +	 7,  7,  7,  7,  7,  7,  7,  7,  7,  7,  7,  7,  7,  7,  7,  7,
 +	 7,  7,  7,  7,  7,  7,  7,  7,  7,  7,  7,  7,  7,  7,  7,  7,
 +	 7,  7,  7,  7,  7,  7,  7,  7,  7,  7,  7,  7,  7,  7,  7,  7,
 +	 7,  7,  7,  7,  7,  7,  7,  7,  7,  7,  7,  7,  7,  7,  7,  7,
 +	 7,  7,  7,  7,  7,  7,  7,  7,  7,  7,  7,  7,  7,  7,  7,  7,
 +	 7,  7,  7,  7,  7,  7,  7,  7,  7,  7,  7,  7,  7,  7,  7,  7,
 +	 7,  7,  7,  7,  7,  7,  7,  7,  7,  7,  7,  7,  7,  7,  7,  7,
 +	 7,  7,  7,  7,  7,  7,  7,  7,  7,  7,  7,  7,  7,  7,  7,  7,
 +	 7,  7,  7,  7,  7,  7,  7,  7,  7,  7,  7,  7,  7,  7,  7,  7,
 +	 7,  7,  7,  7,  7,  7,  7,  7,  7,  7,  7,  7,  7,  7,  7,  7,
 +	 7,  7,  7,  7,  7,  7,  7,  7,  7,  7,  7,  7,  7,  7,  7,  7,
 +	 7,  7,  7,  7,  7,  7,  7,  7,  7,  7,  7,  7,  7,  7,  7,  7,
 +	 8,  8,  8,  8,  8,  8,  8,  8,  8,  8,  8,  8,  8,  8,  8,  8,
 +	 8,  8,  8,  8,  8,  8,  8,  8,  8,  8,  8,  8,  8,  8,  8,  8,
 +	 8,  8,  8,  8,  8,  8,  8,  8,  8,  8,  8,  8,  8,  8,  8,  8,
 +	 8,  8,  8,  8,  8,  8,  8,  8,  8,  8,  8,  8,  8,  8,  8,  8,
 +	 8,  8,  8,  8,  8,  8,  8,  8,  8,  8,  8,  8,  8,  8,  8,  8,
 +	 8,  8,  8,  8,  8,  8,  8,  8,  8,  8,  8,  8,  8,  8,  8,  8,
 +	 8,  8,  8,  8,  8,  8,  8,  8,  8,  8,  8,  8,  8,  8,  8,  8,
 +	 8,  8,  8,  8,  8,  8,  8,  8,  8,  8,  8,  8,  8,  8,  8,  8,
 +	 8,  8,  8,  8,  8,  8,  8,  8,  8,  8,  8,  8,  8,  8,  8,  8,
 +	 8,  8,  8,  8,  8,  8,  8,  8,  8,  8,  8,  8,  8,  8,  8,  8,
 +	 8,  8,  8,  8,  8,  8,  8,  8,  8,  8,  8,  8,  8,  8,  8,  8,
 +	 8,  8,  8,  8,  8,  8,  8,  8,  8,  8,  8,  8,  8,  8,  8,  8,
 +	 8,  8,  8,  8,  8,  8,  8,  8,  8,  8,  8,  8,  8,  8,  8,  8,
 +	 8,  8,  8,  8,  8,  8,  8,  8,  8,  8,  8,  8,  8,  8,  8,  8,
 +	 8,  8,  8,  8,  8,  8,  8,  8,  8,  8,  8,  8,  8,  8,  8,  8,
 +	 8,  8,  8,  8,  8,  8,  8,  8,  8,  8,  8,  8,  8,  8,  8,  8,
 +	 9,  9,  9,  9,  9,  9,  9,  9,  9,  9,  9,  9,  9,  9,  9,  9,
 +	 9,  9,  9,  9,  9,  9,  9,  9,  9,  9,  9,  9,  9,  9,  9,  9,
 +	 9,  9,  9,  9,  9,  9,  9,  9,  9,  9,  9,  9,  9,  9,  9,  9,
 +	 9,  9,  9,  9,  9,  9,  9,  9,  9,  9,  9,  9,  9,  9,  9,  9,
 +	 9,  9,  9,  9,  9,  9,  9,  9,  9,  9,  9,  9,  9,  9,  9,  9,
 +	 9,  9,  9,  9,  9,  9,  9,  9,  9,  9,  9,  9,  9,  9,  9,  9,
 +	 9,  9,  9,  9,  9,  9,  9,  9,  9,  9,  9,  9,  9,  9,  9,  9,
 +	 9,  9,  9,  9,  9,  9,  9,  9,  9,  9,  9,  9,  9,  9,  9,  9,
 +	10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10,
 +	10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10,
 +	10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10,
 +	10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10,
 +	11, 11, 11, 11, 11, 11, 11, 11, 11, 11, 11, 11, 11, 11, 11, 11,
 +	11, 11, 11, 11, 11, 11, 11, 11, 11, 11, 11, 11, 11, 11, 11, 11,
 +	12, 12, 12, 12, 12, 12, 12, 12, 12, 12, 12, 12, 12, 12, 12, 12,
 +	13, 13, 13, 13, 13, 13, 13, 13, 14, 14, 14, 14, 15, 15, 16,  0
 +};
 +static int
 +lzh_read_pt_bitlen(struct lzh_stream *strm, int start, int end)
 +{
 +	struct lzh_dec *ds = strm->ds;
 +	struct lzh_br *br = &(ds->br);
 +	int c, i;
 +
 +	for (i = start; i < end; ) {
 +		/*
 +		 *  bit pattern     the number we need
 +		 *     000           ->  0
 +		 *     001           ->  1
 +		 *     010           ->  2
 +		 *     ...
 +		 *     110           ->  6
 +		 *     1110          ->  7
 +		 *     11110         ->  8
 +		 *     ...
 +		 *     1111111111110 ->  16
 +		 */
 +		if (!lzh_br_read_ahead(strm, br, 3))
 +			return (i);
 +		if ((c = lzh_br_bits(br, 3)) == 7) {
 +			if (!lzh_br_read_ahead(strm, br, 13))
 +				return (i);
 +			c = bitlen_tbl[lzh_br_bits(br, 13) & 0x3FF];
 +			if (c)
 +				lzh_br_consume(br, c - 3);
 +			else
 +				return (-1);/* Invalid data. */
 +		} else
 +			lzh_br_consume(br, 3);
 +		ds->pt.bitlen[i++] = c;
 +		ds->pt.freq[c]++;
 +	}
 +	return (i);
 +}
 +
 +static int
 +lzh_make_fake_table(struct huffman *hf, uint16_t c)
 +{
 +	if (c >= hf->len_size)
 +		return (0);
 +	hf->tbl[0] = c;
 +	hf->max_bits = 0;
 +	hf->shift_bits = 0;
 +	hf->bitlen[hf->tbl[0]] = 0;
 +	return (1);
 +}
 +
 +/*
 + * Make a huffman coding table.
 + */
 +static int
 +lzh_make_huffman_table(struct huffman *hf)
 +{
 +	uint16_t *tbl;
 +	const unsigned char *bitlen;
 +	int bitptn[17], weight[17];
 +	int i, maxbits = 0, ptn, tbl_size, w;
 +	int diffbits, len_avail;
 +
 +	/*
 +	 * Initialize bit patterns.
 +	 */
 +	ptn = 0;
 +	for (i = 1, w = 1 << 15; i <= 16; i++, w >>= 1) {
 +		bitptn[i] = ptn;
 +		weight[i] = w;
 +		if (hf->freq[i]) {
 +			ptn += hf->freq[i] * w;
 +			maxbits = i;
 +		}
 +	}
 +	if (ptn != 0x10000 || maxbits > hf->tbl_bits)
 +		return (0);/* Invalid */
 +
 +	hf->max_bits = maxbits;
 +
 +	/*
 +	 * Cut out extra bits which we won't house in the table.
 +	 * This preparation reduces the same calculation in the for-loop
 +	 * making the table.
 +	 */
 +	if (maxbits < 16) {
 +		int ebits = 16 - maxbits;
 +		for (i = 1; i <= maxbits; i++) {
 +			bitptn[i] >>= ebits;
 +			weight[i] >>= ebits;
 +		}
 +	}
 +	if (maxbits > HTBL_BITS) {
 +		unsigned htbl_max;
 +		uint16_t *p;
 +
 +		diffbits = maxbits - HTBL_BITS;
 +		for (i = 1; i <= HTBL_BITS; i++) {
 +			bitptn[i] >>= diffbits;
 +			weight[i] >>= diffbits;
 +		}
 +		htbl_max = bitptn[HTBL_BITS] +
 +		    weight[HTBL_BITS] * hf->freq[HTBL_BITS];
 +		p = &(hf->tbl[htbl_max]);
 +		while (p < &hf->tbl[1U<<HTBL_BITS])
 +			*p++ = 0;
 +	} else
 +		diffbits = 0;
 +	hf->shift_bits = diffbits;
 +
 +	/*
 +	 * Make the table.
 +	 */
 +	tbl_size = 1 << HTBL_BITS;
 +	tbl = hf->tbl;
 +	bitlen = hf->bitlen;
 +	len_avail = hf->len_avail;
 +	hf->tree_used = 0;
 +	for (i = 0; i < len_avail; i++) {
 +		uint16_t *p;
 +		int len, cnt;
 +		uint16_t bit;
 +		int extlen;
 +		struct htree_t *ht;
 +
 +		if (bitlen[i] == 0)
 +			continue;
 +		/* Get a bit pattern */
 +		len = bitlen[i];
 +		ptn = bitptn[len];
 +		cnt = weight[len];
 +		if (len <= HTBL_BITS) {
 +			/* Calculate next bit pattern */
 +			if ((bitptn[len] = ptn + cnt) > tbl_size)
 +				return (0);/* Invalid */
 +			/* Update the table */
 +			p = &(tbl[ptn]);
 +			if (cnt > 7) {
 +				uint16_t *pc;
 +
 +				cnt -= 8;
 +				pc = &p[cnt];
 +				pc[0] = (uint16_t)i;
 +				pc[1] = (uint16_t)i;
 +				pc[2] = (uint16_t)i;
 +				pc[3] = (uint16_t)i;
 +				pc[4] = (uint16_t)i;
 +				pc[5] = (uint16_t)i;
 +				pc[6] = (uint16_t)i;
 +				pc[7] = (uint16_t)i;
 +				if (cnt > 7) {
 +					cnt -= 8;
 +					memcpy(&p[cnt], pc,
 +						8 * sizeof(uint16_t));
 +					pc = &p[cnt];
 +					while (cnt > 15) {
 +						cnt -= 16;
 +						memcpy(&p[cnt], pc,
 +							16 * sizeof(uint16_t));
 +					}
 +				}
 +				if (cnt)
 +					memcpy(p, pc, cnt * sizeof(uint16_t));
 +			} else {
 +				while (cnt > 1) {
 +					p[--cnt] = (uint16_t)i;
 +					p[--cnt] = (uint16_t)i;
 +				}
 +				if (cnt)
 +					p[--cnt] = (uint16_t)i;
 +			}
 +			continue;
 +		}
 +
 +		/*
 +		 * A bit length is too big to be housed to a direct table,
 +		 * so we use a tree model for its extra bits.
 +		 */
 +		bitptn[len] = ptn + cnt;
 +		bit = 1U << (diffbits -1);
 +		extlen = len - HTBL_BITS;
 +		
 +		p = &(tbl[ptn >> diffbits]);
 +		if (*p == 0) {
 +			*p = len_avail + hf->tree_used;
 +			ht = &(hf->tree[hf->tree_used++]);
 +			if (hf->tree_used > hf->tree_avail)
 +				return (0);/* Invalid */
 +			ht->left = 0;
 +			ht->right = 0;
 +		} else {
 +			if (*p < len_avail ||
 +			    *p >= (len_avail + hf->tree_used))
 +				return (0);/* Invalid */
 +			ht = &(hf->tree[*p - len_avail]);
 +		}
 +		while (--extlen > 0) {
 +			if (ptn & bit) {
 +				if (ht->left < len_avail) {
 +					ht->left = len_avail + hf->tree_used;
 +					ht = &(hf->tree[hf->tree_used++]);
 +					if (hf->tree_used > hf->tree_avail)
 +						return (0);/* Invalid */
 +					ht->left = 0;
 +					ht->right = 0;
 +				} else {
 +					ht = &(hf->tree[ht->left - len_avail]);
 +				}
 +			} else {
 +				if (ht->right < len_avail) {
 +					ht->right = len_avail + hf->tree_used;
 +					ht = &(hf->tree[hf->tree_used++]);
 +					if (hf->tree_used > hf->tree_avail)
 +						return (0);/* Invalid */
 +					ht->left = 0;
 +					ht->right = 0;
 +				} else {
 +					ht = &(hf->tree[ht->right - len_avail]);
 +				}
 +			}
 +			bit >>= 1;
 +		}
 +		if (ptn & bit) {
 +			if (ht->left != 0)
 +				return (0);/* Invalid */
 +			ht->left = (uint16_t)i;
 +		} else {
 +			if (ht->right != 0)
 +				return (0);/* Invalid */
 +			ht->right = (uint16_t)i;
 +		}
 +	}
 +	return (1);
 +}
 +
 +static int
 +lzh_decode_huffman_tree(struct huffman *hf, unsigned rbits, int c)
 +{
 +	struct htree_t *ht;
 +	int extlen;
 +
 +	ht = hf->tree;
 +	extlen = hf->shift_bits;
 +	while (c >= hf->len_avail) {
 +		c -= hf->len_avail;
 +		if (extlen-- <= 0 || c >= hf->tree_used)
 +			return (0);
 +		if (rbits & (1U << extlen))
 +			c = ht[c].left;
 +		else
 +			c = ht[c].right;
 +	}
 +	return (c);
 +}
 +
 +static inline int
 +lzh_decode_huffman(struct huffman *hf, unsigned rbits)
 +{
 +	int c;
 +	/*
 +	 * At first search an index table for a bit pattern.
 +	 * If it fails, search a huffman tree for.
 +	 */
 +	c = hf->tbl[rbits >> hf->shift_bits];
 +	if (c < hf->len_avail || hf->len_avail == 0)
 +		return (c);
 +	/* This bit pattern needs to be found out at a huffman tree. */
 +	return (lzh_decode_huffman_tree(hf, rbits, c));
 +}
 +
diff --cc Utilities/cmlibarchive/libarchive/archive_read_support_format_rar.c
index fc8153f,0000000..658d49d
mode 100644,000000..100644
--- a/Utilities/cmlibarchive/libarchive/archive_read_support_format_rar.c
+++ b/Utilities/cmlibarchive/libarchive/archive_read_support_format_rar.c
@@@ -1,2954 -1,0 +1,2953 @@@
 +/*-
 +* Copyright (c) 2003-2007 Tim Kientzle
 +* Copyright (c) 2011 Andres Mejia
 +* All rights reserved.
 +*
 +* Redistribution and use in source and binary forms, with or without
 +* modification, are permitted provided that the following conditions
 +* are met:
 +* 1. Redistributions of source code must retain the above copyright
 +*    notice, this list of conditions and the following disclaimer.
 +* 2. Redistributions in binary form must reproduce the above copyright
 +*    notice, this list of conditions and the following disclaimer in the
 +*    documentation and/or other materials provided with the distribution.
 +*
 +* THIS SOFTWARE IS PROVIDED BY THE AUTHOR(S) ``AS IS'' AND ANY EXPRESS OR
 +* IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
 +* OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
 +* IN NO EVENT SHALL THE AUTHOR(S) BE LIABLE FOR ANY DIRECT, INDIRECT,
 +* INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
 +* NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
 +* DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
 +* THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
 +* (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
 +* THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
 +*/
 +
 +#include "archive_platform.h"
 +
 +#ifdef HAVE_ERRNO_H
 +#include <errno.h>
 +#endif
 +#include <time.h>
 +#include <limits.h>
 +#ifdef HAVE_ZLIB_H
 +#include <cm_zlib.h> /* crc32 */
 +#endif
 +
 +#include "archive.h"
 +#ifndef HAVE_ZLIB_H
 +#include "archive_crc32.h"
 +#endif
 +#include "archive_endian.h"
 +#include "archive_entry.h"
 +#include "archive_entry_locale.h"
 +#include "archive_ppmd7_private.h"
 +#include "archive_private.h"
 +#include "archive_read_private.h"
 +
 +/* RAR signature, also known as the mark header */
 +#define RAR_SIGNATURE "\x52\x61\x72\x21\x1A\x07\x00"
 +
 +/* Header types */
 +#define MARK_HEAD    0x72
 +#define MAIN_HEAD    0x73
 +#define FILE_HEAD    0x74
 +#define COMM_HEAD    0x75
 +#define AV_HEAD      0x76
 +#define SUB_HEAD     0x77
 +#define PROTECT_HEAD 0x78
 +#define SIGN_HEAD    0x79
 +#define NEWSUB_HEAD  0x7a
 +#define ENDARC_HEAD  0x7b
 +
 +/* Main Header Flags */
 +#define MHD_VOLUME       0x0001
 +#define MHD_COMMENT      0x0002
 +#define MHD_LOCK         0x0004
 +#define MHD_SOLID        0x0008
 +#define MHD_NEWNUMBERING 0x0010
 +#define MHD_AV           0x0020
 +#define MHD_PROTECT      0x0040
 +#define MHD_PASSWORD     0x0080
 +#define MHD_FIRSTVOLUME  0x0100
 +#define MHD_ENCRYPTVER   0x0200
 +
 +/* Flags common to all headers */
 +#define HD_MARKDELETION     0x4000
 +#define HD_ADD_SIZE_PRESENT 0x8000
 +
 +/* File Header Flags */
 +#define FHD_SPLIT_BEFORE 0x0001
 +#define FHD_SPLIT_AFTER  0x0002
 +#define FHD_PASSWORD     0x0004
 +#define FHD_COMMENT      0x0008
 +#define FHD_SOLID        0x0010
 +#define FHD_LARGE        0x0100
 +#define FHD_UNICODE      0x0200
 +#define FHD_SALT         0x0400
 +#define FHD_VERSION      0x0800
 +#define FHD_EXTTIME      0x1000
 +#define FHD_EXTFLAGS     0x2000
 +
 +/* File dictionary sizes */
 +#define DICTIONARY_SIZE_64   0x00
 +#define DICTIONARY_SIZE_128  0x20
 +#define DICTIONARY_SIZE_256  0x40
 +#define DICTIONARY_SIZE_512  0x60
 +#define DICTIONARY_SIZE_1024 0x80
 +#define DICTIONARY_SIZE_2048 0xA0
 +#define DICTIONARY_SIZE_4096 0xC0
 +#define FILE_IS_DIRECTORY    0xE0
 +#define DICTIONARY_MASK      FILE_IS_DIRECTORY
 +
 +/* OS Flags */
 +#define OS_MSDOS  0
 +#define OS_OS2    1
 +#define OS_WIN32  2
 +#define OS_UNIX   3
 +#define OS_MAC_OS 4
 +#define OS_BEOS   5
 +
 +/* Compression Methods */
 +#define COMPRESS_METHOD_STORE   0x30
 +/* LZSS */
 +#define COMPRESS_METHOD_FASTEST 0x31
 +#define COMPRESS_METHOD_FAST    0x32
 +#define COMPRESS_METHOD_NORMAL  0x33
 +/* PPMd Variant H */
 +#define COMPRESS_METHOD_GOOD    0x34
 +#define COMPRESS_METHOD_BEST    0x35
 +
 +#define CRC_POLYNOMIAL 0xEDB88320
 +
 +#define NS_UNIT 10000000
 +
 +#define DICTIONARY_MAX_SIZE 0x400000
 +
 +#define MAINCODE_SIZE      299
 +#define OFFSETCODE_SIZE    60
 +#define LOWOFFSETCODE_SIZE 17
 +#define LENGTHCODE_SIZE    28
 +#define HUFFMAN_TABLE_SIZE \
 +  MAINCODE_SIZE + OFFSETCODE_SIZE + LOWOFFSETCODE_SIZE + LENGTHCODE_SIZE
 +
 +#define MAX_SYMBOL_LENGTH 0xF
 +#define MAX_SYMBOLS       20
 +
 +/*
 + * Considering L1,L2 cache miss and a calling of write system-call,
 + * the best size of the output buffer(uncompressed buffer) is 128K.
 + * If the structure of extracting process is changed, this value
 + * might be researched again.
 + */
 +#define UNP_BUFFER_SIZE   (128 * 1024)
 +
 +/* Define this here for non-Windows platforms */
 +#if !((defined(__WIN32__) || defined(_WIN32) || defined(__WIN32)) && !defined(__CYGWIN__))
 +#define FILE_ATTRIBUTE_DIRECTORY 0x10
 +#endif
 +
 +/* Fields common to all headers */
 +struct rar_header
 +{
 +  char crc[2];
 +  char type;
 +  char flags[2];
 +  char size[2];
 +};
 +
 +/* Fields common to all file headers */
 +struct rar_file_header
 +{
 +  char pack_size[4];
 +  char unp_size[4];
 +  char host_os;
 +  char file_crc[4];
 +  char file_time[4];
 +  char unp_ver;
 +  char method;
 +  char name_size[2];
 +  char file_attr[4];
 +};
 +
 +struct huffman_tree_node
 +{
 +  int branches[2];
 +};
 +
 +struct huffman_table_entry
 +{
 +  unsigned int length;
 +  int value;
 +};
 +
 +struct huffman_code
 +{
 +  struct huffman_tree_node *tree;
 +  int numentries;
 +  int numallocatedentries;
 +  int minlength;
 +  int maxlength;
 +  int tablesize;
 +  struct huffman_table_entry *table;
 +};
 +
 +struct lzss
 +{
 +  unsigned char *window;
 +  int mask;
 +  int64_t position;
 +};
 +
 +struct data_block_offsets
 +{
 +  int64_t header_size;
 +  int64_t start_offset;
 +  int64_t end_offset;
 +};
 +
 +struct rar
 +{
 +  /* Entries from main RAR header */
 +  unsigned main_flags;
 +  unsigned long file_crc;
 +  char reserved1[2];
 +  char reserved2[4];
 +  char encryptver;
 +
 +  /* File header entries */
 +  char compression_method;
 +  unsigned file_flags;
 +  int64_t packed_size;
 +  int64_t unp_size;
 +  time_t mtime;
 +  long mnsec;
 +  mode_t mode;
 +  char *filename;
 +  char *filename_save;
 +  size_t filename_save_size;
 +  size_t filename_allocated;
 +
 +  /* File header optional entries */
 +  char salt[8];
 +  time_t atime;
 +  long ansec;
 +  time_t ctime;
 +  long cnsec;
 +  time_t arctime;
 +  long arcnsec;
 +
 +  /* Fields to help with tracking decompression of files. */
 +  int64_t bytes_unconsumed;
 +  int64_t bytes_remaining;
 +  int64_t bytes_uncopied;
 +  int64_t offset;
 +  int64_t offset_outgoing;
 +  int64_t offset_seek;
 +  char valid;
 +  unsigned int unp_offset;
 +  unsigned int unp_buffer_size;
 +  unsigned char *unp_buffer;
 +  unsigned int dictionary_size;
 +  char start_new_block;
 +  char entry_eof;
 +  unsigned long crc_calculated;
 +  int found_first_header;
 +  char has_endarc_header;
 +  struct data_block_offsets *dbo;
 +  unsigned int cursor;
 +  unsigned int nodes;
 +
 +  /* LZSS members */
 +  struct huffman_code maincode;
 +  struct huffman_code offsetcode;
 +  struct huffman_code lowoffsetcode;
 +  struct huffman_code lengthcode;
 +  unsigned char lengthtable[HUFFMAN_TABLE_SIZE];
 +  struct lzss lzss;
 +  char output_last_match;
 +  unsigned int lastlength;
 +  unsigned int lastoffset;
 +  unsigned int oldoffset[4];
 +  unsigned int lastlowoffset;
 +  unsigned int numlowoffsetrepeats;
 +  int64_t filterstart;
 +  char start_new_table;
 +
 +  /* PPMd Variant H members */
 +  char ppmd_valid;
 +  char ppmd_eod;
 +  char is_ppmd_block;
 +  int ppmd_escape;
 +  CPpmd7 ppmd7_context;
 +  CPpmd7z_RangeDec range_dec;
 +  IByteIn bytein;
 +
 +  /*
 +   * String conversion object.
 +   */
 +  int init_default_conversion;
 +  struct archive_string_conv *sconv_default;
 +  struct archive_string_conv *opt_sconv;
 +  struct archive_string_conv *sconv_utf8;
 +  struct archive_string_conv *sconv_utf16be;
 +
 +  /*
 +   * Bit stream reader.
 +   */
 +  struct rar_br {
 +#define CACHE_TYPE	uint64_t
 +#define CACHE_BITS	(8 * sizeof(CACHE_TYPE))
 +    /* Cache buffer. */
 +    CACHE_TYPE		 cache_buffer;
 +    /* Indicates how many bits avail in cache_buffer. */
 +    int			 cache_avail;
 +    ssize_t		 avail_in;
 +    const unsigned char *next_in;
 +  } br;
 +
 +  /*
 +   * Custom field to denote that this archive contains encrypted entries
 +   */
 +  int has_encrypted_entries;
 +};
 +
 +static int archive_read_support_format_rar_capabilities(struct archive_read *);
 +static int archive_read_format_rar_has_encrypted_entries(struct archive_read *);
 +static int archive_read_format_rar_bid(struct archive_read *, int);
 +static int archive_read_format_rar_options(struct archive_read *,
 +    const char *, const char *);
 +static int archive_read_format_rar_read_header(struct archive_read *,
 +    struct archive_entry *);
 +static int archive_read_format_rar_read_data(struct archive_read *,
 +    const void **, size_t *, int64_t *);
 +static int archive_read_format_rar_read_data_skip(struct archive_read *a);
 +static int64_t archive_read_format_rar_seek_data(struct archive_read *, int64_t,
 +    int);
 +static int archive_read_format_rar_cleanup(struct archive_read *);
 +
 +/* Support functions */
 +static int read_header(struct archive_read *, struct archive_entry *, char);
 +static time_t get_time(int);
 +static int read_exttime(const char *, struct rar *, const char *);
 +static int read_symlink_stored(struct archive_read *, struct archive_entry *,
 +                               struct archive_string_conv *);
 +static int read_data_stored(struct archive_read *, const void **, size_t *,
 +                            int64_t *);
 +static int read_data_compressed(struct archive_read *, const void **, size_t *,
 +                          int64_t *);
 +static int rar_br_preparation(struct archive_read *, struct rar_br *);
 +static int parse_codes(struct archive_read *);
 +static void free_codes(struct archive_read *);
 +static int read_next_symbol(struct archive_read *, struct huffman_code *);
 +static int create_code(struct archive_read *, struct huffman_code *,
 +                        unsigned char *, int, char);
 +static int add_value(struct archive_read *, struct huffman_code *, int, int,
 +                     int);
 +static int new_node(struct huffman_code *);
 +static int make_table(struct archive_read *, struct huffman_code *);
 +static int make_table_recurse(struct archive_read *, struct huffman_code *, int,
 +                              struct huffman_table_entry *, int, int);
 +static int64_t expand(struct archive_read *, int64_t);
 +static int copy_from_lzss_window(struct archive_read *, const void **,
 +                                   int64_t, int);
 +static const void *rar_read_ahead(struct archive_read *, size_t, ssize_t *);
 +
 +/*
 + * Bit stream reader.
 + */
 +/* Check that the cache buffer has enough bits. */
 +#define rar_br_has(br, n) ((br)->cache_avail >= n)
 +/* Get compressed data by bit. */
 +#define rar_br_bits(br, n)        \
 +  (((uint32_t)((br)->cache_buffer >>    \
 +    ((br)->cache_avail - (n)))) & cache_masks[n])
 +#define rar_br_bits_forced(br, n)     \
 +  (((uint32_t)((br)->cache_buffer <<    \
 +    ((n) - (br)->cache_avail))) & cache_masks[n])
 +/* Read ahead to make sure the cache buffer has enough compressed data we
 + * will use.
 + *  True  : completed, there is enough data in the cache buffer.
 + *  False : there is no data in the stream. */
 +#define rar_br_read_ahead(a, br, n) \
 +  ((rar_br_has(br, (n)) || rar_br_fillup(a, br)) || rar_br_has(br, (n)))
 +/* Notify how many bits we consumed. */
 +#define rar_br_consume(br, n) ((br)->cache_avail -= (n))
 +#define rar_br_consume_unalined_bits(br) ((br)->cache_avail &= ~7)
 +
 +static const uint32_t cache_masks[] = {
 +  0x00000000, 0x00000001, 0x00000003, 0x00000007,
 +  0x0000000F, 0x0000001F, 0x0000003F, 0x0000007F,
 +  0x000000FF, 0x000001FF, 0x000003FF, 0x000007FF,
 +  0x00000FFF, 0x00001FFF, 0x00003FFF, 0x00007FFF,
 +  0x0000FFFF, 0x0001FFFF, 0x0003FFFF, 0x0007FFFF,
 +  0x000FFFFF, 0x001FFFFF, 0x003FFFFF, 0x007FFFFF,
 +  0x00FFFFFF, 0x01FFFFFF, 0x03FFFFFF, 0x07FFFFFF,
 +  0x0FFFFFFF, 0x1FFFFFFF, 0x3FFFFFFF, 0x7FFFFFFF,
 +  0xFFFFFFFF, 0xFFFFFFFF, 0xFFFFFFFF, 0xFFFFFFFF
 +};
 +
 +/*
 + * Shift away used bits in the cache data and fill it up with following bits.
 + * Call this when cache buffer does not have enough bits you need.
 + *
 + * Returns 1 if the cache buffer is full.
 + * Returns 0 if the cache buffer is not full; input buffer is empty.
 + */
 +static int
 +rar_br_fillup(struct archive_read *a, struct rar_br *br)
 +{
 +  struct rar *rar = (struct rar *)(a->format->data);
 +  int n = CACHE_BITS - br->cache_avail;
 +
 +  for (;;) {
 +    switch (n >> 3) {
 +    case 8:
 +      if (br->avail_in >= 8) {
 +        br->cache_buffer =
 +            ((uint64_t)br->next_in[0]) << 56 |
 +            ((uint64_t)br->next_in[1]) << 48 |
 +            ((uint64_t)br->next_in[2]) << 40 |
 +            ((uint64_t)br->next_in[3]) << 32 |
 +            ((uint32_t)br->next_in[4]) << 24 |
 +            ((uint32_t)br->next_in[5]) << 16 |
 +            ((uint32_t)br->next_in[6]) << 8 |
 +             (uint32_t)br->next_in[7];
 +        br->next_in += 8;
 +        br->avail_in -= 8;
 +        br->cache_avail += 8 * 8;
 +        rar->bytes_unconsumed += 8;
 +        rar->bytes_remaining -= 8;
 +        return (1);
 +      }
 +      break;
 +    case 7:
 +      if (br->avail_in >= 7) {
 +        br->cache_buffer =
 +           (br->cache_buffer << 56) |
 +            ((uint64_t)br->next_in[0]) << 48 |
 +            ((uint64_t)br->next_in[1]) << 40 |
 +            ((uint64_t)br->next_in[2]) << 32 |
 +            ((uint32_t)br->next_in[3]) << 24 |
 +            ((uint32_t)br->next_in[4]) << 16 |
 +            ((uint32_t)br->next_in[5]) << 8 |
 +             (uint32_t)br->next_in[6];
 +        br->next_in += 7;
 +        br->avail_in -= 7;
 +        br->cache_avail += 7 * 8;
 +        rar->bytes_unconsumed += 7;
 +        rar->bytes_remaining -= 7;
 +        return (1);
 +      }
 +      break;
 +    case 6:
 +      if (br->avail_in >= 6) {
 +        br->cache_buffer =
 +           (br->cache_buffer << 48) |
 +            ((uint64_t)br->next_in[0]) << 40 |
 +            ((uint64_t)br->next_in[1]) << 32 |
 +            ((uint32_t)br->next_in[2]) << 24 |
 +            ((uint32_t)br->next_in[3]) << 16 |
 +            ((uint32_t)br->next_in[4]) << 8 |
 +             (uint32_t)br->next_in[5];
 +        br->next_in += 6;
 +        br->avail_in -= 6;
 +        br->cache_avail += 6 * 8;
 +        rar->bytes_unconsumed += 6;
 +        rar->bytes_remaining -= 6;
 +        return (1);
 +      }
 +      break;
 +    case 0:
 +      /* We have enough compressed data in
 +       * the cache buffer.*/
 +      return (1);
 +    default:
 +      break;
 +    }
 +    if (br->avail_in <= 0) {
 +
 +      if (rar->bytes_unconsumed > 0) {
 +        /* Consume as much as the decompressor
 +         * actually used. */
 +        __archive_read_consume(a, rar->bytes_unconsumed);
 +        rar->bytes_unconsumed = 0;
 +      }
 +      br->next_in = rar_read_ahead(a, 1, &(br->avail_in));
 +      if (br->next_in == NULL)
 +        return (0);
 +      if (br->avail_in == 0)
 +        return (0);
 +    }
 +    br->cache_buffer =
 +       (br->cache_buffer << 8) | *br->next_in++;
 +    br->avail_in--;
 +    br->cache_avail += 8;
 +    n -= 8;
 +    rar->bytes_unconsumed++;
 +    rar->bytes_remaining--;
 +  }
 +}
 +
 +static int
 +rar_br_preparation(struct archive_read *a, struct rar_br *br)
 +{
 +  struct rar *rar = (struct rar *)(a->format->data);
 +
 +  if (rar->bytes_remaining > 0) {
 +    br->next_in = rar_read_ahead(a, 1, &(br->avail_in));
 +    if (br->next_in == NULL) {
 +      archive_set_error(&a->archive,
 +          ARCHIVE_ERRNO_FILE_FORMAT,
 +          "Truncated RAR file data");
 +      return (ARCHIVE_FATAL);
 +    }
 +    if (br->cache_avail == 0)
 +      (void)rar_br_fillup(a, br);
 +  }
 +  return (ARCHIVE_OK);
 +}
 +
 +/* Find last bit set */
 +static inline int
 +rar_fls(unsigned int word)
 +{
 +  word |= (word >>  1);
 +  word |= (word >>  2);
 +  word |= (word >>  4);
 +  word |= (word >>  8);
 +  word |= (word >> 16);
 +  return word - (word >> 1);
 +}
 +
 +/* LZSS functions */
 +static inline int64_t
 +lzss_position(struct lzss *lzss)
 +{
 +  return lzss->position;
 +}
 +
 +static inline int
 +lzss_mask(struct lzss *lzss)
 +{
 +  return lzss->mask;
 +}
 +
 +static inline int
 +lzss_size(struct lzss *lzss)
 +{
 +  return lzss->mask + 1;
 +}
 +
 +static inline int
 +lzss_offset_for_position(struct lzss *lzss, int64_t pos)
 +{
 +  return (int)(pos & lzss->mask);
 +}
 +
 +static inline unsigned char *
 +lzss_pointer_for_position(struct lzss *lzss, int64_t pos)
 +{
 +  return &lzss->window[lzss_offset_for_position(lzss, pos)];
 +}
 +
 +static inline int
 +lzss_current_offset(struct lzss *lzss)
 +{
 +  return lzss_offset_for_position(lzss, lzss->position);
 +}
 +
 +static inline uint8_t *
 +lzss_current_pointer(struct lzss *lzss)
 +{
 +  return lzss_pointer_for_position(lzss, lzss->position);
 +}
 +
 +static inline void
 +lzss_emit_literal(struct rar *rar, uint8_t literal)
 +{
 +  *lzss_current_pointer(&rar->lzss) = literal;
 +  rar->lzss.position++;
 +}
 +
 +static inline void
 +lzss_emit_match(struct rar *rar, int offset, int length)
 +{
 +  int dstoffs = lzss_current_offset(&rar->lzss);
 +  int srcoffs = (dstoffs - offset) & lzss_mask(&rar->lzss);
 +  int l, li, remaining;
 +  unsigned char *d, *s;
 +
 +  remaining = length;
 +  while (remaining > 0) {
 +    l = remaining;
 +    if (dstoffs > srcoffs) {
 +      if (l > lzss_size(&rar->lzss) - dstoffs)
 +        l = lzss_size(&rar->lzss) - dstoffs;
 +    } else {
 +      if (l > lzss_size(&rar->lzss) - srcoffs)
 +        l = lzss_size(&rar->lzss) - srcoffs;
 +    }
 +    d = &(rar->lzss.window[dstoffs]);
 +    s = &(rar->lzss.window[srcoffs]);
 +    if ((dstoffs + l < srcoffs) || (srcoffs + l < dstoffs))
 +      memcpy(d, s, l);
 +    else {
 +      for (li = 0; li < l; li++)
 +        d[li] = s[li];
 +    }
 +    remaining -= l;
 +    dstoffs = (dstoffs + l) & lzss_mask(&(rar->lzss));
 +    srcoffs = (srcoffs + l) & lzss_mask(&(rar->lzss));
 +  }
 +  rar->lzss.position += length;
 +}
 +
 +static void *
 +ppmd_alloc(void *p, size_t size)
 +{
 +  (void)p;
 +  return malloc(size);
 +}
 +static void
 +ppmd_free(void *p, void *address)
 +{
 +  (void)p;
 +  free(address);
 +}
 +static ISzAlloc g_szalloc = { ppmd_alloc, ppmd_free };
 +
 +static Byte
 +ppmd_read(void *p)
 +{
 +  struct archive_read *a = ((IByteIn*)p)->a;
 +  struct rar *rar = (struct rar *)(a->format->data);
 +  struct rar_br *br = &(rar->br);
 +  Byte b;
 +  if (!rar_br_read_ahead(a, br, 8))
 +  {
 +    archive_set_error(&a->archive, ARCHIVE_ERRNO_FILE_FORMAT,
 +                      "Truncated RAR file data");
 +    rar->valid = 0;
 +    return 0;
 +  }
 +  b = rar_br_bits(br, 8);
 +  rar_br_consume(br, 8);
 +  return b;
 +}
 +
 +int
 +archive_read_support_format_rar(struct archive *_a)
 +{
 +  struct archive_read *a = (struct archive_read *)_a;
 +  struct rar *rar;
 +  int r;
 +
 +  archive_check_magic(_a, ARCHIVE_READ_MAGIC, ARCHIVE_STATE_NEW,
 +                      "archive_read_support_format_rar");
 +
-   rar = (struct rar *)malloc(sizeof(*rar));
++  rar = (struct rar *)calloc(sizeof(*rar), 1);
 +  if (rar == NULL)
 +  {
 +    archive_set_error(&a->archive, ENOMEM, "Can't allocate rar data");
 +    return (ARCHIVE_FATAL);
 +  }
-   memset(rar, 0, sizeof(*rar));
 +
 +	/*
 +	 * Until enough data has been read, we cannot tell about
 +	 * any encrypted entries yet.
 +	 */
 +	rar->has_encrypted_entries = ARCHIVE_READ_FORMAT_ENCRYPTION_DONT_KNOW;
 +
 +  r = __archive_read_register_format(a,
 +                                     rar,
 +                                     "rar",
 +                                     archive_read_format_rar_bid,
 +                                     archive_read_format_rar_options,
 +                                     archive_read_format_rar_read_header,
 +                                     archive_read_format_rar_read_data,
 +                                     archive_read_format_rar_read_data_skip,
 +                                     archive_read_format_rar_seek_data,
 +                                     archive_read_format_rar_cleanup,
 +                                     archive_read_support_format_rar_capabilities,
 +                                     archive_read_format_rar_has_encrypted_entries);
 +
 +  if (r != ARCHIVE_OK)
 +    free(rar);
 +  return (r);
 +}
 +
 +static int
 +archive_read_support_format_rar_capabilities(struct archive_read * a)
 +{
 +	(void)a; /* UNUSED */
 +	return (ARCHIVE_READ_FORMAT_CAPS_ENCRYPT_DATA
 +			| ARCHIVE_READ_FORMAT_CAPS_ENCRYPT_METADATA);
 +}
 +
 +static int
 +archive_read_format_rar_has_encrypted_entries(struct archive_read *_a)
 +{
 +	if (_a && _a->format) {
 +		struct rar * rar = (struct rar *)_a->format->data;
 +		if (rar) {
 +			return rar->has_encrypted_entries;
 +		}
 +	}
 +	return ARCHIVE_READ_FORMAT_ENCRYPTION_DONT_KNOW;
 +}
 +
 +
 +static int
 +archive_read_format_rar_bid(struct archive_read *a, int best_bid)
 +{
 +  const char *p;
 +
 +  /* If there's already a bid > 30, we'll never win. */
 +  if (best_bid > 30)
 +	  return (-1);
 +
 +  if ((p = __archive_read_ahead(a, 7, NULL)) == NULL)
 +    return (-1);
 +
 +  if (memcmp(p, RAR_SIGNATURE, 7) == 0)
 +    return (30);
 +
 +  if ((p[0] == 'M' && p[1] == 'Z') || memcmp(p, "\x7F\x45LF", 4) == 0) {
 +    /* This is a PE file */
 +    ssize_t offset = 0x10000;
 +    ssize_t window = 4096;
 +    ssize_t bytes_avail;
 +    while (offset + window <= (1024 * 128)) {
 +      const char *buff = __archive_read_ahead(a, offset + window, &bytes_avail);
 +      if (buff == NULL) {
 +        /* Remaining bytes are less than window. */
 +        window >>= 1;
 +        if (window < 0x40)
 +          return (0);
 +        continue;
 +      }
 +      p = buff + offset;
 +      while (p + 7 < buff + bytes_avail) {
 +        if (memcmp(p, RAR_SIGNATURE, 7) == 0)
 +          return (30);
 +        p += 0x10;
 +      }
 +      offset = p - buff;
 +    }
 +  }
 +  return (0);
 +}
 +
 +static int
 +skip_sfx(struct archive_read *a)
 +{
 +  const void *h;
 +  const char *p, *q;
 +  size_t skip, total;
 +  ssize_t bytes, window;
 +
 +  total = 0;
 +  window = 4096;
 +  while (total + window <= (1024 * 128)) {
 +    h = __archive_read_ahead(a, window, &bytes);
 +    if (h == NULL) {
 +      /* Remaining bytes are less than window. */
 +      window >>= 1;
 +      if (window < 0x40)
 +      	goto fatal;
 +      continue;
 +    }
 +    if (bytes < 0x40)
 +      goto fatal;
 +    p = h;
 +    q = p + bytes;
 +
 +    /*
 +     * Scan ahead until we find something that looks
 +     * like the RAR header.
 +     */
 +    while (p + 7 < q) {
 +      if (memcmp(p, RAR_SIGNATURE, 7) == 0) {
 +      	skip = p - (const char *)h;
 +      	__archive_read_consume(a, skip);
 +      	return (ARCHIVE_OK);
 +      }
 +      p += 0x10;
 +    }
 +    skip = p - (const char *)h;
 +    __archive_read_consume(a, skip);
 +	total += skip;
 +  }
 +fatal:
 +  archive_set_error(&a->archive, ARCHIVE_ERRNO_FILE_FORMAT,
 +      "Couldn't find out RAR header");
 +  return (ARCHIVE_FATAL);
 +}
 +
 +static int
 +archive_read_format_rar_options(struct archive_read *a,
 +    const char *key, const char *val)
 +{
 +  struct rar *rar;
 +  int ret = ARCHIVE_FAILED;
 +
 +  rar = (struct rar *)(a->format->data);
 +  if (strcmp(key, "hdrcharset")  == 0) {
 +    if (val == NULL || val[0] == 0)
 +      archive_set_error(&a->archive, ARCHIVE_ERRNO_MISC,
 +          "rar: hdrcharset option needs a character-set name");
 +    else {
 +      rar->opt_sconv =
 +          archive_string_conversion_from_charset(
 +              &a->archive, val, 0);
 +      if (rar->opt_sconv != NULL)
 +        ret = ARCHIVE_OK;
 +      else
 +        ret = ARCHIVE_FATAL;
 +    }
 +    return (ret);
 +  }
 +
 +  /* Note: The "warn" return is just to inform the options
 +   * supervisor that we didn't handle it.  It will generate
 +   * a suitable error if no one used this option. */
 +  return (ARCHIVE_WARN);
 +}
 +
 +static int
 +archive_read_format_rar_read_header(struct archive_read *a,
 +                                    struct archive_entry *entry)
 +{
 +  const void *h;
 +  const char *p;
 +  struct rar *rar;
 +  size_t skip;
 +  char head_type;
 +  int ret;
 +  unsigned flags;
 +  unsigned long crc32_expected;
 +
 +  a->archive.archive_format = ARCHIVE_FORMAT_RAR;
 +  if (a->archive.archive_format_name == NULL)
 +    a->archive.archive_format_name = "RAR";
 +
 +  rar = (struct rar *)(a->format->data);
 +
 +  /*
 +   * It should be sufficient to call archive_read_next_header() for
 +   * a reader to determine if an entry is encrypted or not. If the
 +   * encryption of an entry is only detectable when calling
 +   * archive_read_data(), so be it. We'll do the same check there
 +   * as well.
 +   */
 +  if (rar->has_encrypted_entries == ARCHIVE_READ_FORMAT_ENCRYPTION_DONT_KNOW) {
 +	  rar->has_encrypted_entries = 0;
 +  }
 +
 +  /* RAR files can be generated without EOF headers, so return ARCHIVE_EOF if
 +  * this fails.
 +  */
 +  if ((h = __archive_read_ahead(a, 7, NULL)) == NULL)
 +    return (ARCHIVE_EOF);
 +
 +  p = h;
 +  if (rar->found_first_header == 0 &&
 +     ((p[0] == 'M' && p[1] == 'Z') || memcmp(p, "\x7F\x45LF", 4) == 0)) {
 +    /* This is an executable ? Must be self-extracting... */
 +    ret = skip_sfx(a);
 +    if (ret < ARCHIVE_WARN)
 +      return (ret);
 +  }
 +  rar->found_first_header = 1;
 +
 +  while (1)
 +  {
 +    unsigned long crc32_val;
 +
 +    if ((h = __archive_read_ahead(a, 7, NULL)) == NULL)
 +      return (ARCHIVE_FATAL);
 +    p = h;
 +
 +    head_type = p[2];
 +    switch(head_type)
 +    {
 +    case MARK_HEAD:
 +      if (memcmp(p, RAR_SIGNATURE, 7) != 0) {
 +        archive_set_error(&a->archive, ARCHIVE_ERRNO_FILE_FORMAT,
 +          "Invalid marker header");
 +        return (ARCHIVE_FATAL);
 +      }
 +      __archive_read_consume(a, 7);
 +      break;
 +
 +    case MAIN_HEAD:
 +      rar->main_flags = archive_le16dec(p + 3);
 +      skip = archive_le16dec(p + 5);
 +      if (skip < 7 + sizeof(rar->reserved1) + sizeof(rar->reserved2)) {
 +        archive_set_error(&a->archive, ARCHIVE_ERRNO_FILE_FORMAT,
 +          "Invalid header size");
 +        return (ARCHIVE_FATAL);
 +      }
 +      if ((h = __archive_read_ahead(a, skip, NULL)) == NULL)
 +        return (ARCHIVE_FATAL);
 +      p = h;
 +      memcpy(rar->reserved1, p + 7, sizeof(rar->reserved1));
 +      memcpy(rar->reserved2, p + 7 + sizeof(rar->reserved1),
 +             sizeof(rar->reserved2));
 +      if (rar->main_flags & MHD_ENCRYPTVER) {
 +        if (skip < 7 + sizeof(rar->reserved1) + sizeof(rar->reserved2)+1) {
 +          archive_set_error(&a->archive, ARCHIVE_ERRNO_FILE_FORMAT,
 +            "Invalid header size");
 +          return (ARCHIVE_FATAL);
 +        }
 +        rar->encryptver = *(p + 7 + sizeof(rar->reserved1) +
 +                            sizeof(rar->reserved2));
 +      }
 +
-       /* Main header is password encrytped, so we cannot read any
++      /* Main header is password encrypted, so we cannot read any
 +         file names or any other info about files from the header. */
 +      if (rar->main_flags & MHD_PASSWORD)
 +      {
 +        archive_entry_set_is_metadata_encrypted(entry, 1);
 +        archive_entry_set_is_data_encrypted(entry, 1);
 +        rar->has_encrypted_entries = 1;
 +         archive_set_error(&a->archive, ARCHIVE_ERRNO_FILE_FORMAT,
 +                          "RAR encryption support unavailable.");
 +        return (ARCHIVE_FATAL);
 +      }
 +
 +      crc32_val = crc32(0, (const unsigned char *)p + 2, (unsigned)skip - 2);
 +      if ((crc32_val & 0xffff) != archive_le16dec(p)) {
 +        archive_set_error(&a->archive, ARCHIVE_ERRNO_FILE_FORMAT,
 +          "Header CRC error");
 +        return (ARCHIVE_FATAL);
 +      }
 +      __archive_read_consume(a, skip);
 +      break;
 +
 +    case FILE_HEAD:
 +      return read_header(a, entry, head_type);
 +
 +    case COMM_HEAD:
 +    case AV_HEAD:
 +    case SUB_HEAD:
 +    case PROTECT_HEAD:
 +    case SIGN_HEAD:
 +    case ENDARC_HEAD:
 +      flags = archive_le16dec(p + 3);
 +      skip = archive_le16dec(p + 5);
 +      if (skip < 7) {
 +        archive_set_error(&a->archive, ARCHIVE_ERRNO_FILE_FORMAT,
 +          "Invalid header size too small");
 +        return (ARCHIVE_FATAL);
 +      }
 +      if (flags & HD_ADD_SIZE_PRESENT)
 +      {
 +        if (skip < 7 + 4) {
 +          archive_set_error(&a->archive, ARCHIVE_ERRNO_FILE_FORMAT,
 +            "Invalid header size too small");
 +          return (ARCHIVE_FATAL);
 +        }
 +        if ((h = __archive_read_ahead(a, skip, NULL)) == NULL)
 +          return (ARCHIVE_FATAL);
 +        p = h;
 +        skip += archive_le32dec(p + 7);
 +      }
 +
 +      /* Skip over the 2-byte CRC at the beginning of the header. */
 +      crc32_expected = archive_le16dec(p);
 +      __archive_read_consume(a, 2);
 +      skip -= 2;
 +
 +      /* Skim the entire header and compute the CRC. */
 +      crc32_val = 0;
 +      while (skip > 0) {
 +	      size_t to_read = skip;
 +	      ssize_t did_read;
 +	      if (to_read > 32 * 1024) {
 +		      to_read = 32 * 1024;
 +	      }
 +	      if ((h = __archive_read_ahead(a, to_read, &did_read)) == NULL) {
 +		      return (ARCHIVE_FATAL);
 +	      }
 +	      p = h;
 +	      crc32_val = crc32(crc32_val, (const unsigned char *)p, (unsigned)did_read);
 +	      __archive_read_consume(a, did_read);
 +	      skip -= did_read;
 +      }
 +      if ((crc32_val & 0xffff) != crc32_expected) {
 +	      archive_set_error(&a->archive, ARCHIVE_ERRNO_FILE_FORMAT,
 +		  "Header CRC error");
 +	      return (ARCHIVE_FATAL);
 +      }
 +      if (head_type == ENDARC_HEAD)
 +	      return (ARCHIVE_EOF);
 +      break;
 +
 +    case NEWSUB_HEAD:
 +      if ((ret = read_header(a, entry, head_type)) < ARCHIVE_WARN)
 +        return ret;
 +      break;
 +
 +    default:
 +      archive_set_error(&a->archive,  ARCHIVE_ERRNO_FILE_FORMAT,
 +                        "Bad RAR file");
 +      return (ARCHIVE_FATAL);
 +    }
 +  }
 +}
 +
 +static int
 +archive_read_format_rar_read_data(struct archive_read *a, const void **buff,
 +                                  size_t *size, int64_t *offset)
 +{
 +  struct rar *rar = (struct rar *)(a->format->data);
 +  int ret;
 +
 +  if (rar->has_encrypted_entries == ARCHIVE_READ_FORMAT_ENCRYPTION_DONT_KNOW) {
 +	  rar->has_encrypted_entries = 0;
 +  }
 +
 +  if (rar->bytes_unconsumed > 0) {
 +      /* Consume as much as the decompressor actually used. */
 +      __archive_read_consume(a, rar->bytes_unconsumed);
 +      rar->bytes_unconsumed = 0;
 +  }
 +
 +  *buff = NULL;
 +  if (rar->entry_eof || rar->offset_seek >= rar->unp_size) {
 +    *size = 0;
 +    *offset = rar->offset;
 +    if (*offset < rar->unp_size)
 +      *offset = rar->unp_size;
 +    return (ARCHIVE_EOF);
 +  }
 +
 +  switch (rar->compression_method)
 +  {
 +  case COMPRESS_METHOD_STORE:
 +    ret = read_data_stored(a, buff, size, offset);
 +    break;
 +
 +  case COMPRESS_METHOD_FASTEST:
 +  case COMPRESS_METHOD_FAST:
 +  case COMPRESS_METHOD_NORMAL:
 +  case COMPRESS_METHOD_GOOD:
 +  case COMPRESS_METHOD_BEST:
 +    ret = read_data_compressed(a, buff, size, offset);
 +    if (ret != ARCHIVE_OK && ret != ARCHIVE_WARN)
 +      __archive_ppmd7_functions.Ppmd7_Free(&rar->ppmd7_context, &g_szalloc);
 +    break;
 +
 +  default:
 +    archive_set_error(&a->archive, ARCHIVE_ERRNO_FILE_FORMAT,
 +                      "Unsupported compression method for RAR file.");
 +    ret = ARCHIVE_FATAL;
 +    break;
 +  }
 +  return (ret);
 +}
 +
 +static int
 +archive_read_format_rar_read_data_skip(struct archive_read *a)
 +{
 +  struct rar *rar;
 +  int64_t bytes_skipped;
 +  int ret;
 +
 +  rar = (struct rar *)(a->format->data);
 +
 +  if (rar->bytes_unconsumed > 0) {
 +      /* Consume as much as the decompressor actually used. */
 +      __archive_read_consume(a, rar->bytes_unconsumed);
 +      rar->bytes_unconsumed = 0;
 +  }
 +
 +  if (rar->bytes_remaining > 0) {
 +    bytes_skipped = __archive_read_consume(a, rar->bytes_remaining);
 +    if (bytes_skipped < 0)
 +      return (ARCHIVE_FATAL);
 +  }
 +
 +  /* Compressed data to skip must be read from each header in a multivolume
 +   * archive.
 +   */
 +  if (rar->main_flags & MHD_VOLUME && rar->file_flags & FHD_SPLIT_AFTER)
 +  {
 +    ret = archive_read_format_rar_read_header(a, a->entry);
 +    if (ret == (ARCHIVE_EOF))
 +      ret = archive_read_format_rar_read_header(a, a->entry);
 +    if (ret != (ARCHIVE_OK))
 +      return ret;
 +    return archive_read_format_rar_read_data_skip(a);
 +  }
 +
 +  return (ARCHIVE_OK);
 +}
 +
 +static int64_t
 +archive_read_format_rar_seek_data(struct archive_read *a, int64_t offset,
 +    int whence)
 +{
 +  int64_t client_offset, ret;
 +  unsigned int i;
 +  struct rar *rar = (struct rar *)(a->format->data);
 +
 +  if (rar->compression_method == COMPRESS_METHOD_STORE)
 +  {
 +    /* Modify the offset for use with SEEK_SET */
 +    switch (whence)
 +    {
 +      case SEEK_CUR:
 +        client_offset = rar->offset_seek;
 +        break;
 +      case SEEK_END:
 +        client_offset = rar->unp_size;
 +        break;
 +      case SEEK_SET:
 +      default:
 +        client_offset = 0;
 +    }
 +    client_offset += offset;
 +    if (client_offset < 0)
 +    {
 +      /* Can't seek past beginning of data block */
 +      return -1;
 +    }
 +    else if (client_offset > rar->unp_size)
 +    {
 +      /*
 +       * Set the returned offset but only seek to the end of
 +       * the data block.
 +       */
 +      rar->offset_seek = client_offset;
 +      client_offset = rar->unp_size;
 +    }
 +
 +    client_offset += rar->dbo[0].start_offset;
 +    i = 0;
 +    while (i < rar->cursor)
 +    {
 +      i++;
 +      client_offset += rar->dbo[i].start_offset - rar->dbo[i-1].end_offset;
 +    }
 +    if (rar->main_flags & MHD_VOLUME)
 +    {
 +      /* Find the appropriate offset among the multivolume archive */
 +      while (1)
 +      {
 +        if (client_offset < rar->dbo[rar->cursor].start_offset &&
 +          rar->file_flags & FHD_SPLIT_BEFORE)
 +        {
 +          /* Search backwards for the correct data block */
 +          if (rar->cursor == 0)
 +          {
 +            archive_set_error(&a->archive, ARCHIVE_ERRNO_MISC,
 +              "Attempt to seek past beginning of RAR data block");
 +            return (ARCHIVE_FAILED);
 +          }
 +          rar->cursor--;
 +          client_offset -= rar->dbo[rar->cursor+1].start_offset -
 +            rar->dbo[rar->cursor].end_offset;
 +          if (client_offset < rar->dbo[rar->cursor].start_offset)
 +            continue;
 +          ret = __archive_read_seek(a, rar->dbo[rar->cursor].start_offset -
 +            rar->dbo[rar->cursor].header_size, SEEK_SET);
 +          if (ret < (ARCHIVE_OK))
 +            return ret;
 +          ret = archive_read_format_rar_read_header(a, a->entry);
 +          if (ret != (ARCHIVE_OK))
 +          {
 +            archive_set_error(&a->archive, ARCHIVE_ERRNO_MISC,
 +              "Error during seek of RAR file");
 +            return (ARCHIVE_FAILED);
 +          }
 +          rar->cursor--;
 +          break;
 +        }
 +        else if (client_offset > rar->dbo[rar->cursor].end_offset &&
 +          rar->file_flags & FHD_SPLIT_AFTER)
 +        {
 +          /* Search forward for the correct data block */
 +          rar->cursor++;
 +          if (rar->cursor < rar->nodes &&
 +            client_offset > rar->dbo[rar->cursor].end_offset)
 +          {
 +            client_offset += rar->dbo[rar->cursor].start_offset -
 +              rar->dbo[rar->cursor-1].end_offset;
 +            continue;
 +          }
 +          rar->cursor--;
 +          ret = __archive_read_seek(a, rar->dbo[rar->cursor].end_offset,
 +                                    SEEK_SET);
 +          if (ret < (ARCHIVE_OK))
 +            return ret;
 +          ret = archive_read_format_rar_read_header(a, a->entry);
 +          if (ret == (ARCHIVE_EOF))
 +          {
 +            rar->has_endarc_header = 1;
 +            ret = archive_read_format_rar_read_header(a, a->entry);
 +          }
 +          if (ret != (ARCHIVE_OK))
 +          {
 +            archive_set_error(&a->archive, ARCHIVE_ERRNO_MISC,
 +              "Error during seek of RAR file");
 +            return (ARCHIVE_FAILED);
 +          }
 +          client_offset += rar->dbo[rar->cursor].start_offset -
 +            rar->dbo[rar->cursor-1].end_offset;
 +          continue;
 +        }
 +        break;
 +      }
 +    }
 +
 +    ret = __archive_read_seek(a, client_offset, SEEK_SET);
 +    if (ret < (ARCHIVE_OK))
 +      return ret;
 +    rar->bytes_remaining = rar->dbo[rar->cursor].end_offset - ret;
 +    i = rar->cursor;
 +    while (i > 0)
 +    {
 +      i--;
 +      ret -= rar->dbo[i+1].start_offset - rar->dbo[i].end_offset;
 +    }
 +    ret -= rar->dbo[0].start_offset;
 +
 +    /* Always restart reading the file after a seek */
 +    __archive_reset_read_data(&a->archive);
 +
 +    rar->bytes_unconsumed = 0;
 +    rar->offset = 0;
 +
 +    /*
 +     * If a seek past the end of file was requested, return the requested
 +     * offset.
 +     */
 +    if (ret == rar->unp_size && rar->offset_seek > rar->unp_size)
 +      return rar->offset_seek;
 +
 +    /* Return the new offset */
 +    rar->offset_seek = ret;
 +    return rar->offset_seek;
 +  }
 +  else
 +  {
 +    archive_set_error(&a->archive, ARCHIVE_ERRNO_MISC,
 +      "Seeking of compressed RAR files is unsupported");
 +  }
 +  return (ARCHIVE_FAILED);
 +}
 +
 +static int
 +archive_read_format_rar_cleanup(struct archive_read *a)
 +{
 +  struct rar *rar;
 +
 +  rar = (struct rar *)(a->format->data);
 +  free_codes(a);
 +  free(rar->filename);
 +  free(rar->filename_save);
 +  free(rar->dbo);
 +  free(rar->unp_buffer);
 +  free(rar->lzss.window);
 +  __archive_ppmd7_functions.Ppmd7_Free(&rar->ppmd7_context, &g_szalloc);
 +  free(rar);
 +  (a->format->data) = NULL;
 +  return (ARCHIVE_OK);
 +}
 +
 +static int
 +read_header(struct archive_read *a, struct archive_entry *entry,
 +            char head_type)
 +{
 +  const void *h;
 +  const char *p, *endp;
 +  struct rar *rar;
 +  struct rar_header rar_header;
 +  struct rar_file_header file_header;
 +  int64_t header_size;
 +  unsigned filename_size, end;
 +  char *filename;
 +  char *strp;
 +  char packed_size[8];
 +  char unp_size[8];
 +  int ttime;
 +  struct archive_string_conv *sconv, *fn_sconv;
 +  unsigned long crc32_val;
 +  int ret = (ARCHIVE_OK), ret2;
 +
 +  rar = (struct rar *)(a->format->data);
 +
 +  /* Setup a string conversion object for non-rar-unicode filenames. */
 +  sconv = rar->opt_sconv;
 +  if (sconv == NULL) {
 +    if (!rar->init_default_conversion) {
 +      rar->sconv_default =
 +          archive_string_default_conversion_for_read(
 +            &(a->archive));
 +      rar->init_default_conversion = 1;
 +    }
 +    sconv = rar->sconv_default;
 +  }
 +
 +
 +  if ((h = __archive_read_ahead(a, 7, NULL)) == NULL)
 +    return (ARCHIVE_FATAL);
 +  p = h;
 +  memcpy(&rar_header, p, sizeof(rar_header));
 +  rar->file_flags = archive_le16dec(rar_header.flags);
 +  header_size = archive_le16dec(rar_header.size);
 +  if (header_size < (int64_t)sizeof(file_header) + 7) {
 +    archive_set_error(&a->archive, ARCHIVE_ERRNO_FILE_FORMAT,
 +      "Invalid header size");
 +    return (ARCHIVE_FATAL);
 +  }
 +  crc32_val = crc32(0, (const unsigned char *)p + 2, 7 - 2);
 +  __archive_read_consume(a, 7);
 +
 +  if (!(rar->file_flags & FHD_SOLID))
 +  {
 +    rar->compression_method = 0;
 +    rar->packed_size = 0;
 +    rar->unp_size = 0;
 +    rar->mtime = 0;
 +    rar->ctime = 0;
 +    rar->atime = 0;
 +    rar->arctime = 0;
 +    rar->mode = 0;
 +    memset(&rar->salt, 0, sizeof(rar->salt));
 +    rar->atime = 0;
 +    rar->ansec = 0;
 +    rar->ctime = 0;
 +    rar->cnsec = 0;
 +    rar->mtime = 0;
 +    rar->mnsec = 0;
 +    rar->arctime = 0;
 +    rar->arcnsec = 0;
 +  }
 +  else
 +  {
 +    archive_set_error(&a->archive, ARCHIVE_ERRNO_FILE_FORMAT,
 +                      "RAR solid archive support unavailable.");
 +    return (ARCHIVE_FATAL);
 +  }
 +
 +  if ((h = __archive_read_ahead(a, (size_t)header_size - 7, NULL)) == NULL)
 +    return (ARCHIVE_FATAL);
 +
 +  /* File Header CRC check. */
 +  crc32_val = crc32(crc32_val, h, (unsigned)(header_size - 7));
 +  if ((crc32_val & 0xffff) != archive_le16dec(rar_header.crc)) {
 +    archive_set_error(&a->archive, ARCHIVE_ERRNO_FILE_FORMAT,
 +      "Header CRC error");
 +    return (ARCHIVE_FATAL);
 +  }
 +  /* If no CRC error, Go on parsing File Header. */
 +  p = h;
 +  endp = p + header_size - 7;
 +  memcpy(&file_header, p, sizeof(file_header));
 +  p += sizeof(file_header);
 +
 +  rar->compression_method = file_header.method;
 +
 +  ttime = archive_le32dec(file_header.file_time);
 +  rar->mtime = get_time(ttime);
 +
 +  rar->file_crc = archive_le32dec(file_header.file_crc);
 +
 +  if (rar->file_flags & FHD_PASSWORD)
 +  {
 +	archive_entry_set_is_data_encrypted(entry, 1);
 +	rar->has_encrypted_entries = 1;
 +    archive_set_error(&a->archive, ARCHIVE_ERRNO_FILE_FORMAT,
 +                      "RAR encryption support unavailable.");
 +    /* Since it is only the data part itself that is encrypted we can at least
 +       extract information about the currently processed entry and don't need
 +       to return ARCHIVE_FATAL here. */
 +    /*return (ARCHIVE_FATAL);*/
 +  }
 +
 +  if (rar->file_flags & FHD_LARGE)
 +  {
 +    memcpy(packed_size, file_header.pack_size, 4);
 +    memcpy(packed_size + 4, p, 4); /* High pack size */
 +    p += 4;
 +    memcpy(unp_size, file_header.unp_size, 4);
 +    memcpy(unp_size + 4, p, 4); /* High unpack size */
 +    p += 4;
 +    rar->packed_size = archive_le64dec(&packed_size);
 +    rar->unp_size = archive_le64dec(&unp_size);
 +  }
 +  else
 +  {
 +    rar->packed_size = archive_le32dec(file_header.pack_size);
 +    rar->unp_size = archive_le32dec(file_header.unp_size);
 +  }
 +
 +  if (rar->packed_size < 0 || rar->unp_size < 0)
 +  {
 +    archive_set_error(&a->archive, ARCHIVE_ERRNO_FILE_FORMAT,
 +                      "Invalid sizes specified.");
 +    return (ARCHIVE_FATAL);
 +  }
 +
 +  rar->bytes_remaining = rar->packed_size;
 +
 +  /* TODO: RARv3 subblocks contain comments. For now the complete block is
 +   * consumed at the end.
 +   */
 +  if (head_type == NEWSUB_HEAD) {
 +    size_t distance = p - (const char *)h;
 +    header_size += rar->packed_size;
 +    /* Make sure we have the extended data. */
 +    if ((h = __archive_read_ahead(a, (size_t)header_size - 7, NULL)) == NULL)
 +        return (ARCHIVE_FATAL);
 +    p = h;
 +    endp = p + header_size - 7;
 +    p += distance;
 +  }
 +
 +  filename_size = archive_le16dec(file_header.name_size);
 +  if (p + filename_size > endp) {
 +    archive_set_error(&a->archive, ARCHIVE_ERRNO_FILE_FORMAT,
 +      "Invalid filename size");
 +    return (ARCHIVE_FATAL);
 +  }
 +  if (rar->filename_allocated < filename_size * 2 + 2) {
 +    char *newptr;
 +    size_t newsize = filename_size * 2 + 2;
 +    newptr = realloc(rar->filename, newsize);
 +    if (newptr == NULL) {
 +      archive_set_error(&a->archive, ENOMEM,
 +                        "Couldn't allocate memory.");
 +      return (ARCHIVE_FATAL);
 +    }
 +    rar->filename = newptr;
 +    rar->filename_allocated = newsize;
 +  }
 +  filename = rar->filename;
 +  memcpy(filename, p, filename_size);
 +  filename[filename_size] = '\0';
 +  if (rar->file_flags & FHD_UNICODE)
 +  {
 +    if (filename_size != strlen(filename))
 +    {
 +      unsigned char highbyte, flagbits, flagbyte;
 +      unsigned fn_end, offset;
 +
 +      end = filename_size;
 +      fn_end = filename_size * 2;
 +      filename_size = 0;
 +      offset = (unsigned)strlen(filename) + 1;
 +      highbyte = *(p + offset++);
 +      flagbits = 0;
 +      flagbyte = 0;
 +      while (offset < end && filename_size < fn_end)
 +      {
 +        if (!flagbits)
 +        {
 +          flagbyte = *(p + offset++);
 +          flagbits = 8;
 +        }
 +
 +        flagbits -= 2;
 +        switch((flagbyte >> flagbits) & 3)
 +        {
 +          case 0:
 +            filename[filename_size++] = '\0';
 +            filename[filename_size++] = *(p + offset++);
 +            break;
 +          case 1:
 +            filename[filename_size++] = highbyte;
 +            filename[filename_size++] = *(p + offset++);
 +            break;
 +          case 2:
 +            filename[filename_size++] = *(p + offset + 1);
 +            filename[filename_size++] = *(p + offset);
 +            offset += 2;
 +            break;
 +          case 3:
 +          {
 +            char extra, high;
 +            uint8_t length = *(p + offset++);
 +
 +            if (length & 0x80) {
 +              extra = *(p + offset++);
 +              high = (char)highbyte;
 +            } else
 +              extra = high = 0;
 +            length = (length & 0x7f) + 2;
 +            while (length && filename_size < fn_end) {
 +              unsigned cp = filename_size >> 1;
 +              filename[filename_size++] = high;
 +              filename[filename_size++] = p[cp] + extra;
 +              length--;
 +            }
 +          }
 +          break;
 +        }
 +      }
 +      if (filename_size > fn_end) {
 +        archive_set_error(&a->archive, ARCHIVE_ERRNO_FILE_FORMAT,
 +          "Invalid filename");
 +        return (ARCHIVE_FATAL);
 +      }
 +      filename[filename_size++] = '\0';
 +      filename[filename_size++] = '\0';
 +
 +      /* Decoded unicode form is UTF-16BE, so we have to update a string
 +       * conversion object for it. */
 +      if (rar->sconv_utf16be == NULL) {
 +        rar->sconv_utf16be = archive_string_conversion_from_charset(
 +           &a->archive, "UTF-16BE", 1);
 +        if (rar->sconv_utf16be == NULL)
 +          return (ARCHIVE_FATAL);
 +      }
 +      fn_sconv = rar->sconv_utf16be;
 +
 +      strp = filename;
 +      while (memcmp(strp, "\x00\x00", 2))
 +      {
 +        if (!memcmp(strp, "\x00\\", 2))
 +          *(strp + 1) = '/';
 +        strp += 2;
 +      }
 +      p += offset;
 +    } else {
 +      /*
 +       * If FHD_UNICODE is set but no unicode data, this file name form
 +       * is UTF-8, so we have to update a string conversion object for
 +       * it accordingly.
 +       */
 +      if (rar->sconv_utf8 == NULL) {
 +        rar->sconv_utf8 = archive_string_conversion_from_charset(
 +           &a->archive, "UTF-8", 1);
 +        if (rar->sconv_utf8 == NULL)
 +          return (ARCHIVE_FATAL);
 +      }
 +      fn_sconv = rar->sconv_utf8;
 +      while ((strp = strchr(filename, '\\')) != NULL)
 +        *strp = '/';
 +      p += filename_size;
 +    }
 +  }
 +  else
 +  {
 +    fn_sconv = sconv;
 +    while ((strp = strchr(filename, '\\')) != NULL)
 +      *strp = '/';
 +    p += filename_size;
 +  }
 +
 +  /* Split file in multivolume RAR. No more need to process header. */
 +  if (rar->filename_save &&
 +    filename_size == rar->filename_save_size &&
 +    !memcmp(rar->filename, rar->filename_save, filename_size + 1))
 +  {
 +    __archive_read_consume(a, header_size - 7);
 +    rar->cursor++;
 +    if (rar->cursor >= rar->nodes)
 +    {
 +      rar->nodes++;
 +      if ((rar->dbo =
 +        realloc(rar->dbo, sizeof(*rar->dbo) * rar->nodes)) == NULL)
 +      {
 +        archive_set_error(&a->archive, ENOMEM, "Couldn't allocate memory.");
 +        return (ARCHIVE_FATAL);
 +      }
 +      rar->dbo[rar->cursor].header_size = header_size;
 +      rar->dbo[rar->cursor].start_offset = -1;
 +      rar->dbo[rar->cursor].end_offset = -1;
 +    }
 +    if (rar->dbo[rar->cursor].start_offset < 0)
 +    {
 +      rar->dbo[rar->cursor].start_offset = a->filter->position;
 +      rar->dbo[rar->cursor].end_offset = rar->dbo[rar->cursor].start_offset +
 +        rar->packed_size;
 +    }
 +    return ret;
 +  }
 +
 +  rar->filename_save = (char*)realloc(rar->filename_save,
 +                                      filename_size + 1);
 +  memcpy(rar->filename_save, rar->filename, filename_size + 1);
 +  rar->filename_save_size = filename_size;
 +
 +  /* Set info for seeking */
 +  free(rar->dbo);
 +  if ((rar->dbo = calloc(1, sizeof(*rar->dbo))) == NULL)
 +  {
 +    archive_set_error(&a->archive, ENOMEM, "Couldn't allocate memory.");
 +    return (ARCHIVE_FATAL);
 +  }
 +  rar->dbo[0].header_size = header_size;
 +  rar->dbo[0].start_offset = -1;
 +  rar->dbo[0].end_offset = -1;
 +  rar->cursor = 0;
 +  rar->nodes = 1;
 +
 +  if (rar->file_flags & FHD_SALT)
 +  {
 +    if (p + 8 > endp) {
 +      archive_set_error(&a->archive, ARCHIVE_ERRNO_FILE_FORMAT,
 +        "Invalid header size");
 +      return (ARCHIVE_FATAL);
 +    }
 +    memcpy(rar->salt, p, 8);
 +    p += 8;
 +  }
 +
 +  if (rar->file_flags & FHD_EXTTIME) {
 +    if (read_exttime(p, rar, endp) < 0) {
 +      archive_set_error(&a->archive, ARCHIVE_ERRNO_FILE_FORMAT,
 +        "Invalid header size");
 +      return (ARCHIVE_FATAL);
 +    }
 +  }
 +
 +  __archive_read_consume(a, header_size - 7);
 +  rar->dbo[0].start_offset = a->filter->position;
 +  rar->dbo[0].end_offset = rar->dbo[0].start_offset + rar->packed_size;
 +
 +  switch(file_header.host_os)
 +  {
 +  case OS_MSDOS:
 +  case OS_OS2:
 +  case OS_WIN32:
 +    rar->mode = archive_le32dec(file_header.file_attr);
 +    if (rar->mode & FILE_ATTRIBUTE_DIRECTORY)
 +      rar->mode = AE_IFDIR | S_IXUSR | S_IXGRP | S_IXOTH;
 +    else
 +      rar->mode = AE_IFREG;
 +    rar->mode |= S_IRUSR | S_IWUSR | S_IRGRP | S_IROTH;
 +    break;
 +
 +  case OS_UNIX:
 +  case OS_MAC_OS:
 +  case OS_BEOS:
 +    rar->mode = archive_le32dec(file_header.file_attr);
 +    break;
 +
 +  default:
 +    archive_set_error(&a->archive, ARCHIVE_ERRNO_FILE_FORMAT,
 +                      "Unknown file attributes from RAR file's host OS");
 +    return (ARCHIVE_FATAL);
 +  }
 +
 +  rar->bytes_uncopied = rar->bytes_unconsumed = 0;
 +  rar->lzss.position = rar->offset = 0;
 +  rar->offset_seek = 0;
 +  rar->dictionary_size = 0;
 +  rar->offset_outgoing = 0;
 +  rar->br.cache_avail = 0;
 +  rar->br.avail_in = 0;
 +  rar->crc_calculated = 0;
 +  rar->entry_eof = 0;
 +  rar->valid = 1;
 +  rar->is_ppmd_block = 0;
 +  rar->start_new_table = 1;
 +  free(rar->unp_buffer);
 +  rar->unp_buffer = NULL;
 +  rar->unp_offset = 0;
 +  rar->unp_buffer_size = UNP_BUFFER_SIZE;
 +  memset(rar->lengthtable, 0, sizeof(rar->lengthtable));
 +  __archive_ppmd7_functions.Ppmd7_Free(&rar->ppmd7_context, &g_szalloc);
 +  rar->ppmd_valid = rar->ppmd_eod = 0;
 +
 +  /* Don't set any archive entries for non-file header types */
 +  if (head_type == NEWSUB_HEAD)
 +    return ret;
 +
 +  archive_entry_set_mtime(entry, rar->mtime, rar->mnsec);
 +  archive_entry_set_ctime(entry, rar->ctime, rar->cnsec);
 +  archive_entry_set_atime(entry, rar->atime, rar->ansec);
 +  archive_entry_set_size(entry, rar->unp_size);
 +  archive_entry_set_mode(entry, rar->mode);
 +
 +  if (archive_entry_copy_pathname_l(entry, filename, filename_size, fn_sconv))
 +  {
 +    if (errno == ENOMEM)
 +    {
 +      archive_set_error(&a->archive, ENOMEM,
 +                        "Can't allocate memory for Pathname");
 +      return (ARCHIVE_FATAL);
 +    }
 +    archive_set_error(&a->archive, ARCHIVE_ERRNO_FILE_FORMAT,
 +                      "Pathname cannot be converted from %s to current locale.",
 +                      archive_string_conversion_charset_name(fn_sconv));
 +    ret = (ARCHIVE_WARN);
 +  }
 +
 +  if (((rar->mode) & AE_IFMT) == AE_IFLNK)
 +  {
 +    /* Make sure a symbolic-link file does not have its body. */
 +    rar->bytes_remaining = 0;
 +    archive_entry_set_size(entry, 0);
 +
 +    /* Read a symbolic-link name. */
 +    if ((ret2 = read_symlink_stored(a, entry, sconv)) < (ARCHIVE_WARN))
 +      return ret2;
 +    if (ret > ret2)
 +      ret = ret2;
 +  }
 +
 +  if (rar->bytes_remaining == 0)
 +    rar->entry_eof = 1;
 +
 +  return ret;
 +}
 +
 +static time_t
 +get_time(int ttime)
 +{
 +  struct tm tm;
 +  tm.tm_sec = 2 * (ttime & 0x1f);
 +  tm.tm_min = (ttime >> 5) & 0x3f;
 +  tm.tm_hour = (ttime >> 11) & 0x1f;
 +  tm.tm_mday = (ttime >> 16) & 0x1f;
 +  tm.tm_mon = ((ttime >> 21) & 0x0f) - 1;
 +  tm.tm_year = ((ttime >> 25) & 0x7f) + 80;
 +  tm.tm_isdst = -1;
 +  return mktime(&tm);
 +}
 +
 +static int
 +read_exttime(const char *p, struct rar *rar, const char *endp)
 +{
 +  unsigned rmode, flags, rem, j, count;
 +  int ttime, i;
 +  struct tm *tm;
 +  time_t t;
 +  long nsec;
 +
 +  if (p + 2 > endp)
 +    return (-1);
 +  flags = archive_le16dec(p);
 +  p += 2;
 +
 +  for (i = 3; i >= 0; i--)
 +  {
 +    t = 0;
 +    if (i == 3)
 +      t = rar->mtime;
 +    rmode = flags >> i * 4;
 +    if (rmode & 8)
 +    {
 +      if (!t)
 +      {
 +        if (p + 4 > endp)
 +          return (-1);
 +        ttime = archive_le32dec(p);
 +        t = get_time(ttime);
 +        p += 4;
 +      }
 +      rem = 0;
 +      count = rmode & 3;
 +      if (p + count > endp)
 +        return (-1);
 +      for (j = 0; j < count; j++)
 +      {
 +        rem = ((*p) << 16) | (rem >> 8);
 +        p++;
 +      }
 +      tm = localtime(&t);
 +      nsec = tm->tm_sec + rem / NS_UNIT;
 +      if (rmode & 4)
 +      {
 +        tm->tm_sec++;
 +        t = mktime(tm);
 +      }
 +      if (i == 3)
 +      {
 +        rar->mtime = t;
 +        rar->mnsec = nsec;
 +      }
 +      else if (i == 2)
 +      {
 +        rar->ctime = t;
 +        rar->cnsec = nsec;
 +      }
 +      else if (i == 1)
 +      {
 +        rar->atime = t;
 +        rar->ansec = nsec;
 +      }
 +      else
 +      {
 +        rar->arctime = t;
 +        rar->arcnsec = nsec;
 +      }
 +    }
 +  }
 +  return (0);
 +}
 +
 +static int
 +read_symlink_stored(struct archive_read *a, struct archive_entry *entry,
 +                    struct archive_string_conv *sconv)
 +{
 +  const void *h;
 +  const char *p;
 +  struct rar *rar;
 +  int ret = (ARCHIVE_OK);
 +
 +  rar = (struct rar *)(a->format->data);
 +  if ((h = rar_read_ahead(a, (size_t)rar->packed_size, NULL)) == NULL)
 +    return (ARCHIVE_FATAL);
 +  p = h;
 +
 +  if (archive_entry_copy_symlink_l(entry,
 +      p, (size_t)rar->packed_size, sconv))
 +  {
 +    if (errno == ENOMEM)
 +    {
 +      archive_set_error(&a->archive, ENOMEM,
 +                        "Can't allocate memory for link");
 +      return (ARCHIVE_FATAL);
 +    }
 +    archive_set_error(&a->archive, ARCHIVE_ERRNO_FILE_FORMAT,
 +                      "link cannot be converted from %s to current locale.",
 +                      archive_string_conversion_charset_name(sconv));
 +    ret = (ARCHIVE_WARN);
 +  }
 +  __archive_read_consume(a, rar->packed_size);
 +  return ret;
 +}
 +
 +static int
 +read_data_stored(struct archive_read *a, const void **buff, size_t *size,
 +                 int64_t *offset)
 +{
 +  struct rar *rar;
 +  ssize_t bytes_avail;
 +
 +  rar = (struct rar *)(a->format->data);
 +  if (rar->bytes_remaining == 0 &&
 +    !(rar->main_flags & MHD_VOLUME && rar->file_flags & FHD_SPLIT_AFTER))
 +  {
 +    *buff = NULL;
 +    *size = 0;
 +    *offset = rar->offset;
 +    if (rar->file_crc != rar->crc_calculated) {
 +      archive_set_error(&a->archive, ARCHIVE_ERRNO_FILE_FORMAT,
 +                        "File CRC error");
 +      return (ARCHIVE_FATAL);
 +    }
 +    rar->entry_eof = 1;
 +    return (ARCHIVE_EOF);
 +  }
 +
 +  *buff = rar_read_ahead(a, 1, &bytes_avail);
 +  if (bytes_avail <= 0)
 +  {
 +    archive_set_error(&a->archive, ARCHIVE_ERRNO_FILE_FORMAT,
 +                      "Truncated RAR file data");
 +    return (ARCHIVE_FATAL);
 +  }
 +
 +  *size = bytes_avail;
 +  *offset = rar->offset;
 +  rar->offset += bytes_avail;
 +  rar->offset_seek += bytes_avail;
 +  rar->bytes_remaining -= bytes_avail;
 +  rar->bytes_unconsumed = bytes_avail;
 +  /* Calculate File CRC. */
 +  rar->crc_calculated = crc32(rar->crc_calculated, *buff,
 +    (unsigned)bytes_avail);
 +  return (ARCHIVE_OK);
 +}
 +
 +static int
 +read_data_compressed(struct archive_read *a, const void **buff, size_t *size,
 +               int64_t *offset)
 +{
 +  struct rar *rar;
 +  int64_t start, end, actualend;
 +  size_t bs;
 +  int ret = (ARCHIVE_OK), sym, code, lzss_offset, length, i;
 +
 +  rar = (struct rar *)(a->format->data);
 +
 +  do {
 +    if (!rar->valid)
 +      return (ARCHIVE_FATAL);
 +    if (rar->ppmd_eod ||
 +       (rar->dictionary_size && rar->offset >= rar->unp_size))
 +    {
 +      if (rar->unp_offset > 0) {
 +        /*
 +         * We have unprocessed extracted data. write it out.
 +         */
 +        *buff = rar->unp_buffer;
 +        *size = rar->unp_offset;
 +        *offset = rar->offset_outgoing;
 +        rar->offset_outgoing += *size;
 +        /* Calculate File CRC. */
 +        rar->crc_calculated = crc32(rar->crc_calculated, *buff,
 +          (unsigned)*size);
 +        rar->unp_offset = 0;
 +        return (ARCHIVE_OK);
 +      }
 +      *buff = NULL;
 +      *size = 0;
 +      *offset = rar->offset;
 +      if (rar->file_crc != rar->crc_calculated) {
 +        archive_set_error(&a->archive, ARCHIVE_ERRNO_FILE_FORMAT,
 +                          "File CRC error");
 +        return (ARCHIVE_FATAL);
 +      }
 +      rar->entry_eof = 1;
 +      return (ARCHIVE_EOF);
 +    }
 +
 +    if (!rar->is_ppmd_block && rar->dictionary_size && rar->bytes_uncopied > 0)
 +    {
 +      if (rar->bytes_uncopied > (rar->unp_buffer_size - rar->unp_offset))
 +        bs = rar->unp_buffer_size - rar->unp_offset;
 +      else
 +        bs = (size_t)rar->bytes_uncopied;
 +      ret = copy_from_lzss_window(a, buff, rar->offset, (int)bs);
 +      if (ret != ARCHIVE_OK)
 +        return (ret);
 +      rar->offset += bs;
 +      rar->bytes_uncopied -= bs;
 +      if (*buff != NULL) {
 +        rar->unp_offset = 0;
 +        *size = rar->unp_buffer_size;
 +        *offset = rar->offset_outgoing;
 +        rar->offset_outgoing += *size;
 +        /* Calculate File CRC. */
 +        rar->crc_calculated = crc32(rar->crc_calculated, *buff,
 +          (unsigned)*size);
 +        return (ret);
 +      }
 +      continue;
 +    }
 +
 +    if (!rar->br.next_in &&
 +      (ret = rar_br_preparation(a, &(rar->br))) < ARCHIVE_WARN)
 +      return (ret);
 +    if (rar->start_new_table && ((ret = parse_codes(a)) < (ARCHIVE_WARN)))
 +      return (ret);
 +
 +    if (rar->is_ppmd_block)
 +    {
 +      if ((sym = __archive_ppmd7_functions.Ppmd7_DecodeSymbol(
 +        &rar->ppmd7_context, &rar->range_dec.p)) < 0)
 +      {
 +        archive_set_error(&a->archive, ARCHIVE_ERRNO_FILE_FORMAT,
 +                          "Invalid symbol");
 +        return (ARCHIVE_FATAL);
 +      }
 +      if(sym != rar->ppmd_escape)
 +      {
 +        lzss_emit_literal(rar, sym);
 +        rar->bytes_uncopied++;
 +      }
 +      else
 +      {
 +        if ((code = __archive_ppmd7_functions.Ppmd7_DecodeSymbol(
 +          &rar->ppmd7_context, &rar->range_dec.p)) < 0)
 +        {
 +          archive_set_error(&a->archive, ARCHIVE_ERRNO_FILE_FORMAT,
 +                            "Invalid symbol");
 +          return (ARCHIVE_FATAL);
 +        }
 +
 +        switch(code)
 +        {
 +          case 0:
 +            rar->start_new_table = 1;
 +            return read_data_compressed(a, buff, size, offset);
 +
 +          case 2:
 +            rar->ppmd_eod = 1;/* End Of ppmd Data. */
 +            continue;
 +
 +          case 3:
 +            archive_set_error(&a->archive, ARCHIVE_ERRNO_MISC,
 +                              "Parsing filters is unsupported.");
 +            return (ARCHIVE_FAILED);
 +
 +          case 4:
 +            lzss_offset = 0;
 +            for (i = 2; i >= 0; i--)
 +            {
 +              if ((code = __archive_ppmd7_functions.Ppmd7_DecodeSymbol(
 +                &rar->ppmd7_context, &rar->range_dec.p)) < 0)
 +              {
 +                archive_set_error(&a->archive, ARCHIVE_ERRNO_FILE_FORMAT,
 +                                  "Invalid symbol");
 +                return (ARCHIVE_FATAL);
 +              }
 +              lzss_offset |= code << (i * 8);
 +            }
 +            if ((length = __archive_ppmd7_functions.Ppmd7_DecodeSymbol(
 +              &rar->ppmd7_context, &rar->range_dec.p)) < 0)
 +            {
 +              archive_set_error(&a->archive, ARCHIVE_ERRNO_FILE_FORMAT,
 +                                "Invalid symbol");
 +              return (ARCHIVE_FATAL);
 +            }
 +            lzss_emit_match(rar, lzss_offset + 2, length + 32);
 +            rar->bytes_uncopied += length + 32;
 +            break;
 +
 +          case 5:
 +            if ((length = __archive_ppmd7_functions.Ppmd7_DecodeSymbol(
 +              &rar->ppmd7_context, &rar->range_dec.p)) < 0)
 +            {
 +              archive_set_error(&a->archive, ARCHIVE_ERRNO_FILE_FORMAT,
 +                                "Invalid symbol");
 +              return (ARCHIVE_FATAL);
 +            }
 +            lzss_emit_match(rar, 1, length + 4);
 +            rar->bytes_uncopied += length + 4;
 +            break;
 +
 +         default:
 +           lzss_emit_literal(rar, sym);
 +           rar->bytes_uncopied++;
 +        }
 +      }
 +    }
 +    else
 +    {
 +      start = rar->offset;
 +      end = start + rar->dictionary_size;
 +      rar->filterstart = INT64_MAX;
 +
 +      if ((actualend = expand(a, end)) < 0)
 +        return ((int)actualend);
 +
 +      rar->bytes_uncopied = actualend - start;
 +      if (rar->bytes_uncopied == 0) {
 +          /* Broken RAR files cause this case.
 +          * NOTE: If this case were possible on a normal RAR file
 +          * we would find out where it was actually bad and
 +          * what we would do to solve it. */
 +          archive_set_error(&a->archive, ARCHIVE_ERRNO_FILE_FORMAT,
 +                            "Internal error extracting RAR file");
 +          return (ARCHIVE_FATAL);
 +      }
 +    }
 +    if (rar->bytes_uncopied > (rar->unp_buffer_size - rar->unp_offset))
 +      bs = rar->unp_buffer_size - rar->unp_offset;
 +    else
 +      bs = (size_t)rar->bytes_uncopied;
 +    ret = copy_from_lzss_window(a, buff, rar->offset, (int)bs);
 +    if (ret != ARCHIVE_OK)
 +      return (ret);
 +    rar->offset += bs;
 +    rar->bytes_uncopied -= bs;
 +    /*
 +     * If *buff is NULL, it means unp_buffer is not full.
 +     * So we have to continue extracting a RAR file.
 +     */
 +  } while (*buff == NULL);
 +
 +  rar->unp_offset = 0;
 +  *size = rar->unp_buffer_size;
 +  *offset = rar->offset_outgoing;
 +  rar->offset_outgoing += *size;
 +  /* Calculate File CRC. */
 +  rar->crc_calculated = crc32(rar->crc_calculated, *buff, (unsigned)*size);
 +  return ret;
 +}
 +
 +static int
 +parse_codes(struct archive_read *a)
 +{
 +  int i, j, val, n, r;
 +  unsigned char bitlengths[MAX_SYMBOLS], zerocount, ppmd_flags;
 +  unsigned int maxorder;
 +  struct huffman_code precode;
 +  struct rar *rar = (struct rar *)(a->format->data);
 +  struct rar_br *br = &(rar->br);
 +
 +  free_codes(a);
 +
 +  /* Skip to the next byte */
 +  rar_br_consume_unalined_bits(br);
 +
 +  /* PPMd block flag */
 +  if (!rar_br_read_ahead(a, br, 1))
 +    goto truncated_data;
 +  if ((rar->is_ppmd_block = rar_br_bits(br, 1)) != 0)
 +  {
 +    rar_br_consume(br, 1);
 +    if (!rar_br_read_ahead(a, br, 7))
 +      goto truncated_data;
 +    ppmd_flags = rar_br_bits(br, 7);
 +    rar_br_consume(br, 7);
 +
 +    /* Memory is allocated in MB */
 +    if (ppmd_flags & 0x20)
 +    {
 +      if (!rar_br_read_ahead(a, br, 8))
 +        goto truncated_data;
 +      rar->dictionary_size = (rar_br_bits(br, 8) + 1) << 20;
 +      rar_br_consume(br, 8);
 +    }
 +
 +    if (ppmd_flags & 0x40)
 +    {
 +      if (!rar_br_read_ahead(a, br, 8))
 +        goto truncated_data;
 +      rar->ppmd_escape = rar->ppmd7_context.InitEsc = rar_br_bits(br, 8);
 +      rar_br_consume(br, 8);
 +    }
 +    else
 +      rar->ppmd_escape = 2;
 +
 +    if (ppmd_flags & 0x20)
 +    {
 +      maxorder = (ppmd_flags & 0x1F) + 1;
 +      if(maxorder > 16)
 +        maxorder = 16 + (maxorder - 16) * 3;
 +
 +      if (maxorder == 1)
 +      {
 +        archive_set_error(&a->archive, ARCHIVE_ERRNO_FILE_FORMAT,
 +                          "Truncated RAR file data");
 +        return (ARCHIVE_FATAL);
 +      }
 +
 +      /* Make sure ppmd7_contest is freed before Ppmd7_Construct
 +       * because reading a broken file cause this abnormal sequence. */
 +      __archive_ppmd7_functions.Ppmd7_Free(&rar->ppmd7_context, &g_szalloc);
 +
 +      rar->bytein.a = a;
 +      rar->bytein.Read = &ppmd_read;
 +      __archive_ppmd7_functions.PpmdRAR_RangeDec_CreateVTable(&rar->range_dec);
 +      rar->range_dec.Stream = &rar->bytein;
 +      __archive_ppmd7_functions.Ppmd7_Construct(&rar->ppmd7_context);
 +
 +      if (rar->dictionary_size == 0) {
 +	      archive_set_error(&a->archive, ARCHIVE_ERRNO_FILE_FORMAT,
 +                          "Invalid zero dictionary size");
 +	      return (ARCHIVE_FATAL);
 +      }
 +
 +      if (!__archive_ppmd7_functions.Ppmd7_Alloc(&rar->ppmd7_context,
 +        rar->dictionary_size, &g_szalloc))
 +      {
 +        archive_set_error(&a->archive, ENOMEM,
 +                          "Out of memory");
 +        return (ARCHIVE_FATAL);
 +      }
 +      if (!__archive_ppmd7_functions.PpmdRAR_RangeDec_Init(&rar->range_dec))
 +      {
 +        archive_set_error(&a->archive, ARCHIVE_ERRNO_FILE_FORMAT,
 +                          "Unable to initialize PPMd range decoder");
 +        return (ARCHIVE_FATAL);
 +      }
 +      __archive_ppmd7_functions.Ppmd7_Init(&rar->ppmd7_context, maxorder);
 +      rar->ppmd_valid = 1;
 +    }
 +    else
 +    {
 +      if (!rar->ppmd_valid) {
 +        archive_set_error(&a->archive, ARCHIVE_ERRNO_FILE_FORMAT,
 +                          "Invalid PPMd sequence");
 +        return (ARCHIVE_FATAL);
 +      }
 +      if (!__archive_ppmd7_functions.PpmdRAR_RangeDec_Init(&rar->range_dec))
 +      {
 +        archive_set_error(&a->archive, ARCHIVE_ERRNO_FILE_FORMAT,
 +                          "Unable to initialize PPMd range decoder");
 +        return (ARCHIVE_FATAL);
 +      }
 +    }
 +  }
 +  else
 +  {
 +    rar_br_consume(br, 1);
 +
 +    /* Keep existing table flag */
 +    if (!rar_br_read_ahead(a, br, 1))
 +      goto truncated_data;
 +    if (!rar_br_bits(br, 1))
 +      memset(rar->lengthtable, 0, sizeof(rar->lengthtable));
 +    rar_br_consume(br, 1);
 +
 +    memset(&bitlengths, 0, sizeof(bitlengths));
 +    for (i = 0; i < MAX_SYMBOLS;)
 +    {
 +      if (!rar_br_read_ahead(a, br, 4))
 +        goto truncated_data;
 +      bitlengths[i++] = rar_br_bits(br, 4);
 +      rar_br_consume(br, 4);
 +      if (bitlengths[i-1] == 0xF)
 +      {
 +        if (!rar_br_read_ahead(a, br, 4))
 +          goto truncated_data;
 +        zerocount = rar_br_bits(br, 4);
 +        rar_br_consume(br, 4);
 +        if (zerocount)
 +        {
 +          i--;
 +          for (j = 0; j < zerocount + 2 && i < MAX_SYMBOLS; j++)
 +            bitlengths[i++] = 0;
 +        }
 +      }
 +    }
 +
 +    memset(&precode, 0, sizeof(precode));
 +    r = create_code(a, &precode, bitlengths, MAX_SYMBOLS, MAX_SYMBOL_LENGTH);
 +    if (r != ARCHIVE_OK) {
 +      free(precode.tree);
 +      free(precode.table);
 +      return (r);
 +    }
 +
 +    for (i = 0; i < HUFFMAN_TABLE_SIZE;)
 +    {
 +      if ((val = read_next_symbol(a, &precode)) < 0) {
 +        free(precode.tree);
 +        free(precode.table);
 +        return (ARCHIVE_FATAL);
 +      }
 +      if (val < 16)
 +      {
 +        rar->lengthtable[i] = (rar->lengthtable[i] + val) & 0xF;
 +        i++;
 +      }
 +      else if (val < 18)
 +      {
 +        if (i == 0)
 +        {
 +          free(precode.tree);
 +          free(precode.table);
 +          archive_set_error(&a->archive, ARCHIVE_ERRNO_FILE_FORMAT,
 +                            "Internal error extracting RAR file.");
 +          return (ARCHIVE_FATAL);
 +        }
 +
 +        if(val == 16) {
 +          if (!rar_br_read_ahead(a, br, 3)) {
 +            free(precode.tree);
 +            free(precode.table);
 +            goto truncated_data;
 +          }
 +          n = rar_br_bits(br, 3) + 3;
 +          rar_br_consume(br, 3);
 +        } else {
 +          if (!rar_br_read_ahead(a, br, 7)) {
 +            free(precode.tree);
 +            free(precode.table);
 +            goto truncated_data;
 +          }
 +          n = rar_br_bits(br, 7) + 11;
 +          rar_br_consume(br, 7);
 +        }
 +
 +        for (j = 0; j < n && i < HUFFMAN_TABLE_SIZE; j++)
 +        {
 +          rar->lengthtable[i] = rar->lengthtable[i-1];
 +          i++;
 +        }
 +      }
 +      else
 +      {
 +        if(val == 18) {
 +          if (!rar_br_read_ahead(a, br, 3)) {
 +            free(precode.tree);
 +            free(precode.table);
 +            goto truncated_data;
 +          }
 +          n = rar_br_bits(br, 3) + 3;
 +          rar_br_consume(br, 3);
 +        } else {
 +          if (!rar_br_read_ahead(a, br, 7)) {
 +            free(precode.tree);
 +            free(precode.table);
 +            goto truncated_data;
 +          }
 +          n = rar_br_bits(br, 7) + 11;
 +          rar_br_consume(br, 7);
 +        }
 +
 +        for(j = 0; j < n && i < HUFFMAN_TABLE_SIZE; j++)
 +          rar->lengthtable[i++] = 0;
 +      }
 +    }
 +    free(precode.tree);
 +    free(precode.table);
 +
 +    r = create_code(a, &rar->maincode, &rar->lengthtable[0], MAINCODE_SIZE,
 +                MAX_SYMBOL_LENGTH);
 +    if (r != ARCHIVE_OK)
 +      return (r);
 +    r = create_code(a, &rar->offsetcode, &rar->lengthtable[MAINCODE_SIZE],
 +                OFFSETCODE_SIZE, MAX_SYMBOL_LENGTH);
 +    if (r != ARCHIVE_OK)
 +      return (r);
 +    r = create_code(a, &rar->lowoffsetcode,
 +                &rar->lengthtable[MAINCODE_SIZE + OFFSETCODE_SIZE],
 +                LOWOFFSETCODE_SIZE, MAX_SYMBOL_LENGTH);
 +    if (r != ARCHIVE_OK)
 +      return (r);
 +    r = create_code(a, &rar->lengthcode,
 +                &rar->lengthtable[MAINCODE_SIZE + OFFSETCODE_SIZE +
 +                LOWOFFSETCODE_SIZE], LENGTHCODE_SIZE, MAX_SYMBOL_LENGTH);
 +    if (r != ARCHIVE_OK)
 +      return (r);
 +  }
 +
 +  if (!rar->dictionary_size || !rar->lzss.window)
 +  {
 +    /* Seems as though dictionary sizes are not used. Even so, minimize
 +     * memory usage as much as possible.
 +     */
 +    void *new_window;
 +    unsigned int new_size;
 +
 +    if (rar->unp_size >= DICTIONARY_MAX_SIZE)
 +      new_size = DICTIONARY_MAX_SIZE;
 +    else
 +      new_size = rar_fls((unsigned int)rar->unp_size) << 1;
 +    new_window = realloc(rar->lzss.window, new_size);
 +    if (new_window == NULL) {
 +      archive_set_error(&a->archive, ENOMEM,
 +                        "Unable to allocate memory for uncompressed data.");
 +      return (ARCHIVE_FATAL);
 +    }
 +    rar->lzss.window = (unsigned char *)new_window;
 +    rar->dictionary_size = new_size;
 +    memset(rar->lzss.window, 0, rar->dictionary_size);
 +    rar->lzss.mask = rar->dictionary_size - 1;
 +  }
 +
 +  rar->start_new_table = 0;
 +  return (ARCHIVE_OK);
 +truncated_data:
 +  archive_set_error(&a->archive, ARCHIVE_ERRNO_FILE_FORMAT,
 +                    "Truncated RAR file data");
 +  rar->valid = 0;
 +  return (ARCHIVE_FATAL);
 +}
 +
 +static void
 +free_codes(struct archive_read *a)
 +{
 +  struct rar *rar = (struct rar *)(a->format->data);
 +  free(rar->maincode.tree);
 +  free(rar->offsetcode.tree);
 +  free(rar->lowoffsetcode.tree);
 +  free(rar->lengthcode.tree);
 +  free(rar->maincode.table);
 +  free(rar->offsetcode.table);
 +  free(rar->lowoffsetcode.table);
 +  free(rar->lengthcode.table);
 +  memset(&rar->maincode, 0, sizeof(rar->maincode));
 +  memset(&rar->offsetcode, 0, sizeof(rar->offsetcode));
 +  memset(&rar->lowoffsetcode, 0, sizeof(rar->lowoffsetcode));
 +  memset(&rar->lengthcode, 0, sizeof(rar->lengthcode));
 +}
 +
 +
 +static int
 +read_next_symbol(struct archive_read *a, struct huffman_code *code)
 +{
 +  unsigned char bit;
 +  unsigned int bits;
 +  int length, value, node;
 +  struct rar *rar;
 +  struct rar_br *br;
 +
 +  if (!code->table)
 +  {
 +    if (make_table(a, code) != (ARCHIVE_OK))
 +      return -1;
 +  }
 +
 +  rar = (struct rar *)(a->format->data);
 +  br = &(rar->br);
 +
 +  /* Look ahead (peek) at bits */
 +  if (!rar_br_read_ahead(a, br, code->tablesize)) {
 +    archive_set_error(&a->archive, ARCHIVE_ERRNO_FILE_FORMAT,
 +                      "Truncated RAR file data");
 +    rar->valid = 0;
 +    return -1;
 +  }
 +  bits = rar_br_bits(br, code->tablesize);
 +
 +  length = code->table[bits].length;
 +  value = code->table[bits].value;
 +
 +  if (length < 0)
 +  {
 +    archive_set_error(&a->archive, ARCHIVE_ERRNO_FILE_FORMAT,
 +                      "Invalid prefix code in bitstream");
 +    return -1;
 +  }
 +
 +  if (length <= code->tablesize)
 +  {
 +    /* Skip length bits */
 +    rar_br_consume(br, length);
 +    return value;
 +  }
 +
 +  /* Skip tablesize bits */
 +  rar_br_consume(br, code->tablesize);
 +
 +  node = value;
 +  while (!(code->tree[node].branches[0] ==
 +    code->tree[node].branches[1]))
 +  {
 +    if (!rar_br_read_ahead(a, br, 1)) {
 +      archive_set_error(&a->archive, ARCHIVE_ERRNO_FILE_FORMAT,
 +                        "Truncated RAR file data");
 +      rar->valid = 0;
 +      return -1;
 +    }
 +    bit = rar_br_bits(br, 1);
 +    rar_br_consume(br, 1);
 +
 +    if (code->tree[node].branches[bit] < 0)
 +    {
 +      archive_set_error(&a->archive, ARCHIVE_ERRNO_FILE_FORMAT,
 +                        "Invalid prefix code in bitstream");
 +      return -1;
 +    }
 +    node = code->tree[node].branches[bit];
 +  }
 +
 +  return code->tree[node].branches[0];
 +}
 +
 +static int
 +create_code(struct archive_read *a, struct huffman_code *code,
 +            unsigned char *lengths, int numsymbols, char maxlength)
 +{
 +  int i, j, codebits = 0, symbolsleft = numsymbols;
 +
 +  code->numentries = 0;
 +  code->numallocatedentries = 0;
 +  if (new_node(code) < 0) {
 +    archive_set_error(&a->archive, ENOMEM,
 +                      "Unable to allocate memory for node data.");
 +    return (ARCHIVE_FATAL);
 +  }
 +  code->numentries = 1;
 +  code->minlength = INT_MAX;
 +  code->maxlength = INT_MIN;
 +  codebits = 0;
 +  for(i = 1; i <= maxlength; i++)
 +  {
 +    for(j = 0; j < numsymbols; j++)
 +    {
 +      if (lengths[j] != i) continue;
 +      if (add_value(a, code, j, codebits, i) != ARCHIVE_OK)
 +        return (ARCHIVE_FATAL);
 +      codebits++;
 +      if (--symbolsleft <= 0) { break; break; }
 +    }
 +    codebits <<= 1;
 +  }
 +  return (ARCHIVE_OK);
 +}
 +
 +static int
 +add_value(struct archive_read *a, struct huffman_code *code, int value,
 +          int codebits, int length)
 +{
 +  int repeatpos, lastnode, bitpos, bit, repeatnode, nextnode;
 +
 +  free(code->table);
 +  code->table = NULL;
 +
 +  if(length > code->maxlength)
 +    code->maxlength = length;
 +  if(length < code->minlength)
 +    code->minlength = length;
 +
 +  repeatpos = -1;
 +  if (repeatpos == 0 || (repeatpos >= 0
 +    && (((codebits >> (repeatpos - 1)) & 3) == 0
 +    || ((codebits >> (repeatpos - 1)) & 3) == 3)))
 +  {
 +    archive_set_error(&a->archive, ARCHIVE_ERRNO_FILE_FORMAT,
 +                      "Invalid repeat position");
 +    return (ARCHIVE_FATAL);
 +  }
 +
 +  lastnode = 0;
 +  for (bitpos = length - 1; bitpos >= 0; bitpos--)
 +  {
 +    bit = (codebits >> bitpos) & 1;
 +
 +    /* Leaf node check */
 +    if (code->tree[lastnode].branches[0] ==
 +      code->tree[lastnode].branches[1])
 +    {
 +      archive_set_error(&a->archive, ARCHIVE_ERRNO_FILE_FORMAT,
 +                        "Prefix found");
 +      return (ARCHIVE_FATAL);
 +    }
 +
 +    if (bitpos == repeatpos)
 +    {
 +      /* Open branch check */
 +      if (!(code->tree[lastnode].branches[bit] < 0))
 +      {
 +        archive_set_error(&a->archive, ARCHIVE_ERRNO_FILE_FORMAT,
 +                          "Invalid repeating code");
 +        return (ARCHIVE_FATAL);
 +      }
 +
 +      if ((repeatnode = new_node(code)) < 0) {
 +        archive_set_error(&a->archive, ENOMEM,
 +                          "Unable to allocate memory for node data.");
 +        return (ARCHIVE_FATAL);
 +      }
 +      if ((nextnode = new_node(code)) < 0) {
 +        archive_set_error(&a->archive, ENOMEM,
 +                          "Unable to allocate memory for node data.");
 +        return (ARCHIVE_FATAL);
 +      }
 +
 +      /* Set branches */
 +      code->tree[lastnode].branches[bit] = repeatnode;
 +      code->tree[repeatnode].branches[bit] = repeatnode;
 +      code->tree[repeatnode].branches[bit^1] = nextnode;
 +      lastnode = nextnode;
 +
 +      bitpos++; /* terminating bit already handled, skip it */
 +    }
 +    else
 +    {
 +      /* Open branch check */
 +      if (code->tree[lastnode].branches[bit] < 0)
 +      {
 +        if (new_node(code) < 0) {
 +          archive_set_error(&a->archive, ENOMEM,
 +                            "Unable to allocate memory for node data.");
 +          return (ARCHIVE_FATAL);
 +        }
 +        code->tree[lastnode].branches[bit] = code->numentries++;
 +      }
 +
 +      /* set to branch */
 +      lastnode = code->tree[lastnode].branches[bit];
 +    }
 +  }
 +
 +  if (!(code->tree[lastnode].branches[0] == -1
 +    && code->tree[lastnode].branches[1] == -2))
 +  {
 +    archive_set_error(&a->archive, ARCHIVE_ERRNO_FILE_FORMAT,
 +                      "Prefix found");
 +    return (ARCHIVE_FATAL);
 +  }
 +
 +  /* Set leaf value */
 +  code->tree[lastnode].branches[0] = value;
 +  code->tree[lastnode].branches[1] = value;
 +
 +  return (ARCHIVE_OK);
 +}
 +
 +static int
 +new_node(struct huffman_code *code)
 +{
 +  void *new_tree;
 +  if (code->numallocatedentries == code->numentries) {
 +    int new_num_entries = 256;
 +    if (code->numentries > 0) {
 +        new_num_entries = code->numentries * 2;
 +    }
 +    new_tree = realloc(code->tree, new_num_entries * sizeof(*code->tree));
 +    if (new_tree == NULL)
 +        return (-1);
 +    code->tree = (struct huffman_tree_node *)new_tree;
 +    code->numallocatedentries = new_num_entries;
 +  }
 +  code->tree[code->numentries].branches[0] = -1;
 +  code->tree[code->numentries].branches[1] = -2;
 +  return 1;
 +}
 +
 +static int
 +make_table(struct archive_read *a, struct huffman_code *code)
 +{
 +  if (code->maxlength < code->minlength || code->maxlength > 10)
 +    code->tablesize = 10;
 +  else
 +    code->tablesize = code->maxlength;
 +
 +  code->table =
 +    (struct huffman_table_entry *)calloc(1, sizeof(*code->table)
 +    * ((size_t)1 << code->tablesize));
 +
 +  return make_table_recurse(a, code, 0, code->table, 0, code->tablesize);
 +}
 +
 +static int
 +make_table_recurse(struct archive_read *a, struct huffman_code *code, int node,
 +                   struct huffman_table_entry *table, int depth,
 +                   int maxdepth)
 +{
 +  int currtablesize, i, ret = (ARCHIVE_OK);
 +
 +  if (!code->tree)
 +  {
 +    archive_set_error(&a->archive, ARCHIVE_ERRNO_FILE_FORMAT,
 +                      "Huffman tree was not created.");
 +    return (ARCHIVE_FATAL);
 +  }
 +  if (node < 0 || node >= code->numentries)
 +  {
 +    archive_set_error(&a->archive, ARCHIVE_ERRNO_FILE_FORMAT,
 +                      "Invalid location to Huffman tree specified.");
 +    return (ARCHIVE_FATAL);
 +  }
 +
 +  currtablesize = 1 << (maxdepth - depth);
 +
 +  if (code->tree[node].branches[0] ==
 +    code->tree[node].branches[1])
 +  {
 +    for(i = 0; i < currtablesize; i++)
 +    {
 +      table[i].length = depth;
 +      table[i].value = code->tree[node].branches[0];
 +    }
 +  }
 +  else if (node < 0)
 +  {
 +    for(i = 0; i < currtablesize; i++)
 +      table[i].length = -1;
 +  }
 +  else
 +  {
 +    if(depth == maxdepth)
 +    {
 +      table[0].length = maxdepth + 1;
 +      table[0].value = node;
 +    }
 +    else
 +    {
 +      ret |= make_table_recurse(a, code, code->tree[node].branches[0], table,
 +                                depth + 1, maxdepth);
 +      ret |= make_table_recurse(a, code, code->tree[node].branches[1],
 +                         table + currtablesize / 2, depth + 1, maxdepth);
 +    }
 +  }
 +  return ret;
 +}
 +
 +static int64_t
 +expand(struct archive_read *a, int64_t end)
 +{
 +  static const unsigned char lengthbases[] =
 +    {   0,   1,   2,   3,   4,   5,   6,
 +        7,   8,  10,  12,  14,  16,  20,
 +       24,  28,  32,  40,  48,  56,  64,
 +       80,  96, 112, 128, 160, 192, 224 };
 +  static const unsigned char lengthbits[] =
 +    { 0, 0, 0, 0, 0, 0, 0,
 +      0, 1, 1, 1, 1, 2, 2,
 +      2, 2, 3, 3, 3, 3, 4,
 +      4, 4, 4, 5, 5, 5, 5 };
 +  static const unsigned int offsetbases[] =
 +    {       0,       1,       2,       3,       4,       6,
 +            8,      12,      16,      24,      32,      48,
 +           64,      96,     128,     192,     256,     384,
 +          512,     768,    1024,    1536,    2048,    3072,
 +         4096,    6144,    8192,   12288,   16384,   24576,
 +        32768,   49152,   65536,   98304,  131072,  196608,
 +       262144,  327680,  393216,  458752,  524288,  589824,
 +       655360,  720896,  786432,  851968,  917504,  983040,
 +      1048576, 1310720, 1572864, 1835008, 2097152, 2359296,
 +      2621440, 2883584, 3145728, 3407872, 3670016, 3932160 };
 +  static const unsigned char offsetbits[] =
 +    {  0,  0,  0,  0,  1,  1,  2,  2,  3,  3,  4,  4,
 +       5,  5,  6,  6,  7,  7,  8,  8,  9,  9, 10, 10,
 +      11, 11, 12, 12, 13, 13, 14, 14, 15, 15, 16, 16,
 +      16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16,
 +      18, 18, 18, 18, 18, 18, 18, 18, 18, 18, 18, 18 };
 +  static const unsigned char shortbases[] =
 +    { 0, 4, 8, 16, 32, 64, 128, 192 };
 +  static const unsigned char shortbits[] =
 +    { 2, 2, 3, 4, 5, 6, 6, 6 };
 +
 +  int symbol, offs, len, offsindex, lensymbol, i, offssymbol, lowoffsetsymbol;
 +  unsigned char newfile;
 +  struct rar *rar = (struct rar *)(a->format->data);
 +  struct rar_br *br = &(rar->br);
 +
 +  if (rar->filterstart < end)
 +    end = rar->filterstart;
 +
 +  while (1)
 +  {
 +    if (rar->output_last_match &&
 +      lzss_position(&rar->lzss) + rar->lastlength <= end)
 +    {
 +      lzss_emit_match(rar, rar->lastoffset, rar->lastlength);
 +      rar->output_last_match = 0;
 +    }
 +
 +    if(rar->is_ppmd_block || rar->output_last_match ||
 +      lzss_position(&rar->lzss) >= end)
 +      return lzss_position(&rar->lzss);
 +
 +    if ((symbol = read_next_symbol(a, &rar->maincode)) < 0)
 +      return (ARCHIVE_FATAL);
 +    rar->output_last_match = 0;
 +
 +    if (symbol < 256)
 +    {
 +      lzss_emit_literal(rar, symbol);
 +      continue;
 +    }
 +    else if (symbol == 256)
 +    {
 +      if (!rar_br_read_ahead(a, br, 1))
 +        goto truncated_data;
 +      newfile = !rar_br_bits(br, 1);
 +      rar_br_consume(br, 1);
 +
 +      if(newfile)
 +      {
 +        rar->start_new_block = 1;
 +        if (!rar_br_read_ahead(a, br, 1))
 +          goto truncated_data;
 +        rar->start_new_table = rar_br_bits(br, 1);
 +        rar_br_consume(br, 1);
 +        return lzss_position(&rar->lzss);
 +      }
 +      else
 +      {
 +        if (parse_codes(a) != ARCHIVE_OK)
 +          return (ARCHIVE_FATAL);
 +        continue;
 +      }
 +    }
 +    else if(symbol==257)
 +    {
 +      archive_set_error(&a->archive, ARCHIVE_ERRNO_MISC,
 +                        "Parsing filters is unsupported.");
 +      return (ARCHIVE_FAILED);
 +    }
 +    else if(symbol==258)
 +    {
 +      if(rar->lastlength == 0)
 +        continue;
 +
 +      offs = rar->lastoffset;
 +      len = rar->lastlength;
 +    }
 +    else if (symbol <= 262)
 +    {
 +      offsindex = symbol - 259;
 +      offs = rar->oldoffset[offsindex];
 +
 +      if ((lensymbol = read_next_symbol(a, &rar->lengthcode)) < 0)
 +        goto bad_data;
 +      if (lensymbol > (int)(sizeof(lengthbases)/sizeof(lengthbases[0])))
 +        goto bad_data;
 +      if (lensymbol > (int)(sizeof(lengthbits)/sizeof(lengthbits[0])))
 +        goto bad_data;
 +      len = lengthbases[lensymbol] + 2;
 +      if (lengthbits[lensymbol] > 0) {
 +        if (!rar_br_read_ahead(a, br, lengthbits[lensymbol]))
 +          goto truncated_data;
 +        len += rar_br_bits(br, lengthbits[lensymbol]);
 +        rar_br_consume(br, lengthbits[lensymbol]);
 +      }
 +
 +      for (i = offsindex; i > 0; i--)
 +        rar->oldoffset[i] = rar->oldoffset[i-1];
 +      rar->oldoffset[0] = offs;
 +    }
 +    else if(symbol<=270)
 +    {
 +      offs = shortbases[symbol-263] + 1;
 +      if(shortbits[symbol-263] > 0) {
 +        if (!rar_br_read_ahead(a, br, shortbits[symbol-263]))
 +          goto truncated_data;
 +        offs += rar_br_bits(br, shortbits[symbol-263]);
 +        rar_br_consume(br, shortbits[symbol-263]);
 +      }
 +
 +      len = 2;
 +
 +      for(i = 3; i > 0; i--)
 +        rar->oldoffset[i] = rar->oldoffset[i-1];
 +      rar->oldoffset[0] = offs;
 +    }
 +    else
 +    {
 +      if (symbol-271 > (int)(sizeof(lengthbases)/sizeof(lengthbases[0])))
 +        goto bad_data;
 +      if (symbol-271 > (int)(sizeof(lengthbits)/sizeof(lengthbits[0])))
 +        goto bad_data;
 +      len = lengthbases[symbol-271]+3;
 +      if(lengthbits[symbol-271] > 0) {
 +        if (!rar_br_read_ahead(a, br, lengthbits[symbol-271]))
 +          goto truncated_data;
 +        len += rar_br_bits(br, lengthbits[symbol-271]);
 +        rar_br_consume(br, lengthbits[symbol-271]);
 +      }
 +
 +      if ((offssymbol = read_next_symbol(a, &rar->offsetcode)) < 0)
 +        goto bad_data;
 +      if (offssymbol > (int)(sizeof(offsetbases)/sizeof(offsetbases[0])))
 +        goto bad_data;
 +      if (offssymbol > (int)(sizeof(offsetbits)/sizeof(offsetbits[0])))
 +        goto bad_data;
 +      offs = offsetbases[offssymbol]+1;
 +      if(offsetbits[offssymbol] > 0)
 +      {
 +        if(offssymbol > 9)
 +        {
 +          if(offsetbits[offssymbol] > 4) {
 +            if (!rar_br_read_ahead(a, br, offsetbits[offssymbol] - 4))
 +              goto truncated_data;
 +            offs += rar_br_bits(br, offsetbits[offssymbol] - 4) << 4;
 +            rar_br_consume(br, offsetbits[offssymbol] - 4);
 +	  }
 +
 +          if(rar->numlowoffsetrepeats > 0)
 +          {
 +            rar->numlowoffsetrepeats--;
 +            offs += rar->lastlowoffset;
 +          }
 +          else
 +          {
 +            if ((lowoffsetsymbol =
 +              read_next_symbol(a, &rar->lowoffsetcode)) < 0)
 +              return (ARCHIVE_FATAL);
 +            if(lowoffsetsymbol == 16)
 +            {
 +              rar->numlowoffsetrepeats = 15;
 +              offs += rar->lastlowoffset;
 +            }
 +            else
 +            {
 +              offs += lowoffsetsymbol;
 +              rar->lastlowoffset = lowoffsetsymbol;
 +            }
 +          }
 +        }
 +        else {
 +          if (!rar_br_read_ahead(a, br, offsetbits[offssymbol]))
 +            goto truncated_data;
 +          offs += rar_br_bits(br, offsetbits[offssymbol]);
 +          rar_br_consume(br, offsetbits[offssymbol]);
 +        }
 +      }
 +
 +      if (offs >= 0x40000)
 +        len++;
 +      if (offs >= 0x2000)
 +        len++;
 +
 +      for(i = 3; i > 0; i--)
 +        rar->oldoffset[i] = rar->oldoffset[i-1];
 +      rar->oldoffset[0] = offs;
 +    }
 +
 +    rar->lastoffset = offs;
 +    rar->lastlength = len;
 +    rar->output_last_match = 1;
 +  }
 +truncated_data:
 +  archive_set_error(&a->archive, ARCHIVE_ERRNO_FILE_FORMAT,
 +                    "Truncated RAR file data");
 +  rar->valid = 0;
 +  return (ARCHIVE_FATAL);
 +bad_data:
 +  archive_set_error(&a->archive, ARCHIVE_ERRNO_FILE_FORMAT,
 +                    "Bad RAR file data");
 +  return (ARCHIVE_FATAL);
 +}
 +
 +static int
 +copy_from_lzss_window(struct archive_read *a, const void **buffer,
 +                        int64_t startpos, int length)
 +{
 +  int windowoffs, firstpart;
 +  struct rar *rar = (struct rar *)(a->format->data);
 +
 +  if (!rar->unp_buffer)
 +  {
 +    if ((rar->unp_buffer = malloc(rar->unp_buffer_size)) == NULL)
 +    {
 +      archive_set_error(&a->archive, ENOMEM,
 +                        "Unable to allocate memory for uncompressed data.");
 +      return (ARCHIVE_FATAL);
 +    }
 +  }
 +
 +  windowoffs = lzss_offset_for_position(&rar->lzss, startpos);
 +  if(windowoffs + length <= lzss_size(&rar->lzss)) {
 +    memcpy(&rar->unp_buffer[rar->unp_offset], &rar->lzss.window[windowoffs],
 +           length);
 +  } else if (length <= lzss_size(&rar->lzss)) {
 +    firstpart = lzss_size(&rar->lzss) - windowoffs;
 +    if (firstpart < 0) {
 +      archive_set_error(&a->archive, ARCHIVE_ERRNO_FILE_FORMAT,
 +                        "Bad RAR file data");
 +      return (ARCHIVE_FATAL);
 +    }
 +    if (firstpart < length) {
 +      memcpy(&rar->unp_buffer[rar->unp_offset],
 +             &rar->lzss.window[windowoffs], firstpart);
 +      memcpy(&rar->unp_buffer[rar->unp_offset + firstpart],
 +             &rar->lzss.window[0], length - firstpart);
 +    } else {
 +      memcpy(&rar->unp_buffer[rar->unp_offset],
 +             &rar->lzss.window[windowoffs], length);
 +    }
 +  } else {
 +      archive_set_error(&a->archive, ARCHIVE_ERRNO_FILE_FORMAT,
 +                        "Bad RAR file data");
 +      return (ARCHIVE_FATAL);
 +  }
 +  rar->unp_offset += length;
 +  if (rar->unp_offset >= rar->unp_buffer_size)
 +    *buffer = rar->unp_buffer;
 +  else
 +    *buffer = NULL;
 +  return (ARCHIVE_OK);
 +}
 +
 +static const void *
 +rar_read_ahead(struct archive_read *a, size_t min, ssize_t *avail)
 +{
 +  struct rar *rar = (struct rar *)(a->format->data);
 +  const void *h = __archive_read_ahead(a, min, avail);
 +  int ret;
 +  if (avail)
 +  {
 +    if (a->archive.read_data_is_posix_read && *avail > (ssize_t)a->archive.read_data_requested)
 +      *avail = a->archive.read_data_requested;
 +    if (*avail > rar->bytes_remaining)
 +      *avail = (ssize_t)rar->bytes_remaining;
 +    if (*avail < 0)
 +      return NULL;
 +    else if (*avail == 0 && rar->main_flags & MHD_VOLUME &&
 +      rar->file_flags & FHD_SPLIT_AFTER)
 +    {
 +      ret = archive_read_format_rar_read_header(a, a->entry);
 +      if (ret == (ARCHIVE_EOF))
 +      {
 +        rar->has_endarc_header = 1;
 +        ret = archive_read_format_rar_read_header(a, a->entry);
 +      }
 +      if (ret != (ARCHIVE_OK))
 +        return NULL;
 +      return rar_read_ahead(a, min, avail);
 +    }
 +  }
 +  return h;
 +}
diff --cc Utilities/cmlibarchive/libarchive/archive_read_support_format_xar.c
index ec623c6,0000000..eeac1c8
mode 100644,000000..100644
--- a/Utilities/cmlibarchive/libarchive/archive_read_support_format_xar.c
+++ b/Utilities/cmlibarchive/libarchive/archive_read_support_format_xar.c
@@@ -1,3340 -1,0 +1,3287 @@@
 +/*-
 + * Copyright (c) 2009 Michihiro NAKAJIMA
 + * All rights reserved.
 + *
 + * Redistribution and use in source and binary forms, with or without
 + * modification, are permitted provided that the following conditions
 + * are met:
 + * 1. Redistributions of source code must retain the above copyright
 + *    notice, this list of conditions and the following disclaimer.
 + * 2. Redistributions in binary form must reproduce the above copyright
 + *    notice, this list of conditions and the following disclaimer in the
 + *    documentation and/or other materials provided with the distribution.
 + *
 + * THIS SOFTWARE IS PROVIDED BY THE AUTHOR(S) ``AS IS'' AND ANY EXPRESS OR
 + * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
 + * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
 + * IN NO EVENT SHALL THE AUTHOR(S) BE LIABLE FOR ANY DIRECT, INDIRECT,
 + * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
 + * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
 + * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
 + * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
 + * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
 + * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
 + */
 +#include "archive_platform.h"
 +__FBSDID("$FreeBSD$");
 +
 +#ifdef HAVE_ERRNO_H
 +#include <errno.h>
 +#endif
 +#ifdef HAVE_STDLIB_H
 +#include <stdlib.h>
 +#endif
 +#if HAVE_LIBXML_XMLREADER_H
 +#include <libxml/xmlreader.h>
 +#elif HAVE_BSDXML_H
 +#include <bsdxml.h>
 +#elif HAVE_EXPAT_H
 +#include <expat.h>
 +#endif
 +#ifdef HAVE_BZLIB_H
 +#include <cm_bzlib.h>
 +#endif
 +#if HAVE_LZMA_H
 +#include <cm_lzma.h>
- #elif HAVE_LZMADEC_H
- #include <lzmadec.h>
 +#endif
 +#ifdef HAVE_ZLIB_H
 +#include <cm_zlib.h>
 +#endif
 +
 +#include "archive.h"
 +#include "archive_digest_private.h"
 +#include "archive_endian.h"
 +#include "archive_entry.h"
 +#include "archive_entry_locale.h"
 +#include "archive_private.h"
 +#include "archive_read_private.h"
 +
 +#if (!defined(HAVE_LIBXML_XMLREADER_H) && \
 +     !defined(HAVE_BSDXML_H) && !defined(HAVE_EXPAT_H)) ||\
 +	!defined(HAVE_ZLIB_H) || \
 +	!defined(ARCHIVE_HAS_MD5) || !defined(ARCHIVE_HAS_SHA1)
 +/*
 + * xar needs several external libraries.
 + *   o libxml2 or expat --- XML parser
 + *   o openssl or MD5/SHA1 hash function
 + *   o zlib
 + *   o bzlib2 (option)
 + *   o liblzma (option)
 + */
 +int
 +archive_read_support_format_xar(struct archive *_a)
 +{
 +	struct archive_read *a = (struct archive_read *)_a;
 +	archive_check_magic(_a, ARCHIVE_READ_MAGIC,
 +	    ARCHIVE_STATE_NEW, "archive_read_support_format_xar");
 +
 +	archive_set_error(&a->archive, ARCHIVE_ERRNO_MISC,
 +	    "Xar not supported on this platform");
 +	return (ARCHIVE_WARN);
 +}
 +
 +#else	/* Support xar format */
 +
 +/* #define DEBUG 1 */
 +/* #define DEBUG_PRINT_TOC 1 */
 +#if DEBUG_PRINT_TOC
 +#define PRINT_TOC(d, outbytes)	do {				\
 +	unsigned char *x = (unsigned char *)(uintptr_t)d;	\
 +	unsigned char c = x[outbytes-1];			\
 +	x[outbytes - 1] = 0;					\
 +	fprintf(stderr, "%s", x);				\
 +	fprintf(stderr, "%c", c);				\
 +	x[outbytes - 1] = c;					\
 +} while (0)
 +#else
 +#define PRINT_TOC(d, outbytes)
 +#endif
 +
 +#define HEADER_MAGIC	0x78617221
 +#define HEADER_SIZE	28
 +#define HEADER_VERSION	1
 +#define CKSUM_NONE	0
 +#define CKSUM_SHA1	1
 +#define CKSUM_MD5	2
 +
 +#define MD5_SIZE	16
 +#define SHA1_SIZE	20
 +#define MAX_SUM_SIZE	20
 +
 +enum enctype {
 +	NONE,
 +	GZIP,
 +	BZIP2,
 +	LZMA,
 +	XZ,
 +};
 +
 +struct chksumval {
 +	int			 alg;
 +	size_t			 len;
 +	unsigned char		 val[MAX_SUM_SIZE];
 +};
 +
 +struct chksumwork {
 +	int			 alg;
 +#ifdef ARCHIVE_HAS_MD5
 +	archive_md5_ctx		 md5ctx;
 +#endif
 +#ifdef ARCHIVE_HAS_SHA1
 +	archive_sha1_ctx	 sha1ctx;
 +#endif
 +};
 +
 +struct xattr {
 +	struct xattr		*next;
 +	struct archive_string	 name;
 +	uint64_t		 id;
 +	uint64_t		 length;
 +	uint64_t		 offset;
 +	uint64_t		 size;
 +	enum enctype		 encoding;
 +	struct chksumval	 a_sum;
 +	struct chksumval	 e_sum;
 +	struct archive_string	 fstype;
 +};
 +
 +struct xar_file {
 +	struct xar_file		*next;
 +	struct xar_file		*hdnext;
 +	struct xar_file		*parent;
 +	int			 subdirs;
 +
 +	unsigned int		 has;
 +#define HAS_DATA		0x00001
 +#define HAS_PATHNAME		0x00002
 +#define HAS_SYMLINK		0x00004
 +#define HAS_TIME		0x00008
 +#define HAS_UID			0x00010
 +#define HAS_GID			0x00020
 +#define HAS_MODE		0x00040
 +#define HAS_TYPE		0x00080
 +#define HAS_DEV			0x00100
 +#define HAS_DEVMAJOR		0x00200
 +#define HAS_DEVMINOR		0x00400
 +#define HAS_INO			0x00800
 +#define HAS_FFLAGS		0x01000
 +#define HAS_XATTR		0x02000
 +#define HAS_ACL			0x04000
 +
 +	uint64_t		 id;
 +	uint64_t		 length;
 +	uint64_t		 offset;
 +	uint64_t		 size;
 +	enum enctype		 encoding;
 +	struct chksumval	 a_sum;
 +	struct chksumval	 e_sum;
 +	struct archive_string	 pathname;
 +	struct archive_string	 symlink;
 +	time_t			 ctime;
 +	time_t			 mtime;
 +	time_t			 atime;
 +	struct archive_string	 uname;
 +	int64_t			 uid;
 +	struct archive_string	 gname;
 +	int64_t			 gid;
 +	mode_t			 mode;
 +	dev_t			 dev;
 +	dev_t			 devmajor;
 +	dev_t			 devminor;
 +	int64_t			 ino64;
 +	struct archive_string	 fflags_text;
 +	unsigned int		 link;
 +	unsigned int		 nlink;
 +	struct archive_string	 hardlink;
 +	struct xattr		*xattr_list;
 +};
 +
 +struct hdlink {
 +	struct hdlink		 *next;
 +
 +	unsigned int		 id;
 +	int			 cnt;
 +	struct xar_file		 *files;
 +};
 +
 +struct heap_queue {
 +	struct xar_file		**files;
 +	int			 allocated;
 +	int			 used;
 +};
 +
 +enum xmlstatus {
 +	INIT,
 +	XAR,
 +	TOC,
 +	TOC_CREATION_TIME,
 +	TOC_CHECKSUM,
 +	TOC_CHECKSUM_OFFSET,
 +	TOC_CHECKSUM_SIZE,
 +	TOC_FILE,
 +	FILE_DATA,
 +	FILE_DATA_LENGTH,
 +	FILE_DATA_OFFSET,
 +	FILE_DATA_SIZE,
 +	FILE_DATA_ENCODING,
 +	FILE_DATA_A_CHECKSUM,
 +	FILE_DATA_E_CHECKSUM,
 +	FILE_DATA_CONTENT,
 +	FILE_EA,
 +	FILE_EA_LENGTH,
 +	FILE_EA_OFFSET,
 +	FILE_EA_SIZE,
 +	FILE_EA_ENCODING,
 +	FILE_EA_A_CHECKSUM,
 +	FILE_EA_E_CHECKSUM,
 +	FILE_EA_NAME,
 +	FILE_EA_FSTYPE,
 +	FILE_CTIME,
 +	FILE_MTIME,
 +	FILE_ATIME,
 +	FILE_GROUP,
 +	FILE_GID,
 +	FILE_USER,
 +	FILE_UID,
 +	FILE_MODE,
 +	FILE_DEVICE,
 +	FILE_DEVICE_MAJOR,
 +	FILE_DEVICE_MINOR,
 +	FILE_DEVICENO,
 +	FILE_INODE,
 +	FILE_LINK,
 +	FILE_TYPE,
 +	FILE_NAME,
 +	FILE_ACL,
 +	FILE_ACL_DEFAULT,
 +	FILE_ACL_ACCESS,
 +	FILE_ACL_APPLEEXTENDED,
 +	/* BSD file flags. */
 +	FILE_FLAGS,
 +	FILE_FLAGS_USER_NODUMP,
 +	FILE_FLAGS_USER_IMMUTABLE,
 +	FILE_FLAGS_USER_APPEND,
 +	FILE_FLAGS_USER_OPAQUE,
 +	FILE_FLAGS_USER_NOUNLINK,
 +	FILE_FLAGS_SYS_ARCHIVED,
 +	FILE_FLAGS_SYS_IMMUTABLE,
 +	FILE_FLAGS_SYS_APPEND,
 +	FILE_FLAGS_SYS_NOUNLINK,
 +	FILE_FLAGS_SYS_SNAPSHOT,
 +	/* Linux file flags. */
 +	FILE_EXT2,
 +	FILE_EXT2_SecureDeletion,
 +	FILE_EXT2_Undelete,
 +	FILE_EXT2_Compress,
 +	FILE_EXT2_Synchronous,
 +	FILE_EXT2_Immutable,
 +	FILE_EXT2_AppendOnly,
 +	FILE_EXT2_NoDump,
 +	FILE_EXT2_NoAtime,
 +	FILE_EXT2_CompDirty,
 +	FILE_EXT2_CompBlock,
 +	FILE_EXT2_NoCompBlock,
 +	FILE_EXT2_CompError,
 +	FILE_EXT2_BTree,
 +	FILE_EXT2_HashIndexed,
 +	FILE_EXT2_iMagic,
 +	FILE_EXT2_Journaled,
 +	FILE_EXT2_NoTail,
 +	FILE_EXT2_DirSync,
 +	FILE_EXT2_TopDir,
 +	FILE_EXT2_Reserved,
 +	UNKNOWN,
 +};
 +
 +struct unknown_tag {
 +	struct unknown_tag	*next;
 +	struct archive_string	 name;
 +};
 +
 +struct xar {
 +	uint64_t		 offset; /* Current position in the file. */
 +	int64_t			 total;
 +	uint64_t		 h_base;
 +	int			 end_of_file;
 +#define OUTBUFF_SIZE	(1024 * 64)
 +	unsigned char		*outbuff;
 +
 +	enum xmlstatus		 xmlsts;
 +	enum xmlstatus		 xmlsts_unknown;
 +	struct unknown_tag	*unknowntags;
 +	int			 base64text;
 +
 +	/*
 +	 * TOC
 +	 */
 +	uint64_t		 toc_remaining;
 +	uint64_t		 toc_total;
 +	uint64_t		 toc_chksum_offset;
 +	uint64_t		 toc_chksum_size;
 +
 +	/*
 +	 * For Decoding data.
 +	 */
 +	enum enctype 		 rd_encoding;
 +	z_stream		 stream;
 +	int			 stream_valid;
 +#if defined(HAVE_BZLIB_H) && defined(BZ_CONFIG_ERROR)
 +	bz_stream		 bzstream;
 +	int			 bzstream_valid;
 +#endif
 +#if HAVE_LZMA_H && HAVE_LIBLZMA
 +	lzma_stream		 lzstream;
 +	int			 lzstream_valid;
- #elif HAVE_LZMADEC_H && HAVE_LIBLZMADEC
- 	lzmadec_stream		 lzstream;
- 	int			 lzstream_valid;
 +#endif
 +	/*
 +	 * For Checksum data.
 +	 */
 +	struct chksumwork	 a_sumwrk;
 +	struct chksumwork	 e_sumwrk;
 +
 +	struct xar_file		*file;	/* current reading file. */
 +	struct xattr		*xattr; /* current reading extended attribute. */
 +	struct heap_queue	 file_queue;
 +	struct xar_file		*hdlink_orgs;
 +	struct hdlink		*hdlink_list;
 +
 +	int	 		 entry_init;
 +	uint64_t		 entry_total;
 +	uint64_t		 entry_remaining;
 +	size_t			 entry_unconsumed;
 +	uint64_t		 entry_size;
 +	enum enctype 		 entry_encoding;
 +	struct chksumval	 entry_a_sum;
 +	struct chksumval	 entry_e_sum;
 +
 +	struct archive_string_conv *sconv;
 +};
 +
 +struct xmlattr {
 +	struct xmlattr	*next;
 +	char		*name;
 +	char		*value;
 +};
 +
 +struct xmlattr_list {
 +	struct xmlattr	*first;
 +	struct xmlattr	**last;
 +};
 +
 +static int	xar_bid(struct archive_read *, int);
 +static int	xar_read_header(struct archive_read *,
 +		    struct archive_entry *);
 +static int	xar_read_data(struct archive_read *,
 +		    const void **, size_t *, int64_t *);
 +static int	xar_read_data_skip(struct archive_read *);
 +static int	xar_cleanup(struct archive_read *);
 +static int	move_reading_point(struct archive_read *, uint64_t);
 +static int	rd_contents_init(struct archive_read *,
 +		    enum enctype, int, int);
 +static int	rd_contents(struct archive_read *, const void **,
 +		    size_t *, size_t *, uint64_t);
 +static uint64_t	atol10(const char *, size_t);
 +static int64_t	atol8(const char *, size_t);
 +static size_t	atohex(unsigned char *, size_t, const char *, size_t);
 +static time_t	parse_time(const char *p, size_t n);
 +static int	heap_add_entry(struct archive_read *a,
 +    struct heap_queue *, struct xar_file *);
 +static struct xar_file *heap_get_entry(struct heap_queue *);
 +static int	add_link(struct archive_read *,
 +    struct xar *, struct xar_file *);
 +static void	checksum_init(struct archive_read *, int, int);
 +static void	checksum_update(struct archive_read *, const void *,
 +		    size_t, const void *, size_t);
 +static int	checksum_final(struct archive_read *, const void *,
 +		    size_t, const void *, size_t);
++static void	checksum_cleanup(struct archive_read *);
 +static int	decompression_init(struct archive_read *, enum enctype);
 +static int	decompress(struct archive_read *, const void **,
 +		    size_t *, const void *, size_t *);
 +static int	decompression_cleanup(struct archive_read *);
 +static void	xmlattr_cleanup(struct xmlattr_list *);
 +static int	file_new(struct archive_read *,
 +    struct xar *, struct xmlattr_list *);
 +static void	file_free(struct xar_file *);
 +static int	xattr_new(struct archive_read *,
 +    struct xar *, struct xmlattr_list *);
 +static void	xattr_free(struct xattr *);
 +static int	getencoding(struct xmlattr_list *);
 +static int	getsumalgorithm(struct xmlattr_list *);
 +static int	unknowntag_start(struct archive_read *,
 +    struct xar *, const char *);
 +static void	unknowntag_end(struct xar *, const char *);
 +static int	xml_start(struct archive_read *,
 +    const char *, struct xmlattr_list *);
 +static void	xml_end(void *, const char *);
 +static void	xml_data(void *, const char *, int);
 +static int	xml_parse_file_flags(struct xar *, const char *);
 +static int	xml_parse_file_ext2(struct xar *, const char *);
 +#if defined(HAVE_LIBXML_XMLREADER_H)
 +static int	xml2_xmlattr_setup(struct archive_read *,
 +    struct xmlattr_list *, xmlTextReaderPtr);
 +static int	xml2_read_cb(void *, char *, int);
 +static int	xml2_close_cb(void *);
 +static void	xml2_error_hdr(void *, const char *, xmlParserSeverities,
 +		    xmlTextReaderLocatorPtr);
 +static int	xml2_read_toc(struct archive_read *);
 +#elif defined(HAVE_BSDXML_H) || defined(HAVE_EXPAT_H)
 +struct expat_userData {
 +	int state;
 +	struct archive_read *archive;
 +};
 +static int	expat_xmlattr_setup(struct archive_read *,
 +    struct xmlattr_list *, const XML_Char **);
 +static void	expat_start_cb(void *, const XML_Char *, const XML_Char **);
 +static void	expat_end_cb(void *, const XML_Char *);
 +static void	expat_data_cb(void *, const XML_Char *, int);
 +static int	expat_read_toc(struct archive_read *);
 +#endif
 +
 +int
 +archive_read_support_format_xar(struct archive *_a)
 +{
 +	struct xar *xar;
 +	struct archive_read *a = (struct archive_read *)_a;
 +	int r;
 +
 +	archive_check_magic(_a, ARCHIVE_READ_MAGIC,
 +	    ARCHIVE_STATE_NEW, "archive_read_support_format_xar");
 +
 +	xar = (struct xar *)calloc(1, sizeof(*xar));
 +	if (xar == NULL) {
 +		archive_set_error(&a->archive, ENOMEM,
 +		    "Can't allocate xar data");
 +		return (ARCHIVE_FATAL);
 +	}
 +
 +	r = __archive_read_register_format(a,
 +	    xar,
 +	    "xar",
 +	    xar_bid,
 +	    NULL,
 +	    xar_read_header,
 +	    xar_read_data,
 +	    xar_read_data_skip,
 +	    NULL,
 +	    xar_cleanup,
 +	    NULL,
 +	    NULL);
 +	if (r != ARCHIVE_OK)
 +		free(xar);
 +	return (r);
 +}
 +
 +static int
 +xar_bid(struct archive_read *a, int best_bid)
 +{
 +	const unsigned char *b;
 +	int bid;
 +
 +	(void)best_bid; /* UNUSED */
 +
 +	b = __archive_read_ahead(a, HEADER_SIZE, NULL);
 +	if (b == NULL)
 +		return (-1);
 +
 +	bid = 0;
 +	/*
 +	 * Verify magic code
 +	 */
 +	if (archive_be32dec(b) != HEADER_MAGIC)
 +		return (0);
 +	bid += 32;
 +	/*
 +	 * Verify header size
 +	 */
 +	if (archive_be16dec(b+4) != HEADER_SIZE)
 +		return (0);
 +	bid += 16;
 +	/*
 +	 * Verify header version
 +	 */
 +	if (archive_be16dec(b+6) != HEADER_VERSION)
 +		return (0);
 +	bid += 16;
 +	/*
 +	 * Verify type of checksum
 +	 */
 +	switch (archive_be32dec(b+24)) {
 +	case CKSUM_NONE:
 +	case CKSUM_SHA1:
 +	case CKSUM_MD5:
 +		bid += 32;
 +		break;
 +	default:
 +		return (0);
 +	}
 +
 +	return (bid);
 +}
 +
 +static int
 +read_toc(struct archive_read *a)
 +{
 +	struct xar *xar;
 +	struct xar_file *file;
 +	const unsigned char *b;
 +	uint64_t toc_compressed_size;
 +	uint64_t toc_uncompressed_size;
 +	uint32_t toc_chksum_alg;
 +	ssize_t bytes;
 +	int r;
 +
 +	xar = (struct xar *)(a->format->data);
 +
 +	/*
 +	 * Read xar header.
 +	 */
 +	b = __archive_read_ahead(a, HEADER_SIZE, &bytes);
 +	if (bytes < 0)
 +		return ((int)bytes);
 +	if (bytes < HEADER_SIZE) {
 +		archive_set_error(&a->archive,
 +		    ARCHIVE_ERRNO_FILE_FORMAT,
 +		    "Truncated archive header");
 +		return (ARCHIVE_FATAL);
 +	}
 +
 +	if (archive_be32dec(b) != HEADER_MAGIC) {
 +		archive_set_error(&a->archive,
 +		    ARCHIVE_ERRNO_FILE_FORMAT,
 +		    "Invalid header magic");
 +		return (ARCHIVE_FATAL);
 +	}
 +	if (archive_be16dec(b+6) != HEADER_VERSION) {
 +		archive_set_error(&a->archive,
 +		    ARCHIVE_ERRNO_FILE_FORMAT,
 +		    "Unsupported header version(%d)",
 +		    archive_be16dec(b+6));
 +		return (ARCHIVE_FATAL);
 +	}
 +	toc_compressed_size = archive_be64dec(b+8);
 +	xar->toc_remaining = toc_compressed_size;
 +	toc_uncompressed_size = archive_be64dec(b+16);
 +	toc_chksum_alg = archive_be32dec(b+24);
 +	__archive_read_consume(a, HEADER_SIZE);
 +	xar->offset += HEADER_SIZE;
 +	xar->toc_total = 0;
 +
 +	/*
 +	 * Read TOC(Table of Contents).
 +	 */
 +	/* Initialize reading contents. */
 +	r = move_reading_point(a, HEADER_SIZE);
 +	if (r != ARCHIVE_OK)
 +		return (r);
 +	r = rd_contents_init(a, GZIP, toc_chksum_alg, CKSUM_NONE);
 +	if (r != ARCHIVE_OK)
 +		return (r);
 +
 +#ifdef HAVE_LIBXML_XMLREADER_H
 +	r = xml2_read_toc(a);
 +#elif defined(HAVE_BSDXML_H) || defined(HAVE_EXPAT_H)
 +	r = expat_read_toc(a);
 +#endif
 +	if (r != ARCHIVE_OK)
 +		return (r);
 +
 +	/* Set 'The HEAP' base. */
 +	xar->h_base = xar->offset;
 +	if (xar->toc_total != toc_uncompressed_size) {
 +		archive_set_error(&a->archive, ARCHIVE_ERRNO_MISC,
 +		    "TOC uncompressed size error");
 +		return (ARCHIVE_FATAL);
 +	}
 +
 +	/*
 +	 * Checksum TOC
 +	 */
 +	if (toc_chksum_alg != CKSUM_NONE) {
 +		r = move_reading_point(a, xar->toc_chksum_offset);
 +		if (r != ARCHIVE_OK)
 +			return (r);
 +		b = __archive_read_ahead(a,
 +			(size_t)xar->toc_chksum_size, &bytes);
 +		if (bytes < 0)
 +			return ((int)bytes);
 +		if ((uint64_t)bytes < xar->toc_chksum_size) {
 +			archive_set_error(&a->archive,
 +			    ARCHIVE_ERRNO_FILE_FORMAT,
 +			    "Truncated archive file");
 +			return (ARCHIVE_FATAL);
 +		}
 +		r = checksum_final(a, b,
 +			(size_t)xar->toc_chksum_size, NULL, 0);
 +		__archive_read_consume(a, xar->toc_chksum_size);
 +		xar->offset += xar->toc_chksum_size;
 +		if (r != ARCHIVE_OK)
 +			return (ARCHIVE_FATAL);
 +	}
 +
 +	/*
 +	 * Connect hardlinked files.
 +	 */
 +	for (file = xar->hdlink_orgs; file != NULL; file = file->hdnext) {
 +		struct hdlink **hdlink;
 +
 +		for (hdlink = &(xar->hdlink_list); *hdlink != NULL;
 +		    hdlink = &((*hdlink)->next)) {
 +			if ((*hdlink)->id == file->id) {
 +				struct hdlink *hltmp;
 +				struct xar_file *f2;
 +				int nlink = (*hdlink)->cnt + 1;
 +
 +				file->nlink = nlink;
 +				for (f2 = (*hdlink)->files; f2 != NULL;
 +				    f2 = f2->hdnext) {
 +					f2->nlink = nlink;
 +					archive_string_copy(
 +					    &(f2->hardlink), &(file->pathname));
 +				}
 +				/* Remove resolved files from hdlist_list. */
 +				hltmp = *hdlink;
 +				*hdlink = hltmp->next;
 +				free(hltmp);
 +				break;
 +			}
 +		}
 +	}
 +	a->archive.archive_format = ARCHIVE_FORMAT_XAR;
 +	a->archive.archive_format_name = "xar";
 +
 +	return (ARCHIVE_OK);
 +}
 +
 +static int
 +xar_read_header(struct archive_read *a, struct archive_entry *entry)
 +{
 +	struct xar *xar;
 +	struct xar_file *file;
 +	struct xattr *xattr;
 +	int r;
 +
 +	xar = (struct xar *)(a->format->data);
 +	r = ARCHIVE_OK;
 +
 +	if (xar->offset == 0) {
 +		/* Create a character conversion object. */
 +		if (xar->sconv == NULL) {
 +			xar->sconv = archive_string_conversion_from_charset(
 +			    &(a->archive), "UTF-8", 1);
 +			if (xar->sconv == NULL)
 +				return (ARCHIVE_FATAL);
 +		}
 +
 +		/* Read TOC. */
 +		r = read_toc(a);
 +		if (r != ARCHIVE_OK)
 +			return (r);
 +	}
 +
 +	for (;;) {
 +		file = xar->file = heap_get_entry(&(xar->file_queue));
 +		if (file == NULL) {
 +			xar->end_of_file = 1;
 +			return (ARCHIVE_EOF);
 +		}
 +		if ((file->mode & AE_IFMT) != AE_IFDIR)
 +			break;
 +		if (file->has != (HAS_PATHNAME | HAS_TYPE))
 +			break;
 +		/*
 +		 * If a file type is a directory and it does not have
 +		 * any metadata, do not export.
 +		 */
 +		file_free(file);
 +	}
 +	archive_entry_set_atime(entry, file->atime, 0);
 +	archive_entry_set_ctime(entry, file->ctime, 0);
 +	archive_entry_set_mtime(entry, file->mtime, 0);
 +	archive_entry_set_gid(entry, file->gid);
 +	if (file->gname.length > 0 &&
 +	    archive_entry_copy_gname_l(entry, file->gname.s,
 +		archive_strlen(&(file->gname)), xar->sconv) != 0) {
 +		if (errno == ENOMEM) {
 +			archive_set_error(&a->archive, ENOMEM,
 +			    "Can't allocate memory for Gname");
 +			return (ARCHIVE_FATAL);
 +		}
 +		archive_set_error(&a->archive,
 +		    ARCHIVE_ERRNO_FILE_FORMAT,
 +		    "Gname cannot be converted from %s to current locale.",
 +		    archive_string_conversion_charset_name(xar->sconv));
 +		r = ARCHIVE_WARN;
 +	}
 +	archive_entry_set_uid(entry, file->uid);
 +	if (file->uname.length > 0 &&
 +	    archive_entry_copy_uname_l(entry, file->uname.s,
 +		archive_strlen(&(file->uname)), xar->sconv) != 0) {
 +		if (errno == ENOMEM) {
 +			archive_set_error(&a->archive, ENOMEM,
 +			    "Can't allocate memory for Uname");
 +			return (ARCHIVE_FATAL);
 +		}
 +		archive_set_error(&a->archive,
 +		    ARCHIVE_ERRNO_FILE_FORMAT,
 +		    "Uname cannot be converted from %s to current locale.",
 +		    archive_string_conversion_charset_name(xar->sconv));
 +		r = ARCHIVE_WARN;
 +	}
 +	archive_entry_set_mode(entry, file->mode);
 +	if (archive_entry_copy_pathname_l(entry, file->pathname.s,
 +	    archive_strlen(&(file->pathname)), xar->sconv) != 0) {
 +		if (errno == ENOMEM) {
 +			archive_set_error(&a->archive, ENOMEM,
 +			    "Can't allocate memory for Pathname");
 +			return (ARCHIVE_FATAL);
 +		}
 +		archive_set_error(&a->archive,
 +		    ARCHIVE_ERRNO_FILE_FORMAT,
 +		    "Pathname cannot be converted from %s to current locale.",
 +		    archive_string_conversion_charset_name(xar->sconv));
 +		r = ARCHIVE_WARN;
 +	}
 +
 +
 +	if (file->symlink.length > 0 &&
 +	    archive_entry_copy_symlink_l(entry, file->symlink.s,
 +		archive_strlen(&(file->symlink)), xar->sconv) != 0) {
 +		if (errno == ENOMEM) {
 +			archive_set_error(&a->archive, ENOMEM,
 +			    "Can't allocate memory for Linkname");
 +			return (ARCHIVE_FATAL);
 +		}
 +		archive_set_error(&a->archive,
 +		    ARCHIVE_ERRNO_FILE_FORMAT,
 +		    "Linkname cannot be converted from %s to current locale.",
 +		    archive_string_conversion_charset_name(xar->sconv));
 +		r = ARCHIVE_WARN;
 +	}
 +	/* Set proper nlink. */
 +	if ((file->mode & AE_IFMT) == AE_IFDIR)
 +		archive_entry_set_nlink(entry, file->subdirs + 2);
 +	else
 +		archive_entry_set_nlink(entry, file->nlink);
 +	archive_entry_set_size(entry, file->size);
 +	if (archive_strlen(&(file->hardlink)) > 0)
 +		archive_entry_set_hardlink(entry, file->hardlink.s);
 +	archive_entry_set_ino64(entry, file->ino64);
 +	if (file->has & HAS_DEV)
 +		archive_entry_set_dev(entry, file->dev);
 +	if (file->has & HAS_DEVMAJOR)
 +		archive_entry_set_devmajor(entry, file->devmajor);
 +	if (file->has & HAS_DEVMINOR)
 +		archive_entry_set_devminor(entry, file->devminor);
 +	if (archive_strlen(&(file->fflags_text)) > 0)
 +		archive_entry_copy_fflags_text(entry, file->fflags_text.s);
 +
 +	xar->entry_init = 1;
 +	xar->entry_total = 0;
 +	xar->entry_remaining = file->length;
 +	xar->entry_size = file->size;
 +	xar->entry_encoding = file->encoding;
 +	xar->entry_a_sum = file->a_sum;
 +	xar->entry_e_sum = file->e_sum;
 +	/*
 +	 * Read extended attributes.
 +	 */
 +	xattr = file->xattr_list;
 +	while (xattr != NULL) {
 +		const void *d;
 +		size_t outbytes, used;
 +
 +		r = move_reading_point(a, xattr->offset);
 +		if (r != ARCHIVE_OK)
 +			break;
 +		r = rd_contents_init(a, xattr->encoding,
 +		    xattr->a_sum.alg, xattr->e_sum.alg);
 +		if (r != ARCHIVE_OK)
 +			break;
 +		d = NULL;
 +		r = rd_contents(a, &d, &outbytes, &used, xattr->length);
 +		if (r != ARCHIVE_OK)
 +			break;
 +		if (outbytes != xattr->size) {
 +			archive_set_error(&(a->archive), ARCHIVE_ERRNO_MISC,
 +			    "Decompressed size error");
 +			r = ARCHIVE_FATAL;
 +			break;
 +		}
 +		r = checksum_final(a,
 +		    xattr->a_sum.val, xattr->a_sum.len,
 +		    xattr->e_sum.val, xattr->e_sum.len);
 +		if (r != ARCHIVE_OK)
 +			break;
 +		archive_entry_xattr_add_entry(entry,
 +		    xattr->name.s, d, outbytes);
 +		xattr = xattr->next;
 +	}
 +	if (r != ARCHIVE_OK) {
 +		file_free(file);
 +		return (r);
 +	}
 +
 +	if (xar->entry_remaining > 0)
 +		/* Move reading point to the beginning of current
 +		 * file contents. */
 +		r = move_reading_point(a, file->offset);
 +	else
 +		r = ARCHIVE_OK;
 +
 +	file_free(file);
 +	return (r);
 +}
 +
 +static int
 +xar_read_data(struct archive_read *a,
 +    const void **buff, size_t *size, int64_t *offset)
 +{
 +	struct xar *xar;
 +	size_t used;
 +	int r;
 +
 +	xar = (struct xar *)(a->format->data);
 +
 +	if (xar->entry_unconsumed) {
 +		__archive_read_consume(a, xar->entry_unconsumed);
 +		xar->entry_unconsumed = 0;
 +	}
 +
 +	if (xar->end_of_file || xar->entry_remaining <= 0) {
 +		r = ARCHIVE_EOF;
 +		goto abort_read_data;
 +	}
 +
 +	if (xar->entry_init) {
 +		r = rd_contents_init(a, xar->entry_encoding,
 +		    xar->entry_a_sum.alg, xar->entry_e_sum.alg);
 +		if (r != ARCHIVE_OK) {
 +			xar->entry_remaining = 0;
 +			return (r);
 +		}
 +		xar->entry_init = 0;
 +	}
 +
 +	*buff = NULL;
 +	r = rd_contents(a, buff, size, &used, xar->entry_remaining);
 +	if (r != ARCHIVE_OK)
 +		goto abort_read_data;
 +
 +	*offset = xar->entry_total;
 +	xar->entry_total += *size;
 +	xar->total += *size;
 +	xar->offset += used;
 +	xar->entry_remaining -= used;
 +	xar->entry_unconsumed = used;
 +
 +	if (xar->entry_remaining == 0) {
 +		if (xar->entry_total != xar->entry_size) {
 +			archive_set_error(&(a->archive), ARCHIVE_ERRNO_MISC,
 +			    "Decompressed size error");
 +			r = ARCHIVE_FATAL;
 +			goto abort_read_data;
 +		}
 +		r = checksum_final(a,
 +		    xar->entry_a_sum.val, xar->entry_a_sum.len,
 +		    xar->entry_e_sum.val, xar->entry_e_sum.len);
 +		if (r != ARCHIVE_OK)
 +			goto abort_read_data;
 +	}
 +
 +	return (ARCHIVE_OK);
 +abort_read_data:
 +	*buff = NULL;
 +	*size = 0;
 +	*offset = xar->total;
 +	return (r);
 +}
 +
 +static int
 +xar_read_data_skip(struct archive_read *a)
 +{
 +	struct xar *xar;
 +	int64_t bytes_skipped;
 +
 +	xar = (struct xar *)(a->format->data);
 +	if (xar->end_of_file)
 +		return (ARCHIVE_EOF);
 +	bytes_skipped = __archive_read_consume(a, xar->entry_remaining +
 +		xar->entry_unconsumed);
 +	if (bytes_skipped < 0)
 +		return (ARCHIVE_FATAL);
 +	xar->offset += bytes_skipped;
 +	xar->entry_unconsumed = 0;
 +	return (ARCHIVE_OK);
 +}
 +
 +static int
 +xar_cleanup(struct archive_read *a)
 +{
 +	struct xar *xar;
 +	struct hdlink *hdlink;
 +	int i;
 +	int r;
 +
 +	xar = (struct xar *)(a->format->data);
++	checksum_cleanup(a);
 +	r = decompression_cleanup(a);
 +	hdlink = xar->hdlink_list;
 +	while (hdlink != NULL) {
 +		struct hdlink *next = hdlink->next;
 +
 +		free(hdlink);
 +		hdlink = next;
 +	}
 +	for (i = 0; i < xar->file_queue.used; i++)
 +		file_free(xar->file_queue.files[i]);
++	free(xar->file_queue.files);
 +	while (xar->unknowntags != NULL) {
 +		struct unknown_tag *tag;
 +
 +		tag = xar->unknowntags;
 +		xar->unknowntags = tag->next;
 +		archive_string_free(&(tag->name));
 +		free(tag);
 +	}
 +	free(xar->outbuff);
 +	free(xar);
 +	a->format->data = NULL;
 +	return (r);
 +}
 +
 +static int
 +move_reading_point(struct archive_read *a, uint64_t offset)
 +{
 +	struct xar *xar;
 +
 +	xar = (struct xar *)(a->format->data);
 +	if (xar->offset - xar->h_base != offset) {
 +		/* Seek forward to the start of file contents. */
 +		int64_t step;
 +
 +		step = offset - (xar->offset - xar->h_base);
 +		if (step > 0) {
 +			step = __archive_read_consume(a, step);
 +			if (step < 0)
 +				return ((int)step);
 +			xar->offset += step;
 +		} else {
 +			int64_t pos = __archive_read_seek(a, offset, SEEK_SET);
 +			if (pos == ARCHIVE_FAILED) {
 +				archive_set_error(&(a->archive),
 +				    ARCHIVE_ERRNO_MISC,
 +				    "Cannot seek.");
 +				return (ARCHIVE_FAILED);
 +			}
 +			xar->offset = pos;
 +		}
 +	}
 +	return (ARCHIVE_OK);
 +}
 +
 +static int
 +rd_contents_init(struct archive_read *a, enum enctype encoding,
 +    int a_sum_alg, int e_sum_alg)
 +{
 +	int r;
 +
 +	/* Init decompress library. */
 +	if ((r = decompression_init(a, encoding)) != ARCHIVE_OK)
 +		return (r);
 +	/* Init checksum library. */
 +	checksum_init(a, a_sum_alg, e_sum_alg);
 +	return (ARCHIVE_OK);
 +}
 +
 +static int
 +rd_contents(struct archive_read *a, const void **buff, size_t *size,
 +    size_t *used, uint64_t remaining)
 +{
 +	const unsigned char *b;
 +	ssize_t bytes;
 +
 +	/* Get whatever bytes are immediately available. */
 +	b = __archive_read_ahead(a, 1, &bytes);
 +	if (bytes < 0)
 +		return ((int)bytes);
 +	if (bytes == 0) {
 +		archive_set_error(&a->archive, ARCHIVE_ERRNO_MISC,
 +		    "Truncated archive file");
 +		return (ARCHIVE_FATAL);
 +	}
 +	if ((uint64_t)bytes > remaining)
 +		bytes = (ssize_t)remaining;
 +
 +	/*
 +	 * Decompress contents of file.
 +	 */
 +	*used = bytes;
 +	if (decompress(a, buff, size, b, used) != ARCHIVE_OK)
 +		return (ARCHIVE_FATAL);
 +
 +	/*
 +	 * Update checksum of a compressed data and a extracted data.
 +	 */
 +	checksum_update(a, b, *used, *buff, *size);
 +
 +	return (ARCHIVE_OK);
 +}
 +
 +/*
 + * Note that this implementation does not (and should not!) obey
 + * locale settings; you cannot simply substitute strtol here, since
 + * it does obey locale.
 + */
 +
 +static uint64_t
 +atol10(const char *p, size_t char_cnt)
 +{
 +	uint64_t l;
 +	int digit;
 +
 +	l = 0;
 +	digit = *p - '0';
 +	while (digit >= 0 && digit < 10  && char_cnt-- > 0) {
 +		l = (l * 10) + digit;
 +		digit = *++p - '0';
 +	}
 +	return (l);
 +}
 +
 +static int64_t
 +atol8(const char *p, size_t char_cnt)
 +{
 +	int64_t l;
 +	int digit;
 +        
 +	l = 0;
 +	while (char_cnt-- > 0) {
 +		if (*p >= '0' && *p <= '7')
 +			digit = *p - '0';
 +		else
 +			break;
 +		p++;
 +		l <<= 3;
 +		l |= digit;
 +	}
 +	return (l);
 +}
 +
 +static size_t
 +atohex(unsigned char *b, size_t bsize, const char *p, size_t psize)
 +{
 +	size_t fbsize = bsize;
 +
 +	while (bsize && psize > 1) {
 +		unsigned char x;
 +
 +		if (p[0] >= 'a' && p[0] <= 'z')
 +			x = (p[0] - 'a' + 0x0a) << 4;
 +		else if (p[0] >= 'A' && p[0] <= 'Z')
 +			x = (p[0] - 'A' + 0x0a) << 4;
 +		else if (p[0] >= '0' && p[0] <= '9')
 +			x = (p[0] - '0') << 4;
 +		else
 +			return (-1);
 +		if (p[1] >= 'a' && p[1] <= 'z')
 +			x |= p[1] - 'a' + 0x0a;
 +		else if (p[1] >= 'A' && p[1] <= 'Z')
 +			x |= p[1] - 'A' + 0x0a;
 +		else if (p[1] >= '0' && p[1] <= '9')
 +			x |= p[1] - '0';
 +		else
 +			return (-1);
 +		
 +		*b++ = x;
 +		bsize--;
 +		p += 2;
 +		psize -= 2;
 +	}
 +	return (fbsize - bsize);
 +}
 +
 +static time_t
 +time_from_tm(struct tm *t)
 +{
 +#if HAVE_TIMEGM
 +        /* Use platform timegm() if available. */
 +        return (timegm(t));
 +#elif HAVE__MKGMTIME64
 +        return (_mkgmtime64(t));
 +#else
 +        /* Else use direct calculation using POSIX assumptions. */
 +        /* First, fix up tm_yday based on the year/month/day. */
 +        mktime(t);
 +        /* Then we can compute timegm() from first principles. */
 +        return (t->tm_sec
 +            + t->tm_min * 60
 +            + t->tm_hour * 3600
 +            + t->tm_yday * 86400
 +            + (t->tm_year - 70) * 31536000
 +            + ((t->tm_year - 69) / 4) * 86400
 +            - ((t->tm_year - 1) / 100) * 86400
 +            + ((t->tm_year + 299) / 400) * 86400);
 +#endif
 +}
 +
 +static time_t
 +parse_time(const char *p, size_t n)
 +{
 +	struct tm tm;
 +	time_t t = 0;
 +	int64_t data;
 +
 +	memset(&tm, 0, sizeof(tm));
 +	if (n != 20)
 +		return (t);
 +	data = atol10(p, 4);
 +	if (data < 1900)
 +		return (t);
 +	tm.tm_year = (int)data - 1900;
 +	p += 4;
 +	if (*p++ != '-')
 +		return (t);
 +	data = atol10(p, 2);
 +	if (data < 1 || data > 12)
 +		return (t);
 +	tm.tm_mon = (int)data -1;
 +	p += 2;
 +	if (*p++ != '-')
 +		return (t);
 +	data = atol10(p, 2);
 +	if (data < 1 || data > 31)
 +		return (t);
 +	tm.tm_mday = (int)data;
 +	p += 2;
 +	if (*p++ != 'T')
 +		return (t);
 +	data = atol10(p, 2);
 +	if (data < 0 || data > 23)
 +		return (t);
 +	tm.tm_hour = (int)data;
 +	p += 2;
 +	if (*p++ != ':')
 +		return (t);
 +	data = atol10(p, 2);
 +	if (data < 0 || data > 59)
 +		return (t);
 +	tm.tm_min = (int)data;
 +	p += 2;
 +	if (*p++ != ':')
 +		return (t);
 +	data = atol10(p, 2);
 +	if (data < 0 || data > 60)
 +		return (t);
 +	tm.tm_sec = (int)data;
 +#if 0
 +	p += 2;
 +	if (*p != 'Z')
 +		return (t);
 +#endif
 +
 +	t = time_from_tm(&tm);
 +
 +	return (t);
 +}
 +
 +static int
 +heap_add_entry(struct archive_read *a,
 +    struct heap_queue *heap, struct xar_file *file)
 +{
 +	uint64_t file_id, parent_id;
 +	int hole, parent;
 +
 +	/* Expand our pending files list as necessary. */
 +	if (heap->used >= heap->allocated) {
 +		struct xar_file **new_pending_files;
 +		int new_size = heap->allocated * 2;
 +
 +		if (heap->allocated < 1024)
 +			new_size = 1024;
 +		/* Overflow might keep us from growing the list. */
 +		if (new_size <= heap->allocated) {
 +			archive_set_error(&a->archive,
 +			    ENOMEM, "Out of memory");
 +			return (ARCHIVE_FATAL);
 +		}
 +		new_pending_files = (struct xar_file **)
 +		    malloc(new_size * sizeof(new_pending_files[0]));
 +		if (new_pending_files == NULL) {
 +			archive_set_error(&a->archive,
 +			    ENOMEM, "Out of memory");
 +			return (ARCHIVE_FATAL);
 +		}
 +		memcpy(new_pending_files, heap->files,
 +		    heap->allocated * sizeof(new_pending_files[0]));
 +		if (heap->files != NULL)
 +			free(heap->files);
 +		heap->files = new_pending_files;
 +		heap->allocated = new_size;
 +	}
 +
 +	file_id = file->id;
 +
 +	/*
 +	 * Start with hole at end, walk it up tree to find insertion point.
 +	 */
 +	hole = heap->used++;
 +	while (hole > 0) {
 +		parent = (hole - 1)/2;
 +		parent_id = heap->files[parent]->id;
 +		if (file_id >= parent_id) {
 +			heap->files[hole] = file;
 +			return (ARCHIVE_OK);
 +		}
 +		/* Move parent into hole <==> move hole up tree. */
 +		heap->files[hole] = heap->files[parent];
 +		hole = parent;
 +	}
 +	heap->files[0] = file;
 +
 +	return (ARCHIVE_OK);
 +}
 +
 +static struct xar_file *
 +heap_get_entry(struct heap_queue *heap)
 +{
 +	uint64_t a_id, b_id, c_id;
 +	int a, b, c;
 +	struct xar_file *r, *tmp;
 +
 +	if (heap->used < 1)
 +		return (NULL);
 +
 +	/*
 +	 * The first file in the list is the earliest; we'll return this.
 +	 */
 +	r = heap->files[0];
 +
 +	/*
 +	 * Move the last item in the heap to the root of the tree
 +	 */
 +	heap->files[0] = heap->files[--(heap->used)];
 +
 +	/*
 +	 * Rebalance the heap.
 +	 */
 +	a = 0; /* Starting element and its heap key */
 +	a_id = heap->files[a]->id;
 +	for (;;) {
 +		b = a + a + 1; /* First child */
 +		if (b >= heap->used)
 +			return (r);
 +		b_id = heap->files[b]->id;
 +		c = b + 1; /* Use second child if it is smaller. */
 +		if (c < heap->used) {
 +			c_id = heap->files[c]->id;
 +			if (c_id < b_id) {
 +				b = c;
 +				b_id = c_id;
 +			}
 +		}
 +		if (a_id <= b_id)
 +			return (r);
 +		tmp = heap->files[a];
 +		heap->files[a] = heap->files[b];
 +		heap->files[b] = tmp;
 +		a = b;
 +	}
 +}
 +
 +static int
 +add_link(struct archive_read *a, struct xar *xar, struct xar_file *file)
 +{
 +	struct hdlink *hdlink;
 +
 +	for (hdlink = xar->hdlink_list; hdlink != NULL; hdlink = hdlink->next) {
 +		if (hdlink->id == file->link) {
 +			file->hdnext = hdlink->files;
 +			hdlink->cnt++;
 +			hdlink->files = file;
 +			return (ARCHIVE_OK);
 +		}
 +	}
 +	hdlink = malloc(sizeof(*hdlink));
 +	if (hdlink == NULL) {
 +		archive_set_error(&a->archive, ENOMEM, "Out of memory");
 +		return (ARCHIVE_FATAL);
 +	}
 +	file->hdnext = NULL;
 +	hdlink->id = file->link;
 +	hdlink->cnt = 1;
 +	hdlink->files = file;
 +	hdlink->next = xar->hdlink_list;
 +	xar->hdlink_list = hdlink;
 +	return (ARCHIVE_OK);
 +}
 +
 +static void
 +_checksum_init(struct chksumwork *sumwrk, int sum_alg)
 +{
 +	sumwrk->alg = sum_alg;
 +	switch (sum_alg) {
 +	case CKSUM_NONE:
 +		break;
 +	case CKSUM_SHA1:
 +		archive_sha1_init(&(sumwrk->sha1ctx));
 +		break;
 +	case CKSUM_MD5:
 +		archive_md5_init(&(sumwrk->md5ctx));
 +		break;
 +	}
 +}
 +
 +static void
 +_checksum_update(struct chksumwork *sumwrk, const void *buff, size_t size)
 +{
 +
 +	switch (sumwrk->alg) {
 +	case CKSUM_NONE:
 +		break;
 +	case CKSUM_SHA1:
 +		archive_sha1_update(&(sumwrk->sha1ctx), buff, size);
 +		break;
 +	case CKSUM_MD5:
 +		archive_md5_update(&(sumwrk->md5ctx), buff, size);
 +		break;
 +	}
 +}
 +
 +static int
 +_checksum_final(struct chksumwork *sumwrk, const void *val, size_t len)
 +{
 +	unsigned char sum[MAX_SUM_SIZE];
 +	int r = ARCHIVE_OK;
 +
 +	switch (sumwrk->alg) {
 +	case CKSUM_NONE:
 +		break;
 +	case CKSUM_SHA1:
 +		archive_sha1_final(&(sumwrk->sha1ctx), sum);
 +		if (len != SHA1_SIZE ||
 +		    memcmp(val, sum, SHA1_SIZE) != 0)
 +			r = ARCHIVE_FAILED;
 +		break;
 +	case CKSUM_MD5:
 +		archive_md5_final(&(sumwrk->md5ctx), sum);
 +		if (len != MD5_SIZE ||
 +		    memcmp(val, sum, MD5_SIZE) != 0)
 +			r = ARCHIVE_FAILED;
 +		break;
 +	}
 +	return (r);
 +}
 +
 +static void
 +checksum_init(struct archive_read *a, int a_sum_alg, int e_sum_alg)
 +{
 +	struct xar *xar;
 +
 +	xar = (struct xar *)(a->format->data);
 +	_checksum_init(&(xar->a_sumwrk), a_sum_alg);
 +	_checksum_init(&(xar->e_sumwrk), e_sum_alg);
 +}
 +
 +static void
 +checksum_update(struct archive_read *a, const void *abuff, size_t asize,
 +    const void *ebuff, size_t esize)
 +{
 +	struct xar *xar;
 +
 +	xar = (struct xar *)(a->format->data);
 +	_checksum_update(&(xar->a_sumwrk), abuff, asize);
 +	_checksum_update(&(xar->e_sumwrk), ebuff, esize);
 +}
 +
 +static int
 +checksum_final(struct archive_read *a, const void *a_sum_val,
 +    size_t a_sum_len, const void *e_sum_val, size_t e_sum_len)
 +{
 +	struct xar *xar;
 +	int r;
 +
 +	xar = (struct xar *)(a->format->data);
 +	r = _checksum_final(&(xar->a_sumwrk), a_sum_val, a_sum_len);
 +	if (r == ARCHIVE_OK)
 +		r = _checksum_final(&(xar->e_sumwrk), e_sum_val, e_sum_len);
 +	if (r != ARCHIVE_OK)
 +		archive_set_error(&(a->archive), ARCHIVE_ERRNO_MISC,
 +		    "Sumcheck error");
 +	return (r);
 +}
 +
 +static int
 +decompression_init(struct archive_read *a, enum enctype encoding)
 +{
 +	struct xar *xar;
 +	const char *detail;
 +	int r;
 +
 +	xar = (struct xar *)(a->format->data);
 +	xar->rd_encoding = encoding;
 +	switch (encoding) {
 +	case NONE:
 +		break;
 +	case GZIP:
 +		if (xar->stream_valid)
 +			r = inflateReset(&(xar->stream));
 +		else
 +			r = inflateInit(&(xar->stream));
 +		if (r != Z_OK) {
 +			archive_set_error(&a->archive, ARCHIVE_ERRNO_MISC,
 +			    "Couldn't initialize zlib stream.");
 +			return (ARCHIVE_FATAL);
 +		}
 +		xar->stream_valid = 1;
 +		xar->stream.total_in = 0;
 +		xar->stream.total_out = 0;
 +		break;
 +#if defined(HAVE_BZLIB_H) && defined(BZ_CONFIG_ERROR)
 +	case BZIP2:
 +		if (xar->bzstream_valid) {
 +			BZ2_bzDecompressEnd(&(xar->bzstream));
 +			xar->bzstream_valid = 0;
 +		}
 +		r = BZ2_bzDecompressInit(&(xar->bzstream), 0, 0);
 +		if (r == BZ_MEM_ERROR)
 +			r = BZ2_bzDecompressInit(&(xar->bzstream), 0, 1);
 +		if (r != BZ_OK) {
 +			int err = ARCHIVE_ERRNO_MISC;
 +			detail = NULL;
 +			switch (r) {
 +			case BZ_PARAM_ERROR:
 +				detail = "invalid setup parameter";
 +				break;
 +			case BZ_MEM_ERROR:
 +				err = ENOMEM;
 +				detail = "out of memory";
 +				break;
 +			case BZ_CONFIG_ERROR:
 +				detail = "mis-compiled library";
 +				break;
 +			}
 +			archive_set_error(&a->archive, err,
 +			    "Internal error initializing decompressor: %s",
 +			    detail == NULL ? "??" : detail);
 +			xar->bzstream_valid = 0;
 +			return (ARCHIVE_FATAL);
 +		}
 +		xar->bzstream_valid = 1;
 +		xar->bzstream.total_in_lo32 = 0;
 +		xar->bzstream.total_in_hi32 = 0;
 +		xar->bzstream.total_out_lo32 = 0;
 +		xar->bzstream.total_out_hi32 = 0;
 +		break;
 +#endif
 +#if defined(HAVE_LZMA_H) && defined(HAVE_LIBLZMA)
 +#if LZMA_VERSION_MAJOR >= 5
 +/* Effectively disable the limiter. */
 +#define LZMA_MEMLIMIT   UINT64_MAX
 +#else
 +/* NOTE: This needs to check memory size which running system has. */
 +#define LZMA_MEMLIMIT   (1U << 30)
 +#endif
 +	case XZ:
 +	case LZMA:
 +		if (xar->lzstream_valid) {
 +			lzma_end(&(xar->lzstream));
 +			xar->lzstream_valid = 0;
 +		}
 +		if (xar->entry_encoding == XZ)
 +			r = lzma_stream_decoder(&(xar->lzstream),
 +			    LZMA_MEMLIMIT,/* memlimit */
 +			    LZMA_CONCATENATED);
 +		else
 +			r = lzma_alone_decoder(&(xar->lzstream),
 +			    LZMA_MEMLIMIT);/* memlimit */
 +		if (r != LZMA_OK) {
 +			switch (r) {
 +			case LZMA_MEM_ERROR:
 +				archive_set_error(&a->archive,
 +				    ENOMEM,
 +				    "Internal error initializing "
 +				    "compression library: "
 +				    "Cannot allocate memory");
 +				break;
 +			case LZMA_OPTIONS_ERROR:
 +				archive_set_error(&a->archive,
 +				    ARCHIVE_ERRNO_MISC,
 +				    "Internal error initializing "
 +				    "compression library: "
 +				    "Invalid or unsupported options");
 +				break;
 +			default:
 +				archive_set_error(&a->archive,
 +				    ARCHIVE_ERRNO_MISC,
 +				    "Internal error initializing "
 +				    "lzma library");
 +				break;
 +			}
 +			return (ARCHIVE_FATAL);
 +		}
 +		xar->lzstream_valid = 1;
 +		xar->lzstream.total_in = 0;
 +		xar->lzstream.total_out = 0;
 +		break;
- #elif defined(HAVE_LZMADEC_H) && defined(HAVE_LIBLZMADEC)
- 	case LZMA:
- 		if (xar->lzstream_valid)
- 			lzmadec_end(&(xar->lzstream));
- 		r = lzmadec_init(&(xar->lzstream));
- 		if (r != LZMADEC_OK) {
- 			switch (r) {
- 			case LZMADEC_HEADER_ERROR:
- 				archive_set_error(&a->archive,
- 				    ARCHIVE_ERRNO_MISC,
- 				    "Internal error initializing "
- 				    "compression library: "
- 				    "invalid header");
- 				break;
- 			case LZMADEC_MEM_ERROR:
- 				archive_set_error(&a->archive,
- 				    ENOMEM,
- 				    "Internal error initializing "
- 				    "compression library: "
- 				    "out of memory");
- 				break;
- 			}
- 			return (ARCHIVE_FATAL);
- 		}
- 		xar->lzstream_valid = 1;
- 		xar->lzstream.total_in = 0;
- 		xar->lzstream.total_out = 0;
- 		break;
 +#endif
 +	/*
 +	 * Unsupported compression.
 +	 */
 +	default:
 +#if !defined(HAVE_BZLIB_H) || !defined(BZ_CONFIG_ERROR)
 +	case BZIP2:
 +#endif
 +#if !defined(HAVE_LZMA_H) || !defined(HAVE_LIBLZMA)
- #if !defined(HAVE_LZMADEC_H) || !defined(HAVE_LIBLZMADEC)
 +	case LZMA:
- #endif
 +	case XZ:
 +#endif
 +		switch (xar->entry_encoding) {
 +		case BZIP2: detail = "bzip2"; break;
 +		case LZMA: detail = "lzma"; break;
 +		case XZ: detail = "xz"; break;
 +		default: detail = "??"; break;
 +		}
 +		archive_set_error(&a->archive, ARCHIVE_ERRNO_MISC,
 +		    "%s compression not supported on this platform",
 +		    detail);
 +		return (ARCHIVE_FAILED);
 +	}
 +	return (ARCHIVE_OK);
 +}
 +
 +static int
 +decompress(struct archive_read *a, const void **buff, size_t *outbytes,
 +    const void *b, size_t *used)
 +{
 +	struct xar *xar;
 +	void *outbuff;
 +	size_t avail_in, avail_out;
 +	int r;
 +
 +	xar = (struct xar *)(a->format->data);
 +	avail_in = *used;
 +	outbuff = (void *)(uintptr_t)*buff;
 +	if (outbuff == NULL) {
 +		if (xar->outbuff == NULL) {
 +			xar->outbuff = malloc(OUTBUFF_SIZE);
 +			if (xar->outbuff == NULL) {
 +				archive_set_error(&a->archive, ENOMEM,
 +				    "Couldn't allocate memory for out buffer");
 +				return (ARCHIVE_FATAL);
 +			}
 +		}
 +		outbuff = xar->outbuff;
 +		*buff = outbuff;
 +		avail_out = OUTBUFF_SIZE;
 +	} else
 +		avail_out = *outbytes;
 +	switch (xar->rd_encoding) {
 +	case GZIP:
 +		xar->stream.next_in = (Bytef *)(uintptr_t)b;
 +		xar->stream.avail_in = avail_in;
 +		xar->stream.next_out = (unsigned char *)outbuff;
 +		xar->stream.avail_out = avail_out;
 +		r = inflate(&(xar->stream), 0);
 +		switch (r) {
 +		case Z_OK: /* Decompressor made some progress.*/
 +		case Z_STREAM_END: /* Found end of stream. */
 +			break;
 +		default:
 +			archive_set_error(&a->archive, ARCHIVE_ERRNO_MISC,
 +			    "File decompression failed (%d)", r);
 +			return (ARCHIVE_FATAL);
 +		}
 +		*used = avail_in - xar->stream.avail_in;
 +		*outbytes = avail_out - xar->stream.avail_out;
 +		break;
 +#if defined(HAVE_BZLIB_H) && defined(BZ_CONFIG_ERROR)
 +	case BZIP2:
 +		xar->bzstream.next_in = (char *)(uintptr_t)b;
 +		xar->bzstream.avail_in = avail_in;
 +		xar->bzstream.next_out = (char *)outbuff;
 +		xar->bzstream.avail_out = avail_out;
 +		r = BZ2_bzDecompress(&(xar->bzstream));
 +		switch (r) {
 +		case BZ_STREAM_END: /* Found end of stream. */
 +			switch (BZ2_bzDecompressEnd(&(xar->bzstream))) {
 +			case BZ_OK:
 +				break;
 +			default:
 +				archive_set_error(&(a->archive),
 +				    ARCHIVE_ERRNO_MISC,
 +				    "Failed to clean up decompressor");
 +				return (ARCHIVE_FATAL);
 +			}
 +			xar->bzstream_valid = 0;
 +			/* FALLTHROUGH */
 +		case BZ_OK: /* Decompressor made some progress. */
 +			break;
 +		default:
 +			archive_set_error(&(a->archive),
 +			    ARCHIVE_ERRNO_MISC,
 +			    "bzip decompression failed");
 +			return (ARCHIVE_FATAL);
 +		}
 +		*used = avail_in - xar->bzstream.avail_in;
 +		*outbytes = avail_out - xar->bzstream.avail_out;
 +		break;
 +#endif
 +#if defined(HAVE_LZMA_H) && defined(HAVE_LIBLZMA)
 +	case LZMA:
 +	case XZ:
 +		xar->lzstream.next_in = b;
 +		xar->lzstream.avail_in = avail_in;
 +		xar->lzstream.next_out = (unsigned char *)outbuff;
 +		xar->lzstream.avail_out = avail_out;
 +		r = lzma_code(&(xar->lzstream), LZMA_RUN);
 +		switch (r) {
 +		case LZMA_STREAM_END: /* Found end of stream. */
 +			lzma_end(&(xar->lzstream));
 +			xar->lzstream_valid = 0;
 +			/* FALLTHROUGH */
 +		case LZMA_OK: /* Decompressor made some progress. */
 +			break;
 +		default:
 +			archive_set_error(&(a->archive),
 +			    ARCHIVE_ERRNO_MISC,
 +			    "%s decompression failed(%d)",
 +			    (xar->entry_encoding == XZ)?"xz":"lzma",
 +			    r);
 +			return (ARCHIVE_FATAL);
 +		}
 +		*used = avail_in - xar->lzstream.avail_in;
 +		*outbytes = avail_out - xar->lzstream.avail_out;
 +		break;
- #elif defined(HAVE_LZMADEC_H) && defined(HAVE_LIBLZMADEC)
- 	case LZMA:
- 		xar->lzstream.next_in = (unsigned char *)(uintptr_t)b;
- 		xar->lzstream.avail_in = avail_in;
- 		xar->lzstream.next_out = (unsigned char *)outbuff;
- 		xar->lzstream.avail_out = avail_out;
- 		r = lzmadec_decode(&(xar->lzstream), 0);
- 		switch (r) {
- 		case LZMADEC_STREAM_END: /* Found end of stream. */
- 			switch (lzmadec_end(&(xar->lzstream))) {
- 			case LZMADEC_OK:
- 				break;
- 			default:
- 				archive_set_error(&(a->archive),
- 				    ARCHIVE_ERRNO_MISC,
- 				    "Failed to clean up lzmadec decompressor");
- 				return (ARCHIVE_FATAL);
- 			}
- 			xar->lzstream_valid = 0;
- 			/* FALLTHROUGH */
- 		case LZMADEC_OK: /* Decompressor made some progress. */
- 			break;
- 		default:
- 			archive_set_error(&(a->archive),
- 			    ARCHIVE_ERRNO_MISC,
- 			    "lzmadec decompression failed(%d)",
- 			    r);
- 			return (ARCHIVE_FATAL);
- 		}
- 		*used = avail_in - xar->lzstream.avail_in;
- 		*outbytes = avail_out - xar->lzstream.avail_out;
- 		break;
 +#endif
 +#if !defined(HAVE_BZLIB_H) || !defined(BZ_CONFIG_ERROR)
 +	case BZIP2:
 +#endif
 +#if !defined(HAVE_LZMA_H) || !defined(HAVE_LIBLZMA)
- #if !defined(HAVE_LZMADEC_H) || !defined(HAVE_LIBLZMADEC)
 +	case LZMA:
- #endif
 +	case XZ:
 +#endif
 +	case NONE:
 +	default:
 +		if (outbuff == xar->outbuff) {
 +			*buff = b;
 +			*used = avail_in;
 +			*outbytes = avail_in;
 +		} else {
 +			if (avail_out > avail_in)
 +				avail_out = avail_in;
 +			memcpy(outbuff, b, avail_out);
 +			*used = avail_out;
 +			*outbytes = avail_out;
 +		}
 +		break;
 +	}
 +	return (ARCHIVE_OK);
 +}
 +
 +static int
 +decompression_cleanup(struct archive_read *a)
 +{
 +	struct xar *xar;
 +	int r;
 +
 +	xar = (struct xar *)(a->format->data);
 +	r = ARCHIVE_OK;
 +	if (xar->stream_valid) {
 +		if (inflateEnd(&(xar->stream)) != Z_OK) {
 +			archive_set_error(&a->archive,
 +			    ARCHIVE_ERRNO_MISC,
 +			    "Failed to clean up zlib decompressor");
 +			r = ARCHIVE_FATAL;
 +		}
 +	}
 +#if defined(HAVE_BZLIB_H) && defined(BZ_CONFIG_ERROR)
 +	if (xar->bzstream_valid) {
 +		if (BZ2_bzDecompressEnd(&(xar->bzstream)) != BZ_OK) {
 +			archive_set_error(&a->archive,
 +			    ARCHIVE_ERRNO_MISC,
 +			    "Failed to clean up bzip2 decompressor");
 +			r = ARCHIVE_FATAL;
 +		}
 +	}
 +#endif
 +#if defined(HAVE_LZMA_H) && defined(HAVE_LIBLZMA)
 +	if (xar->lzstream_valid)
 +		lzma_end(&(xar->lzstream));
 +#elif defined(HAVE_LZMA_H) && defined(HAVE_LIBLZMA)
 +	if (xar->lzstream_valid) {
 +		if (lzmadec_end(&(xar->lzstream)) != LZMADEC_OK) {
 +			archive_set_error(&a->archive,
 +			    ARCHIVE_ERRNO_MISC,
 +			    "Failed to clean up lzmadec decompressor");
 +			r = ARCHIVE_FATAL;
 +		}
 +	}
 +#endif
 +	return (r);
 +}
 +
 +static void
++checksum_cleanup(struct archive_read *a) {
++	struct xar *xar;
++
++	xar = (struct xar *)(a->format->data);
++
++	_checksum_final(&(xar->a_sumwrk), NULL, 0);
++	_checksum_final(&(xar->e_sumwrk), NULL, 0);
++}
++
++static void
 +xmlattr_cleanup(struct xmlattr_list *list)
 +{
 +	struct xmlattr *attr, *next;
 +
 +	attr = list->first;
 +	while (attr != NULL) {
 +		next = attr->next;
 +		free(attr->name);
 +		free(attr->value);
 +		free(attr);
 +		attr = next;
 +	}
 +	list->first = NULL;
 +	list->last = &(list->first);
 +}
 +
 +static int
 +file_new(struct archive_read *a, struct xar *xar, struct xmlattr_list *list)
 +{
 +	struct xar_file *file;
 +	struct xmlattr *attr;
 +
 +	file = calloc(1, sizeof(*file));
 +	if (file == NULL) {
 +		archive_set_error(&a->archive, ENOMEM, "Out of memory");
 +		return (ARCHIVE_FATAL);
 +	}
 +	file->parent = xar->file;
 +	file->mode = 0777 | AE_IFREG;
 +	file->atime = time(NULL);
 +	file->mtime = time(NULL);
 +	xar->file = file;
 +	xar->xattr = NULL;
 +	for (attr = list->first; attr != NULL; attr = attr->next) {
 +		if (strcmp(attr->name, "id") == 0)
 +			file->id = atol10(attr->value, strlen(attr->value));
 +	}
 +	file->nlink = 1;
 +	if (heap_add_entry(a, &(xar->file_queue), file) != ARCHIVE_OK)
 +		return (ARCHIVE_FATAL);
 +	return (ARCHIVE_OK);
 +}
 +
 +static void
 +file_free(struct xar_file *file)
 +{
 +	struct xattr *xattr;
 +
 +	archive_string_free(&(file->pathname));
 +	archive_string_free(&(file->symlink));
 +	archive_string_free(&(file->uname));
 +	archive_string_free(&(file->gname));
 +	archive_string_free(&(file->hardlink));
 +	xattr = file->xattr_list;
 +	while (xattr != NULL) {
 +		struct xattr *next;
 +
 +		next = xattr->next;
 +		xattr_free(xattr);
 +		xattr = next;
 +	}
 +
 +	free(file);
 +}
 +
 +static int
 +xattr_new(struct archive_read *a, struct xar *xar, struct xmlattr_list *list)
 +{
 +	struct xattr *xattr, **nx;
 +	struct xmlattr *attr;
 +
 +	xattr = calloc(1, sizeof(*xattr));
 +	if (xattr == NULL) {
 +		archive_set_error(&a->archive, ENOMEM, "Out of memory");
 +		return (ARCHIVE_FATAL);
 +	}
 +	xar->xattr = xattr;
 +	for (attr = list->first; attr != NULL; attr = attr->next) {
 +		if (strcmp(attr->name, "id") == 0)
 +			xattr->id = atol10(attr->value, strlen(attr->value));
 +	}
 +	/* Chain to xattr list. */
 +	for (nx = &(xar->file->xattr_list);
 +	    *nx != NULL; nx = &((*nx)->next)) {
 +		if (xattr->id < (*nx)->id)
 +			break;
 +	}
 +	xattr->next = *nx;
 +	*nx = xattr;
 +
 +	return (ARCHIVE_OK);
 +}
 +
 +static void
 +xattr_free(struct xattr *xattr)
 +{
 +	archive_string_free(&(xattr->name));
 +	free(xattr);
 +}
 +
 +static int
 +getencoding(struct xmlattr_list *list)
 +{
 +	struct xmlattr *attr;
 +	enum enctype encoding = NONE;
 +
 +	for (attr = list->first; attr != NULL; attr = attr->next) {
 +		if (strcmp(attr->name, "style") == 0) {
 +			if (strcmp(attr->value, "application/octet-stream") == 0)
 +				encoding = NONE;
 +			else if (strcmp(attr->value, "application/x-gzip") == 0)
 +				encoding = GZIP;
 +			else if (strcmp(attr->value, "application/x-bzip2") == 0)
 +				encoding = BZIP2;
 +			else if (strcmp(attr->value, "application/x-lzma") == 0)
 +				encoding = LZMA;
 +			else if (strcmp(attr->value, "application/x-xz") == 0)
 +				encoding = XZ;
 +		}
 +	}
 +	return (encoding);
 +}
 +
 +static int
 +getsumalgorithm(struct xmlattr_list *list)
 +{
 +	struct xmlattr *attr;
 +	int alg = CKSUM_NONE;
 +
 +	for (attr = list->first; attr != NULL; attr = attr->next) {
 +		if (strcmp(attr->name, "style") == 0) {
 +			const char *v = attr->value;
 +			if ((v[0] == 'S' || v[0] == 's') &&
 +			    (v[1] == 'H' || v[1] == 'h') &&
 +			    (v[2] == 'A' || v[2] == 'a') &&
 +			    v[3] == '1' && v[4] == '\0')
 +				alg = CKSUM_SHA1;
 +			if ((v[0] == 'M' || v[0] == 'm') &&
 +			    (v[1] == 'D' || v[1] == 'd') &&
 +			    v[2] == '5' && v[3] == '\0')
 +				alg = CKSUM_MD5;
 +		}
 +	}
 +	return (alg);
 +}
 +
 +static int
 +unknowntag_start(struct archive_read *a, struct xar *xar, const char *name)
 +{
 +	struct unknown_tag *tag;
 +
 +	tag = malloc(sizeof(*tag));
 +	if (tag == NULL) {
 +		archive_set_error(&a->archive, ENOMEM, "Out of memory");
 +		return (ARCHIVE_FATAL);
 +	}
 +	tag->next = xar->unknowntags;
 +	archive_string_init(&(tag->name));
 +	archive_strcpy(&(tag->name), name);
 +	if (xar->unknowntags == NULL) {
 +#if DEBUG
 +		fprintf(stderr, "UNKNOWNTAG_START:%s\n", name);
 +#endif
 +		xar->xmlsts_unknown = xar->xmlsts;
 +		xar->xmlsts = UNKNOWN;
 +	}
 +	xar->unknowntags = tag;
 +	return (ARCHIVE_OK);
 +}
 +
 +static void
 +unknowntag_end(struct xar *xar, const char *name)
 +{
 +	struct unknown_tag *tag;
 +
 +	tag = xar->unknowntags;
 +	if (tag == NULL || name == NULL)
 +		return;
 +	if (strcmp(tag->name.s, name) == 0) {
 +		xar->unknowntags = tag->next;
 +		archive_string_free(&(tag->name));
 +		free(tag);
 +		if (xar->unknowntags == NULL) {
 +#if DEBUG
 +			fprintf(stderr, "UNKNOWNTAG_END:%s\n", name);
 +#endif
 +			xar->xmlsts = xar->xmlsts_unknown;
 +		}
 +	}
 +}
 +
 +static int
 +xml_start(struct archive_read *a, const char *name, struct xmlattr_list *list)
 +{
 +	struct xar *xar;
 +	struct xmlattr *attr;
 +
 +	xar = (struct xar *)(a->format->data);
 +
 +#if DEBUG
 +	fprintf(stderr, "xml_sta:[%s]\n", name);
 +	for (attr = list->first; attr != NULL; attr = attr->next)
 +		fprintf(stderr, "    attr:\"%s\"=\"%s\"\n",
 +		    attr->name, attr->value);
 +#endif
 +	xar->base64text = 0;
 +	switch (xar->xmlsts) {
 +	case INIT:
 +		if (strcmp(name, "xar") == 0)
 +			xar->xmlsts = XAR;
 +		else
 +			if (unknowntag_start(a, xar, name) != ARCHIVE_OK)
 +				return (ARCHIVE_FATAL);
 +		break;
 +	case XAR:
 +		if (strcmp(name, "toc") == 0)
 +			xar->xmlsts = TOC;
 +		else
 +			if (unknowntag_start(a, xar, name) != ARCHIVE_OK)
 +				return (ARCHIVE_FATAL);
 +		break;
 +	case TOC:
 +		if (strcmp(name, "creation-time") == 0)
 +			xar->xmlsts = TOC_CREATION_TIME;
 +		else if (strcmp(name, "checksum") == 0)
 +			xar->xmlsts = TOC_CHECKSUM;
 +		else if (strcmp(name, "file") == 0) {
 +			if (file_new(a, xar, list) != ARCHIVE_OK)
 +				return (ARCHIVE_FATAL);
 +			xar->xmlsts = TOC_FILE;
 +		}
 +		else
 +			if (unknowntag_start(a, xar, name) != ARCHIVE_OK)
 +				return (ARCHIVE_FATAL);
 +		break;
 +	case TOC_CHECKSUM:
 +		if (strcmp(name, "offset") == 0)
 +			xar->xmlsts = TOC_CHECKSUM_OFFSET;
 +		else if (strcmp(name, "size") == 0)
 +			xar->xmlsts = TOC_CHECKSUM_SIZE;
 +		else
 +			if (unknowntag_start(a, xar, name) != ARCHIVE_OK)
 +				return (ARCHIVE_FATAL);
 +		break;
 +	case TOC_FILE:
 +		if (strcmp(name, "file") == 0) {
 +			if (file_new(a, xar, list) != ARCHIVE_OK)
 +				return (ARCHIVE_FATAL);
 +		}
 +		else if (strcmp(name, "data") == 0)
 +			xar->xmlsts = FILE_DATA;
 +		else if (strcmp(name, "ea") == 0) {
 +			if (xattr_new(a, xar, list) != ARCHIVE_OK)
 +				return (ARCHIVE_FATAL);
 +			xar->xmlsts = FILE_EA;
 +		}
 +		else if (strcmp(name, "ctime") == 0)
 +			xar->xmlsts = FILE_CTIME;
 +		else if (strcmp(name, "mtime") == 0)
 +			xar->xmlsts = FILE_MTIME;
 +		else if (strcmp(name, "atime") == 0)
 +			xar->xmlsts = FILE_ATIME;
 +		else if (strcmp(name, "group") == 0)
 +			xar->xmlsts = FILE_GROUP;
 +		else if (strcmp(name, "gid") == 0)
 +			xar->xmlsts = FILE_GID;
 +		else if (strcmp(name, "user") == 0)
 +			xar->xmlsts = FILE_USER;
 +		else if (strcmp(name, "uid") == 0)
 +			xar->xmlsts = FILE_UID;
 +		else if (strcmp(name, "mode") == 0)
 +			xar->xmlsts = FILE_MODE;
 +		else if (strcmp(name, "device") == 0)
 +			xar->xmlsts = FILE_DEVICE;
 +		else if (strcmp(name, "deviceno") == 0)
 +			xar->xmlsts = FILE_DEVICENO;
 +		else if (strcmp(name, "inode") == 0)
 +			xar->xmlsts = FILE_INODE;
 +		else if (strcmp(name, "link") == 0)
 +			xar->xmlsts = FILE_LINK;
 +		else if (strcmp(name, "type") == 0) {
 +			xar->xmlsts = FILE_TYPE;
 +			for (attr = list->first; attr != NULL;
 +			    attr = attr->next) {
 +				if (strcmp(attr->name, "link") != 0)
 +					continue;
 +				if (strcmp(attr->value, "original") == 0) {
 +					xar->file->hdnext = xar->hdlink_orgs;
 +					xar->hdlink_orgs = xar->file;
 +				} else {
 +					xar->file->link = (unsigned)atol10(attr->value,
 +					    strlen(attr->value));
 +					if (xar->file->link > 0)
 +						if (add_link(a, xar, xar->file) != ARCHIVE_OK) {
 +							return (ARCHIVE_FATAL);
 +						};
 +				}
 +			}
 +		}
 +		else if (strcmp(name, "name") == 0) {
 +			xar->xmlsts = FILE_NAME;
 +			for (attr = list->first; attr != NULL;
 +			    attr = attr->next) {
 +				if (strcmp(attr->name, "enctype") == 0 &&
 +				    strcmp(attr->value, "base64") == 0)
 +					xar->base64text = 1;
 +			}
 +		}
 +		else if (strcmp(name, "acl") == 0)
 +			xar->xmlsts = FILE_ACL;
 +		else if (strcmp(name, "flags") == 0)
 +			xar->xmlsts = FILE_FLAGS;
 +		else if (strcmp(name, "ext2") == 0)
 +			xar->xmlsts = FILE_EXT2;
 +		else
 +			if (unknowntag_start(a, xar, name) != ARCHIVE_OK)
 +				return (ARCHIVE_FATAL);
 +		break;
 +	case FILE_DATA:
 +		if (strcmp(name, "length") == 0)
 +			xar->xmlsts = FILE_DATA_LENGTH;
 +		else if (strcmp(name, "offset") == 0)
 +			xar->xmlsts = FILE_DATA_OFFSET;
 +		else if (strcmp(name, "size") == 0)
 +			xar->xmlsts = FILE_DATA_SIZE;
 +		else if (strcmp(name, "encoding") == 0) {
 +			xar->xmlsts = FILE_DATA_ENCODING;
 +			xar->file->encoding = getencoding(list);
 +		}
 +		else if (strcmp(name, "archived-checksum") == 0) {
 +			xar->xmlsts = FILE_DATA_A_CHECKSUM;
 +			xar->file->a_sum.alg = getsumalgorithm(list);
 +		}
 +		else if (strcmp(name, "extracted-checksum") == 0) {
 +			xar->xmlsts = FILE_DATA_E_CHECKSUM;
 +			xar->file->e_sum.alg = getsumalgorithm(list);
 +		}
 +		else if (strcmp(name, "content") == 0)
 +			xar->xmlsts = FILE_DATA_CONTENT;
 +		else
 +			if (unknowntag_start(a, xar, name) != ARCHIVE_OK)
 +				return (ARCHIVE_FATAL);
 +		break;
 +	case FILE_DEVICE:
 +		if (strcmp(name, "major") == 0)
 +			xar->xmlsts = FILE_DEVICE_MAJOR;
 +		else if (strcmp(name, "minor") == 0)
 +			xar->xmlsts = FILE_DEVICE_MINOR;
 +		else
 +			if (unknowntag_start(a, xar, name) != ARCHIVE_OK)
 +				return (ARCHIVE_FATAL);
 +		break;
 +	case FILE_DATA_CONTENT:
 +		if (unknowntag_start(a, xar, name) != ARCHIVE_OK)
 +			return (ARCHIVE_FATAL);
 +		break;
 +	case FILE_EA:
 +		if (strcmp(name, "length") == 0)
 +			xar->xmlsts = FILE_EA_LENGTH;
 +		else if (strcmp(name, "offset") == 0)
 +			xar->xmlsts = FILE_EA_OFFSET;
 +		else if (strcmp(name, "size") == 0)
 +			xar->xmlsts = FILE_EA_SIZE;
 +		else if (strcmp(name, "encoding") == 0) {
 +			xar->xmlsts = FILE_EA_ENCODING;
 +			xar->xattr->encoding = getencoding(list);
 +		} else if (strcmp(name, "archived-checksum") == 0)
 +			xar->xmlsts = FILE_EA_A_CHECKSUM;
 +		else if (strcmp(name, "extracted-checksum") == 0)
 +			xar->xmlsts = FILE_EA_E_CHECKSUM;
 +		else if (strcmp(name, "name") == 0)
 +			xar->xmlsts = FILE_EA_NAME;
 +		else if (strcmp(name, "fstype") == 0)
 +			xar->xmlsts = FILE_EA_FSTYPE;
 +		else
 +			if (unknowntag_start(a, xar, name) != ARCHIVE_OK)
 +				return (ARCHIVE_FATAL);
 +		break;
 +	case FILE_ACL:
 +		if (strcmp(name, "appleextended") == 0)
 +			xar->xmlsts = FILE_ACL_APPLEEXTENDED;
 +		else if (strcmp(name, "default") == 0)
 +			xar->xmlsts = FILE_ACL_DEFAULT;
 +		else if (strcmp(name, "access") == 0)
 +			xar->xmlsts = FILE_ACL_ACCESS;
 +		else
 +			if (unknowntag_start(a, xar, name) != ARCHIVE_OK)
 +				return (ARCHIVE_FATAL);
 +		break;
 +	case FILE_FLAGS:
 +		if (!xml_parse_file_flags(xar, name))
 +			if (unknowntag_start(a, xar, name) != ARCHIVE_OK)
 +				return (ARCHIVE_FATAL);
 +		break;
 +	case FILE_EXT2:
 +		if (!xml_parse_file_ext2(xar, name))
 +			if (unknowntag_start(a, xar, name) != ARCHIVE_OK)
 +				return (ARCHIVE_FATAL);
 +		break;
 +	case TOC_CREATION_TIME:
 +	case TOC_CHECKSUM_OFFSET:
 +	case TOC_CHECKSUM_SIZE:
 +	case FILE_DATA_LENGTH:
 +	case FILE_DATA_OFFSET:
 +	case FILE_DATA_SIZE:
 +	case FILE_DATA_ENCODING:
 +	case FILE_DATA_A_CHECKSUM:
 +	case FILE_DATA_E_CHECKSUM:
 +	case FILE_EA_LENGTH:
 +	case FILE_EA_OFFSET:
 +	case FILE_EA_SIZE:
 +	case FILE_EA_ENCODING:
 +	case FILE_EA_A_CHECKSUM:
 +	case FILE_EA_E_CHECKSUM:
 +	case FILE_EA_NAME:
 +	case FILE_EA_FSTYPE:
 +	case FILE_CTIME:
 +	case FILE_MTIME:
 +	case FILE_ATIME:
 +	case FILE_GROUP:
 +	case FILE_GID:
 +	case FILE_USER:
 +	case FILE_UID:
 +	case FILE_INODE:
 +	case FILE_DEVICE_MAJOR:
 +	case FILE_DEVICE_MINOR:
 +	case FILE_DEVICENO:
 +	case FILE_MODE:
 +	case FILE_TYPE:
 +	case FILE_LINK:
 +	case FILE_NAME:
 +	case FILE_ACL_DEFAULT:
 +	case FILE_ACL_ACCESS:
 +	case FILE_ACL_APPLEEXTENDED:
 +	case FILE_FLAGS_USER_NODUMP:
 +	case FILE_FLAGS_USER_IMMUTABLE:
 +	case FILE_FLAGS_USER_APPEND:
 +	case FILE_FLAGS_USER_OPAQUE:
 +	case FILE_FLAGS_USER_NOUNLINK:
 +	case FILE_FLAGS_SYS_ARCHIVED:
 +	case FILE_FLAGS_SYS_IMMUTABLE:
 +	case FILE_FLAGS_SYS_APPEND:
 +	case FILE_FLAGS_SYS_NOUNLINK:
 +	case FILE_FLAGS_SYS_SNAPSHOT:
 +	case FILE_EXT2_SecureDeletion:
 +	case FILE_EXT2_Undelete:
 +	case FILE_EXT2_Compress:
 +	case FILE_EXT2_Synchronous:
 +	case FILE_EXT2_Immutable:
 +	case FILE_EXT2_AppendOnly:
 +	case FILE_EXT2_NoDump:
 +	case FILE_EXT2_NoAtime:
 +	case FILE_EXT2_CompDirty:
 +	case FILE_EXT2_CompBlock:
 +	case FILE_EXT2_NoCompBlock:
 +	case FILE_EXT2_CompError:
 +	case FILE_EXT2_BTree:
 +	case FILE_EXT2_HashIndexed:
 +	case FILE_EXT2_iMagic:
 +	case FILE_EXT2_Journaled:
 +	case FILE_EXT2_NoTail:
 +	case FILE_EXT2_DirSync:
 +	case FILE_EXT2_TopDir:
 +	case FILE_EXT2_Reserved:
 +	case UNKNOWN:
 +		if (unknowntag_start(a, xar, name) != ARCHIVE_OK)
 +			return (ARCHIVE_FATAL);
 +		break;
 +	}
 +	return (ARCHIVE_OK);
 +}
 +
 +static void
 +xml_end(void *userData, const char *name)
 +{
 +	struct archive_read *a;
 +	struct xar *xar;
 +
 +	a = (struct archive_read *)userData;
 +	xar = (struct xar *)(a->format->data);
 +
 +#if DEBUG
 +	fprintf(stderr, "xml_end:[%s]\n", name);
 +#endif
 +	switch (xar->xmlsts) {
 +	case INIT:
 +		break;
 +	case XAR:
 +		if (strcmp(name, "xar") == 0)
 +			xar->xmlsts = INIT;
 +		break;
 +	case TOC:
 +		if (strcmp(name, "toc") == 0)
 +			xar->xmlsts = XAR;
 +		break;
 +	case TOC_CREATION_TIME:
 +		if (strcmp(name, "creation-time") == 0)
 +			xar->xmlsts = TOC;
 +		break;
 +	case TOC_CHECKSUM:
 +		if (strcmp(name, "checksum") == 0)
 +			xar->xmlsts = TOC;
 +		break;
 +	case TOC_CHECKSUM_OFFSET:
 +		if (strcmp(name, "offset") == 0)
 +			xar->xmlsts = TOC_CHECKSUM;
 +		break;
 +	case TOC_CHECKSUM_SIZE:
 +		if (strcmp(name, "size") == 0)
 +			xar->xmlsts = TOC_CHECKSUM;
 +		break;
 +	case TOC_FILE:
 +		if (strcmp(name, "file") == 0) {
 +			if (xar->file->parent != NULL &&
 +			    ((xar->file->mode & AE_IFMT) == AE_IFDIR))
 +				xar->file->parent->subdirs++;
 +			xar->file = xar->file->parent;
 +			if (xar->file == NULL)
 +				xar->xmlsts = TOC;
 +		}
 +		break;
 +	case FILE_DATA:
 +		if (strcmp(name, "data") == 0)
 +			xar->xmlsts = TOC_FILE;
 +		break;
 +	case FILE_DATA_LENGTH:
 +		if (strcmp(name, "length") == 0)
 +			xar->xmlsts = FILE_DATA;
 +		break;
 +	case FILE_DATA_OFFSET:
 +		if (strcmp(name, "offset") == 0)
 +			xar->xmlsts = FILE_DATA;
 +		break;
 +	case FILE_DATA_SIZE:
 +		if (strcmp(name, "size") == 0)
 +			xar->xmlsts = FILE_DATA;
 +		break;
 +	case FILE_DATA_ENCODING:
 +		if (strcmp(name, "encoding") == 0)
 +			xar->xmlsts = FILE_DATA;
 +		break;
 +	case FILE_DATA_A_CHECKSUM:
 +		if (strcmp(name, "archived-checksum") == 0)
 +			xar->xmlsts = FILE_DATA;
 +		break;
 +	case FILE_DATA_E_CHECKSUM:
 +		if (strcmp(name, "extracted-checksum") == 0)
 +			xar->xmlsts = FILE_DATA;
 +		break;
 +	case FILE_DATA_CONTENT:
 +		if (strcmp(name, "content") == 0)
 +			xar->xmlsts = FILE_DATA;
 +		break;
 +	case FILE_EA:
 +		if (strcmp(name, "ea") == 0) {
 +			xar->xmlsts = TOC_FILE;
 +			xar->xattr = NULL;
 +		}
 +		break;
 +	case FILE_EA_LENGTH:
 +		if (strcmp(name, "length") == 0)
 +			xar->xmlsts = FILE_EA;
 +		break;
 +	case FILE_EA_OFFSET:
 +		if (strcmp(name, "offset") == 0)
 +			xar->xmlsts = FILE_EA;
 +		break;
 +	case FILE_EA_SIZE:
 +		if (strcmp(name, "size") == 0)
 +			xar->xmlsts = FILE_EA;
 +		break;
 +	case FILE_EA_ENCODING:
 +		if (strcmp(name, "encoding") == 0)
 +			xar->xmlsts = FILE_EA;
 +		break;
 +	case FILE_EA_A_CHECKSUM:
 +		if (strcmp(name, "archived-checksum") == 0)
 +			xar->xmlsts = FILE_EA;
 +		break;
 +	case FILE_EA_E_CHECKSUM:
 +		if (strcmp(name, "extracted-checksum") == 0)
 +			xar->xmlsts = FILE_EA;
 +		break;
 +	case FILE_EA_NAME:
 +		if (strcmp(name, "name") == 0)
 +			xar->xmlsts = FILE_EA;
 +		break;
 +	case FILE_EA_FSTYPE:
 +		if (strcmp(name, "fstype") == 0)
 +			xar->xmlsts = FILE_EA;
 +		break;
 +	case FILE_CTIME:
 +		if (strcmp(name, "ctime") == 0)
 +			xar->xmlsts = TOC_FILE;
 +		break;
 +	case FILE_MTIME:
 +		if (strcmp(name, "mtime") == 0)
 +			xar->xmlsts = TOC_FILE;
 +		break;
 +	case FILE_ATIME:
 +		if (strcmp(name, "atime") == 0)
 +			xar->xmlsts = TOC_FILE;
 +		break;
 +	case FILE_GROUP:
 +		if (strcmp(name, "group") == 0)
 +			xar->xmlsts = TOC_FILE;
 +		break;
 +	case FILE_GID:
 +		if (strcmp(name, "gid") == 0)
 +			xar->xmlsts = TOC_FILE;
 +		break;
 +	case FILE_USER:
 +		if (strcmp(name, "user") == 0)
 +			xar->xmlsts = TOC_FILE;
 +		break;
 +	case FILE_UID:
 +		if (strcmp(name, "uid") == 0)
 +			xar->xmlsts = TOC_FILE;
 +		break;
 +	case FILE_MODE:
 +		if (strcmp(name, "mode") == 0)
 +			xar->xmlsts = TOC_FILE;
 +		break;
 +	case FILE_DEVICE:
 +		if (strcmp(name, "device") == 0)
 +			xar->xmlsts = TOC_FILE;
 +		break;
 +	case FILE_DEVICE_MAJOR:
 +		if (strcmp(name, "major") == 0)
 +			xar->xmlsts = FILE_DEVICE;
 +		break;
 +	case FILE_DEVICE_MINOR:
 +		if (strcmp(name, "minor") == 0)
 +			xar->xmlsts = FILE_DEVICE;
 +		break;
 +	case FILE_DEVICENO:
 +		if (strcmp(name, "deviceno") == 0)
 +			xar->xmlsts = TOC_FILE;
 +		break;
 +	case FILE_INODE:
 +		if (strcmp(name, "inode") == 0)
 +			xar->xmlsts = TOC_FILE;
 +		break;
 +	case FILE_LINK:
 +		if (strcmp(name, "link") == 0)
 +			xar->xmlsts = TOC_FILE;
 +		break;
 +	case FILE_TYPE:
 +		if (strcmp(name, "type") == 0)
 +			xar->xmlsts = TOC_FILE;
 +		break;
 +	case FILE_NAME:
 +		if (strcmp(name, "name") == 0)
 +			xar->xmlsts = TOC_FILE;
 +		break;
 +	case FILE_ACL:
 +		if (strcmp(name, "acl") == 0)
 +			xar->xmlsts = TOC_FILE;
 +		break;
 +	case FILE_ACL_DEFAULT:
 +		if (strcmp(name, "default") == 0)
 +			xar->xmlsts = FILE_ACL;
 +		break;
 +	case FILE_ACL_ACCESS:
 +		if (strcmp(name, "access") == 0)
 +			xar->xmlsts = FILE_ACL;
 +		break;
 +	case FILE_ACL_APPLEEXTENDED:
 +		if (strcmp(name, "appleextended") == 0)
 +			xar->xmlsts = FILE_ACL;
 +		break;
 +	case FILE_FLAGS:
 +		if (strcmp(name, "flags") == 0)
 +			xar->xmlsts = TOC_FILE;
 +		break;
 +	case FILE_FLAGS_USER_NODUMP:
 +		if (strcmp(name, "UserNoDump") == 0)
 +			xar->xmlsts = FILE_FLAGS;
 +		break;
 +	case FILE_FLAGS_USER_IMMUTABLE:
 +		if (strcmp(name, "UserImmutable") == 0)
 +			xar->xmlsts = FILE_FLAGS;
 +		break;
 +	case FILE_FLAGS_USER_APPEND:
 +		if (strcmp(name, "UserAppend") == 0)
 +			xar->xmlsts = FILE_FLAGS;
 +		break;
 +	case FILE_FLAGS_USER_OPAQUE:
 +		if (strcmp(name, "UserOpaque") == 0)
 +			xar->xmlsts = FILE_FLAGS;
 +		break;
 +	case FILE_FLAGS_USER_NOUNLINK:
 +		if (strcmp(name, "UserNoUnlink") == 0)
 +			xar->xmlsts = FILE_FLAGS;
 +		break;
 +	case FILE_FLAGS_SYS_ARCHIVED:
 +		if (strcmp(name, "SystemArchived") == 0)
 +			xar->xmlsts = FILE_FLAGS;
 +		break;
 +	case FILE_FLAGS_SYS_IMMUTABLE:
 +		if (strcmp(name, "SystemImmutable") == 0)
 +			xar->xmlsts = FILE_FLAGS;
 +		break;
 +	case FILE_FLAGS_SYS_APPEND:
 +		if (strcmp(name, "SystemAppend") == 0)
 +			xar->xmlsts = FILE_FLAGS;
 +		break;
 +	case FILE_FLAGS_SYS_NOUNLINK:
 +		if (strcmp(name, "SystemNoUnlink") == 0)
 +			xar->xmlsts = FILE_FLAGS;
 +		break;
 +	case FILE_FLAGS_SYS_SNAPSHOT:
 +		if (strcmp(name, "SystemSnapshot") == 0)
 +			xar->xmlsts = FILE_FLAGS;
 +		break;
 +	case FILE_EXT2:
 +		if (strcmp(name, "ext2") == 0)
 +			xar->xmlsts = TOC_FILE;
 +		break;
 +	case FILE_EXT2_SecureDeletion:
 +		if (strcmp(name, "SecureDeletion") == 0)
 +			xar->xmlsts = FILE_EXT2;
 +		break;
 +	case FILE_EXT2_Undelete:
 +		if (strcmp(name, "Undelete") == 0)
 +			xar->xmlsts = FILE_EXT2;
 +		break;
 +	case FILE_EXT2_Compress:
 +		if (strcmp(name, "Compress") == 0)
 +			xar->xmlsts = FILE_EXT2;
 +		break;
 +	case FILE_EXT2_Synchronous:
 +		if (strcmp(name, "Synchronous") == 0)
 +			xar->xmlsts = FILE_EXT2;
 +		break;
 +	case FILE_EXT2_Immutable:
 +		if (strcmp(name, "Immutable") == 0)
 +			xar->xmlsts = FILE_EXT2;
 +		break;
 +	case FILE_EXT2_AppendOnly:
 +		if (strcmp(name, "AppendOnly") == 0)
 +			xar->xmlsts = FILE_EXT2;
 +		break;
 +	case FILE_EXT2_NoDump:
 +		if (strcmp(name, "NoDump") == 0)
 +			xar->xmlsts = FILE_EXT2;
 +		break;
 +	case FILE_EXT2_NoAtime:
 +		if (strcmp(name, "NoAtime") == 0)
 +			xar->xmlsts = FILE_EXT2;
 +		break;
 +	case FILE_EXT2_CompDirty:
 +		if (strcmp(name, "CompDirty") == 0)
 +			xar->xmlsts = FILE_EXT2;
 +		break;
 +	case FILE_EXT2_CompBlock:
 +		if (strcmp(name, "CompBlock") == 0)
 +			xar->xmlsts = FILE_EXT2;
 +		break;
 +	case FILE_EXT2_NoCompBlock:
 +		if (strcmp(name, "NoCompBlock") == 0)
 +			xar->xmlsts = FILE_EXT2;
 +		break;
 +	case FILE_EXT2_CompError:
 +		if (strcmp(name, "CompError") == 0)
 +			xar->xmlsts = FILE_EXT2;
 +		break;
 +	case FILE_EXT2_BTree:
 +		if (strcmp(name, "BTree") == 0)
 +			xar->xmlsts = FILE_EXT2;
 +		break;
 +	case FILE_EXT2_HashIndexed:
 +		if (strcmp(name, "HashIndexed") == 0)
 +			xar->xmlsts = FILE_EXT2;
 +		break;
 +	case FILE_EXT2_iMagic:
 +		if (strcmp(name, "iMagic") == 0)
 +			xar->xmlsts = FILE_EXT2;
 +		break;
 +	case FILE_EXT2_Journaled:
 +		if (strcmp(name, "Journaled") == 0)
 +			xar->xmlsts = FILE_EXT2;
 +		break;
 +	case FILE_EXT2_NoTail:
 +		if (strcmp(name, "NoTail") == 0)
 +			xar->xmlsts = FILE_EXT2;
 +		break;
 +	case FILE_EXT2_DirSync:
 +		if (strcmp(name, "DirSync") == 0)
 +			xar->xmlsts = FILE_EXT2;
 +		break;
 +	case FILE_EXT2_TopDir:
 +		if (strcmp(name, "TopDir") == 0)
 +			xar->xmlsts = FILE_EXT2;
 +		break;
 +	case FILE_EXT2_Reserved:
 +		if (strcmp(name, "Reserved") == 0)
 +			xar->xmlsts = FILE_EXT2;
 +		break;
 +	case UNKNOWN:
 +		unknowntag_end(xar, name);
 +		break;
 +	}
 +}
 +
 +static const int base64[256] = {
 +	-1, -1, -1, -1, -1, -1, -1, -1,
 +	-1, -1, -1, -1, -1, -1, -1, -1, /* 00 - 0F */
 +	-1, -1, -1, -1, -1, -1, -1, -1,
 +	-1, -1, -1, -1, -1, -1, -1, -1, /* 10 - 1F */
 +	-1, -1, -1, -1, -1, -1, -1, -1,
 +	-1, -1, -1, 62, -1, -1, -1, 63, /* 20 - 2F */
 +	52, 53, 54, 55, 56, 57, 58, 59,
 +	60, 61, -1, -1, -1, -1, -1, -1, /* 30 - 3F */
 +	-1,  0,  1,  2,  3,  4,  5,  6,
 +	 7,  8,  9, 10, 11, 12, 13, 14, /* 40 - 4F */
 +	15, 16, 17, 18, 19, 20, 21, 22,
 +	23, 24, 25, -1, -1, -1, -1, -1, /* 50 - 5F */
 +	-1, 26, 27, 28, 29, 30, 31, 32,
 +	33, 34, 35, 36, 37, 38, 39, 40, /* 60 - 6F */
 +	41, 42, 43, 44, 45, 46, 47, 48,
 +	49, 50, 51, -1, -1, -1, -1, -1, /* 70 - 7F */
 +	-1, -1, -1, -1, -1, -1, -1, -1,
 +	-1, -1, -1, -1, -1, -1, -1, -1, /* 80 - 8F */
 +	-1, -1, -1, -1, -1, -1, -1, -1,
 +	-1, -1, -1, -1, -1, -1, -1, -1, /* 90 - 9F */
 +	-1, -1, -1, -1, -1, -1, -1, -1,
 +	-1, -1, -1, -1, -1, -1, -1, -1, /* A0 - AF */
 +	-1, -1, -1, -1, -1, -1, -1, -1,
 +	-1, -1, -1, -1, -1, -1, -1, -1, /* B0 - BF */
 +	-1, -1, -1, -1, -1, -1, -1, -1,
 +	-1, -1, -1, -1, -1, -1, -1, -1, /* C0 - CF */
 +	-1, -1, -1, -1, -1, -1, -1, -1,
 +	-1, -1, -1, -1, -1, -1, -1, -1, /* D0 - DF */
 +	-1, -1, -1, -1, -1, -1, -1, -1,
 +	-1, -1, -1, -1, -1, -1, -1, -1, /* E0 - EF */
 +	-1, -1, -1, -1, -1, -1, -1, -1,
 +	-1, -1, -1, -1, -1, -1, -1, -1, /* F0 - FF */
 +};
 +
 +static void
 +strappend_base64(struct xar *xar,
 +    struct archive_string *as, const char *s, size_t l)
 +{
 +	unsigned char buff[256];
 +	unsigned char *out;
 +	const unsigned char *b;
 +	size_t len;
 +
 +	(void)xar; /* UNUSED */
 +	len = 0;
 +	out = buff;
 +	b = (const unsigned char *)s;
 +	while (l > 0) {
 +		int n = 0;
 +
 +		if (l > 0) {
 +			if (base64[b[0]] < 0 || base64[b[1]] < 0)
 +				break;
 +			n = base64[*b++] << 18;
 +			n |= base64[*b++] << 12;
 +			*out++ = n >> 16;
 +			len++;
 +			l -= 2;
 +		}
 +		if (l > 0) {
 +			if (base64[*b] < 0)
 +				break;
 +			n |= base64[*b++] << 6;
 +			*out++ = (n >> 8) & 0xFF;
 +			len++;
 +			--l;
 +		}
 +		if (l > 0) {
 +			if (base64[*b] < 0)
 +				break;
 +			n |= base64[*b++];
 +			*out++ = n & 0xFF;
 +			len++;
 +			--l;
 +		}
 +		if (len+3 >= sizeof(buff)) {
 +			archive_strncat(as, (const char *)buff, len);
 +			len = 0;
 +			out = buff;
 +		}
 +	}
 +	if (len > 0)
 +		archive_strncat(as, (const char *)buff, len);
 +}
 +
 +static void
 +xml_data(void *userData, const char *s, int len)
 +{
 +	struct archive_read *a;
 +	struct xar *xar;
 +
 +	a = (struct archive_read *)userData;
 +	xar = (struct xar *)(a->format->data);
 +
 +#if DEBUG
 +	{
 +		char buff[1024];
 +		if (len > (int)(sizeof(buff)-1))
 +			len = (int)(sizeof(buff)-1);
 +		strncpy(buff, s, len);
 +		buff[len] = 0;
 +		fprintf(stderr, "\tlen=%d:\"%s\"\n", len, buff);
 +	}
 +#endif
 +	switch (xar->xmlsts) {
 +	case TOC_CHECKSUM_OFFSET:
 +		xar->toc_chksum_offset = atol10(s, len);
 +		break;
 +	case TOC_CHECKSUM_SIZE:
 +		xar->toc_chksum_size = atol10(s, len);
 +		break;
 +	default:
 +		break;
 +	}
 +	if (xar->file == NULL)
 +		return;
 +
 +	switch (xar->xmlsts) {
 +	case FILE_NAME:
 +		if (xar->file->parent != NULL) {
 +			archive_string_concat(&(xar->file->pathname),
 +			    &(xar->file->parent->pathname));
 +			archive_strappend_char(&(xar->file->pathname), '/');
 +		}
 +		xar->file->has |= HAS_PATHNAME;
 +		if (xar->base64text) {
 +			strappend_base64(xar,
 +			    &(xar->file->pathname), s, len);
 +		} else
 +			archive_strncat(&(xar->file->pathname), s, len);
 +		break;
 +	case FILE_LINK:
 +		xar->file->has |= HAS_SYMLINK;
 +		archive_strncpy(&(xar->file->symlink), s, len);
 +		break;
 +	case FILE_TYPE:
 +		if (strncmp("file", s, len) == 0 ||
 +		    strncmp("hardlink", s, len) == 0)
 +			xar->file->mode =
 +			    (xar->file->mode & ~AE_IFMT) | AE_IFREG;
 +		if (strncmp("directory", s, len) == 0)
 +			xar->file->mode =
 +			    (xar->file->mode & ~AE_IFMT) | AE_IFDIR;
 +		if (strncmp("symlink", s, len) == 0)
 +			xar->file->mode =
 +			    (xar->file->mode & ~AE_IFMT) | AE_IFLNK;
 +		if (strncmp("character special", s, len) == 0)
 +			xar->file->mode =
 +			    (xar->file->mode & ~AE_IFMT) | AE_IFCHR;
 +		if (strncmp("block special", s, len) == 0)
 +			xar->file->mode =
 +			    (xar->file->mode & ~AE_IFMT) | AE_IFBLK;
 +		if (strncmp("socket", s, len) == 0)
 +			xar->file->mode =
 +			    (xar->file->mode & ~AE_IFMT) | AE_IFSOCK;
 +		if (strncmp("fifo", s, len) == 0)
 +			xar->file->mode =
 +			    (xar->file->mode & ~AE_IFMT) | AE_IFIFO;
 +		xar->file->has |= HAS_TYPE;
 +		break;
 +	case FILE_INODE:
 +		xar->file->has |= HAS_INO;
 +		xar->file->ino64 = atol10(s, len);
 +		break;
 +	case FILE_DEVICE_MAJOR:
 +		xar->file->has |= HAS_DEVMAJOR;
 +		xar->file->devmajor = (dev_t)atol10(s, len);
 +		break;
 +	case FILE_DEVICE_MINOR:
 +		xar->file->has |= HAS_DEVMINOR;
 +		xar->file->devminor = (dev_t)atol10(s, len);
 +		break;
 +	case FILE_DEVICENO:
 +		xar->file->has |= HAS_DEV;
 +		xar->file->dev = (dev_t)atol10(s, len);
 +		break;
 +	case FILE_MODE:
 +		xar->file->has |= HAS_MODE;
 +		xar->file->mode =
 +		    (xar->file->mode & AE_IFMT) |
 +		    ((mode_t)(atol8(s, len)) & ~AE_IFMT);
 +		break;
 +	case FILE_GROUP:
 +		xar->file->has |= HAS_GID;
 +		archive_strncpy(&(xar->file->gname), s, len);
 +		break;
 +	case FILE_GID:
 +		xar->file->has |= HAS_GID;
 +		xar->file->gid = atol10(s, len);
 +		break;
 +	case FILE_USER:
 +		xar->file->has |= HAS_UID;
 +		archive_strncpy(&(xar->file->uname), s, len);
 +		break;
 +	case FILE_UID:
 +		xar->file->has |= HAS_UID;
 +		xar->file->uid = atol10(s, len);
 +		break;
 +	case FILE_CTIME:
 +		xar->file->has |= HAS_TIME;
 +		xar->file->ctime = parse_time(s, len);
 +		break;
 +	case FILE_MTIME:
 +		xar->file->has |= HAS_TIME;
 +		xar->file->mtime = parse_time(s, len);
 +		break;
 +	case FILE_ATIME:
 +		xar->file->has |= HAS_TIME;
 +		xar->file->atime = parse_time(s, len);
 +		break;
 +	case FILE_DATA_LENGTH:
 +		xar->file->has |= HAS_DATA;
 +		xar->file->length = atol10(s, len);
 +		break;
 +	case FILE_DATA_OFFSET:
 +		xar->file->has |= HAS_DATA;
 +		xar->file->offset = atol10(s, len);
 +		break;
 +	case FILE_DATA_SIZE:
 +		xar->file->has |= HAS_DATA;
 +		xar->file->size = atol10(s, len);
 +		break;
 +	case FILE_DATA_A_CHECKSUM:
 +		xar->file->a_sum.len = atohex(xar->file->a_sum.val,
 +		    sizeof(xar->file->a_sum.val), s, len);
 +		break;
 +	case FILE_DATA_E_CHECKSUM:
 +		xar->file->e_sum.len = atohex(xar->file->e_sum.val,
 +		    sizeof(xar->file->e_sum.val), s, len);
 +		break;
 +	case FILE_EA_LENGTH:
 +		xar->file->has |= HAS_XATTR;
 +		xar->xattr->length = atol10(s, len);
 +		break;
 +	case FILE_EA_OFFSET:
 +		xar->file->has |= HAS_XATTR;
 +		xar->xattr->offset = atol10(s, len);
 +		break;
 +	case FILE_EA_SIZE:
 +		xar->file->has |= HAS_XATTR;
 +		xar->xattr->size = atol10(s, len);
 +		break;
 +	case FILE_EA_A_CHECKSUM:
 +		xar->file->has |= HAS_XATTR;
 +		xar->xattr->a_sum.len = atohex(xar->xattr->a_sum.val,
 +		    sizeof(xar->xattr->a_sum.val), s, len);
 +		break;
 +	case FILE_EA_E_CHECKSUM:
 +		xar->file->has |= HAS_XATTR;
 +		xar->xattr->e_sum.len = atohex(xar->xattr->e_sum.val,
 +		    sizeof(xar->xattr->e_sum.val), s, len);
 +		break;
 +	case FILE_EA_NAME:
 +		xar->file->has |= HAS_XATTR;
 +		archive_strncpy(&(xar->xattr->name), s, len);
 +		break;
 +	case FILE_EA_FSTYPE:
 +		xar->file->has |= HAS_XATTR;
 +		archive_strncpy(&(xar->xattr->fstype), s, len);
 +		break;
 +		break;
 +	case FILE_ACL_DEFAULT:
 +	case FILE_ACL_ACCESS:
 +	case FILE_ACL_APPLEEXTENDED:
 +		xar->file->has |= HAS_ACL;
 +		/* TODO */
 +		break;
 +	case INIT:
 +	case XAR:
 +	case TOC:
 +	case TOC_CREATION_TIME:
 +	case TOC_CHECKSUM:
 +	case TOC_CHECKSUM_OFFSET:
 +	case TOC_CHECKSUM_SIZE:
 +	case TOC_FILE:
 +	case FILE_DATA:
 +	case FILE_DATA_ENCODING:
 +	case FILE_DATA_CONTENT:
 +	case FILE_DEVICE:
 +	case FILE_EA:
 +	case FILE_EA_ENCODING:
 +	case FILE_ACL:
 +	case FILE_FLAGS:
 +	case FILE_FLAGS_USER_NODUMP:
 +	case FILE_FLAGS_USER_IMMUTABLE:
 +	case FILE_FLAGS_USER_APPEND:
 +	case FILE_FLAGS_USER_OPAQUE:
 +	case FILE_FLAGS_USER_NOUNLINK:
 +	case FILE_FLAGS_SYS_ARCHIVED:
 +	case FILE_FLAGS_SYS_IMMUTABLE:
 +	case FILE_FLAGS_SYS_APPEND:
 +	case FILE_FLAGS_SYS_NOUNLINK:
 +	case FILE_FLAGS_SYS_SNAPSHOT:
 +	case FILE_EXT2:
 +	case FILE_EXT2_SecureDeletion:
 +	case FILE_EXT2_Undelete:
 +	case FILE_EXT2_Compress:
 +	case FILE_EXT2_Synchronous:
 +	case FILE_EXT2_Immutable:
 +	case FILE_EXT2_AppendOnly:
 +	case FILE_EXT2_NoDump:
 +	case FILE_EXT2_NoAtime:
 +	case FILE_EXT2_CompDirty:
 +	case FILE_EXT2_CompBlock:
 +	case FILE_EXT2_NoCompBlock:
 +	case FILE_EXT2_CompError:
 +	case FILE_EXT2_BTree:
 +	case FILE_EXT2_HashIndexed:
 +	case FILE_EXT2_iMagic:
 +	case FILE_EXT2_Journaled:
 +	case FILE_EXT2_NoTail:
 +	case FILE_EXT2_DirSync:
 +	case FILE_EXT2_TopDir:
 +	case FILE_EXT2_Reserved:
 +	case UNKNOWN:
 +		break;
 +	}
 +}
 +
 +/*
 + * BSD file flags.
 + */
 +static int
 +xml_parse_file_flags(struct xar *xar, const char *name)
 +{
 +	const char *flag = NULL;
 +
 +	if (strcmp(name, "UserNoDump") == 0) {
 +		xar->xmlsts = FILE_FLAGS_USER_NODUMP;
 +		flag = "nodump";
 +	}
 +	else if (strcmp(name, "UserImmutable") == 0) {
 +		xar->xmlsts = FILE_FLAGS_USER_IMMUTABLE;
 +		flag = "uimmutable";
 +	}
 +	else if (strcmp(name, "UserAppend") == 0) {
 +		xar->xmlsts = FILE_FLAGS_USER_APPEND;
 +		flag = "uappend";
 +	}
 +	else if (strcmp(name, "UserOpaque") == 0) {
 +		xar->xmlsts = FILE_FLAGS_USER_OPAQUE;
 +		flag = "opaque";
 +	}
 +	else if (strcmp(name, "UserNoUnlink") == 0) {
 +		xar->xmlsts = FILE_FLAGS_USER_NOUNLINK;
 +		flag = "nouunlink";
 +	}
 +	else if (strcmp(name, "SystemArchived") == 0) {
 +		xar->xmlsts = FILE_FLAGS_SYS_ARCHIVED;
 +		flag = "archived";
 +	}
 +	else if (strcmp(name, "SystemImmutable") == 0) {
 +		xar->xmlsts = FILE_FLAGS_SYS_IMMUTABLE;
 +		flag = "simmutable";
 +	}
 +	else if (strcmp(name, "SystemAppend") == 0) {
 +		xar->xmlsts = FILE_FLAGS_SYS_APPEND;
 +		flag = "sappend";
 +	}
 +	else if (strcmp(name, "SystemNoUnlink") == 0) {
 +		xar->xmlsts = FILE_FLAGS_SYS_NOUNLINK;
 +		flag = "nosunlink";
 +	}
 +	else if (strcmp(name, "SystemSnapshot") == 0) {
 +		xar->xmlsts = FILE_FLAGS_SYS_SNAPSHOT;
 +		flag = "snapshot";
 +	}
 +
 +	if (flag == NULL)
 +		return (0);
 +	xar->file->has |= HAS_FFLAGS;
 +	if (archive_strlen(&(xar->file->fflags_text)) > 0)
 +		archive_strappend_char(&(xar->file->fflags_text), ',');
 +	archive_strcat(&(xar->file->fflags_text), flag);
 +	return (1);
 +}
 +
 +/*
 + * Linux file flags.
 + */
 +static int
 +xml_parse_file_ext2(struct xar *xar, const char *name)
 +{
 +	const char *flag = NULL;
 +
 +	if (strcmp(name, "SecureDeletion") == 0) {
 +		xar->xmlsts = FILE_EXT2_SecureDeletion;
 +		flag = "securedeletion";
 +	}
 +	else if (strcmp(name, "Undelete") == 0) {
 +		xar->xmlsts = FILE_EXT2_Undelete;
 +		flag = "nouunlink";
 +	}
 +	else if (strcmp(name, "Compress") == 0) {
 +		xar->xmlsts = FILE_EXT2_Compress;
 +		flag = "compress";
 +	}
 +	else if (strcmp(name, "Synchronous") == 0) {
 +		xar->xmlsts = FILE_EXT2_Synchronous;
 +		flag = "sync";
 +	}
 +	else if (strcmp(name, "Immutable") == 0) {
 +		xar->xmlsts = FILE_EXT2_Immutable;
 +		flag = "simmutable";
 +	}
 +	else if (strcmp(name, "AppendOnly") == 0) {
 +		xar->xmlsts = FILE_EXT2_AppendOnly;
 +		flag = "sappend";
 +	}
 +	else if (strcmp(name, "NoDump") == 0) {
 +		xar->xmlsts = FILE_EXT2_NoDump;
 +		flag = "nodump";
 +	}
 +	else if (strcmp(name, "NoAtime") == 0) {
 +		xar->xmlsts = FILE_EXT2_NoAtime;
 +		flag = "noatime";
 +	}
 +	else if (strcmp(name, "CompDirty") == 0) {
 +		xar->xmlsts = FILE_EXT2_CompDirty;
 +		flag = "compdirty";
 +	}
 +	else if (strcmp(name, "CompBlock") == 0) {
 +		xar->xmlsts = FILE_EXT2_CompBlock;
 +		flag = "comprblk";
 +	}
 +	else if (strcmp(name, "NoCompBlock") == 0) {
 +		xar->xmlsts = FILE_EXT2_NoCompBlock;
 +		flag = "nocomprblk";
 +	}
 +	else if (strcmp(name, "CompError") == 0) {
 +		xar->xmlsts = FILE_EXT2_CompError;
 +		flag = "comperr";
 +	}
 +	else if (strcmp(name, "BTree") == 0) {
 +		xar->xmlsts = FILE_EXT2_BTree;
 +		flag = "btree";
 +	}
 +	else if (strcmp(name, "HashIndexed") == 0) {
 +		xar->xmlsts = FILE_EXT2_HashIndexed;
 +		flag = "hashidx";
 +	}
 +	else if (strcmp(name, "iMagic") == 0) {
 +		xar->xmlsts = FILE_EXT2_iMagic;
 +		flag = "imagic";
 +	}
 +	else if (strcmp(name, "Journaled") == 0) {
 +		xar->xmlsts = FILE_EXT2_Journaled;
 +		flag = "journal";
 +	}
 +	else if (strcmp(name, "NoTail") == 0) {
 +		xar->xmlsts = FILE_EXT2_NoTail;
 +		flag = "notail";
 +	}
 +	else if (strcmp(name, "DirSync") == 0) {
 +		xar->xmlsts = FILE_EXT2_DirSync;
 +		flag = "dirsync";
 +	}
 +	else if (strcmp(name, "TopDir") == 0) {
 +		xar->xmlsts = FILE_EXT2_TopDir;
 +		flag = "topdir";
 +	}
 +	else if (strcmp(name, "Reserved") == 0) {
 +		xar->xmlsts = FILE_EXT2_Reserved;
 +		flag = "reserved";
 +	}
 +
 +	if (flag == NULL)
 +		return (0);
 +	if (archive_strlen(&(xar->file->fflags_text)) > 0)
 +		archive_strappend_char(&(xar->file->fflags_text), ',');
 +	archive_strcat(&(xar->file->fflags_text), flag);
 +	return (1);
 +}
 +
 +#ifdef HAVE_LIBXML_XMLREADER_H
 +
 +static int
 +xml2_xmlattr_setup(struct archive_read *a,
 +    struct xmlattr_list *list, xmlTextReaderPtr reader)
 +{
 +	struct xmlattr *attr;
 +	int r;
 +
 +	list->first = NULL;
 +	list->last = &(list->first);
 +	r = xmlTextReaderMoveToFirstAttribute(reader);
 +	while (r == 1) {
 +		attr = malloc(sizeof*(attr));
 +		if (attr == NULL) {
 +			archive_set_error(&a->archive, ENOMEM, "Out of memory");
 +			return (ARCHIVE_FATAL);
 +		}
 +		attr->name = strdup(
 +		    (const char *)xmlTextReaderConstLocalName(reader));
 +		if (attr->name == NULL) {
 +			free(attr);
 +			archive_set_error(&a->archive, ENOMEM, "Out of memory");
 +			return (ARCHIVE_FATAL);
 +		}
 +		attr->value = strdup(
 +		    (const char *)xmlTextReaderConstValue(reader));
 +		if (attr->value == NULL) {
 +			free(attr->name);
 +			free(attr);
 +			archive_set_error(&a->archive, ENOMEM, "Out of memory");
 +			return (ARCHIVE_FATAL);
 +		}
 +		attr->next = NULL;
 +		*list->last = attr;
 +		list->last = &(attr->next);
 +		r = xmlTextReaderMoveToNextAttribute(reader);
 +	}
 +	return (r);
 +}
 +
 +static int
 +xml2_read_cb(void *context, char *buffer, int len)
 +{
 +	struct archive_read *a;
 +	struct xar *xar;
 +	const void *d;
 +	size_t outbytes;
- 	size_t used;
++	size_t used = 0;
 +	int r;
 +
 +	a = (struct archive_read *)context;
 +	xar = (struct xar *)(a->format->data);
 +
 +	if (xar->toc_remaining <= 0)
 +		return (0);
 +	d = buffer;
 +	outbytes = len;
 +	r = rd_contents(a, &d, &outbytes, &used, xar->toc_remaining);
 +	if (r != ARCHIVE_OK)
 +		return (r);
 +	__archive_read_consume(a, used);
 +	xar->toc_remaining -= used;
 +	xar->offset += used;
 +	xar->toc_total += outbytes;
 +	PRINT_TOC(buffer, len);
 +
 +	return ((int)outbytes);
 +}
 +
 +static int
 +xml2_close_cb(void *context)
 +{
 +
 +	(void)context; /* UNUSED */
 +	return (0);
 +}
 +
 +static void
 +xml2_error_hdr(void *arg, const char *msg, xmlParserSeverities severity,
 +    xmlTextReaderLocatorPtr locator)
 +{
 +	struct archive_read *a;
 +
 +	(void)locator; /* UNUSED */
 +	a = (struct archive_read *)arg;
 +	switch (severity) {
 +	case XML_PARSER_SEVERITY_VALIDITY_WARNING:
 +	case XML_PARSER_SEVERITY_WARNING:
 +		archive_set_error(&a->archive, ARCHIVE_ERRNO_MISC,
 +		    "XML Parsing error: %s", msg);
 +		break;
 +	case XML_PARSER_SEVERITY_VALIDITY_ERROR:
 +	case XML_PARSER_SEVERITY_ERROR:
 +		archive_set_error(&a->archive, ARCHIVE_ERRNO_MISC,
 +		    "XML Parsing error: %s", msg);
 +		break;
 +	}
 +}
 +
 +static int
 +xml2_read_toc(struct archive_read *a)
 +{
 +	xmlTextReaderPtr reader;
 +	struct xmlattr_list list;
 +	int r;
 +
 +	reader = xmlReaderForIO(xml2_read_cb, xml2_close_cb, a, NULL, NULL, 0);
 +	if (reader == NULL) {
 +		archive_set_error(&a->archive, ENOMEM,
 +		    "Couldn't allocate memory for xml parser");
 +		return (ARCHIVE_FATAL);
 +	}
 +	xmlTextReaderSetErrorHandler(reader, xml2_error_hdr, a);
 +
 +	while ((r = xmlTextReaderRead(reader)) == 1) {
 +		const char *name, *value;
 +		int type, empty;
 +
 +		type = xmlTextReaderNodeType(reader);
 +		name = (const char *)xmlTextReaderConstLocalName(reader);
 +		switch (type) {
 +		case XML_READER_TYPE_ELEMENT:
 +			empty = xmlTextReaderIsEmptyElement(reader);
 +			r = xml2_xmlattr_setup(a, &list, reader);
 +			if (r == ARCHIVE_OK)
 +				r = xml_start(a, name, &list);
 +			xmlattr_cleanup(&list);
 +			if (r != ARCHIVE_OK)
 +				return (r);
 +			if (empty)
 +				xml_end(a, name);
 +			break;
 +		case XML_READER_TYPE_END_ELEMENT:
 +			xml_end(a, name);
 +			break;
 +		case XML_READER_TYPE_TEXT:
 +			value = (const char *)xmlTextReaderConstValue(reader);
 +			xml_data(a, value, strlen(value));
 +			break;
 +		case XML_READER_TYPE_SIGNIFICANT_WHITESPACE:
 +		default:
 +			break;
 +		}
 +		if (r < 0)
 +			break;
 +	}
 +	xmlFreeTextReader(reader);
 +	xmlCleanupParser();
 +
 +	return ((r == 0)?ARCHIVE_OK:ARCHIVE_FATAL);
 +}
 +
 +#elif defined(HAVE_BSDXML_H) || defined(HAVE_EXPAT_H)
 +
 +static int
 +expat_xmlattr_setup(struct archive_read *a,
 +    struct xmlattr_list *list, const XML_Char **atts)
 +{
 +	struct xmlattr *attr;
 +	char *name, *value;
 +
 +	list->first = NULL;
 +	list->last = &(list->first);
 +	if (atts == NULL)
 +		return (ARCHIVE_OK);
 +	while (atts[0] != NULL && atts[1] != NULL) {
 +		attr = malloc(sizeof*(attr));
 +		name = strdup(atts[0]);
 +		value = strdup(atts[1]);
 +		if (attr == NULL || name == NULL || value == NULL) {
 +			archive_set_error(&a->archive, ENOMEM, "Out of memory");
++			free(attr);
++			free(name);
++			free(value);
 +			return (ARCHIVE_FATAL);
 +		}
 +		attr->name = name;
 +		attr->value = value;
 +		attr->next = NULL;
 +		*list->last = attr;
 +		list->last = &(attr->next);
 +		atts += 2;
 +	}
 +	return (ARCHIVE_OK);
 +}
 +
 +static void
 +expat_start_cb(void *userData, const XML_Char *name, const XML_Char **atts)
 +{
 +	struct expat_userData *ud = (struct expat_userData *)userData;
 +	struct archive_read *a = ud->archive;
 +	struct xmlattr_list list;
 +	int r;
 +
 +	r = expat_xmlattr_setup(a, &list, atts);
 +	if (r == ARCHIVE_OK)
 +		r = xml_start(a, (const char *)name, &list);
 +	xmlattr_cleanup(&list);
 +	ud->state = r;
 +}
 +
 +static void
 +expat_end_cb(void *userData, const XML_Char *name)
 +{
 +	struct expat_userData *ud = (struct expat_userData *)userData;
 +
 +	xml_end(ud->archive, (const char *)name);
 +}
 +
 +static void
 +expat_data_cb(void *userData, const XML_Char *s, int len)
 +{
 +	struct expat_userData *ud = (struct expat_userData *)userData;
 +
 +	xml_data(ud->archive, s, len);
 +}
 +
 +static int
 +expat_read_toc(struct archive_read *a)
 +{
 +	struct xar *xar;
 +	XML_Parser parser;
 +	struct expat_userData ud;
 +
 +	ud.state = ARCHIVE_OK;
 +	ud.archive = a;
 +
 +	xar = (struct xar *)(a->format->data);
 +
 +	/* Initialize XML Parser library. */
 +	parser = XML_ParserCreate(NULL);
 +	if (parser == NULL) {
 +		archive_set_error(&a->archive, ENOMEM,
 +		    "Couldn't allocate memory for xml parser");
 +		return (ARCHIVE_FATAL);
 +	}
 +	XML_SetUserData(parser, &ud);
 +	XML_SetElementHandler(parser, expat_start_cb, expat_end_cb);
 +	XML_SetCharacterDataHandler(parser, expat_data_cb);
 +	xar->xmlsts = INIT;
 +
 +	while (xar->toc_remaining && ud.state == ARCHIVE_OK) {
 +		enum XML_Status xr;
 +		const void *d;
 +		size_t outbytes;
 +		size_t used;
 +		int r;
 +
 +		d = NULL;
 +		r = rd_contents(a, &d, &outbytes, &used, xar->toc_remaining);
 +		if (r != ARCHIVE_OK)
 +			return (r);
 +		xar->toc_remaining -= used;
 +		xar->offset += used;
 +		xar->toc_total += outbytes;
 +		PRINT_TOC(d, outbytes);
 +
 +		xr = XML_Parse(parser, d, outbytes, xar->toc_remaining == 0);
 +		__archive_read_consume(a, used);
 +		if (xr == XML_STATUS_ERROR) {
 +			XML_ParserFree(parser);
 +			archive_set_error(&a->archive, ARCHIVE_ERRNO_MISC,
 +			    "XML Parsing failed");
 +			return (ARCHIVE_FATAL);
 +		}
 +	}
 +	XML_ParserFree(parser);
 +	return (ud.state);
 +}
 +#endif /* defined(HAVE_BSDXML_H) || defined(HAVE_EXPAT_H) */
 +
 +#endif /* Support xar format */
diff --cc Utilities/cmlibarchive/libarchive/archive_read_support_format_zip.c
index c50ba84,0000000..e56bd63
mode 100644,000000..100644
--- a/Utilities/cmlibarchive/libarchive/archive_read_support_format_zip.c
+++ b/Utilities/cmlibarchive/libarchive/archive_read_support_format_zip.c
@@@ -1,3062 -1,0 +1,3112 @@@
 +/*-
 + * Copyright (c) 2004-2013 Tim Kientzle
 + * Copyright (c) 2011-2012,2014 Michihiro NAKAJIMA
 + * Copyright (c) 2013 Konrad Kleine
 + * All rights reserved.
 + *
 + * Redistribution and use in source and binary forms, with or without
 + * modification, are permitted provided that the following conditions
 + * are met:
 + * 1. Redistributions of source code must retain the above copyright
 + *    notice, this list of conditions and the following disclaimer.
 + * 2. Redistributions in binary form must reproduce the above copyright
 + *    notice, this list of conditions and the following disclaimer in the
 + *    documentation and/or other materials provided with the distribution.
 + *
 + * THIS SOFTWARE IS PROVIDED BY THE AUTHOR(S) ``AS IS'' AND ANY EXPRESS OR
 + * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
 + * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
 + * IN NO EVENT SHALL THE AUTHOR(S) BE LIABLE FOR ANY DIRECT, INDIRECT,
 + * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
 + * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
 + * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
 + * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
 + * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
 + * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
 + */
 +
 +#include "archive_platform.h"
 +__FBSDID("$FreeBSD: head/lib/libarchive/archive_read_support_format_zip.c 201102 2009-12-28 03:11:36Z kientzle $");
 +
 +/*
 + * The definitive documentation of the Zip file format is:
 + *   http://www.pkware.com/documents/casestudies/APPNOTE.TXT
 + *
 + * The Info-Zip project has pioneered various extensions to better
 + * support Zip on Unix, including the 0x5455 "UT", 0x5855 "UX", 0x7855
 + * "Ux", and 0x7875 "ux" extensions for time and ownership
 + * information.
 + *
 + * History of this code: The streaming Zip reader was first added to
 + * libarchive in January 2005.  Support for seekable input sources was
 + * added in Nov 2011.  Zip64 support (including a significant code
 + * refactoring) was added in 2014.
 + */
 +
 +#ifdef HAVE_ERRNO_H
 +#include <errno.h>
 +#endif
 +#ifdef HAVE_STDLIB_H
 +#include <stdlib.h>
 +#endif
 +#ifdef HAVE_ZLIB_H
 +#include <cm_zlib.h>
 +#endif
 +
 +#include "archive.h"
 +#include "archive_digest_private.h"
 +#include "archive_cryptor_private.h"
 +#include "archive_endian.h"
 +#include "archive_entry.h"
 +#include "archive_entry_locale.h"
 +#include "archive_hmac_private.h"
 +#include "archive_private.h"
 +#include "archive_rb.h"
 +#include "archive_read_private.h"
 +
 +#ifndef HAVE_ZLIB_H
 +#include "archive_crc32.h"
 +#endif
 +
 +struct zip_entry {
 +	struct archive_rb_node	node;
 +	struct zip_entry	*next;
 +	int64_t			local_header_offset;
 +	int64_t			compressed_size;
 +	int64_t			uncompressed_size;
 +	int64_t			gid;
 +	int64_t			uid;
 +	struct archive_string	rsrcname;
 +	time_t			mtime;
 +	time_t			atime;
 +	time_t			ctime;
 +	uint32_t		crc32;
 +	uint16_t		mode;
 +	uint16_t		zip_flags; /* From GP Flags Field */
 +	unsigned char		compression;
 +	unsigned char		system; /* From "version written by" */
 +	unsigned char		flags; /* Our extra markers. */
 +	unsigned char		decdat;/* Used for Decryption check */
 +
 +	/* WinZip AES encryption extra field should be available
 +	 * when compression is 99. */
 +	struct {
 +		/* Vendor version: AE-1 - 0x0001, AE-2 - 0x0002 */
 +		unsigned	vendor;
 +#define AES_VENDOR_AE_1	0x0001
 +#define AES_VENDOR_AE_2	0x0002
 +		/* AES encryption strength:
 +		 * 1 - 128 bits, 2 - 192 bits, 2 - 256 bits. */
 +		unsigned	strength;
 +		/* Actual compression method. */
 +		unsigned char	compression;
 +	}			aes_extra;
 +};
 +
 +struct trad_enc_ctx {
 +	uint32_t	keys[3];
 +};
 +
 +/* Bits used in zip_flags. */
 +#define ZIP_ENCRYPTED	(1 << 0)
 +#define ZIP_LENGTH_AT_END	(1 << 3)
 +#define ZIP_STRONG_ENCRYPTED	(1 << 6)
 +#define ZIP_UTF8_NAME	(1 << 11)
 +/* See "7.2 Single Password Symmetric Encryption Method"
 +   in http://www.pkware.com/documents/casestudies/APPNOTE.TXT */
 +#define ZIP_CENTRAL_DIRECTORY_ENCRYPTED	(1 << 13)
 +
 +/* Bits used in flags. */
 +#define LA_USED_ZIP64	(1 << 0)
 +#define LA_FROM_CENTRAL_DIRECTORY (1 << 1)
 +
 +/*
 + * See "WinZip - AES Encryption Information"
 + *     http://www.winzip.com/aes_info.htm
 + */
 +/* Value used in compression method. */
 +#define WINZIP_AES_ENCRYPTION	99
 +/* Authentication code size. */
 +#define AUTH_CODE_SIZE	10
 +/**/
 +#define MAX_DERIVED_KEY_BUF_SIZE	(AES_MAX_KEY_SIZE * 2 + 2)
 +
 +struct zip {
 +	/* Structural information about the archive. */
 +	struct archive_string	format_name;
 +	int64_t			central_directory_offset;
 +	size_t			central_directory_entries_total;
 +	size_t			central_directory_entries_on_this_disk;
 +	int			has_encrypted_entries;
 +
 +	/* List of entries (seekable Zip only) */
 +	struct zip_entry	*zip_entries;
 +	struct archive_rb_tree	tree;
 +	struct archive_rb_tree	tree_rsrc;
 +
 +	/* Bytes read but not yet consumed via __archive_read_consume() */
 +	size_t			unconsumed;
 +
 +	/* Information about entry we're currently reading. */
 +	struct zip_entry	*entry;
 +	int64_t			entry_bytes_remaining;
 +
 +	/* These count the number of bytes actually read for the entry. */
 +	int64_t			entry_compressed_bytes_read;
 +	int64_t			entry_uncompressed_bytes_read;
 +
 +	/* Running CRC32 of the decompressed data */
 +	unsigned long		entry_crc32;
 +	unsigned long		(*crc32func)(unsigned long, const void *,
 +				    size_t);
 +	char			ignore_crc32;
 +
 +	/* Flags to mark progress of decompression. */
 +	char			decompress_init;
 +	char			end_of_entry;
 +
 +#ifdef HAVE_ZLIB_H
 +	unsigned char 		*uncompressed_buffer;
 +	size_t 			uncompressed_buffer_size;
 +	z_stream		stream;
 +	char			stream_valid;
 +#endif
 +
 +	struct archive_string_conv *sconv;
 +	struct archive_string_conv *sconv_default;
 +	struct archive_string_conv *sconv_utf8;
 +	int			init_default_conversion;
 +	int			process_mac_extensions;
 +
 +	char			init_decryption;
 +
 +	/* Decryption buffer. */
 +	/*
 +	 * The decrypted data starts at decrypted_ptr and
 +	 * extends for decrypted_bytes_remaining.  Decryption
 +	 * adds new data to the end of this block, data is returned
 +	 * to clients from the beginning.  When the block hits the
 +	 * end of decrypted_buffer, it has to be shuffled back to
 +	 * the beginning of the buffer.
 +	 */
 +	unsigned char 		*decrypted_buffer;
 +	unsigned char 		*decrypted_ptr;
 +	size_t 			decrypted_buffer_size;
 +	size_t 			decrypted_bytes_remaining;
 +	size_t 			decrypted_unconsumed_bytes;
 +
 +	/* Traditional PKWARE decryption. */
 +	struct trad_enc_ctx	tctx;
 +	char			tctx_valid;
 +
- 	/* WinZip AES decyption. */
++	/* WinZip AES decryption. */
 +	/* Contexts used for AES decryption. */
 +	archive_crypto_ctx	cctx;
 +	char			cctx_valid;
 +	archive_hmac_sha1_ctx	hctx;
 +	char			hctx_valid;
 +
 +	/* Strong encryption's decryption header information. */
 +	unsigned		iv_size;
 +	unsigned		alg_id;
 +	unsigned		bit_len;
 +	unsigned		flags;
 +	unsigned		erd_size;
 +	unsigned		v_size;
 +	unsigned		v_crc32;
 +	uint8_t			*iv;
 +	uint8_t			*erd;
 +	uint8_t			*v_data;
 +};
 +
 +/* Many systems define min or MIN, but not all. */
 +#define	zipmin(a,b) ((a) < (b) ? (a) : (b))
 +
 +/* ------------------------------------------------------------------------ */
 +
 +/*
 +  Traditional PKWARE Decryption functions.
 + */
 +
 +static void
 +trad_enc_update_keys(struct trad_enc_ctx *ctx, uint8_t c)
 +{
 +	uint8_t t;
 +#define CRC32(c, b) (crc32(c ^ 0xffffffffUL, &b, 1) ^ 0xffffffffUL)
 +
 +	ctx->keys[0] = CRC32(ctx->keys[0], c);
 +	ctx->keys[1] = (ctx->keys[1] + (ctx->keys[0] & 0xff)) * 134775813L + 1;
 +	t = (ctx->keys[1] >> 24) & 0xff;
 +	ctx->keys[2] = CRC32(ctx->keys[2], t);
 +#undef CRC32
 +}
 +
 +static uint8_t
- trad_enc_decypt_byte(struct trad_enc_ctx *ctx)
++trad_enc_decrypt_byte(struct trad_enc_ctx *ctx)
 +{
 +	unsigned temp = ctx->keys[2] | 2;
 +	return (uint8_t)((temp * (temp ^ 1)) >> 8) & 0xff;
 +}
 +
 +static void
 +trad_enc_decrypt_update(struct trad_enc_ctx *ctx, const uint8_t *in,
 +    size_t in_len, uint8_t *out, size_t out_len)
 +{
 +	unsigned i, max;
 +
 +	max = (unsigned)((in_len < out_len)? in_len: out_len);
 +
 +	for (i = 0; i < max; i++) {
- 		uint8_t t = in[i] ^ trad_enc_decypt_byte(ctx);
++		uint8_t t = in[i] ^ trad_enc_decrypt_byte(ctx);
 +		out[i] = t;
 +		trad_enc_update_keys(ctx, t);
 +	}
 +}
 +
 +static int
 +trad_enc_init(struct trad_enc_ctx *ctx, const char *pw, size_t pw_len,
 +    const uint8_t *key, size_t key_len, uint8_t *crcchk)
 +{
 +	uint8_t header[12];
 +
 +	if (key_len < 12) {
 +		*crcchk = 0xff;
 +		return -1;
 +	}
 +
 +	ctx->keys[0] = 305419896L;
 +	ctx->keys[1] = 591751049L;
 +	ctx->keys[2] = 878082192L;
 +
 +	for (;pw_len; --pw_len)
 +		trad_enc_update_keys(ctx, *pw++);
 +
 +	trad_enc_decrypt_update(ctx, key, 12, header, 12);
 +	/* Return the last byte for CRC check. */
 +	*crcchk = header[11];
 +	return 0;
 +}
 +
 +#if 0
 +static void
 +crypt_derive_key_sha1(const void *p, int size, unsigned char *key,
 +    int key_size)
 +{
 +#define MD_SIZE 20
 +	archive_sha1_ctx ctx;
 +	unsigned char md1[MD_SIZE];
 +	unsigned char md2[MD_SIZE * 2];
 +	unsigned char mkb[64];
 +	int i;
 +
 +	archive_sha1_init(&ctx);
 +	archive_sha1_update(&ctx, p, size);
 +	archive_sha1_final(&ctx, md1);
 +
 +	memset(mkb, 0x36, sizeof(mkb));
 +	for (i = 0; i < MD_SIZE; i++)
 +		mkb[i] ^= md1[i];
 +	archive_sha1_init(&ctx);
 +	archive_sha1_update(&ctx, mkb, sizeof(mkb));
 +	archive_sha1_final(&ctx, md2);
 +
 +	memset(mkb, 0x5C, sizeof(mkb));
 +	for (i = 0; i < MD_SIZE; i++)
 +		mkb[i] ^= md1[i];
 +	archive_sha1_init(&ctx);
 +	archive_sha1_update(&ctx, mkb, sizeof(mkb));
 +	archive_sha1_final(&ctx, md2 + MD_SIZE);
 +
 +	if (key_size > 32)
 +		key_size = 32;
 +	memcpy(key, md2, key_size);
 +#undef MD_SIZE
 +}
 +#endif
 +
 +/*
 + * Common code for streaming or seeking modes.
 + *
 + * Includes code to read local file headers, decompress data
 + * from entry bodies, and common API.
 + */
 +
 +static unsigned long
 +real_crc32(unsigned long crc, const void *buff, size_t len)
 +{
 +	return crc32(crc, buff, (unsigned int)len);
 +}
 +
 +/* Used by "ignorecrc32" option to speed up tests. */
 +static unsigned long
 +fake_crc32(unsigned long crc, const void *buff, size_t len)
 +{
 +	(void)crc; /* UNUSED */
 +	(void)buff; /* UNUSED */
 +	(void)len; /* UNUSED */
 +	return 0;
 +}
 +
 +static struct {
 +	int id;
 +	const char * name;
 +} compression_methods[] = {
 +	{0, "uncompressed"}, /* The file is stored (no compression) */
 +	{1, "shrinking"}, /* The file is Shrunk */
 +	{2, "reduced-1"}, /* The file is Reduced with compression factor 1 */
 +	{3, "reduced-2"}, /* The file is Reduced with compression factor 2 */
 +	{4, "reduced-3"}, /* The file is Reduced with compression factor 3 */
 +	{5, "reduced-4"}, /* The file is Reduced with compression factor 4 */
 +	{6, "imploded"},  /* The file is Imploded */
 +	{7, "reserved"},  /* Reserved for Tokenizing compression algorithm */
 +	{8, "deflation"}, /* The file is Deflated */
 +	{9, "deflation-64-bit"}, /* Enhanced Deflating using Deflate64(tm) */
 +	{10, "ibm-terse"},/* PKWARE Data Compression Library Imploding
 +			   * (old IBM TERSE) */
 +	{11, "reserved"}, /* Reserved by PKWARE */
 +	{12, "bzip"},     /* File is compressed using BZIP2 algorithm */
 +	{13, "reserved"}, /* Reserved by PKWARE */
 +	{14, "lzma"},     /* LZMA (EFS) */
 +	{15, "reserved"}, /* Reserved by PKWARE */
 +	{16, "reserved"}, /* Reserved by PKWARE */
 +	{17, "reserved"}, /* Reserved by PKWARE */
 +	{18, "ibm-terse-new"}, /* File is compressed using IBM TERSE (new) */
 +	{19, "ibm-lz777"},/* IBM LZ77 z Architecture (PFS) */
 +	{97, "wav-pack"}, /* WavPack compressed data */
 +	{98, "ppmd-1"},   /* PPMd version I, Rev 1 */
 +	{99, "aes"}       /* WinZip AES encryption  */
 +};
 +
 +static const char *
 +compression_name(const int compression)
 +{
 +	static const int num_compression_methods =
 +		sizeof(compression_methods)/sizeof(compression_methods[0]);
 +	int i=0;
 +
 +	while(compression >= 0 && i < num_compression_methods) {
 +		if (compression_methods[i].id == compression)
 +			return compression_methods[i].name;
 +		i++;
 +	}
 +	return "??";
 +}
 +
 +/* Convert an MSDOS-style date/time into Unix-style time. */
 +static time_t
 +zip_time(const char *p)
 +{
 +	int msTime, msDate;
 +	struct tm ts;
 +
 +	msTime = (0xff & (unsigned)p[0]) + 256 * (0xff & (unsigned)p[1]);
 +	msDate = (0xff & (unsigned)p[2]) + 256 * (0xff & (unsigned)p[3]);
 +
 +	memset(&ts, 0, sizeof(ts));
 +	ts.tm_year = ((msDate >> 9) & 0x7f) + 80; /* Years since 1900. */
 +	ts.tm_mon = ((msDate >> 5) & 0x0f) - 1; /* Month number. */
 +	ts.tm_mday = msDate & 0x1f; /* Day of month. */
 +	ts.tm_hour = (msTime >> 11) & 0x1f;
 +	ts.tm_min = (msTime >> 5) & 0x3f;
 +	ts.tm_sec = (msTime << 1) & 0x3e;
 +	ts.tm_isdst = -1;
 +	return mktime(&ts);
 +}
 +
 +/*
 + * The extra data is stored as a list of
 + *	id1+size1+data1 + id2+size2+data2 ...
 + *  triplets.  id and size are 2 bytes each.
 + */
- static void
- process_extra(const char *p, size_t extra_length, struct zip_entry* zip_entry)
++static int
++process_extra(struct archive_read *a, const char *p, size_t extra_length, struct zip_entry* zip_entry)
 +{
 +	unsigned offset = 0;
 +
- 	while (offset < extra_length - 4) {
++	if (extra_length == 0) {
++		return ARCHIVE_OK;
++	}
++
++	if (extra_length < 4) {
++		archive_set_error(&a->archive, ARCHIVE_ERRNO_FILE_FORMAT,
++		    "Too-small extra data: Need at least 4 bytes, but only found %d bytes", (int)extra_length);
++		return ARCHIVE_FAILED;
++	}
++	while (offset <= extra_length - 4) {
 +		unsigned short headerid = archive_le16dec(p + offset);
 +		unsigned short datasize = archive_le16dec(p + offset + 2);
 +
 +		offset += 4;
 +		if (offset + datasize > extra_length) {
- 			break;
++			archive_set_error(&a->archive, ARCHIVE_ERRNO_FILE_FORMAT,
++			    "Extra data overflow: Need %d bytes but only found %d bytes",
++			    (int)datasize, (int)(extra_length - offset));
++			return ARCHIVE_FAILED;
 +		}
 +#ifdef DEBUG
 +		fprintf(stderr, "Header id 0x%04x, length %d\n",
 +		    headerid, datasize);
 +#endif
 +		switch (headerid) {
 +		case 0x0001:
 +			/* Zip64 extended information extra field. */
 +			zip_entry->flags |= LA_USED_ZIP64;
 +			if (zip_entry->uncompressed_size == 0xffffffff) {
- 				if (datasize < 8)
- 					break;
- 				zip_entry->uncompressed_size =
- 				    archive_le64dec(p + offset);
++				uint64_t t = 0;
++				if (datasize < 8
++				    || (t = archive_le64dec(p + offset)) > INT64_MAX) {
++					archive_set_error(&a->archive, ARCHIVE_ERRNO_FILE_FORMAT,
++					    "Malformed 64-bit uncompressed size");
++					return ARCHIVE_FAILED;
++				}
++				zip_entry->uncompressed_size = t;
 +				offset += 8;
 +				datasize -= 8;
 +			}
 +			if (zip_entry->compressed_size == 0xffffffff) {
- 				if (datasize < 8)
- 					break;
- 				zip_entry->compressed_size =
- 				    archive_le64dec(p + offset);
++				uint64_t t = 0;
++				if (datasize < 8
++				    || (t = archive_le64dec(p + offset)) > INT64_MAX) {
++					archive_set_error(&a->archive, ARCHIVE_ERRNO_FILE_FORMAT,
++					    "Malformed 64-bit compressed size");
++					return ARCHIVE_FAILED;
++				}
++				zip_entry->compressed_size = t;
 +				offset += 8;
 +				datasize -= 8;
 +			}
 +			if (zip_entry->local_header_offset == 0xffffffff) {
- 				if (datasize < 8)
- 					break;
- 				zip_entry->local_header_offset =
- 				    archive_le64dec(p + offset);
++				uint64_t t = 0;
++				if (datasize < 8
++				    || (t = archive_le64dec(p + offset)) > INT64_MAX) {
++					archive_set_error(&a->archive, ARCHIVE_ERRNO_FILE_FORMAT,
++					    "Malformed 64-bit local header offset");
++					return ARCHIVE_FAILED;
++				}
++				zip_entry->local_header_offset = t;
 +				offset += 8;
 +				datasize -= 8;
 +			}
 +			/* archive_le32dec(p + offset) gives disk
 +			 * on which file starts, but we don't handle
 +			 * multi-volume Zip files. */
 +			break;
 +#ifdef DEBUG
 +		case 0x0017:
 +		{
 +			/* Strong encryption field. */
 +			if (archive_le16dec(p + offset) == 2) {
 +				unsigned algId =
 +					archive_le16dec(p + offset + 2);
 +				unsigned bitLen =
 +					archive_le16dec(p + offset + 4);
 +				int	 flags =
 +					archive_le16dec(p + offset + 6);
 +				fprintf(stderr, "algId=0x%04x, bitLen=%u, "
 +				    "flgas=%d\n", algId, bitLen,flags);
 +			}
 +			break;
 +		}
 +#endif
 +		case 0x5455:
 +		{
 +			/* Extended time field "UT". */
 +			int flags = p[offset];
 +			offset++;
 +			datasize--;
 +			/* Flag bits indicate which dates are present. */
 +			if (flags & 0x01)
 +			{
 +#ifdef DEBUG
 +				fprintf(stderr, "mtime: %lld -> %d\n",
 +				    (long long)zip_entry->mtime,
 +				    archive_le32dec(p + offset));
 +#endif
 +				if (datasize < 4)
 +					break;
 +				zip_entry->mtime = archive_le32dec(p + offset);
 +				offset += 4;
 +				datasize -= 4;
 +			}
 +			if (flags & 0x02)
 +			{
 +				if (datasize < 4)
 +					break;
 +				zip_entry->atime = archive_le32dec(p + offset);
 +				offset += 4;
 +				datasize -= 4;
 +			}
 +			if (flags & 0x04)
 +			{
 +				if (datasize < 4)
 +					break;
 +				zip_entry->ctime = archive_le32dec(p + offset);
 +				offset += 4;
 +				datasize -= 4;
 +			}
 +			break;
 +		}
 +		case 0x5855:
 +		{
 +			/* Info-ZIP Unix Extra Field (old version) "UX". */
 +			if (datasize >= 8) {
 +				zip_entry->atime = archive_le32dec(p + offset);
 +				zip_entry->mtime =
 +				    archive_le32dec(p + offset + 4);
 +			}
 +			if (datasize >= 12) {
 +				zip_entry->uid =
 +				    archive_le16dec(p + offset + 8);
 +				zip_entry->gid =
 +				    archive_le16dec(p + offset + 10);
 +			}
 +			break;
 +		}
 +		case 0x6c78:
 +		{
 +			/* Experimental 'xl' field */
 +			/*
 +			 * Introduced Dec 2013 to provide a way to
 +			 * include external file attributes (and other
 +			 * fields that ordinarily appear only in
 +			 * central directory) in local file header.
 +			 * This provides file type and permission
 +			 * information necessary to support full
 +			 * streaming extraction.  Currently being
 +			 * discussed with other Zip developers
 +			 * ... subject to change.
 +			 *
 +			 * Format:
 +			 *  The field starts with a bitmap that specifies
 +			 *  which additional fields are included.  The
 +			 *  bitmap is variable length and can be extended in
 +			 *  the future.
 +			 *
 +			 *  n bytes - feature bitmap: first byte has low-order
 +			 *    7 bits.  If high-order bit is set, a subsequent
 +			 *    byte holds the next 7 bits, etc.
 +			 *
 +			 *  if bitmap & 1, 2 byte "version made by"
 +			 *  if bitmap & 2, 2 byte "internal file attributes"
 +			 *  if bitmap & 4, 4 byte "external file attributes"
 +			 *  if bitmap & 8, 2 byte comment length + n byte comment
 +			 */
 +			int bitmap, bitmap_last;
 +
 +			if (datasize < 1)
 +				break;
 +			bitmap_last = bitmap = 0xff & p[offset];
 +			offset += 1;
 +			datasize -= 1;
 +
 +			/* We only support first 7 bits of bitmap; skip rest. */
 +			while ((bitmap_last & 0x80) != 0
 +			    && datasize >= 1) {
 +				bitmap_last = p[offset];
 +				offset += 1;
 +				datasize -= 1;
 +			}
 +
 +			if (bitmap & 1) {
 +				/* 2 byte "version made by" */
 +				if (datasize < 2)
 +					break;
 +				zip_entry->system
 +				    = archive_le16dec(p + offset) >> 8;
 +				offset += 2;
 +				datasize -= 2;
 +			}
 +			if (bitmap & 2) {
 +				/* 2 byte "internal file attributes" */
 +				uint32_t internal_attributes;
 +				if (datasize < 2)
 +					break;
 +				internal_attributes
 +				    = archive_le16dec(p + offset);
 +				/* Not used by libarchive at present. */
 +				(void)internal_attributes; /* UNUSED */
 +				offset += 2;
 +				datasize -= 2;
 +			}
 +			if (bitmap & 4) {
 +				/* 4 byte "external file attributes" */
 +				uint32_t external_attributes;
 +				if (datasize < 4)
 +					break;
 +				external_attributes
 +				    = archive_le32dec(p + offset);
 +				if (zip_entry->system == 3) {
 +					zip_entry->mode
 +					    = external_attributes >> 16;
 +				} else if (zip_entry->system == 0) {
 +					// Interpret MSDOS directory bit
 +					if (0x10 == (external_attributes & 0x10)) {
 +						zip_entry->mode = AE_IFDIR | 0775;
 +					} else {
 +						zip_entry->mode = AE_IFREG | 0664;
 +					}
 +					if (0x01 == (external_attributes & 0x01)) {
 +						// Read-only bit; strip write permissions
 +						zip_entry->mode &= 0555;
 +					}
 +				} else {
 +					zip_entry->mode = 0;
 +				}
 +				offset += 4;
 +				datasize -= 4;
 +			}
 +			if (bitmap & 8) {
 +				/* 2 byte comment length + comment */
 +				uint32_t comment_length;
 +				if (datasize < 2)
 +					break;
 +				comment_length
 +				    = archive_le16dec(p + offset);
 +				offset += 2;
 +				datasize -= 2;
 +
 +				if (datasize < comment_length)
 +					break;
 +				/* Comment is not supported by libarchive */
 +				offset += comment_length;
 +				datasize -= comment_length;
 +			}
 +			break;
 +		}
 +		case 0x7855:
 +			/* Info-ZIP Unix Extra Field (type 2) "Ux". */
 +#ifdef DEBUG
 +			fprintf(stderr, "uid %d gid %d\n",
 +			    archive_le16dec(p + offset),
 +			    archive_le16dec(p + offset + 2));
 +#endif
 +			if (datasize >= 2)
 +				zip_entry->uid = archive_le16dec(p + offset);
 +			if (datasize >= 4)
 +				zip_entry->gid =
 +				    archive_le16dec(p + offset + 2);
 +			break;
 +		case 0x7875:
 +		{
 +			/* Info-Zip Unix Extra Field (type 3) "ux". */
 +			int uidsize = 0, gidsize = 0;
 +
 +			/* TODO: support arbitrary uidsize/gidsize. */
 +			if (datasize >= 1 && p[offset] == 1) {/* version=1 */
 +				if (datasize >= 4) {
 +					/* get a uid size. */
 +					uidsize = 0xff & (int)p[offset+1];
 +					if (uidsize == 2)
 +						zip_entry->uid =
 +						    archive_le16dec(
 +						        p + offset + 2);
 +					else if (uidsize == 4 && datasize >= 6)
 +						zip_entry->uid =
 +						    archive_le32dec(
 +						        p + offset + 2);
 +				}
 +				if (datasize >= (2 + uidsize + 3)) {
 +					/* get a gid size. */
 +					gidsize = 0xff & (int)p[offset+2+uidsize];
 +					if (gidsize == 2)
 +						zip_entry->gid =
 +						    archive_le16dec(
 +						        p+offset+2+uidsize+1);
 +					else if (gidsize == 4 &&
 +					    datasize >= (2 + uidsize + 5))
 +						zip_entry->gid =
 +						    archive_le32dec(
 +						        p+offset+2+uidsize+1);
 +				}
 +			}
 +			break;
 +		}
 +		case 0x9901:
- 			/* WinZIp AES extra data field. */
++			/* WinZip AES extra data field. */
 +			if (p[offset + 2] == 'A' && p[offset + 3] == 'E') {
 +				/* Vendor version. */
 +				zip_entry->aes_extra.vendor =
 +				    archive_le16dec(p + offset);
 +				/* AES encryption strength. */
 +				zip_entry->aes_extra.strength = p[offset + 4];
 +				/* Actual compression method. */
 +				zip_entry->aes_extra.compression =
 +				    p[offset + 5];
 +			}
 +			break;
 +		default:
 +			break;
 +		}
 +		offset += datasize;
 +	}
- #ifdef DEBUG
- 	if (offset != extra_length)
- 	{
- 		fprintf(stderr,
- 		    "Extra data field contents do not match reported size!\n");
++	if (offset != extra_length) {
++		archive_set_error(&a->archive, ARCHIVE_ERRNO_FILE_FORMAT,
++		    "Malformed extra data: Consumed %d bytes of %d bytes",
++		    (int)offset, (int)extra_length);
++		return ARCHIVE_FAILED;
 +	}
- #endif
++	return ARCHIVE_OK;
 +}
 +
 +/*
 + * Assumes file pointer is at beginning of local file header.
 + */
 +static int
 +zip_read_local_file_header(struct archive_read *a, struct archive_entry *entry,
 +    struct zip *zip)
 +{
 +	const char *p;
 +	const void *h;
 +	const wchar_t *wp;
 +	const char *cp;
 +	size_t len, filename_length, extra_length;
 +	struct archive_string_conv *sconv;
 +	struct zip_entry *zip_entry = zip->entry;
 +	struct zip_entry zip_entry_central_dir;
 +	int ret = ARCHIVE_OK;
 +	char version;
 +
 +	/* Save a copy of the original for consistency checks. */
 +	zip_entry_central_dir = *zip_entry;
 +
 +	zip->decompress_init = 0;
 +	zip->end_of_entry = 0;
 +	zip->entry_uncompressed_bytes_read = 0;
 +	zip->entry_compressed_bytes_read = 0;
 +	zip->entry_crc32 = zip->crc32func(0, NULL, 0);
 +
 +	/* Setup default conversion. */
 +	if (zip->sconv == NULL && !zip->init_default_conversion) {
 +		zip->sconv_default =
 +		    archive_string_default_conversion_for_read(&(a->archive));
 +		zip->init_default_conversion = 1;
 +	}
 +
 +	if ((p = __archive_read_ahead(a, 30, NULL)) == NULL) {
 +		archive_set_error(&a->archive, ARCHIVE_ERRNO_FILE_FORMAT,
 +		    "Truncated ZIP file header");
 +		return (ARCHIVE_FATAL);
 +	}
 +
 +	if (memcmp(p, "PK\003\004", 4) != 0) {
 +		archive_set_error(&a->archive, -1, "Damaged Zip archive");
 +		return ARCHIVE_FATAL;
 +	}
 +	version = p[4];
 +	zip_entry->system = p[5];
 +	zip_entry->zip_flags = archive_le16dec(p + 6);
 +	if (zip_entry->zip_flags & (ZIP_ENCRYPTED | ZIP_STRONG_ENCRYPTED)) {
 +		zip->has_encrypted_entries = 1;
 +		archive_entry_set_is_data_encrypted(entry, 1);
 +		if (zip_entry->zip_flags & ZIP_CENTRAL_DIRECTORY_ENCRYPTED &&
 +			zip_entry->zip_flags & ZIP_ENCRYPTED &&
 +			zip_entry->zip_flags & ZIP_STRONG_ENCRYPTED) {
 +			archive_entry_set_is_metadata_encrypted(entry, 1);
 +			return ARCHIVE_FATAL;
 +		}
 +	}
 +	zip->init_decryption = (zip_entry->zip_flags & ZIP_ENCRYPTED);
 +	zip_entry->compression = (char)archive_le16dec(p + 8);
 +	zip_entry->mtime = zip_time(p + 10);
 +	zip_entry->crc32 = archive_le32dec(p + 14);
 +	if (zip_entry->zip_flags & ZIP_LENGTH_AT_END)
 +		zip_entry->decdat = p[11];
 +	else
 +		zip_entry->decdat = p[17];
 +	zip_entry->compressed_size = archive_le32dec(p + 18);
 +	zip_entry->uncompressed_size = archive_le32dec(p + 22);
 +	filename_length = archive_le16dec(p + 26);
 +	extra_length = archive_le16dec(p + 28);
 +
 +	__archive_read_consume(a, 30);
 +
 +	/* Read the filename. */
 +	if ((h = __archive_read_ahead(a, filename_length, NULL)) == NULL) {
 +		archive_set_error(&a->archive, ARCHIVE_ERRNO_FILE_FORMAT,
 +		    "Truncated ZIP file header");
 +		return (ARCHIVE_FATAL);
 +	}
 +	if (zip_entry->zip_flags & ZIP_UTF8_NAME) {
 +		/* The filename is stored to be UTF-8. */
 +		if (zip->sconv_utf8 == NULL) {
 +			zip->sconv_utf8 =
 +			    archive_string_conversion_from_charset(
 +				&a->archive, "UTF-8", 1);
 +			if (zip->sconv_utf8 == NULL)
 +				return (ARCHIVE_FATAL);
 +		}
 +		sconv = zip->sconv_utf8;
 +	} else if (zip->sconv != NULL)
 +		sconv = zip->sconv;
 +	else
 +		sconv = zip->sconv_default;
 +
 +	if (archive_entry_copy_pathname_l(entry,
 +	    h, filename_length, sconv) != 0) {
 +		if (errno == ENOMEM) {
 +			archive_set_error(&a->archive, ENOMEM,
 +			    "Can't allocate memory for Pathname");
 +			return (ARCHIVE_FATAL);
 +		}
 +		archive_set_error(&a->archive,
 +		    ARCHIVE_ERRNO_FILE_FORMAT,
 +		    "Pathname cannot be converted "
 +		    "from %s to current locale.",
 +		    archive_string_conversion_charset_name(sconv));
 +		ret = ARCHIVE_WARN;
 +	}
 +	__archive_read_consume(a, filename_length);
 +
 +	/* Read the extra data. */
 +	if ((h = __archive_read_ahead(a, extra_length, NULL)) == NULL) {
 +		archive_set_error(&a->archive, ARCHIVE_ERRNO_FILE_FORMAT,
 +		    "Truncated ZIP file header");
 +		return (ARCHIVE_FATAL);
 +	}
 +
- 	process_extra(h, extra_length, zip_entry);
++	if (ARCHIVE_OK != process_extra(a, h, extra_length, zip_entry)) {
++		return ARCHIVE_FATAL;
++	}
 +	__archive_read_consume(a, extra_length);
 +
 +	/* Work around a bug in Info-Zip: When reading from a pipe, it
 +	 * stats the pipe instead of synthesizing a file entry. */
 +	if ((zip_entry->mode & AE_IFMT) == AE_IFIFO) {
 +		zip_entry->mode &= ~ AE_IFMT;
 +		zip_entry->mode |= AE_IFREG;
 +	}
 +
- 	if ((zip_entry->mode & AE_IFMT) == 0) {
- 		/* Especially in streaming mode, we can end up
- 		   here without having seen proper mode information.
- 		   Guess from the filename. */
++	/* If the mode is totally empty, set some sane default. */
++	if (zip_entry->mode == 0) {
++		zip_entry->mode |= 0664;
++	}
++
++	/* Make sure that entries with a trailing '/' are marked as directories
++	 * even if the External File Attributes contains bogus values.  If this
++	 * is not a directory and there is no type, assume regularfile. */
++	if ((zip_entry->mode & AE_IFMT) != AE_IFDIR) {
++		int has_slash;
++
 +		wp = archive_entry_pathname_w(entry);
 +		if (wp != NULL) {
 +			len = wcslen(wp);
- 			if (len > 0 && wp[len - 1] == L'/')
- 				zip_entry->mode |= AE_IFDIR;
- 			else
- 				zip_entry->mode |= AE_IFREG;
++			has_slash = len > 0 && wp[len - 1] == L'/';
 +		} else {
 +			cp = archive_entry_pathname(entry);
 +			len = (cp != NULL)?strlen(cp):0;
- 			if (len > 0 && cp[len - 1] == '/')
- 				zip_entry->mode |= AE_IFDIR;
- 			else
- 				zip_entry->mode |= AE_IFREG;
++			has_slash = len > 0 && cp[len - 1] == '/';
 +		}
- 		if (zip_entry->mode == AE_IFDIR) {
- 			zip_entry->mode |= 0775;
- 		} else if (zip_entry->mode == AE_IFREG) {
- 			zip_entry->mode |= 0664;
++		/* Correct file type as needed. */
++		if (has_slash) {
++			zip_entry->mode &= ~AE_IFMT;
++			zip_entry->mode |= AE_IFDIR;
++			zip_entry->mode |= 0111;
++		} else if ((zip_entry->mode & AE_IFMT) == 0) {
++			zip_entry->mode |= AE_IFREG;
 +		}
 +	}
 +
 +	/* Make sure directories end in '/' */
 +	if ((zip_entry->mode & AE_IFMT) == AE_IFDIR) {
 +		wp = archive_entry_pathname_w(entry);
 +		if (wp != NULL) {
 +			len = wcslen(wp);
 +			if (len > 0 && wp[len - 1] != L'/') {
 +				struct archive_wstring s;
 +				archive_string_init(&s);
 +				archive_wstrcat(&s, wp);
 +				archive_wstrappend_wchar(&s, L'/');
 +				archive_entry_copy_pathname_w(entry, s.s);
++				archive_wstring_free(&s);
 +			}
 +		} else {
 +			cp = archive_entry_pathname(entry);
 +			len = (cp != NULL)?strlen(cp):0;
 +			if (len > 0 && cp[len - 1] != '/') {
 +				struct archive_string s;
 +				archive_string_init(&s);
 +				archive_strcat(&s, cp);
 +				archive_strappend_char(&s, '/');
 +				archive_entry_set_pathname(entry, s.s);
++				archive_string_free(&s);
 +			}
 +		}
 +	}
 +
 +	if (zip_entry->flags & LA_FROM_CENTRAL_DIRECTORY) {
 +		/* If this came from the central dir, it's size info
 +		 * is definitive, so ignore the length-at-end flag. */
 +		zip_entry->zip_flags &= ~ZIP_LENGTH_AT_END;
 +		/* If local header is missing a value, use the one from
 +		   the central directory.  If both have it, warn about
 +		   mismatches. */
 +		if (zip_entry->crc32 == 0) {
 +			zip_entry->crc32 = zip_entry_central_dir.crc32;
 +		} else if (!zip->ignore_crc32
 +		    && zip_entry->crc32 != zip_entry_central_dir.crc32) {
 +			archive_set_error(&a->archive,
 +			    ARCHIVE_ERRNO_FILE_FORMAT,
 +			    "Inconsistent CRC32 values");
 +			ret = ARCHIVE_WARN;
 +		}
 +		if (zip_entry->compressed_size == 0) {
 +			zip_entry->compressed_size
 +			    = zip_entry_central_dir.compressed_size;
 +		} else if (zip_entry->compressed_size
 +		    != zip_entry_central_dir.compressed_size) {
 +			archive_set_error(&a->archive,
 +			    ARCHIVE_ERRNO_FILE_FORMAT,
 +			    "Inconsistent compressed size: "
 +			    "%jd in central directory, %jd in local header",
 +			    (intmax_t)zip_entry_central_dir.compressed_size,
 +			    (intmax_t)zip_entry->compressed_size);
 +			ret = ARCHIVE_WARN;
 +		}
 +		if (zip_entry->uncompressed_size == 0) {
 +			zip_entry->uncompressed_size
 +			    = zip_entry_central_dir.uncompressed_size;
 +		} else if (zip_entry->uncompressed_size
 +		    != zip_entry_central_dir.uncompressed_size) {
 +			archive_set_error(&a->archive,
 +			    ARCHIVE_ERRNO_FILE_FORMAT,
 +			    "Inconsistent uncompressed size: "
 +			    "%jd in central directory, %jd in local header",
 +			    (intmax_t)zip_entry_central_dir.uncompressed_size,
 +			    (intmax_t)zip_entry->uncompressed_size);
 +			ret = ARCHIVE_WARN;
 +		}
 +	}
 +
 +	/* Populate some additional entry fields: */
 +	archive_entry_set_mode(entry, zip_entry->mode);
 +	archive_entry_set_uid(entry, zip_entry->uid);
 +	archive_entry_set_gid(entry, zip_entry->gid);
 +	archive_entry_set_mtime(entry, zip_entry->mtime, 0);
 +	archive_entry_set_ctime(entry, zip_entry->ctime, 0);
 +	archive_entry_set_atime(entry, zip_entry->atime, 0);
 +
 +	if ((zip->entry->mode & AE_IFMT) == AE_IFLNK) {
 +		size_t linkname_length;
 +
 +		if (zip_entry->compressed_size > 64 * 1024) {
 +			archive_set_error(&a->archive, ARCHIVE_ERRNO_MISC,
 +			    "Zip file with oversized link entry");
 +			return ARCHIVE_FATAL;
 +		}
 +
 +		linkname_length = (size_t)zip_entry->compressed_size;
 +
 +		archive_entry_set_size(entry, 0);
 +		p = __archive_read_ahead(a, linkname_length, NULL);
 +		if (p == NULL) {
 +			archive_set_error(&a->archive, ARCHIVE_ERRNO_MISC,
 +			    "Truncated Zip file");
 +			return ARCHIVE_FATAL;
 +		}
 +
 +		sconv = zip->sconv;
 +		if (sconv == NULL && (zip->entry->zip_flags & ZIP_UTF8_NAME))
 +			sconv = zip->sconv_utf8;
 +		if (sconv == NULL)
 +			sconv = zip->sconv_default;
 +		if (archive_entry_copy_symlink_l(entry, p, linkname_length,
 +		    sconv) != 0) {
 +			if (errno != ENOMEM && sconv == zip->sconv_utf8 &&
 +			    (zip->entry->zip_flags & ZIP_UTF8_NAME))
 +			    archive_entry_copy_symlink_l(entry, p,
 +				linkname_length, NULL);
 +			if (errno == ENOMEM) {
 +				archive_set_error(&a->archive, ENOMEM,
 +				    "Can't allocate memory for Symlink");
 +				return (ARCHIVE_FATAL);
 +			}
 +			/*
 +			 * Since there is no character-set regulation for
 +			 * symlink name, do not report the conversion error
 +			 * in an automatic conversion.
 +			 */
 +			if (sconv != zip->sconv_utf8 ||
 +			    (zip->entry->zip_flags & ZIP_UTF8_NAME) == 0) {
 +				archive_set_error(&a->archive,
 +				    ARCHIVE_ERRNO_FILE_FORMAT,
 +				    "Symlink cannot be converted "
 +				    "from %s to current locale.",
 +				    archive_string_conversion_charset_name(
 +					sconv));
 +				ret = ARCHIVE_WARN;
 +			}
 +		}
 +		zip_entry->uncompressed_size = zip_entry->compressed_size = 0;
 +
 +		if (__archive_read_consume(a, linkname_length) < 0) {
 +			archive_set_error(&a->archive, ARCHIVE_ERRNO_MISC,
 +			    "Read error skipping symlink target name");
 +			return ARCHIVE_FATAL;
 +		}
 +	} else if (0 == (zip_entry->zip_flags & ZIP_LENGTH_AT_END)
 +	    || zip_entry->uncompressed_size > 0) {
 +		/* Set the size only if it's meaningful. */
 +		archive_entry_set_size(entry, zip_entry->uncompressed_size);
 +	}
 +	zip->entry_bytes_remaining = zip_entry->compressed_size;
 +
 +	/* If there's no body, force read_data() to return EOF immediately. */
 +	if (0 == (zip_entry->zip_flags & ZIP_LENGTH_AT_END)
 +	    && zip->entry_bytes_remaining < 1)
 +		zip->end_of_entry = 1;
 +
 +	/* Set up a more descriptive format name. */
 +	archive_string_sprintf(&zip->format_name, "ZIP %d.%d (%s)",
 +	    version / 10, version % 10,
 +	    compression_name(zip->entry->compression));
 +	a->archive.archive_format_name = zip->format_name.s;
 +
 +	return (ret);
 +}
 +
 +static int
 +check_authentication_code(struct archive_read *a, const void *_p)
 +{
 +	struct zip *zip = (struct zip *)(a->format->data);
 +
 +	/* Check authentication code. */
 +	if (zip->hctx_valid) {
 +		const void *p;
 +		uint8_t hmac[20];
 +		size_t hmac_len = 20;
 +		int cmp;
 +
 +		archive_hmac_sha1_final(&zip->hctx, hmac, &hmac_len);
 +		if (_p == NULL) {
 +			/* Read authentication code. */
 +			p = __archive_read_ahead(a, AUTH_CODE_SIZE, NULL);
 +			if (p == NULL) {
 +				archive_set_error(&a->archive,
 +				    ARCHIVE_ERRNO_FILE_FORMAT,
 +				    "Truncated ZIP file data");
 +				return (ARCHIVE_FATAL);
 +			}
 +		} else {
 +			p = _p;
 +		}
 +		cmp = memcmp(hmac, p, AUTH_CODE_SIZE);
 +		__archive_read_consume(a, AUTH_CODE_SIZE);
 +		if (cmp != 0) {
 +			archive_set_error(&a->archive,
 +			    ARCHIVE_ERRNO_MISC,
 +			    "ZIP bad Authentication code");
 +			return (ARCHIVE_WARN);
 +		}
 +	}
 +	return (ARCHIVE_OK);
 +}
 +
 +/*
 + * Read "uncompressed" data.  There are three cases:
 + *  1) We know the size of the data.  This is always true for the
 + * seeking reader (we've examined the Central Directory already).
 + *  2) ZIP_LENGTH_AT_END was set, but only the CRC was deferred.
 + * Info-ZIP seems to do this; we know the size but have to grab
 + * the CRC from the data descriptor afterwards.
 + *  3) We're streaming and ZIP_LENGTH_AT_END was specified and
 + * we have no size information.  In this case, we can do pretty
 + * well by watching for the data descriptor record.  The data
 + * descriptor is 16 bytes and includes a computed CRC that should
 + * provide a strong check.
 + *
 + * TODO: Technically, the PK\007\010 signature is optional.
 + * In the original spec, the data descriptor contained CRC
 + * and size fields but had no leading signature.  In practice,
 + * newer writers seem to provide the signature pretty consistently.
 + *
 + * For uncompressed data, the PK\007\010 marker seems essential
 + * to be sure we've actually seen the end of the entry.
 + *
 + * Returns ARCHIVE_OK if successful, ARCHIVE_FATAL otherwise, sets
 + * zip->end_of_entry if it consumes all of the data.
 + */
 +static int
 +zip_read_data_none(struct archive_read *a, const void **_buff,
 +    size_t *size, int64_t *offset)
 +{
 +	struct zip *zip;
 +	const char *buff;
 +	ssize_t bytes_avail;
 +	int r;
 +
 +	(void)offset; /* UNUSED */
 +
 +	zip = (struct zip *)(a->format->data);
 +
 +	if (zip->entry->zip_flags & ZIP_LENGTH_AT_END) {
 +		const char *p;
 +		ssize_t grabbing_bytes = 24;
 +
 +		if (zip->hctx_valid)
 +			grabbing_bytes += AUTH_CODE_SIZE;
 +		/* Grab at least 24 bytes. */
 +		buff = __archive_read_ahead(a, grabbing_bytes, &bytes_avail);
 +		if (bytes_avail < grabbing_bytes) {
 +			/* Zip archives have end-of-archive markers
 +			   that are longer than this, so a failure to get at
 +			   least 24 bytes really does indicate a truncated
 +			   file. */
 +			archive_set_error(&a->archive,
 +			    ARCHIVE_ERRNO_FILE_FORMAT,
 +			    "Truncated ZIP file data");
 +			return (ARCHIVE_FATAL);
 +		}
 +		/* Check for a complete PK\007\010 signature, followed
 +		 * by the correct 4-byte CRC. */
 +		p = buff;
 +		if (zip->hctx_valid)
 +			p += AUTH_CODE_SIZE;
 +		if (p[0] == 'P' && p[1] == 'K'
 +		    && p[2] == '\007' && p[3] == '\010'
 +		    && (archive_le32dec(p + 4) == zip->entry_crc32
 +			|| zip->ignore_crc32
 +			|| (zip->hctx_valid
 +			 && zip->entry->aes_extra.vendor == AES_VENDOR_AE_2))) {
 +			if (zip->entry->flags & LA_USED_ZIP64) {
++				uint64_t compressed, uncompressed;
 +				zip->entry->crc32 = archive_le32dec(p + 4);
- 				zip->entry->compressed_size =
- 					archive_le64dec(p + 8);
- 				zip->entry->uncompressed_size =
- 					archive_le64dec(p + 16);
++				compressed = archive_le64dec(p + 8);
++				uncompressed = archive_le64dec(p + 16);
++				if (compressed > INT64_MAX || uncompressed > INT64_MAX) {
++					archive_set_error(&a->archive,
++					    ARCHIVE_ERRNO_FILE_FORMAT,
++					    "Overflow of 64-bit file sizes");
++					return ARCHIVE_FAILED;
++				}
++				zip->entry->compressed_size = compressed;
++				zip->entry->uncompressed_size = uncompressed;
 +				zip->unconsumed = 24;
 +			} else {
 +				zip->entry->crc32 = archive_le32dec(p + 4);
 +				zip->entry->compressed_size =
 +					archive_le32dec(p + 8);
 +				zip->entry->uncompressed_size =
 +					archive_le32dec(p + 12);
 +				zip->unconsumed = 16;
 +			}
 +			if (zip->hctx_valid) {
 +				r = check_authentication_code(a, buff);
 +				if (r != ARCHIVE_OK)
 +					return (r);
 +			}
 +			zip->end_of_entry = 1;
 +			return (ARCHIVE_OK);
 +		}
 +		/* If not at EOF, ensure we consume at least one byte. */
 +		++p;
 +
 +		/* Scan forward until we see where a PK\007\010 signature
 +		 * might be. */
 +		/* Return bytes up until that point.  On the next call,
 +		 * the code above will verify the data descriptor. */
 +		while (p < buff + bytes_avail - 4) {
 +			if (p[3] == 'P') { p += 3; }
 +			else if (p[3] == 'K') { p += 2; }
 +			else if (p[3] == '\007') { p += 1; }
 +			else if (p[3] == '\010' && p[2] == '\007'
 +			    && p[1] == 'K' && p[0] == 'P') {
 +				if (zip->hctx_valid)
 +					p -= AUTH_CODE_SIZE;
 +				break;
 +			} else { p += 4; }
 +		}
 +		bytes_avail = p - buff;
 +	} else {
 +		if (zip->entry_bytes_remaining == 0) {
 +			zip->end_of_entry = 1;
 +			if (zip->hctx_valid) {
 +				r = check_authentication_code(a, NULL);
 +				if (r != ARCHIVE_OK)
 +					return (r);
 +			}
 +			return (ARCHIVE_OK);
 +		}
 +		/* Grab a bunch of bytes. */
 +		buff = __archive_read_ahead(a, 1, &bytes_avail);
 +		if (bytes_avail <= 0) {
 +			archive_set_error(&a->archive,
 +			    ARCHIVE_ERRNO_FILE_FORMAT,
 +			    "Truncated ZIP file data");
 +			return (ARCHIVE_FATAL);
 +		}
 +		if (bytes_avail > zip->entry_bytes_remaining)
 +			bytes_avail = (ssize_t)zip->entry_bytes_remaining;
 +	}
 +	if (zip->tctx_valid || zip->cctx_valid) {
 +		size_t dec_size = bytes_avail;
 +
 +		if (dec_size > zip->decrypted_buffer_size)
 +			dec_size = zip->decrypted_buffer_size;
 +		if (zip->tctx_valid) {
 +			trad_enc_decrypt_update(&zip->tctx,
 +			    (const uint8_t *)buff, dec_size,
 +			    zip->decrypted_buffer, dec_size);
 +		} else {
 +			size_t dsize = dec_size;
 +			archive_hmac_sha1_update(&zip->hctx,
 +			    (const uint8_t *)buff, dec_size);
 +			archive_decrypto_aes_ctr_update(&zip->cctx,
 +			    (const uint8_t *)buff, dec_size,
 +			    zip->decrypted_buffer, &dsize);
 +		}
 +		bytes_avail = dec_size;
 +		buff = (const char *)zip->decrypted_buffer;
 +	}
 +	*size = bytes_avail;
 +	zip->entry_bytes_remaining -= bytes_avail;
 +	zip->entry_uncompressed_bytes_read += bytes_avail;
 +	zip->entry_compressed_bytes_read += bytes_avail;
 +	zip->unconsumed += bytes_avail;
 +	*_buff = buff;
 +	return (ARCHIVE_OK);
 +}
 +
 +#ifdef HAVE_ZLIB_H
 +static int
 +zip_deflate_init(struct archive_read *a, struct zip *zip)
 +{
 +	int r;
 +
 +	/* If we haven't yet read any data, initialize the decompressor. */
 +	if (!zip->decompress_init) {
 +		if (zip->stream_valid)
 +			r = inflateReset(&zip->stream);
 +		else
 +			r = inflateInit2(&zip->stream,
 +			    -15 /* Don't check for zlib header */);
 +		if (r != Z_OK) {
 +			archive_set_error(&a->archive, ARCHIVE_ERRNO_MISC,
 +			    "Can't initialize ZIP decompression.");
 +			return (ARCHIVE_FATAL);
 +		}
 +		/* Stream structure has been set up. */
 +		zip->stream_valid = 1;
 +		/* We've initialized decompression for this stream. */
 +		zip->decompress_init = 1;
 +	}
 +	return (ARCHIVE_OK);
 +}
 +
 +static int
 +zip_read_data_deflate(struct archive_read *a, const void **buff,
 +    size_t *size, int64_t *offset)
 +{
 +	struct zip *zip;
 +	ssize_t bytes_avail;
 +	const void *compressed_buff, *sp;
 +	int r;
 +
 +	(void)offset; /* UNUSED */
 +
 +	zip = (struct zip *)(a->format->data);
 +
 +	/* If the buffer hasn't been allocated, allocate it now. */
 +	if (zip->uncompressed_buffer == NULL) {
 +		zip->uncompressed_buffer_size = 256 * 1024;
 +		zip->uncompressed_buffer
 +		    = (unsigned char *)malloc(zip->uncompressed_buffer_size);
 +		if (zip->uncompressed_buffer == NULL) {
 +			archive_set_error(&a->archive, ENOMEM,
 +			    "No memory for ZIP decompression");
 +			return (ARCHIVE_FATAL);
 +		}
 +	}
 +
 +	r = zip_deflate_init(a, zip);
 +	if (r != ARCHIVE_OK)
 +		return (r);
 +
 +	/*
 +	 * Note: '1' here is a performance optimization.
 +	 * Recall that the decompression layer returns a count of
 +	 * available bytes; asking for more than that forces the
 +	 * decompressor to combine reads by copying data.
 +	 */
 +	compressed_buff = sp = __archive_read_ahead(a, 1, &bytes_avail);
 +	if (0 == (zip->entry->zip_flags & ZIP_LENGTH_AT_END)
 +	    && bytes_avail > zip->entry_bytes_remaining) {
 +		bytes_avail = (ssize_t)zip->entry_bytes_remaining;
 +	}
- 	if (bytes_avail <= 0) {
++	if (bytes_avail < 0) {
 +		archive_set_error(&a->archive, ARCHIVE_ERRNO_FILE_FORMAT,
 +		    "Truncated ZIP file body");
 +		return (ARCHIVE_FATAL);
 +	}
 +
 +	if (zip->tctx_valid || zip->cctx_valid) {
 +		if (zip->decrypted_bytes_remaining < (size_t)bytes_avail) {
 +			size_t buff_remaining =
 +			    (zip->decrypted_buffer + zip->decrypted_buffer_size)
 +			    - (zip->decrypted_ptr + zip->decrypted_bytes_remaining);
 +
 +			if (buff_remaining > (size_t)bytes_avail)
 +				buff_remaining = (size_t)bytes_avail;
 +
 +			if (0 == (zip->entry->zip_flags & ZIP_LENGTH_AT_END) &&
 +			      zip->entry_bytes_remaining > 0) {
 +				if ((int64_t)(zip->decrypted_bytes_remaining
 +				    + buff_remaining)
 +				      > zip->entry_bytes_remaining) {
 +					if (zip->entry_bytes_remaining <
 +					      (int64_t)zip->decrypted_bytes_remaining)
 +						buff_remaining = 0;
 +					else
 +						buff_remaining =
 +						    (size_t)zip->entry_bytes_remaining
 +						      - zip->decrypted_bytes_remaining;
 +				}
 +			}
 +			if (buff_remaining > 0) {
 +				if (zip->tctx_valid) {
 +					trad_enc_decrypt_update(&zip->tctx,
 +					    compressed_buff, buff_remaining,
 +					    zip->decrypted_ptr
 +					      + zip->decrypted_bytes_remaining,
 +					    buff_remaining);
 +				} else {
 +					size_t dsize = buff_remaining;
 +					archive_decrypto_aes_ctr_update(
 +					    &zip->cctx,
 +					    compressed_buff, buff_remaining,
 +					    zip->decrypted_ptr
 +					      + zip->decrypted_bytes_remaining,
 +					    &dsize);
 +				}
 +				zip->decrypted_bytes_remaining += buff_remaining;
 +			}
 +		}
 +		bytes_avail = zip->decrypted_bytes_remaining;
 +		compressed_buff = (const char *)zip->decrypted_ptr;
 +	}
 +
 +	/*
 +	 * A bug in zlib.h: stream.next_in should be marked 'const'
 +	 * but isn't (the library never alters data through the
 +	 * next_in pointer, only reads it).  The result: this ugly
 +	 * cast to remove 'const'.
 +	 */
 +	zip->stream.next_in = (Bytef *)(uintptr_t)(const void *)compressed_buff;
 +	zip->stream.avail_in = (uInt)bytes_avail;
 +	zip->stream.total_in = 0;
 +	zip->stream.next_out = zip->uncompressed_buffer;
 +	zip->stream.avail_out = (uInt)zip->uncompressed_buffer_size;
 +	zip->stream.total_out = 0;
 +
 +	r = inflate(&zip->stream, 0);
 +	switch (r) {
 +	case Z_OK:
 +		break;
 +	case Z_STREAM_END:
 +		zip->end_of_entry = 1;
 +		break;
 +	case Z_MEM_ERROR:
 +		archive_set_error(&a->archive, ENOMEM,
 +		    "Out of memory for ZIP decompression");
 +		return (ARCHIVE_FATAL);
 +	default:
 +		archive_set_error(&a->archive, ARCHIVE_ERRNO_MISC,
 +		    "ZIP decompression failed (%d)", r);
 +		return (ARCHIVE_FATAL);
 +	}
 +
 +	/* Consume as much as the compressor actually used. */
 +	bytes_avail = zip->stream.total_in;
 +	if (zip->tctx_valid || zip->cctx_valid) {
 +		zip->decrypted_bytes_remaining -= bytes_avail;
 +		if (zip->decrypted_bytes_remaining == 0)
 +			zip->decrypted_ptr = zip->decrypted_buffer;
 +		else
 +			zip->decrypted_ptr += bytes_avail;
 +	}
 +	/* Calculate compressed data as much as we used.*/
 +	if (zip->hctx_valid)
 +		archive_hmac_sha1_update(&zip->hctx, sp, bytes_avail);
 +	__archive_read_consume(a, bytes_avail);
 +	zip->entry_bytes_remaining -= bytes_avail;
 +	zip->entry_compressed_bytes_read += bytes_avail;
 +
 +	*size = zip->stream.total_out;
 +	zip->entry_uncompressed_bytes_read += zip->stream.total_out;
 +	*buff = zip->uncompressed_buffer;
 +
 +	if (zip->end_of_entry && zip->hctx_valid) {
 +		r = check_authentication_code(a, NULL);
 +		if (r != ARCHIVE_OK)
 +			return (r);
 +	}
 +
 +	if (zip->end_of_entry && (zip->entry->zip_flags & ZIP_LENGTH_AT_END)) {
 +		const char *p;
 +
 +		if (NULL == (p = __archive_read_ahead(a, 24, NULL))) {
 +			archive_set_error(&a->archive,
 +			    ARCHIVE_ERRNO_FILE_FORMAT,
 +			    "Truncated ZIP end-of-file record");
 +			return (ARCHIVE_FATAL);
 +		}
 +		/* Consume the optional PK\007\010 marker. */
 +		if (p[0] == 'P' && p[1] == 'K' &&
 +		    p[2] == '\007' && p[3] == '\010') {
 +			p += 4;
 +			zip->unconsumed = 4;
 +		}
 +		if (zip->entry->flags & LA_USED_ZIP64) {
++			uint64_t compressed, uncompressed;
 +			zip->entry->crc32 = archive_le32dec(p);
- 			zip->entry->compressed_size = archive_le64dec(p + 4);
- 			zip->entry->uncompressed_size = archive_le64dec(p + 12);
++			compressed = archive_le64dec(p + 4);
++			uncompressed = archive_le64dec(p + 12);
++			if (compressed > INT64_MAX || uncompressed > INT64_MAX) {
++				archive_set_error(&a->archive,
++				    ARCHIVE_ERRNO_FILE_FORMAT,
++				    "Overflow of 64-bit file sizes");
++				return ARCHIVE_FAILED;
++			}
++			zip->entry->compressed_size = compressed;
++			zip->entry->uncompressed_size = uncompressed;
 +			zip->unconsumed += 20;
 +		} else {
 +			zip->entry->crc32 = archive_le32dec(p);
 +			zip->entry->compressed_size = archive_le32dec(p + 4);
 +			zip->entry->uncompressed_size = archive_le32dec(p + 8);
 +			zip->unconsumed += 12;
 +		}
 +	}
 +
 +	return (ARCHIVE_OK);
 +}
 +#endif
 +
 +static int
 +read_decryption_header(struct archive_read *a)
 +{
 +	struct zip *zip = (struct zip *)(a->format->data);
 +	const char *p;
 +	unsigned int remaining_size;
 +	unsigned int ts;
 +
 +	/*
 +	 * Read an initialization vector data field.
 +	 */
 +	p = __archive_read_ahead(a, 2, NULL);
 +	if (p == NULL)
 +		goto truncated;
 +	ts = zip->iv_size;
 +	zip->iv_size = archive_le16dec(p);
 +	__archive_read_consume(a, 2);
 +	if (ts < zip->iv_size) {
 +		free(zip->iv);
 +		zip->iv = NULL;
 +	}
 +	p = __archive_read_ahead(a, zip->iv_size, NULL);
 +	if (p == NULL)
 +		goto truncated;
 +	if (zip->iv == NULL) {
 +		zip->iv = malloc(zip->iv_size);
 +		if (zip->iv == NULL)
 +			goto nomem;
 +	}
 +	memcpy(zip->iv, p, zip->iv_size);
 +	__archive_read_consume(a, zip->iv_size);
 +
 +	/*
 +	 * Read a size of remaining decryption header field.
 +	 */
 +	p = __archive_read_ahead(a, 14, NULL);
 +	if (p == NULL)
 +		goto truncated;
 +	remaining_size = archive_le32dec(p);
 +	if (remaining_size < 16 || remaining_size > (1 << 18))
 +		goto corrupted;
 +
 +	/* Check if format version is supported. */
 +	if (archive_le16dec(p+4) != 3) {
 +		archive_set_error(&a->archive,
 +		    ARCHIVE_ERRNO_FILE_FORMAT,
 +		    "Unsupported encryption format version: %u",
 +		    archive_le16dec(p+4));
 +		return (ARCHIVE_FAILED);
 +	}
 +
 +	/*
 +	 * Read an encryption algorithm field.
 +	 */
 +	zip->alg_id = archive_le16dec(p+6);
 +	switch (zip->alg_id) {
 +	case 0x6601:/* DES */
 +	case 0x6602:/* RC2 */
 +	case 0x6603:/* 3DES 168 */
 +	case 0x6609:/* 3DES 112 */
 +	case 0x660E:/* AES 128 */
 +	case 0x660F:/* AES 192 */
 +	case 0x6610:/* AES 256 */
 +	case 0x6702:/* RC2 (version >= 5.2) */
 +	case 0x6720:/* Blowfish */
 +	case 0x6721:/* Twofish */
 +	case 0x6801:/* RC4 */
- 		/* Suuported encryption algorithm. */
++		/* Supported encryption algorithm. */
 +		break;
 +	default:
 +		archive_set_error(&a->archive,
 +		    ARCHIVE_ERRNO_FILE_FORMAT,
 +		    "Unknown encryption algorithm: %u", zip->alg_id);
 +		return (ARCHIVE_FAILED);
 +	}
 +
 +	/*
 +	 * Read a bit length field.
 +	 */
 +	zip->bit_len = archive_le16dec(p+8);
 +
 +	/*
 +	 * Read a flags field.
 +	 */
 +	zip->flags = archive_le16dec(p+10);
 +	switch (zip->flags & 0xf000) {
 +	case 0x0001: /* Password is required to decrypt. */
 +	case 0x0002: /* Certificates only. */
 +	case 0x0003: /* Password or certificate required to decrypt. */
 +		break;
 +	default:
 +		archive_set_error(&a->archive,
 +		    ARCHIVE_ERRNO_FILE_FORMAT,
 +		    "Unknown encryption flag: %u", zip->flags);
 +		return (ARCHIVE_FAILED);
 +	}
 +	if ((zip->flags & 0xf000) == 0 ||
 +	    (zip->flags & 0xf000) == 0x4000) {
 +		archive_set_error(&a->archive,
 +		    ARCHIVE_ERRNO_FILE_FORMAT,
 +		    "Unknown encryption flag: %u", zip->flags);
 +		return (ARCHIVE_FAILED);
 +	}
 +
 +	/*
 +	 * Read an encrypted random data field.
 +	 */
 +	ts = zip->erd_size;
 +	zip->erd_size = archive_le16dec(p+12);
 +	__archive_read_consume(a, 14);
 +	if ((zip->erd_size & 0xf) != 0 ||
 +	    (zip->erd_size + 16) > remaining_size ||
 +	    (zip->erd_size + 16) < zip->erd_size)
 +		goto corrupted;
 +
 +	if (ts < zip->erd_size) {
 +		free(zip->erd);
 +		zip->erd = NULL;
 +	}
 +	p = __archive_read_ahead(a, zip->erd_size, NULL);
 +	if (p == NULL)
 +		goto truncated;
 +	if (zip->erd == NULL) {
 +		zip->erd = malloc(zip->erd_size);
 +		if (zip->erd == NULL)
 +			goto nomem;
 +	}
 +	memcpy(zip->erd, p, zip->erd_size);
 +	__archive_read_consume(a, zip->erd_size);
 +
 +	/*
 +	 * Read a reserved data field.
 +	 */
 +	p = __archive_read_ahead(a, 4, NULL);
 +	if (p == NULL)
 +		goto truncated;
 +	/* Reserved data size should be zero. */
 +	if (archive_le32dec(p) != 0)
 +		goto corrupted;
 +	__archive_read_consume(a, 4);
 +
 +	/*
 +	 * Read a password validation data field.
 +	 */
 +	p = __archive_read_ahead(a, 2, NULL);
 +	if (p == NULL)
 +		goto truncated;
 +	ts = zip->v_size;
 +	zip->v_size = archive_le16dec(p);
 +	__archive_read_consume(a, 2);
 +	if ((zip->v_size & 0x0f) != 0 ||
 +	    (zip->erd_size + zip->v_size + 16) > remaining_size ||
 +	    (zip->erd_size + zip->v_size + 16) < (zip->erd_size + zip->v_size))
 +		goto corrupted;
 +	if (ts < zip->v_size) {
 +		free(zip->v_data);
 +		zip->v_data = NULL;
 +	}
 +	p = __archive_read_ahead(a, zip->v_size, NULL);
 +	if (p == NULL)
 +		goto truncated;
 +	if (zip->v_data == NULL) {
 +		zip->v_data = malloc(zip->v_size);
 +		if (zip->v_data == NULL)
 +			goto nomem;
 +	}
 +	memcpy(zip->v_data, p, zip->v_size);
 +	__archive_read_consume(a, zip->v_size);
 +
 +	p = __archive_read_ahead(a, 4, NULL);
 +	if (p == NULL)
 +		goto truncated;
 +	zip->v_crc32 = archive_le32dec(p);
 +	__archive_read_consume(a, 4);
 +
 +	/*return (ARCHIVE_OK);
- 	 * This is not fully implemnted yet.*/
++	 * This is not fully implemented yet.*/
 +	archive_set_error(&a->archive, ARCHIVE_ERRNO_FILE_FORMAT,
 +	    "Encrypted file is unsupported");
 +	return (ARCHIVE_FAILED);
 +truncated:
 +	archive_set_error(&a->archive, ARCHIVE_ERRNO_FILE_FORMAT,
 +	    "Truncated ZIP file data");
 +	return (ARCHIVE_FATAL);
 +corrupted:
 +	archive_set_error(&a->archive, ARCHIVE_ERRNO_FILE_FORMAT,
 +	    "Corrupted ZIP file data");
 +	return (ARCHIVE_FATAL);
 +nomem:
 +	archive_set_error(&a->archive, ENOMEM,
 +	    "No memory for ZIP decryption");
 +	return (ARCHIVE_FATAL);
 +}
 +
 +static int
 +zip_alloc_decryption_buffer(struct archive_read *a)
 +{
 +	struct zip *zip = (struct zip *)(a->format->data);
 +	size_t bs = 256 * 1024;
 +
 +	if (zip->decrypted_buffer == NULL) {
 +		zip->decrypted_buffer_size = bs;
 +		zip->decrypted_buffer = malloc(bs);
 +		if (zip->decrypted_buffer == NULL) {
 +			archive_set_error(&a->archive, ENOMEM,
 +			    "No memory for ZIP decryption");
 +			return (ARCHIVE_FATAL);
 +		}
 +	}
 +	zip->decrypted_ptr = zip->decrypted_buffer;
 +	return (ARCHIVE_OK);
 +}
 +
 +static int
 +init_traditional_PKWARE_decryption(struct archive_read *a)
 +{
 +	struct zip *zip = (struct zip *)(a->format->data);
 +	const void *p;
 +	int retry;
 +	int r;
 +
 +	if (zip->tctx_valid)
 +		return (ARCHIVE_OK);
 +
 +	/*
 +	   Read the 12 bytes encryption header stored at
 +	   the start of the data area.
 +	 */
 +#define ENC_HEADER_SIZE	12
 +	if (0 == (zip->entry->zip_flags & ZIP_LENGTH_AT_END)
 +	    && zip->entry_bytes_remaining < ENC_HEADER_SIZE) {
 +		archive_set_error(&a->archive, ARCHIVE_ERRNO_FILE_FORMAT,
 +		    "Truncated Zip encrypted body: only %jd bytes available",
 +		    (intmax_t)zip->entry_bytes_remaining);
 +		return (ARCHIVE_FATAL);
 +	}
 +
 +	p = __archive_read_ahead(a, ENC_HEADER_SIZE, NULL);
 +	if (p == NULL) {
 +		archive_set_error(&a->archive, ARCHIVE_ERRNO_FILE_FORMAT,
 +		    "Truncated ZIP file data");
 +		return (ARCHIVE_FATAL);
 +	}
 +
 +	for (retry = 0;; retry++) {
 +		const char *passphrase;
 +		uint8_t crcchk;
 +
 +		passphrase = __archive_read_next_passphrase(a);
 +		if (passphrase == NULL) {
 +			archive_set_error(&a->archive, ARCHIVE_ERRNO_MISC,
 +			    (retry > 0)?
 +				"Incorrect passphrase":
 +				"Passphrase required for this entry");
 +			return (ARCHIVE_FAILED);
 +		}
 +
 +		/*
- 		 * Initialize ctx for Traditional PKWARE Decyption.
++		 * Initialize ctx for Traditional PKWARE Decryption.
 +		 */
 +		r = trad_enc_init(&zip->tctx, passphrase, strlen(passphrase),
 +			p, ENC_HEADER_SIZE, &crcchk);
 +		if (r == 0 && crcchk == zip->entry->decdat)
 +			break;/* The passphrase is OK. */
 +		if (retry > 10000) {
 +			/* Avoid infinity loop. */
 +			archive_set_error(&a->archive, ARCHIVE_ERRNO_MISC,
 +			    "Too many incorrect passphrases");
 +			return (ARCHIVE_FAILED);
 +		}
 +	}
 +
 +	__archive_read_consume(a, ENC_HEADER_SIZE);
 +	zip->tctx_valid = 1;
 +	if (0 == (zip->entry->zip_flags & ZIP_LENGTH_AT_END)) {
 +	    zip->entry_bytes_remaining -= ENC_HEADER_SIZE;
 +	}
 +	/*zip->entry_uncompressed_bytes_read += ENC_HEADER_SIZE;*/
 +	zip->entry_compressed_bytes_read += ENC_HEADER_SIZE;
 +	zip->decrypted_bytes_remaining = 0;
 +
 +	return (zip_alloc_decryption_buffer(a));
 +#undef ENC_HEADER_SIZE
 +}
 +
 +static int
 +init_WinZip_AES_decryption(struct archive_read *a)
 +{
 +	struct zip *zip = (struct zip *)(a->format->data);
 +	const void *p;
 +	const uint8_t *pv;
 +	size_t key_len, salt_len;
 +	uint8_t derived_key[MAX_DERIVED_KEY_BUF_SIZE];
 +	int retry;
 +	int r;
 +
 +	if (zip->cctx_valid || zip->hctx_valid)
 +		return (ARCHIVE_OK);
 +
 +	switch (zip->entry->aes_extra.strength) {
 +	case 1: salt_len = 8;  key_len = 16; break;
 +	case 2: salt_len = 12; key_len = 24; break;
 +	case 3: salt_len = 16; key_len = 32; break;
 +	default: goto corrupted;
 +	}
 +	p = __archive_read_ahead(a, salt_len + 2, NULL);
 +	if (p == NULL)
 +		goto truncated;
 +
 +	for (retry = 0;; retry++) {
 +		const char *passphrase;
 +
 +		passphrase = __archive_read_next_passphrase(a);
 +		if (passphrase == NULL) {
 +			archive_set_error(&a->archive, ARCHIVE_ERRNO_MISC,
 +			    (retry > 0)?
 +				"Incorrect passphrase":
 +				"Passphrase required for this entry");
 +			return (ARCHIVE_FAILED);
 +		}
 +		memset(derived_key, 0, sizeof(derived_key));
 +		r = archive_pbkdf2_sha1(passphrase, strlen(passphrase),
 +		    p, salt_len, 1000, derived_key, key_len * 2 + 2);
 +		if (r != 0) {
 +			archive_set_error(&a->archive, ARCHIVE_ERRNO_MISC,
 +			    "Decryption is unsupported due to lack of "
 +			    "crypto library");
 +			return (ARCHIVE_FAILED);
 +		}
 +
 +		/* Check password verification value. */
 +		pv = ((const uint8_t *)p) + salt_len;
 +		if (derived_key[key_len * 2] == pv[0] &&
 +		    derived_key[key_len * 2 + 1] == pv[1])
 +			break;/* The passphrase is OK. */
 +		if (retry > 10000) {
 +			/* Avoid infinity loop. */
 +			archive_set_error(&a->archive, ARCHIVE_ERRNO_MISC,
 +			    "Too many incorrect passphrases");
 +			return (ARCHIVE_FAILED);
 +		}
 +	}
 +
 +	r = archive_decrypto_aes_ctr_init(&zip->cctx, derived_key, key_len);
 +	if (r != 0) {
 +		archive_set_error(&a->archive, ARCHIVE_ERRNO_MISC,
 +		    "Decryption is unsupported due to lack of crypto library");
 +		return (ARCHIVE_FAILED);
 +	}
 +	r = archive_hmac_sha1_init(&zip->hctx, derived_key + key_len, key_len);
 +	if (r != 0) {
 +		archive_decrypto_aes_ctr_release(&zip->cctx);
 +		archive_set_error(&a->archive, ARCHIVE_ERRNO_MISC,
 +		    "Failed to initialize HMAC-SHA1");
 +		return (ARCHIVE_FAILED);
 +	}
 +	zip->cctx_valid = zip->hctx_valid = 1;
 +	__archive_read_consume(a, salt_len + 2);
 +	zip->entry_bytes_remaining -= salt_len + 2 + AUTH_CODE_SIZE;
 +	if (0 == (zip->entry->zip_flags & ZIP_LENGTH_AT_END)
 +	    && zip->entry_bytes_remaining < 0)
 +		goto corrupted;
 +	zip->entry_compressed_bytes_read += salt_len + 2 + AUTH_CODE_SIZE;
 +	zip->decrypted_bytes_remaining = 0;
 +
 +	zip->entry->compression = zip->entry->aes_extra.compression;
 +	return (zip_alloc_decryption_buffer(a));
 +
 +truncated:
 +	archive_set_error(&a->archive, ARCHIVE_ERRNO_FILE_FORMAT,
 +	    "Truncated ZIP file data");
 +	return (ARCHIVE_FATAL);
 +corrupted:
 +	archive_set_error(&a->archive, ARCHIVE_ERRNO_FILE_FORMAT,
 +	    "Corrupted ZIP file data");
 +	return (ARCHIVE_FATAL);
 +}
 +
 +static int
 +archive_read_format_zip_read_data(struct archive_read *a,
 +    const void **buff, size_t *size, int64_t *offset)
 +{
 +	int r;
 +	struct zip *zip = (struct zip *)(a->format->data);
 +
 +	if (zip->has_encrypted_entries ==
 +			ARCHIVE_READ_FORMAT_ENCRYPTION_DONT_KNOW) {
 +		zip->has_encrypted_entries = 0;
 +	}
 +
 +	*offset = zip->entry_uncompressed_bytes_read;
 +	*size = 0;
 +	*buff = NULL;
 +
 +	/* If we hit end-of-entry last time, return ARCHIVE_EOF. */
 +	if (zip->end_of_entry)
 +		return (ARCHIVE_EOF);
 +
 +	/* Return EOF immediately if this is a non-regular file. */
 +	if (AE_IFREG != (zip->entry->mode & AE_IFMT))
 +		return (ARCHIVE_EOF);
 +
 +	__archive_read_consume(a, zip->unconsumed);
 +	zip->unconsumed = 0;
 +
 +	if (zip->init_decryption) {
 +		zip->has_encrypted_entries = 1;
 +		if (zip->entry->zip_flags & ZIP_STRONG_ENCRYPTED)
 +			r = read_decryption_header(a);
 +		else if (zip->entry->compression == WINZIP_AES_ENCRYPTION)
 +			r = init_WinZip_AES_decryption(a);
 +		else
 +			r = init_traditional_PKWARE_decryption(a);
 +		if (r != ARCHIVE_OK)
 +			return (r);
 +		zip->init_decryption = 0;
 +	}
 +
 +	switch(zip->entry->compression) {
 +	case 0:  /* No compression. */
 +		r =  zip_read_data_none(a, buff, size, offset);
 +		break;
 +#ifdef HAVE_ZLIB_H
 +	case 8: /* Deflate compression. */
 +		r =  zip_read_data_deflate(a, buff, size, offset);
 +		break;
 +#endif
 +	default: /* Unsupported compression. */
 +		/* Return a warning. */
 +		archive_set_error(&a->archive, ARCHIVE_ERRNO_FILE_FORMAT,
 +		    "Unsupported ZIP compression method (%s)",
 +		    compression_name(zip->entry->compression));
 +		/* We can't decompress this entry, but we will
 +		 * be able to skip() it and try the next entry. */
 +		return (ARCHIVE_FAILED);
 +		break;
 +	}
 +	if (r != ARCHIVE_OK)
 +		return (r);
 +	/* Update checksum */
 +	if (*size)
 +		zip->entry_crc32 = zip->crc32func(zip->entry_crc32, *buff,
 +		    (unsigned)*size);
 +	/* If we hit the end, swallow any end-of-data marker. */
 +	if (zip->end_of_entry) {
 +		/* Check file size, CRC against these values. */
 +		if (zip->entry->compressed_size !=
 +		    zip->entry_compressed_bytes_read) {
 +			archive_set_error(&a->archive, ARCHIVE_ERRNO_MISC,
 +			    "ZIP compressed data is wrong size "
 +			    "(read %jd, expected %jd)",
 +			    (intmax_t)zip->entry_compressed_bytes_read,
 +			    (intmax_t)zip->entry->compressed_size);
 +			return (ARCHIVE_WARN);
 +		}
 +		/* Size field only stores the lower 32 bits of the actual
 +		 * size. */
 +		if ((zip->entry->uncompressed_size & UINT32_MAX)
 +		    != (zip->entry_uncompressed_bytes_read & UINT32_MAX)) {
 +			archive_set_error(&a->archive, ARCHIVE_ERRNO_MISC,
 +			    "ZIP uncompressed data is wrong size "
 +			    "(read %jd, expected %jd)\n",
 +			    (intmax_t)zip->entry_uncompressed_bytes_read,
 +			    (intmax_t)zip->entry->uncompressed_size);
 +			return (ARCHIVE_WARN);
 +		}
 +		/* Check computed CRC against header */
 +		if ((!zip->hctx_valid ||
 +		      zip->entry->aes_extra.vendor != AES_VENDOR_AE_2) &&
 +		   zip->entry->crc32 != zip->entry_crc32
 +		    && !zip->ignore_crc32) {
 +			archive_set_error(&a->archive, ARCHIVE_ERRNO_MISC,
 +			    "ZIP bad CRC: 0x%lx should be 0x%lx",
 +			    (unsigned long)zip->entry_crc32,
 +			    (unsigned long)zip->entry->crc32);
 +			return (ARCHIVE_WARN);
 +		}
 +	}
 +
 +	return (ARCHIVE_OK);
 +}
 +
 +static int
 +archive_read_format_zip_cleanup(struct archive_read *a)
 +{
 +	struct zip *zip;
 +	struct zip_entry *zip_entry, *next_zip_entry;
 +
 +	zip = (struct zip *)(a->format->data);
 +#ifdef HAVE_ZLIB_H
 +	if (zip->stream_valid)
 +		inflateEnd(&zip->stream);
 +	free(zip->uncompressed_buffer);
 +#endif
 +	if (zip->zip_entries) {
 +		zip_entry = zip->zip_entries;
 +		while (zip_entry != NULL) {
 +			next_zip_entry = zip_entry->next;
 +			archive_string_free(&zip_entry->rsrcname);
 +			free(zip_entry);
 +			zip_entry = next_zip_entry;
 +		}
 +	}
 +	free(zip->decrypted_buffer);
 +	if (zip->cctx_valid)
 +		archive_decrypto_aes_ctr_release(&zip->cctx);
 +	if (zip->hctx_valid)
 +		archive_hmac_sha1_cleanup(&zip->hctx);
 +	free(zip->iv);
 +	free(zip->erd);
 +	free(zip->v_data);
 +	archive_string_free(&zip->format_name);
 +	free(zip);
 +	(a->format->data) = NULL;
 +	return (ARCHIVE_OK);
 +}
 +
 +static int
 +archive_read_format_zip_has_encrypted_entries(struct archive_read *_a)
 +{
 +	if (_a && _a->format) {
 +		struct zip * zip = (struct zip *)_a->format->data;
 +		if (zip) {
 +			return zip->has_encrypted_entries;
 +		}
 +	}
 +	return ARCHIVE_READ_FORMAT_ENCRYPTION_DONT_KNOW;
 +}
 +
 +static int
 +archive_read_format_zip_options(struct archive_read *a,
 +    const char *key, const char *val)
 +{
 +	struct zip *zip;
 +	int ret = ARCHIVE_FAILED;
 +
 +	zip = (struct zip *)(a->format->data);
 +	if (strcmp(key, "compat-2x")  == 0) {
 +		/* Handle filenames as libarchive 2.x */
 +		zip->init_default_conversion = (val != NULL) ? 1 : 0;
 +		return (ARCHIVE_OK);
 +	} else if (strcmp(key, "hdrcharset")  == 0) {
 +		if (val == NULL || val[0] == 0)
 +			archive_set_error(&a->archive, ARCHIVE_ERRNO_MISC,
 +			    "zip: hdrcharset option needs a character-set name"
 +			);
 +		else {
 +			zip->sconv = archive_string_conversion_from_charset(
 +			    &a->archive, val, 0);
 +			if (zip->sconv != NULL) {
 +				if (strcmp(val, "UTF-8") == 0)
 +					zip->sconv_utf8 = zip->sconv;
 +				ret = ARCHIVE_OK;
 +			} else
 +				ret = ARCHIVE_FATAL;
 +		}
 +		return (ret);
 +	} else if (strcmp(key, "ignorecrc32") == 0) {
 +		/* Mostly useful for testing. */
 +		if (val == NULL || val[0] == 0) {
 +			zip->crc32func = real_crc32;
 +			zip->ignore_crc32 = 0;
 +		} else {
 +			zip->crc32func = fake_crc32;
 +			zip->ignore_crc32 = 1;
 +		}
 +		return (ARCHIVE_OK);
 +	} else if (strcmp(key, "mac-ext") == 0) {
 +		zip->process_mac_extensions = (val != NULL && val[0] != 0);
 +		return (ARCHIVE_OK);
 +	}
 +
 +	/* Note: The "warn" return is just to inform the options
 +	 * supervisor that we didn't handle it.  It will generate
 +	 * a suitable error if no one used this option. */
 +	return (ARCHIVE_WARN);
 +}
 +
 +int
 +archive_read_support_format_zip(struct archive *a)
 +{
 +	int r;
 +	r = archive_read_support_format_zip_streamable(a);
 +	if (r != ARCHIVE_OK)
 +		return r;
 +	return (archive_read_support_format_zip_seekable(a));
 +}
 +
 +/* ------------------------------------------------------------------------ */
 +
 +/*
 + * Streaming-mode support
 + */
 +
 +
 +static int
 +archive_read_support_format_zip_capabilities_streamable(struct archive_read * a)
 +{
 +	(void)a; /* UNUSED */
 +	return (ARCHIVE_READ_FORMAT_CAPS_ENCRYPT_DATA |
 +		ARCHIVE_READ_FORMAT_CAPS_ENCRYPT_METADATA);
 +}
 +
 +static int
 +archive_read_format_zip_streamable_bid(struct archive_read *a, int best_bid)
 +{
 +	const char *p;
 +
 +	(void)best_bid; /* UNUSED */
 +
 +	if ((p = __archive_read_ahead(a, 4, NULL)) == NULL)
 +		return (-1);
 +
 +	/*
 +	 * Bid of 29 here comes from:
 +	 *  + 16 bits for "PK",
 +	 *  + next 16-bit field has 6 options so contributes
 +	 *    about 16 - log_2(6) ~= 16 - 2.6 ~= 13 bits
 +	 *
 +	 * So we've effectively verified ~29 total bits of check data.
 +	 */
 +	if (p[0] == 'P' && p[1] == 'K') {
 +		if ((p[2] == '\001' && p[3] == '\002')
 +		    || (p[2] == '\003' && p[3] == '\004')
 +		    || (p[2] == '\005' && p[3] == '\006')
 +		    || (p[2] == '\006' && p[3] == '\006')
 +		    || (p[2] == '\007' && p[3] == '\010')
 +		    || (p[2] == '0' && p[3] == '0'))
 +			return (29);
 +	}
 +
 +	/* TODO: It's worth looking ahead a little bit for a valid
 +	 * PK signature.  In particular, that would make it possible
 +	 * to read some UUEncoded SFX files or SFX files coming from
 +	 * a network socket. */
 +
 +	return (0);
 +}
 +
 +static int
 +archive_read_format_zip_streamable_read_header(struct archive_read *a,
 +    struct archive_entry *entry)
 +{
 +	struct zip *zip;
 +
 +	a->archive.archive_format = ARCHIVE_FORMAT_ZIP;
 +	if (a->archive.archive_format_name == NULL)
 +		a->archive.archive_format_name = "ZIP";
 +
 +	zip = (struct zip *)(a->format->data);
 +
 +	/*
 +	 * It should be sufficient to call archive_read_next_header() for
 +	 * a reader to determine if an entry is encrypted or not. If the
 +	 * encryption of an entry is only detectable when calling
 +	 * archive_read_data(), so be it. We'll do the same check there
 +	 * as well.
 +	 */
 +	if (zip->has_encrypted_entries ==
 +			ARCHIVE_READ_FORMAT_ENCRYPTION_DONT_KNOW)
 +		zip->has_encrypted_entries = 0;
 +
 +	/* Make sure we have a zip_entry structure to use. */
 +	if (zip->zip_entries == NULL) {
 +		zip->zip_entries = malloc(sizeof(struct zip_entry));
 +		if (zip->zip_entries == NULL) {
 +			archive_set_error(&a->archive, ENOMEM,
 +			    "Out  of memory");
 +			return ARCHIVE_FATAL;
 +		}
 +	}
 +	zip->entry = zip->zip_entries;
 +	memset(zip->entry, 0, sizeof(struct zip_entry));
 +
 +	if (zip->cctx_valid)
 +		archive_decrypto_aes_ctr_release(&zip->cctx);
 +	if (zip->hctx_valid)
 +		archive_hmac_sha1_cleanup(&zip->hctx);
 +	zip->tctx_valid = zip->cctx_valid = zip->hctx_valid = 0;
 +	__archive_read_reset_passphrase(a);
 +
 +	/* Search ahead for the next local file header. */
 +	__archive_read_consume(a, zip->unconsumed);
 +	zip->unconsumed = 0;
 +	for (;;) {
 +		int64_t skipped = 0;
 +		const char *p, *end;
 +		ssize_t bytes;
 +
 +		p = __archive_read_ahead(a, 4, &bytes);
 +		if (p == NULL)
 +			return (ARCHIVE_FATAL);
 +		end = p + bytes;
 +
 +		while (p + 4 <= end) {
 +			if (p[0] == 'P' && p[1] == 'K') {
 +				if (p[2] == '\003' && p[3] == '\004') {
 +					/* Regular file entry. */
 +					__archive_read_consume(a, skipped);
 +					return zip_read_local_file_header(a,
 +					    entry, zip);
 +				}
 +
 +                              /*
 +                               * TODO: We cannot restore permissions
 +                               * based only on the local file headers.
 +                               * Consider scanning the central
 +                               * directory and returning additional
 +                               * entries for at least directories.
 +                               * This would allow us to properly set
 +                               * directory permissions.
 +			       *
 +			       * This won't help us fix symlinks
 +			       * and may not help with regular file
 +			       * permissions, either.  <sigh>
 +                               */
 +                              if (p[2] == '\001' && p[3] == '\002') {
 +                                      return (ARCHIVE_EOF);
 +                              }
 +
 +                              /* End of central directory?  Must be an
 +                               * empty archive. */
 +                              if ((p[2] == '\005' && p[3] == '\006')
 +                                  || (p[2] == '\006' && p[3] == '\006'))
 +                                      return (ARCHIVE_EOF);
 +			}
 +			++p;
 +			++skipped;
 +		}
 +		__archive_read_consume(a, skipped);
 +	}
 +}
 +
 +static int
 +archive_read_format_zip_read_data_skip_streamable(struct archive_read *a)
 +{
 +	struct zip *zip;
 +	int64_t bytes_skipped;
 +
 +	zip = (struct zip *)(a->format->data);
 +	bytes_skipped = __archive_read_consume(a, zip->unconsumed);
 +	zip->unconsumed = 0;
 +	if (bytes_skipped < 0)
 +		return (ARCHIVE_FATAL);
 +
 +	/* If we've already read to end of data, we're done. */
 +	if (zip->end_of_entry)
 +		return (ARCHIVE_OK);
 +
 +	/* So we know we're streaming... */
 +	if (0 == (zip->entry->zip_flags & ZIP_LENGTH_AT_END)
 +	    || zip->entry->compressed_size > 0) {
 +		/* We know the compressed length, so we can just skip. */
 +		bytes_skipped = __archive_read_consume(a,
 +					zip->entry_bytes_remaining);
 +		if (bytes_skipped < 0)
 +			return (ARCHIVE_FATAL);
 +		return (ARCHIVE_OK);
 +	}
 +
 +	if (zip->init_decryption) {
 +		int r;
 +
 +		zip->has_encrypted_entries = 1;
 +		if (zip->entry->zip_flags & ZIP_STRONG_ENCRYPTED)
 +			r = read_decryption_header(a);
 +		else if (zip->entry->compression == WINZIP_AES_ENCRYPTION)
 +			r = init_WinZip_AES_decryption(a);
 +		else
 +			r = init_traditional_PKWARE_decryption(a);
 +		if (r != ARCHIVE_OK)
 +			return (r);
 +		zip->init_decryption = 0;
 +	}
 +
 +	/* We're streaming and we don't know the length. */
 +	/* If the body is compressed and we know the format, we can
 +	 * find an exact end-of-entry by decompressing it. */
 +	switch (zip->entry->compression) {
 +#ifdef HAVE_ZLIB_H
 +	case 8: /* Deflate compression. */
 +		while (!zip->end_of_entry) {
 +			int64_t offset = 0;
 +			const void *buff = NULL;
 +			size_t size = 0;
 +			int r;
 +			r =  zip_read_data_deflate(a, &buff, &size, &offset);
 +			if (r != ARCHIVE_OK)
 +				return (r);
 +		}
 +		return ARCHIVE_OK;
 +#endif
 +	default: /* Uncompressed or unknown. */
 +		/* Scan for a PK\007\010 signature. */
 +		for (;;) {
 +			const char *p, *buff;
 +			ssize_t bytes_avail;
 +			buff = __archive_read_ahead(a, 16, &bytes_avail);
 +			if (bytes_avail < 16) {
 +				archive_set_error(&a->archive,
 +				    ARCHIVE_ERRNO_FILE_FORMAT,
 +				    "Truncated ZIP file data");
 +				return (ARCHIVE_FATAL);
 +			}
 +			p = buff;
 +			while (p <= buff + bytes_avail - 16) {
 +				if (p[3] == 'P') { p += 3; }
 +				else if (p[3] == 'K') { p += 2; }
 +				else if (p[3] == '\007') { p += 1; }
 +				else if (p[3] == '\010' && p[2] == '\007'
 +				    && p[1] == 'K' && p[0] == 'P') {
 +					if (zip->entry->flags & LA_USED_ZIP64)
 +						__archive_read_consume(a,
 +						    p - buff + 24);
 +					else
 +						__archive_read_consume(a,
 +						    p - buff + 16);
 +					return ARCHIVE_OK;
 +				} else { p += 4; }
 +			}
 +			__archive_read_consume(a, p - buff);
 +		}
 +	}
 +}
 +
 +int
 +archive_read_support_format_zip_streamable(struct archive *_a)
 +{
 +	struct archive_read *a = (struct archive_read *)_a;
 +	struct zip *zip;
 +	int r;
 +
 +	archive_check_magic(_a, ARCHIVE_READ_MAGIC,
 +	    ARCHIVE_STATE_NEW, "archive_read_support_format_zip");
 +
 +	zip = (struct zip *)calloc(1, sizeof(*zip));
 +	if (zip == NULL) {
 +		archive_set_error(&a->archive, ENOMEM,
 +		    "Can't allocate zip data");
 +		return (ARCHIVE_FATAL);
 +	}
 +
 +	/* Streamable reader doesn't support mac extensions. */
 +	zip->process_mac_extensions = 0;
 +
 +	/*
 +	 * Until enough data has been read, we cannot tell about
 +	 * any encrypted entries yet.
 +	 */
 +	zip->has_encrypted_entries = ARCHIVE_READ_FORMAT_ENCRYPTION_DONT_KNOW;
 +	zip->crc32func = real_crc32;
 +
 +	r = __archive_read_register_format(a,
 +	    zip,
 +	    "zip",
 +	    archive_read_format_zip_streamable_bid,
 +	    archive_read_format_zip_options,
 +	    archive_read_format_zip_streamable_read_header,
 +	    archive_read_format_zip_read_data,
 +	    archive_read_format_zip_read_data_skip_streamable,
 +	    NULL,
 +	    archive_read_format_zip_cleanup,
 +	    archive_read_support_format_zip_capabilities_streamable,
 +	    archive_read_format_zip_has_encrypted_entries);
 +
 +	if (r != ARCHIVE_OK)
 +		free(zip);
 +	return (ARCHIVE_OK);
 +}
 +
 +/* ------------------------------------------------------------------------ */
 +
 +/*
 + * Seeking-mode support
 + */
 +
 +static int
 +archive_read_support_format_zip_capabilities_seekable(struct archive_read * a)
 +{
 +	(void)a; /* UNUSED */
 +	return (ARCHIVE_READ_FORMAT_CAPS_ENCRYPT_DATA |
 +		ARCHIVE_READ_FORMAT_CAPS_ENCRYPT_METADATA);
 +}
 +
 +/*
 + * TODO: This is a performance sink because it forces the read core to
 + * drop buffered data from the start of file, which will then have to
 + * be re-read again if this bidder loses.
 + *
 + * We workaround this a little by passing in the best bid so far so
 + * that later bidders can do nothing if they know they'll never
 + * outbid.  But we can certainly do better...
 + */
 +static int
 +read_eocd(struct zip *zip, const char *p, int64_t current_offset)
 +{
 +	/* Sanity-check the EOCD we've found. */
 +
 +	/* This must be the first volume. */
 +	if (archive_le16dec(p + 4) != 0)
 +		return 0;
 +	/* Central directory must be on this volume. */
 +	if (archive_le16dec(p + 4) != archive_le16dec(p + 6))
 +		return 0;
 +	/* All central directory entries must be on this volume. */
 +	if (archive_le16dec(p + 10) != archive_le16dec(p + 8))
 +		return 0;
 +	/* Central directory can't extend beyond start of EOCD record. */
 +	if (archive_le32dec(p + 16) + archive_le32dec(p + 12)
 +	    > current_offset)
 +		return 0;
 +
 +	/* Save the central directory location for later use. */
 +	zip->central_directory_offset = archive_le32dec(p + 16);
 +
 +	/* This is just a tiny bit higher than the maximum
 +	   returned by the streaming Zip bidder.  This ensures
 +	   that the more accurate seeking Zip parser wins
 +	   whenever seek is available. */
 +	return 32;
 +}
 +
 +/*
 + * Examine Zip64 EOCD locator:  If it's valid, store the information
 + * from it.
 + */
 +static void
 +read_zip64_eocd(struct archive_read *a, struct zip *zip, const char *p)
 +{
 +	int64_t eocd64_offset;
 +	int64_t eocd64_size;
 +
 +	/* Sanity-check the locator record. */
 +
 +	/* Central dir must be on first volume. */
 +	if (archive_le32dec(p + 4) != 0)
 +		return;
 +	/* Must be only a single volume. */
 +	if (archive_le32dec(p + 16) != 1)
 +		return;
 +
 +	/* Find the Zip64 EOCD record. */
 +	eocd64_offset = archive_le64dec(p + 8);
 +	if (__archive_read_seek(a, eocd64_offset, SEEK_SET) < 0)
 +		return;
 +	if ((p = __archive_read_ahead(a, 56, NULL)) == NULL)
 +		return;
 +	/* Make sure we can read all of it. */
 +	eocd64_size = archive_le64dec(p + 4) + 12;
 +	if (eocd64_size < 56 || eocd64_size > 16384)
 +		return;
 +	if ((p = __archive_read_ahead(a, (size_t)eocd64_size, NULL)) == NULL)
 +		return;
 +
 +	/* Sanity-check the EOCD64 */
 +	if (archive_le32dec(p + 16) != 0) /* Must be disk #0 */
 +		return;
 +	if (archive_le32dec(p + 20) != 0) /* CD must be on disk #0 */
 +		return;
 +	/* CD can't be split. */
 +	if (archive_le64dec(p + 24) != archive_le64dec(p + 32))
 +		return;
 +
 +	/* Save the central directory offset for later use. */
 +	zip->central_directory_offset = archive_le64dec(p + 48);
 +}
 +
 +static int
 +archive_read_format_zip_seekable_bid(struct archive_read *a, int best_bid)
 +{
 +	struct zip *zip = (struct zip *)a->format->data;
 +	int64_t file_size, current_offset;
 +	const char *p;
 +	int i, tail;
 +
 +	/* If someone has already bid more than 32, then avoid
 +	   trashing the look-ahead buffers with a seek. */
 +	if (best_bid > 32)
 +		return (-1);
 +
 +	file_size = __archive_read_seek(a, 0, SEEK_END);
 +	if (file_size <= 0)
 +		return 0;
 +
 +	/* Search last 16k of file for end-of-central-directory
 +	 * record (which starts with PK\005\006) */
 +	tail = (int)zipmin(1024 * 16, file_size);
 +	current_offset = __archive_read_seek(a, -tail, SEEK_END);
 +	if (current_offset < 0)
 +		return 0;
 +	if ((p = __archive_read_ahead(a, (size_t)tail, NULL)) == NULL)
 +		return 0;
 +	/* Boyer-Moore search backwards from the end, since we want
 +	 * to match the last EOCD in the file (there can be more than
 +	 * one if there is an uncompressed Zip archive as a member
 +	 * within this Zip archive). */
 +	for (i = tail - 22; i > 0;) {
 +		switch (p[i]) {
 +		case 'P':
 +			if (memcmp(p + i, "PK\005\006", 4) == 0) {
 +				int ret = read_eocd(zip, p + i,
 +				    current_offset + i);
 +				if (ret > 0) {
 +					/* Zip64 EOCD locator precedes
 +					 * regular EOCD if present. */
 +					if (i >= 20
 +					    && memcmp(p + i - 20, "PK\006\007", 4) == 0) {
 +						read_zip64_eocd(a, zip, p + i - 20);
 +					}
 +					return (ret);
 +				}
 +			}
 +			i -= 4;
 +			break;
 +		case 'K': i -= 1; break;
 +		case 005: i -= 2; break;
 +		case 006: i -= 3; break;
 +		default: i -= 4; break;
 +		}
 +	}
 +	return 0;
 +}
 +
 +/* The red-black trees are only used in seeking mode to manage
 + * the in-memory copy of the central directory. */
 +
 +static int
 +cmp_node(const struct archive_rb_node *n1, const struct archive_rb_node *n2)
 +{
 +	const struct zip_entry *e1 = (const struct zip_entry *)n1;
 +	const struct zip_entry *e2 = (const struct zip_entry *)n2;
 +
 +	if (e1->local_header_offset > e2->local_header_offset)
 +		return -1;
 +	if (e1->local_header_offset < e2->local_header_offset)
 +		return 1;
 +	return 0;
 +}
 +
 +static int
 +cmp_key(const struct archive_rb_node *n, const void *key)
 +{
 +	/* This function won't be called */
 +	(void)n; /* UNUSED */
 +	(void)key; /* UNUSED */
 +	return 1;
 +}
 +
 +static const struct archive_rb_tree_ops rb_ops = {
 +	&cmp_node, &cmp_key
 +};
 +
 +static int
 +rsrc_cmp_node(const struct archive_rb_node *n1,
 +    const struct archive_rb_node *n2)
 +{
 +	const struct zip_entry *e1 = (const struct zip_entry *)n1;
 +	const struct zip_entry *e2 = (const struct zip_entry *)n2;
 +
 +	return (strcmp(e2->rsrcname.s, e1->rsrcname.s));
 +}
 +
 +static int
 +rsrc_cmp_key(const struct archive_rb_node *n, const void *key)
 +{
 +	const struct zip_entry *e = (const struct zip_entry *)n;
 +	return (strcmp((const char *)key, e->rsrcname.s));
 +}
 +
 +static const struct archive_rb_tree_ops rb_rsrc_ops = {
 +	&rsrc_cmp_node, &rsrc_cmp_key
 +};
 +
 +static const char *
 +rsrc_basename(const char *name, size_t name_length)
 +{
 +	const char *s, *r;
 +
 +	r = s = name;
 +	for (;;) {
 +		s = memchr(s, '/', name_length - (s - name));
 +		if (s == NULL)
 +			break;
 +		r = ++s;
 +	}
 +	return (r);
 +}
 +
 +static void
 +expose_parent_dirs(struct zip *zip, const char *name, size_t name_length)
 +{
 +	struct archive_string str;
 +	struct zip_entry *dir;
 +	char *s;
 +
 +	archive_string_init(&str);
 +	archive_strncpy(&str, name, name_length);
 +	for (;;) {
 +		s = strrchr(str.s, '/');
 +		if (s == NULL)
 +			break;
 +		*s = '\0';
 +		/* Transfer the parent directory from zip->tree_rsrc RB
 +		 * tree to zip->tree RB tree to expose. */
 +		dir = (struct zip_entry *)
 +		    __archive_rb_tree_find_node(&zip->tree_rsrc, str.s);
 +		if (dir == NULL)
 +			break;
 +		__archive_rb_tree_remove_node(&zip->tree_rsrc, &dir->node);
 +		archive_string_free(&dir->rsrcname);
 +		__archive_rb_tree_insert_node(&zip->tree, &dir->node);
 +	}
 +	archive_string_free(&str);
 +}
 +
 +static int
 +slurp_central_directory(struct archive_read *a, struct zip *zip)
 +{
 +	ssize_t i;
 +	unsigned found;
 +	int64_t correction;
 +	ssize_t bytes_avail;
 +	const char *p;
 +
 +	/*
 +	 * Find the start of the central directory.  The end-of-CD
 +	 * record has our starting point, but there are lots of
 +	 * Zip archives which have had other data prepended to the
 +	 * file, which makes the recorded offsets all too small.
 +	 * So we search forward from the specified offset until we
 +	 * find the real start of the central directory.  Then we
 +	 * know the correction we need to apply to account for leading
 +	 * padding.
 +	 */
 +	if (__archive_read_seek(a, zip->central_directory_offset, SEEK_SET) < 0)
 +		return ARCHIVE_FATAL;
 +
 +	found = 0;
 +	while (!found) {
 +		if ((p = __archive_read_ahead(a, 20, &bytes_avail)) == NULL)
 +			return ARCHIVE_FATAL;
 +		for (found = 0, i = 0; !found && i < bytes_avail - 4;) {
 +			switch (p[i + 3]) {
 +			case 'P': i += 3; break;
 +			case 'K': i += 2; break;
 +			case 001: i += 1; break;
 +			case 002:
 +				if (memcmp(p + i, "PK\001\002", 4) == 0) {
 +					p += i;
 +					found = 1;
 +				} else
 +					i += 4;
 +				break;
 +			case 005: i += 1; break;
 +			case 006:
 +				if (memcmp(p + i, "PK\005\006", 4) == 0) {
 +					p += i;
 +					found = 1;
 +				} else if (memcmp(p + i, "PK\006\006", 4) == 0) {
 +					p += i;
 +					found = 1;
 +				} else
 +					i += 1;
 +				break;
 +			default: i += 4; break;
 +			}
 +		}
 +		__archive_read_consume(a, i);
 +	}
 +	correction = archive_filter_bytes(&a->archive, 0)
 +			- zip->central_directory_offset;
 +
 +	__archive_rb_tree_init(&zip->tree, &rb_ops);
 +	__archive_rb_tree_init(&zip->tree_rsrc, &rb_rsrc_ops);
 +
 +	zip->central_directory_entries_total = 0;
 +	while (1) {
 +		struct zip_entry *zip_entry;
 +		size_t filename_length, extra_length, comment_length;
 +		uint32_t external_attributes;
 +		const char *name, *r;
 +
 +		if ((p = __archive_read_ahead(a, 4, NULL)) == NULL)
 +			return ARCHIVE_FATAL;
 +		if (memcmp(p, "PK\006\006", 4) == 0
 +		    || memcmp(p, "PK\005\006", 4) == 0) {
 +			break;
 +		} else if (memcmp(p, "PK\001\002", 4) != 0) {
 +			archive_set_error(&a->archive,
 +			    -1, "Invalid central directory signature");
 +			return ARCHIVE_FATAL;
 +		}
 +		if ((p = __archive_read_ahead(a, 46, NULL)) == NULL)
 +			return ARCHIVE_FATAL;
 +
 +		zip_entry = calloc(1, sizeof(struct zip_entry));
 +		zip_entry->next = zip->zip_entries;
 +		zip_entry->flags |= LA_FROM_CENTRAL_DIRECTORY;
 +		zip->zip_entries = zip_entry;
 +		zip->central_directory_entries_total++;
 +
 +		/* version = p[4]; */
 +		zip_entry->system = p[5];
 +		/* version_required = archive_le16dec(p + 6); */
 +		zip_entry->zip_flags = archive_le16dec(p + 8);
 +		if (zip_entry->zip_flags
 +		      & (ZIP_ENCRYPTED | ZIP_STRONG_ENCRYPTED)){
 +			zip->has_encrypted_entries = 1;
 +		}
 +		zip_entry->compression = (char)archive_le16dec(p + 10);
 +		zip_entry->mtime = zip_time(p + 12);
 +		zip_entry->crc32 = archive_le32dec(p + 16);
 +		if (zip_entry->zip_flags & ZIP_LENGTH_AT_END)
 +			zip_entry->decdat = p[13];
 +		else
 +			zip_entry->decdat = p[19];
 +		zip_entry->compressed_size = archive_le32dec(p + 20);
 +		zip_entry->uncompressed_size = archive_le32dec(p + 24);
 +		filename_length = archive_le16dec(p + 28);
 +		extra_length = archive_le16dec(p + 30);
 +		comment_length = archive_le16dec(p + 32);
 +		/* disk_start = archive_le16dec(p + 34); */ /* Better be zero. */
 +		/* internal_attributes = archive_le16dec(p + 36); */ /* text bit */
 +		external_attributes = archive_le32dec(p + 38);
 +		zip_entry->local_header_offset =
 +		    archive_le32dec(p + 42) + correction;
 +
 +		/* If we can't guess the mode, leave it zero here;
 +		   when we read the local file header we might get
 +		   more information. */
 +		if (zip_entry->system == 3) {
 +			zip_entry->mode = external_attributes >> 16;
 +		} else if (zip_entry->system == 0) {
 +			// Interpret MSDOS directory bit
 +			if (0x10 == (external_attributes & 0x10)) {
 +				zip_entry->mode = AE_IFDIR | 0775;
 +			} else {
 +				zip_entry->mode = AE_IFREG | 0664;
 +			}
 +			if (0x01 == (external_attributes & 0x01)) {
 +				// Read-only bit; strip write permissions
 +				zip_entry->mode &= 0555;
 +			}
 +		} else {
 +			zip_entry->mode = 0;
 +		}
 +
 +		/* We're done with the regular data; get the filename and
 +		 * extra data. */
 +		__archive_read_consume(a, 46);
 +		p = __archive_read_ahead(a, filename_length + extra_length,
 +			NULL);
 +		if (p == NULL) {
 +			archive_set_error(&a->archive,
 +			    ARCHIVE_ERRNO_FILE_FORMAT,
 +			    "Truncated ZIP file header");
 +			return ARCHIVE_FATAL;
 +		}
- 		process_extra(p + filename_length, extra_length, zip_entry);
++		if (ARCHIVE_OK != process_extra(a, p + filename_length, extra_length, zip_entry)) {
++			return ARCHIVE_FATAL;
++		}
 +
 +		/*
 +		 * Mac resource fork files are stored under the
 +		 * "__MACOSX/" directory, so we should check if
 +		 * it is.
 +		 */
 +		if (!zip->process_mac_extensions) {
 +			/* Treat every entry as a regular entry. */
 +			__archive_rb_tree_insert_node(&zip->tree,
 +			    &zip_entry->node);
 +		} else {
 +			name = p;
 +			r = rsrc_basename(name, filename_length);
 +			if (filename_length >= 9 &&
 +			    strncmp("__MACOSX/", name, 9) == 0) {
 +				/* If this file is not a resource fork nor
 +				 * a directory. We should treat it as a non
 +				 * resource fork file to expose it. */
 +				if (name[filename_length-1] != '/' &&
 +				    (r - name < 3 || r[0] != '.' || r[1] != '_')) {
 +					__archive_rb_tree_insert_node(
 +					    &zip->tree, &zip_entry->node);
 +					/* Expose its parent directories. */
 +					expose_parent_dirs(zip, name,
 +					    filename_length);
 +				} else {
 +					/* This file is a resource fork file or
 +					 * a directory. */
 +					archive_strncpy(&(zip_entry->rsrcname),
 +					     name, filename_length);
 +					__archive_rb_tree_insert_node(
 +					    &zip->tree_rsrc, &zip_entry->node);
 +				}
 +			} else {
 +				/* Generate resource fork name to find its
 +				 * resource file at zip->tree_rsrc. */
 +				archive_strcpy(&(zip_entry->rsrcname),
 +				    "__MACOSX/");
 +				archive_strncat(&(zip_entry->rsrcname),
 +				    name, r - name);
 +				archive_strcat(&(zip_entry->rsrcname), "._");
 +				archive_strncat(&(zip_entry->rsrcname),
 +				    name + (r - name),
 +				    filename_length - (r - name));
 +				/* Register an entry to RB tree to sort it by
 +				 * file offset. */
 +				__archive_rb_tree_insert_node(&zip->tree,
 +				    &zip_entry->node);
 +			}
 +		}
 +
 +		/* Skip the comment too ... */
 +		__archive_read_consume(a,
 +		    filename_length + extra_length + comment_length);
 +	}
 +
 +	return ARCHIVE_OK;
 +}
 +
 +static ssize_t
 +zip_get_local_file_header_size(struct archive_read *a, size_t extra)
 +{
 +	const char *p;
 +	ssize_t filename_length, extra_length;
 +
 +	if ((p = __archive_read_ahead(a, extra + 30, NULL)) == NULL) {
 +		archive_set_error(&a->archive, ARCHIVE_ERRNO_FILE_FORMAT,
 +		    "Truncated ZIP file header");
 +		return (ARCHIVE_WARN);
 +	}
 +	p += extra;
 +
 +	if (memcmp(p, "PK\003\004", 4) != 0) {
 +		archive_set_error(&a->archive, -1, "Damaged Zip archive");
 +		return ARCHIVE_WARN;
 +	}
 +	filename_length = archive_le16dec(p + 26);
 +	extra_length = archive_le16dec(p + 28);
 +
 +	return (30 + filename_length + extra_length);
 +}
 +
 +static int
 +zip_read_mac_metadata(struct archive_read *a, struct archive_entry *entry,
 +    struct zip_entry *rsrc)
 +{
 +	struct zip *zip = (struct zip *)a->format->data;
 +	unsigned char *metadata, *mp;
 +	int64_t offset = archive_filter_bytes(&a->archive, 0);
 +	size_t remaining_bytes, metadata_bytes;
 +	ssize_t hsize;
 +	int ret = ARCHIVE_OK, eof;
 +
 +	switch(rsrc->compression) {
 +	case 0:  /* No compression. */
 +		if (rsrc->uncompressed_size != rsrc->compressed_size) {
 +			archive_set_error(&a->archive, ARCHIVE_ERRNO_FILE_FORMAT,
 +			    "Malformed OS X metadata entry: inconsistent size");
 +			return (ARCHIVE_FATAL);
 +		}
 +#ifdef HAVE_ZLIB_H
 +	case 8: /* Deflate compression. */
 +#endif
 +		break;
 +	default: /* Unsupported compression. */
 +		/* Return a warning. */
 +		archive_set_error(&a->archive, ARCHIVE_ERRNO_FILE_FORMAT,
 +		    "Unsupported ZIP compression method (%s)",
 +		    compression_name(rsrc->compression));
 +		/* We can't decompress this entry, but we will
 +		 * be able to skip() it and try the next entry. */
 +		return (ARCHIVE_WARN);
 +	}
 +
 +	if (rsrc->uncompressed_size > (4 * 1024 * 1024)) {
 +		archive_set_error(&a->archive, ARCHIVE_ERRNO_FILE_FORMAT,
 +		    "Mac metadata is too large: %jd > 4M bytes",
 +		    (intmax_t)rsrc->uncompressed_size);
 +		return (ARCHIVE_WARN);
 +	}
 +	if (rsrc->compressed_size > (4 * 1024 * 1024)) {
 +		archive_set_error(&a->archive, ARCHIVE_ERRNO_FILE_FORMAT,
 +		    "Mac metadata is too large: %jd > 4M bytes",
 +		    (intmax_t)rsrc->compressed_size);
 +		return (ARCHIVE_WARN);
 +	}
 +
 +	metadata = malloc((size_t)rsrc->uncompressed_size);
 +	if (metadata == NULL) {
 +		archive_set_error(&a->archive, ENOMEM,
 +		    "Can't allocate memory for Mac metadata");
 +		return (ARCHIVE_FATAL);
 +	}
 +
 +	if (offset < rsrc->local_header_offset)
 +		__archive_read_consume(a, rsrc->local_header_offset - offset);
 +	else if (offset != rsrc->local_header_offset) {
 +		__archive_read_seek(a, rsrc->local_header_offset, SEEK_SET);
 +	}
 +
 +	hsize = zip_get_local_file_header_size(a, 0);
 +	__archive_read_consume(a, hsize);
 +
 +	remaining_bytes = (size_t)rsrc->compressed_size;
 +	metadata_bytes = (size_t)rsrc->uncompressed_size;
 +	mp = metadata;
 +	eof = 0;
 +	while (!eof && remaining_bytes) {
 +		const unsigned char *p;
 +		ssize_t bytes_avail;
 +		size_t bytes_used;
 +
 +		p = __archive_read_ahead(a, 1, &bytes_avail);
 +		if (p == NULL) {
 +			archive_set_error(&a->archive,
 +			    ARCHIVE_ERRNO_FILE_FORMAT,
 +			    "Truncated ZIP file header");
 +			ret = ARCHIVE_WARN;
 +			goto exit_mac_metadata;
 +		}
 +		if ((size_t)bytes_avail > remaining_bytes)
 +			bytes_avail = remaining_bytes;
 +		switch(rsrc->compression) {
 +		case 0:  /* No compression. */
 +			if ((size_t)bytes_avail > metadata_bytes)
 +				bytes_avail = metadata_bytes;
 +			memcpy(mp, p, bytes_avail);
 +			bytes_used = (size_t)bytes_avail;
 +			metadata_bytes -= bytes_used;
 +			mp += bytes_used;
 +			if (metadata_bytes == 0)
 +				eof = 1;
 +			break;
 +#ifdef HAVE_ZLIB_H
 +		case 8: /* Deflate compression. */
 +		{
 +			int r;
 +
 +			ret = zip_deflate_init(a, zip);
 +			if (ret != ARCHIVE_OK)
 +				goto exit_mac_metadata;
 +			zip->stream.next_in =
 +			    (Bytef *)(uintptr_t)(const void *)p;
 +			zip->stream.avail_in = (uInt)bytes_avail;
 +			zip->stream.total_in = 0;
 +			zip->stream.next_out = mp;
 +			zip->stream.avail_out = (uInt)metadata_bytes;
 +			zip->stream.total_out = 0;
 +
 +			r = inflate(&zip->stream, 0);
 +			switch (r) {
 +			case Z_OK:
 +				break;
 +			case Z_STREAM_END:
 +				eof = 1;
 +				break;
 +			case Z_MEM_ERROR:
 +				archive_set_error(&a->archive, ENOMEM,
 +				    "Out of memory for ZIP decompression");
 +				ret = ARCHIVE_FATAL;
 +				goto exit_mac_metadata;
 +			default:
 +				archive_set_error(&a->archive,
 +				    ARCHIVE_ERRNO_MISC,
 +				    "ZIP decompression failed (%d)", r);
 +				ret = ARCHIVE_FATAL;
 +				goto exit_mac_metadata;
 +			}
 +			bytes_used = zip->stream.total_in;
 +			metadata_bytes -= zip->stream.total_out;
 +			mp += zip->stream.total_out;
 +			break;
 +		}
 +#endif
 +		default:
 +			bytes_used = 0;
 +			break;
 +		}
 +		__archive_read_consume(a, bytes_used);
 +		remaining_bytes -= bytes_used;
 +	}
 +	archive_entry_copy_mac_metadata(entry, metadata,
 +	    (size_t)rsrc->uncompressed_size - metadata_bytes);
 +
 +exit_mac_metadata:
 +	__archive_read_seek(a, offset, SEEK_SET);
 +	zip->decompress_init = 0;
 +	free(metadata);
 +	return (ret);
 +}
 +
 +static int
 +archive_read_format_zip_seekable_read_header(struct archive_read *a,
 +	struct archive_entry *entry)
 +{
 +	struct zip *zip = (struct zip *)a->format->data;
 +	struct zip_entry *rsrc;
 +	int64_t offset;
 +	int r, ret = ARCHIVE_OK;
 +
 +	/*
 +	 * It should be sufficient to call archive_read_next_header() for
 +	 * a reader to determine if an entry is encrypted or not. If the
 +	 * encryption of an entry is only detectable when calling
 +	 * archive_read_data(), so be it. We'll do the same check there
 +	 * as well.
 +	 */
 +	if (zip->has_encrypted_entries ==
 +			ARCHIVE_READ_FORMAT_ENCRYPTION_DONT_KNOW)
 +		zip->has_encrypted_entries = 0;
 +
 +	a->archive.archive_format = ARCHIVE_FORMAT_ZIP;
 +	if (a->archive.archive_format_name == NULL)
 +		a->archive.archive_format_name = "ZIP";
 +
 +	if (zip->zip_entries == NULL) {
 +		r = slurp_central_directory(a, zip);
 +		if (r != ARCHIVE_OK)
 +			return r;
 +		/* Get first entry whose local header offset is lower than
 +		 * other entries in the archive file. */
 +		zip->entry =
 +		    (struct zip_entry *)ARCHIVE_RB_TREE_MIN(&zip->tree);
 +	} else if (zip->entry != NULL) {
 +		/* Get next entry in local header offset order. */
 +		zip->entry = (struct zip_entry *)__archive_rb_tree_iterate(
 +		    &zip->tree, &zip->entry->node, ARCHIVE_RB_DIR_RIGHT);
 +	}
 +
 +	if (zip->entry == NULL)
 +		return ARCHIVE_EOF;
 +
 +	if (zip->entry->rsrcname.s)
 +		rsrc = (struct zip_entry *)__archive_rb_tree_find_node(
 +		    &zip->tree_rsrc, zip->entry->rsrcname.s);
 +	else
 +		rsrc = NULL;
 +
 +	if (zip->cctx_valid)
 +		archive_decrypto_aes_ctr_release(&zip->cctx);
 +	if (zip->hctx_valid)
 +		archive_hmac_sha1_cleanup(&zip->hctx);
 +	zip->tctx_valid = zip->cctx_valid = zip->hctx_valid = 0;
 +	__archive_read_reset_passphrase(a);
 +
 +	/* File entries are sorted by the header offset, we should mostly
 +	 * use __archive_read_consume to advance a read point to avoid redundant
 +	 * data reading.  */
 +	offset = archive_filter_bytes(&a->archive, 0);
 +	if (offset < zip->entry->local_header_offset)
 +		__archive_read_consume(a,
 +		    zip->entry->local_header_offset - offset);
 +	else if (offset != zip->entry->local_header_offset) {
 +		__archive_read_seek(a, zip->entry->local_header_offset,
 +		    SEEK_SET);
 +	}
 +	zip->unconsumed = 0;
 +	r = zip_read_local_file_header(a, entry, zip);
 +	if (r != ARCHIVE_OK)
 +		return r;
 +	if (rsrc) {
 +		int ret2 = zip_read_mac_metadata(a, entry, rsrc);
 +		if (ret2 < ret)
 +			ret = ret2;
 +	}
 +	return (ret);
 +}
 +
 +/*
 + * We're going to seek for the next header anyway, so we don't
 + * need to bother doing anything here.
 + */
 +static int
 +archive_read_format_zip_read_data_skip_seekable(struct archive_read *a)
 +{
 +	struct zip *zip;
 +	zip = (struct zip *)(a->format->data);
 +
 +	zip->unconsumed = 0;
 +	return (ARCHIVE_OK);
 +}
 +
 +int
 +archive_read_support_format_zip_seekable(struct archive *_a)
 +{
 +	struct archive_read *a = (struct archive_read *)_a;
 +	struct zip *zip;
 +	int r;
 +
 +	archive_check_magic(_a, ARCHIVE_READ_MAGIC,
 +	    ARCHIVE_STATE_NEW, "archive_read_support_format_zip_seekable");
 +
 +	zip = (struct zip *)calloc(1, sizeof(*zip));
 +	if (zip == NULL) {
 +		archive_set_error(&a->archive, ENOMEM,
 +		    "Can't allocate zip data");
 +		return (ARCHIVE_FATAL);
 +	}
 +
 +#ifdef HAVE_COPYFILE_H
 +	/* Set this by default on Mac OS. */
 +	zip->process_mac_extensions = 1;
 +#endif
 +
 +	/*
 +	 * Until enough data has been read, we cannot tell about
 +	 * any encrypted entries yet.
 +	 */
 +	zip->has_encrypted_entries = ARCHIVE_READ_FORMAT_ENCRYPTION_DONT_KNOW;
 +	zip->crc32func = real_crc32;
 +
 +	r = __archive_read_register_format(a,
 +	    zip,
 +	    "zip",
 +	    archive_read_format_zip_seekable_bid,
 +	    archive_read_format_zip_options,
 +	    archive_read_format_zip_seekable_read_header,
 +	    archive_read_format_zip_read_data,
 +	    archive_read_format_zip_read_data_skip_seekable,
 +	    NULL,
 +	    archive_read_format_zip_cleanup,
 +	    archive_read_support_format_zip_capabilities_seekable,
 +	    archive_read_format_zip_has_encrypted_entries);
 +
 +	if (r != ARCHIVE_OK)
 +		free(zip);
 +	return (ARCHIVE_OK);
 +}
diff --cc Utilities/cmlibarchive/libarchive/archive_util.c
index f89df1d,0000000..f56ca33
mode 100644,000000..100644
--- a/Utilities/cmlibarchive/libarchive/archive_util.c
+++ b/Utilities/cmlibarchive/libarchive/archive_util.c
@@@ -1,667 -1,0 +1,667 @@@
 +/*-
 + * Copyright (c) 2009-2012,2014 Michihiro NAKAJIMA
 + * Copyright (c) 2003-2007 Tim Kientzle
 + * All rights reserved.
 + *
 + * Redistribution and use in source and binary forms, with or without
 + * modification, are permitted provided that the following conditions
 + * are met:
 + * 1. Redistributions of source code must retain the above copyright
 + *    notice, this list of conditions and the following disclaimer.
 + * 2. Redistributions in binary form must reproduce the above copyright
 + *    notice, this list of conditions and the following disclaimer in the
 + *    documentation and/or other materials provided with the distribution.
 + *
 + * THIS SOFTWARE IS PROVIDED BY THE AUTHOR(S) ``AS IS'' AND ANY EXPRESS OR
 + * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
 + * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
 + * IN NO EVENT SHALL THE AUTHOR(S) BE LIABLE FOR ANY DIRECT, INDIRECT,
 + * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
 + * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
 + * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
 + * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
 + * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
 + * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
 + */
 +
 +#include "archive_platform.h"
 +__FBSDID("$FreeBSD: head/lib/libarchive/archive_util.c 201098 2009-12-28 02:58:14Z kientzle $");
 +
 +#ifdef HAVE_SYS_TYPES_H
 +#include <sys/types.h>
 +#endif
 +#ifdef HAVE_ERRNO_H
 +#include <errno.h>
 +#endif
 +#ifdef HAVE_FCNTL_H
 +#include <fcntl.h>
 +#endif
 +#ifdef HAVE_STDLIB_H
 +#include <stdlib.h>
 +#endif
 +#ifdef HAVE_STRING_H
 +#include <string.h>
 +#endif
 +#if defined(HAVE_WINCRYPT_H) && !defined(__CYGWIN__)
 +#include <wincrypt.h>
 +#endif
 +#ifdef HAVE_ZLIB_H
 +#include <cm_zlib.h>
 +#endif
 +#ifdef HAVE_LZMA_H
 +#include <cm_lzma.h>
 +#endif
 +#ifdef HAVE_BZLIB_H
 +#include <cm_bzlib.h>
 +#endif
 +#ifdef HAVE_LZ4_H
 +#include <lz4.h>
 +#endif
 +
 +#include "archive.h"
 +#include "archive_private.h"
 +#include "archive_random_private.h"
 +#include "archive_string.h"
 +
 +#ifndef O_CLOEXEC
 +#define O_CLOEXEC	0
 +#endif
 +
 +static int archive_utility_string_sort_helper(char **, unsigned int);
 +
 +/* Generic initialization of 'struct archive' objects. */
 +int
 +__archive_clean(struct archive *a)
 +{
 +	archive_string_conversion_free(a);
 +	return (ARCHIVE_OK);
 +}
 +
 +int
 +archive_version_number(void)
 +{
 +	return (ARCHIVE_VERSION_NUMBER);
 +}
 +
 +const char *
 +archive_version_string(void)
 +{
 +	return (ARCHIVE_VERSION_STRING);
 +}
 +
 +const char *
 +archive_version_details(void)
 +{
 +	static struct archive_string str;
 +	static int init = 0;
 +	const char *zlib = archive_zlib_version();
 +	const char *liblzma = archive_liblzma_version();
 +	const char *bzlib = archive_bzlib_version();
 +	const char *liblz4 = archive_liblz4_version();
 +
 +	if (!init) {
 +		archive_string_init(&str);
 +
 +		archive_strcat(&str, ARCHIVE_VERSION_STRING);
 +		if (zlib != NULL) {
 +			archive_strcat(&str, " zlib/");
 +			archive_strcat(&str, zlib);
 +		}
 +		if (liblzma) {
 +			archive_strcat(&str, " liblzma/");
 +			archive_strcat(&str, liblzma);
 +		}
 +		if (bzlib) {
 +			const char *p = bzlib;
 +			const char *sep = strchr(p, ',');
 +			if (sep == NULL)
 +				sep = p + strlen(p);
 +			archive_strcat(&str, " bz2lib/");
 +			archive_strncat(&str, p, sep - p);
 +		}
 +		if (liblz4) {
 +			archive_strcat(&str, " liblz4/");
 +			archive_strcat(&str, liblz4);
 +		}
 +	}
 +	return str.s;
 +}
 +
 +const char *
 +archive_zlib_version(void)
 +{
 +#ifdef HAVE_ZLIB_H
 +	return ZLIB_VERSION;
 +#else
 +	return NULL;
 +#endif
 +}
 +
 +const char *
 +archive_liblzma_version(void)
 +{
 +#ifdef HAVE_LZMA_H
 +	return LZMA_VERSION_STRING;
 +#else
 +	return NULL;
 +#endif
 +}
 +
 +const char *
 +archive_bzlib_version(void)
 +{
 +#ifdef HAVE_BZLIB_H
 +	return BZ2_bzlibVersion();
 +#else
 +	return NULL;
 +#endif
 +}
 +
 +const char *
 +archive_liblz4_version(void)
 +{
 +#if defined(HAVE_LZ4_H) && defined(HAVE_LIBLZ4)
 +#define str(s) #s
 +#define NUMBER(x) str(x)
 +	return NUMBER(LZ4_VERSION_MAJOR) "." NUMBER(LZ4_VERSION_MINOR) "." NUMBER(LZ4_VERSION_RELEASE);
 +#undef NUMBER
 +#undef str
 +#else
 +	return NULL;
 +#endif
 +}
 +
 +int
 +archive_errno(struct archive *a)
 +{
 +	return (a->archive_error_number);
 +}
 +
 +const char *
 +archive_error_string(struct archive *a)
 +{
 +
 +	if (a->error != NULL  &&  *a->error != '\0')
 +		return (a->error);
 +	else
 +		return (NULL);
 +}
 +
 +int
 +archive_file_count(struct archive *a)
 +{
 +	return (a->file_count);
 +}
 +
 +int
 +archive_format(struct archive *a)
 +{
 +	return (a->archive_format);
 +}
 +
 +const char *
 +archive_format_name(struct archive *a)
 +{
 +	return (a->archive_format_name);
 +}
 +
 +
 +int
 +archive_compression(struct archive *a)
 +{
 +	return archive_filter_code(a, 0);
 +}
 +
 +const char *
 +archive_compression_name(struct archive *a)
 +{
 +	return archive_filter_name(a, 0);
 +}
 +
 +
 +/*
 + * Return a count of the number of compressed bytes processed.
 + */
 +int64_t
 +archive_position_compressed(struct archive *a)
 +{
 +	return archive_filter_bytes(a, -1);
 +}
 +
 +/*
 + * Return a count of the number of uncompressed bytes processed.
 + */
 +int64_t
 +archive_position_uncompressed(struct archive *a)
 +{
 +	return archive_filter_bytes(a, 0);
 +}
 +
 +void
 +archive_clear_error(struct archive *a)
 +{
 +	archive_string_empty(&a->error_string);
 +	a->error = NULL;
 +	a->archive_error_number = 0;
 +}
 +
 +void
 +archive_set_error(struct archive *a, int error_number, const char *fmt, ...)
 +{
 +	va_list ap;
 +
 +	a->archive_error_number = error_number;
 +	if (fmt == NULL) {
 +		a->error = NULL;
 +		return;
 +	}
 +
 +	archive_string_empty(&(a->error_string));
 +	va_start(ap, fmt);
 +	archive_string_vsprintf(&(a->error_string), fmt, ap);
 +	va_end(ap);
 +	a->error = a->error_string.s;
 +}
 +
 +void
 +archive_copy_error(struct archive *dest, struct archive *src)
 +{
 +	dest->archive_error_number = src->archive_error_number;
 +
 +	archive_string_copy(&dest->error_string, &src->error_string);
 +	dest->error = dest->error_string.s;
 +}
 +
 +void
 +__archive_errx(int retvalue, const char *msg)
 +{
 +	static const char *msg1 = "Fatal Internal Error in libarchive: ";
 +	size_t s;
 +
 +	s = write(2, msg1, strlen(msg1));
 +	(void)s; /* UNUSED */
 +	s = write(2, msg, strlen(msg));
 +	(void)s; /* UNUSED */
 +	s = write(2, "\n", 1);
 +	(void)s; /* UNUSED */
 +	exit(retvalue);
 +}
 +
 +/*
 + * Create a temporary file
 + */
 +#if defined(_WIN32) && !defined(__CYGWIN__)
 +
 +/*
 + * Do not use Windows tmpfile() function.
 + * It will make a temporary file under the root directory
 + * and it'll cause permission error if a user who is
 + * non-Administrator creates temporary files.
 + * Also Windows version of mktemp family including _mktemp_s
 + * are not secure.
 + */
 +int
 +__archive_mktemp(const char *tmpdir)
 +{
 +	static const wchar_t *prefix = L"libarchive_";
 +	static const wchar_t *suffix = L"XXXXXXXXXX";
 +	static const wchar_t num[] = {
 +		L'0', L'1', L'2', L'3', L'4', L'5', L'6', L'7',
 +		L'8', L'9', L'A', L'B', L'C', L'D', L'E', L'F',
 +		L'G', L'H', L'I', L'J', L'K', L'L', L'M', L'N',
 +		L'O', L'P', L'Q', L'R', L'S', L'T', L'U', L'V',
 +		L'W', L'X', L'Y', L'Z', L'a', L'b', L'c', L'd',
 +		L'e', L'f', L'g', L'h', L'i', L'j', L'k', L'l',
 +		L'm', L'n', L'o', L'p', L'q', L'r', L's', L't',
 +		L'u', L'v', L'w', L'x', L'y', L'z'
 +	};
 +	HCRYPTPROV hProv;
 +	struct archive_wstring temp_name;
 +	wchar_t *ws;
 +	DWORD attr;
 +	wchar_t *xp, *ep;
 +	int fd;
 +
 +	hProv = (HCRYPTPROV)NULL;
 +	fd = -1;
 +	ws = NULL;
 +	archive_string_init(&temp_name);
 +
 +	/* Get a temporary directory. */
 +	if (tmpdir == NULL) {
 +		size_t l;
 +		wchar_t *tmp;
 +
 +		l = GetTempPathW(0, NULL);
 +		if (l == 0) {
 +			la_dosmaperr(GetLastError());
 +			goto exit_tmpfile;
 +		}
 +		tmp = malloc(l*sizeof(wchar_t));
 +		if (tmp == NULL) {
 +			errno = ENOMEM;
 +			goto exit_tmpfile;
 +		}
 +		GetTempPathW((DWORD)l, tmp);
 +		archive_wstrcpy(&temp_name, tmp);
 +		free(tmp);
 +	} else {
 +		if (archive_wstring_append_from_mbs(&temp_name, tmpdir,
 +		    strlen(tmpdir)) < 0)
 +			goto exit_tmpfile;
 +		if (temp_name.s[temp_name.length-1] != L'/')
 +			archive_wstrappend_wchar(&temp_name, L'/');
 +	}
 +
 +	/* Check if temp_name is a directory. */
 +	attr = GetFileAttributesW(temp_name.s);
 +	if (attr == (DWORD)-1) {
 +		if (GetLastError() != ERROR_FILE_NOT_FOUND) {
 +			la_dosmaperr(GetLastError());
 +			goto exit_tmpfile;
 +		}
 +		ws = __la_win_permissive_name_w(temp_name.s);
 +		if (ws == NULL) {
 +			errno = EINVAL;
 +			goto exit_tmpfile;
 +		}
 +		attr = GetFileAttributesW(ws);
 +		if (attr == (DWORD)-1) {
 +			la_dosmaperr(GetLastError());
 +			goto exit_tmpfile;
 +		}
 +	}
 +	if (!(attr & FILE_ATTRIBUTE_DIRECTORY)) {
 +		errno = ENOTDIR;
 +		goto exit_tmpfile;
 +	}
 +
 +	/*
 +	 * Create a temporary file.
 +	 */
 +	archive_wstrcat(&temp_name, prefix);
 +	archive_wstrcat(&temp_name, suffix);
 +	ep = temp_name.s + archive_strlen(&temp_name);
 +	xp = ep - wcslen(suffix);
 +
 +	if (!CryptAcquireContext(&hProv, NULL, NULL, PROV_RSA_FULL,
 +		CRYPT_VERIFYCONTEXT)) {
 +		la_dosmaperr(GetLastError());
 +		goto exit_tmpfile;
 +	}
 +
 +	for (;;) {
 +		wchar_t *p;
 +		HANDLE h;
 +
 +		/* Generate a random file name through CryptGenRandom(). */
 +		p = xp;
 +		if (!CryptGenRandom(hProv, (DWORD)(ep - p)*sizeof(wchar_t),
 +		    (BYTE*)p)) {
 +			la_dosmaperr(GetLastError());
 +			goto exit_tmpfile;
 +		}
 +		for (; p < ep; p++)
 +			*p = num[((DWORD)*p) % (sizeof(num)/sizeof(num[0]))];
 +
 +		free(ws);
 +		ws = __la_win_permissive_name_w(temp_name.s);
 +		if (ws == NULL) {
 +			errno = EINVAL;
 +			goto exit_tmpfile;
 +		}
 +		/* Specifies FILE_FLAG_DELETE_ON_CLOSE flag is to
 +		 * delete this temporary file immediately when this
 +		 * file closed. */
 +		h = CreateFileW(ws,
 +		    GENERIC_READ | GENERIC_WRITE | DELETE,
 +		    0,/* Not share */
 +		    NULL,
 +		    CREATE_NEW,/* Create a new file only */
 +		    FILE_ATTRIBUTE_TEMPORARY | FILE_FLAG_DELETE_ON_CLOSE,
 +		    NULL);
 +		if (h == INVALID_HANDLE_VALUE) {
 +			/* The same file already exists. retry with
 +			 * a new filename. */
 +			if (GetLastError() == ERROR_FILE_EXISTS)
 +				continue;
 +			/* Otherwise, fail creation temporary file. */
 +			la_dosmaperr(GetLastError());
 +			goto exit_tmpfile;
 +		}
 +		fd = _open_osfhandle((intptr_t)h, _O_BINARY | _O_RDWR);
 +		if (fd == -1) {
 +			CloseHandle(h);
 +			goto exit_tmpfile;
 +		} else
 +			break;/* success! */
 +	}
 +exit_tmpfile:
 +	if (hProv != (HCRYPTPROV)NULL)
 +		CryptReleaseContext(hProv, 0);
 +	free(ws);
 +	archive_wstring_free(&temp_name);
 +	return (fd);
 +}
 +
 +#else
 +
 +static int
 +get_tempdir(struct archive_string *temppath)
 +{
 +	const char *tmp;
 +
 +	tmp = getenv("TMPDIR");
 +	if (tmp == NULL)
 +#ifdef _PATH_TMP
 +		tmp = _PATH_TMP;
 +#else
 +                tmp = "/tmp";
 +#endif
 +	archive_strcpy(temppath, tmp);
 +	if (temppath->s[temppath->length-1] != '/')
 +		archive_strappend_char(temppath, '/');
 +	return (ARCHIVE_OK);
 +}
 +
 +#if defined(HAVE_MKSTEMP)
 +
 +/*
 + * We can use mkstemp().
 + */
 +
 +int
 +__archive_mktemp(const char *tmpdir)
 +{
 +	struct archive_string temp_name;
 +	int fd = -1;
 +
 +	archive_string_init(&temp_name);
 +	if (tmpdir == NULL) {
 +		if (get_tempdir(&temp_name) != ARCHIVE_OK)
 +			goto exit_tmpfile;
 +	} else {
 +		archive_strcpy(&temp_name, tmpdir);
 +		if (temp_name.s[temp_name.length-1] != '/')
 +			archive_strappend_char(&temp_name, '/');
 +	}
 +	archive_strcat(&temp_name, "libarchive_XXXXXX");
 +	fd = mkstemp(temp_name.s);
 +	if (fd < 0)
 +		goto exit_tmpfile;
 +	__archive_ensure_cloexec_flag(fd);
 +	unlink(temp_name.s);
 +exit_tmpfile:
 +	archive_string_free(&temp_name);
 +	return (fd);
 +}
 +
 +#else
 +
 +/*
 + * We use a private routine.
 + */
 +
 +int
 +__archive_mktemp(const char *tmpdir)
 +{
 +        static const char num[] = {
 +		'0', '1', '2', '3', '4', '5', '6', '7',
 +		'8', '9', 'A', 'B', 'C', 'D', 'E', 'F',
 +		'G', 'H', 'I', 'J', 'K', 'L', 'M', 'N',
 +		'O', 'P', 'Q', 'R', 'S', 'T', 'U', 'V',
 +		'W', 'X', 'Y', 'Z', 'a', 'b', 'c', 'd',
 +		'e', 'f', 'g', 'h', 'i', 'j', 'k', 'l',
 +		'm', 'n', 'o', 'p', 'q', 'r', 's', 't',
 +		'u', 'v', 'w', 'x', 'y', 'z'
 +        };
 +	struct archive_string temp_name;
 +	struct stat st;
 +	int fd;
 +	char *tp, *ep;
 +
 +	fd = -1;
 +	archive_string_init(&temp_name);
 +	if (tmpdir == NULL) {
 +		if (get_tempdir(&temp_name) != ARCHIVE_OK)
 +			goto exit_tmpfile;
 +	} else
 +		archive_strcpy(&temp_name, tmpdir);
 +	if (temp_name.s[temp_name.length-1] == '/') {
 +		temp_name.s[temp_name.length-1] = '\0';
 +		temp_name.length --;
 +	}
 +	if (stat(temp_name.s, &st) < 0)
 +		goto exit_tmpfile;
 +	if (!S_ISDIR(st.st_mode)) {
 +		errno = ENOTDIR;
 +		goto exit_tmpfile;
 +	}
 +	archive_strcat(&temp_name, "/libarchive_");
 +	tp = temp_name.s + archive_strlen(&temp_name);
 +	archive_strcat(&temp_name, "XXXXXXXXXX");
 +	ep = temp_name.s + archive_strlen(&temp_name);
 +
 +	do {
 +		char *p;
 +
 +		p = tp;
 +		archive_random(p, ep - p);
 +		while (p < ep) {
 +			int d = *((unsigned char *)p) % sizeof(num);
 +			*p++ = num[d];
 +		}
 +		fd = open(temp_name.s, O_CREAT | O_EXCL | O_RDWR | O_CLOEXEC,
 +			  0600);
 +	} while (fd < 0 && errno == EEXIST);
 +	if (fd < 0)
 +		goto exit_tmpfile;
 +	__archive_ensure_cloexec_flag(fd);
 +	unlink(temp_name.s);
 +exit_tmpfile:
 +	archive_string_free(&temp_name);
 +	return (fd);
 +}
 +
 +#endif /* HAVE_MKSTEMP */
 +#endif /* !_WIN32 || __CYGWIN__ */
 +
 +/*
 + * Set FD_CLOEXEC flag to a file descriptor if it is not set.
 + * We have to set the flag if the platform does not provide O_CLOEXEC
 + * or F_DUPFD_CLOEXEC flags.
 + *
 + * Note: This function is absolutely called after creating a new file
 + * descriptor even if the platform seemingly provides O_CLOEXEC or
 + * F_DUPFD_CLOEXEC macros because it is possible that the platform
 + * merely declares those macros, especially Linux 2.6.18 - 2.6.24 do it.
 + */
 +void
 +__archive_ensure_cloexec_flag(int fd)
 +{
 +#if defined(_WIN32) && !defined(__CYGWIN__)
- 	(void)fd; /* UNSED */
++	(void)fd; /* UNUSED */
 +#else
 +	int flags;
 +
 +	if (fd >= 0) {
 +		flags = fcntl(fd, F_GETFD);
 +		if (flags != -1 && (flags & FD_CLOEXEC) == 0)
 +			fcntl(fd, F_SETFD, flags | FD_CLOEXEC);
 +	}
 +#endif
 +}
 +
 +/*
 + * Utility function to sort a group of strings using quicksort.
 + */
 +static int
 +archive_utility_string_sort_helper(char **strings, unsigned int n)
 +{
 +	unsigned int i, lesser_count, greater_count;
 +	char **lesser, **greater, **tmp, *pivot;
 +	int retval1, retval2;
 +
 +	/* A list of 0 or 1 elements is already sorted */
 +	if (n <= 1)
 +		return (ARCHIVE_OK);
 +
 +	lesser_count = greater_count = 0;
 +	lesser = greater = NULL;
 +	pivot = strings[0];
 +	for (i = 1; i < n; i++)
 +	{
 +		if (strcmp(strings[i], pivot) < 0)
 +		{
 +			lesser_count++;
 +			tmp = (char **)realloc(lesser,
 +				lesser_count * sizeof(char *));
 +			if (!tmp) {
 +				free(greater);
 +				free(lesser);
 +				return (ARCHIVE_FATAL);
 +			}
 +			lesser = tmp;
 +			lesser[lesser_count - 1] = strings[i];
 +		}
 +		else
 +		{
 +			greater_count++;
 +			tmp = (char **)realloc(greater,
 +				greater_count * sizeof(char *));
 +			if (!tmp) {
 +				free(greater);
 +				free(lesser);
 +				return (ARCHIVE_FATAL);
 +			}
 +			greater = tmp;
 +			greater[greater_count - 1] = strings[i];
 +		}
 +	}
 +
 +	/* quicksort(lesser) */
 +	retval1 = archive_utility_string_sort_helper(lesser, lesser_count);
 +	for (i = 0; i < lesser_count; i++)
 +		strings[i] = lesser[i];
 +	free(lesser);
 +
 +	/* pivot */
 +	strings[lesser_count] = pivot;
 +
 +	/* quicksort(greater) */
 +	retval2 = archive_utility_string_sort_helper(greater, greater_count);
 +	for (i = 0; i < greater_count; i++)
 +		strings[lesser_count + 1 + i] = greater[i];
 +	free(greater);
 +
 +	return (retval1 < retval2) ? retval1 : retval2;
 +}
 +
 +int
 +archive_utility_string_sort(char **strings)
 +{
 +	  unsigned int size = 0;
 +	  while (strings[size] != NULL)
 +		size++;
 +	  return archive_utility_string_sort_helper(strings, size);
 +}
diff --cc Utilities/cmlibarchive/libarchive/archive_windows.h
index 7c31a16,0000000..c3aed0c
mode 100644,000000..100644
--- a/Utilities/cmlibarchive/libarchive/archive_windows.h
+++ b/Utilities/cmlibarchive/libarchive/archive_windows.h
@@@ -1,320 -1,0 +1,324 @@@
 +/*-
 + * Copyright (c) 2009-2011 Michihiro NAKAJIMA
 + * Copyright (c) 2003-2006 Tim Kientzle
 + * All rights reserved.
 + *
 + * Redistribution and use in source and binary forms, with or without
 + * modification, are permitted provided that the following conditions
 + * are met:
 + * 1. Redistributions of source code must retain the above copyright
 + *    notice, this list of conditions and the following disclaimer
 + *    in this position and unchanged.
 + * 2. Redistributions in binary form must reproduce the above copyright
 + *    notice, this list of conditions and the following disclaimer in the
 + *    documentation and/or other materials provided with the distribution.
 + *
 + * THIS SOFTWARE IS PROVIDED BY THE AUTHOR(S) ``AS IS'' AND ANY EXPRESS OR
 + * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
 + * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
 + * IN NO EVENT SHALL THE AUTHOR(S) BE LIABLE FOR ANY DIRECT, INDIRECT,
 + * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
 + * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
 + * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
 + * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
 + * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
 + * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
 + *
 + * $FreeBSD$
 + */
 +
 +#ifndef __LIBARCHIVE_BUILD
 +#error This header is only to be used internally to libarchive.
 +#endif
 +
 +/*
 + * TODO: A lot of stuff in here isn't actually used by libarchive and
 + * can be trimmed out.  Note that this file is used by libarchive and
 + * libarchive_test but nowhere else.  (But note that it gets compiled
 + * with many different Windows environments, including MinGW, Visual
 + * Studio, and Cygwin.  Significant changes should be tested in all three.)
 + */
 +
 +/*
 + * TODO: Don't use off_t in here.  Use __int64 instead.  Note that
 + * Visual Studio and the Windows SDK define off_t as 32 bits; Win32's
 + * more modern file handling APIs all use __int64 instead of off_t.
 + */
 +
 +#ifndef LIBARCHIVE_ARCHIVE_WINDOWS_H_INCLUDED
 +#define	LIBARCHIVE_ARCHIVE_WINDOWS_H_INCLUDED
 +
 +/* Start of configuration for native Win32  */
 +#ifndef MINGW_HAS_SECURE_API
 +#define MINGW_HAS_SECURE_API 1
 +#endif
 +
 +#include <errno.h>
 +#define	set_errno(val)	((errno)=val)
 +#include <io.h>
 +#include <stdlib.h>   //brings in NULL
 +#if defined(HAVE_STDINT_H)
 +#include <stdint.h>
 +#endif
 +#include <stdio.h>
 +#include <fcntl.h>
 +#include <sys/stat.h>
 +#include <process.h>
 +#include <direct.h>
 +#if defined(__MINGW32__) && defined(HAVE_UNISTD_H)
 +/* Prevent build error from a type mismatch of ftruncate().
 + * This unistd.h defines it as ftruncate(int, off_t). */
 +#include <unistd.h>
 +#endif
 +#define NOCRYPT
 +#include <windows.h>
 +//#define	EFTYPE 7
 +
 +#if defined(_MSC_VER)
 +#pragma warning(push,1)
 +#pragma warning(disable:4142)   /* benign redefinition of type */
 +#pragma warning(disable:4761)   /* integral size mismatch in argument; conversion supplied */
 +#endif
 +#if defined(__BORLANDC__)
 +#pragma warn -8068	/* Constant out of range in comparison. */
 +#pragma warn -8072	/* Suspicious pointer arithmetic. */
 +#endif
 +
 +#ifndef NULL
 +#ifdef  __cplusplus
 +#define	NULL    0
 +#else
 +#define	NULL    ((void *)0)
 +#endif
 +#endif
 +
 +/* Alias the Windows _function to the POSIX equivalent. */
 +#define	close		_close
 +#define	fcntl(fd, cmd, flg)	/* No operation. */
 +#ifndef fileno
 +#define	fileno		_fileno
 +#endif
 +#ifdef fstat
 +#undef fstat
 +#endif
 +#define	fstat		__la_fstat
 +#if !defined(__BORLANDC__)
 +#ifdef lseek
 +#undef lseek
 +#endif
 +#define	lseek		_lseeki64
 +#else
 +#define	lseek		__la_lseek
 +#define __LA_LSEEK_NEEDED
 +#endif
 +#define	lstat		__la_stat
 +#define	open		__la_open
 +#define	read		__la_read
 +#if !defined(__BORLANDC__) && !defined(__WATCOMC__)
 +#define setmode		_setmode
 +#endif
 +#ifdef stat
 +#undef stat
 +#endif
 +#define	stat(path,stref)		__la_stat(path,stref)
 +#if !defined(__WATCOMC__)
 +#if !defined(__BORLANDC__)
 +#define	strdup		_strdup
 +#endif
 +#define	tzset		_tzset
 +#if !defined(__BORLANDC__)
 +#define	umask		_umask
 +#endif
 +#endif
 +#define	waitpid		__la_waitpid
 +#define	write		__la_write
 +
 +#if !defined(__WATCOMC__)
 +
 +#ifndef O_RDONLY
 +#define	O_RDONLY	_O_RDONLY
 +#define	O_WRONLY	_O_WRONLY
 +#define	O_TRUNC		_O_TRUNC
 +#define	O_CREAT		_O_CREAT
 +#define	O_EXCL		_O_EXCL
 +#define	O_BINARY	_O_BINARY
 +#endif
 +
 +#ifndef _S_IFIFO
 +  #define	_S_IFIFO        0010000   /* pipe */
 +#endif
 +#ifndef _S_IFCHR
 +  #define	_S_IFCHR        0020000   /* character special */
 +#endif
 +#ifndef _S_IFDIR
 +  #define	_S_IFDIR        0040000   /* directory */
 +#endif
 +#ifndef _S_IFBLK
 +  #define	_S_IFBLK        0060000   /* block special */
 +#endif
 +#ifndef _S_IFLNK
 +  #define	_S_IFLNK        0120000   /* symbolic link */
 +#endif
 +#ifndef _S_IFSOCK
 +  #define	_S_IFSOCK       0140000   /* socket */
 +#endif
 +#ifndef	_S_IFREG
 +  #define	_S_IFREG        0100000   /* regular */
 +#endif
 +#ifndef	_S_IFMT
 +  #define	_S_IFMT         0170000   /* file type mask */
 +#endif
 +
 +#ifndef S_IFIFO
 +#define	S_IFIFO     _S_IFIFO
 +#endif
 +//#define	S_IFCHR  _S_IFCHR
 +//#define	S_IFDIR  _S_IFDIR
 +#ifndef S_IFBLK
 +#define	S_IFBLK     _S_IFBLK
 +#endif
 +#ifndef S_IFLNK
 +#define	S_IFLNK     _S_IFLNK
 +#endif
 +#ifndef S_IFSOCK
 +#define	S_IFSOCK    _S_IFSOCK
 +#endif
 +//#define	S_IFREG  _S_IFREG
 +//#define	S_IFMT   _S_IFMT
 +
 +#ifndef S_ISBLK
 +#define	S_ISBLK(m)	(((m) & S_IFMT) == S_IFBLK)	/* block special */
 +#define	S_ISFIFO(m)	(((m) & S_IFMT) == S_IFIFO)	/* fifo or socket */
 +#define	S_ISCHR(m)	(((m) & S_IFMT) == S_IFCHR)	/* char special */
 +#define	S_ISDIR(m)	(((m) & S_IFMT) == S_IFDIR)	/* directory */
 +#define	S_ISREG(m)	(((m) & S_IFMT) == S_IFREG)	/* regular file */
 +#endif
 +
 +#define	S_ISLNK(m)  (((m) & S_IFMT) == S_IFLNK) /* Symbolic link */
 +#define	S_ISSOCK(m) (((m) & S_IFMT) == S_IFSOCK) /* Socket */
 +
 +#define	_S_ISUID        0004000   /* set user id on execution */
 +#define	_S_ISGID        0002000   /* set group id on execution */
 +#define	_S_ISVTX        0001000   /* save swapped text even after use */
 +
 +#define	S_ISUID        _S_ISUID
 +#define	S_ISGID        _S_ISGID
 +#define	S_ISVTX        _S_ISVTX
 +
 +#define	_S_IRWXU	     (_S_IREAD | _S_IWRITE | _S_IEXEC)
 +#define	_S_IXUSR	     _S_IEXEC  /* read permission, user */
 +#define	_S_IWUSR	     _S_IWRITE /* write permission, user */
 +#define	_S_IRUSR	     _S_IREAD  /* execute/search permission, user */
 +#define	_S_IRWXG        (_S_IRWXU >> 3)
 +#define	_S_IXGRP        (_S_IXUSR >> 3) /* read permission, group */
 +#define	_S_IWGRP        (_S_IWUSR >> 3) /* write permission, group */
 +#define	_S_IRGRP        (_S_IRUSR >> 3) /* execute/search permission, group */
 +#define	_S_IRWXO        (_S_IRWXG >> 3)
 +#define	_S_IXOTH        (_S_IXGRP >> 3) /* read permission, other */
 +#define	_S_IWOTH        (_S_IWGRP >> 3) /* write permission, other */
 +#define	_S_IROTH        (_S_IRGRP  >> 3) /* execute/search permission, other */
 +
 +#ifndef S_IRWXU
 +#define	S_IRWXU	     _S_IRWXU
 +#define	S_IXUSR	     _S_IXUSR
 +#define	S_IWUSR	     _S_IWUSR
 +#define	S_IRUSR	     _S_IRUSR
 +#endif
++#ifndef S_IRWXG
 +#define	S_IRWXG        _S_IRWXG
 +#define	S_IXGRP        _S_IXGRP
 +#define	S_IWGRP        _S_IWGRP
++#endif
 +#ifndef S_IRGRP
 +#define	S_IRGRP        _S_IRGRP
 +#endif
++#ifndef S_IRWXO
 +#define	S_IRWXO        _S_IRWXO
 +#define	S_IXOTH        _S_IXOTH
 +#define	S_IWOTH        _S_IWOTH
 +#define	S_IROTH        _S_IROTH
++#endif
 +
 +#endif
 +
 +#define	F_DUPFD	  	0	/* Duplicate file descriptor.  */
 +#define	F_GETFD		1	/* Get file descriptor flags.  */
 +#define	F_SETFD		2	/* Set file descriptor flags.  */
 +#define	F_GETFL		3	/* Get file status flags.  */
 +#define	F_SETFL		4	/* Set file status flags.  */
 +#define	F_GETOWN		5	/* Get owner (receiver of SIGIO).  */
 +#define	F_SETOWN		6	/* Set owner (receiver of SIGIO).  */
 +#define	F_GETLK		7	/* Get record locking info.  */
 +#define	F_SETLK		8	/* Set record locking info (non-blocking).  */
 +#define	F_SETLKW		9	/* Set record locking info (blocking).  */
 +
 +/* XXX missing */
 +#define	F_GETLK64	7	/* Get record locking info.  */
 +#define	F_SETLK64	8	/* Set record locking info (non-blocking).  */
 +#define	F_SETLKW64	9	/* Set record locking info (blocking).  */
 +
 +/* File descriptor flags used with F_GETFD and F_SETFD.  */
 +#define	FD_CLOEXEC	1	/* Close on exec.  */
 +
 +//NOT SURE IF O_NONBLOCK is OK here but at least the 0x0004 flag is not used by anything else...
 +#define	O_NONBLOCK 0x0004 /* Non-blocking I/O.  */
 +//#define	O_NDELAY   O_NONBLOCK
 +
 +/* Symbolic constants for the access() function */
 +#if !defined(F_OK)
 +    #define	R_OK    4       /*  Test for read permission    */
 +    #define	W_OK    2       /*  Test for write permission   */
 +    #define	X_OK    1       /*  Test for execute permission */
 +    #define	F_OK    0       /*  Test for existence of file  */
 +#endif
 +
 +
 +/* Replacement POSIX function */
 +extern int	 __la_fstat(int fd, struct stat *st);
 +extern int	 __la_lstat(const char *path, struct stat *st);
 +#if defined(__LA_LSEEK_NEEDED)
 +extern __int64	 __la_lseek(int fd, __int64 offset, int whence);
 +#endif
 +extern int	 __la_open(const char *path, int flags, ...);
 +extern ssize_t	 __la_read(int fd, void *buf, size_t nbytes);
 +extern int	 __la_stat(const char *path, struct stat *st);
 +extern pid_t	 __la_waitpid(HANDLE child, int *status, int option);
 +extern ssize_t	 __la_write(int fd, const void *buf, size_t nbytes);
 +
 +#define _stat64i32(path, st)	__la_stat(path, st)
 +#define _stat64(path, st)	__la_stat(path, st)
 +/* for status returned by la_waitpid */
 +#define WIFEXITED(sts)		((sts & 0x100) == 0)
 +#define WEXITSTATUS(sts)	(sts & 0x0FF)
 +
 +extern wchar_t *__la_win_permissive_name(const char *name);
 +extern wchar_t *__la_win_permissive_name_w(const wchar_t *wname);
 +extern void __la_dosmaperr(unsigned long e);
 +#define la_dosmaperr(e) __la_dosmaperr(e)
 +extern struct archive_entry *__la_win_entry_in_posix_pathseparator(
 +    struct archive_entry *);
 +
 +#if defined(HAVE_WCRTOMB) && defined(__BORLANDC__)
 +typedef int mbstate_t;
 +size_t wcrtomb(char *, wchar_t, mbstate_t *);
 +#endif
 +
 +#if defined(_MSC_VER) && _MSC_VER < 1300
 +WINBASEAPI BOOL WINAPI GetVolumePathNameW(
 +       LPCWSTR lpszFileName,
 +       LPWSTR lpszVolumePathName,
 +       DWORD cchBufferLength
 +       );
 +# if _WIN32_WINNT < 0x0500 /* windows.h not providing 0x500 API */
 +typedef struct _FILE_ALLOCATED_RANGE_BUFFER {
 +       LARGE_INTEGER FileOffset;
 +       LARGE_INTEGER Length;
 +} FILE_ALLOCATED_RANGE_BUFFER, *PFILE_ALLOCATED_RANGE_BUFFER;
 +#  define FSCTL_SET_SPARSE \
 +     CTL_CODE(FILE_DEVICE_FILE_SYSTEM, 49, METHOD_BUFFERED, FILE_WRITE_DATA)
 +#  define FSCTL_QUERY_ALLOCATED_RANGES \
 +     CTL_CODE(FILE_DEVICE_FILE_SYSTEM, 51,  METHOD_NEITHER, FILE_READ_DATA)
 +# endif
 +#endif
 +
 +#endif /* LIBARCHIVE_ARCHIVE_WINDOWS_H_INCLUDED */
diff --cc Utilities/cmlibarchive/libarchive/archive_write_add_filter_xz.c
index 4f849ce,0000000..e4a3535
mode 100644,000000..100644
--- a/Utilities/cmlibarchive/libarchive/archive_write_add_filter_xz.c
+++ b/Utilities/cmlibarchive/libarchive/archive_write_add_filter_xz.c
@@@ -1,547 -1,0 +1,547 @@@
 +/*-
 + * Copyright (c) 2003-2010 Tim Kientzle
 + * Copyright (c) 2009-2012 Michihiro NAKAJIMA
 + * All rights reserved.
 + *
 + * Redistribution and use in source and binary forms, with or without
 + * modification, are permitted provided that the following conditions
 + * are met:
 + * 1. Redistributions of source code must retain the above copyright
 + *    notice, this list of conditions and the following disclaimer.
 + * 2. Redistributions in binary form must reproduce the above copyright
 + *    notice, this list of conditions and the following disclaimer in the
 + *    documentation and/or other materials provided with the distribution.
 + *
 + * THIS SOFTWARE IS PROVIDED BY THE AUTHOR(S) ``AS IS'' AND ANY EXPRESS OR
 + * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
 + * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
 + * IN NO EVENT SHALL THE AUTHOR(S) BE LIABLE FOR ANY DIRECT, INDIRECT,
 + * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
 + * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
 + * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
 + * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
 + * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
 + * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
 + */
 +
 +#include "archive_platform.h"
 +
 +__FBSDID("$FreeBSD: head/lib/libarchive/archive_write_set_compression_xz.c 201108 2009-12-28 03:28:21Z kientzle $");
 +
 +#ifdef HAVE_ERRNO_H
 +#include <errno.h>
 +#endif
 +#ifdef HAVE_STDLIB_H
 +#include <stdlib.h>
 +#endif
 +#ifdef HAVE_STRING_H
 +#include <string.h>
 +#endif
 +#include <time.h>
 +#ifdef HAVE_LZMA_H
 +#include <cm_lzma.h>
 +#endif
 +
 +#include "archive.h"
 +#include "archive_endian.h"
 +#include "archive_private.h"
 +#include "archive_write_private.h"
 +
 +#if ARCHIVE_VERSION_NUMBER < 4000000
 +int
 +archive_write_set_compression_lzip(struct archive *a)
 +{
 +	__archive_write_filters_free(a);
 +	return (archive_write_add_filter_lzip(a));
 +}
 +
 +int
 +archive_write_set_compression_lzma(struct archive *a)
 +{
 +	__archive_write_filters_free(a);
 +	return (archive_write_add_filter_lzma(a));
 +}
 +
 +int
 +archive_write_set_compression_xz(struct archive *a)
 +{
 +	__archive_write_filters_free(a);
 +	return (archive_write_add_filter_xz(a));
 +}
 +
 +#endif
 +
 +#ifndef HAVE_LZMA_H
 +int
 +archive_write_add_filter_xz(struct archive *a)
 +{
 +	archive_set_error(a, ARCHIVE_ERRNO_MISC,
 +	    "xz compression not supported on this platform");
 +	return (ARCHIVE_FATAL);
 +}
 +
 +int
 +archive_write_add_filter_lzma(struct archive *a)
 +{
 +	archive_set_error(a, ARCHIVE_ERRNO_MISC,
 +	    "lzma compression not supported on this platform");
 +	return (ARCHIVE_FATAL);
 +}
 +
 +int
 +archive_write_add_filter_lzip(struct archive *a)
 +{
 +	archive_set_error(a, ARCHIVE_ERRNO_MISC,
 +	    "lzma compression not supported on this platform");
 +	return (ARCHIVE_FATAL);
 +}
 +#else
 +/* Don't compile this if we don't have liblzma. */
 +
 +struct private_data {
 +	int		 compression_level;
 +	uint32_t	 threads;
 +	lzma_stream	 stream;
 +	lzma_filter	 lzmafilters[2];
 +	lzma_options_lzma lzma_opt;
 +	int64_t		 total_in;
 +	unsigned char	*compressed;
 +	size_t		 compressed_buffer_size;
 +	int64_t		 total_out;
 +	/* the CRC32 value of uncompressed data for lzip */
 +	uint32_t	 crc32;
 +};
 +
 +static int	archive_compressor_xz_options(struct archive_write_filter *,
 +		    const char *, const char *);
 +static int	archive_compressor_xz_open(struct archive_write_filter *);
 +static int	archive_compressor_xz_write(struct archive_write_filter *,
 +		    const void *, size_t);
 +static int	archive_compressor_xz_close(struct archive_write_filter *);
 +static int	archive_compressor_xz_free(struct archive_write_filter *);
 +static int	drive_compressor(struct archive_write_filter *,
 +		    struct private_data *, int finishing);
 +
 +struct option_value {
 +	uint32_t dict_size;
 +	uint32_t nice_len;
 +	lzma_match_finder mf;
 +};
 +static const struct option_value option_values[] = {
 +	{ 1 << 16, 32, LZMA_MF_HC3},
 +	{ 1 << 20, 32, LZMA_MF_HC3},
 +	{ 3 << 19, 32, LZMA_MF_HC4},
 +	{ 1 << 21, 32, LZMA_MF_BT4},
 +	{ 3 << 20, 32, LZMA_MF_BT4},
 +	{ 1 << 22, 32, LZMA_MF_BT4},
 +	{ 1 << 23, 64, LZMA_MF_BT4},
 +	{ 1 << 24, 64, LZMA_MF_BT4},
 +	{ 3 << 23, 64, LZMA_MF_BT4},
 +	{ 1 << 25, 64, LZMA_MF_BT4}
 +};
 +
 +static int
 +common_setup(struct archive_write_filter *f)
 +{
 +	struct private_data *data;
 +	struct archive_write *a = (struct archive_write *)f->archive;
 +	data = calloc(1, sizeof(*data));
 +	if (data == NULL) {
 +		archive_set_error(&a->archive, ENOMEM, "Out of memory");
 +		return (ARCHIVE_FATAL);
 +	}
 +	f->data = data;
 +	data->compression_level = LZMA_PRESET_DEFAULT;
 +	data->threads = 1;
 +	f->open = &archive_compressor_xz_open;
 +	f->close = archive_compressor_xz_close;
 +	f->free = archive_compressor_xz_free;
 +	f->options = &archive_compressor_xz_options;
 +	return (ARCHIVE_OK);
 +}
 +
 +/*
 + * Add an xz compression filter to this write handle.
 + */
 +int
 +archive_write_add_filter_xz(struct archive *_a)
 +{
 +	struct archive_write_filter *f;
 +	int r;
 +
 +	archive_check_magic(_a, ARCHIVE_WRITE_MAGIC,
 +	    ARCHIVE_STATE_NEW, "archive_write_add_filter_xz");
 +	f = __archive_write_allocate_filter(_a);
 +	r = common_setup(f);
 +	if (r == ARCHIVE_OK) {
 +		f->code = ARCHIVE_FILTER_XZ;
 +		f->name = "xz";
 +	}
 +	return (r);
 +}
 +
 +/* LZMA is handled identically, we just need a different compression
 + * code set.  (The liblzma setup looks at the code to determine
 + * the one place that XZ and LZMA require different handling.) */
 +int
 +archive_write_add_filter_lzma(struct archive *_a)
 +{
 +	struct archive_write_filter *f;
 +	int r;
 +
 +	archive_check_magic(_a, ARCHIVE_WRITE_MAGIC,
 +	    ARCHIVE_STATE_NEW, "archive_write_add_filter_lzma");
 +	f = __archive_write_allocate_filter(_a);
 +	r = common_setup(f);
 +	if (r == ARCHIVE_OK) {
 +		f->code = ARCHIVE_FILTER_LZMA;
 +		f->name = "lzma";
 +	}
 +	return (r);
 +}
 +
 +int
 +archive_write_add_filter_lzip(struct archive *_a)
 +{
 +	struct archive_write_filter *f;
 +	int r;
 +
 +	archive_check_magic(_a, ARCHIVE_WRITE_MAGIC,
 +	    ARCHIVE_STATE_NEW, "archive_write_add_filter_lzip");
 +	f = __archive_write_allocate_filter(_a);
 +	r = common_setup(f);
 +	if (r == ARCHIVE_OK) {
 +		f->code = ARCHIVE_FILTER_LZIP;
 +		f->name = "lzip";
 +	}
 +	return (r);
 +}
 +
 +static int
 +archive_compressor_xz_init_stream(struct archive_write_filter *f,
 +    struct private_data *data)
 +{
 +	static const lzma_stream lzma_stream_init_data = LZMA_STREAM_INIT;
 +	int ret;
 +#ifdef HAVE_LZMA_STREAM_ENCODER_MT
 +	lzma_mt mt_options;
 +#endif
 +
 +	data->stream = lzma_stream_init_data;
 +	data->stream.next_out = data->compressed;
 +	data->stream.avail_out = data->compressed_buffer_size;
 +	if (f->code == ARCHIVE_FILTER_XZ) {
 +#ifdef HAVE_LZMA_STREAM_ENCODER_MT
 +		if (data->threads != 1) {
- 			bzero(&mt_options, sizeof(mt_options));
++			memset(&mt_options, 0, sizeof(mt_options));
 +			mt_options.threads = data->threads;
 +			mt_options.timeout = 300;
 +			mt_options.filters = data->lzmafilters;
 +			mt_options.check = LZMA_CHECK_CRC64;
 +			ret = lzma_stream_encoder_mt(&(data->stream),
 +			    &mt_options);
 +		} else
 +#endif
 +			ret = lzma_stream_encoder(&(data->stream),
 +			    data->lzmafilters, LZMA_CHECK_CRC64);
 +	} else if (f->code == ARCHIVE_FILTER_LZMA) {
 +		ret = lzma_alone_encoder(&(data->stream), &data->lzma_opt);
 +	} else {	/* ARCHIVE_FILTER_LZIP */
 +		int dict_size = data->lzma_opt.dict_size;
 +		int ds, log2dic, wedges;
 +
 +		/* Calculate a coded dictionary size */
 +		if (dict_size < (1 << 12) || dict_size > (1 << 27)) {
 +			archive_set_error(f->archive, ARCHIVE_ERRNO_MISC,
 +			    "Unacceptable dictionary size for lzip: %d",
 +			    dict_size);
 +			return (ARCHIVE_FATAL);
 +		}
 +		for (log2dic = 27; log2dic >= 12; log2dic--) {
 +			if (dict_size & (1 << log2dic))
 +				break;
 +		}
 +		if (dict_size > (1 << log2dic)) {
 +			log2dic++;
 +			wedges =
 +			    ((1 << log2dic) - dict_size) / (1 << (log2dic - 4));
 +		} else
 +			wedges = 0;
 +		ds = ((wedges << 5) & 0xe0) | (log2dic & 0x1f);
 +
 +		data->crc32 = 0;
 +		/* Make a header */
 +		data->compressed[0] = 0x4C;
 +		data->compressed[1] = 0x5A;
 +		data->compressed[2] = 0x49;
 +		data->compressed[3] = 0x50;
 +		data->compressed[4] = 1;/* Version */
 +		data->compressed[5] = (unsigned char)ds;
 +		data->stream.next_out += 6;
 +		data->stream.avail_out -= 6;
 +
 +		ret = lzma_raw_encoder(&(data->stream), data->lzmafilters);
 +	}
 +	if (ret == LZMA_OK)
 +		return (ARCHIVE_OK);
 +
 +	switch (ret) {
 +	case LZMA_MEM_ERROR:
 +		archive_set_error(f->archive, ENOMEM,
 +		    "Internal error initializing compression library: "
 +		    "Cannot allocate memory");
 +		break;
 +	default:
 +		archive_set_error(f->archive, ARCHIVE_ERRNO_MISC,
 +		    "Internal error initializing compression library: "
 +		    "It's a bug in liblzma");
 +		break;
 +	}
 +	return (ARCHIVE_FATAL);
 +}
 +
 +/*
 + * Setup callback.
 + */
 +static int
 +archive_compressor_xz_open(struct archive_write_filter *f)
 +{
 +	struct private_data *data = f->data;
 +	int ret;
 +
 +	ret = __archive_write_open_filter(f->next_filter);
 +	if (ret != ARCHIVE_OK)
 +		return (ret);
 +
 +	if (data->compressed == NULL) {
 +		size_t bs = 65536, bpb;
 +		if (f->archive->magic == ARCHIVE_WRITE_MAGIC) {
 +			/* Buffer size should be a multiple number of the of bytes
 +			 * per block for performance. */
 +			bpb = archive_write_get_bytes_per_block(f->archive);
 +			if (bpb > bs)
 +				bs = bpb;
 +			else if (bpb != 0)
 +				bs -= bs % bpb;
 +		}
 +		data->compressed_buffer_size = bs;
 +		data->compressed
 +		    = (unsigned char *)malloc(data->compressed_buffer_size);
 +		if (data->compressed == NULL) {
 +			archive_set_error(f->archive, ENOMEM,
 +			    "Can't allocate data for compression buffer");
 +			return (ARCHIVE_FATAL);
 +		}
 +	}
 +
 +	f->write = archive_compressor_xz_write;
 +
 +	/* Initialize compression library. */
 +	if (f->code == ARCHIVE_FILTER_LZIP) {
 +		const struct option_value *val =
 +		    &option_values[data->compression_level];
 +
 +		data->lzma_opt.dict_size = val->dict_size;
 +		data->lzma_opt.preset_dict = NULL;
 +		data->lzma_opt.preset_dict_size = 0;
 +		data->lzma_opt.lc = LZMA_LC_DEFAULT;
 +		data->lzma_opt.lp = LZMA_LP_DEFAULT;
 +		data->lzma_opt.pb = LZMA_PB_DEFAULT;
 +		data->lzma_opt.mode =
 +		    data->compression_level<= 2? LZMA_MODE_FAST:LZMA_MODE_NORMAL;
 +		data->lzma_opt.nice_len = val->nice_len;
 +		data->lzma_opt.mf = val->mf;
 +		data->lzma_opt.depth = 0;
 +		data->lzmafilters[0].id = LZMA_FILTER_LZMA1;
 +		data->lzmafilters[0].options = &data->lzma_opt;
 +		data->lzmafilters[1].id = LZMA_VLI_UNKNOWN;/* Terminate */
 +	} else {
 +		if (lzma_lzma_preset(&data->lzma_opt, data->compression_level)) {
 +			archive_set_error(f->archive, ARCHIVE_ERRNO_MISC,
 +			    "Internal error initializing compression library");
 +		}
 +		data->lzmafilters[0].id = LZMA_FILTER_LZMA2;
 +		data->lzmafilters[0].options = &data->lzma_opt;
 +		data->lzmafilters[1].id = LZMA_VLI_UNKNOWN;/* Terminate */
 +	}
 +	ret = archive_compressor_xz_init_stream(f, data);
 +	if (ret == LZMA_OK) {
 +		f->data = data;
 +		return (0);
 +	}
 +	return (ARCHIVE_FATAL);
 +}
 +
 +/*
 + * Set write options.
 + */
 +static int
 +archive_compressor_xz_options(struct archive_write_filter *f,
 +    const char *key, const char *value)
 +{
 +	struct private_data *data = (struct private_data *)f->data;
 +
 +	if (strcmp(key, "compression-level") == 0) {
 +		if (value == NULL || !(value[0] >= '0' && value[0] <= '9') ||
 +		    value[1] != '\0')
 +			return (ARCHIVE_WARN);
 +		data->compression_level = value[0] - '0';
 +		if (data->compression_level > 6)
 +			data->compression_level = 6;
 +		return (ARCHIVE_OK);
 +	} else if (strcmp(key, "threads") == 0) {
 +		if (value == NULL)
 +			return (ARCHIVE_WARN);
 +		data->threads = (int)strtoul(value, NULL, 10);
 +		if (data->threads == 0 && errno != 0) {
 +			data->threads = 1;
 +			return (ARCHIVE_WARN);
 +		}
 +		if (data->threads == 0) {
 +#ifdef HAVE_LZMA_STREAM_ENCODER_MT
 +			data->threads = lzma_cputhreads();
 +#else
 +			data->threads = 1;
 +#endif
 +		}
 +		return (ARCHIVE_OK);
 +	}
 +
 +	/* Note: The "warn" return is just to inform the options
 +	 * supervisor that we didn't handle it.  It will generate
 +	 * a suitable error if no one used this option. */
 +	return (ARCHIVE_WARN);
 +}
 +
 +/*
 + * Write data to the compressed stream.
 + */
 +static int
 +archive_compressor_xz_write(struct archive_write_filter *f,
 +    const void *buff, size_t length)
 +{
 +	struct private_data *data = (struct private_data *)f->data;
 +	int ret;
 +
 +	/* Update statistics */
 +	data->total_in += length;
 +	if (f->code == ARCHIVE_FILTER_LZIP)
 +		data->crc32 = lzma_crc32(buff, length, data->crc32);
 +
 +	/* Compress input data to output buffer */
 +	data->stream.next_in = buff;
 +	data->stream.avail_in = length;
 +	if ((ret = drive_compressor(f, data, 0)) != ARCHIVE_OK)
 +		return (ret);
 +
 +	return (ARCHIVE_OK);
 +}
 +
 +
 +/*
 + * Finish the compression...
 + */
 +static int
 +archive_compressor_xz_close(struct archive_write_filter *f)
 +{
 +	struct private_data *data = (struct private_data *)f->data;
 +	int ret, r1;
 +
 +	ret = drive_compressor(f, data, 1);
 +	if (ret == ARCHIVE_OK) {
 +		data->total_out +=
 +		    data->compressed_buffer_size - data->stream.avail_out;
 +		ret = __archive_write_filter(f->next_filter,
 +		    data->compressed,
 +		    data->compressed_buffer_size - data->stream.avail_out);
 +		if (f->code == ARCHIVE_FILTER_LZIP && ret == ARCHIVE_OK) {
 +			archive_le32enc(data->compressed, data->crc32);
 +			archive_le64enc(data->compressed+4, data->total_in);
 +			archive_le64enc(data->compressed+12, data->total_out + 20);
 +			ret = __archive_write_filter(f->next_filter,
 +			    data->compressed, 20);
 +		}
 +	}
 +	lzma_end(&(data->stream));
 +	r1 = __archive_write_close_filter(f->next_filter);
 +	return (r1 < ret ? r1 : ret);
 +}
 +
 +static int
 +archive_compressor_xz_free(struct archive_write_filter *f)
 +{
 +	struct private_data *data = (struct private_data *)f->data;
 +	free(data->compressed);
 +	free(data);
 +	f->data = NULL;
 +	return (ARCHIVE_OK);
 +}
 +
 +/*
 + * Utility function to push input data through compressor,
 + * writing full output blocks as necessary.
 + *
 + * Note that this handles both the regular write case (finishing ==
 + * false) and the end-of-archive case (finishing == true).
 + */
 +static int
 +drive_compressor(struct archive_write_filter *f,
 +    struct private_data *data, int finishing)
 +{
 +	int ret;
 +
 +	for (;;) {
 +		if (data->stream.avail_out == 0) {
 +			data->total_out += data->compressed_buffer_size;
 +			ret = __archive_write_filter(f->next_filter,
 +			    data->compressed,
 +			    data->compressed_buffer_size);
 +			if (ret != ARCHIVE_OK)
 +				return (ARCHIVE_FATAL);
 +			data->stream.next_out = data->compressed;
 +			data->stream.avail_out = data->compressed_buffer_size;
 +		}
 +
 +		/* If there's nothing to do, we're done. */
 +		if (!finishing && data->stream.avail_in == 0)
 +			return (ARCHIVE_OK);
 +
 +		ret = lzma_code(&(data->stream),
 +		    finishing ? LZMA_FINISH : LZMA_RUN );
 +
 +		switch (ret) {
 +		case LZMA_OK:
 +			/* In non-finishing case, check if compressor
 +			 * consumed everything */
 +			if (!finishing && data->stream.avail_in == 0)
 +				return (ARCHIVE_OK);
 +			/* In finishing case, this return always means
 +			 * there's more work */
 +			break;
 +		case LZMA_STREAM_END:
 +			/* This return can only occur in finishing case. */
 +			if (finishing)
 +				return (ARCHIVE_OK);
 +			archive_set_error(f->archive, ARCHIVE_ERRNO_MISC,
 +			    "lzma compression data error");
 +			return (ARCHIVE_FATAL);
 +		case LZMA_MEMLIMIT_ERROR:
 +			archive_set_error(f->archive, ENOMEM,
 +			    "lzma compression error: "
 +			    "%ju MiB would have been needed",
 +			    (uintmax_t)((lzma_memusage(&(data->stream))
 +				    + 1024 * 1024 -1)
 +				/ (1024 * 1024)));
 +			return (ARCHIVE_FATAL);
 +		default:
 +			/* Any other return value indicates an error. */
 +			archive_set_error(f->archive, ARCHIVE_ERRNO_MISC,
 +			    "lzma compression failed:"
 +			    " lzma_code() call returned status %d",
 +			    ret);
 +			return (ARCHIVE_FATAL);
 +		}
 +	}
 +}
 +
 +#endif /* HAVE_LZMA_H */
diff --cc Utilities/cmlibarchive/libarchive/archive_write_disk_posix.c
index 5946683,0000000..53629ac
mode 100644,000000..100644
--- a/Utilities/cmlibarchive/libarchive/archive_write_disk_posix.c
+++ b/Utilities/cmlibarchive/libarchive/archive_write_disk_posix.c
@@@ -1,3903 -1,0 +1,4206 @@@
 +/*-
 + * Copyright (c) 2003-2010 Tim Kientzle
 + * Copyright (c) 2012 Michihiro NAKAJIMA
 + * All rights reserved.
 + *
 + * Redistribution and use in source and binary forms, with or without
 + * modification, are permitted provided that the following conditions
 + * are met:
 + * 1. Redistributions of source code must retain the above copyright
 + *    notice, this list of conditions and the following disclaimer
 + *    in this position and unchanged.
 + * 2. Redistributions in binary form must reproduce the above copyright
 + *    notice, this list of conditions and the following disclaimer in the
 + *    documentation and/or other materials provided with the distribution.
 + *
 + * THIS SOFTWARE IS PROVIDED BY THE AUTHOR(S) ``AS IS'' AND ANY EXPRESS OR
 + * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
 + * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
 + * IN NO EVENT SHALL THE AUTHOR(S) BE LIABLE FOR ANY DIRECT, INDIRECT,
 + * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
 + * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
 + * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
 + * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
 + * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
 + * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
 + */
 +
 +#include "archive_platform.h"
 +__FBSDID("$FreeBSD$");
 +
 +#if !defined(_WIN32) || defined(__CYGWIN__)
 +
 +#ifdef HAVE_SYS_TYPES_H
 +#include <sys/types.h>
 +#endif
 +#ifdef HAVE_SYS_ACL_H
 +#include <sys/acl.h>
 +#endif
 +#ifdef HAVE_SYS_EXTATTR_H
 +#include <sys/extattr.h>
 +#endif
 +#if defined(HAVE_SYS_XATTR_H)
 +#include <sys/xattr.h>
 +#elif defined(HAVE_ATTR_XATTR_H)
 +#include <attr/xattr.h>
 +#endif
 +#ifdef HAVE_SYS_EA_H
 +#include <sys/ea.h>
 +#endif
 +#ifdef HAVE_SYS_IOCTL_H
 +#include <sys/ioctl.h>
 +#endif
 +#ifdef HAVE_SYS_STAT_H
 +#include <sys/stat.h>
 +#endif
 +#ifdef HAVE_SYS_TIME_H
 +#include <sys/time.h>
 +#endif
 +#ifdef HAVE_SYS_UTIME_H
 +#include <sys/utime.h>
 +#endif
 +#ifdef HAVE_COPYFILE_H
 +#include <copyfile.h>
 +#endif
 +#ifdef HAVE_ERRNO_H
 +#include <errno.h>
 +#endif
 +#ifdef HAVE_FCNTL_H
 +#include <fcntl.h>
 +#endif
 +#ifdef HAVE_GRP_H
 +#include <grp.h>
 +#endif
 +#ifdef HAVE_LANGINFO_H
 +#include <langinfo.h>
 +#endif
 +#ifdef HAVE_LINUX_FS_H
 +#include <linux/fs.h>	/* for Linux file flags */
 +#endif
 +/*
 + * Some Linux distributions have both linux/ext2_fs.h and ext2fs/ext2_fs.h.
 + * As the include guards don't agree, the order of include is important.
 + */
 +#ifdef HAVE_LINUX_EXT2_FS_H
 +#include <linux/ext2_fs.h>	/* for Linux file flags */
 +#endif
 +#if defined(HAVE_EXT2FS_EXT2_FS_H) && !defined(__CYGWIN__)
 +#include <ext2fs/ext2_fs.h>	/* Linux file flags, broken on Cygwin */
 +#endif
 +#ifdef HAVE_LIMITS_H
 +#include <limits.h>
 +#endif
 +#ifdef HAVE_PWD_H
 +#include <pwd.h>
 +#endif
 +#include <stdio.h>
 +#ifdef HAVE_STDLIB_H
 +#include <stdlib.h>
 +#endif
 +#ifdef HAVE_STRING_H
 +#include <string.h>
 +#endif
 +#ifdef HAVE_UNISTD_H
 +#include <unistd.h>
 +#endif
 +#ifdef HAVE_UTIME_H
 +#include <utime.h>
 +#endif
 +#ifdef F_GETTIMES /* Tru64 specific */
 +#include <sys/fcntl1.h>
 +#endif
 +
++/*
++ * Macro to cast st_mtime and time_t to an int64 so that 2 numbers can reliably be compared.
++ *
++ * It assumes that the input is an integer type of no more than 64 bits.
++ * If the number is less than zero, t must be a signed type, so it fits in
++ * int64_t. Otherwise, it's a nonnegative value so we can cast it to uint64_t
++ * without loss. But it could be a large unsigned value, so we have to clip it
++ * to INT64_MAX.*
++ */
++#define to_int64_time(t) \
++   ((t) < 0 ? (int64_t)(t) : (uint64_t)(t) > (uint64_t)INT64_MAX ? INT64_MAX : (int64_t)(t))
++
 +#if __APPLE__
 +#include <TargetConditionals.h>
 +#if TARGET_OS_MAC && !TARGET_OS_EMBEDDED && HAVE_QUARANTINE_H
 +#include <quarantine.h>
 +#define HAVE_QUARANTINE 1
 +#endif
 +#endif
 +
 +#ifdef HAVE_ZLIB_H
 +#include <cm_zlib.h>
 +#endif
 +
 +/* TODO: Support Mac OS 'quarantine' feature.  This is really just a
 + * standard tag to mark files that have been downloaded as "tainted".
 + * On Mac OS, we should mark the extracted files as tainted if the
 + * archive being read was tainted.  Windows has a similar feature; we
 + * should investigate ways to support this generically. */
 +
 +#include "archive.h"
 +#include "archive_acl_private.h"
 +#include "archive_string.h"
 +#include "archive_endian.h"
 +#include "archive_entry.h"
 +#include "archive_private.h"
 +#include "archive_write_disk_private.h"
 +
 +#ifndef O_BINARY
 +#define O_BINARY 0
 +#endif
 +#ifndef O_CLOEXEC
- #define O_CLOEXEC	0
++#define O_CLOEXEC 0
++#endif
++
++/* Ignore non-int O_NOFOLLOW constant. */
++/* gnulib's fcntl.h does this on AIX, but it seems practical everywhere */
++#if defined O_NOFOLLOW && !(INT_MIN <= O_NOFOLLOW && O_NOFOLLOW <= INT_MAX)
++#undef O_NOFOLLOW
++#endif
++
++#ifndef O_NOFOLLOW
++#define O_NOFOLLOW 0
 +#endif
 +
 +struct fixup_entry {
 +	struct fixup_entry	*next;
 +	struct archive_acl	 acl;
 +	mode_t			 mode;
 +	int64_t			 atime;
 +	int64_t                  birthtime;
 +	int64_t			 mtime;
 +	int64_t			 ctime;
 +	unsigned long		 atime_nanos;
 +	unsigned long            birthtime_nanos;
 +	unsigned long		 mtime_nanos;
 +	unsigned long		 ctime_nanos;
 +	unsigned long		 fflags_set;
 +	size_t			 mac_metadata_size;
 +	void			*mac_metadata;
 +	int			 fixup; /* bitmask of what needs fixing */
 +	char			*name;
 +};
 +
 +/*
 + * We use a bitmask to track which operations remain to be done for
 + * this file.  In particular, this helps us avoid unnecessary
 + * operations when it's possible to take care of one step as a
 + * side-effect of another.  For example, mkdir() can specify the mode
 + * for the newly-created object but symlink() cannot.  This means we
 + * can skip chmod() if mkdir() succeeded, but we must explicitly
 + * chmod() if we're trying to create a directory that already exists
 + * (mkdir() failed) or if we're restoring a symlink.  Similarly, we
 + * need to verify UID/GID before trying to restore SUID/SGID bits;
 + * that verification can occur explicitly through a stat() call or
 + * implicitly because of a successful chown() call.
 + */
 +#define	TODO_MODE_FORCE		0x40000000
 +#define	TODO_MODE_BASE		0x20000000
 +#define	TODO_SUID		0x10000000
 +#define	TODO_SUID_CHECK		0x08000000
 +#define	TODO_SGID		0x04000000
 +#define	TODO_SGID_CHECK		0x02000000
 +#define	TODO_APPLEDOUBLE	0x01000000
 +#define	TODO_MODE		(TODO_MODE_BASE|TODO_SUID|TODO_SGID)
 +#define	TODO_TIMES		ARCHIVE_EXTRACT_TIME
 +#define	TODO_OWNER		ARCHIVE_EXTRACT_OWNER
 +#define	TODO_FFLAGS		ARCHIVE_EXTRACT_FFLAGS
 +#define	TODO_ACLS		ARCHIVE_EXTRACT_ACL
 +#define	TODO_XATTR		ARCHIVE_EXTRACT_XATTR
 +#define	TODO_MAC_METADATA	ARCHIVE_EXTRACT_MAC_METADATA
 +#define	TODO_HFS_COMPRESSION	ARCHIVE_EXTRACT_HFS_COMPRESSION_FORCED
 +
 +struct archive_write_disk {
 +	struct archive	archive;
 +
 +	mode_t			 user_umask;
 +	struct fixup_entry	*fixup_list;
 +	struct fixup_entry	*current_fixup;
 +	int64_t			 user_uid;
 +	int			 skip_file_set;
 +	int64_t			 skip_file_dev;
 +	int64_t			 skip_file_ino;
 +	time_t			 start_time;
 +
 +	int64_t (*lookup_gid)(void *private, const char *gname, int64_t gid);
 +	void  (*cleanup_gid)(void *private);
 +	void			*lookup_gid_data;
 +	int64_t (*lookup_uid)(void *private, const char *uname, int64_t uid);
 +	void  (*cleanup_uid)(void *private);
 +	void			*lookup_uid_data;
 +
 +	/*
 +	 * Full path of last file to satisfy symlink checks.
 +	 */
 +	struct archive_string	path_safe;
 +
 +	/*
 +	 * Cached stat data from disk for the current entry.
 +	 * If this is valid, pst points to st.  Otherwise,
 +	 * pst is null.
 +	 */
 +	struct stat		 st;
 +	struct stat		*pst;
 +
 +	/* Information about the object being restored right now. */
 +	struct archive_entry	*entry; /* Entry being extracted. */
 +	char			*name; /* Name of entry, possibly edited. */
 +	struct archive_string	 _name_data; /* backing store for 'name' */
 +	/* Tasks remaining for this object. */
 +	int			 todo;
 +	/* Tasks deferred until end-of-archive. */
 +	int			 deferred;
 +	/* Options requested by the client. */
 +	int			 flags;
 +	/* Handle for the file we're restoring. */
 +	int			 fd;
 +	/* Current offset for writing data to the file. */
 +	int64_t			 offset;
 +	/* Last offset actually written to disk. */
 +	int64_t			 fd_offset;
 +	/* Total bytes actually written to files. */
 +	int64_t			 total_bytes_written;
 +	/* Maximum size of file, -1 if unknown. */
 +	int64_t			 filesize;
 +	/* Dir we were in before this restore; only for deep paths. */
 +	int			 restore_pwd;
 +	/* Mode we should use for this entry; affected by _PERM and umask. */
 +	mode_t			 mode;
 +	/* UID/GID to use in restoring this entry. */
 +	int64_t			 uid;
 +	int64_t			 gid;
 +	/*
 +	 * HFS+ Compression.
 +	 */
 +	/* Xattr "com.apple.decmpfs". */
 +	uint32_t		 decmpfs_attr_size;
 +	unsigned char		*decmpfs_header_p;
 +	/* ResourceFork set options used for fsetxattr. */
 +	int			 rsrc_xattr_options;
 +	/* Xattr "com.apple.ResourceFork". */
 +	unsigned char		*resource_fork;
 +	size_t			 resource_fork_allocated_size;
 +	unsigned int		 decmpfs_block_count;
 +	uint32_t		*decmpfs_block_info;
 +	/* Buffer for compressed data. */
 +	unsigned char		*compressed_buffer;
 +	size_t			 compressed_buffer_size;
 +	size_t			 compressed_buffer_remaining;
 +	/* The offset of the ResourceFork where compressed data will
 +	 * be placed. */
 +	uint32_t		 compressed_rsrc_position;
 +	uint32_t		 compressed_rsrc_position_v;
 +	/* Buffer for uncompressed data. */
 +	char			*uncompressed_buffer;
 +	size_t			 block_remaining_bytes;
 +	size_t			 file_remaining_bytes;
 +#ifdef HAVE_ZLIB_H
 +	z_stream		 stream;
 +	int			 stream_valid;
 +	int			 decmpfs_compression_level;
 +#endif
 +};
 +
 +/*
 + * Default mode for dirs created automatically (will be modified by umask).
 + * Note that POSIX specifies 0777 for implicitly-created dirs, "modified
 + * by the process' file creation mask."
 + */
 +#define	DEFAULT_DIR_MODE 0777
 +/*
 + * Dir modes are restored in two steps:  During the extraction, the permissions
 + * in the archive are modified to match the following limits.  During
 + * the post-extract fixup pass, the permissions from the archive are
 + * applied.
 + */
 +#define	MINIMUM_DIR_MODE 0700
 +#define	MAXIMUM_DIR_MODE 0775
 +
 +/*
-  * Maxinum uncompressed size of a decmpfs block.
++ * Maximum uncompressed size of a decmpfs block.
 + */
 +#define MAX_DECMPFS_BLOCK_SIZE	(64 * 1024)
 +/*
 + * HFS+ compression type.
 + */
 +#define CMP_XATTR		3/* Compressed data in xattr. */
 +#define CMP_RESOURCE_FORK	4/* Compressed data in resource fork. */
 +/*
 + * HFS+ compression resource fork.
 + */
 +#define RSRC_H_SIZE	260	/* Base size of Resource fork header. */
 +#define RSRC_F_SIZE	50	/* Size of Resource fork footer. */
 +/* Size to write compressed data to resource fork. */
 +#define COMPRESSED_W_SIZE	(64 * 1024)
- /* decmpfs difinitions. */
++/* decmpfs definitions. */
 +#define MAX_DECMPFS_XATTR_SIZE		3802
 +#ifndef DECMPFS_XATTR_NAME
 +#define DECMPFS_XATTR_NAME		"com.apple.decmpfs"
 +#endif
 +#define DECMPFS_MAGIC			0x636d7066
 +#define DECMPFS_COMPRESSION_MAGIC	0
 +#define DECMPFS_COMPRESSION_TYPE	4
 +#define DECMPFS_UNCOMPRESSED_SIZE	8
 +#define DECMPFS_HEADER_SIZE		16
 +
 +#define HFS_BLOCKS(s)	((s) >> 12)
 +
++static void	fsobj_error(int *, struct archive_string *, int, const char *,
++		    const char *);
++static int	check_symlinks_fsobj(char *, int *, struct archive_string *,
++		    int);
 +static int	check_symlinks(struct archive_write_disk *);
 +static int	create_filesystem_object(struct archive_write_disk *);
- static struct fixup_entry *current_fixup(struct archive_write_disk *, const char *pathname);
++static struct fixup_entry *current_fixup(struct archive_write_disk *,
++		    const char *pathname);
 +#if defined(HAVE_FCHDIR) && defined(PATH_MAX)
 +static void	edit_deep_directories(struct archive_write_disk *ad);
 +#endif
++static int	cleanup_pathname_fsobj(char *, int *, struct archive_string *,
++		    int);
 +static int	cleanup_pathname(struct archive_write_disk *);
 +static int	create_dir(struct archive_write_disk *, char *);
 +static int	create_parent_dir(struct archive_write_disk *, char *);
 +static ssize_t	hfs_write_data_block(struct archive_write_disk *,
 +		    const char *, size_t);
 +static int	fixup_appledouble(struct archive_write_disk *, const char *);
 +static int	older(struct stat *, struct archive_entry *);
 +static int	restore_entry(struct archive_write_disk *);
 +static int	set_mac_metadata(struct archive_write_disk *, const char *,
 +				 const void *, size_t);
 +static int	set_xattrs(struct archive_write_disk *);
 +static int	clear_nochange_fflags(struct archive_write_disk *);
 +static int	set_fflags(struct archive_write_disk *);
 +static int	set_fflags_platform(struct archive_write_disk *, int fd,
 +		    const char *name, mode_t mode,
 +		    unsigned long fflags_set, unsigned long fflags_clear);
 +static int	set_ownership(struct archive_write_disk *);
 +static int	set_mode(struct archive_write_disk *, int mode);
 +static int	set_time(int, int, const char *, time_t, long, time_t, long);
 +static int	set_times(struct archive_write_disk *, int, int, const char *,
 +		    time_t, long, time_t, long, time_t, long, time_t, long);
 +static int	set_times_from_entry(struct archive_write_disk *);
 +static struct fixup_entry *sort_dir_list(struct fixup_entry *p);
 +static ssize_t	write_data_block(struct archive_write_disk *,
 +		    const char *, size_t);
 +
 +static struct archive_vtable *archive_write_disk_vtable(void);
 +
 +static int	_archive_write_disk_close(struct archive *);
 +static int	_archive_write_disk_free(struct archive *);
- static int	_archive_write_disk_header(struct archive *, struct archive_entry *);
++static int	_archive_write_disk_header(struct archive *,
++		    struct archive_entry *);
 +static int64_t	_archive_write_disk_filter_bytes(struct archive *, int);
 +static int	_archive_write_disk_finish_entry(struct archive *);
- static ssize_t	_archive_write_disk_data(struct archive *, const void *, size_t);
- static ssize_t	_archive_write_disk_data_block(struct archive *, const void *, size_t, int64_t);
++static ssize_t	_archive_write_disk_data(struct archive *, const void *,
++		    size_t);
++static ssize_t	_archive_write_disk_data_block(struct archive *, const void *,
++		    size_t, int64_t);
 +
 +static int
 +lazy_stat(struct archive_write_disk *a)
 +{
 +	if (a->pst != NULL) {
 +		/* Already have stat() data available. */
 +		return (ARCHIVE_OK);
 +	}
 +#ifdef HAVE_FSTAT
 +	if (a->fd >= 0 && fstat(a->fd, &a->st) == 0) {
 +		a->pst = &a->st;
 +		return (ARCHIVE_OK);
 +	}
 +#endif
 +	/*
 +	 * XXX At this point, symlinks should not be hit, otherwise
 +	 * XXX a race occurred.  Do we want to check explicitly for that?
 +	 */
 +	if (lstat(a->name, &a->st) == 0) {
 +		a->pst = &a->st;
 +		return (ARCHIVE_OK);
 +	}
 +	archive_set_error(&a->archive, errno, "Couldn't stat file");
 +	return (ARCHIVE_WARN);
 +}
 +
 +static struct archive_vtable *
 +archive_write_disk_vtable(void)
 +{
 +	static struct archive_vtable av;
 +	static int inited = 0;
 +
 +	if (!inited) {
 +		av.archive_close = _archive_write_disk_close;
 +		av.archive_filter_bytes = _archive_write_disk_filter_bytes;
 +		av.archive_free = _archive_write_disk_free;
 +		av.archive_write_header = _archive_write_disk_header;
 +		av.archive_write_finish_entry
 +		    = _archive_write_disk_finish_entry;
 +		av.archive_write_data = _archive_write_disk_data;
 +		av.archive_write_data_block = _archive_write_disk_data_block;
 +		inited = 1;
 +	}
 +	return (&av);
 +}
 +
 +static int64_t
 +_archive_write_disk_filter_bytes(struct archive *_a, int n)
 +{
 +	struct archive_write_disk *a = (struct archive_write_disk *)_a;
 +	(void)n; /* UNUSED */
 +	if (n == -1 || n == 0)
 +		return (a->total_bytes_written);
 +	return (-1);
 +}
 +
 +
 +int
 +archive_write_disk_set_options(struct archive *_a, int flags)
 +{
 +	struct archive_write_disk *a = (struct archive_write_disk *)_a;
 +
 +	a->flags = flags;
 +	return (ARCHIVE_OK);
 +}
 +
 +
 +/*
 + * Extract this entry to disk.
 + *
 + * TODO: Validate hardlinks.  According to the standards, we're
 + * supposed to check each extracted hardlink and squawk if it refers
 + * to a file that we didn't restore.  I'm not entirely convinced this
 + * is a good idea, but more importantly: Is there any way to validate
 + * hardlinks without keeping a complete list of filenames from the
 + * entire archive?? Ugh.
 + *
 + */
 +static int
 +_archive_write_disk_header(struct archive *_a, struct archive_entry *entry)
 +{
 +	struct archive_write_disk *a = (struct archive_write_disk *)_a;
 +	struct fixup_entry *fe;
 +	int ret, r;
 +
 +	archive_check_magic(&a->archive, ARCHIVE_WRITE_DISK_MAGIC,
 +	    ARCHIVE_STATE_HEADER | ARCHIVE_STATE_DATA,
 +	    "archive_write_disk_header");
 +	archive_clear_error(&a->archive);
 +	if (a->archive.state & ARCHIVE_STATE_DATA) {
 +		r = _archive_write_disk_finish_entry(&a->archive);
 +		if (r == ARCHIVE_FATAL)
 +			return (r);
 +	}
 +
 +	/* Set up for this particular entry. */
 +	a->pst = NULL;
 +	a->current_fixup = NULL;
 +	a->deferred = 0;
 +	if (a->entry) {
 +		archive_entry_free(a->entry);
 +		a->entry = NULL;
 +	}
 +	a->entry = archive_entry_clone(entry);
 +	a->fd = -1;
 +	a->fd_offset = 0;
 +	a->offset = 0;
 +	a->restore_pwd = -1;
 +	a->uid = a->user_uid;
 +	a->mode = archive_entry_mode(a->entry);
 +	if (archive_entry_size_is_set(a->entry))
 +		a->filesize = archive_entry_size(a->entry);
 +	else
 +		a->filesize = -1;
 +	archive_strcpy(&(a->_name_data), archive_entry_pathname(a->entry));
 +	a->name = a->_name_data.s;
 +	archive_clear_error(&a->archive);
 +
 +	/*
 +	 * Clean up the requested path.  This is necessary for correct
 +	 * dir restores; the dir restore logic otherwise gets messed
 +	 * up by nonsense like "dir/.".
 +	 */
 +	ret = cleanup_pathname(a);
 +	if (ret != ARCHIVE_OK)
 +		return (ret);
 +
 +	/*
 +	 * Query the umask so we get predictable mode settings.
 +	 * This gets done on every call to _write_header in case the
 +	 * user edits their umask during the extraction for some
 +	 * reason.
 +	 */
 +	umask(a->user_umask = umask(0));
 +
 +	/* Figure out what we need to do for this entry. */
 +	a->todo = TODO_MODE_BASE;
 +	if (a->flags & ARCHIVE_EXTRACT_PERM) {
 +		a->todo |= TODO_MODE_FORCE; /* Be pushy about permissions. */
 +		/*
 +		 * SGID requires an extra "check" step because we
 +		 * cannot easily predict the GID that the system will
 +		 * assign.  (Different systems assign GIDs to files
 +		 * based on a variety of criteria, including process
 +		 * credentials and the gid of the enclosing
 +		 * directory.)  We can only restore the SGID bit if
 +		 * the file has the right GID, and we only know the
 +		 * GID if we either set it (see set_ownership) or if
 +		 * we've actually called stat() on the file after it
 +		 * was restored.  Since there are several places at
 +		 * which we might verify the GID, we need a TODO bit
 +		 * to keep track.
 +		 */
 +		if (a->mode & S_ISGID)
 +			a->todo |= TODO_SGID | TODO_SGID_CHECK;
 +		/*
 +		 * Verifying the SUID is simpler, but can still be
 +		 * done in multiple ways, hence the separate "check" bit.
 +		 */
 +		if (a->mode & S_ISUID)
 +			a->todo |= TODO_SUID | TODO_SUID_CHECK;
 +	} else {
 +		/*
 +		 * User didn't request full permissions, so don't
 +		 * restore SUID, SGID bits and obey umask.
 +		 */
 +		a->mode &= ~S_ISUID;
 +		a->mode &= ~S_ISGID;
 +		a->mode &= ~S_ISVTX;
 +		a->mode &= ~a->user_umask;
 +	}
 +	if (a->flags & ARCHIVE_EXTRACT_OWNER)
 +		a->todo |= TODO_OWNER;
 +	if (a->flags & ARCHIVE_EXTRACT_TIME)
 +		a->todo |= TODO_TIMES;
 +	if (a->flags & ARCHIVE_EXTRACT_ACL) {
 +		if (archive_entry_filetype(a->entry) == AE_IFDIR)
 +			a->deferred |= TODO_ACLS;
 +		else
 +			a->todo |= TODO_ACLS;
 +	}
 +	if (a->flags & ARCHIVE_EXTRACT_MAC_METADATA) {
 +		if (archive_entry_filetype(a->entry) == AE_IFDIR)
 +			a->deferred |= TODO_MAC_METADATA;
 +		else
 +			a->todo |= TODO_MAC_METADATA;
 +	}
 +#if defined(__APPLE__) && defined(UF_COMPRESSED) && defined(HAVE_ZLIB_H)
 +	if ((a->flags & ARCHIVE_EXTRACT_NO_HFS_COMPRESSION) == 0) {
 +		unsigned long set, clear;
 +		archive_entry_fflags(a->entry, &set, &clear);
 +		if ((set & ~clear) & UF_COMPRESSED) {
 +			a->todo |= TODO_HFS_COMPRESSION;
 +			a->decmpfs_block_count = (unsigned)-1;
 +		}
 +	}
 +	if ((a->flags & ARCHIVE_EXTRACT_HFS_COMPRESSION_FORCED) != 0 &&
 +	    (a->mode & AE_IFMT) == AE_IFREG && a->filesize > 0) {
 +		a->todo |= TODO_HFS_COMPRESSION;
 +		a->decmpfs_block_count = (unsigned)-1;
 +	}
 +	{
 +		const char *p;
 +
 +		/* Check if the current file name is a type of the
 +		 * resource fork file. */
 +		p = strrchr(a->name, '/');
 +		if (p == NULL)
 +			p = a->name;
 +		else
 +			p++;
 +		if (p[0] == '.' && p[1] == '_') {
 +			/* Do not compress "._XXX" files. */
 +			a->todo &= ~TODO_HFS_COMPRESSION;
 +			if (a->filesize > 0)
 +				a->todo |= TODO_APPLEDOUBLE;
 +		}
 +	}
 +#endif
 +
 +	if (a->flags & ARCHIVE_EXTRACT_XATTR)
 +		a->todo |= TODO_XATTR;
 +	if (a->flags & ARCHIVE_EXTRACT_FFLAGS)
 +		a->todo |= TODO_FFLAGS;
 +	if (a->flags & ARCHIVE_EXTRACT_SECURE_SYMLINKS) {
 +		ret = check_symlinks(a);
 +		if (ret != ARCHIVE_OK)
 +			return (ret);
 +	}
 +#if defined(HAVE_FCHDIR) && defined(PATH_MAX)
 +	/* If path exceeds PATH_MAX, shorten the path. */
 +	edit_deep_directories(a);
 +#endif
 +
 +	ret = restore_entry(a);
 +
 +#if defined(__APPLE__) && defined(UF_COMPRESSED) && defined(HAVE_ZLIB_H)
 +	/*
 +	 * Check if the filesystem the file is restoring on supports
 +	 * HFS+ Compression. If not, cancel HFS+ Compression.
 +	 */
 +	if (a->todo | TODO_HFS_COMPRESSION) {
 +		/*
 +		 * NOTE: UF_COMPRESSED is ignored even if the filesystem
 +		 * supports HFS+ Compression because the file should
- 		 * have at least an extended attriute "com.apple.decmpfs"
++		 * have at least an extended attribute "com.apple.decmpfs"
 +		 * before the flag is set to indicate that the file have
- 		 * been compressed. If hte filesystem does not support
++		 * been compressed. If the filesystem does not support
 +		 * HFS+ Compression the system call will fail.
 +		 */
 +		if (a->fd < 0 || fchflags(a->fd, UF_COMPRESSED) != 0)
 +			a->todo &= ~TODO_HFS_COMPRESSION;
 +	}
 +#endif
 +
 +	/*
 +	 * TODO: There are rumours that some extended attributes must
 +	 * be restored before file data is written.  If this is true,
 +	 * then we either need to write all extended attributes both
 +	 * before and after restoring the data, or find some rule for
 +	 * determining which must go first and which last.  Due to the
 +	 * many ways people are using xattrs, this may prove to be an
 +	 * intractable problem.
 +	 */
 +
 +#ifdef HAVE_FCHDIR
 +	/* If we changed directory above, restore it here. */
 +	if (a->restore_pwd >= 0) {
 +		r = fchdir(a->restore_pwd);
 +		if (r != 0) {
- 			archive_set_error(&a->archive, errno, "chdir() failure");
++			archive_set_error(&a->archive, errno,
++			    "chdir() failure");
 +			ret = ARCHIVE_FATAL;
 +		}
 +		close(a->restore_pwd);
 +		a->restore_pwd = -1;
 +	}
 +#endif
 +
 +	/*
 +	 * Fixup uses the unedited pathname from archive_entry_pathname(),
 +	 * because it is relative to the base dir and the edited path
 +	 * might be relative to some intermediate dir as a result of the
 +	 * deep restore logic.
 +	 */
 +	if (a->deferred & TODO_MODE) {
 +		fe = current_fixup(a, archive_entry_pathname(entry));
 +		if (fe == NULL)
 +			return (ARCHIVE_FATAL);
 +		fe->fixup |= TODO_MODE_BASE;
 +		fe->mode = a->mode;
 +	}
 +
 +	if ((a->deferred & TODO_TIMES)
 +		&& (archive_entry_mtime_is_set(entry)
 +		    || archive_entry_atime_is_set(entry))) {
 +		fe = current_fixup(a, archive_entry_pathname(entry));
 +		if (fe == NULL)
 +			return (ARCHIVE_FATAL);
 +		fe->mode = a->mode;
 +		fe->fixup |= TODO_TIMES;
 +		if (archive_entry_atime_is_set(entry)) {
 +			fe->atime = archive_entry_atime(entry);
 +			fe->atime_nanos = archive_entry_atime_nsec(entry);
 +		} else {
 +			/* If atime is unset, use start time. */
 +			fe->atime = a->start_time;
 +			fe->atime_nanos = 0;
 +		}
 +		if (archive_entry_mtime_is_set(entry)) {
 +			fe->mtime = archive_entry_mtime(entry);
 +			fe->mtime_nanos = archive_entry_mtime_nsec(entry);
 +		} else {
 +			/* If mtime is unset, use start time. */
 +			fe->mtime = a->start_time;
 +			fe->mtime_nanos = 0;
 +		}
 +		if (archive_entry_birthtime_is_set(entry)) {
 +			fe->birthtime = archive_entry_birthtime(entry);
- 			fe->birthtime_nanos = archive_entry_birthtime_nsec(entry);
++			fe->birthtime_nanos = archive_entry_birthtime_nsec(
++			    entry);
 +		} else {
 +			/* If birthtime is unset, use mtime. */
 +			fe->birthtime = fe->mtime;
 +			fe->birthtime_nanos = fe->mtime_nanos;
 +		}
 +	}
 +
 +	if (a->deferred & TODO_ACLS) {
 +		fe = current_fixup(a, archive_entry_pathname(entry));
 +		if (fe == NULL)
 +			return (ARCHIVE_FATAL);
 +		fe->fixup |= TODO_ACLS;
 +		archive_acl_copy(&fe->acl, archive_entry_acl(entry));
 +	}
 +
 +	if (a->deferred & TODO_MAC_METADATA) {
 +		const void *metadata;
 +		size_t metadata_size;
 +		metadata = archive_entry_mac_metadata(a->entry, &metadata_size);
 +		if (metadata != NULL && metadata_size > 0) {
 +			fe = current_fixup(a, archive_entry_pathname(entry));
 +			if (fe == NULL)
 +				return (ARCHIVE_FATAL);
 +			fe->mac_metadata = malloc(metadata_size);
 +			if (fe->mac_metadata != NULL) {
- 				memcpy(fe->mac_metadata, metadata, metadata_size);
++				memcpy(fe->mac_metadata, metadata,
++				    metadata_size);
 +				fe->mac_metadata_size = metadata_size;
 +				fe->fixup |= TODO_MAC_METADATA;
 +			}
 +		}
 +	}
 +
 +	if (a->deferred & TODO_FFLAGS) {
 +		fe = current_fixup(a, archive_entry_pathname(entry));
 +		if (fe == NULL)
 +			return (ARCHIVE_FATAL);
 +		fe->fixup |= TODO_FFLAGS;
 +		/* TODO: Complete this.. defer fflags from below. */
 +	}
 +
 +	/* We've created the object and are ready to pour data into it. */
 +	if (ret >= ARCHIVE_WARN)
 +		a->archive.state = ARCHIVE_STATE_DATA;
 +	/*
 +	 * If it's not open, tell our client not to try writing.
 +	 * In particular, dirs, links, etc, don't get written to.
 +	 */
 +	if (a->fd < 0) {
 +		archive_entry_set_size(entry, 0);
 +		a->filesize = 0;
 +	}
 +
 +	return (ret);
 +}
 +
 +int
 +archive_write_disk_set_skip_file(struct archive *_a, int64_t d, int64_t i)
 +{
 +	struct archive_write_disk *a = (struct archive_write_disk *)_a;
 +	archive_check_magic(&a->archive, ARCHIVE_WRITE_DISK_MAGIC,
 +	    ARCHIVE_STATE_ANY, "archive_write_disk_set_skip_file");
 +	a->skip_file_set = 1;
 +	a->skip_file_dev = d;
 +	a->skip_file_ino = i;
 +	return (ARCHIVE_OK);
 +}
 +
 +static ssize_t
 +write_data_block(struct archive_write_disk *a, const char *buff, size_t size)
 +{
 +	uint64_t start_size = size;
 +	ssize_t bytes_written = 0;
 +	ssize_t block_size = 0, bytes_to_write;
 +
 +	if (size == 0)
 +		return (ARCHIVE_OK);
 +
 +	if (a->filesize == 0 || a->fd < 0) {
 +		archive_set_error(&a->archive, 0,
 +		    "Attempt to write to an empty file");
 +		return (ARCHIVE_WARN);
 +	}
 +
 +	if (a->flags & ARCHIVE_EXTRACT_SPARSE) {
 +#if HAVE_STRUCT_STAT_ST_BLKSIZE
 +		int r;
 +		if ((r = lazy_stat(a)) != ARCHIVE_OK)
 +			return (r);
 +		block_size = a->pst->st_blksize;
 +#else
 +		/* XXX TODO XXX Is there a more appropriate choice here ? */
 +		/* This needn't match the filesystem allocation size. */
 +		block_size = 16*1024;
 +#endif
 +	}
 +
 +	/* If this write would run beyond the file size, truncate it. */
 +	if (a->filesize >= 0 && (int64_t)(a->offset + size) > a->filesize)
 +		start_size = size = (size_t)(a->filesize - a->offset);
 +
 +	/* Write the data. */
 +	while (size > 0) {
 +		if (block_size == 0) {
 +			bytes_to_write = size;
 +		} else {
 +			/* We're sparsifying the file. */
 +			const char *p, *end;
 +			int64_t block_end;
 +
 +			/* Skip leading zero bytes. */
 +			for (p = buff, end = buff + size; p < end; ++p) {
 +				if (*p != '\0')
 +					break;
 +			}
 +			a->offset += p - buff;
 +			size -= p - buff;
 +			buff = p;
 +			if (size == 0)
 +				break;
 +
 +			/* Calculate next block boundary after offset. */
 +			block_end
 +			    = (a->offset / block_size + 1) * block_size;
 +
 +			/* If the adjusted write would cross block boundary,
 +			 * truncate it to the block boundary. */
 +			bytes_to_write = size;
 +			if (a->offset + bytes_to_write > block_end)
 +				bytes_to_write = block_end - a->offset;
 +		}
 +		/* Seek if necessary to the specified offset. */
 +		if (a->offset != a->fd_offset) {
 +			if (lseek(a->fd, a->offset, SEEK_SET) < 0) {
 +				archive_set_error(&a->archive, errno,
 +				    "Seek failed");
 +				return (ARCHIVE_FATAL);
 +			}
 +			a->fd_offset = a->offset;
 +		}
 +		bytes_written = write(a->fd, buff, bytes_to_write);
 +		if (bytes_written < 0) {
 +			archive_set_error(&a->archive, errno, "Write failed");
 +			return (ARCHIVE_WARN);
 +		}
 +		buff += bytes_written;
 +		size -= bytes_written;
 +		a->total_bytes_written += bytes_written;
 +		a->offset += bytes_written;
 +		a->fd_offset = a->offset;
 +	}
 +	return (start_size - size);
 +}
 +
 +#if defined(__APPLE__) && defined(UF_COMPRESSED) && defined(HAVE_SYS_XATTR_H)\
 +	&& defined(HAVE_ZLIB_H)
 +
 +/*
 + * Set UF_COMPRESSED file flag.
 + * This have to be called after hfs_write_decmpfs() because if the
 + * file does not have "com.apple.decmpfs" xattr the flag is ignored.
 + */
 +static int
 +hfs_set_compressed_fflag(struct archive_write_disk *a)
 +{
 +	int r;
 +
 +	if ((r = lazy_stat(a)) != ARCHIVE_OK)
 +		return (r);
 +
 +	a->st.st_flags |= UF_COMPRESSED;
 +	if (fchflags(a->fd, a->st.st_flags) != 0) {
 +		archive_set_error(&a->archive, errno,
 +		    "Failed to set UF_COMPRESSED file flag");
 +		return (ARCHIVE_WARN);
 +	}
 +	return (ARCHIVE_OK);
 +}
 +
 +/*
 + * HFS+ Compression decmpfs
 + *
 + *     +------------------------------+ +0
 + *     |      Magic(LE 4 bytes)       |
 + *     +------------------------------+
 + *     |      Type(LE 4 bytes)        |
 + *     +------------------------------+
 + *     | Uncompressed size(LE 8 bytes)|
 + *     +------------------------------+ +16
 + *     |                              |
 + *     |       Compressed data        |
 + *     |  (Placed only if Type == 3)  |
 + *     |                              |
 + *     +------------------------------+  +3802 = MAX_DECMPFS_XATTR_SIZE
 + *
 + *  Type is 3: decmpfs has compressed data.
 + *  Type is 4: Resource Fork has compressed data.
 + */
 +/*
 + * Write "com.apple.decmpfs"
 + */
 +static int
 +hfs_write_decmpfs(struct archive_write_disk *a)
 +{
 +	int r;
 +	uint32_t compression_type;
 +
 +	r = fsetxattr(a->fd, DECMPFS_XATTR_NAME, a->decmpfs_header_p,
 +	    a->decmpfs_attr_size, 0, 0);
 +	if (r < 0) {
 +		archive_set_error(&a->archive, errno,
 +		    "Cannot restore xattr:%s", DECMPFS_XATTR_NAME);
 +		compression_type = archive_le32dec(
 +		    &a->decmpfs_header_p[DECMPFS_COMPRESSION_TYPE]);
 +		if (compression_type == CMP_RESOURCE_FORK)
 +			fremovexattr(a->fd, XATTR_RESOURCEFORK_NAME,
 +			    XATTR_SHOWCOMPRESSION);
 +		return (ARCHIVE_WARN);
 +	}
 +	return (ARCHIVE_OK);
 +}
 +
 +/*
 + * HFS+ Compression Resource Fork
 + *
 + *     +-----------------------------+
 + *     |     Header(260 bytes)       |
 + *     +-----------------------------+
 + *     |   Block count(LE 4 bytes)   |
 + *     +-----------------------------+  --+
 + * +-- |     Offset (LE 4 bytes)     |    |
 + * |   | [distance from Block count] |    | Block 0
 + * |   +-----------------------------+    |
 + * |   | Compressed size(LE 4 bytes) |    |
 + * |   +-----------------------------+  --+
 + * |   |                             |
 + * |   |      ..................     |
 + * |   |                             |
 + * |   +-----------------------------+  --+
 + * |   |     Offset (LE 4 bytes)     |    |
 + * |   +-----------------------------+    | Block (Block count -1)
 + * |   | Compressed size(LE 4 bytes) |    |
 + * +-> +-----------------------------+  --+
 + *     |   Compressed data(n bytes)  |  Block 0
 + *     +-----------------------------+
 + *     |                             |
 + *     |      ..................     |
 + *     |                             |
 + *     +-----------------------------+
 + *     |   Compressed data(n bytes)  |  Block (Block count -1)
 + *     +-----------------------------+
 + *     |      Footer(50 bytes)       |
 + *     +-----------------------------+
 + *
 + */
 +/*
 + * Write the header of "com.apple.ResourceFork"
 + */
 +static int
 +hfs_write_resource_fork(struct archive_write_disk *a, unsigned char *buff,
 +    size_t bytes, uint32_t position)
 +{
 +	int ret;
 +
 +	ret = fsetxattr(a->fd, XATTR_RESOURCEFORK_NAME, buff, bytes,
 +	    position, a->rsrc_xattr_options);
 +	if (ret < 0) {
 +		archive_set_error(&a->archive, errno,
 +		    "Cannot restore xattr: %s at %u pos %u bytes",
 +		    XATTR_RESOURCEFORK_NAME,
 +		    (unsigned)position,
 +		    (unsigned)bytes);
 +		return (ARCHIVE_WARN);
 +	}
 +	a->rsrc_xattr_options &= ~XATTR_CREATE;
 +	return (ARCHIVE_OK);
 +}
 +
 +static int
 +hfs_write_compressed_data(struct archive_write_disk *a, size_t bytes_compressed)
 +{
 +	int ret;
 +
 +	ret = hfs_write_resource_fork(a, a->compressed_buffer,
 +	    bytes_compressed, a->compressed_rsrc_position);
 +	if (ret == ARCHIVE_OK)
 +		a->compressed_rsrc_position += bytes_compressed;
 +	return (ret);
 +}
 +
 +static int
 +hfs_write_resource_fork_header(struct archive_write_disk *a)
 +{
 +	unsigned char *buff;
 +	uint32_t rsrc_bytes;
 +	uint32_t rsrc_header_bytes;
 +
 +	/*
 +	 * Write resource fork header + block info.
 +	 */
 +	buff = a->resource_fork;
 +	rsrc_bytes = a->compressed_rsrc_position - RSRC_F_SIZE;
 +	rsrc_header_bytes =
 +		RSRC_H_SIZE +		/* Header base size. */
 +		4 +			/* Block count. */
 +		(a->decmpfs_block_count * 8);/* Block info */
 +	archive_be32enc(buff, 0x100);
 +	archive_be32enc(buff + 4, rsrc_bytes);
 +	archive_be32enc(buff + 8, rsrc_bytes - 256);
 +	archive_be32enc(buff + 12, 0x32);
 +	memset(buff + 16, 0, 240);
 +	archive_be32enc(buff + 256, rsrc_bytes - 260);
 +	return hfs_write_resource_fork(a, buff, rsrc_header_bytes, 0);
 +}
 +
 +static size_t
 +hfs_set_resource_fork_footer(unsigned char *buff, size_t buff_size)
 +{
 +	static const char rsrc_footer[RSRC_F_SIZE] = {
 +		0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
 +		0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
 +		0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
 +		0x00, 0x1c, 0x00, 0x32, 0x00, 0x00, 'c',  'm',
 +		'p', 'f',   0x00, 0x00, 0x00, 0x0a, 0x00, 0x01,
 +		0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
 +		0x00, 0x00
 +	};
 +	if (buff_size < sizeof(rsrc_footer))
 +		return (0);
 +	memcpy(buff, rsrc_footer, sizeof(rsrc_footer));
 +	return (sizeof(rsrc_footer));
 +}
 +
 +static int
 +hfs_reset_compressor(struct archive_write_disk *a)
 +{
 +	int ret;
 +
 +	if (a->stream_valid)
 +		ret = deflateReset(&a->stream);
 +	else
 +		ret = deflateInit(&a->stream, a->decmpfs_compression_level);
 +
 +	if (ret != Z_OK) {
 +		archive_set_error(&a->archive, ARCHIVE_ERRNO_MISC,
 +		    "Failed to initialize compressor");
 +		return (ARCHIVE_FATAL);
 +	} else
 +		a->stream_valid = 1;
 +
 +	return (ARCHIVE_OK);
 +}
 +
 +static int
 +hfs_decompress(struct archive_write_disk *a)
 +{
 +	uint32_t *block_info;
 +	unsigned int block_count;
 +	uint32_t data_pos, data_size;
 +	ssize_t r;
 +	ssize_t bytes_written, bytes_to_write;
 +	unsigned char *b;
 +
 +	block_info = (uint32_t *)(a->resource_fork + RSRC_H_SIZE);
 +	block_count = archive_le32dec(block_info++);
 +	while (block_count--) {
 +		data_pos = RSRC_H_SIZE + archive_le32dec(block_info++);
 +		data_size = archive_le32dec(block_info++);
 +		r = fgetxattr(a->fd, XATTR_RESOURCEFORK_NAME,
 +		    a->compressed_buffer, data_size, data_pos, 0);
 +		if (r != data_size)  {
 +			archive_set_error(&a->archive,
 +			    (r < 0)?errno:ARCHIVE_ERRNO_MISC,
 +			    "Failed to read resource fork");
 +			return (ARCHIVE_WARN);
 +		}
 +		if (a->compressed_buffer[0] == 0xff) {
 +			bytes_to_write = data_size -1;
 +			b = a->compressed_buffer + 1;
 +		} else {
 +			uLong dest_len = MAX_DECMPFS_BLOCK_SIZE;
 +			int zr;
 +
 +			zr = uncompress((Bytef *)a->uncompressed_buffer,
 +			    &dest_len, a->compressed_buffer, data_size);
 +			if (zr != Z_OK) {
 +				archive_set_error(&a->archive,
 +				    ARCHIVE_ERRNO_MISC,
 +				    "Failed to decompress resource fork");
 +				return (ARCHIVE_WARN);
 +			}
 +			bytes_to_write = dest_len;
 +			b = (unsigned char *)a->uncompressed_buffer;
 +		}
 +		do {
 +			bytes_written = write(a->fd, b, bytes_to_write);
 +			if (bytes_written < 0) {
 +				archive_set_error(&a->archive, errno,
 +				    "Write failed");
 +				return (ARCHIVE_WARN);
 +			}
 +			bytes_to_write -= bytes_written;
 +			b += bytes_written;
 +		} while (bytes_to_write > 0);
 +	}
 +	r = fremovexattr(a->fd, XATTR_RESOURCEFORK_NAME, 0);
 +	if (r == -1)  {
 +		archive_set_error(&a->archive, errno,
 +		    "Failed to remove resource fork");
 +		return (ARCHIVE_WARN);
 +	}
 +	return (ARCHIVE_OK);
 +}
 +
 +static int
 +hfs_drive_compressor(struct archive_write_disk *a, const char *buff,
 +    size_t size)
 +{
 +	unsigned char *buffer_compressed;
 +	size_t bytes_compressed;
 +	size_t bytes_used;
 +	int ret;
 +
 +	ret = hfs_reset_compressor(a);
 +	if (ret != ARCHIVE_OK)
 +		return (ret);
 +
 +	if (a->compressed_buffer == NULL) {
 +		size_t block_size;
 +
 +		block_size = COMPRESSED_W_SIZE + RSRC_F_SIZE +
 +		    + compressBound(MAX_DECMPFS_BLOCK_SIZE);
 +		a->compressed_buffer = malloc(block_size);
 +		if (a->compressed_buffer == NULL) {
 +			archive_set_error(&a->archive, ENOMEM,
 +			    "Can't allocate memory for Resource Fork");
 +			return (ARCHIVE_FATAL);
 +		}
 +		a->compressed_buffer_size = block_size;
 +		a->compressed_buffer_remaining = block_size;
 +	}
 +
 +	buffer_compressed = a->compressed_buffer +
 +	    a->compressed_buffer_size - a->compressed_buffer_remaining;
 +	a->stream.next_in = (Bytef *)(uintptr_t)(const void *)buff;
 +	a->stream.avail_in = size;
 +	a->stream.next_out = buffer_compressed;
 +	a->stream.avail_out = a->compressed_buffer_remaining;
 +	do {
 +		ret = deflate(&a->stream, Z_FINISH);
 +		switch (ret) {
 +		case Z_OK:
 +		case Z_STREAM_END:
 +			break;
 +		default:
 +			archive_set_error(&a->archive, ARCHIVE_ERRNO_MISC,
 +			    "Failed to compress data");
 +			return (ARCHIVE_FAILED);
 +		}
 +	} while (ret == Z_OK);
 +	bytes_compressed = a->compressed_buffer_remaining - a->stream.avail_out;
 +
 +	/*
 +	 * If the compressed size is larger than the original size,
 +	 * throw away compressed data, use uncompressed data instead.
 +	 */
 +	if (bytes_compressed > size) {
 +		buffer_compressed[0] = 0xFF;/* uncompressed marker. */
 +		memcpy(buffer_compressed + 1, buff, size);
 +		bytes_compressed = size + 1;
 +	}
 +	a->compressed_buffer_remaining -= bytes_compressed;
 +
 +	/*
 +	 * If the compressed size is smaller than MAX_DECMPFS_XATTR_SIZE
 +	 * and the block count in the file is only one, store compressed
 +	 * data to decmpfs xattr instead of the resource fork.
 +	 */
 +	if (a->decmpfs_block_count == 1 &&
 +	    (a->decmpfs_attr_size + bytes_compressed)
 +	      <= MAX_DECMPFS_XATTR_SIZE) {
 +		archive_le32enc(&a->decmpfs_header_p[DECMPFS_COMPRESSION_TYPE],
 +		    CMP_XATTR);
 +		memcpy(a->decmpfs_header_p + DECMPFS_HEADER_SIZE,
 +		    buffer_compressed, bytes_compressed);
 +		a->decmpfs_attr_size += bytes_compressed;
 +		a->compressed_buffer_remaining = a->compressed_buffer_size;
 +		/*
 +		 * Finish HFS+ Compression.
 +		 * - Write the decmpfs xattr.
 +		 * - Set the UF_COMPRESSED file flag.
 +		 */
 +		ret = hfs_write_decmpfs(a);
 +		if (ret == ARCHIVE_OK)
 +			ret = hfs_set_compressed_fflag(a);
 +		return (ret);
 +	}
 +
 +	/* Update block info. */
 +	archive_le32enc(a->decmpfs_block_info++,
 +	    a->compressed_rsrc_position_v - RSRC_H_SIZE);
 +	archive_le32enc(a->decmpfs_block_info++, bytes_compressed);
 +	a->compressed_rsrc_position_v += bytes_compressed;
 +
 +	/*
 +	 * Write the compressed data to the resource fork.
 +	 */
 +	bytes_used = a->compressed_buffer_size - a->compressed_buffer_remaining;
 +	while (bytes_used >= COMPRESSED_W_SIZE) {
 +		ret = hfs_write_compressed_data(a, COMPRESSED_W_SIZE);
 +		if (ret != ARCHIVE_OK)
 +			return (ret);
 +		bytes_used -= COMPRESSED_W_SIZE;
 +		if (bytes_used > COMPRESSED_W_SIZE)
 +			memmove(a->compressed_buffer,
 +			    a->compressed_buffer + COMPRESSED_W_SIZE,
 +			    bytes_used);
 +		else
 +			memcpy(a->compressed_buffer,
 +			    a->compressed_buffer + COMPRESSED_W_SIZE,
 +			    bytes_used);
 +	}
 +	a->compressed_buffer_remaining = a->compressed_buffer_size - bytes_used;
 +
 +	/*
 +	 * If the current block is the last block, write the remaining
 +	 * compressed data and the resource fork footer.
 +	 */
 +	if (a->file_remaining_bytes == 0) {
 +		size_t rsrc_size;
 +		int64_t bk;
 +
 +		/* Append the resource footer. */
 +		rsrc_size = hfs_set_resource_fork_footer(
 +		    a->compressed_buffer + bytes_used,
 +		    a->compressed_buffer_remaining);
 +		ret = hfs_write_compressed_data(a, bytes_used + rsrc_size);
 +		a->compressed_buffer_remaining = a->compressed_buffer_size;
 +
- 		/* If the compressed size is not enouph smaller than
++		/* If the compressed size is not enough smaller than
 +		 * the uncompressed size. cancel HFS+ compression.
 +		 * TODO: study a behavior of ditto utility and improve
 +		 * the condition to fall back into no HFS+ compression. */
 +		bk = HFS_BLOCKS(a->compressed_rsrc_position);
 +		bk += bk >> 7;
 +		if (bk > HFS_BLOCKS(a->filesize))
 +			return hfs_decompress(a);
 +		/*
 +		 * Write the resourcefork header.
 +		 */
 +		if (ret == ARCHIVE_OK)
 +			ret = hfs_write_resource_fork_header(a);
 +		/*
 +		 * Finish HFS+ Compression.
 +		 * - Write the decmpfs xattr.
 +		 * - Set the UF_COMPRESSED file flag.
 +		 */
 +		if (ret == ARCHIVE_OK)
 +			ret = hfs_write_decmpfs(a);
 +		if (ret == ARCHIVE_OK)
 +			ret = hfs_set_compressed_fflag(a);
 +	}
 +	return (ret);
 +}
 +
 +static ssize_t
 +hfs_write_decmpfs_block(struct archive_write_disk *a, const char *buff,
 +    size_t size)
 +{
 +	const char *buffer_to_write;
 +	size_t bytes_to_write;
 +	int ret;
 +
 +	if (a->decmpfs_block_count == (unsigned)-1) {
 +		void *new_block;
 +		size_t new_size;
 +		unsigned int block_count;
 +
 +		if (a->decmpfs_header_p == NULL) {
 +			new_block = malloc(MAX_DECMPFS_XATTR_SIZE
 +			    + sizeof(uint32_t));
 +			if (new_block == NULL) {
 +				archive_set_error(&a->archive, ENOMEM,
 +				    "Can't allocate memory for decmpfs");
 +				return (ARCHIVE_FATAL);
 +			}
 +			a->decmpfs_header_p = new_block;
 +		}
 +		a->decmpfs_attr_size = DECMPFS_HEADER_SIZE;
 +		archive_le32enc(&a->decmpfs_header_p[DECMPFS_COMPRESSION_MAGIC],
 +		    DECMPFS_MAGIC);
 +		archive_le32enc(&a->decmpfs_header_p[DECMPFS_COMPRESSION_TYPE],
 +		    CMP_RESOURCE_FORK);
 +		archive_le64enc(&a->decmpfs_header_p[DECMPFS_UNCOMPRESSED_SIZE],
 +		    a->filesize);
 +
 +		/* Calculate a block count of the file. */
 +		block_count =
 +		    (a->filesize + MAX_DECMPFS_BLOCK_SIZE -1) /
 +			MAX_DECMPFS_BLOCK_SIZE;
 +		/*
 +		 * Allocate buffer for resource fork.
 +		 * Set up related pointers;
 +		 */
 +		new_size =
 +		    RSRC_H_SIZE + /* header */
 +		    4 + /* Block count */
 +		    (block_count * sizeof(uint32_t) * 2) +
 +		    RSRC_F_SIZE; /* footer */
 +		if (new_size > a->resource_fork_allocated_size) {
 +			new_block = realloc(a->resource_fork, new_size);
 +			if (new_block == NULL) {
 +				archive_set_error(&a->archive, ENOMEM,
 +				    "Can't allocate memory for ResourceFork");
 +				return (ARCHIVE_FATAL);
 +			}
 +			a->resource_fork_allocated_size = new_size;
 +			a->resource_fork = new_block;
 +		}
 +
 +		/* Allocate uncompressed buffer */
 +		if (a->uncompressed_buffer == NULL) {
 +			new_block = malloc(MAX_DECMPFS_BLOCK_SIZE);
 +			if (new_block == NULL) {
 +				archive_set_error(&a->archive, ENOMEM,
 +				    "Can't allocate memory for decmpfs");
 +				return (ARCHIVE_FATAL);
 +			}
 +			a->uncompressed_buffer = new_block;
 +		}
 +		a->block_remaining_bytes = MAX_DECMPFS_BLOCK_SIZE;
 +		a->file_remaining_bytes = a->filesize;
 +		a->compressed_buffer_remaining = a->compressed_buffer_size;
 +
 +		/*
 +		 * Set up a resource fork.
 +		 */
 +		a->rsrc_xattr_options = XATTR_CREATE;
 +		/* Get the position where we are going to set a bunch
 +		 * of block info. */
 +		a->decmpfs_block_info =
 +		    (uint32_t *)(a->resource_fork + RSRC_H_SIZE);
 +		/* Set the block count to the resource fork. */
 +		archive_le32enc(a->decmpfs_block_info++, block_count);
- 		/* Get the position where we are goint to set compressed
++		/* Get the position where we are going to set compressed
 +		 * data. */
 +		a->compressed_rsrc_position =
 +		    RSRC_H_SIZE + 4 + (block_count * 8);
 +		a->compressed_rsrc_position_v = a->compressed_rsrc_position;
 +		a->decmpfs_block_count = block_count;
 +	}
 +
 +	/* Ignore redundant bytes. */
 +	if (a->file_remaining_bytes == 0)
 +		return ((ssize_t)size);
 +
 +	/* Do not overrun a block size. */
 +	if (size > a->block_remaining_bytes)
 +		bytes_to_write = a->block_remaining_bytes;
 +	else
 +		bytes_to_write = size;
 +	/* Do not overrun the file size. */
 +	if (bytes_to_write > a->file_remaining_bytes)
 +		bytes_to_write = a->file_remaining_bytes;
 +
 +	/* For efficiency, if a copy length is full of the uncompressed
 +	 * buffer size, do not copy writing data to it. */
 +	if (bytes_to_write == MAX_DECMPFS_BLOCK_SIZE)
 +		buffer_to_write = buff;
 +	else {
 +		memcpy(a->uncompressed_buffer +
 +		    MAX_DECMPFS_BLOCK_SIZE - a->block_remaining_bytes,
 +		    buff, bytes_to_write);
 +		buffer_to_write = a->uncompressed_buffer;
 +	}
 +	a->block_remaining_bytes -= bytes_to_write;
 +	a->file_remaining_bytes -= bytes_to_write;
 +
 +	if (a->block_remaining_bytes == 0 || a->file_remaining_bytes == 0) {
 +		ret = hfs_drive_compressor(a, buffer_to_write,
 +		    MAX_DECMPFS_BLOCK_SIZE - a->block_remaining_bytes);
 +		if (ret < 0)
 +			return (ret);
 +		a->block_remaining_bytes = MAX_DECMPFS_BLOCK_SIZE;
 +	}
 +	/* Ignore redundant bytes. */
 +	if (a->file_remaining_bytes == 0)
 +		return ((ssize_t)size);
 +	return (bytes_to_write);
 +}
 +
 +static ssize_t
 +hfs_write_data_block(struct archive_write_disk *a, const char *buff,
 +    size_t size)
 +{
 +	uint64_t start_size = size;
 +	ssize_t bytes_written = 0;
 +	ssize_t bytes_to_write;
 +
 +	if (size == 0)
 +		return (ARCHIVE_OK);
 +
 +	if (a->filesize == 0 || a->fd < 0) {
 +		archive_set_error(&a->archive, 0,
 +		    "Attempt to write to an empty file");
 +		return (ARCHIVE_WARN);
 +	}
 +
 +	/* If this write would run beyond the file size, truncate it. */
 +	if (a->filesize >= 0 && (int64_t)(a->offset + size) > a->filesize)
 +		start_size = size = (size_t)(a->filesize - a->offset);
 +
 +	/* Write the data. */
 +	while (size > 0) {
 +		bytes_to_write = size;
 +		/* Seek if necessary to the specified offset. */
 +		if (a->offset < a->fd_offset) {
- 			/* Can't support backword move. */
++			/* Can't support backward move. */
 +			archive_set_error(&a->archive, ARCHIVE_ERRNO_MISC,
 +			    "Seek failed");
 +			return (ARCHIVE_FATAL);
 +		} else if (a->offset > a->fd_offset) {
 +			int64_t skip = a->offset - a->fd_offset;
 +			char nullblock[1024];
 +
 +			memset(nullblock, 0, sizeof(nullblock));
 +			while (skip > 0) {
 +				if (skip > (int64_t)sizeof(nullblock))
 +					bytes_written = hfs_write_decmpfs_block(
 +					    a, nullblock, sizeof(nullblock));
 +				else
 +					bytes_written = hfs_write_decmpfs_block(
 +					    a, nullblock, skip);
 +				if (bytes_written < 0) {
 +					archive_set_error(&a->archive, errno,
 +					    "Write failed");
 +					return (ARCHIVE_WARN);
 +				}
 +				skip -= bytes_written;
 +			}
 +
 +			a->fd_offset = a->offset;
 +		}
 +		bytes_written =
 +		    hfs_write_decmpfs_block(a, buff, bytes_to_write);
 +		if (bytes_written < 0)
 +			return (bytes_written);
 +		buff += bytes_written;
 +		size -= bytes_written;
 +		a->total_bytes_written += bytes_written;
 +		a->offset += bytes_written;
 +		a->fd_offset = a->offset;
 +	}
 +	return (start_size - size);
 +}
 +#else
 +static ssize_t
 +hfs_write_data_block(struct archive_write_disk *a, const char *buff,
 +    size_t size)
 +{
 +	return (write_data_block(a, buff, size));
 +}
 +#endif
 +
 +static ssize_t
 +_archive_write_disk_data_block(struct archive *_a,
 +    const void *buff, size_t size, int64_t offset)
 +{
 +	struct archive_write_disk *a = (struct archive_write_disk *)_a;
 +	ssize_t r;
 +
 +	archive_check_magic(&a->archive, ARCHIVE_WRITE_DISK_MAGIC,
 +	    ARCHIVE_STATE_DATA, "archive_write_data_block");
 +
 +	a->offset = offset;
 +	if (a->todo & TODO_HFS_COMPRESSION)
 +		r = hfs_write_data_block(a, buff, size);
 +	else
 +		r = write_data_block(a, buff, size);
 +	if (r < ARCHIVE_OK)
 +		return (r);
 +	if ((size_t)r < size) {
 +		archive_set_error(&a->archive, 0,
- 		    "Too much data: Truncating file at %ju bytes", (uintmax_t)a->filesize);
++		    "Too much data: Truncating file at %ju bytes",
++		    (uintmax_t)a->filesize);
 +		return (ARCHIVE_WARN);
 +	}
 +#if ARCHIVE_VERSION_NUMBER < 3999000
 +	return (ARCHIVE_OK);
 +#else
 +	return (size);
 +#endif
 +}
 +
 +static ssize_t
 +_archive_write_disk_data(struct archive *_a, const void *buff, size_t size)
 +{
 +	struct archive_write_disk *a = (struct archive_write_disk *)_a;
 +
 +	archive_check_magic(&a->archive, ARCHIVE_WRITE_DISK_MAGIC,
 +	    ARCHIVE_STATE_DATA, "archive_write_data");
 +
 +	if (a->todo & TODO_HFS_COMPRESSION)
 +		return (hfs_write_data_block(a, buff, size));
 +	return (write_data_block(a, buff, size));
 +}
 +
 +static int
 +_archive_write_disk_finish_entry(struct archive *_a)
 +{
 +	struct archive_write_disk *a = (struct archive_write_disk *)_a;
 +	int ret = ARCHIVE_OK;
 +
 +	archive_check_magic(&a->archive, ARCHIVE_WRITE_DISK_MAGIC,
 +	    ARCHIVE_STATE_HEADER | ARCHIVE_STATE_DATA,
 +	    "archive_write_finish_entry");
 +	if (a->archive.state & ARCHIVE_STATE_HEADER)
 +		return (ARCHIVE_OK);
 +	archive_clear_error(&a->archive);
 +
 +	/* Pad or truncate file to the right size. */
 +	if (a->fd < 0) {
 +		/* There's no file. */
 +	} else if (a->filesize < 0) {
 +		/* File size is unknown, so we can't set the size. */
 +	} else if (a->fd_offset == a->filesize) {
 +		/* Last write ended at exactly the filesize; we're done. */
 +		/* Hopefully, this is the common case. */
 +#if defined(__APPLE__) && defined(UF_COMPRESSED) && defined(HAVE_ZLIB_H)
 +	} else if (a->todo & TODO_HFS_COMPRESSION) {
 +		char null_d[1024];
 +		ssize_t r;
 +
 +		if (a->file_remaining_bytes)
 +			memset(null_d, 0, sizeof(null_d));
 +		while (a->file_remaining_bytes) {
 +			if (a->file_remaining_bytes > sizeof(null_d))
 +				r = hfs_write_data_block(
 +				    a, null_d, sizeof(null_d));
 +			else
 +				r = hfs_write_data_block(
 +				    a, null_d, a->file_remaining_bytes);
 +			if (r < 0)
 +				return ((int)r);
 +		}
 +#endif
 +	} else {
 +#if HAVE_FTRUNCATE
 +		if (ftruncate(a->fd, a->filesize) == -1 &&
 +		    a->filesize == 0) {
 +			archive_set_error(&a->archive, errno,
 +			    "File size could not be restored");
 +			return (ARCHIVE_FAILED);
 +		}
 +#endif
 +		/*
 +		 * Not all platforms implement the XSI option to
 +		 * extend files via ftruncate.  Stat() the file again
 +		 * to see what happened.
 +		 */
 +		a->pst = NULL;
 +		if ((ret = lazy_stat(a)) != ARCHIVE_OK)
 +			return (ret);
 +		/* We can use lseek()/write() to extend the file if
 +		 * ftruncate didn't work or isn't available. */
 +		if (a->st.st_size < a->filesize) {
 +			const char nul = '\0';
 +			if (lseek(a->fd, a->filesize - 1, SEEK_SET) < 0) {
 +				archive_set_error(&a->archive, errno,
 +				    "Seek failed");
 +				return (ARCHIVE_FATAL);
 +			}
 +			if (write(a->fd, &nul, 1) < 0) {
 +				archive_set_error(&a->archive, errno,
 +				    "Write to restore size failed");
 +				return (ARCHIVE_FATAL);
 +			}
 +			a->pst = NULL;
 +		}
 +	}
 +
 +	/* Restore metadata. */
 +
 +	/*
 +	 * This is specific to Mac OS X.
 +	 * If the current file is an AppleDouble file, it should be
 +	 * linked with the data fork file and remove it.
 +	 */
 +	if (a->todo & TODO_APPLEDOUBLE) {
 +		int r2 = fixup_appledouble(a, a->name);
 +		if (r2 == ARCHIVE_EOF) {
 +			/* The current file has been successfully linked
 +			 * with the data fork file and removed. So there
 +			 * is nothing to do on the current file.  */
 +			goto finish_metadata;
 +		}
 +		if (r2 < ret) ret = r2;
 +	}
 +
 +	/*
 +	 * Look up the "real" UID only if we're going to need it.
 +	 * TODO: the TODO_SGID condition can be dropped here, can't it?
 +	 */
 +	if (a->todo & (TODO_OWNER | TODO_SUID | TODO_SGID)) {
 +		a->uid = archive_write_disk_uid(&a->archive,
 +		    archive_entry_uname(a->entry),
 +		    archive_entry_uid(a->entry));
 +	}
 +	/* Look up the "real" GID only if we're going to need it. */
 +	/* TODO: the TODO_SUID condition can be dropped here, can't it? */
 +	if (a->todo & (TODO_OWNER | TODO_SGID | TODO_SUID)) {
 +		a->gid = archive_write_disk_gid(&a->archive,
 +		    archive_entry_gname(a->entry),
 +		    archive_entry_gid(a->entry));
 +	 }
 +
 +	/*
 +	 * Restore ownership before set_mode tries to restore suid/sgid
 +	 * bits.  If we set the owner, we know what it is and can skip
 +	 * a stat() call to examine the ownership of the file on disk.
 +	 */
 +	if (a->todo & TODO_OWNER) {
 +		int r2 = set_ownership(a);
 +		if (r2 < ret) ret = r2;
 +	}
 +
 +	/*
 +	 * set_mode must precede ACLs on systems such as Solaris and
 +	 * FreeBSD where setting the mode implicitly clears extended ACLs
 +	 */
 +	if (a->todo & TODO_MODE) {
 +		int r2 = set_mode(a, a->mode);
 +		if (r2 < ret) ret = r2;
 +	}
 +
 +	/*
 +	 * Security-related extended attributes (such as
 +	 * security.capability on Linux) have to be restored last,
 +	 * since they're implicitly removed by other file changes.
 +	 */
 +	if (a->todo & TODO_XATTR) {
 +		int r2 = set_xattrs(a);
 +		if (r2 < ret) ret = r2;
 +	}
 +
 +	/*
 +	 * Some flags prevent file modification; they must be restored after
 +	 * file contents are written.
 +	 */
 +	if (a->todo & TODO_FFLAGS) {
 +		int r2 = set_fflags(a);
 +		if (r2 < ret) ret = r2;
 +	}
 +
 +	/*
 +	 * Time must follow most other metadata;
 +	 * otherwise atime will get changed.
 +	 */
 +	if (a->todo & TODO_TIMES) {
 +		int r2 = set_times_from_entry(a);
 +		if (r2 < ret) ret = r2;
 +	}
 +
 +	/*
 +	 * Mac extended metadata includes ACLs.
 +	 */
 +	if (a->todo & TODO_MAC_METADATA) {
 +		const void *metadata;
 +		size_t metadata_size;
 +		metadata = archive_entry_mac_metadata(a->entry, &metadata_size);
 +		if (metadata != NULL && metadata_size > 0) {
 +			int r2 = set_mac_metadata(a, archive_entry_pathname(
 +			    a->entry), metadata, metadata_size);
 +			if (r2 < ret) ret = r2;
 +		}
 +	}
 +
 +	/*
 +	 * ACLs must be restored after timestamps because there are
 +	 * ACLs that prevent attribute changes (including time).
 +	 */
 +	if (a->todo & TODO_ACLS) {
- 		int r2 = archive_write_disk_set_acls(&a->archive, a->fd,
- 				  archive_entry_pathname(a->entry),
- 				  archive_entry_acl(a->entry));
++		int r2;
++#ifdef HAVE_DARWIN_ACL
++		/*
++		 * On Mac OS, platform ACLs are stored also in mac_metadata by
++		 * the operating system. If mac_metadata is present it takes
++		 * precedence and we skip extracting libarchive NFSv4 ACLs
++		 */
++		const void *metadata;
++		size_t metadata_size;
++		metadata = archive_entry_mac_metadata(a->entry, &metadata_size);
++		if (metadata == NULL || metadata_size == 0) {
++#endif
++		r2 = archive_write_disk_set_acls(&a->archive, a->fd,
++		    archive_entry_pathname(a->entry),
++		    archive_entry_acl(a->entry));
 +		if (r2 < ret) ret = r2;
++#ifdef HAVE_DARWIN_ACL
++		}
++#endif
 +	}
 +
 +finish_metadata:
 +	/* If there's an fd, we can close it now. */
 +	if (a->fd >= 0) {
 +		close(a->fd);
 +		a->fd = -1;
 +	}
 +	/* If there's an entry, we can release it now. */
 +	if (a->entry) {
 +		archive_entry_free(a->entry);
 +		a->entry = NULL;
 +	}
 +	a->archive.state = ARCHIVE_STATE_HEADER;
 +	return (ret);
 +}
 +
 +int
 +archive_write_disk_set_group_lookup(struct archive *_a,
 +    void *private_data,
 +    int64_t (*lookup_gid)(void *private, const char *gname, int64_t gid),
 +    void (*cleanup_gid)(void *private))
 +{
 +	struct archive_write_disk *a = (struct archive_write_disk *)_a;
 +	archive_check_magic(&a->archive, ARCHIVE_WRITE_DISK_MAGIC,
 +	    ARCHIVE_STATE_ANY, "archive_write_disk_set_group_lookup");
 +
 +	if (a->cleanup_gid != NULL && a->lookup_gid_data != NULL)
 +		(a->cleanup_gid)(a->lookup_gid_data);
 +
 +	a->lookup_gid = lookup_gid;
 +	a->cleanup_gid = cleanup_gid;
 +	a->lookup_gid_data = private_data;
 +	return (ARCHIVE_OK);
 +}
 +
 +int
 +archive_write_disk_set_user_lookup(struct archive *_a,
 +    void *private_data,
 +    int64_t (*lookup_uid)(void *private, const char *uname, int64_t uid),
 +    void (*cleanup_uid)(void *private))
 +{
 +	struct archive_write_disk *a = (struct archive_write_disk *)_a;
 +	archive_check_magic(&a->archive, ARCHIVE_WRITE_DISK_MAGIC,
 +	    ARCHIVE_STATE_ANY, "archive_write_disk_set_user_lookup");
 +
 +	if (a->cleanup_uid != NULL && a->lookup_uid_data != NULL)
 +		(a->cleanup_uid)(a->lookup_uid_data);
 +
 +	a->lookup_uid = lookup_uid;
 +	a->cleanup_uid = cleanup_uid;
 +	a->lookup_uid_data = private_data;
 +	return (ARCHIVE_OK);
 +}
 +
 +int64_t
 +archive_write_disk_gid(struct archive *_a, const char *name, int64_t id)
 +{
 +       struct archive_write_disk *a = (struct archive_write_disk *)_a;
 +       archive_check_magic(&a->archive, ARCHIVE_WRITE_DISK_MAGIC,
 +           ARCHIVE_STATE_ANY, "archive_write_disk_gid");
 +       if (a->lookup_gid)
 +               return (a->lookup_gid)(a->lookup_gid_data, name, id);
 +       return (id);
 +}
 + 
 +int64_t
 +archive_write_disk_uid(struct archive *_a, const char *name, int64_t id)
 +{
 +	struct archive_write_disk *a = (struct archive_write_disk *)_a;
 +	archive_check_magic(&a->archive, ARCHIVE_WRITE_DISK_MAGIC,
 +	    ARCHIVE_STATE_ANY, "archive_write_disk_uid");
 +	if (a->lookup_uid)
 +		return (a->lookup_uid)(a->lookup_uid_data, name, id);
 +	return (id);
 +}
 +
 +/*
 + * Create a new archive_write_disk object and initialize it with global state.
 + */
 +struct archive *
 +archive_write_disk_new(void)
 +{
 +	struct archive_write_disk *a;
 +
- 	a = (struct archive_write_disk *)malloc(sizeof(*a));
++	a = (struct archive_write_disk *)calloc(1, sizeof(*a));
 +	if (a == NULL)
 +		return (NULL);
- 	memset(a, 0, sizeof(*a));
 +	a->archive.magic = ARCHIVE_WRITE_DISK_MAGIC;
 +	/* We're ready to write a header immediately. */
 +	a->archive.state = ARCHIVE_STATE_HEADER;
 +	a->archive.vtable = archive_write_disk_vtable();
 +	a->start_time = time(NULL);
 +	/* Query and restore the umask. */
 +	umask(a->user_umask = umask(0));
 +#ifdef HAVE_GETEUID
 +	a->user_uid = geteuid();
 +#endif /* HAVE_GETEUID */
 +	if (archive_string_ensure(&a->path_safe, 512) == NULL) {
 +		free(a);
 +		return (NULL);
 +	}
 +#ifdef HAVE_ZLIB_H
 +	a->decmpfs_compression_level = 5;
 +#endif
 +	return (&a->archive);
 +}
 +
 +
 +/*
 + * If pathname is longer than PATH_MAX, chdir to a suitable
 + * intermediate dir and edit the path down to a shorter suffix.  Note
 + * that this routine never returns an error; if the chdir() attempt
 + * fails for any reason, we just go ahead with the long pathname.  The
 + * object creation is likely to fail, but any error will get handled
 + * at that time.
 + */
 +#if defined(HAVE_FCHDIR) && defined(PATH_MAX)
 +static void
 +edit_deep_directories(struct archive_write_disk *a)
 +{
 +	int ret;
 +	char *tail = a->name;
 +
 +	/* If path is short, avoid the open() below. */
- 	if (strlen(tail) <= PATH_MAX)
++	if (strlen(tail) < PATH_MAX)
 +		return;
 +
 +	/* Try to record our starting dir. */
 +	a->restore_pwd = open(".", O_RDONLY | O_BINARY | O_CLOEXEC);
 +	__archive_ensure_cloexec_flag(a->restore_pwd);
 +	if (a->restore_pwd < 0)
 +		return;
 +
 +	/* As long as the path is too long... */
- 	while (strlen(tail) > PATH_MAX) {
++	while (strlen(tail) >= PATH_MAX) {
 +		/* Locate a dir prefix shorter than PATH_MAX. */
 +		tail += PATH_MAX - 8;
 +		while (tail > a->name && *tail != '/')
 +			tail--;
 +		/* Exit if we find a too-long path component. */
 +		if (tail <= a->name)
 +			return;
 +		/* Create the intermediate dir and chdir to it. */
 +		*tail = '\0'; /* Terminate dir portion */
 +		ret = create_dir(a, a->name);
 +		if (ret == ARCHIVE_OK && chdir(a->name) != 0)
 +			ret = ARCHIVE_FAILED;
 +		*tail = '/'; /* Restore the / we removed. */
 +		if (ret != ARCHIVE_OK)
 +			return;
 +		tail++;
 +		/* The chdir() succeeded; we've now shortened the path. */
 +		a->name = tail;
 +	}
 +	return;
 +}
 +#endif
 +
 +/*
 + * The main restore function.
 + */
 +static int
 +restore_entry(struct archive_write_disk *a)
 +{
 +	int ret = ARCHIVE_OK, en;
 +
 +	if (a->flags & ARCHIVE_EXTRACT_UNLINK && !S_ISDIR(a->mode)) {
 +		/*
 +		 * TODO: Fix this.  Apparently, there are platforms
 +		 * that still allow root to hose the entire filesystem
 +		 * by unlinking a dir.  The S_ISDIR() test above
 +		 * prevents us from using unlink() here if the new
 +		 * object is a dir, but that doesn't mean the old
 +		 * object isn't a dir.
 +		 */
 +		if (a->flags & ARCHIVE_EXTRACT_CLEAR_NOCHANGE_FFLAGS)
 +			(void)clear_nochange_fflags(a);
 +		if (unlink(a->name) == 0) {
 +			/* We removed it, reset cached stat. */
 +			a->pst = NULL;
 +		} else if (errno == ENOENT) {
 +			/* File didn't exist, that's just as good. */
 +		} else if (rmdir(a->name) == 0) {
 +			/* It was a dir, but now it's gone. */
 +			a->pst = NULL;
 +		} else {
 +			/* We tried, but couldn't get rid of it. */
 +			archive_set_error(&a->archive, errno,
 +			    "Could not unlink");
 +			return(ARCHIVE_FAILED);
 +		}
 +	}
 +
 +	/* Try creating it first; if this fails, we'll try to recover. */
 +	en = create_filesystem_object(a);
 +
 +	if ((en == ENOTDIR || en == ENOENT)
 +	    && !(a->flags & ARCHIVE_EXTRACT_NO_AUTODIR)) {
 +		/* If the parent dir doesn't exist, try creating it. */
 +		create_parent_dir(a, a->name);
 +		/* Now try to create the object again. */
 +		en = create_filesystem_object(a);
 +	}
 +
 +	if ((en == ENOENT) && (archive_entry_hardlink(a->entry) != NULL)) {
 +		archive_set_error(&a->archive, en,
 +		    "Hard-link target '%s' does not exist.",
 +		    archive_entry_hardlink(a->entry));
 +		return (ARCHIVE_FAILED);
 +	}
 +
 +	if ((en == EISDIR || en == EEXIST)
 +	    && (a->flags & ARCHIVE_EXTRACT_NO_OVERWRITE)) {
 +		/* If we're not overwriting, we're done. */
 +		archive_entry_unset_size(a->entry);
 +		return (ARCHIVE_OK);
 +	}
 +
 +	/*
 +	 * Some platforms return EISDIR if you call
 +	 * open(O_WRONLY | O_EXCL | O_CREAT) on a directory, some
 +	 * return EEXIST.  POSIX is ambiguous, requiring EISDIR
 +	 * for open(O_WRONLY) on a dir and EEXIST for open(O_EXCL | O_CREAT)
 +	 * on an existing item.
 +	 */
 +	if (en == EISDIR) {
 +		/* A dir is in the way of a non-dir, rmdir it. */
 +		if (rmdir(a->name) != 0) {
 +			archive_set_error(&a->archive, errno,
 +			    "Can't remove already-existing dir");
 +			return (ARCHIVE_FAILED);
 +		}
 +		a->pst = NULL;
 +		/* Try again. */
 +		en = create_filesystem_object(a);
 +	} else if (en == EEXIST) {
 +		/*
 +		 * We know something is in the way, but we don't know what;
 +		 * we need to find out before we go any further.
 +		 */
 +		int r = 0;
 +		/*
 +		 * The SECURE_SYMLINKS logic has already removed a
 +		 * symlink to a dir if the client wants that.  So
 +		 * follow the symlink if we're creating a dir.
 +		 */
 +		if (S_ISDIR(a->mode))
 +			r = stat(a->name, &a->st);
 +		/*
 +		 * If it's not a dir (or it's a broken symlink),
 +		 * then don't follow it.
 +		 */
 +		if (r != 0 || !S_ISDIR(a->mode))
 +			r = lstat(a->name, &a->st);
 +		if (r != 0) {
 +			archive_set_error(&a->archive, errno,
 +			    "Can't stat existing object");
 +			return (ARCHIVE_FAILED);
 +		}
 +
 +		/*
 +		 * NO_OVERWRITE_NEWER doesn't apply to directories.
 +		 */
 +		if ((a->flags & ARCHIVE_EXTRACT_NO_OVERWRITE_NEWER)
 +		    &&  !S_ISDIR(a->st.st_mode)) {
 +			if (!older(&(a->st), a->entry)) {
 +				archive_entry_unset_size(a->entry);
 +				return (ARCHIVE_OK);
 +			}
 +		}
 +
 +		/* If it's our archive, we're done. */
 +		if (a->skip_file_set &&
 +		    a->st.st_dev == (dev_t)a->skip_file_dev &&
 +		    a->st.st_ino == (ino_t)a->skip_file_ino) {
 +			archive_set_error(&a->archive, 0,
 +			    "Refusing to overwrite archive");
 +			return (ARCHIVE_FAILED);
 +		}
 +
 +		if (!S_ISDIR(a->st.st_mode)) {
 +			/* A non-dir is in the way, unlink it. */
 +			if (a->flags & ARCHIVE_EXTRACT_CLEAR_NOCHANGE_FFLAGS)
 +				(void)clear_nochange_fflags(a);
 +			if (unlink(a->name) != 0) {
 +				archive_set_error(&a->archive, errno,
 +				    "Can't unlink already-existing object");
 +				return (ARCHIVE_FAILED);
 +			}
 +			a->pst = NULL;
 +			/* Try again. */
 +			en = create_filesystem_object(a);
 +		} else if (!S_ISDIR(a->mode)) {
 +			/* A dir is in the way of a non-dir, rmdir it. */
 +			if (a->flags & ARCHIVE_EXTRACT_CLEAR_NOCHANGE_FFLAGS)
 +				(void)clear_nochange_fflags(a);
 +			if (rmdir(a->name) != 0) {
 +				archive_set_error(&a->archive, errno,
 +				    "Can't replace existing directory with non-directory");
 +				return (ARCHIVE_FAILED);
 +			}
 +			/* Try again. */
 +			en = create_filesystem_object(a);
 +		} else {
 +			/*
 +			 * There's a dir in the way of a dir.  Don't
 +			 * waste time with rmdir()/mkdir(), just fix
 +			 * up the permissions on the existing dir.
 +			 * Note that we don't change perms on existing
 +			 * dirs unless _EXTRACT_PERM is specified.
 +			 */
 +			if ((a->mode != a->st.st_mode)
 +			    && (a->todo & TODO_MODE_FORCE))
 +				a->deferred |= (a->todo & TODO_MODE);
 +			/* Ownership doesn't need deferred fixup. */
 +			en = 0; /* Forget the EEXIST. */
 +		}
 +	}
 +
 +	if (en) {
 +		/* Everything failed; give up here. */
- 		archive_set_error(&a->archive, en, "Can't create '%s'",
- 		    a->name);
++		if ((&a->archive)->error == NULL)
++			archive_set_error(&a->archive, en, "Can't create '%s'",
++			    a->name);
 +		return (ARCHIVE_FAILED);
 +	}
 +
 +	a->pst = NULL; /* Cached stat data no longer valid. */
 +	return (ret);
 +}
 +
 +/*
 + * Returns 0 if creation succeeds, or else returns errno value from
 + * the failed system call.   Note:  This function should only ever perform
 + * a single system call.
 + */
 +static int
 +create_filesystem_object(struct archive_write_disk *a)
 +{
 +	/* Create the entry. */
 +	const char *linkname;
 +	mode_t final_mode, mode;
 +	int r;
++	/* these for check_symlinks_fsobj */
++	char *linkname_copy;	/* non-const copy of linkname */
++	struct stat st;
++	struct archive_string error_string;
++	int error_number;
 +
 +	/* We identify hard/symlinks according to the link names. */
 +	/* Since link(2) and symlink(2) don't handle modes, we're done here. */
 +	linkname = archive_entry_hardlink(a->entry);
 +	if (linkname != NULL) {
 +#if !HAVE_LINK
 +		return (EPERM);
 +#else
++		archive_string_init(&error_string);
++		linkname_copy = strdup(linkname);
++		if (linkname_copy == NULL) {
++		    return (EPERM);
++		}
++		/*
++		 * TODO: consider using the cleaned-up path as the link
++		 * target?
++		 */
++		r = cleanup_pathname_fsobj(linkname_copy, &error_number,
++		    &error_string, a->flags);
++		if (r != ARCHIVE_OK) {
++			archive_set_error(&a->archive, error_number, "%s",
++			    error_string.s);
++			free(linkname_copy);
++			archive_string_free(&error_string);
++			/*
++			 * EPERM is more appropriate than error_number for our
++			 * callers
++			 */
++			return (EPERM);
++		}
++		r = check_symlinks_fsobj(linkname_copy, &error_number,
++		    &error_string, a->flags);
++		if (r != ARCHIVE_OK) {
++			archive_set_error(&a->archive, error_number, "%s",
++			    error_string.s);
++			free(linkname_copy);
++			archive_string_free(&error_string);
++			/*
++			 * EPERM is more appropriate than error_number for our
++			 * callers
++			 */
++			return (EPERM);
++		}
++		free(linkname_copy);
++		archive_string_free(&error_string);
 +		r = link(linkname, a->name) ? errno : 0;
 +		/*
 +		 * New cpio and pax formats allow hardlink entries
 +		 * to carry data, so we may have to open the file
 +		 * for hardlink entries.
 +		 *
 +		 * If the hardlink was successfully created and
 +		 * the archive doesn't have carry data for it,
 +		 * consider it to be non-authoritative for meta data.
 +		 * This is consistent with GNU tar and BSD pax.
 +		 * If the hardlink does carry data, let the last
 +		 * archive entry decide ownership.
 +		 */
 +		if (r == 0 && a->filesize <= 0) {
 +			a->todo = 0;
 +			a->deferred = 0;
 +		} else if (r == 0 && a->filesize > 0) {
- 			a->fd = open(a->name,
- 				     O_WRONLY | O_TRUNC | O_BINARY | O_CLOEXEC);
- 			__archive_ensure_cloexec_flag(a->fd);
- 			if (a->fd < 0)
++#ifdef HAVE_LSTAT
++			r = lstat(a->name, &st);
++#else
++			r = stat(a->name, &st);
++#endif
++			if (r != 0)
 +				r = errno;
++			else if ((st.st_mode & AE_IFMT) == AE_IFREG) {
++				a->fd = open(a->name, O_WRONLY | O_TRUNC |
++				    O_BINARY | O_CLOEXEC | O_NOFOLLOW);
++				__archive_ensure_cloexec_flag(a->fd);
++				if (a->fd < 0)
++					r = errno;
++			}
 +		}
 +		return (r);
 +#endif
 +	}
 +	linkname = archive_entry_symlink(a->entry);
 +	if (linkname != NULL) {
 +#if HAVE_SYMLINK
 +		return symlink(linkname, a->name) ? errno : 0;
 +#else
 +		return (EPERM);
 +#endif
 +	}
 +
 +	/*
 +	 * The remaining system calls all set permissions, so let's
 +	 * try to take advantage of that to avoid an extra chmod()
 +	 * call.  (Recall that umask is set to zero right now!)
 +	 */
 +
 +	/* Mode we want for the final restored object (w/o file type bits). */
 +	final_mode = a->mode & 07777;
 +	/*
 +	 * The mode that will actually be restored in this step.  Note
 +	 * that SUID, SGID, etc, require additional work to ensure
 +	 * security, so we never restore them at this point.
 +	 */
 +	mode = final_mode & 0777 & ~a->user_umask;
 +
 +	switch (a->mode & AE_IFMT) {
 +	default:
 +		/* POSIX requires that we fall through here. */
 +		/* FALLTHROUGH */
 +	case AE_IFREG:
 +		a->fd = open(a->name,
 +		    O_WRONLY | O_CREAT | O_EXCL | O_BINARY | O_CLOEXEC, mode);
 +		__archive_ensure_cloexec_flag(a->fd);
 +		r = (a->fd < 0);
 +		break;
 +	case AE_IFCHR:
 +#ifdef HAVE_MKNOD
 +		/* Note: we use AE_IFCHR for the case label, and
 +		 * S_IFCHR for the mknod() call.  This is correct.  */
 +		r = mknod(a->name, mode | S_IFCHR,
 +		    archive_entry_rdev(a->entry));
 +		break;
 +#else
 +		/* TODO: Find a better way to warn about our inability
 +		 * to restore a char device node. */
 +		return (EINVAL);
 +#endif /* HAVE_MKNOD */
 +	case AE_IFBLK:
 +#ifdef HAVE_MKNOD
 +		r = mknod(a->name, mode | S_IFBLK,
 +		    archive_entry_rdev(a->entry));
 +		break;
 +#else
 +		/* TODO: Find a better way to warn about our inability
 +		 * to restore a block device node. */
 +		return (EINVAL);
 +#endif /* HAVE_MKNOD */
 +	case AE_IFDIR:
 +		mode = (mode | MINIMUM_DIR_MODE) & MAXIMUM_DIR_MODE;
 +		r = mkdir(a->name, mode);
 +		if (r == 0) {
 +			/* Defer setting dir times. */
 +			a->deferred |= (a->todo & TODO_TIMES);
 +			a->todo &= ~TODO_TIMES;
 +			/* Never use an immediate chmod(). */
 +			/* We can't avoid the chmod() entirely if EXTRACT_PERM
 +			 * because of SysV SGID inheritance. */
 +			if ((mode != final_mode)
 +			    || (a->flags & ARCHIVE_EXTRACT_PERM))
 +				a->deferred |= (a->todo & TODO_MODE);
 +			a->todo &= ~TODO_MODE;
 +		}
 +		break;
 +	case AE_IFIFO:
 +#ifdef HAVE_MKFIFO
 +		r = mkfifo(a->name, mode);
 +		break;
 +#else
 +		/* TODO: Find a better way to warn about our inability
 +		 * to restore a fifo. */
 +		return (EINVAL);
 +#endif /* HAVE_MKFIFO */
 +	}
 +
 +	/* All the system calls above set errno on failure. */
 +	if (r)
 +		return (errno);
 +
 +	/* If we managed to set the final mode, we've avoided a chmod(). */
 +	if (mode == final_mode)
 +		a->todo &= ~TODO_MODE;
 +	return (0);
 +}
 +
 +/*
 + * Cleanup function for archive_extract.  Mostly, this involves processing
 + * the fixup list, which is used to address a number of problems:
 + *   * Dir permissions might prevent us from restoring a file in that
 + *     dir, so we restore the dir with minimum 0700 permissions first,
 + *     then correct the mode at the end.
 + *   * Similarly, the act of restoring a file touches the directory
 + *     and changes the timestamp on the dir, so we have to touch-up dir
 + *     timestamps at the end as well.
 + *   * Some file flags can interfere with the restore by, for example,
 + *     preventing the creation of hardlinks to those files.
 + *   * Mac OS extended metadata includes ACLs, so must be deferred on dirs.
 + *
 + * Note that tar/cpio do not require that archives be in a particular
 + * order; there is no way to know when the last file has been restored
 + * within a directory, so there's no way to optimize the memory usage
 + * here by fixing up the directory any earlier than the
 + * end-of-archive.
 + *
 + * XXX TODO: Directory ACLs should be restored here, for the same
 + * reason we set directory perms here. XXX
 + */
 +static int
 +_archive_write_disk_close(struct archive *_a)
 +{
 +	struct archive_write_disk *a = (struct archive_write_disk *)_a;
 +	struct fixup_entry *next, *p;
 +	int ret;
 +
 +	archive_check_magic(&a->archive, ARCHIVE_WRITE_DISK_MAGIC,
 +	    ARCHIVE_STATE_HEADER | ARCHIVE_STATE_DATA,
 +	    "archive_write_disk_close");
 +	ret = _archive_write_disk_finish_entry(&a->archive);
 +
 +	/* Sort dir list so directories are fixed up in depth-first order. */
 +	p = sort_dir_list(a->fixup_list);
 +
 +	while (p != NULL) {
 +		a->pst = NULL; /* Mark stat cache as out-of-date. */
 +		if (p->fixup & TODO_TIMES) {
 +			set_times(a, -1, p->mode, p->name,
 +			    p->atime, p->atime_nanos,
 +			    p->birthtime, p->birthtime_nanos,
 +			    p->mtime, p->mtime_nanos,
 +			    p->ctime, p->ctime_nanos);
 +		}
 +		if (p->fixup & TODO_MODE_BASE)
 +			chmod(p->name, p->mode);
 +		if (p->fixup & TODO_ACLS)
- 			archive_write_disk_set_acls(&a->archive,
- 						    -1, p->name, &p->acl);
++#ifdef HAVE_DARWIN_ACL
++			if (p->mac_metadata == NULL ||
++			    p->mac_metadata_size == 0)
++#endif
++				archive_write_disk_set_acls(&a->archive,
++				    -1, p->name, &p->acl);
 +		if (p->fixup & TODO_FFLAGS)
 +			set_fflags_platform(a, -1, p->name,
 +			    p->mode, p->fflags_set, 0);
 +		if (p->fixup & TODO_MAC_METADATA)
 +			set_mac_metadata(a, p->name, p->mac_metadata,
 +					 p->mac_metadata_size);
 +		next = p->next;
 +		archive_acl_clear(&p->acl);
 +		free(p->mac_metadata);
 +		free(p->name);
 +		free(p);
 +		p = next;
 +	}
 +	a->fixup_list = NULL;
 +	return (ret);
 +}
 +
 +static int
 +_archive_write_disk_free(struct archive *_a)
 +{
 +	struct archive_write_disk *a;
 +	int ret;
 +	if (_a == NULL)
 +		return (ARCHIVE_OK);
 +	archive_check_magic(_a, ARCHIVE_WRITE_DISK_MAGIC,
 +	    ARCHIVE_STATE_ANY | ARCHIVE_STATE_FATAL, "archive_write_disk_free");
 +	a = (struct archive_write_disk *)_a;
 +	ret = _archive_write_disk_close(&a->archive);
 +	archive_write_disk_set_group_lookup(&a->archive, NULL, NULL, NULL);
 +	archive_write_disk_set_user_lookup(&a->archive, NULL, NULL, NULL);
 +	if (a->entry)
 +		archive_entry_free(a->entry);
 +	archive_string_free(&a->_name_data);
 +	archive_string_free(&a->archive.error_string);
 +	archive_string_free(&a->path_safe);
 +	a->archive.magic = 0;
 +	__archive_clean(&a->archive);
 +	free(a->decmpfs_header_p);
 +	free(a->resource_fork);
 +	free(a->compressed_buffer);
 +	free(a->uncompressed_buffer);
 +#if defined(__APPLE__) && defined(UF_COMPRESSED) && defined(HAVE_SYS_XATTR_H)\
 +	&& defined(HAVE_ZLIB_H)
 +	if (a->stream_valid) {
 +		switch (deflateEnd(&a->stream)) {
 +		case Z_OK:
 +			break;
 +		default:
 +			archive_set_error(&a->archive, ARCHIVE_ERRNO_MISC,
 +			    "Failed to clean up compressor");
 +			ret = ARCHIVE_FATAL;
 +			break;
 +		}
 +	}
 +#endif
 +	free(a);
 +	return (ret);
 +}
 +
 +/*
 + * Simple O(n log n) merge sort to order the fixup list.  In
 + * particular, we want to restore dir timestamps depth-first.
 + */
 +static struct fixup_entry *
 +sort_dir_list(struct fixup_entry *p)
 +{
 +	struct fixup_entry *a, *b, *t;
 +
 +	if (p == NULL)
 +		return (NULL);
 +	/* A one-item list is already sorted. */
 +	if (p->next == NULL)
 +		return (p);
 +
 +	/* Step 1: split the list. */
 +	t = p;
 +	a = p->next->next;
 +	while (a != NULL) {
 +		/* Step a twice, t once. */
 +		a = a->next;
 +		if (a != NULL)
 +			a = a->next;
 +		t = t->next;
 +	}
 +	/* Now, t is at the mid-point, so break the list here. */
 +	b = t->next;
 +	t->next = NULL;
 +	a = p;
 +
 +	/* Step 2: Recursively sort the two sub-lists. */
 +	a = sort_dir_list(a);
 +	b = sort_dir_list(b);
 +
 +	/* Step 3: Merge the returned lists. */
 +	/* Pick the first element for the merged list. */
 +	if (strcmp(a->name, b->name) > 0) {
 +		t = p = a;
 +		a = a->next;
 +	} else {
 +		t = p = b;
 +		b = b->next;
 +	}
 +
 +	/* Always put the later element on the list first. */
 +	while (a != NULL && b != NULL) {
 +		if (strcmp(a->name, b->name) > 0) {
 +			t->next = a;
 +			a = a->next;
 +		} else {
 +			t->next = b;
 +			b = b->next;
 +		}
 +		t = t->next;
 +	}
 +
 +	/* Only one list is non-empty, so just splice it on. */
 +	if (a != NULL)
 +		t->next = a;
 +	if (b != NULL)
 +		t->next = b;
 +
 +	return (p);
 +}
 +
 +/*
 + * Returns a new, initialized fixup entry.
 + *
 + * TODO: Reduce the memory requirements for this list by using a tree
 + * structure rather than a simple list of names.
 + */
 +static struct fixup_entry *
 +new_fixup(struct archive_write_disk *a, const char *pathname)
 +{
 +	struct fixup_entry *fe;
 +
 +	fe = (struct fixup_entry *)calloc(1, sizeof(struct fixup_entry));
 +	if (fe == NULL) {
 +		archive_set_error(&a->archive, ENOMEM,
 +		    "Can't allocate memory for a fixup");
 +		return (NULL);
 +	}
 +	fe->next = a->fixup_list;
 +	a->fixup_list = fe;
 +	fe->fixup = 0;
 +	fe->name = strdup(pathname);
 +	return (fe);
 +}
 +
 +/*
 + * Returns a fixup structure for the current entry.
 + */
 +static struct fixup_entry *
 +current_fixup(struct archive_write_disk *a, const char *pathname)
 +{
 +	if (a->current_fixup == NULL)
 +		a->current_fixup = new_fixup(a, pathname);
 +	return (a->current_fixup);
 +}
 +
- /* TODO: Make this work. */
- /*
-  * TODO: The deep-directory support bypasses this; disable deep directory
-  * support if we're doing symlink checks.
-  */
++/* Error helper for new *_fsobj functions */
++static void
++fsobj_error(int *a_eno, struct archive_string *a_estr,
++    int err, const char *errstr, const char *path)
++{
++	if (a_eno)
++		*a_eno = err;
++	if (a_estr)
++		archive_string_sprintf(a_estr, errstr, path);
++}
++
 +/*
 + * TODO: Someday, integrate this with the deep dir support; they both
 + * scan the path and both can be optimized by comparing against other
 + * recent paths.
 + */
 +/* TODO: Extend this to support symlinks on Windows Vista and later. */
++
++/*
++ * Checks the given path to see if any elements along it are symlinks.  Returns
++ * ARCHIVE_OK if there are none, otherwise puts an error in errmsg.
++ */
 +static int
- check_symlinks(struct archive_write_disk *a)
++check_symlinks_fsobj(char *path, int *a_eno, struct archive_string *a_estr,
++    int flags)
 +{
 +#if !defined(HAVE_LSTAT)
 +	/* Platform doesn't have lstat, so we can't look for symlinks. */
- 	(void)a; /* UNUSED */
++	(void)path; /* UNUSED */
++	(void)error_number; /* UNUSED */
++	(void)error_string; /* UNUSED */
++	(void)flags; /* UNUSED */
 +	return (ARCHIVE_OK);
 +#else
- 	char *pn;
++	int res = ARCHIVE_OK;
++	char *tail;
++	char *head;
++	int last;
 +	char c;
 +	int r;
 +	struct stat st;
++	int restore_pwd;
++
++	/* Nothing to do here if name is empty */
++	if(path[0] == '\0')
++	    return (ARCHIVE_OK);
 +
 +	/*
 +	 * Guard against symlink tricks.  Reject any archive entry whose
 +	 * destination would be altered by a symlink.
++	 *
++	 * Walk the filename in chunks separated by '/'.  For each segment:
++	 *  - if it doesn't exist, continue
++	 *  - if it's symlink, abort or remove it
++	 *  - if it's a directory and it's not the last chunk, cd into it
++	 * As we go:
++	 *  head points to the current (relative) path
++	 *  tail points to the temporary \0 terminating the segment we're
++	 *      currently examining
++	 *  c holds what used to be in *tail
++	 *  last is 1 if this is the last tail
 +	 */
- 	/* Whatever we checked last time doesn't need to be re-checked. */
- 	pn = a->name;
- 	if (archive_strlen(&(a->path_safe)) > 0) {
- 		char *p = a->path_safe.s;
- 		while ((*pn != '\0') && (*p == *pn))
- 			++p, ++pn;
- 	}
++	restore_pwd = open(".", O_RDONLY | O_BINARY | O_CLOEXEC);
++	__archive_ensure_cloexec_flag(restore_pwd);
++	if (restore_pwd < 0)
++		return (ARCHIVE_FATAL);
++	head = path;
++	tail = path;
++	last = 0;
++	/* TODO: reintroduce a safe cache here? */
 +	/* Skip the root directory if the path is absolute. */
- 	if(pn == a->name && pn[0] == '/')
- 		++pn;
- 	c = pn[0];
- 	/* Keep going until we've checked the entire name. */
- 	while (pn[0] != '\0' && (pn[0] != '/' || pn[1] != '\0')) {
++	if(tail == path && tail[0] == '/')
++		++tail;
++	/* Keep going until we've checked the entire name.
++	 * head, tail, path all alias the same string, which is
++	 * temporarily zeroed at tail, so be careful restoring the
++	 * stashed (c=tail[0]) for error messages.
++	 * Exiting the loop with break is okay; continue is not.
++	 */
++	while (!last) {
++		/*
++		 * Skip the separator we just consumed, plus any adjacent ones
++		 */
++		while (*tail == '/')
++		    ++tail;
 +		/* Skip the next path element. */
- 		while (*pn != '\0' && *pn != '/')
- 			++pn;
- 		c = pn[0];
- 		pn[0] = '\0';
++		while (*tail != '\0' && *tail != '/')
++			++tail;
++		/* is this the last path component? */
++		last = (tail[0] == '\0') || (tail[0] == '/' && tail[1] == '\0');
++		/* temporarily truncate the string here */
++		c = tail[0];
++		tail[0] = '\0';
 +		/* Check that we haven't hit a symlink. */
- 		r = lstat(a->name, &st);
++		r = lstat(head, &st);
 +		if (r != 0) {
++			tail[0] = c;
 +			/* We've hit a dir that doesn't exist; stop now. */
- 			if (errno == ENOENT)
++			if (errno == ENOENT) {
++				break;
++			} else {
++				/*
++				 * Treat any other error as fatal - best to be
++				 * paranoid here.
++				 * Note: This effectively disables deep
++				 * directory support when security checks are
++				 * enabled. Otherwise, very long pathnames that
++				 * trigger an error here could evade the
++				 * sandbox.
++				 * TODO: We could do better, but it would
++				 * probably require merging the symlink checks
++				 * with the deep-directory editing.
++				 */
++				fsobj_error(a_eno, a_estr, errno,
++				    "Could not stat %s", path);
++				res = ARCHIVE_FAILED;
 +				break;
++			}
++		} else if (S_ISDIR(st.st_mode)) {
++			if (!last) {
++				if (chdir(head) != 0) {
++					tail[0] = c;
++					fsobj_error(a_eno, a_estr, errno,
++					    "Could not chdir %s", path);
++					res = (ARCHIVE_FATAL);
++					break;
++				}
++				/* Our view is now from inside this dir: */
++				head = tail + 1;
++			}
 +		} else if (S_ISLNK(st.st_mode)) {
- 			if (c == '\0') {
++			if (last) {
 +				/*
 +				 * Last element is symlink; remove it
 +				 * so we can overwrite it with the
 +				 * item being extracted.
 +				 */
- 				if (unlink(a->name)) {
- 					archive_set_error(&a->archive, errno,
++				if (unlink(head)) {
++					tail[0] = c;
++					fsobj_error(a_eno, a_estr, errno,
 +					    "Could not remove symlink %s",
- 					    a->name);
- 					pn[0] = c;
- 					return (ARCHIVE_FAILED);
++					    path);
++					res = ARCHIVE_FAILED;
++					break;
 +				}
- 				a->pst = NULL;
 +				/*
 +				 * Even if we did remove it, a warning
 +				 * is in order.  The warning is silly,
 +				 * though, if we're just replacing one
 +				 * symlink with another symlink.
 +				 */
- 				if (!S_ISLNK(a->mode)) {
- 					archive_set_error(&a->archive, 0,
- 					    "Removing symlink %s",
- 					    a->name);
++				tail[0] = c;
++				/*
++				 * FIXME:  not sure how important this is to
++				 * restore
++				 */
++				/*
++				if (!S_ISLNK(path)) {
++					fsobj_error(a_eno, a_estr, 0,
++					    "Removing symlink %s", path);
 +				}
++				*/
 +				/* Symlink gone.  No more problem! */
- 				pn[0] = c;
- 				return (0);
- 			} else if (a->flags & ARCHIVE_EXTRACT_UNLINK) {
++				res = ARCHIVE_OK;
++				break;
++			} else if (flags & ARCHIVE_EXTRACT_UNLINK) {
 +				/* User asked us to remove problems. */
- 				if (unlink(a->name) != 0) {
- 					archive_set_error(&a->archive, 0,
- 					    "Cannot remove intervening symlink %s",
- 					    a->name);
- 					pn[0] = c;
- 					return (ARCHIVE_FAILED);
++				if (unlink(head) != 0) {
++					tail[0] = c;
++					fsobj_error(a_eno, a_estr, 0,
++					    "Cannot remove intervening "
++					    "symlink %s", path);
++					res = ARCHIVE_FAILED;
++					break;
++				}
++				tail[0] = c;
++			} else if ((flags &
++			    ARCHIVE_EXTRACT_SECURE_SYMLINKS) == 0) {
++				/*
++				 * We are not the last element and we want to
++				 * follow symlinks if they are a directory.
++				 * 
++				 * This is needed to extract hardlinks over
++				 * symlinks.
++				 */
++				r = stat(head, &st);
++				if (r != 0) {
++					tail[0] = c;
++					if (errno == ENOENT) {
++						break;
++					} else {
++						fsobj_error(a_eno, a_estr,
++						    errno,
++						    "Could not stat %s", path);
++						res = (ARCHIVE_FAILED);
++						break;
++					}
++				} else if (S_ISDIR(st.st_mode)) {
++					if (chdir(head) != 0) {
++						tail[0] = c;
++						fsobj_error(a_eno, a_estr,
++						    errno,
++						    "Could not chdir %s", path);
++						res = (ARCHIVE_FATAL);
++						break;
++					}
++					/*
++					 * Our view is now from inside
++					 * this dir:
++					 */
++					head = tail + 1;
++				} else {
++					tail[0] = c;
++					fsobj_error(a_eno, a_estr, 0,
++					    "Cannot extract through "
++					    "symlink %s", path);
++					res = ARCHIVE_FAILED;
++					break;
 +				}
- 				a->pst = NULL;
 +			} else {
- 				archive_set_error(&a->archive, 0,
- 				    "Cannot extract through symlink %s",
- 				    a->name);
- 				pn[0] = c;
- 				return (ARCHIVE_FAILED);
++				tail[0] = c;
++				fsobj_error(a_eno, a_estr, 0,
++				    "Cannot extract through symlink %s", path);
++				res = ARCHIVE_FAILED;
++				break;
 +			}
 +		}
- 		pn[0] = c;
- 		if (pn[0] != '\0')
- 			pn++; /* Advance to the next segment. */
++		/* be sure to always maintain this */
++		tail[0] = c;
++		if (tail[0] != '\0')
++			tail++; /* Advance to the next segment. */
++	}
++	/* Catches loop exits via break */
++	tail[0] = c;
++#ifdef HAVE_FCHDIR
++	/* If we changed directory above, restore it here. */
++	if (restore_pwd >= 0) {
++		r = fchdir(restore_pwd);
++		if (r != 0) {
++			fsobj_error(a_eno, a_estr, errno,
++			    "chdir() failure", "");
++		}
++		close(restore_pwd);
++		restore_pwd = -1;
++		if (r != 0) {
++			res = (ARCHIVE_FATAL);
++		}
 +	}
- 	pn[0] = c;
- 	/* We've checked and/or cleaned the whole path, so remember it. */
- 	archive_strcpy(&a->path_safe, a->name);
- 	return (ARCHIVE_OK);
++#endif
++	/* TODO: reintroduce a safe cache here? */
++	return res;
 +#endif
 +}
 +
++/*
++ * Check a->name for symlinks, returning ARCHIVE_OK if its clean, otherwise
++ * calls archive_set_error and returns ARCHIVE_{FATAL,FAILED}
++ */
++static int
++check_symlinks(struct archive_write_disk *a)
++{
++	struct archive_string error_string;
++	int error_number;
++	int rc;
++	archive_string_init(&error_string);
++	rc = check_symlinks_fsobj(a->name, &error_number, &error_string,
++	    a->flags);
++	if (rc != ARCHIVE_OK) {
++		archive_set_error(&a->archive, error_number, "%s",
++		    error_string.s);
++	}
++	archive_string_free(&error_string);
++	a->pst = NULL;	/* to be safe */
++	return rc;
++}
++
++
 +#if defined(__CYGWIN__)
 +/*
 + * 1. Convert a path separator from '\' to '/' .
 + *    We shouldn't check multibyte character directly because some
 + *    character-set have been using the '\' character for a part of
 + *    its multibyte character code.
 + * 2. Replace unusable characters in Windows with underscore('_').
 + * See also : http://msdn.microsoft.com/en-us/library/aa365247.aspx
 + */
 +static void
- cleanup_pathname_win(struct archive_write_disk *a)
++cleanup_pathname_win(char *path)
 +{
 +	wchar_t wc;
 +	char *p;
 +	size_t alen, l;
 +	int mb, complete, utf8;
 +
 +	alen = 0;
 +	mb = 0;
 +	complete = 1;
 +	utf8 = (strcmp(nl_langinfo(CODESET), "UTF-8") == 0)? 1: 0;
- 	for (p = a->name; *p != '\0'; p++) {
++	for (p = path; *p != '\0'; p++) {
 +		++alen;
 +		if (*p == '\\') {
 +			/* If previous byte is smaller than 128,
 +			 * this is not second byte of multibyte characters,
 +			 * so we can replace '\' with '/'. */
 +			if (utf8 || !mb)
 +				*p = '/';
 +			else
 +				complete = 0;/* uncompleted. */
 +		} else if (*(unsigned char *)p > 127)
 +			mb = 1;
 +		else
 +			mb = 0;
 +		/* Rewrite the path name if its next character is unusable. */
 +		if (*p == ':' || *p == '*' || *p == '?' || *p == '"' ||
 +		    *p == '<' || *p == '>' || *p == '|')
 +			*p = '_';
 +	}
 +	if (complete)
 +		return;
 +
 +	/*
 +	 * Convert path separator in wide-character.
 +	 */
- 	p = a->name;
++	p = path;
 +	while (*p != '\0' && alen) {
 +		l = mbtowc(&wc, p, alen);
 +		if (l == (size_t)-1) {
 +			while (*p != '\0') {
 +				if (*p == '\\')
 +					*p = '/';
 +				++p;
 +			}
 +			break;
 +		}
 +		if (l == 1 && wc == L'\\')
 +			*p = '/';
 +		p += l;
 +		alen -= l;
 +	}
 +}
 +#endif
 +
 +/*
 + * Canonicalize the pathname.  In particular, this strips duplicate
 + * '/' characters, '.' elements, and trailing '/'.  It also raises an
 + * error for an empty path, a trailing '..', (if _SECURE_NODOTDOT is
 + * set) any '..' in the path or (if ARCHIVE_EXTRACT_SECURE_NOABSOLUTEPATHS
 + * is set) if the path is absolute.
 + */
 +static int
- cleanup_pathname(struct archive_write_disk *a)
++cleanup_pathname_fsobj(char *path, int *a_eno, struct archive_string *a_estr,
++    int flags)
 +{
 +	char *dest, *src;
 +	char separator = '\0';
 +
- 	dest = src = a->name;
++	dest = src = path;
 +	if (*src == '\0') {
- 		archive_set_error(&a->archive, ARCHIVE_ERRNO_MISC,
- 		    "Invalid empty pathname");
++		fsobj_error(a_eno, a_estr, ARCHIVE_ERRNO_MISC,
++		    "Invalid empty ", "pathname");
 +		return (ARCHIVE_FAILED);
 +	}
 +
 +#if defined(__CYGWIN__)
- 	cleanup_pathname_win(a);
++	cleanup_pathname_win(path);
 +#endif
 +	/* Skip leading '/'. */
 +	if (*src == '/') {
- 		if (a->flags & ARCHIVE_EXTRACT_SECURE_NOABSOLUTEPATHS) {
- 			archive_set_error(&a->archive, ARCHIVE_ERRNO_MISC,
- 			                  "Path is absolute");
++		if (flags & ARCHIVE_EXTRACT_SECURE_NOABSOLUTEPATHS) {
++			fsobj_error(a_eno, a_estr, ARCHIVE_ERRNO_MISC,
++			    "Path is ", "absolute");
 +			return (ARCHIVE_FAILED);
 +		}
 +
 +		separator = *src++;
 +	}
 +
 +	/* Scan the pathname one element at a time. */
 +	for (;;) {
 +		/* src points to first char after '/' */
 +		if (src[0] == '\0') {
 +			break;
 +		} else if (src[0] == '/') {
 +			/* Found '//', ignore second one. */
 +			src++;
 +			continue;
 +		} else if (src[0] == '.') {
 +			if (src[1] == '\0') {
 +				/* Ignore trailing '.' */
 +				break;
 +			} else if (src[1] == '/') {
 +				/* Skip './'. */
 +				src += 2;
 +				continue;
 +			} else if (src[1] == '.') {
 +				if (src[2] == '/' || src[2] == '\0') {
 +					/* Conditionally warn about '..' */
- 					if (a->flags & ARCHIVE_EXTRACT_SECURE_NODOTDOT) {
- 						archive_set_error(&a->archive,
++					if (flags
++					    & ARCHIVE_EXTRACT_SECURE_NODOTDOT) {
++						fsobj_error(a_eno, a_estr,
 +						    ARCHIVE_ERRNO_MISC,
- 						    "Path contains '..'");
++						    "Path contains ", "'..'");
 +						return (ARCHIVE_FAILED);
 +					}
 +				}
 +				/*
 +				 * Note: Under no circumstances do we
 +				 * remove '..' elements.  In
 +				 * particular, restoring
 +				 * '/foo/../bar/' should create the
 +				 * 'foo' dir as a side-effect.
 +				 */
 +			}
 +		}
 +
 +		/* Copy current element, including leading '/'. */
 +		if (separator)
 +			*dest++ = '/';
 +		while (*src != '\0' && *src != '/') {
 +			*dest++ = *src++;
 +		}
 +
 +		if (*src == '\0')
 +			break;
 +
 +		/* Skip '/' separator. */
 +		separator = *src++;
 +	}
 +	/*
 +	 * We've just copied zero or more path elements, not including the
 +	 * final '/'.
 +	 */
- 	if (dest == a->name) {
++	if (dest == path) {
 +		/*
 +		 * Nothing got copied.  The path must have been something
 +		 * like '.' or '/' or './' or '/././././/./'.
 +		 */
 +		if (separator)
 +			*dest++ = '/';
 +		else
 +			*dest++ = '.';
 +	}
 +	/* Terminate the result. */
 +	*dest = '\0';
 +	return (ARCHIVE_OK);
 +}
 +
++static int
++cleanup_pathname(struct archive_write_disk *a)
++{
++	struct archive_string error_string;
++	int error_number;
++	int rc;
++	archive_string_init(&error_string);
++	rc = cleanup_pathname_fsobj(a->name, &error_number, &error_string,
++	    a->flags);
++	if (rc != ARCHIVE_OK) {
++		archive_set_error(&a->archive, error_number, "%s",
++		    error_string.s);
++	}
++	archive_string_free(&error_string);
++	return rc;
++}
++
 +/*
 + * Create the parent directory of the specified path, assuming path
 + * is already in mutable storage.
 + */
 +static int
 +create_parent_dir(struct archive_write_disk *a, char *path)
 +{
 +	char *slash;
 +	int r;
 +
 +	/* Remove tail element to obtain parent name. */
 +	slash = strrchr(path, '/');
 +	if (slash == NULL)
 +		return (ARCHIVE_OK);
 +	*slash = '\0';
 +	r = create_dir(a, path);
 +	*slash = '/';
 +	return (r);
 +}
 +
 +/*
 + * Create the specified dir, recursing to create parents as necessary.
 + *
 + * Returns ARCHIVE_OK if the path exists when we're done here.
 + * Otherwise, returns ARCHIVE_FAILED.
 + * Assumes path is in mutable storage; path is unchanged on exit.
 + */
 +static int
 +create_dir(struct archive_write_disk *a, char *path)
 +{
 +	struct stat st;
 +	struct fixup_entry *le;
 +	char *slash, *base;
 +	mode_t mode_final, mode;
 +	int r;
 +
 +	/* Check for special names and just skip them. */
 +	slash = strrchr(path, '/');
 +	if (slash == NULL)
 +		base = path;
 +	else
 +		base = slash + 1;
 +
 +	if (base[0] == '\0' ||
 +	    (base[0] == '.' && base[1] == '\0') ||
 +	    (base[0] == '.' && base[1] == '.' && base[2] == '\0')) {
 +		/* Don't bother trying to create null path, '.', or '..'. */
 +		if (slash != NULL) {
 +			*slash = '\0';
 +			r = create_dir(a, path);
 +			*slash = '/';
 +			return (r);
 +		}
 +		return (ARCHIVE_OK);
 +	}
 +
 +	/*
 +	 * Yes, this should be stat() and not lstat().  Using lstat()
 +	 * here loses the ability to extract through symlinks.  Also note
 +	 * that this should not use the a->st cache.
 +	 */
 +	if (stat(path, &st) == 0) {
 +		if (S_ISDIR(st.st_mode))
 +			return (ARCHIVE_OK);
 +		if ((a->flags & ARCHIVE_EXTRACT_NO_OVERWRITE)) {
 +			archive_set_error(&a->archive, EEXIST,
 +			    "Can't create directory '%s'", path);
 +			return (ARCHIVE_FAILED);
 +		}
 +		if (unlink(path) != 0) {
 +			archive_set_error(&a->archive, errno,
 +			    "Can't create directory '%s': "
 +			    "Conflicting file cannot be removed",
 +			    path);
 +			return (ARCHIVE_FAILED);
 +		}
 +	} else if (errno != ENOENT && errno != ENOTDIR) {
 +		/* Stat failed? */
- 		archive_set_error(&a->archive, errno, "Can't test directory '%s'", path);
++		archive_set_error(&a->archive, errno,
++		    "Can't test directory '%s'", path);
 +		return (ARCHIVE_FAILED);
 +	} else if (slash != NULL) {
 +		*slash = '\0';
 +		r = create_dir(a, path);
 +		*slash = '/';
 +		if (r != ARCHIVE_OK)
 +			return (r);
 +	}
 +
 +	/*
 +	 * Mode we want for the final restored directory.  Per POSIX,
 +	 * implicitly-created dirs must be created obeying the umask.
 +	 * There's no mention whether this is different for privileged
 +	 * restores (which the rest of this code handles by pretending
 +	 * umask=0).  I've chosen here to always obey the user's umask for
 +	 * implicit dirs, even if _EXTRACT_PERM was specified.
 +	 */
 +	mode_final = DEFAULT_DIR_MODE & ~a->user_umask;
 +	/* Mode we want on disk during the restore process. */
 +	mode = mode_final;
 +	mode |= MINIMUM_DIR_MODE;
 +	mode &= MAXIMUM_DIR_MODE;
 +	if (mkdir(path, mode) == 0) {
 +		if (mode != mode_final) {
 +			le = new_fixup(a, path);
 +			if (le == NULL)
 +				return (ARCHIVE_FATAL);
 +			le->fixup |=TODO_MODE_BASE;
 +			le->mode = mode_final;
 +		}
 +		return (ARCHIVE_OK);
 +	}
 +
 +	/*
 +	 * Without the following check, a/b/../b/c/d fails at the
 +	 * second visit to 'b', so 'd' can't be created.  Note that we
 +	 * don't add it to the fixup list here, as it's already been
 +	 * added.
 +	 */
 +	if (stat(path, &st) == 0 && S_ISDIR(st.st_mode))
 +		return (ARCHIVE_OK);
 +
 +	archive_set_error(&a->archive, errno, "Failed to create dir '%s'",
 +	    path);
 +	return (ARCHIVE_FAILED);
 +}
 +
 +/*
 + * Note: Although we can skip setting the user id if the desired user
 + * id matches the current user, we cannot skip setting the group, as
 + * many systems set the gid based on the containing directory.  So
 + * we have to perform a chown syscall if we want to set the SGID
 + * bit.  (The alternative is to stat() and then possibly chown(); it's
 + * more efficient to skip the stat() and just always chown().)  Note
 + * that a successful chown() here clears the TODO_SGID_CHECK bit, which
 + * allows set_mode to skip the stat() check for the GID.
 + */
 +static int
 +set_ownership(struct archive_write_disk *a)
 +{
 +#ifndef __CYGWIN__
 +/* unfortunately, on win32 there is no 'root' user with uid 0,
 +   so we just have to try the chown and see if it works */
 +
 +	/* If we know we can't change it, don't bother trying. */
 +	if (a->user_uid != 0  &&  a->user_uid != a->uid) {
 +		archive_set_error(&a->archive, errno,
 +		    "Can't set UID=%jd", (intmax_t)a->uid);
 +		return (ARCHIVE_WARN);
 +	}
 +#endif
 +
 +#ifdef HAVE_FCHOWN
 +	/* If we have an fd, we can avoid a race. */
 +	if (a->fd >= 0 && fchown(a->fd, a->uid, a->gid) == 0) {
 +		/* We've set owner and know uid/gid are correct. */
 +		a->todo &= ~(TODO_OWNER | TODO_SGID_CHECK | TODO_SUID_CHECK);
 +		return (ARCHIVE_OK);
 +	}
 +#endif
 +
 +	/* We prefer lchown() but will use chown() if that's all we have. */
 +	/* Of course, if we have neither, this will always fail. */
 +#ifdef HAVE_LCHOWN
 +	if (lchown(a->name, a->uid, a->gid) == 0) {
 +		/* We've set owner and know uid/gid are correct. */
 +		a->todo &= ~(TODO_OWNER | TODO_SGID_CHECK | TODO_SUID_CHECK);
 +		return (ARCHIVE_OK);
 +	}
 +#elif HAVE_CHOWN
 +	if (!S_ISLNK(a->mode) && chown(a->name, a->uid, a->gid) == 0) {
 +		/* We've set owner and know uid/gid are correct. */
 +		a->todo &= ~(TODO_OWNER | TODO_SGID_CHECK | TODO_SUID_CHECK);
 +		return (ARCHIVE_OK);
 +	}
 +#endif
 +
 +	archive_set_error(&a->archive, errno,
 +	    "Can't set user=%jd/group=%jd for %s",
 +	    (intmax_t)a->uid, (intmax_t)a->gid, a->name);
 +	return (ARCHIVE_WARN);
 +}
 +
 +/*
 + * Note: Returns 0 on success, non-zero on failure.
 + */
 +static int
 +set_time(int fd, int mode, const char *name,
 +    time_t atime, long atime_nsec,
 +    time_t mtime, long mtime_nsec)
 +{
 +	/* Select the best implementation for this platform. */
 +#if defined(HAVE_UTIMENSAT) && defined(HAVE_FUTIMENS)
 +	/*
 +	 * utimensat() and futimens() are defined in
 +	 * POSIX.1-2008. They support ns resolution and setting times
 +	 * on fds and symlinks.
 +	 */
 +	struct timespec ts[2];
 +	(void)mode; /* UNUSED */
 +	ts[0].tv_sec = atime;
 +	ts[0].tv_nsec = atime_nsec;
 +	ts[1].tv_sec = mtime;
 +	ts[1].tv_nsec = mtime_nsec;
 +	if (fd >= 0)
 +		return futimens(fd, ts);
 +	return utimensat(AT_FDCWD, name, ts, AT_SYMLINK_NOFOLLOW);
 +
 +#elif HAVE_UTIMES
 +	/*
 +	 * The utimes()-family functions support µs-resolution and
 +	 * setting times fds and symlinks.  utimes() is documented as
 +	 * LEGACY by POSIX, futimes() and lutimes() are not described
 +	 * in POSIX.
 +	 */
 +	struct timeval times[2];
 +
 +	times[0].tv_sec = atime;
 +	times[0].tv_usec = atime_nsec / 1000;
 +	times[1].tv_sec = mtime;
 +	times[1].tv_usec = mtime_nsec / 1000;
 +
 +#ifdef HAVE_FUTIMES
 +	if (fd >= 0)
 +		return (futimes(fd, times));
 +#else
 +	(void)fd; /* UNUSED */
 +#endif
 +#ifdef HAVE_LUTIMES
 +	(void)mode; /* UNUSED */
 +	return (lutimes(name, times));
 +#else
 +	if (S_ISLNK(mode))
 +		return (0);
 +	return (utimes(name, times));
 +#endif
 +
 +#elif defined(HAVE_UTIME)
 +	/*
 +	 * utime() is POSIX-standard but only supports 1s resolution and
 +	 * does not support fds or symlinks.
 +	 */
 +	struct utimbuf times;
 +	(void)fd; /* UNUSED */
 +	(void)name; /* UNUSED */
 +	(void)atime_nsec; /* UNUSED */
 +	(void)mtime_nsec; /* UNUSED */
 +	times.actime = atime;
 +	times.modtime = mtime;
 +	if (S_ISLNK(mode))
 +		return (ARCHIVE_OK);
 +	return (utime(name, &times));
 +
 +#else
 +	/*
 +	 * We don't know how to set the time on this platform.
 +	 */
 +	(void)fd; /* UNUSED */
 +	(void)mode; /* UNUSED */
 +	(void)name; /* UNUSED */
 +	(void)atime_nsec; /* UNUSED */
 +	(void)mtime_nsec; /* UNUSED */
 +	return (ARCHIVE_WARN);
 +#endif
 +}
 +
 +#ifdef F_SETTIMES
 +static int
 +set_time_tru64(int fd, int mode, const char *name,
 +    time_t atime, long atime_nsec,
 +    time_t mtime, long mtime_nsec,
 +    time_t ctime, long ctime_nsec)
 +{
 +	struct attr_timbuf tstamp;
 +	tstamp.atime.tv_sec = atime;
 +	tstamp.mtime.tv_sec = mtime;
 +	tstamp.ctime.tv_sec = ctime;
 +#if defined (__hpux) && defined (__ia64)
 +	tstamp.atime.tv_nsec = atime_nsec;
 +	tstamp.mtime.tv_nsec = mtime_nsec;
 +	tstamp.ctime.tv_nsec = ctime_nsec;
 +#else
 +	tstamp.atime.tv_usec = atime_nsec / 1000;
 +	tstamp.mtime.tv_usec = mtime_nsec / 1000;
 +	tstamp.ctime.tv_usec = ctime_nsec / 1000;
 +#endif
 +	return (fcntl(fd,F_SETTIMES,&tstamp));
 +}
 +#endif /* F_SETTIMES */
 +
 +static int
 +set_times(struct archive_write_disk *a,
 +    int fd, int mode, const char *name,
 +    time_t atime, long atime_nanos,
 +    time_t birthtime, long birthtime_nanos,
 +    time_t mtime, long mtime_nanos,
 +    time_t cctime, long ctime_nanos)
 +{
 +	/* Note: set_time doesn't use libarchive return conventions!
 +	 * It uses syscall conventions.  So 0 here instead of ARCHIVE_OK. */
 +	int r1 = 0, r2 = 0;
 +
 +#ifdef F_SETTIMES
 +	 /*
 +	 * on Tru64 try own fcntl first which can restore even the
 +	 * ctime, fall back to default code path below if it fails
 +	 * or if we are not running as root
 +	 */
 +	if (a->user_uid == 0 &&
 +	    set_time_tru64(fd, mode, name,
 +			   atime, atime_nanos, mtime,
 +			   mtime_nanos, cctime, ctime_nanos) == 0) {
 +		return (ARCHIVE_OK);
 +	}
 +#else /* Tru64 */
 +	(void)cctime; /* UNUSED */
 +	(void)ctime_nanos; /* UNUSED */
 +#endif /* Tru64 */
 +
 +#ifdef HAVE_STRUCT_STAT_ST_BIRTHTIME
 +	/*
 +	 * If you have struct stat.st_birthtime, we assume BSD
 +	 * birthtime semantics, in which {f,l,}utimes() updates
 +	 * birthtime to earliest mtime.  So we set the time twice,
 +	 * first using the birthtime, then using the mtime.  If
 +	 * birthtime == mtime, this isn't necessary, so we skip it.
 +	 * If birthtime > mtime, then this won't work, so we skip it.
 +	 */
 +	if (birthtime < mtime
 +	    || (birthtime == mtime && birthtime_nanos < mtime_nanos))
 +		r1 = set_time(fd, mode, name,
 +			      atime, atime_nanos,
 +			      birthtime, birthtime_nanos);
 +#else
 +	(void)birthtime; /* UNUSED */
 +	(void)birthtime_nanos; /* UNUSED */
 +#endif
 +	r2 = set_time(fd, mode, name,
 +		      atime, atime_nanos,
 +		      mtime, mtime_nanos);
 +	if (r1 != 0 || r2 != 0) {
 +		archive_set_error(&a->archive, errno,
 +				  "Can't restore time");
 +		return (ARCHIVE_WARN);
 +	}
 +	return (ARCHIVE_OK);
 +}
 +
 +static int
 +set_times_from_entry(struct archive_write_disk *a)
 +{
 +	time_t atime, birthtime, mtime, cctime;
 +	long atime_nsec, birthtime_nsec, mtime_nsec, ctime_nsec;
 +
 +	/* Suitable defaults. */
 +	atime = birthtime = mtime = cctime = a->start_time;
 +	atime_nsec = birthtime_nsec = mtime_nsec = ctime_nsec = 0;
 +
 +	/* If no time was provided, we're done. */
 +	if (!archive_entry_atime_is_set(a->entry)
 +#if HAVE_STRUCT_STAT_ST_BIRTHTIME
 +	    && !archive_entry_birthtime_is_set(a->entry)
 +#endif
 +	    && !archive_entry_mtime_is_set(a->entry))
 +		return (ARCHIVE_OK);
 +
 +	if (archive_entry_atime_is_set(a->entry)) {
 +		atime = archive_entry_atime(a->entry);
 +		atime_nsec = archive_entry_atime_nsec(a->entry);
 +	}
 +	if (archive_entry_birthtime_is_set(a->entry)) {
 +		birthtime = archive_entry_birthtime(a->entry);
 +		birthtime_nsec = archive_entry_birthtime_nsec(a->entry);
 +	}
 +	if (archive_entry_mtime_is_set(a->entry)) {
 +		mtime = archive_entry_mtime(a->entry);
 +		mtime_nsec = archive_entry_mtime_nsec(a->entry);
 +	}
 +	if (archive_entry_ctime_is_set(a->entry)) {
 +		cctime = archive_entry_ctime(a->entry);
 +		ctime_nsec = archive_entry_ctime_nsec(a->entry);
 +	}
 +
 +	return set_times(a, a->fd, a->mode, a->name,
 +			 atime, atime_nsec,
 +			 birthtime, birthtime_nsec,
 +			 mtime, mtime_nsec,
 +			 cctime, ctime_nsec);
 +}
 +
 +static int
 +set_mode(struct archive_write_disk *a, int mode)
 +{
 +	int r = ARCHIVE_OK;
 +	mode &= 07777; /* Strip off file type bits. */
 +
 +	if (a->todo & TODO_SGID_CHECK) {
 +		/*
 +		 * If we don't know the GID is right, we must stat()
 +		 * to verify it.  We can't just check the GID of this
 +		 * process, since systems sometimes set GID from
 +		 * the enclosing dir or based on ACLs.
 +		 */
 +		if ((r = lazy_stat(a)) != ARCHIVE_OK)
 +			return (r);
 +		if (a->pst->st_gid != a->gid) {
 +			mode &= ~ S_ISGID;
 +			if (a->flags & ARCHIVE_EXTRACT_OWNER) {
 +				/*
 +				 * This is only an error if you
 +				 * requested owner restore.  If you
 +				 * didn't, we'll try to restore
 +				 * sgid/suid, but won't consider it a
 +				 * problem if we can't.
 +				 */
 +				archive_set_error(&a->archive, -1,
 +				    "Can't restore SGID bit");
 +				r = ARCHIVE_WARN;
 +			}
 +		}
 +		/* While we're here, double-check the UID. */
 +		if (a->pst->st_uid != a->uid
 +		    && (a->todo & TODO_SUID)) {
 +			mode &= ~ S_ISUID;
 +			if (a->flags & ARCHIVE_EXTRACT_OWNER) {
 +				archive_set_error(&a->archive, -1,
 +				    "Can't restore SUID bit");
 +				r = ARCHIVE_WARN;
 +			}
 +		}
 +		a->todo &= ~TODO_SGID_CHECK;
 +		a->todo &= ~TODO_SUID_CHECK;
 +	} else if (a->todo & TODO_SUID_CHECK) {
 +		/*
 +		 * If we don't know the UID is right, we can just check
 +		 * the user, since all systems set the file UID from
 +		 * the process UID.
 +		 */
 +		if (a->user_uid != a->uid) {
 +			mode &= ~ S_ISUID;
 +			if (a->flags & ARCHIVE_EXTRACT_OWNER) {
 +				archive_set_error(&a->archive, -1,
 +				    "Can't make file SUID");
 +				r = ARCHIVE_WARN;
 +			}
 +		}
 +		a->todo &= ~TODO_SUID_CHECK;
 +	}
 +
 +	if (S_ISLNK(a->mode)) {
 +#ifdef HAVE_LCHMOD
 +		/*
 +		 * If this is a symlink, use lchmod().  If the
 +		 * platform doesn't support lchmod(), just skip it.  A
 +		 * platform that doesn't provide a way to set
 +		 * permissions on symlinks probably ignores
 +		 * permissions on symlinks, so a failure here has no
 +		 * impact.
 +		 */
 +		if (lchmod(a->name, mode) != 0) {
 +			switch (errno) {
 +			case ENOTSUP:
 +			case ENOSYS:
 +#if ENOTSUP != EOPNOTSUPP
 +			case EOPNOTSUPP:
 +#endif
 +				/*
 +				 * if lchmod is defined but the platform
 +				 * doesn't support it, silently ignore
 +				 * error
 +				 */
 +				break;
 +			default:
 +				archive_set_error(&a->archive, errno,
 +				    "Can't set permissions to 0%o", (int)mode);
 +				r = ARCHIVE_WARN;
 +			}
 +		}
 +#endif
 +	} else if (!S_ISDIR(a->mode)) {
 +		/*
 +		 * If it's not a symlink and not a dir, then use
 +		 * fchmod() or chmod(), depending on whether we have
 +		 * an fd.  Dirs get their perms set during the
 +		 * post-extract fixup, which is handled elsewhere.
 +		 */
 +#ifdef HAVE_FCHMOD
 +		if (a->fd >= 0) {
 +			if (fchmod(a->fd, mode) != 0) {
 +				archive_set_error(&a->archive, errno,
 +				    "Can't set permissions to 0%o", (int)mode);
 +				r = ARCHIVE_WARN;
 +			}
 +		} else
 +#endif
 +			/* If this platform lacks fchmod(), then
 +			 * we'll just use chmod(). */
 +			if (chmod(a->name, mode) != 0) {
 +				archive_set_error(&a->archive, errno,
 +				    "Can't set permissions to 0%o", (int)mode);
 +				r = ARCHIVE_WARN;
 +			}
 +	}
 +	return (r);
 +}
 +
 +static int
 +set_fflags(struct archive_write_disk *a)
 +{
 +	struct fixup_entry *le;
 +	unsigned long	set, clear;
 +	int		r;
 +	int		critical_flags;
 +	mode_t		mode = archive_entry_mode(a->entry);
 +
 +	/*
 +	 * Make 'critical_flags' hold all file flags that can't be
 +	 * immediately restored.  For example, on BSD systems,
 +	 * SF_IMMUTABLE prevents hardlinks from being created, so
 +	 * should not be set until after any hardlinks are created.  To
 +	 * preserve some semblance of portability, this uses #ifdef
 +	 * extensively.  Ugly, but it works.
 +	 *
 +	 * Yes, Virginia, this does create a security race.  It's mitigated
 +	 * somewhat by the practice of creating dirs 0700 until the extract
 +	 * is done, but it would be nice if we could do more than that.
 +	 * People restoring critical file systems should be wary of
 +	 * other programs that might try to muck with files as they're
 +	 * being restored.
 +	 */
 +	/* Hopefully, the compiler will optimize this mess into a constant. */
 +	critical_flags = 0;
 +#ifdef SF_IMMUTABLE
 +	critical_flags |= SF_IMMUTABLE;
 +#endif
 +#ifdef UF_IMMUTABLE
 +	critical_flags |= UF_IMMUTABLE;
 +#endif
 +#ifdef SF_APPEND
 +	critical_flags |= SF_APPEND;
 +#endif
 +#ifdef UF_APPEND
 +	critical_flags |= UF_APPEND;
 +#endif
 +#ifdef EXT2_APPEND_FL
 +	critical_flags |= EXT2_APPEND_FL;
 +#endif
 +#ifdef EXT2_IMMUTABLE_FL
 +	critical_flags |= EXT2_IMMUTABLE_FL;
 +#endif
 +
 +	if (a->todo & TODO_FFLAGS) {
 +		archive_entry_fflags(a->entry, &set, &clear);
 +
 +		/*
 +		 * The first test encourages the compiler to eliminate
 +		 * all of this if it's not necessary.
 +		 */
 +		if ((critical_flags != 0)  &&  (set & critical_flags)) {
 +			le = current_fixup(a, a->name);
 +			if (le == NULL)
 +				return (ARCHIVE_FATAL);
 +			le->fixup |= TODO_FFLAGS;
 +			le->fflags_set = set;
 +			/* Store the mode if it's not already there. */
 +			if ((le->fixup & TODO_MODE) == 0)
 +				le->mode = mode;
 +		} else {
 +			r = set_fflags_platform(a, a->fd,
 +			    a->name, mode, set, clear);
 +			if (r != ARCHIVE_OK)
 +				return (r);
 +		}
 +	}
 +	return (ARCHIVE_OK);
 +}
 +
 +static int
 +clear_nochange_fflags(struct archive_write_disk *a)
 +{
 +	int		nochange_flags;
 +	mode_t		mode = archive_entry_mode(a->entry);
 +
 +	/* Hopefully, the compiler will optimize this mess into a constant. */
 +	nochange_flags = 0;
 +#ifdef SF_IMMUTABLE
 +	nochange_flags |= SF_IMMUTABLE;
 +#endif
 +#ifdef UF_IMMUTABLE
 +	nochange_flags |= UF_IMMUTABLE;
 +#endif
 +#ifdef SF_APPEND
 +	nochange_flags |= SF_APPEND;
 +#endif
 +#ifdef UF_APPEND
 +	nochange_flags |= UF_APPEND;
 +#endif
 +#ifdef EXT2_APPEND_FL
 +	nochange_flags |= EXT2_APPEND_FL;
 +#endif
 +#ifdef EXT2_IMMUTABLE_FL
 +	nochange_flags |= EXT2_IMMUTABLE_FL;
 +#endif
 +
- 	return (set_fflags_platform(a, a->fd, a->name, mode, 0, nochange_flags));
++	return (set_fflags_platform(a, a->fd, a->name, mode, 0,
++	    nochange_flags));
 +}
 +
 +
 +#if ( defined(HAVE_LCHFLAGS) || defined(HAVE_CHFLAGS) || defined(HAVE_FCHFLAGS) ) && defined(HAVE_STRUCT_STAT_ST_FLAGS)
 +/*
 + * BSD reads flags using stat() and sets them with one of {f,l,}chflags()
 + */
 +static int
 +set_fflags_platform(struct archive_write_disk *a, int fd, const char *name,
 +    mode_t mode, unsigned long set, unsigned long clear)
 +{
 +	int r;
 +
 +	(void)mode; /* UNUSED */
 +	if (set == 0  && clear == 0)
 +		return (ARCHIVE_OK);
 +
 +	/*
 +	 * XXX Is the stat here really necessary?  Or can I just use
 +	 * the 'set' flags directly?  In particular, I'm not sure
 +	 * about the correct approach if we're overwriting an existing
 +	 * file that already has flags on it. XXX
 +	 */
 +	if ((r = lazy_stat(a)) != ARCHIVE_OK)
 +		return (r);
 +
 +	a->st.st_flags &= ~clear;
 +	a->st.st_flags |= set;
 +#ifdef HAVE_FCHFLAGS
 +	/* If platform has fchflags() and we were given an fd, use it. */
 +	if (fd >= 0 && fchflags(fd, a->st.st_flags) == 0)
 +		return (ARCHIVE_OK);
 +#endif
 +	/*
 +	 * If we can't use the fd to set the flags, we'll use the
 +	 * pathname to set flags.  We prefer lchflags() but will use
 +	 * chflags() if we must.
 +	 */
 +#ifdef HAVE_LCHFLAGS
 +	if (lchflags(name, a->st.st_flags) == 0)
 +		return (ARCHIVE_OK);
 +#elif defined(HAVE_CHFLAGS)
 +	if (S_ISLNK(a->st.st_mode)) {
 +		archive_set_error(&a->archive, errno,
 +		    "Can't set file flags on symlink.");
 +		return (ARCHIVE_WARN);
 +	}
 +	if (chflags(name, a->st.st_flags) == 0)
 +		return (ARCHIVE_OK);
 +#endif
 +	archive_set_error(&a->archive, errno,
 +	    "Failed to set file flags");
 +	return (ARCHIVE_WARN);
 +}
 +
 +#elif defined(EXT2_IOC_GETFLAGS) && defined(EXT2_IOC_SETFLAGS) && defined(HAVE_WORKING_EXT2_IOC_GETFLAGS)
 +/*
 + * Linux uses ioctl() to read and write file flags.
 + */
 +static int
 +set_fflags_platform(struct archive_write_disk *a, int fd, const char *name,
 +    mode_t mode, unsigned long set, unsigned long clear)
 +{
 +	int		 ret;
 +	int		 myfd = fd;
 +	int newflags, oldflags;
 +	int sf_mask = 0;
 +
 +	if (set == 0  && clear == 0)
 +		return (ARCHIVE_OK);
 +	/* Only regular files and dirs can have flags. */
 +	if (!S_ISREG(mode) && !S_ISDIR(mode))
 +		return (ARCHIVE_OK);
 +
 +	/* If we weren't given an fd, open it ourselves. */
 +	if (myfd < 0) {
 +		myfd = open(name, O_RDONLY | O_NONBLOCK | O_BINARY | O_CLOEXEC);
 +		__archive_ensure_cloexec_flag(myfd);
 +	}
 +	if (myfd < 0)
 +		return (ARCHIVE_OK);
 +
 +	/*
 +	 * Linux has no define for the flags that are only settable by
 +	 * the root user.  This code may seem a little complex, but
 +	 * there seem to be some Linux systems that lack these
 +	 * defines. (?)  The code below degrades reasonably gracefully
 +	 * if sf_mask is incomplete.
 +	 */
 +#ifdef EXT2_IMMUTABLE_FL
 +	sf_mask |= EXT2_IMMUTABLE_FL;
 +#endif
 +#ifdef EXT2_APPEND_FL
 +	sf_mask |= EXT2_APPEND_FL;
 +#endif
 +	/*
 +	 * XXX As above, this would be way simpler if we didn't have
 +	 * to read the current flags from disk. XXX
 +	 */
 +	ret = ARCHIVE_OK;
 +
 +	/* Read the current file flags. */
 +	if (ioctl(myfd, EXT2_IOC_GETFLAGS, &oldflags) < 0)
 +		goto fail;
 +
 +	/* Try setting the flags as given. */
 +	newflags = (oldflags & ~clear) | set;
 +	if (ioctl(myfd, EXT2_IOC_SETFLAGS, &newflags) >= 0)
 +		goto cleanup;
 +	if (errno != EPERM)
 +		goto fail;
 +
 +	/* If we couldn't set all the flags, try again with a subset. */
 +	newflags &= ~sf_mask;
 +	oldflags &= sf_mask;
 +	newflags |= oldflags;
 +	if (ioctl(myfd, EXT2_IOC_SETFLAGS, &newflags) >= 0)
 +		goto cleanup;
 +
 +	/* We couldn't set the flags, so report the failure. */
 +fail:
 +	archive_set_error(&a->archive, errno,
 +	    "Failed to set file flags");
 +	ret = ARCHIVE_WARN;
 +cleanup:
 +	if (fd < 0)
 +		close(myfd);
 +	return (ret);
 +}
 +
 +#else
 +
 +/*
 + * Of course, some systems have neither BSD chflags() nor Linux' flags
 + * support through ioctl().
 + */
 +static int
 +set_fflags_platform(struct archive_write_disk *a, int fd, const char *name,
 +    mode_t mode, unsigned long set, unsigned long clear)
 +{
 +	(void)a; /* UNUSED */
 +	(void)fd; /* UNUSED */
 +	(void)name; /* UNUSED */
 +	(void)mode; /* UNUSED */
 +	(void)set; /* UNUSED */
 +	(void)clear; /* UNUSED */
 +	return (ARCHIVE_OK);
 +}
 +
 +#endif /* __linux */
 +
 +#ifndef HAVE_COPYFILE_H
 +/* Default is to simply drop Mac extended metadata. */
 +static int
 +set_mac_metadata(struct archive_write_disk *a, const char *pathname,
 +		 const void *metadata, size_t metadata_size)
 +{
 +	(void)a; /* UNUSED */
 +	(void)pathname; /* UNUSED */
 +	(void)metadata; /* UNUSED */
 +	(void)metadata_size; /* UNUSED */
 +	return (ARCHIVE_OK);
 +}
 +
 +static int
 +fixup_appledouble(struct archive_write_disk *a, const char *pathname)
 +{
 +	(void)a; /* UNUSED */
 +	(void)pathname; /* UNUSED */
 +	return (ARCHIVE_OK);
 +}
 +#else
 +
 +/*
 + * On Mac OS, we use copyfile() to unpack the metadata and
 + * apply it to the target file.
 + */
 +
 +#if defined(HAVE_SYS_XATTR_H)
 +static int
 +copy_xattrs(struct archive_write_disk *a, int tmpfd, int dffd)
 +{
 +	ssize_t xattr_size;
 +	char *xattr_names = NULL, *xattr_val = NULL;
 +	int ret = ARCHIVE_OK, xattr_i;
 +
 +	xattr_size = flistxattr(tmpfd, NULL, 0, 0);
 +	if (xattr_size == -1) {
 +		archive_set_error(&a->archive, errno,
 +		    "Failed to read metadata(xattr)");
 +		ret = ARCHIVE_WARN;
 +		goto exit_xattr;
 +	}
 +	xattr_names = malloc(xattr_size);
 +	if (xattr_names == NULL) {
 +		archive_set_error(&a->archive, ENOMEM,
 +		    "Can't allocate memory for metadata(xattr)");
 +		ret = ARCHIVE_FATAL;
 +		goto exit_xattr;
 +	}
 +	xattr_size = flistxattr(tmpfd, xattr_names, xattr_size, 0);
 +	if (xattr_size == -1) {
 +		archive_set_error(&a->archive, errno,
 +		    "Failed to read metadata(xattr)");
 +		ret = ARCHIVE_WARN;
 +		goto exit_xattr;
 +	}
 +	for (xattr_i = 0; xattr_i < xattr_size;
 +	    xattr_i += strlen(xattr_names + xattr_i) + 1) {
 +		char *xattr_val_saved;
 +		ssize_t s;
 +		int f;
 +
 +		s = fgetxattr(tmpfd, xattr_names + xattr_i, NULL, 0, 0, 0);
 +		if (s == -1) {
 +			archive_set_error(&a->archive, errno,
 +			    "Failed to get metadata(xattr)");
 +			ret = ARCHIVE_WARN;
 +			goto exit_xattr;
 +		}
 +		xattr_val_saved = xattr_val;
 +		xattr_val = realloc(xattr_val, s);
 +		if (xattr_val == NULL) {
 +			archive_set_error(&a->archive, ENOMEM,
 +			    "Failed to get metadata(xattr)");
 +			ret = ARCHIVE_WARN;
 +			free(xattr_val_saved);
 +			goto exit_xattr;
 +		}
 +		s = fgetxattr(tmpfd, xattr_names + xattr_i, xattr_val, s, 0, 0);
 +		if (s == -1) {
 +			archive_set_error(&a->archive, errno,
 +			    "Failed to get metadata(xattr)");
 +			ret = ARCHIVE_WARN;
 +			goto exit_xattr;
 +		}
 +		f = fsetxattr(dffd, xattr_names + xattr_i, xattr_val, s, 0, 0);
 +		if (f == -1) {
 +			archive_set_error(&a->archive, errno,
 +			    "Failed to get metadata(xattr)");
 +			ret = ARCHIVE_WARN;
 +			goto exit_xattr;
 +		}
 +	}
 +exit_xattr:
 +	free(xattr_names);
 +	free(xattr_val);
 +	return (ret);
 +}
 +#endif
 +
 +static int
 +copy_acls(struct archive_write_disk *a, int tmpfd, int dffd)
 +{
++#ifndef HAVE_SYS_ACL_H
++	return 0;
++#else
 +	acl_t acl, dfacl = NULL;
 +	int acl_r, ret = ARCHIVE_OK;
 +
 +	acl = acl_get_fd(tmpfd);
 +	if (acl == NULL) {
 +		if (errno == ENOENT)
 +			/* There are not any ACLs. */
 +			return (ret);
 +		archive_set_error(&a->archive, errno,
 +		    "Failed to get metadata(acl)");
 +		ret = ARCHIVE_WARN;
 +		goto exit_acl;
 +	}
 +	dfacl = acl_dup(acl);
 +	acl_r = acl_set_fd(dffd, dfacl);
 +	if (acl_r == -1) {
 +		archive_set_error(&a->archive, errno,
 +		    "Failed to get metadata(acl)");
 +		ret = ARCHIVE_WARN;
 +		goto exit_acl;
 +	}
 +exit_acl:
 +	if (acl)
 +		acl_free(acl);
 +	if (dfacl)
 +		acl_free(dfacl);
 +	return (ret);
++#endif
 +}
 +
 +static int
 +create_tempdatafork(struct archive_write_disk *a, const char *pathname)
 +{
 +	struct archive_string tmpdatafork;
 +	int tmpfd;
 +
 +	archive_string_init(&tmpdatafork);
 +	archive_strcpy(&tmpdatafork, "tar.md.XXXXXX");
 +	tmpfd = mkstemp(tmpdatafork.s);
 +	if (tmpfd < 0) {
 +		archive_set_error(&a->archive, errno,
 +		    "Failed to mkstemp");
 +		archive_string_free(&tmpdatafork);
 +		return (-1);
 +	}
 +	if (copyfile(pathname, tmpdatafork.s, 0,
 +	    COPYFILE_UNPACK | COPYFILE_NOFOLLOW
 +	    | COPYFILE_ACL | COPYFILE_XATTR) < 0) {
 +		archive_set_error(&a->archive, errno,
 +		    "Failed to restore metadata");
 +		close(tmpfd);
 +		tmpfd = -1;
 +	}
 +	unlink(tmpdatafork.s);
 +	archive_string_free(&tmpdatafork);
 +	return (tmpfd);
 +}
 +
 +static int
 +copy_metadata(struct archive_write_disk *a, const char *metadata,
 +    const char *datafork, int datafork_compressed)
 +{
 +	int ret = ARCHIVE_OK;
 +
 +	if (datafork_compressed) {
 +		int dffd, tmpfd;
 +
 +		tmpfd = create_tempdatafork(a, metadata);
 +		if (tmpfd == -1)
 +			return (ARCHIVE_WARN);
 +
 +		/*
 +		 * Do not open the data fork compressed by HFS+ compression
 +		 * with at least a writing mode(O_RDWR or O_WRONLY). it
 +		 * makes the data fork uncompressed.
 +		 */
 +		dffd = open(datafork, 0);
 +		if (dffd == -1) {
 +			archive_set_error(&a->archive, errno,
 +			    "Failed to open the data fork for metadata");
 +			close(tmpfd);
 +			return (ARCHIVE_WARN);
 +		}
 +
 +#if defined(HAVE_SYS_XATTR_H)
 +		ret = copy_xattrs(a, tmpfd, dffd);
 +		if (ret == ARCHIVE_OK)
 +#endif
 +			ret = copy_acls(a, tmpfd, dffd);
 +		close(tmpfd);
 +		close(dffd);
 +	} else {
 +		if (copyfile(metadata, datafork, 0,
 +		    COPYFILE_UNPACK | COPYFILE_NOFOLLOW
 +		    | COPYFILE_ACL | COPYFILE_XATTR) < 0) {
 +			archive_set_error(&a->archive, errno,
 +			    "Failed to restore metadata");
 +			ret = ARCHIVE_WARN;
 +		}
 +	}
 +	return (ret);
 +}
 +
 +static int
 +set_mac_metadata(struct archive_write_disk *a, const char *pathname,
 +		 const void *metadata, size_t metadata_size)
 +{
 +	struct archive_string tmp;
 +	ssize_t written;
 +	int fd;
 +	int ret = ARCHIVE_OK;
 +
 +	/* This would be simpler if copyfile() could just accept the
 +	 * metadata as a block of memory; then we could sidestep this
 +	 * silly dance of writing the data to disk just so that
 +	 * copyfile() can read it back in again. */
 +	archive_string_init(&tmp);
 +	archive_strcpy(&tmp, pathname);
 +	archive_strcat(&tmp, ".XXXXXX");
 +	fd = mkstemp(tmp.s);
 +
 +	if (fd < 0) {
 +		archive_set_error(&a->archive, errno,
 +				  "Failed to restore metadata");
 +		archive_string_free(&tmp);
 +		return (ARCHIVE_WARN);
 +	}
 +	written = write(fd, metadata, metadata_size);
 +	close(fd);
 +	if ((size_t)written != metadata_size) {
 +		archive_set_error(&a->archive, errno,
 +				  "Failed to restore metadata");
 +		ret = ARCHIVE_WARN;
 +	} else {
 +		int compressed;
 +
 +#if defined(UF_COMPRESSED)
 +		if ((a->todo & TODO_HFS_COMPRESSION) != 0 &&
 +		    (ret = lazy_stat(a)) == ARCHIVE_OK)
 +			compressed = a->st.st_flags & UF_COMPRESSED;
 +		else
 +#endif
 +			compressed = 0;
 +		ret = copy_metadata(a, tmp.s, pathname, compressed);
 +	}
 +	unlink(tmp.s);
 +	archive_string_free(&tmp);
 +	return (ret);
 +}
 +
 +static int
 +fixup_appledouble(struct archive_write_disk *a, const char *pathname)
 +{
 +	char buff[8];
 +	struct stat st;
 +	const char *p;
 +	struct archive_string datafork;
 +	int fd = -1, ret = ARCHIVE_OK;
 +
 +	archive_string_init(&datafork);
 +	/* Check if the current file name is a type of the resource
 +	 * fork file. */
 +	p = strrchr(pathname, '/');
 +	if (p == NULL)
 +		p = pathname;
 +	else
 +		p++;
 +	if (p[0] != '.' || p[1] != '_')
 +		goto skip_appledouble;
 +
 +	/*
 +	 * Check if the data fork file exists.
 +	 *
 +	 * TODO: Check if this write disk object has handled it.
 +	 */
 +	archive_strncpy(&datafork, pathname, p - pathname);
 +	archive_strcat(&datafork, p + 2);
 +	if (lstat(datafork.s, &st) == -1 ||
 +	    (st.st_mode & AE_IFMT) != AE_IFREG)
 +		goto skip_appledouble;
 +
 +	/*
 +	 * Check if the file is in the AppleDouble form.
 +	 */
 +	fd = open(pathname, O_RDONLY | O_BINARY | O_CLOEXEC);
 +	__archive_ensure_cloexec_flag(fd);
 +	if (fd == -1) {
 +		archive_set_error(&a->archive, errno,
 +		    "Failed to open a restoring file");
 +		ret = ARCHIVE_WARN;
 +		goto skip_appledouble;
 +	}
 +	if (read(fd, buff, 8) == -1) {
 +		archive_set_error(&a->archive, errno,
 +		    "Failed to read a restoring file");
 +		close(fd);
 +		ret = ARCHIVE_WARN;
 +		goto skip_appledouble;
 +	}
 +	close(fd);
 +	/* Check AppleDouble Magic Code. */
 +	if (archive_be32dec(buff) != 0x00051607)
 +		goto skip_appledouble;
 +	/* Check AppleDouble Version. */
 +	if (archive_be32dec(buff+4) != 0x00020000)
 +		goto skip_appledouble;
 +
 +	ret = copy_metadata(a, pathname, datafork.s,
 +#if defined(UF_COMPRESSED)
 +	    st.st_flags & UF_COMPRESSED);
 +#else
 +	    0);
 +#endif
 +	if (ret == ARCHIVE_OK) {
 +		unlink(pathname);
 +		ret = ARCHIVE_EOF;
 +	}
 +skip_appledouble:
 +	archive_string_free(&datafork);
 +	return (ret);
 +}
 +#endif
 +
 +#if HAVE_LSETXATTR || HAVE_LSETEA
 +/*
 + * Restore extended attributes -  Linux and AIX implementations:
 + * AIX' ea interface is syntaxwise identical to the Linux xattr interface.
 + */
 +static int
 +set_xattrs(struct archive_write_disk *a)
 +{
 +	struct archive_entry *entry = a->entry;
 +	static int warning_done = 0;
 +	int ret = ARCHIVE_OK;
 +	int i = archive_entry_xattr_reset(entry);
 +
 +	while (i--) {
 +		const char *name;
 +		const void *value;
 +		size_t size;
 +		archive_entry_xattr_next(entry, &name, &value, &size);
 +		if (name != NULL &&
 +				strncmp(name, "xfsroot.", 8) != 0 &&
 +				strncmp(name, "system.", 7) != 0) {
 +			int e;
 +#if HAVE_FSETXATTR
 +			if (a->fd >= 0)
 +				e = fsetxattr(a->fd, name, value, size, 0);
 +			else
 +#elif HAVE_FSETEA
 +			if (a->fd >= 0)
 +				e = fsetea(a->fd, name, value, size, 0);
 +			else
 +#endif
 +			{
 +#if HAVE_LSETXATTR
 +				e = lsetxattr(archive_entry_pathname(entry),
 +				    name, value, size, 0);
 +#elif HAVE_LSETEA
 +				e = lsetea(archive_entry_pathname(entry),
 +				    name, value, size, 0);
 +#endif
 +			}
 +			if (e == -1) {
 +				if (errno == ENOTSUP || errno == ENOSYS) {
 +					if (!warning_done) {
 +						warning_done = 1;
- 						archive_set_error(&a->archive, errno,
++						archive_set_error(&a->archive,
++						    errno,
 +						    "Cannot restore extended "
 +						    "attributes on this file "
 +						    "system");
 +					}
 +				} else
 +					archive_set_error(&a->archive, errno,
 +					    "Failed to set extended attribute");
 +				ret = ARCHIVE_WARN;
 +			}
 +		} else {
- 			archive_set_error(&a->archive, ARCHIVE_ERRNO_FILE_FORMAT,
++			archive_set_error(&a->archive,
++			    ARCHIVE_ERRNO_FILE_FORMAT,
 +			    "Invalid extended attribute encountered");
 +			ret = ARCHIVE_WARN;
 +		}
 +	}
 +	return (ret);
 +}
 +#elif HAVE_EXTATTR_SET_FILE && HAVE_DECL_EXTATTR_NAMESPACE_USER
 +/*
 + * Restore extended attributes -  FreeBSD implementation
 + */
 +static int
 +set_xattrs(struct archive_write_disk *a)
 +{
 +	struct archive_entry *entry = a->entry;
 +	static int warning_done = 0;
 +	int ret = ARCHIVE_OK;
 +	int i = archive_entry_xattr_reset(entry);
 +
 +	while (i--) {
 +		const char *name;
 +		const void *value;
 +		size_t size;
 +		archive_entry_xattr_next(entry, &name, &value, &size);
 +		if (name != NULL) {
 +			int e;
 +			int namespace;
 +
 +			if (strncmp(name, "user.", 5) == 0) {
 +				/* "user." attributes go to user namespace */
 +				name += 5;
 +				namespace = EXTATTR_NAMESPACE_USER;
 +			} else {
 +				/* Warn about other extended attributes. */
 +				archive_set_error(&a->archive,
 +				    ARCHIVE_ERRNO_FILE_FORMAT,
 +				    "Can't restore extended attribute ``%s''",
 +				    name);
 +				ret = ARCHIVE_WARN;
 +				continue;
 +			}
 +			errno = 0;
 +#if HAVE_EXTATTR_SET_FD
 +			if (a->fd >= 0)
- 				e = extattr_set_fd(a->fd, namespace, name, value, size);
++				e = extattr_set_fd(a->fd, namespace, name,
++				    value, size);
 +			else
 +#endif
 +			/* TODO: should we use extattr_set_link() instead? */
 +			{
- 				e = extattr_set_file(archive_entry_pathname(entry),
- 				    namespace, name, value, size);
++				e = extattr_set_file(
++				    archive_entry_pathname(entry), namespace,
++				    name, value, size);
 +			}
 +			if (e != (int)size) {
 +				if (errno == ENOTSUP || errno == ENOSYS) {
 +					if (!warning_done) {
 +						warning_done = 1;
- 						archive_set_error(&a->archive, errno,
++						archive_set_error(&a->archive,
++						    errno,
 +						    "Cannot restore extended "
 +						    "attributes on this file "
 +						    "system");
 +					}
 +				} else {
 +					archive_set_error(&a->archive, errno,
 +					    "Failed to set extended attribute");
 +				}
 +
 +				ret = ARCHIVE_WARN;
 +			}
 +		}
 +	}
 +	return (ret);
 +}
 +#else
 +/*
 + * Restore extended attributes - stub implementation for unsupported systems
 + */
 +static int
 +set_xattrs(struct archive_write_disk *a)
 +{
 +	static int warning_done = 0;
 +
 +	/* If there aren't any extended attributes, then it's okay not
 +	 * to extract them, otherwise, issue a single warning. */
 +	if (archive_entry_xattr_count(a->entry) != 0 && !warning_done) {
 +		warning_done = 1;
 +		archive_set_error(&a->archive, ARCHIVE_ERRNO_FILE_FORMAT,
 +		    "Cannot restore extended attributes on this system");
 +		return (ARCHIVE_WARN);
 +	}
 +	/* Warning was already emitted; suppress further warnings. */
 +	return (ARCHIVE_OK);
 +}
 +#endif
 +
 +/*
 + * Test if file on disk is older than entry.
 + */
 +static int
 +older(struct stat *st, struct archive_entry *entry)
 +{
 +	/* First, test the seconds and return if we have a definite answer. */
 +	/* Definitely older. */
- 	if (st->st_mtime < archive_entry_mtime(entry))
++	if (to_int64_time(st->st_mtime) < to_int64_time(archive_entry_mtime(entry)))
 +		return (1);
 +	/* Definitely younger. */
- 	if (st->st_mtime > archive_entry_mtime(entry))
++	if (to_int64_time(st->st_mtime) > to_int64_time(archive_entry_mtime(entry)))
 +		return (0);
 +	/* If this platform supports fractional seconds, try those. */
 +#if HAVE_STRUCT_STAT_ST_MTIMESPEC_TV_NSEC
 +	/* Definitely older. */
 +	if (st->st_mtimespec.tv_nsec < archive_entry_mtime_nsec(entry))
 +		return (1);
 +#elif HAVE_STRUCT_STAT_ST_MTIM_TV_NSEC
 +	/* Definitely older. */
 +	if (st->st_mtim.tv_nsec < archive_entry_mtime_nsec(entry))
 +		return (1);
 +#elif HAVE_STRUCT_STAT_ST_MTIME_N
 +	/* older. */
 +	if (st->st_mtime_n < archive_entry_mtime_nsec(entry))
 +		return (1);
 +#elif HAVE_STRUCT_STAT_ST_UMTIME
 +	/* older. */
 +	if (st->st_umtime * 1000 < archive_entry_mtime_nsec(entry))
 +		return (1);
 +#elif HAVE_STRUCT_STAT_ST_MTIME_USEC
 +	/* older. */
 +	if (st->st_mtime_usec * 1000 < archive_entry_mtime_nsec(entry))
 +		return (1);
 +#else
 +	/* This system doesn't have high-res timestamps. */
 +#endif
 +	/* Same age or newer, so not older. */
 +	return (0);
 +}
 +
 +#endif /* !_WIN32 || __CYGWIN__ */
 +
diff --cc Utilities/cmlibarchive/libarchive/archive_write_set_format_7zip.c
index 8718d25,0000000..3fc5a07
mode 100644,000000..100644
--- a/Utilities/cmlibarchive/libarchive/archive_write_set_format_7zip.c
+++ b/Utilities/cmlibarchive/libarchive/archive_write_set_format_7zip.c
@@@ -1,2328 -1,0 +1,2328 @@@
 +/*-
 + * Copyright (c) 2011-2012 Michihiro NAKAJIMA
 + * All rights reserved.
 + *
 + * Redistribution and use in source and binary forms, with or without
 + * modification, are permitted provided that the following conditions
 + * are met:
 + * 1. Redistributions of source code must retain the above copyright
 + *    notice, this list of conditions and the following disclaimer.
 + * 2. Redistributions in binary form must reproduce the above copyright
 + *    notice, this list of conditions and the following disclaimer in the
 + *    documentation and/or other materials provided with the distribution.
 + *
 + * THIS SOFTWARE IS PROVIDED BY THE AUTHOR(S) ``AS IS'' AND ANY EXPRESS OR
 + * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
 + * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
 + * IN NO EVENT SHALL THE AUTHOR(S) BE LIABLE FOR ANY DIRECT, INDIRECT,
 + * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
 + * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
 + * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
 + * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
 + * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
 + * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
 + */
 +
 +#include "archive_platform.h"
 +__FBSDID("$FreeBSD$");
 +
 +#ifdef HAVE_ERRNO_H
 +#include <errno.h>
 +#endif
 +#include <stdlib.h>
 +#ifdef HAVE_BZLIB_H
 +#include <cm_bzlib.h>
 +#endif
 +#if HAVE_LZMA_H
 +#include <cm_lzma.h>
 +#endif
 +#ifdef HAVE_ZLIB_H
 +#include <cm_zlib.h>
 +#endif
 +
 +#include "archive.h"
 +#ifndef HAVE_ZLIB_H
 +#include "archive_crc32.h"
 +#endif
 +#include "archive_endian.h"
 +#include "archive_entry.h"
 +#include "archive_entry_locale.h"
 +#include "archive_ppmd7_private.h"
 +#include "archive_private.h"
 +#include "archive_rb.h"
 +#include "archive_string.h"
 +#include "archive_write_private.h"
 +
 +/*
 + * Codec ID
 + */
 +#define _7Z_COPY	0
 +#define _7Z_LZMA1	0x030101
 +#define _7Z_LZMA2	0x21
 +#define _7Z_DEFLATE	0x040108
 +#define _7Z_BZIP2	0x040202
 +#define _7Z_PPMD	0x030401
 +
 +/*
 + * 7-Zip header property IDs.
 + */
 +#define kEnd			0x00
 +#define kHeader			0x01
 +#define kArchiveProperties	0x02
 +#define kAdditionalStreamsInfo	0x03
 +#define kMainStreamsInfo	0x04
 +#define kFilesInfo		0x05
 +#define kPackInfo		0x06
 +#define kUnPackInfo		0x07
 +#define kSubStreamsInfo		0x08
 +#define kSize			0x09
 +#define kCRC			0x0A
 +#define kFolder			0x0B
 +#define kCodersUnPackSize	0x0C
 +#define kNumUnPackStream	0x0D
 +#define kEmptyStream		0x0E
 +#define kEmptyFile		0x0F
 +#define kAnti			0x10
 +#define kName			0x11
 +#define kCTime			0x12
 +#define kATime			0x13
 +#define kMTime			0x14
 +#define kAttributes		0x15
 +#define kEncodedHeader		0x17
 +
 +enum la_zaction {
 +	ARCHIVE_Z_FINISH,
 +	ARCHIVE_Z_RUN
 +};
 +
 +/*
 + * A stream object of universal compressor.
 + */
 +struct la_zstream {
 +	const uint8_t		*next_in;
 +	size_t			 avail_in;
 +	uint64_t		 total_in;
 +
 +	uint8_t			*next_out;
 +	size_t			 avail_out;
 +	uint64_t		 total_out;
 +
 +	uint32_t		 prop_size;
 +	uint8_t			*props;
 +
 +	int			 valid;
 +	void			*real_stream;
 +	int			 (*code) (struct archive *a,
 +				    struct la_zstream *lastrm,
 +				    enum la_zaction action);
 +	int			 (*end)(struct archive *a,
 +				    struct la_zstream *lastrm);
 +};
 +
 +#define PPMD7_DEFAULT_ORDER	6
 +#define PPMD7_DEFAULT_MEM_SIZE	(1 << 24)
 +
 +struct ppmd_stream {
 +	int			 stat;
 +	CPpmd7			 ppmd7_context;
 +	CPpmd7z_RangeEnc	 range_enc;
 +	IByteOut		 byteout;
 +	uint8_t			*buff;
 +	uint8_t			*buff_ptr;
 +	uint8_t			*buff_end;
 +	size_t			 buff_bytes;
 +};
 +
 +struct coder {
 +	unsigned		 codec;
 +	size_t			 prop_size;
 +	uint8_t			*props;
 +};
 +
 +struct file {
 +	struct archive_rb_node	 rbnode;
 +
 +	struct file		*next;
 +	unsigned		 name_len;
 +	uint8_t			*utf16name;/* UTF16-LE name. */
 +	uint64_t		 size;
 +	unsigned		 flg;
 +#define MTIME_IS_SET	(1<<0)
 +#define ATIME_IS_SET	(1<<1)
 +#define CTIME_IS_SET	(1<<2)
 +#define CRC32_IS_SET	(1<<3)
 +#define HAS_STREAM	(1<<4)
 +
 +	struct {
 +		time_t		 time;
 +		long		 time_ns;
 +	}			 times[3];
 +#define MTIME 0
 +#define ATIME 1
 +#define CTIME 2
 +
 +	mode_t			 mode;
 +	uint32_t		 crc32;
 +
 +	int			 dir:1;
 +};
 +
 +struct _7zip {
 +	int			 temp_fd;
 +	uint64_t		 temp_offset;
 +
 +	struct file		*cur_file;
 +	size_t			 total_number_entry;
 +	size_t			 total_number_nonempty_entry;
 +	size_t			 total_number_empty_entry;
 +	size_t			 total_number_dir_entry;
 +	size_t			 total_bytes_entry_name;
 +	size_t			 total_number_time_defined[3];
 +	uint64_t		 total_bytes_compressed;
 +	uint64_t		 total_bytes_uncompressed;
 +	uint64_t		 entry_bytes_remaining;
 +	uint32_t		 entry_crc32;
 +	uint32_t		 precode_crc32;
 +	uint32_t		 encoded_crc32;
 +	int			 crc32flg;
 +#define	PRECODE_CRC32	1
 +#define	ENCODED_CRC32	2
 +
 +	unsigned		 opt_compression;
 +	int			 opt_compression_level;
 +
 +	struct la_zstream	 stream;
 +	struct coder		 coder;
 +
 +	struct archive_string_conv *sconv;
 +
 +	/*
 +	 * Compressed data buffer.
 +	 */
 +	unsigned char		 wbuff[512 * 20 * 6];
 +	size_t			 wbuff_remaining;
 +
 +	/*
 +	 * The list of the file entries which has its contents is used to
 +	 * manage struct file objects.
- 	 * We use 'next' a menber of struct file to chain.
++	 * We use 'next' (a member of struct file) to chain.
 +	 */
 +	struct {
 +		struct file	*first;
 +		struct file	**last;
 +	}			 file_list, empty_list;
 +	struct archive_rb_tree	 rbtree;/* for empty files */
 +};
 +
 +static int	_7z_options(struct archive_write *,
 +		    const char *, const char *);
 +static int	_7z_write_header(struct archive_write *,
 +		    struct archive_entry *);
 +static ssize_t	_7z_write_data(struct archive_write *,
 +		    const void *, size_t);
 +static int	_7z_finish_entry(struct archive_write *);
 +static int	_7z_close(struct archive_write *);
 +static int	_7z_free(struct archive_write *);
 +static int	file_cmp_node(const struct archive_rb_node *,
 +		    const struct archive_rb_node *);
 +static int	file_cmp_key(const struct archive_rb_node *, const void *);
 +static int	file_new(struct archive_write *a, struct archive_entry *,
 +		    struct file **);
 +static void	file_free(struct file *);
 +static void	file_register(struct _7zip *, struct file *);
 +static void	file_register_empty(struct _7zip *, struct file *);
 +static void	file_init_register(struct _7zip *);
 +static void	file_init_register_empty(struct _7zip *);
 +static void	file_free_register(struct _7zip *);
 +static ssize_t	compress_out(struct archive_write *, const void *, size_t ,
 +		    enum la_zaction);
 +static int	compression_init_encoder_copy(struct archive *,
 +		    struct la_zstream *);
 +static int	compression_code_copy(struct archive *,
 +		    struct la_zstream *, enum la_zaction);
 +static int	compression_end_copy(struct archive *, struct la_zstream *);
 +static int	compression_init_encoder_deflate(struct archive *,
 +		    struct la_zstream *, int, int);
 +#ifdef HAVE_ZLIB_H
 +static int	compression_code_deflate(struct archive *,
 +		    struct la_zstream *, enum la_zaction);
 +static int	compression_end_deflate(struct archive *, struct la_zstream *);
 +#endif
 +static int	compression_init_encoder_bzip2(struct archive *,
 +		    struct la_zstream *, int);
 +#if defined(HAVE_BZLIB_H) && defined(BZ_CONFIG_ERROR)
 +static int	compression_code_bzip2(struct archive *,
 +		    struct la_zstream *, enum la_zaction);
 +static int	compression_end_bzip2(struct archive *, struct la_zstream *);
 +#endif
 +static int	compression_init_encoder_lzma1(struct archive *,
 +		    struct la_zstream *, int);
 +static int	compression_init_encoder_lzma2(struct archive *,
 +		    struct la_zstream *, int);
 +#if defined(HAVE_LZMA_H)
 +static int	compression_code_lzma(struct archive *,
 +		    struct la_zstream *, enum la_zaction);
 +static int	compression_end_lzma(struct archive *, struct la_zstream *);
 +#endif
 +static int	compression_init_encoder_ppmd(struct archive *,
 +		    struct la_zstream *, unsigned, uint32_t);
 +static int	compression_code_ppmd(struct archive *,
 +		    struct la_zstream *, enum la_zaction);
 +static int	compression_end_ppmd(struct archive *, struct la_zstream *);
 +static int	_7z_compression_init_encoder(struct archive_write *, unsigned,
 +		    int);
 +static int	compression_code(struct archive *,
 +		    struct la_zstream *, enum la_zaction);
 +static int	compression_end(struct archive *,
 +		    struct la_zstream *);
 +static int	enc_uint64(struct archive_write *, uint64_t);
 +static int	make_header(struct archive_write *, uint64_t, uint64_t,
 +		    uint64_t, int, struct coder *);
 +static int	make_streamsInfo(struct archive_write *, uint64_t, uint64_t,
 +		    	uint64_t, int, struct coder *, int, uint32_t);
 +
 +int
 +archive_write_set_format_7zip(struct archive *_a)
 +{
 +	static const struct archive_rb_tree_ops rb_ops = {
 +		file_cmp_node, file_cmp_key
 +	};
 +	struct archive_write *a = (struct archive_write *)_a;
 +	struct _7zip *zip;
 +
 +	archive_check_magic(_a, ARCHIVE_WRITE_MAGIC,
 +	    ARCHIVE_STATE_NEW, "archive_write_set_format_7zip");
 +
 +	/* If another format was already registered, unregister it. */
 +	if (a->format_free != NULL)
 +		(a->format_free)(a);
 +
 +	zip = calloc(1, sizeof(*zip));
 +	if (zip == NULL) {
 +		archive_set_error(&a->archive, ENOMEM,
 +		    "Can't allocate 7-Zip data");
 +		return (ARCHIVE_FATAL);
 +	}
 +	zip->temp_fd = -1;
 +	__archive_rb_tree_init(&(zip->rbtree), &rb_ops);
 +	file_init_register(zip);
 +	file_init_register_empty(zip);
 +
 +	/* Set default compression type and its level. */
 +#if HAVE_LZMA_H
 +	zip->opt_compression = _7Z_LZMA1;
 +#elif defined(HAVE_BZLIB_H) && defined(BZ_CONFIG_ERROR)
 +	zip->opt_compression = _7Z_BZIP2;
 +#elif defined(HAVE_ZLIB_H)
 +	zip->opt_compression = _7Z_DEFLATE;
 +#else
 +	zip->opt_compression = _7Z_COPY;
 +#endif
 +	zip->opt_compression_level = 6;
 +
 +	a->format_data = zip;
 +
 +	a->format_name = "7zip";
 +	a->format_options = _7z_options;
 +	a->format_write_header = _7z_write_header;
 +	a->format_write_data = _7z_write_data;
 +	a->format_finish_entry = _7z_finish_entry;
 +	a->format_close = _7z_close;
 +	a->format_free = _7z_free;
 +	a->archive.archive_format = ARCHIVE_FORMAT_7ZIP;
 +	a->archive.archive_format_name = "7zip";
 +
 +	return (ARCHIVE_OK);
 +}
 +
 +static int
 +_7z_options(struct archive_write *a, const char *key, const char *value)
 +{
 +	struct _7zip *zip;
 +
 +	zip = (struct _7zip *)a->format_data;
 +
 +	if (strcmp(key, "compression") == 0) {
 +		const char *name = NULL;
 +
 +		if (value == NULL || strcmp(value, "copy") == 0 ||
 +		    strcmp(value, "COPY") == 0 ||
 +		    strcmp(value, "store") == 0 ||
 +		    strcmp(value, "STORE") == 0)
 +			zip->opt_compression = _7Z_COPY;
 +		else if (strcmp(value, "deflate") == 0 ||
 +		    strcmp(value, "DEFLATE") == 0)
 +#if HAVE_ZLIB_H
 +			zip->opt_compression = _7Z_DEFLATE;
 +#else
 +			name = "deflate";
 +#endif
 +		else if (strcmp(value, "bzip2") == 0 ||
 +		    strcmp(value, "BZIP2") == 0)
 +#if defined(HAVE_BZLIB_H) && defined(BZ_CONFIG_ERROR)
 +			zip->opt_compression = _7Z_BZIP2;
 +#else
 +			name = "bzip2";
 +#endif
 +		else if (strcmp(value, "lzma1") == 0 ||
 +		    strcmp(value, "LZMA1") == 0)
 +#if HAVE_LZMA_H
 +			zip->opt_compression = _7Z_LZMA1;
 +#else
 +			name = "lzma1";
 +#endif
 +		else if (strcmp(value, "lzma2") == 0 ||
 +		    strcmp(value, "LZMA2") == 0)
 +#if HAVE_LZMA_H
 +			zip->opt_compression = _7Z_LZMA2;
 +#else
 +			name = "lzma2";
 +#endif
 +		else if (strcmp(value, "ppmd") == 0 ||
 +		    strcmp(value, "PPMD") == 0 ||
 +		    strcmp(value, "PPMd") == 0)
 +			zip->opt_compression = _7Z_PPMD;
 +		else {
 +			archive_set_error(&(a->archive),
 +			    ARCHIVE_ERRNO_MISC,
 +			    "Unknown compression name: `%s'",
 +			    value);
 +			return (ARCHIVE_FAILED);
 +		}
 +		if (name != NULL) {
 +			archive_set_error(&(a->archive),
 +			    ARCHIVE_ERRNO_MISC,
 +			    "`%s' compression not supported "
 +			    "on this platform",
 +			    name);
 +			return (ARCHIVE_FAILED);
 +		}
 +		return (ARCHIVE_OK);
 +	}
 +	if (strcmp(key, "compression-level") == 0) {
 +		if (value == NULL ||
 +		    !(value[0] >= '0' && value[0] <= '9') ||
 +		    value[1] != '\0') {
 +			archive_set_error(&(a->archive),
 +			    ARCHIVE_ERRNO_MISC,
 +			    "Illegal value `%s'",
 +			    value);
 +			return (ARCHIVE_FAILED);
 +		}
 +		zip->opt_compression_level = value[0] - '0';
 +		return (ARCHIVE_OK);
 +	}
 +
 +	/* Note: The "warn" return is just to inform the options
 +	 * supervisor that we didn't handle it.  It will generate
 +	 * a suitable error if no one used this option. */
 +	return (ARCHIVE_WARN);
 +}
 +
 +static int
 +_7z_write_header(struct archive_write *a, struct archive_entry *entry)
 +{
 +	struct _7zip *zip;
 +	struct file *file;
 +	int r;
 +
 +	zip = (struct _7zip *)a->format_data;
 +	zip->cur_file = NULL;
 +	zip->entry_bytes_remaining = 0;
 +
 +	if (zip->sconv == NULL) {
 +		zip->sconv = archive_string_conversion_to_charset(
 +		    &a->archive, "UTF-16LE", 1);
 +		if (zip->sconv == NULL)
 +			return (ARCHIVE_FATAL);
 +	}
 +
 +	r = file_new(a, entry, &file);
 +	if (r < ARCHIVE_WARN) {
 +		file_free(file);
 +		return (r);
 +	}
 +	if (file->size == 0 && file->dir) {
 +		if (!__archive_rb_tree_insert_node(&(zip->rbtree),
 +		    (struct archive_rb_node *)file)) {
 +			/* We have already had the same file. */
 +			file_free(file);
 +			return (ARCHIVE_OK);
 +		}
 +	}
 +
 +	if (file->flg & MTIME_IS_SET)
 +		zip->total_number_time_defined[MTIME]++;
 +	if (file->flg & CTIME_IS_SET)
 +		zip->total_number_time_defined[CTIME]++;
 +	if (file->flg & ATIME_IS_SET)
 +		zip->total_number_time_defined[ATIME]++;
 +
 +	zip->total_number_entry++;
 +	zip->total_bytes_entry_name += file->name_len + 2;
 +	if (file->size == 0) {
 +		/* Count up the number of empty files. */
 +		zip->total_number_empty_entry++;
 +		if (file->dir)
 +			zip->total_number_dir_entry++;
 +		else
 +			file_register_empty(zip, file);
 +		return (r);
 +	}
 +
 +	/*
 +	 * Init compression.
 +	 */
 +	if ((zip->total_number_entry - zip->total_number_empty_entry) == 1) {
 +		r = _7z_compression_init_encoder(a, zip->opt_compression,
 +			zip->opt_compression_level);
 +		if (r < 0) {
 +			file_free(file);
 +			return (ARCHIVE_FATAL);
 +		}
 +	}
 +
 +	/* Register a non-empty file. */
 +	file_register(zip, file);
 +
 +	/*
 +	 * Set the current file to cur_file to read its contents.
 +	 */
 +	zip->cur_file = file;
 +
 +
 +	/* Save a offset of current file in temporary file. */
 +	zip->entry_bytes_remaining = file->size;
 +	zip->entry_crc32 = 0;
 +
 +	/*
 +	 * Store a symbolic link name as file contents.
 +	 */
 +	if (archive_entry_filetype(entry) == AE_IFLNK) {
 +		ssize_t bytes;
 +		const void *p = (const void *)archive_entry_symlink(entry);
 +		bytes = compress_out(a, p, (size_t)file->size, ARCHIVE_Z_RUN);
 +		if (bytes < 0)
 +			return ((int)bytes);
 +		zip->entry_crc32 = crc32(zip->entry_crc32, p, (unsigned)bytes);
 +		zip->entry_bytes_remaining -= bytes;
 +	}
 +
 +	return (r);
 +}
 +
 +/*
 + * Write data to a temporary file.
 + */
 +static int
 +write_to_temp(struct archive_write *a, const void *buff, size_t s)
 +{
 +	struct _7zip *zip;
 +	const unsigned char *p;
 +	ssize_t ws;
 +
 +	zip = (struct _7zip *)a->format_data;
 +
 +	/*
 +	 * Open a temporary file.
 +	 */
 +	if (zip->temp_fd == -1) {
 +		zip->temp_offset = 0;
 +		zip->temp_fd = __archive_mktemp(NULL);
 +		if (zip->temp_fd < 0) {
 +			archive_set_error(&a->archive, errno,
 +			    "Couldn't create temporary file");
 +			return (ARCHIVE_FATAL);
 +		}
 +	}
 +
 +	p = (const unsigned char *)buff;
 +	while (s) {
 +		ws = write(zip->temp_fd, p, s);
 +		if (ws < 0) {
 +			archive_set_error(&(a->archive), errno,
 +			    "fwrite function failed");
 +			return (ARCHIVE_FATAL);
 +		}
 +		s -= ws;
 +		p += ws;
 +		zip->temp_offset += ws;
 +	}
 +	return (ARCHIVE_OK);
 +}
 +
 +static ssize_t
 +compress_out(struct archive_write *a, const void *buff, size_t s,
 +    enum la_zaction run)
 +{
 +	struct _7zip *zip = (struct _7zip *)a->format_data;
 +	int r;
 +
 +	if (run == ARCHIVE_Z_FINISH && zip->stream.total_in == 0 && s == 0)
 +		return (0);
 +
 +	if ((zip->crc32flg & PRECODE_CRC32) && s)
 +		zip->precode_crc32 = crc32(zip->precode_crc32, buff,
 +		    (unsigned)s);
 +	zip->stream.next_in = (const unsigned char *)buff;
 +	zip->stream.avail_in = s;
 +	for (;;) {
 +		/* Compress file data. */
 +		r = compression_code(&(a->archive), &(zip->stream), run);
 +		if (r != ARCHIVE_OK && r != ARCHIVE_EOF)
 +			return (ARCHIVE_FATAL);
 +		if (zip->stream.avail_out == 0) {
 +			if (write_to_temp(a, zip->wbuff, sizeof(zip->wbuff))
 +			    != ARCHIVE_OK)
 +				return (ARCHIVE_FATAL);
 +			zip->stream.next_out = zip->wbuff;
 +			zip->stream.avail_out = sizeof(zip->wbuff);
 +			if (zip->crc32flg & ENCODED_CRC32)
 +				zip->encoded_crc32 = crc32(zip->encoded_crc32,
 +				    zip->wbuff, sizeof(zip->wbuff));
 +			if (run == ARCHIVE_Z_FINISH && r != ARCHIVE_EOF)
 +				continue;
 +		}
 +		if (zip->stream.avail_in == 0)
 +			break;
 +	}
 +	if (run == ARCHIVE_Z_FINISH) {
 +		uint64_t bytes = sizeof(zip->wbuff) - zip->stream.avail_out;
 +		if (write_to_temp(a, zip->wbuff, (size_t)bytes) != ARCHIVE_OK)
 +			return (ARCHIVE_FATAL);
 +		if ((zip->crc32flg & ENCODED_CRC32) && bytes)
 +			zip->encoded_crc32 = crc32(zip->encoded_crc32,
 +			    zip->wbuff, (unsigned)bytes);
 +	}
 +
 +	return (s);
 +}
 +
 +static ssize_t
 +_7z_write_data(struct archive_write *a, const void *buff, size_t s)
 +{
 +	struct _7zip *zip;
 +	ssize_t bytes;
 +
 +	zip = (struct _7zip *)a->format_data;
 +
 +	if (s > zip->entry_bytes_remaining)
 +		s = (size_t)zip->entry_bytes_remaining;
 +	if (s == 0 || zip->cur_file == NULL)
 +		return (0);
 +	bytes = compress_out(a, buff, s, ARCHIVE_Z_RUN);
 +	if (bytes < 0)
 +		return (bytes);
 +	zip->entry_crc32 = crc32(zip->entry_crc32, buff, (unsigned)bytes);
 +	zip->entry_bytes_remaining -= bytes;
 +	return (bytes);
 +}
 +
 +static int
 +_7z_finish_entry(struct archive_write *a)
 +{
 +	struct _7zip *zip;
 +	size_t s;
 +	ssize_t r;
 +
 +	zip = (struct _7zip *)a->format_data;
 +	if (zip->cur_file == NULL)
 +		return (ARCHIVE_OK);
 +
 +	while (zip->entry_bytes_remaining > 0) {
 +		s = (size_t)zip->entry_bytes_remaining;
 +		if (s > a->null_length)
 +			s = a->null_length;
 +		r = _7z_write_data(a, a->nulls, s);
 +		if (r < 0)
 +			return ((int)r);
 +	}
 +	zip->total_bytes_compressed += zip->stream.total_in;
 +	zip->total_bytes_uncompressed += zip->stream.total_out;
 +	zip->cur_file->crc32 = zip->entry_crc32;
 +	zip->cur_file = NULL;
 +
 +	return (ARCHIVE_OK);
 +}
 +
 +static int
 +flush_wbuff(struct archive_write *a)
 +{
 +	struct _7zip *zip;
 +	int r;
 +	size_t s;
 +
 +	zip = (struct _7zip *)a->format_data;
 +	s = sizeof(zip->wbuff) - zip->wbuff_remaining;
 +	r = __archive_write_output(a, zip->wbuff, s);
 +	if (r != ARCHIVE_OK)
 +		return (r);
 +	zip->wbuff_remaining = sizeof(zip->wbuff);
 +	return (r);
 +}
 +
 +static int
 +copy_out(struct archive_write *a, uint64_t offset, uint64_t length)
 +{
 +	struct _7zip *zip;
 +	int r;
 +
 +	zip = (struct _7zip *)a->format_data;
 +	if (zip->temp_offset > 0 &&
 +	    lseek(zip->temp_fd, offset, SEEK_SET) < 0) {
 +		archive_set_error(&(a->archive), errno, "lseek failed");
 +		return (ARCHIVE_FATAL);
 +	}
 +	while (length) {
 +		size_t rsize;
 +		ssize_t rs;
 +		unsigned char *wb;
 +
 +		if (length > zip->wbuff_remaining)
 +			rsize = zip->wbuff_remaining;
 +		else
 +			rsize = (size_t)length;
 +		wb = zip->wbuff + (sizeof(zip->wbuff) - zip->wbuff_remaining);
 +		rs = read(zip->temp_fd, wb, rsize);
 +		if (rs < 0) {
 +			archive_set_error(&(a->archive), errno,
 +			    "Can't read temporary file(%jd)",
 +			    (intmax_t)rs);
 +			return (ARCHIVE_FATAL);
 +		}
 +		if (rs == 0) {
 +			archive_set_error(&(a->archive), 0,
 +			    "Truncated 7-Zip archive");
 +			return (ARCHIVE_FATAL);
 +		}
 +		zip->wbuff_remaining -= rs;
 +		length -= rs;
 +		if (zip->wbuff_remaining == 0) {
 +			r = flush_wbuff(a);
 +			if (r != ARCHIVE_OK)
 +				return (r);
 +		}
 +	}
 +	return (ARCHIVE_OK);
 +}
 +
 +static int
 +_7z_close(struct archive_write *a)
 +{
 +	struct _7zip *zip;
 +	unsigned char *wb;
 +	uint64_t header_offset, header_size, header_unpacksize;
 +	uint64_t length;
 +	uint32_t header_crc32;
 +	int r;
 +
 +	zip = (struct _7zip *)a->format_data;
 +
 +	if (zip->total_number_entry > 0) {
 +		struct archive_rb_node *n;
 +		uint64_t data_offset, data_size, data_unpacksize;
 +		unsigned header_compression;
 +
 +		r = (int)compress_out(a, NULL, 0, ARCHIVE_Z_FINISH);
 +		if (r < 0)
 +			return (r);
 +		data_offset = 0;
 +		data_size = zip->stream.total_out;
 +		data_unpacksize = zip->stream.total_in;
 +		zip->coder.codec = zip->opt_compression;
 +		zip->coder.prop_size = zip->stream.prop_size;
 +		zip->coder.props = zip->stream.props;
 +		zip->stream.prop_size = 0;
 +		zip->stream.props = NULL;
 +		zip->total_number_nonempty_entry =
 +		    zip->total_number_entry - zip->total_number_empty_entry;
 +
 +		/* Connect an empty file list. */
 +		if (zip->empty_list.first != NULL) {
 +			*zip->file_list.last = zip->empty_list.first;
 +			zip->file_list.last = zip->empty_list.last;
 +		}
 +		/* Connect a directory file list. */
 +		ARCHIVE_RB_TREE_FOREACH(n, &(zip->rbtree)) {
 +			file_register(zip, (struct file *)n);
 +		}
 +
 +		/*
 +		 * NOTE: 7z command supports just LZMA1, LZMA2 and COPY for
 +		 * the compression type for encoding the header.
 +		 */
 +#if HAVE_LZMA_H
 +		header_compression = _7Z_LZMA1;
 +		/* If the stored file is only one, do not encode the header.
 +		 * This is the same way 7z command does. */
 +		if (zip->total_number_entry == 1)
 +			header_compression = _7Z_COPY;
 +#else
 +		header_compression = _7Z_COPY;
 +#endif
 +		r = _7z_compression_init_encoder(a, header_compression, 6);
 +		if (r < 0)
 +			return (r);
 +		zip->crc32flg = PRECODE_CRC32;
 +		zip->precode_crc32 = 0;
 +		r = make_header(a, data_offset, data_size, data_unpacksize,
 +			1, &(zip->coder));
 +		if (r < 0)
 +			return (r);
 +		r = (int)compress_out(a, NULL, 0, ARCHIVE_Z_FINISH);
 +		if (r < 0)
 +			return (r);
 +		header_offset = data_offset + data_size;
 +		header_size = zip->stream.total_out;
 +		header_crc32 = zip->precode_crc32;
 +		header_unpacksize = zip->stream.total_in;
 +
 +		if (header_compression != _7Z_COPY) {
 +			/*
 +			 * Encode the header in order to reduce the size
 +			 * of the archive.
 +			 */
 +			free(zip->coder.props);
 +			zip->coder.codec = header_compression;
 +			zip->coder.prop_size = zip->stream.prop_size;
 +			zip->coder.props = zip->stream.props;
 +			zip->stream.prop_size = 0;
 +			zip->stream.props = NULL;
 +
 +			r = _7z_compression_init_encoder(a, _7Z_COPY, 0);
 +			if (r < 0)
 +				return (r);
 +			zip->crc32flg = ENCODED_CRC32;
 +			zip->encoded_crc32 = 0;
 +
 +			/*
 +			 * Make EncodedHeader.
 +			 */
 +			r = enc_uint64(a, kEncodedHeader);
 +			if (r < 0)
 +				return (r);
 +			r = make_streamsInfo(a, header_offset, header_size,
 +			      header_unpacksize, 1, &(zip->coder), 0,
 +			      header_crc32);
 +			if (r < 0)
 +				return (r);
 +			r = (int)compress_out(a, NULL, 0, ARCHIVE_Z_FINISH);
 +			if (r < 0)
 +				return (r);
 +			header_offset = header_offset + header_size;
 +			header_size = zip->stream.total_out;
 +			header_crc32 = zip->encoded_crc32;
 +		}
 +		zip->crc32flg = 0;
 +	} else {
 +		header_offset = header_size = 0;
 +		header_crc32 = 0;
 +	}
 +	
 +	length = zip->temp_offset;
 +
 +	/*
 +	 * Make the zip header on wbuff(write buffer).
 +	 */
 +	wb = zip->wbuff;
 +	zip->wbuff_remaining = sizeof(zip->wbuff);
 +	memcpy(&wb[0], "7z\xBC\xAF\x27\x1C", 6);
 +	wb[6] = 0;/* Major version. */
 +	wb[7] = 3;/* Minor version. */
 +	archive_le64enc(&wb[12], header_offset);/* Next Header Offset */
 +	archive_le64enc(&wb[20], header_size);/* Next Header Size */
 +	archive_le32enc(&wb[28], header_crc32);/* Next Header CRC */
 +	archive_le32enc(&wb[8], crc32(0, &wb[12], 20));/* Start Header CRC */
 +	zip->wbuff_remaining -= 32;
 +
 +	/*
 +	 * Read all file contents and an encoded header from the temporary
 +	 * file and write out it.
 +	 */
 +	r = copy_out(a, 0, length);
 +	if (r != ARCHIVE_OK)
 +		return (r);
 +	r = flush_wbuff(a);
 +	return (r);
 +}
 +
 +/*
 + * Encode 64 bits value into 7-Zip's encoded UINT64 value.
 + */
 +static int
 +enc_uint64(struct archive_write *a, uint64_t val)
 +{
 +	unsigned mask = 0x80;
 +	uint8_t numdata[9];
 +	int i;
 +
 +	numdata[0] = 0;
 +	for (i = 1; i < (int)sizeof(numdata); i++) {
 +		if (val < mask) {
 +			numdata[0] |= (uint8_t)val;
 +			break;
 +		}
 +		numdata[i] = (uint8_t)val;
 +		val >>= 8;
 +		numdata[0] |= mask;
 +		mask >>= 1;
 +	}
 +	return ((int)compress_out(a, numdata, i, ARCHIVE_Z_RUN));
 +}
 +
 +static int
 +make_substreamsInfo(struct archive_write *a, struct coder *coders)
 +{
 +	struct _7zip *zip = (struct _7zip *)a->format_data;
 +	struct file *file;
 +	int r;
 +
 +	/*
 +	 * Make SubStreamsInfo.
 +	 */
 +	r = enc_uint64(a, kSubStreamsInfo);
 +	if (r < 0)
 +		return (r);
 +
 +	if (zip->total_number_nonempty_entry > 1 && coders->codec != _7Z_COPY) {
 +		/*
 +		 * Make NumUnPackStream.
 +		 */
 +		r = enc_uint64(a, kNumUnPackStream);
 +		if (r < 0)
 +			return (r);
 +
 +		/* Write numUnpackStreams */
 +		r = enc_uint64(a, zip->total_number_nonempty_entry);
 +		if (r < 0)
 +			return (r);
 +
 +		/*
 +		 * Make kSize.
 +		 */
 +		r = enc_uint64(a, kSize);
 +		if (r < 0)
 +			return (r);
 +		file = zip->file_list.first;
 +		for (;file != NULL; file = file->next) {
 +			if (file->next == NULL ||
 +			    file->next->size == 0)
 +				break;
 +			r = enc_uint64(a, file->size);
 +			if (r < 0)
 +				return (r);
 +		}
 +	}
 +
 +	/*
 +	 * Make CRC.
 +	 */
 +	r = enc_uint64(a, kCRC);
 +	if (r < 0)
 +		return (r);
 +
 +
 +	/* All are defined */
 +	r = enc_uint64(a, 1);
 +	if (r < 0)
 +		return (r);
 +	file = zip->file_list.first;
 +	for (;file != NULL; file = file->next) {
 +		uint8_t crc[4];
 +		if (file->size == 0)
 +			break;
 +		archive_le32enc(crc, file->crc32);
 +		r = (int)compress_out(a, crc, 4, ARCHIVE_Z_RUN);
 +		if (r < 0)
 +			return (r);
 +	}
 +
 +	/* Write End. */
 +	r = enc_uint64(a, kEnd);
 +	if (r < 0)
 +		return (r);
 +	return (ARCHIVE_OK);
 +}
 +
 +static int
 +make_streamsInfo(struct archive_write *a, uint64_t offset, uint64_t pack_size,
 +    uint64_t unpack_size, int num_coder, struct coder *coders, int substrm,
 +    uint32_t header_crc)
 +{
 +	struct _7zip *zip = (struct _7zip *)a->format_data;
 +	uint8_t codec_buff[8];
 +	int numFolders, fi;
 +	int codec_size;
 +	int i, r;
 +
 +	if (coders->codec == _7Z_COPY)
 +		numFolders = (int)zip->total_number_nonempty_entry;
 +	else
 +		numFolders = 1;
 +
 +	/*
 +	 * Make PackInfo.
 +	 */
 +	r = enc_uint64(a, kPackInfo);
 +	if (r < 0)
 +		return (r);
 +
 +	/* Write PackPos. */
 +	r = enc_uint64(a, offset);
 +	if (r < 0)
 +		return (r);
 +
 +	/* Write NumPackStreams. */
 +	r = enc_uint64(a, numFolders);
 +	if (r < 0)
 +		return (r);
 +
 +	/* Make Size. */
 +	r = enc_uint64(a, kSize);
 +	if (r < 0)
 +		return (r);
 +
 +	if (numFolders > 1) {
 +		struct file *file = zip->file_list.first;
 +		for (;file != NULL; file = file->next) {
 +			if (file->size == 0)
 +				break;
 +			r = enc_uint64(a, file->size);
 +			if (r < 0)
 +				return (r);
 +		}
 +	} else {
 +		/* Write size. */
 +		r = enc_uint64(a, pack_size);
 +		if (r < 0)
 +			return (r);
 +	}
 +
 +	r = enc_uint64(a, kEnd);
 +	if (r < 0)
 +		return (r);
 +
 +	/*
 +	 * Make UnPackInfo.
 +	 */
 +	r = enc_uint64(a, kUnPackInfo);
 +	if (r < 0)
 +		return (r);
 +
 +	/*
 +	 * Make Folder.
 +	 */
 +	r = enc_uint64(a, kFolder);
 +	if (r < 0)
 +		return (r);
 +
 +	/* Write NumFolders. */
 +	r = enc_uint64(a, numFolders);
 +	if (r < 0)
 +		return (r);
 +
 +	/* Write External. */
 +	r = enc_uint64(a, 0);
 +	if (r < 0)
 +		return (r);
 +
 +	for (fi = 0; fi < numFolders; fi++) {
 +		/* Write NumCoders. */
 +		r = enc_uint64(a, num_coder);
 +		if (r < 0)
 +			return (r);
 +
 +		for (i = 0; i < num_coder; i++) {
 +			unsigned codec_id = coders[i].codec;
 +
 +			/* Write Codec flag. */
 +			archive_be64enc(codec_buff, codec_id);
 +			for (codec_size = 8; codec_size > 0; codec_size--) {
 +				if (codec_buff[8 - codec_size])
 +					break;
 +			}
 +			if (codec_size == 0)
 +				codec_size = 1;
 +			if (coders[i].prop_size)
 +				r = enc_uint64(a, codec_size | 0x20);
 +			else
 +				r = enc_uint64(a, codec_size);
 +			if (r < 0)
 +				return (r);
 +
 +			/* Write Codec ID. */
 +			codec_size &= 0x0f;
 +			r = (int)compress_out(a, &codec_buff[8-codec_size],
 +				codec_size, ARCHIVE_Z_RUN);
 +			if (r < 0)
 +				return (r);
 +
 +			if (coders[i].prop_size) {
 +				/* Write Codec property size. */
 +				r = enc_uint64(a, coders[i].prop_size);
 +				if (r < 0)
 +					return (r);
 +
 +				/* Write Codec properties. */
 +				r = (int)compress_out(a, coders[i].props,
 +					coders[i].prop_size, ARCHIVE_Z_RUN);
 +				if (r < 0)
 +					return (r);
 +			}
 +		}
 +	}
 +
 +	/*
 +	 * Make CodersUnPackSize.
 +	 */
 +	r = enc_uint64(a, kCodersUnPackSize);
 +	if (r < 0)
 +		return (r);
 +
 +	if (numFolders > 1) {
 +		struct file *file = zip->file_list.first;
 +		for (;file != NULL; file = file->next) {
 +			if (file->size == 0)
 +				break;
 +			r = enc_uint64(a, file->size);
 +			if (r < 0)
 +				return (r);
 +		}
 +
 +	} else {
 +		/* Write UnPackSize. */
 +		r = enc_uint64(a, unpack_size);
 +		if (r < 0)
 +			return (r);
 +	}
 +
 +	if (!substrm) {
 +		uint8_t crc[4];
 +		/*
 +		 * Make CRC.
 +		 */
 +		r = enc_uint64(a, kCRC);
 +		if (r < 0)
 +			return (r);
 +
 +		/* All are defined */
 +		r = enc_uint64(a, 1);
 +		if (r < 0)
 +			return (r);
 +		archive_le32enc(crc, header_crc);
 +		r = (int)compress_out(a, crc, 4, ARCHIVE_Z_RUN);
 +		if (r < 0)
 +			return (r);
 +	}
 +
 +	/* Write End. */
 +	r = enc_uint64(a, kEnd);
 +	if (r < 0)
 +		return (r);
 +
 +	if (substrm) {
 +		/*
 +		 * Make SubStreamsInfo.
 +		 */
 +		r = make_substreamsInfo(a, coders);
 +		if (r < 0)
 +			return (r);
 +	}
 +
 +
 +	/* Write End. */
 +	r = enc_uint64(a, kEnd);
 +	if (r < 0)
 +		return (r);
 +
 +	return (ARCHIVE_OK);
 +}
 +
 +
 +#define EPOC_TIME ARCHIVE_LITERAL_ULL(116444736000000000)
 +static uint64_t
 +utcToFiletime(time_t t, long ns)
 +{
 +	uint64_t fileTime;
 +
 +	fileTime = t;
 +	fileTime *= 10000000;
 +	fileTime += ns / 100;
 +	fileTime += EPOC_TIME;
 +	return (fileTime);
 +}
 +
 +static int
 +make_time(struct archive_write *a, uint8_t type, unsigned flg, int ti)
 +{
 +	uint8_t filetime[8];
 +	struct _7zip *zip = (struct _7zip *)a->format_data;
 +	struct file *file;
 +	int r;
 +	uint8_t b, mask;
 +
 +	/*
 +	 * Make Time Bools.
 +	 */
 +	if (zip->total_number_time_defined[ti] == zip->total_number_entry) {
 +		/* Write Time Type. */
 +		r = enc_uint64(a, type);
 +		if (r < 0)
 +			return (r);
 +		/* Write EmptyStream Size. */
 +		r = enc_uint64(a, 2 + zip->total_number_entry * 8);
 +		if (r < 0)
 +			return (r);
 +		/* All are defined. */
 +		r = enc_uint64(a, 1);
 +		if (r < 0)
 +			return (r);
 +	} else {
 +		if (zip->total_number_time_defined[ti] == 0)
 +			return (ARCHIVE_OK);
 +
 +		/* Write Time Type. */
 +		r = enc_uint64(a, type);
 +		if (r < 0)
 +			return (r);
 +		/* Write EmptyStream Size. */
 +		r = enc_uint64(a, 2 + ((zip->total_number_entry + 7) >> 3)
 +			+ zip->total_number_time_defined[ti] * 8);
 +		if (r < 0)
 +			return (r);
 +
 +		/* All are not defined. */
 +		r = enc_uint64(a, 0);
 +		if (r < 0)
 +			return (r);
 +
 +		b = 0;
 +		mask = 0x80;
 +		file = zip->file_list.first;
 +		for (;file != NULL; file = file->next) {
 +			if (file->flg & flg)
 +				b |= mask;
 +			mask >>= 1;
 +			if (mask == 0) {
 +				r = (int)compress_out(a, &b, 1, ARCHIVE_Z_RUN);
 +				if (r < 0)
 +					return (r);
 +				mask = 0x80;
 +				b = 0;
 +			}
 +		}
 +		if (mask != 0x80) {
 +			r = (int)compress_out(a, &b, 1, ARCHIVE_Z_RUN);
 +			if (r < 0)
 +				return (r);
 +		}
 +	}
 +
 +	/* External. */
 +	r = enc_uint64(a, 0);
 +	if (r < 0)
 +		return (r);
 +
 +
 +	/*
 +	 * Make Times.
 +	 */
 +	file = zip->file_list.first;
 +	for (;file != NULL; file = file->next) {
 +		if ((file->flg & flg) == 0)
 +			continue;
 +		archive_le64enc(filetime, utcToFiletime(file->times[ti].time,
 +			file->times[ti].time_ns));
 +		r = (int)compress_out(a, filetime, 8, ARCHIVE_Z_RUN);
 +		if (r < 0)
 +			return (r);
 +	}
 +
 +	return (ARCHIVE_OK);
 +}
 +
 +static int
 +make_header(struct archive_write *a, uint64_t offset, uint64_t pack_size,
 +    uint64_t unpack_size, int codernum, struct coder *coders)
 +{
 +	struct _7zip *zip = (struct _7zip *)a->format_data;
 +	struct file *file;
 +	int r;
 +	uint8_t b, mask;
 +
 +	/*
 +	 * Make FilesInfo.
 +	 */
 +	r = enc_uint64(a, kHeader);
 +	if (r < 0)
 +		return (r);
 +
 +	/*
 +	 * If there are empty files only, do not write MainStreamInfo.
 +	 */
 +	if (zip->total_number_nonempty_entry) {
 +		/*
 +		 * Make MainStreamInfo.
 +		 */
 +		r = enc_uint64(a, kMainStreamsInfo);
 +		if (r < 0)
 +			return (r);
 +		r = make_streamsInfo(a, offset, pack_size, unpack_size,
 +		      codernum, coders, 1, 0);
 +		if (r < 0)
 +			return (r);
 +	}
 +
 +	/*
 +	 * Make FilesInfo.
 +	 */
 +	r = enc_uint64(a, kFilesInfo);
 +	if (r < 0)
 +		return (r);
 +
 +	/* Write numFiles. */
 +	r = enc_uint64(a, zip->total_number_entry);
 +	if (r < 0)
 +		return (r);
 +
 +	if (zip->total_number_empty_entry > 0) {
 +		/* Make EmptyStream. */
 +		r = enc_uint64(a, kEmptyStream);
 +		if (r < 0)
 +			return (r);
 +
 +		/* Write EmptyStream Size. */
 +		r = enc_uint64(a, (zip->total_number_entry+7)>>3);
 +		if (r < 0)
 +			return (r);
 +
 +		b = 0;
 +		mask = 0x80;
 +		file = zip->file_list.first;
 +		for (;file != NULL; file = file->next) {
 +			if (file->size == 0)
 +				b |= mask;
 +			mask >>= 1;
 +			if (mask == 0) {
 +				r = (int)compress_out(a, &b, 1, ARCHIVE_Z_RUN);
 +				if (r < 0)
 +					return (r);
 +				mask = 0x80;
 +				b = 0;
 +			}
 +		}
 +		if (mask != 0x80) {
 +			r = (int)compress_out(a, &b, 1, ARCHIVE_Z_RUN);
 +			if (r < 0)
 +				return (r);
 +		}
 +	}
 +
 +	if (zip->total_number_empty_entry > zip->total_number_dir_entry) {
 +		/* Make EmptyFile. */
 +		r = enc_uint64(a, kEmptyFile);
 +		if (r < 0)
 +			return (r);
 +
 +		/* Write EmptyFile Size. */
 +		r = enc_uint64(a, (zip->total_number_empty_entry + 7) >> 3);
 +		if (r < 0)
 +			return (r);
 +
 +		b = 0;
 +		mask = 0x80;
 +		file = zip->file_list.first;
 +		for (;file != NULL; file = file->next) {
 +			if (file->size)
 +				continue;
 +			if (!file->dir)
 +				b |= mask;
 +			mask >>= 1;
 +			if (mask == 0) {
 +				r = (int)compress_out(a, &b, 1, ARCHIVE_Z_RUN);
 +				if (r < 0)
 +					return (r);
 +				mask = 0x80;
 +				b = 0;
 +			}
 +		}
 +		if (mask != 0x80) {
 +			r = (int)compress_out(a, &b, 1, ARCHIVE_Z_RUN);
 +			if (r < 0)
 +				return (r);
 +		}
 +	}
 +
 +	/* Make Name. */
 +	r = enc_uint64(a, kName);
 +	if (r < 0)
 +		return (r);
 +
- 	/* Write Nume size. */
++	/* Write Name size. */
 +	r = enc_uint64(a, zip->total_bytes_entry_name+1);
 +	if (r < 0)
 +		return (r);
 +
 +	/* Write dmy byte. */
 +	r = enc_uint64(a, 0);
 +	if (r < 0)
 +		return (r);
 +
 +	file = zip->file_list.first;
 +	for (;file != NULL; file = file->next) {
 +		r = (int)compress_out(a, file->utf16name, file->name_len+2,
 +			ARCHIVE_Z_RUN);
 +		if (r < 0)
 +			return (r);
 +	}
 +
 +	/* Make MTime. */
 +	r = make_time(a, kMTime, MTIME_IS_SET, MTIME);
 +	if (r < 0)
 +		return (r);
 +
 +	/* Make CTime. */
 +	r = make_time(a, kCTime, CTIME_IS_SET, CTIME);
 +	if (r < 0)
 +		return (r);
 +
 +	/* Make ATime. */
 +	r = make_time(a, kATime, ATIME_IS_SET, ATIME);
 +	if (r < 0)
 +		return (r);
 +
 +	/* Make Attributes. */
 +	r = enc_uint64(a, kAttributes);
 +	if (r < 0)
 +		return (r);
 +
 +	/* Write Attributes size. */
 +	r = enc_uint64(a, 2 + zip->total_number_entry * 4);
 +	if (r < 0)
 +		return (r);
 +
 +	/* Write "All Are Defined". */
 +	r = enc_uint64(a, 1);
 +	if (r < 0)
 +		return (r);
 +
 +	/* Write dmy byte. */
 +	r = enc_uint64(a, 0);
 +	if (r < 0)
 +		return (r);
 +
 +	file = zip->file_list.first;
 +	for (;file != NULL; file = file->next) {
 +		/*
 +		 * High 16bits is unix mode.
 +		 * Low 16bits is Windows attributes.
 +		 */
 +		uint32_t encattr, attr;
 +		if (file->dir)
 +			attr = 0x8010;
 +		else
 +			attr = 0x8020;
 +		if ((file->mode & 0222) == 0)
 +			attr |= 1;/* Read Only. */
 +		attr |= ((uint32_t)file->mode) << 16;
 +		archive_le32enc(&encattr, attr);
 +		r = (int)compress_out(a, &encattr, 4, ARCHIVE_Z_RUN);
 +		if (r < 0)
 +			return (r);
 +	}
 +
 +	/* Write End. */
 +	r = enc_uint64(a, kEnd);
 +	if (r < 0)
 +		return (r);
 +
 +	/* Write End. */
 +	r = enc_uint64(a, kEnd);
 +	if (r < 0)
 +		return (r);
 +
 +	return (ARCHIVE_OK);
 +}
 +
 +
 +static int
 +_7z_free(struct archive_write *a)
 +{
 +	struct _7zip *zip = (struct _7zip *)a->format_data;
 +
 +	/* Close the temporary file. */
 +	if (zip->temp_fd >= 0)
 +		close(zip->temp_fd);
 +
 +	file_free_register(zip);
 +	compression_end(&(a->archive), &(zip->stream));
 +	free(zip->coder.props);
 +	free(zip);
 +
 +	return (ARCHIVE_OK);
 +}
 +
 +static int
 +file_cmp_node(const struct archive_rb_node *n1,
 +    const struct archive_rb_node *n2)
 +{
 +	const struct file *f1 = (const struct file *)n1;
 +	const struct file *f2 = (const struct file *)n2;
 +
 +	if (f1->name_len == f2->name_len)
 +		return (memcmp(f1->utf16name, f2->utf16name, f1->name_len));
 +	return (f1->name_len > f2->name_len)?1:-1;
 +}
 +        
 +static int
 +file_cmp_key(const struct archive_rb_node *n, const void *key)
 +{
 +	const struct file *f = (const struct file *)n;
 +
 +	return (f->name_len - *(const char *)key);
 +}
 +
 +static int
 +file_new(struct archive_write *a, struct archive_entry *entry,
 +    struct file **newfile)
 +{
 +	struct _7zip *zip;
 +	struct file *file;
 +	const char *u16;
 +	size_t u16len;
 +	int ret = ARCHIVE_OK;
 +
 +	zip = (struct _7zip *)a->format_data;
 +	*newfile = NULL;
 +
 +	file = calloc(1, sizeof(*file));
 +	if (file == NULL) {
 +		archive_set_error(&a->archive, ENOMEM,
 +		    "Can't allocate memory");
 +		return (ARCHIVE_FATAL);
 +	}
 +
 +	if (0 > archive_entry_pathname_l(entry, &u16, &u16len, zip->sconv)) {
 +		if (errno == ENOMEM) {
 +			free(file);
 +			archive_set_error(&a->archive, ENOMEM,
 +			    "Can't allocate memory for UTF-16LE");
 +			return (ARCHIVE_FATAL);
 +		}
 +		archive_set_error(&a->archive, ARCHIVE_ERRNO_MISC,
 +		    "A filename cannot be converted to UTF-16LE;"
 +		    "You should disable making Joliet extension");
 +		ret = ARCHIVE_WARN;
 +	}
 +	file->utf16name = malloc(u16len + 2);
 +	if (file->utf16name == NULL) {
 +		free(file);
 +		archive_set_error(&a->archive, ENOMEM,
 +		    "Can't allocate memory for Name");
 +		return (ARCHIVE_FATAL);
 +	}
 +	memcpy(file->utf16name, u16, u16len);
 +	file->utf16name[u16len+0] = 0;
 +	file->utf16name[u16len+1] = 0;
 +	file->name_len = (unsigned)u16len;
 +	file->mode = archive_entry_mode(entry);
 +	if (archive_entry_filetype(entry) == AE_IFREG)
 +		file->size = archive_entry_size(entry);
 +	else
 +		archive_entry_set_size(entry, 0);
 +	if (archive_entry_filetype(entry) == AE_IFDIR)
 +		file->dir = 1;
 +	else if (archive_entry_filetype(entry) == AE_IFLNK)
 +		file->size = strlen(archive_entry_symlink(entry));
 +	if (archive_entry_mtime_is_set(entry)) {
 +		file->flg |= MTIME_IS_SET;
 +		file->times[MTIME].time = archive_entry_mtime(entry);
 +		file->times[MTIME].time_ns = archive_entry_mtime_nsec(entry);
 +	}
 +	if (archive_entry_atime_is_set(entry)) {
 +		file->flg |= ATIME_IS_SET;
 +		file->times[ATIME].time = archive_entry_atime(entry);
 +		file->times[ATIME].time_ns = archive_entry_atime_nsec(entry);
 +	}
 +	if (archive_entry_ctime_is_set(entry)) {
 +		file->flg |= CTIME_IS_SET;
 +		file->times[CTIME].time = archive_entry_ctime(entry);
 +		file->times[CTIME].time_ns = archive_entry_ctime_nsec(entry);
 +	}
 +
 +	*newfile = file;
 +	return (ret);
 +}
 +
 +static void
 +file_free(struct file *file)
 +{
 +	free(file->utf16name);
 +	free(file);
 +}
 +
 +static void
 +file_register(struct _7zip *zip, struct file *file)
 +{
 +	file->next = NULL;
 +	*zip->file_list.last = file;
 +	zip->file_list.last = &(file->next);
 +}
 +
 +static void
 +file_init_register(struct _7zip *zip)
 +{
 +	zip->file_list.first = NULL;
 +	zip->file_list.last = &(zip->file_list.first);
 +}
 +
 +static void
 +file_free_register(struct _7zip *zip)
 +{
 +	struct file *file, *file_next;
 +
 +	file = zip->file_list.first;
 +	while (file != NULL) {
 +		file_next = file->next;
 +		file_free(file);
 +		file = file_next;
 +	}
 +}
 +
 +static void
 +file_register_empty(struct _7zip *zip, struct file *file)
 +{
 +	file->next = NULL;
 +	*zip->empty_list.last = file;
 +	zip->empty_list.last = &(file->next);
 +}
 +
 +static void
 +file_init_register_empty(struct _7zip *zip)
 +{
 +	zip->empty_list.first = NULL;
 +	zip->empty_list.last = &(zip->empty_list.first);
 +}
 +
 +#if !defined(HAVE_ZLIB_H) || !defined(HAVE_BZLIB_H) ||\
 +	 !defined(BZ_CONFIG_ERROR) || !defined(HAVE_LZMA_H)
 +static int
 +compression_unsupported_encoder(struct archive *a,
 +    struct la_zstream *lastrm, const char *name)
 +{
 +
 +	archive_set_error(a, ARCHIVE_ERRNO_MISC,
 +	    "%s compression not supported on this platform", name);
 +	lastrm->valid = 0;
 +	lastrm->real_stream = NULL;
 +	return (ARCHIVE_FAILED);
 +}
 +#endif
 +
 +/*
 + * _7_COPY compressor.
 + */
 +static int
 +compression_init_encoder_copy(struct archive *a, struct la_zstream *lastrm)
 +{
 +
 +	if (lastrm->valid)
 +		compression_end(a, lastrm);
 +	lastrm->valid = 1;
 +	lastrm->code = compression_code_copy;
 +	lastrm->end = compression_end_copy;
 +	return (ARCHIVE_OK);
 +}
 +
 +static int
 +compression_code_copy(struct archive *a,
 +    struct la_zstream *lastrm, enum la_zaction action)
 +{
 +	size_t bytes;
 +
 +	(void)a; /* UNUSED */
 +	if (lastrm->avail_out > lastrm->avail_in)
 +		bytes = lastrm->avail_in;
 +	else
 +		bytes = lastrm->avail_out;
 +	if (bytes) {
 +		memcpy(lastrm->next_out, lastrm->next_in, bytes);
 +		lastrm->next_in += bytes;
 +		lastrm->avail_in -= bytes;
 +		lastrm->total_in += bytes;
 +		lastrm->next_out += bytes;
 +		lastrm->avail_out -= bytes;
 +		lastrm->total_out += bytes;
 +	}
 +	if (action == ARCHIVE_Z_FINISH && lastrm->avail_in == 0)
 +		return (ARCHIVE_EOF);
 +	return (ARCHIVE_OK);
 +}
 +
 +static int
 +compression_end_copy(struct archive *a, struct la_zstream *lastrm)
 +{
 +	(void)a; /* UNUSED */
 +	lastrm->valid = 0;
 +	return (ARCHIVE_OK);
 +}
 +
 +/*
 + * _7_DEFLATE compressor.
 + */
 +#ifdef HAVE_ZLIB_H
 +static int
 +compression_init_encoder_deflate(struct archive *a,
 +    struct la_zstream *lastrm, int level, int withheader)
 +{
 +	z_stream *strm;
 +
 +	if (lastrm->valid)
 +		compression_end(a, lastrm);
 +	strm = calloc(1, sizeof(*strm));
 +	if (strm == NULL) {
 +		archive_set_error(a, ENOMEM,
 +		    "Can't allocate memory for gzip stream");
 +		return (ARCHIVE_FATAL);
 +	}
 +	/* zlib.h is not const-correct, so we need this one bit
 +	 * of ugly hackery to convert a const * pointer to
 +	 * a non-const pointer. */
 +	strm->next_in = (Bytef *)(uintptr_t)(const void *)lastrm->next_in;
 +	strm->avail_in = (uInt)lastrm->avail_in;
 +	strm->total_in = (uLong)lastrm->total_in;
 +	strm->next_out = lastrm->next_out;
 +	strm->avail_out = (uInt)lastrm->avail_out;
 +	strm->total_out = (uLong)lastrm->total_out;
 +	if (deflateInit2(strm, level, Z_DEFLATED,
 +	    (withheader)?15:-15,
 +	    8, Z_DEFAULT_STRATEGY) != Z_OK) {
 +		free(strm);
 +		lastrm->real_stream = NULL;
 +		archive_set_error(a, ARCHIVE_ERRNO_MISC,
 +		    "Internal error initializing compression library");
 +		return (ARCHIVE_FATAL);
 +	}
 +	lastrm->real_stream = strm;
 +	lastrm->valid = 1;
 +	lastrm->code = compression_code_deflate;
 +	lastrm->end = compression_end_deflate;
 +	return (ARCHIVE_OK);
 +}
 +
 +static int
 +compression_code_deflate(struct archive *a,
 +    struct la_zstream *lastrm, enum la_zaction action)
 +{
 +	z_stream *strm;
 +	int r;
 +
 +	strm = (z_stream *)lastrm->real_stream;
 +	/* zlib.h is not const-correct, so we need this one bit
 +	 * of ugly hackery to convert a const * pointer to
 +	 * a non-const pointer. */
 +	strm->next_in = (Bytef *)(uintptr_t)(const void *)lastrm->next_in;
 +	strm->avail_in = (uInt)lastrm->avail_in;
 +	strm->total_in = (uLong)lastrm->total_in;
 +	strm->next_out = lastrm->next_out;
 +	strm->avail_out = (uInt)lastrm->avail_out;
 +	strm->total_out = (uLong)lastrm->total_out;
 +	r = deflate(strm,
 +	    (action == ARCHIVE_Z_FINISH)? Z_FINISH: Z_NO_FLUSH);
 +	lastrm->next_in = strm->next_in;
 +	lastrm->avail_in = strm->avail_in;
 +	lastrm->total_in = strm->total_in;
 +	lastrm->next_out = strm->next_out;
 +	lastrm->avail_out = strm->avail_out;
 +	lastrm->total_out = strm->total_out;
 +	switch (r) {
 +	case Z_OK:
 +		return (ARCHIVE_OK);
 +	case Z_STREAM_END:
 +		return (ARCHIVE_EOF);
 +	default:
 +		archive_set_error(a, ARCHIVE_ERRNO_MISC,
 +		    "GZip compression failed:"
 +		    " deflate() call returned status %d", r);
 +		return (ARCHIVE_FATAL);
 +	}
 +}
 +
 +static int
 +compression_end_deflate(struct archive *a, struct la_zstream *lastrm)
 +{
 +	z_stream *strm;
 +	int r;
 +
 +	strm = (z_stream *)lastrm->real_stream;
 +	r = deflateEnd(strm);
 +	free(strm);
 +	lastrm->real_stream = NULL;
 +	lastrm->valid = 0;
 +	if (r != Z_OK) {
 +		archive_set_error(a, ARCHIVE_ERRNO_MISC,
 +		    "Failed to clean up compressor");
 +		return (ARCHIVE_FATAL);
 +	}
 +	return (ARCHIVE_OK);
 +}
 +#else
 +static int
 +compression_init_encoder_deflate(struct archive *a,
 +    struct la_zstream *lastrm, int level, int withheader)
 +{
 +
 +	(void) level; /* UNUSED */
 +	(void) withheader; /* UNUSED */
 +	if (lastrm->valid)
 +		compression_end(a, lastrm);
 +	return (compression_unsupported_encoder(a, lastrm, "deflate"));
 +}
 +#endif
 +
 +/*
 + * _7_BZIP2 compressor.
 + */
 +#if defined(HAVE_BZLIB_H) && defined(BZ_CONFIG_ERROR)
 +static int
 +compression_init_encoder_bzip2(struct archive *a,
 +    struct la_zstream *lastrm, int level)
 +{
 +	bz_stream *strm;
 +
 +	if (lastrm->valid)
 +		compression_end(a, lastrm);
 +	strm = calloc(1, sizeof(*strm));
 +	if (strm == NULL) {
 +		archive_set_error(a, ENOMEM,
 +		    "Can't allocate memory for bzip2 stream");
 +		return (ARCHIVE_FATAL);
 +	}
 +	/* bzlib.h is not const-correct, so we need this one bit
 +	 * of ugly hackery to convert a const * pointer to
 +	 * a non-const pointer. */
 +	strm->next_in = (char *)(uintptr_t)(const void *)lastrm->next_in;
 +	strm->avail_in = lastrm->avail_in;
 +	strm->total_in_lo32 = (uint32_t)(lastrm->total_in & 0xffffffff);
 +	strm->total_in_hi32 = (uint32_t)(lastrm->total_in >> 32);
 +	strm->next_out = (char *)lastrm->next_out;
 +	strm->avail_out = lastrm->avail_out;
 +	strm->total_out_lo32 = (uint32_t)(lastrm->total_out & 0xffffffff);
 +	strm->total_out_hi32 = (uint32_t)(lastrm->total_out >> 32);
 +	if (BZ2_bzCompressInit(strm, level, 0, 30) != BZ_OK) {
 +		free(strm);
 +		lastrm->real_stream = NULL;
 +		archive_set_error(a, ARCHIVE_ERRNO_MISC,
 +		    "Internal error initializing compression library");
 +		return (ARCHIVE_FATAL);
 +	}
 +	lastrm->real_stream = strm;
 +	lastrm->valid = 1;
 +	lastrm->code = compression_code_bzip2;
 +	lastrm->end = compression_end_bzip2;
 +	return (ARCHIVE_OK);
 +}
 +
 +static int
 +compression_code_bzip2(struct archive *a,
 +    struct la_zstream *lastrm, enum la_zaction action)
 +{
 +	bz_stream *strm;
 +	int r;
 +
 +	strm = (bz_stream *)lastrm->real_stream;
 +	/* bzlib.h is not const-correct, so we need this one bit
 +	 * of ugly hackery to convert a const * pointer to
 +	 * a non-const pointer. */
 +	strm->next_in = (char *)(uintptr_t)(const void *)lastrm->next_in;
 +	strm->avail_in = lastrm->avail_in;
 +	strm->total_in_lo32 = (uint32_t)(lastrm->total_in & 0xffffffff);
 +	strm->total_in_hi32 = (uint32_t)(lastrm->total_in >> 32);
 +	strm->next_out = (char *)lastrm->next_out;
 +	strm->avail_out = lastrm->avail_out;
 +	strm->total_out_lo32 = (uint32_t)(lastrm->total_out & 0xffffffff);
 +	strm->total_out_hi32 = (uint32_t)(lastrm->total_out >> 32);
 +	r = BZ2_bzCompress(strm,
 +	    (action == ARCHIVE_Z_FINISH)? BZ_FINISH: BZ_RUN);
 +	lastrm->next_in = (const unsigned char *)strm->next_in;
 +	lastrm->avail_in = strm->avail_in;
 +	lastrm->total_in =
 +	    (((uint64_t)(uint32_t)strm->total_in_hi32) << 32)
 +	    + (uint64_t)(uint32_t)strm->total_in_lo32;
 +	lastrm->next_out = (unsigned char *)strm->next_out;
 +	lastrm->avail_out = strm->avail_out;
 +	lastrm->total_out =
 +	    (((uint64_t)(uint32_t)strm->total_out_hi32) << 32)
 +	    + (uint64_t)(uint32_t)strm->total_out_lo32;
 +	switch (r) {
 +	case BZ_RUN_OK:     /* Non-finishing */
 +	case BZ_FINISH_OK:  /* Finishing: There's more work to do */
 +		return (ARCHIVE_OK);
 +	case BZ_STREAM_END: /* Finishing: all done */
 +		/* Only occurs in finishing case */
 +		return (ARCHIVE_EOF);
 +	default:
 +		/* Any other return value indicates an error */
 +		archive_set_error(a, ARCHIVE_ERRNO_MISC,
 +		    "Bzip2 compression failed:"
 +		    " BZ2_bzCompress() call returned status %d", r);
 +		return (ARCHIVE_FATAL);
 +	}
 +}
 +
 +static int
 +compression_end_bzip2(struct archive *a, struct la_zstream *lastrm)
 +{
 +	bz_stream *strm;
 +	int r;
 +
 +	strm = (bz_stream *)lastrm->real_stream;
 +	r = BZ2_bzCompressEnd(strm);
 +	free(strm);
 +	lastrm->real_stream = NULL;
 +	lastrm->valid = 0;
 +	if (r != BZ_OK) {
 +		archive_set_error(a, ARCHIVE_ERRNO_MISC,
 +		    "Failed to clean up compressor");
 +		return (ARCHIVE_FATAL);
 +	}
 +	return (ARCHIVE_OK);
 +}
 +
 +#else
 +static int
 +compression_init_encoder_bzip2(struct archive *a,
 +    struct la_zstream *lastrm, int level)
 +{
 +
 +	(void) level; /* UNUSED */
 +	if (lastrm->valid)
 +		compression_end(a, lastrm);
 +	return (compression_unsupported_encoder(a, lastrm, "bzip2"));
 +}
 +#endif
 +
 +/*
 + * _7_LZMA1, _7_LZMA2 compressor.
 + */
 +#if defined(HAVE_LZMA_H)
 +static int
 +compression_init_encoder_lzma(struct archive *a,
 +    struct la_zstream *lastrm, int level, uint64_t filter_id)
 +{
 +	static const lzma_stream lzma_init_data = LZMA_STREAM_INIT;
 +	lzma_stream *strm;
 +	lzma_filter *lzmafilters;
 +	lzma_options_lzma lzma_opt;
 +	int r;
 +
 +	if (lastrm->valid)
 +		compression_end(a, lastrm);
 +	strm = calloc(1, sizeof(*strm) + sizeof(*lzmafilters) * 2);
 +	if (strm == NULL) {
 +		archive_set_error(a, ENOMEM,
 +		    "Can't allocate memory for lzma stream");
 +		return (ARCHIVE_FATAL);
 +	}
 +	lzmafilters = (lzma_filter *)(strm+1);
 +	if (level > 6)
 +		level = 6;
 +	if (lzma_lzma_preset(&lzma_opt, level)) {
 +		free(strm);
 +		lastrm->real_stream = NULL;
 +		archive_set_error(a, ENOMEM,
 +		    "Internal error initializing compression library");
 +		return (ARCHIVE_FATAL);
 +	}
 +	lzmafilters[0].id = filter_id;
 +	lzmafilters[0].options = &lzma_opt;
 +	lzmafilters[1].id = LZMA_VLI_UNKNOWN;/* Terminate */
 +
 +	r = lzma_properties_size(&(lastrm->prop_size), lzmafilters);
 +	if (r != LZMA_OK) {
 +		free(strm);
 +		lastrm->real_stream = NULL;
 +		archive_set_error(a, ARCHIVE_ERRNO_MISC,
 +		    "lzma_properties_size failed");
 +		return (ARCHIVE_FATAL);
 +	}
 +	if (lastrm->prop_size) {
 +		lastrm->props = malloc(lastrm->prop_size);
 +		if (lastrm->props == NULL) {
 +			free(strm);
 +			lastrm->real_stream = NULL;
 +			archive_set_error(a, ENOMEM,
 +			    "Cannot allocate memory");
 +			return (ARCHIVE_FATAL);
 +		}
 +		r = lzma_properties_encode(lzmafilters,  lastrm->props);
 +		if (r != LZMA_OK) {
 +			free(strm);
 +			lastrm->real_stream = NULL;
 +			archive_set_error(a, ARCHIVE_ERRNO_MISC,
 +			    "lzma_properties_encode failed");
 +			return (ARCHIVE_FATAL);
 +		}
 +	}
 +
 +	*strm = lzma_init_data;
 +	r = lzma_raw_encoder(strm, lzmafilters);
 +	switch (r) {
 +	case LZMA_OK:
 +		lastrm->real_stream = strm;
 +		lastrm->valid = 1;
 +		lastrm->code = compression_code_lzma;
 +		lastrm->end = compression_end_lzma;
 +		r = ARCHIVE_OK;
 +		break;
 +	case LZMA_MEM_ERROR:
 +		free(strm);
 +		lastrm->real_stream = NULL;
 +		archive_set_error(a, ENOMEM,
 +		    "Internal error initializing compression library: "
 +		    "Cannot allocate memory");
 +		r =  ARCHIVE_FATAL;
 +		break;
 +        default:
 +		free(strm);
 +		lastrm->real_stream = NULL;
 +		archive_set_error(a, ARCHIVE_ERRNO_MISC,
 +		    "Internal error initializing compression library: "
 +		    "It's a bug in liblzma");
 +		r =  ARCHIVE_FATAL;
 +		break;
 +	}
 +	return (r);
 +}
 +
 +static int
 +compression_init_encoder_lzma1(struct archive *a,
 +    struct la_zstream *lastrm, int level)
 +{
 +	return compression_init_encoder_lzma(a, lastrm, level,
 +		    LZMA_FILTER_LZMA1);
 +}
 +
 +static int
 +compression_init_encoder_lzma2(struct archive *a,
 +    struct la_zstream *lastrm, int level)
 +{
 +	return compression_init_encoder_lzma(a, lastrm, level,
 +		    LZMA_FILTER_LZMA2);
 +}
 +
 +static int
 +compression_code_lzma(struct archive *a,
 +    struct la_zstream *lastrm, enum la_zaction action)
 +{
 +	lzma_stream *strm;
 +	int r;
 +
 +	strm = (lzma_stream *)lastrm->real_stream;
 +	strm->next_in = lastrm->next_in;
 +	strm->avail_in = lastrm->avail_in;
 +	strm->total_in = lastrm->total_in;
 +	strm->next_out = lastrm->next_out;
 +	strm->avail_out = lastrm->avail_out;
 +	strm->total_out = lastrm->total_out;
 +	r = lzma_code(strm,
 +	    (action == ARCHIVE_Z_FINISH)? LZMA_FINISH: LZMA_RUN);
 +	lastrm->next_in = strm->next_in;
 +	lastrm->avail_in = strm->avail_in;
 +	lastrm->total_in = strm->total_in;
 +	lastrm->next_out = strm->next_out;
 +	lastrm->avail_out = strm->avail_out;
 +	lastrm->total_out = strm->total_out;
 +	switch (r) {
 +	case LZMA_OK:
 +		/* Non-finishing case */
 +		return (ARCHIVE_OK);
 +	case LZMA_STREAM_END:
 +		/* This return can only occur in finishing case. */
 +		return (ARCHIVE_EOF);
 +	case LZMA_MEMLIMIT_ERROR:
 +		archive_set_error(a, ENOMEM,
 +		    "lzma compression error:"
 +		    " %ju MiB would have been needed",
 +		    (uintmax_t)((lzma_memusage(strm) + 1024 * 1024 -1)
 +			/ (1024 * 1024)));
 +		return (ARCHIVE_FATAL);
 +	default:
 +		/* Any other return value indicates an error */
 +		archive_set_error(a, ARCHIVE_ERRNO_MISC,
 +		    "lzma compression failed:"
 +		    " lzma_code() call returned status %d", r);
 +		return (ARCHIVE_FATAL);
 +	}
 +}
 +
 +static int
 +compression_end_lzma(struct archive *a, struct la_zstream *lastrm)
 +{
 +	lzma_stream *strm;
 +
 +	(void)a; /* UNUSED */
 +	strm = (lzma_stream *)lastrm->real_stream;
 +	lzma_end(strm);
 +	free(strm);
 +	lastrm->valid = 0;
 +	lastrm->real_stream = NULL;
 +	return (ARCHIVE_OK);
 +}
 +#else
 +static int
 +compression_init_encoder_lzma1(struct archive *a,
 +    struct la_zstream *lastrm, int level)
 +{
 +
 +	(void) level; /* UNUSED */
 +	if (lastrm->valid)
 +		compression_end(a, lastrm);
 +	return (compression_unsupported_encoder(a, lastrm, "lzma"));
 +}
 +static int
 +compression_init_encoder_lzma2(struct archive *a,
 +    struct la_zstream *lastrm, int level)
 +{
 +
 +	(void) level; /* UNUSED */
 +	if (lastrm->valid)
 +		compression_end(a, lastrm);
 +	return (compression_unsupported_encoder(a, lastrm, "lzma"));
 +}
 +#endif
 +
 +/*
 + * _7_PPMD compressor.
 + */
 +static void *
 +ppmd_alloc(void *p, size_t size)
 +{
 +	(void)p;
 +	return malloc(size);
 +}
 +static void
 +ppmd_free(void *p, void *address)
 +{
 +	(void)p;
 +	free(address);
 +}
 +static ISzAlloc g_szalloc = { ppmd_alloc, ppmd_free };
 +static void
 +ppmd_write(void *p, Byte b)
 +{
 +	struct archive_write *a = ((IByteOut *)p)->a;
 +	struct _7zip *zip = (struct _7zip *)(a->format_data);
 +	struct la_zstream *lastrm = &(zip->stream);
 +	struct ppmd_stream *strm;
 +
 +	if (lastrm->avail_out) {
 +		*lastrm->next_out++ = b;
 +		lastrm->avail_out--;
 +		lastrm->total_out++;
 +		return;
 +	}
 +	strm = (struct ppmd_stream *)lastrm->real_stream;
 +	if (strm->buff_ptr < strm->buff_end) {
 +		*strm->buff_ptr++ = b;
 +		strm->buff_bytes++;
 +	}
 +}
 +
 +static int
 +compression_init_encoder_ppmd(struct archive *a,
 +    struct la_zstream *lastrm, unsigned maxOrder, uint32_t msize)
 +{
 +	struct ppmd_stream *strm;
 +	uint8_t *props;
 +	int r;
 +
 +	if (lastrm->valid)
 +		compression_end(a, lastrm);
 +	strm = calloc(1, sizeof(*strm));
 +	if (strm == NULL) {
 +		archive_set_error(a, ENOMEM,
 +		    "Can't allocate memory for PPMd");
 +		return (ARCHIVE_FATAL);
 +	}
 +	strm->buff = malloc(32);
 +	if (strm->buff == NULL) {
 +		free(strm);
 +		archive_set_error(a, ENOMEM,
 +		    "Can't allocate memory for PPMd");
 +		return (ARCHIVE_FATAL);
 +	}
 +	strm->buff_ptr = strm->buff;
 +	strm->buff_end = strm->buff + 32;
 +
 +	props = malloc(1+4);
 +	if (props == NULL) {
 +		free(strm->buff);
 +		free(strm);
 +		archive_set_error(a, ENOMEM,
 +		    "Coludn't allocate memory for PPMd");
 +		return (ARCHIVE_FATAL);
 +	}
 +	props[0] = maxOrder;
 +	archive_le32enc(props+1, msize);
 +	__archive_ppmd7_functions.Ppmd7_Construct(&strm->ppmd7_context);
 +	r = __archive_ppmd7_functions.Ppmd7_Alloc(
 +		&strm->ppmd7_context, msize, &g_szalloc);
 +	if (r == 0) {
 +		free(strm->buff);
 +		free(strm);
 +		free(props);
 +		archive_set_error(a, ENOMEM,
 +		    "Coludn't allocate memory for PPMd");
 +		return (ARCHIVE_FATAL);
 +	}
 +	__archive_ppmd7_functions.Ppmd7_Init(&(strm->ppmd7_context), maxOrder);
 +	strm->byteout.a = (struct archive_write *)a;
 +	strm->byteout.Write = ppmd_write;
 +	strm->range_enc.Stream = &(strm->byteout);
 +	__archive_ppmd7_functions.Ppmd7z_RangeEnc_Init(&(strm->range_enc));
 +	strm->stat = 0;
 +
 +	lastrm->real_stream = strm;
 +	lastrm->valid = 1;
 +	lastrm->code = compression_code_ppmd;
 +	lastrm->end = compression_end_ppmd;
 +	lastrm->prop_size = 5;
 +	lastrm->props = props;
 +	return (ARCHIVE_OK);
 +}
 +
 +static int
 +compression_code_ppmd(struct archive *a,
 +    struct la_zstream *lastrm, enum la_zaction action)
 +{
 +	struct ppmd_stream *strm;
 +
 +	(void)a; /* UNUSED */
 +
 +	strm = (struct ppmd_stream *)lastrm->real_stream;
 +
 +	/* Copy encoded data if there are remaining bytes from previous call. */
 +	if (strm->buff_bytes) {
 +		uint8_t *p = strm->buff_ptr - strm->buff_bytes;
 +		while (lastrm->avail_out && strm->buff_bytes) {
 +			*lastrm->next_out++ = *p++;
 +			lastrm->avail_out--;
 +			lastrm->total_out++;
 +			strm->buff_bytes--;
 +		}
 +		if (strm->buff_bytes)
 +			return (ARCHIVE_OK);
 +		if (strm->stat == 1)
 +			return (ARCHIVE_EOF);
 +		strm->buff_ptr = strm->buff;
 +	}
 +	while (lastrm->avail_in && lastrm->avail_out) {
 +		__archive_ppmd7_functions.Ppmd7_EncodeSymbol(
 +			&(strm->ppmd7_context), &(strm->range_enc),
 +			*lastrm->next_in++);
 +		lastrm->avail_in--;
 +		lastrm->total_in++;
 +	}
 +	if (lastrm->avail_in == 0 && action == ARCHIVE_Z_FINISH) {
 +		__archive_ppmd7_functions.Ppmd7z_RangeEnc_FlushData(
 +			&(strm->range_enc));
 +		strm->stat = 1;
 +		/* Return EOF if there are no remaining bytes. */
 +		if (strm->buff_bytes == 0)
 +			return (ARCHIVE_EOF);
 +	}
 +	return (ARCHIVE_OK);
 +}
 +
 +static int
 +compression_end_ppmd(struct archive *a, struct la_zstream *lastrm)
 +{
 +	struct ppmd_stream *strm;
 +
 +	(void)a; /* UNUSED */
 +
 +	strm = (struct ppmd_stream *)lastrm->real_stream;
 +	__archive_ppmd7_functions.Ppmd7_Free(&strm->ppmd7_context, &g_szalloc);
 +	free(strm->buff);
 +	free(strm);
 +	lastrm->real_stream = NULL;
 +	lastrm->valid = 0;
 +	return (ARCHIVE_OK);
 +}
 +
 +/*
 + * Universal compressor initializer.
 + */
 +static int
 +_7z_compression_init_encoder(struct archive_write *a, unsigned compression,
 +    int compression_level)
 +{
 +	struct _7zip *zip;
 +	int r;
 +
 +	zip = (struct _7zip *)a->format_data;
 +	switch (compression) {
 +	case _7Z_DEFLATE:
 +		r = compression_init_encoder_deflate(
 +		    &(a->archive), &(zip->stream),
 +		    compression_level, 0);
 +		break;
 +	case _7Z_BZIP2:
 +		r = compression_init_encoder_bzip2(
 +		    &(a->archive), &(zip->stream),
 +		    compression_level);
 +		break;
 +	case _7Z_LZMA1:
 +		r = compression_init_encoder_lzma1(
 +		    &(a->archive), &(zip->stream),
 +		    compression_level);
 +		break;
 +	case _7Z_LZMA2:
 +		r = compression_init_encoder_lzma2(
 +		    &(a->archive), &(zip->stream),
 +		    compression_level);
 +		break;
 +	case _7Z_PPMD:
 +		r = compression_init_encoder_ppmd(
 +		    &(a->archive), &(zip->stream),
 +		    PPMD7_DEFAULT_ORDER, PPMD7_DEFAULT_MEM_SIZE);
 +		break;
 +	case _7Z_COPY:
 +	default:
 +		r = compression_init_encoder_copy(
 +		    &(a->archive), &(zip->stream));
 +		break;
 +	}
 +	if (r == ARCHIVE_OK) {
 +		zip->stream.total_in = 0;
 +		zip->stream.next_out = zip->wbuff;
 +		zip->stream.avail_out = sizeof(zip->wbuff);
 +		zip->stream.total_out = 0;
 +	}
 +
 +	return (r);
 +}
 +
 +static int
 +compression_code(struct archive *a, struct la_zstream *lastrm,
 +    enum la_zaction action)
 +{
 +	if (lastrm->valid)
 +		return (lastrm->code(a, lastrm, action));
 +	return (ARCHIVE_OK);
 +}
 +
 +static int
 +compression_end(struct archive *a, struct la_zstream *lastrm)
 +{
 +	if (lastrm->valid) {
 +		lastrm->prop_size = 0;
 +		free(lastrm->props);
 +		lastrm->props = NULL;
 +		return (lastrm->end(a, lastrm));
 +	}
 +	return (ARCHIVE_OK);
 +}
 +
 +
diff --cc Utilities/cmlibarchive/libarchive/archive_write_set_format_iso9660.c
index 879a776,0000000..eb98491
mode 100644,000000..100644
--- a/Utilities/cmlibarchive/libarchive/archive_write_set_format_iso9660.c
+++ b/Utilities/cmlibarchive/libarchive/archive_write_set_format_iso9660.c
@@@ -1,8160 -1,0 +1,8162 @@@
 +/*-
 + * Copyright (c) 2009-2012 Michihiro NAKAJIMA
 + * All rights reserved.
 + *
 + * Redistribution and use in source and binary forms, with or without
 + * modification, are permitted provided that the following conditions
 + * are met:
 + * 1. Redistributions of source code must retain the above copyright
 + *    notice, this list of conditions and the following disclaimer.
 + * 2. Redistributions in binary form must reproduce the above copyright
 + *    notice, this list of conditions and the following disclaimer in the
 + *    documentation and/or other materials provided with the distribution.
 + *
 + * THIS SOFTWARE IS PROVIDED BY THE AUTHOR(S) ``AS IS'' AND ANY EXPRESS OR
 + * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
 + * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
 + * IN NO EVENT SHALL THE AUTHOR(S) BE LIABLE FOR ANY DIRECT, INDIRECT,
 + * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
 + * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
 + * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
 + * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
 + * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
 + * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
 + */
 +
 +#include "archive_platform.h"
 +
 +#ifdef HAVE_SYS_TYPES_H
 +#include <sys/types.h>
 +#endif
 +#ifdef HAVE_SYS_UTSNAME_H
 +#include <sys/utsname.h>
 +#endif
 +#ifdef HAVE_ERRNO_H
 +#include <errno.h>
 +#endif
 +#ifdef HAVE_LIMITS_H
 +#include <limits.h>
 +#endif
 +#include <stdio.h>
 +#include <stdarg.h>
 +#ifdef HAVE_STDLIB_H
 +#include <stdlib.h>
 +#endif
 +#include <time.h>
 +#ifdef HAVE_UNISTD_H
 +#include <unistd.h>
 +#endif
 +#ifdef HAVE_ZLIB_H
 +#include <cm_zlib.h>
 +#endif
 +
 +#include "archive.h"
 +#include "archive_endian.h"
 +#include "archive_entry.h"
 +#include "archive_entry_locale.h"
 +#include "archive_private.h"
 +#include "archive_rb.h"
 +#include "archive_write_private.h"
 +
 +#if defined(_WIN32) && !defined(__CYGWIN__)
 +#define getuid()			0
 +#define getgid()			0
 +#endif
 +
 +/*#define DEBUG 1*/
 +#ifdef DEBUG
 +/* To compare to the ISO image file made by mkisofs. */
 +#define COMPAT_MKISOFS		1
 +#endif
 +
 +#define LOGICAL_BLOCK_BITS			11
 +#define LOGICAL_BLOCK_SIZE			2048
 +#define PATH_TABLE_BLOCK_SIZE			4096
 +
 +#define SYSTEM_AREA_BLOCK			16
 +#define PRIMARY_VOLUME_DESCRIPTOR_BLOCK 	1
 +#define SUPPLEMENTARY_VOLUME_DESCRIPTOR_BLOCK 	1
 +#define BOOT_RECORD_DESCRIPTOR_BLOCK	 	1
 +#define VOLUME_DESCRIPTOR_SET_TERMINATOR_BLOCK	1
 +#define NON_ISO_FILE_SYSTEM_INFORMATION_BLOCK	1
 +#define RRIP_ER_BLOCK				1
 +#define PADDING_BLOCK				150
 +
 +#define FD_1_2M_SIZE		(1024 * 1200)
 +#define FD_1_44M_SIZE		(1024 * 1440)
 +#define FD_2_88M_SIZE		(1024 * 2880)
 +#define MULTI_EXTENT_SIZE	(ARCHIVE_LITERAL_LL(1) << 32)	/* 4Gi bytes. */
 +#define MAX_DEPTH		8
 +#define RR_CE_SIZE		28		/* SUSP "CE" extension size */
 +
 +#define FILE_FLAG_EXISTENCE	0x01
 +#define FILE_FLAG_DIRECTORY	0x02
 +#define FILE_FLAG_ASSOCIATED	0x04
 +#define FILE_FLAG_RECORD	0x08
 +#define FILE_FLAG_PROTECTION	0x10
 +#define FILE_FLAG_MULTI_EXTENT	0x80
 +
 +static const char rrip_identifier[] =
 +	"RRIP_1991A";
 +static const char rrip_descriptor[] =
 +	"THE ROCK RIDGE INTERCHANGE PROTOCOL PROVIDES SUPPORT FOR "
 +	"POSIX FILE SYSTEM SEMANTICS";
 +static const char rrip_source[] =
 +	"PLEASE CONTACT DISC PUBLISHER FOR SPECIFICATION SOURCE.  "
 +	"SEE PUBLISHER IDENTIFIER IN PRIMARY VOLUME DESCRIPTOR FOR "
 +	"CONTACT INFORMATION.";
 +#define RRIP_ER_ID_SIZE		(sizeof(rrip_identifier)-1)
 +#define RRIP_ER_DSC_SIZE	(sizeof(rrip_descriptor)-1)
 +#define RRIP_ER_SRC_SIZE	(sizeof(rrip_source)-1)
 +#define RRIP_ER_SIZE		(8 + RRIP_ER_ID_SIZE + \
 +				RRIP_ER_DSC_SIZE + RRIP_ER_SRC_SIZE)
 +
 +static const unsigned char zisofs_magic[8] = {
 +	0x37, 0xE4, 0x53, 0x96, 0xC9, 0xDB, 0xD6, 0x07
 +};
 +
 +#define ZF_HEADER_SIZE	16	/* zisofs header size. */
 +#define ZF_LOG2_BS	15	/* log2 block size; 32K bytes. */
 +#define ZF_BLOCK_SIZE	(1UL << ZF_LOG2_BS)
 +
 +/*
 + * Manage extra records.
 + */
 +struct extr_rec {
 +	int		 location;
 +	int		 offset;
 +	unsigned char	 buf[LOGICAL_BLOCK_SIZE];
 +	struct extr_rec	*next;
 +};
 +
 +struct ctl_extr_rec {
 +	int		 use_extr;
 +	unsigned char	*bp;
 +	struct isoent	*isoent;
 +	unsigned char	*ce_ptr;
 +	int		 cur_len;
 +	int		 dr_len;
 +	int		 limit;
 +	int		 extr_off;
 +	int		 extr_loc;
 +};
 +#define DR_SAFETY	RR_CE_SIZE
 +#define DR_LIMIT	(254 - DR_SAFETY)
 +
 +/*
 + * The relation of struct isofile and isoent and archive_entry.
 + *
 + * Primary volume tree  --> struct isoent
 + *                                |
 + *                                v
 + *                          struct isofile --> archive_entry
 + *                                ^
 + *                                |
 + * Joliet volume tree   --> struct isoent
 + *
 + * struct isoent has specific information for volume.
 + */
 +
 +struct isofile {
 +	/* Used for managing struct isofile list. */
 +	struct isofile		*allnext;
 +	struct isofile		*datanext;
- 	/* Used for managing a hardlined struct isofile list. */
++	/* Used for managing a hardlinked struct isofile list. */
 +	struct isofile		*hlnext;
 +	struct isofile		*hardlink_target;
 +
 +	struct archive_entry	*entry;
 +
 +	/*
 +	 * Used for making a directory tree.
 +	 */
 +	struct archive_string	 parentdir;
 +	struct archive_string	 basename;
 +	struct archive_string	 basename_utf16;
 +	struct archive_string	 symlink;
 +	int			 dircnt;	/* The number of elements of
 +						 * its parent directory */
 +
 +	/*
 +	 * Used for a Directory Record.
 +	 */
 +	struct content {
 +		int64_t		 offset_of_temp;
 +		int64_t		 size;
 +		int		 blocks;
 +		uint32_t 	 location;
 +		/*
 +		 * One extent equals one content.
 +		 * If this entry has multi extent, `next' variable points
 +		 * next content data.
 +		 */
 +		struct content	*next;		/* next content	*/
 +	} content, *cur_content;
 +	int			 write_content;
 +
 +	enum {
 +		NO = 0,
 +		BOOT_CATALOG,
 +		BOOT_IMAGE
 +	} boot;
 +
 +	/*
 +	 * Used for a zisofs.
 +	 */
 +	struct {
 +		unsigned char	 header_size;
 +		unsigned char	 log2_bs;
 +		uint32_t	 uncompressed_size;
 +	} zisofs;
 +};
 +
 +struct isoent {
 +	/* Keep `rbnode' at the first member of struct isoent. */
 +	struct archive_rb_node	 rbnode;
 +
 +	struct isofile		*file;
 +
 +	struct isoent		*parent;
 +	/* A list of children.(use chnext) */
 +	struct {
 +		struct isoent	*first;
 +		struct isoent	**last;
 +		int		 cnt;
 +	}			 children;
 +	struct archive_rb_tree	 rbtree;
 +
 +	/* A list of sub directories.(use drnext) */
 +	struct {
 +		struct isoent	*first;
 +		struct isoent	**last;
 +		int		 cnt;
 +	}			 subdirs;
 +	/* A sorted list of sub directories. */
 +	struct isoent		**children_sorted;
 +	/* Used for managing struct isoent list. */
 +	struct isoent		*chnext;
 +	struct isoent		*drnext;
 +	struct isoent		*ptnext;
 +
 +	/*
 +	 * Used for making a Directory Record.
 +	 */
 +	int			 dir_number;
 +	struct {
 +		int		 vd;
 +		int		 self;
 +		int		 parent;
 +		int		 normal;
 +	}			 dr_len;
 +	uint32_t 		 dir_location;
 +	int			 dir_block;
 +
 +	/*
 +	 * Identifier:
 +	 *   on primary, ISO9660 file/directory name.
 +	 *   on joliet, UCS2 file/directory name.
 +	 * ext_off   : offset of identifier extension.
 +	 * ext_len   : length of identifier extension.
 +	 * id_len    : byte size of identifier.
 +	 *   on primary, this is ext_off + ext_len + version length.
 +	 *   on joliet, this is ext_off + ext_len.
 +	 * mb_len    : length of multibyte-character of identifier.
 +	 *   on primary, mb_len and id_len are always the same.
 +	 *   on joliet, mb_len and id_len are different.
 +	 */
 +	char			*identifier;
 +	int			 ext_off;
 +	int			 ext_len;
 +	int			 id_len;
 +	int			 mb_len;
 +
 +	/*
 +	 * Used for making a Rockridge extension.
 +	 * This is a part of Directory Records.
 +	 */
 +	struct isoent		*rr_parent;
 +	struct isoent		*rr_child;
 +
 +	/* Extra Record.(which we call in this source file)
 +	 * A maximum size of the Directory Record is 254.
 +	 * so, if generated RRIP data of a file cannot into a Directory
 +	 * Record because of its size, that surplus data relocate this
 +	 * Extra Record.
 +	 */
 +	struct {
 +		struct extr_rec	*first;
 +		struct extr_rec	**last;
 +		struct extr_rec	*current;
 +	}			 extr_rec_list;
 +
 +	int			 virtual:1;
 +	/* If set to one, this file type is a directory.
 +	 * A convenience flag to be used as
 +	 * "archive_entry_filetype(isoent->file->entry) == AE_IFDIR".
 +	 */
 +	int			 dir:1;
 +};
 +
 +struct hardlink {
 +	struct archive_rb_node	 rbnode;
 +	int			 nlink;
 +	struct {
 +		struct isofile	*first;
 +		struct isofile	**last;
 +	}			 file_list;
 +};
 +
 +/*
 + * ISO writer options
 + */
 +struct iso_option {
 +	/*
 +	 * Usage  : abstract-file=<value>
 +	 * Type   : string, max 37 bytes
 +	 * Default: Not specified
 +	 * COMPAT : mkisofs -abstract <value>
 +	 *
 +	 * Specifies Abstract Filename.
 +	 * This file shall be described in the Root Directory
 +	 * and containing a abstract statement.
 +	 */
 +	unsigned int	 abstract_file:1;
 +#define OPT_ABSTRACT_FILE_DEFAULT	0	/* Not specified */
 +#define ABSTRACT_FILE_SIZE		37
 +
 +	/*
 +	 * Usage  : application-id=<value>
 +	 * Type   : string, max 128 bytes
 +	 * Default: Not specified
 +	 * COMPAT : mkisofs -A/-appid <value>.
 +	 *
 +	 * Specifies Application Identifier.
 +	 * If the first byte is set to '_'(5F), the remaining
 +	 * bytes of this option shall specify an identifier
 +	 * for a file containing the identification of the
 +	 * application.
 +	 * This file shall be described in the Root Directory.
 +	 */
 +	unsigned int	 application_id:1;
 +#define OPT_APPLICATION_ID_DEFAULT	0	/* Use default identifier */
 +#define APPLICATION_IDENTIFIER_SIZE	128
 +
 +	/*
 +	 * Usage : !allow-vernum
 +	 * Type  : boolean
 +	 * Default: Enabled
 +	 *	  : Violates the ISO9660 standard if disable.
 +	 * COMPAT: mkisofs -N
 +	 *
 +	 * Allow filenames to use version numbers.
 +	 */
 +	unsigned int	 allow_vernum:1;
 +#define OPT_ALLOW_VERNUM_DEFAULT	1	/* Enabled */
 +
 +	/*
 +	 * Usage  : biblio-file=<value>
 +	 * Type   : string, max 37 bytes
 +	 * Default: Not specified
 +	 * COMPAT : mkisofs -biblio <value>
 +	 *
 +	 * Specifies Bibliographic Filename.
 +	 * This file shall be described in the Root Directory
 +	 * and containing bibliographic records.
 +	 */
 +	unsigned int	 biblio_file:1;
 +#define OPT_BIBLIO_FILE_DEFAULT		0	/* Not specified */
 +#define BIBLIO_FILE_SIZE		37
 +
 +	/*
 +	 * Usage  : boot=<value>
 +	 * Type   : string
 +	 * Default: Not specified
 +	 * COMPAT : mkisofs -b/-eltorito-boot <value>
 +	 *
 +	 * Specifies "El Torito" boot image file to make
 +	 * a bootable CD.
 +	 */
 +	unsigned int	 boot:1;
 +#define OPT_BOOT_DEFAULT		0	/* Not specified */
 +
 +	/*
 +	 * Usage  : boot-catalog=<value>
 +	 * Type   : string
 +	 * Default: "boot.catalog"
 +	 * COMPAT : mkisofs -c/-eltorito-catalog <value>
 +	 *
 +	 * Specifies a fullpath of El Torito boot catalog.
 +	 */
 +	unsigned int	 boot_catalog:1;
 +#define OPT_BOOT_CATALOG_DEFAULT	0	/* Not specified */
 +
 +	/*
 +	 * Usage  : boot-info-table
 +	 * Type   : boolean
 +	 * Default: Disabled
 +	 * COMPAT : mkisofs -boot-info-table
 +	 *
 +	 * Modify the boot image file specified by `boot'
 +	 * option; ISO writer stores boot file information
 +	 * into the boot file in ISO image at offset 8
 +	 * through offset 64.
 +	 */
 +	unsigned int	 boot_info_table:1;
 +#define OPT_BOOT_INFO_TABLE_DEFAULT	0	/* Disabled */
 +
 +	/*
 +	 * Usage  : boot-load-seg=<value>
 +	 * Type   : hexadecimal
 +	 * Default: Not specified
 +	 * COMPAT : mkisofs -boot-load-seg <value>
 +	 *
 +	 * Specifies a load segment for boot image.
 +	 * This is used with no-emulation mode.
 +	 */
 +	unsigned int	 boot_load_seg:1;
 +#define OPT_BOOT_LOAD_SEG_DEFAULT	0	/* Not specified */
 +
 +	/*
 +	 * Usage  : boot-load-size=<value>
 +	 * Type   : decimal
 +	 * Default: Not specified
 +	 * COMPAT : mkisofs -boot-load-size <value>
 +	 *
 +	 * Specifies a sector count for boot image.
 +	 * This is used with no-emulation mode.
 +	 */
 +	unsigned int	 boot_load_size:1;
 +#define OPT_BOOT_LOAD_SIZE_DEFAULT	0	/* Not specified */
 +
 +	/*
 +	 * Usage  : boot-type=<boot-media-type>
 +	 *        : 'no-emulation' : 'no emulation' image
 +	 *        :           'fd' : floppy disk image
 +	 *        :    'hard-disk' : hard disk image
 +	 * Type   : string
 +	 * Default: Auto detect
 +	 *        : We check a size of boot image;
- 	 *        : If ths size is just 1.22M/1.44M/2.88M,
++	 *        : If the size is just 1.22M/1.44M/2.88M,
 +	 *        : we assume boot_type is 'fd';
 +	 *        : otherwise boot_type is 'no-emulation'.
 +	 * COMPAT :
 +	 *    boot=no-emulation
 +	 *	mkisofs -no-emul-boot
 +	 *    boot=fd
 +	 *	This is a default on the mkisofs.
 +	 *    boot=hard-disk
 +	 *	mkisofs -hard-disk-boot
 +	 *
 +	 * Specifies a type of "El Torito" boot image.
 +	 */
 +	unsigned int	 boot_type:2;
 +#define OPT_BOOT_TYPE_AUTO		0	/* auto detect		  */
 +#define OPT_BOOT_TYPE_NO_EMU		1	/* ``no emulation'' image */
 +#define OPT_BOOT_TYPE_FD		2	/* floppy disk image	  */
 +#define OPT_BOOT_TYPE_HARD_DISK		3	/* hard disk image	  */
 +#define OPT_BOOT_TYPE_DEFAULT		OPT_BOOT_TYPE_AUTO
 +
 +	/*
 +	 * Usage  : compression-level=<value>
 +	 * Type   : decimal
 +	 * Default: Not specified
 +	 * COMPAT : NONE
 +	 *
 +	 * Specifies compression level for option zisofs=direct.
 +	 */
 +	unsigned int	 compression_level:1;
 +#define OPT_COMPRESSION_LEVEL_DEFAULT	0	/* Not specified */
 +
 +	/*
 +	 * Usage  : copyright-file=<value>
 +	 * Type   : string, max 37 bytes
 +	 * Default: Not specified
 +	 * COMPAT : mkisofs -copyright <value>
 +	 *
 +	 * Specifies Copyright Filename.
 +	 * This file shall be described in the Root Directory
 +	 * and containing a copyright statement.
 +	 */
 +	unsigned int	 copyright_file:1;
 +#define OPT_COPYRIGHT_FILE_DEFAULT	0	/* Not specified */
 +#define COPYRIGHT_FILE_SIZE		37
 +
 +	/*
 +	 * Usage  : gid=<value>
 +	 * Type   : decimal
 +	 * Default: Not specified
 +	 * COMPAT : mkisofs -gid <value>
 +	 *
 +	 * Specifies a group id to rewrite the group id of all files.
 +	 */
 +	unsigned int	 gid:1;
 +#define OPT_GID_DEFAULT			0	/* Not specified */
 +
 +	/*
 +	 * Usage  : iso-level=[1234]
 +	 * Type   : decimal
 +	 * Default: 1
 +	 * COMPAT : mkisofs -iso-level <value>
 +	 *
 +	 * Specifies ISO9600 Level.
 +	 * Level 1: [DEFAULT]
 +	 *   - limits each file size less than 4Gi bytes;
 +	 *   - a File Name shall not contain more than eight
 +	 *     d-characters or eight d1-characters;
 +	 *   - a File Name Extension shall not contain more than
 +	 *     three d-characters or three d1-characters;
 +	 *   - a Directory Identifier shall not contain more
 +	 *     than eight d-characters or eight d1-characters.
 +	 * Level 2:
 +	 *   - limits each file size less than 4Giga bytes;
 +	 *   - a File Name shall not contain more than thirty
 +	 *     d-characters or thirty d1-characters;
 +	 *   - a File Name Extension shall not contain more than
 +	 *     thirty d-characters or thirty d1-characters;
 +	 *   - a Directory Identifier shall not contain more
 +	 *     than thirty-one d-characters or thirty-one
 +	 *     d1-characters.
 +	 * Level 3:
 +	 *   - no limit of file size; use multi extent.
 +	 * Level 4:
 +	 *   - this level 4 simulates mkisofs option
 +	 *     '-iso-level 4';
 +	 *   - crate a enhanced volume as mkisofs doing;
 +	 *   - allow a File Name to have leading dot;
 +	 *   - allow a File Name to have all ASCII letters;
 +	 *   - allow a File Name to have multiple dots;
 +	 *   - allow more then 8 depths of directory trees;
 +	 *   - disable a version number to a File Name;
 +	 *   - disable a forced period to the tail of a File Name;
- 	 *   - the maxinum length of files and directories is raised to 193.
++	 *   - the maximum length of files and directories is raised to 193.
 +	 *     if rockridge option is disabled, raised to 207.
 +	 */
 +	unsigned int	 iso_level:3;
 +#define OPT_ISO_LEVEL_DEFAULT		1	/* ISO Level 1 */
 +
 +	/*
 +	 * Usage  : joliet[=long]
 +	 *        : !joliet
 +	 *        :   Do not generate Joliet Volume and Records.
 +	 *        : joliet [DEFAULT]
 +	 *        :   Generates Joliet Volume and Directory Records.
 +	 *        :   [COMPAT: mkisofs -J/-joliet]
 +	 *        : joliet=long
 +	 *        :   The joliet filenames are up to 103 Unicode
 +	 *        :   characters.
 +	 *        :   This option breaks the Joliet specification.
 +	 *        :   [COMPAT: mkisofs -J -joliet-long]
 +	 * Type   : boolean/string
 +	 * Default: Enabled
 +	 * COMPAT : mkisofs -J / -joliet-long
 +	 *
 +	 * Generates Joliet Volume and Directory Records.
 +	 */
 +	unsigned int	 joliet:2;
 +#define OPT_JOLIET_DISABLE		0	/* Not generate Joliet Records. */
 +#define OPT_JOLIET_ENABLE		1	/* Generate Joliet Records.  */
 +#define OPT_JOLIET_LONGNAME		2	/* Use long joliet filenames.*/
 +#define OPT_JOLIET_DEFAULT		OPT_JOLIET_ENABLE
 +
 +	/*
 +	 * Usage  : !limit-depth
 +	 * Type   : boolean
 +	 * Default: Enabled
 +	 *	  : Violates the ISO9660 standard if disable.
 +	 * COMPAT : mkisofs -D/-disable-deep-relocation
 +	 *
 +	 * The number of levels in hierarchy cannot exceed eight.
 +	 */
 +	unsigned int	 limit_depth:1;
 +#define OPT_LIMIT_DEPTH_DEFAULT		1	/* Enabled */
 +
 +	/*
 +	 * Usage  : !limit-dirs
 +	 * Type   : boolean
 +	 * Default: Enabled
 +	 *	  : Violates the ISO9660 standard if disable.
 +	 * COMPAT : mkisofs -no-limit-pathtables
 +	 *
 +	 * Limits the number of directories less than 65536 due
 +	 * to the size of the Parent Directory Number of Path
 +	 * Table.
 +	 */
 +	unsigned int	 limit_dirs:1;
 +#define OPT_LIMIT_DIRS_DEFAULT		1	/* Enabled */
 +
 +	/*
 +	 * Usage  : !pad
 +	 * Type   : boolean
 +	 * Default: Enabled
 +	 * COMPAT : -pad/-no-pad
 +	 *
 +	 * Pads the end of the ISO image by null of 300Ki bytes.
 +	 */
 +	unsigned int	 pad:1;
 +#define OPT_PAD_DEFAULT			1	/* Enabled */
 +
 +	/*
 +	 * Usage  : publisher=<value>
 +	 * Type   : string, max 128 bytes
 +	 * Default: Not specified
 +	 * COMPAT : mkisofs -publisher <value>
 +	 *
 +	 * Specifies Publisher Identifier.
 +	 * If the first byte is set to '_'(5F), the remaining
 +	 * bytes of this option shall specify an identifier
 +	 * for a file containing the identification of the user.
 +	 * This file shall be described in the Root Directory.
 +	 */
 +	unsigned int	 publisher:1;
 +#define OPT_PUBLISHER_DEFAULT		0	/* Not specified */
 +#define PUBLISHER_IDENTIFIER_SIZE	128
 +
 +	/*
 +	 * Usage  : rockridge
 +	 *        : !rockridge
 +	 *        :    disable to generate SUSP and RR records.
 +	 *        : rockridge
 +	 *        :    the same as 'rockridge=useful'.
 +	 *        : rockridge=strict
 +	 *        :    generate SUSP and RR records.
 +	 *        :    [COMPAT: mkisofs -R]
 +	 *        : rockridge=useful [DEFAULT]
 +	 *        :    generate SUSP and RR records.
 +	 *        :    [COMPAT: mkisofs -r]
 +	 *        :    NOTE  Our rockridge=useful option does not set a zero
 +	 *        :          to uid and gid, you should use application
 +	 *        :          option such as --gid,--gname,--uid and --uname
- 	 *        :          badtar options instead.
++	 *        :          bsdtar options instead.
 +	 * Type   : boolean/string
 +	 * Default: Enabled as rockridge=useful
 +	 * COMPAT : mkisofs -r / -R
 +	 *
 +	 * Generates SUSP and RR records.
 +	 */
 +	unsigned int	 rr:2;
 +#define OPT_RR_DISABLED			0
 +#define OPT_RR_STRICT			1
 +#define OPT_RR_USEFUL			2
 +#define OPT_RR_DEFAULT			OPT_RR_USEFUL
 +
 +	/*
 +	 * Usage  : volume-id=<value>
 +	 * Type   : string, max 32 bytes
 +	 * Default: Not specified
 +	 * COMPAT : mkisofs -V <value>
 +	 *
 +	 * Specifies Volume Identifier.
 +	 */
 +	unsigned int	 volume_id:1;
 +#define OPT_VOLUME_ID_DEFAULT		0	/* Use default identifier */
 +#define VOLUME_IDENTIFIER_SIZE		32
 +
 +	/*
 +	 * Usage  : !zisofs [DEFAULT] 
 +	 *        :    Disable to generate RRIP 'ZF' extension.
 +	 *        : zisofs
 +	 *        :    Make files zisofs file and generate RRIP 'ZF'
 + 	 *        :    extension. So you do not need mkzftree utility
 +	 *        :    for making zisofs.
 +	 *        :    When the file size is less than one Logical Block
 +	 *        :    size, that file will not zisofs'ed since it does
- 	 *        :    reduece an ISO-image size.
++	 *        :    reduce an ISO-image size.
 +	 *        :
 +	 *        :    When you specify option 'boot=<boot-image>', that
 +	 *        :    'boot-image' file won't be converted to zisofs file.
 +	 * Type   : boolean
 +	 * Default: Disabled
 +	 *
 +	 * Generates RRIP 'ZF' System Use Entry.
 +	 */
 +	unsigned int	 zisofs:1;
 +#define OPT_ZISOFS_DISABLED		0
 +#define OPT_ZISOFS_DIRECT		1
 +#define OPT_ZISOFS_DEFAULT		OPT_ZISOFS_DISABLED
 +
 +};
 +
 +struct iso9660 {
 +	/* The creation time of ISO image. */
 +	time_t			 birth_time;
 +	/* A file stream of a temporary file, which file contents
- 	 * save to until ISO iamge can be created. */
++	 * save to until ISO image can be created. */
 +	int			 temp_fd;
 +
 +	struct isofile		*cur_file;
 +	struct isoent		*cur_dirent;
 +	struct archive_string	 cur_dirstr;
 +	uint64_t		 bytes_remaining;
 +	int			 need_multi_extent;
 +
 +	/* Temporary string buffer for Joliet extension. */ 
 +	struct archive_string	 utf16be;
 +	struct archive_string	 mbs;
 +
 +	struct archive_string_conv *sconv_to_utf16be;
 +	struct archive_string_conv *sconv_from_utf16be;
 +
 +	/* A list of all of struct isofile entries. */
 +	struct {
 +		struct isofile	*first;
 +		struct isofile	**last;
 +	}			 all_file_list;
 +
 +	/* A list of struct isofile entries which have its
- 	 * contents and are not a directory, a hardlined file
++	 * contents and are not a directory, a hardlinked file
 +	 * and a symlink file. */
 +	struct {
 +		struct isofile	*first;
 +		struct isofile	**last;
 +	}			 data_file_list;
 +
 +	/* Used for managing to find hardlinking files. */
 +	struct archive_rb_tree	 hardlink_rbtree;
 +
 +	/* Used for making the Path Table Record. */
 +	struct vdd {
 +		/* the root of entry tree. */
 +		struct isoent	*rootent;
 +		enum vdd_type {
 +			VDD_PRIMARY,
 +			VDD_JOLIET,
 +			VDD_ENHANCED
 +		} vdd_type;
 +
 +		struct path_table {
 +			struct isoent		*first;
 +			struct isoent		**last;
 +			struct isoent		**sorted;
 +			int			 cnt;
 +		} *pathtbl;
 +		int				 max_depth;
 +
 +		int		 path_table_block;
 +		int		 path_table_size;
 +		int		 location_type_L_path_table;
 +		int		 location_type_M_path_table;
 +		int		 total_dir_block;
 +	} primary, joliet;
 +
 +	/* Used for making a Volume Descriptor. */
 +	int			 volume_space_size;
 +	int			 volume_sequence_number;
 +	int			 total_file_block;
 +	struct archive_string	 volume_identifier;
 +	struct archive_string	 publisher_identifier;
 +	struct archive_string	 data_preparer_identifier;
 +	struct archive_string	 application_identifier;
 +	struct archive_string	 copyright_file_identifier;
 +	struct archive_string	 abstract_file_identifier;
 +	struct archive_string	 bibliographic_file_identifier;
 +
 +	/* Used for making rockridge extensions. */
 +	int			 location_rrip_er;
 +
 +	/* Used for making zisofs. */
 +	struct {
 +		int		 detect_magic:1;
 +		int		 making:1;
 +		int		 allzero:1;
 +		unsigned char	 magic_buffer[64];
 +		int		 magic_cnt;
 +
 +#ifdef HAVE_ZLIB_H
 +		/*
 +		 * Copy a compressed file to iso9660.zisofs.temp_fd
 +		 * and also copy a uncompressed file(original file) to
 +		 * iso9660.temp_fd . If the number of logical block
 +		 * of the compressed file is less than the number of
 +		 * logical block of the uncompressed file, use it and
 +		 * remove the copy of the uncompressed file.
 +		 * but if not, we use uncompressed file and remove
 +		 * the copy of the compressed file.
 +		 */
 +		uint32_t	*block_pointers;
 +		size_t		 block_pointers_allocated;
 +		int		 block_pointers_cnt;
 +		int		 block_pointers_idx;
 +		int64_t		 total_size;
 +		int64_t		 block_offset;
 +
 +		z_stream	 stream;
 +		int		 stream_valid;
 +		int64_t		 remaining;
 +		int		 compression_level;
 +#endif
 +	} zisofs;
 +
 +	struct isoent		*directories_too_deep;
 +	int			 dircnt_max;
 +
 +	/* Write buffer. */
 +#define wb_buffmax()	(LOGICAL_BLOCK_SIZE * 32)
 +#define wb_remaining(a)	(((struct iso9660 *)(a)->format_data)->wbuff_remaining)
 +#define wb_offset(a)	(((struct iso9660 *)(a)->format_data)->wbuff_offset \
 +		+ wb_buffmax() - wb_remaining(a))
 +	unsigned char		 wbuff[LOGICAL_BLOCK_SIZE * 32];
 +	size_t			 wbuff_remaining;
 +	enum {
 +		WB_TO_STREAM,
 +		WB_TO_TEMP
 +	} 			 wbuff_type;
 +	int64_t			 wbuff_offset;
 +	int64_t			 wbuff_written;
 +	int64_t			 wbuff_tail;
 +
 +	/* 'El Torito' boot data. */
 +	struct {
 +		/* boot catalog file */
 +		struct archive_string	 catalog_filename;
 +		struct isoent		*catalog;
 +		/* boot image file */
 +		struct archive_string	 boot_filename;
 +		struct isoent		*boot;
 +
 +		unsigned char		 platform_id;
 +#define BOOT_PLATFORM_X86	0
 +#define BOOT_PLATFORM_PPC	1
 +#define BOOT_PLATFORM_MAC	2
 +		struct archive_string	 id;
 +		unsigned char		 media_type;
 +#define BOOT_MEDIA_NO_EMULATION		0
 +#define BOOT_MEDIA_1_2M_DISKETTE	1
 +#define BOOT_MEDIA_1_44M_DISKETTE	2
 +#define BOOT_MEDIA_2_88M_DISKETTE	3
 +#define BOOT_MEDIA_HARD_DISK		4
 +		unsigned char		 system_type;
 +		uint16_t		 boot_load_seg;
 +		uint16_t		 boot_load_size;
 +#define BOOT_LOAD_SIZE		4
 +	} el_torito;
 +
 +	struct iso_option	 opt;
 +};
 +
 +/*
 + * Types of Volume Descriptor
 + */
 +enum VD_type {
 +	VDT_BOOT_RECORD=0,	/* Boot Record Volume Descriptor 	*/
 +	VDT_PRIMARY=1,		/* Primary Volume Descriptor		*/
 +	VDT_SUPPLEMENTARY=2,	/* Supplementary Volume Descriptor	*/
 +	VDT_TERMINATOR=255	/* Volume Descriptor Set Terminator	*/
 +};
 +
 +/*
 + * Types of Directory Record
 + */
 +enum dir_rec_type {
 +	DIR_REC_VD,		/* Stored in Volume Descriptor.	*/
 +	DIR_REC_SELF,		/* Stored as Current Directory.	*/
 +	DIR_REC_PARENT,		/* Stored as Parent Directory.	*/
 +	DIR_REC_NORMAL 		/* Stored as Child.		*/
 +};
 +
 +/*
 + * Kinds of Volume Descriptor Character
 + */
 +enum vdc {
 +	VDC_STD,
 +	VDC_LOWERCASE,
 +	VDC_UCS2,
 +	VDC_UCS2_DIRECT
 +};
 +
 +/*
 + * IDentifier Resolver.
 + * Used for resolving duplicated filenames.
 + */
 +struct idr {
 +	struct idrent {
 +		struct archive_rb_node	rbnode;
 +		/* Used in wait_list. */
 +		struct idrent		*wnext;
 +		struct idrent		*avail;
 +
 +		struct isoent		*isoent;
 +		int			 weight;
 +		int			 noff;
 +		int			 rename_num;
 +	} *idrent_pool;
 +
 +	struct archive_rb_tree		 rbtree;
 +
 +	struct {
 +		struct idrent		*first;
 +		struct idrent		**last;
 +	} wait_list;
 +
 +	int				 pool_size;
 +	int				 pool_idx;
 +	int				 num_size;
 +	int				 null_size;
 +
 +	char				 char_map[0x80];
 +};
 +
 +enum char_type {
 +	A_CHAR,
 +	D_CHAR
 +};
 +
 +
 +static int	iso9660_options(struct archive_write *,
 +		    const char *, const char *);
 +static int	iso9660_write_header(struct archive_write *,
 +		    struct archive_entry *);
 +static ssize_t	iso9660_write_data(struct archive_write *,
 +		    const void *, size_t);
 +static int	iso9660_finish_entry(struct archive_write *);
 +static int	iso9660_close(struct archive_write *);
 +static int	iso9660_free(struct archive_write *);
 +
 +static void	get_system_identitier(char *, size_t);
 +static void	set_str(unsigned char *, const char *, size_t, char,
 +		    const char *);
 +static inline int joliet_allowed_char(unsigned char, unsigned char);
 +static int	set_str_utf16be(struct archive_write *, unsigned char *,
 +			const char *, size_t, uint16_t, enum vdc);
 +static int	set_str_a_characters_bp(struct archive_write *,
 +			unsigned char *, int, int, const char *, enum vdc);
 +static int	set_str_d_characters_bp(struct archive_write *,
 +			unsigned char *, int, int, const char *, enum  vdc);
 +static void	set_VD_bp(unsigned char *, enum VD_type, unsigned char);
 +static inline void set_unused_field_bp(unsigned char *, int, int);
 +
 +static unsigned char *extra_open_record(unsigned char *, int,
 +		    struct isoent *, struct ctl_extr_rec *);
 +static void	extra_close_record(struct ctl_extr_rec *, int);
 +static unsigned char * extra_next_record(struct ctl_extr_rec *, int);
 +static unsigned char *extra_get_record(struct isoent *, int *, int *, int *);
 +static void	extra_tell_used_size(struct ctl_extr_rec *, int);
 +static int	extra_setup_location(struct isoent *, int);
 +static int	set_directory_record_rr(unsigned char *, int,
 +		    struct isoent *, struct iso9660 *, enum dir_rec_type);
 +static int	set_directory_record(unsigned char *, size_t,
 +		    struct isoent *, struct iso9660 *, enum dir_rec_type,
 +		    enum vdd_type);
 +static inline int get_dir_rec_size(struct iso9660 *, struct isoent *,
 +		    enum dir_rec_type, enum vdd_type);
 +static inline unsigned char *wb_buffptr(struct archive_write *);
 +static int	wb_write_out(struct archive_write *);
 +static int	wb_consume(struct archive_write *, size_t);
 +#ifdef HAVE_ZLIB_H
 +static int	wb_set_offset(struct archive_write *, int64_t);
 +#endif
 +static int	write_null(struct archive_write *, size_t);
 +static int	write_VD_terminator(struct archive_write *);
 +static int	set_file_identifier(unsigned char *, int, int, enum vdc,
 +		    struct archive_write *, struct vdd *,
 +		    struct archive_string *, const char *, int,
 +		    enum char_type);
 +static int	write_VD(struct archive_write *, struct vdd *);
 +static int	write_VD_boot_record(struct archive_write *);
 +static int	write_information_block(struct archive_write *);
 +static int	write_path_table(struct archive_write *, int,
 +		    struct vdd *);
 +static int	write_directory_descriptors(struct archive_write *,
 +		    struct vdd *);
 +static int	write_file_descriptors(struct archive_write *);
 +static int	write_rr_ER(struct archive_write *);
 +static void	calculate_path_table_size(struct vdd *);
 +
 +static void	isofile_init_entry_list(struct iso9660 *);
 +static void	isofile_add_entry(struct iso9660 *, struct isofile *);
 +static void	isofile_free_all_entries(struct iso9660 *);
 +static void	isofile_init_entry_data_file_list(struct iso9660 *);
 +static void	isofile_add_data_file(struct iso9660 *, struct isofile *);
 +static struct isofile * isofile_new(struct archive_write *,
 +		    struct archive_entry *);
 +static void	isofile_free(struct isofile *);
 +static int	isofile_gen_utility_names(struct archive_write *,
 +		    struct isofile *);
 +static int	isofile_register_hardlink(struct archive_write *,
 +		    struct isofile *);
 +static void	isofile_connect_hardlink_files(struct iso9660 *);
 +static void	isofile_init_hardlinks(struct iso9660 *);
 +static void	isofile_free_hardlinks(struct iso9660 *);
 +
 +static struct isoent *isoent_new(struct isofile *);
 +static int	isoent_clone_tree(struct archive_write *,
 +		    struct isoent **, struct isoent *);
 +static void	_isoent_free(struct isoent *isoent);
 +static void	isoent_free_all(struct isoent *);
 +static struct isoent * isoent_create_virtual_dir(struct archive_write *,
 +		    struct iso9660 *, const char *);
 +static int	isoent_cmp_node(const struct archive_rb_node *,
 +		    const struct archive_rb_node *);
 +static int	isoent_cmp_key(const struct archive_rb_node *,
 +		    const void *);
 +static int	isoent_add_child_head(struct isoent *, struct isoent *);
 +static int	isoent_add_child_tail(struct isoent *, struct isoent *);
 +static void	isoent_remove_child(struct isoent *, struct isoent *);
 +static void	isoent_setup_directory_location(struct iso9660 *,
 +		    int, struct vdd *);
 +static void	isoent_setup_file_location(struct iso9660 *, int);
 +static int	get_path_component(char *, size_t, const char *);
 +static int	isoent_tree(struct archive_write *, struct isoent **);
 +static struct isoent *isoent_find_child(struct isoent *, const char *);
 +static struct isoent *isoent_find_entry(struct isoent *, const char *);
 +static void	idr_relaxed_filenames(char *);
 +static void	idr_init(struct iso9660 *, struct vdd *, struct idr *);
 +static void	idr_cleanup(struct idr *);
 +static int	idr_ensure_poolsize(struct archive_write *, struct idr *,
 +		    int);
 +static int	idr_start(struct archive_write *, struct idr *,
 +		    int, int, int, int, const struct archive_rb_tree_ops *);
 +static void	idr_register(struct idr *, struct isoent *, int,
 +		    int);
 +static void	idr_extend_identifier(struct idrent *, int, int);
 +static void	idr_resolve(struct idr *, void (*)(unsigned char *, int));
 +static void	idr_set_num(unsigned char *, int);
 +static void	idr_set_num_beutf16(unsigned char *, int);
 +static int	isoent_gen_iso9660_identifier(struct archive_write *,
 +		    struct isoent *, struct idr *);
 +static int	isoent_gen_joliet_identifier(struct archive_write *,
 +		    struct isoent *, struct idr *);
 +static int	isoent_cmp_iso9660_identifier(const struct isoent *,
 +		    const struct isoent *);
 +static int	isoent_cmp_node_iso9660(const struct archive_rb_node *,
 +		    const struct archive_rb_node *);
 +static int	isoent_cmp_key_iso9660(const struct archive_rb_node *,
 +		    const void *);
 +static int	isoent_cmp_joliet_identifier(const struct isoent *,
 +		    const struct isoent *);
 +static int	isoent_cmp_node_joliet(const struct archive_rb_node *,
 +		    const struct archive_rb_node *);
 +static int	isoent_cmp_key_joliet(const struct archive_rb_node *,
 +		    const void *);
 +static inline void path_table_add_entry(struct path_table *, struct isoent *);
 +static inline struct isoent * path_table_last_entry(struct path_table *);
 +static int	isoent_make_path_table(struct archive_write *);
 +static int	isoent_find_out_boot_file(struct archive_write *,
 +		    struct isoent *);
 +static int	isoent_create_boot_catalog(struct archive_write *,
 +		    struct isoent *);
 +static size_t	fd_boot_image_size(int);
 +static int	make_boot_catalog(struct archive_write *);
 +static int	setup_boot_information(struct archive_write *);
 +
 +static int	zisofs_init(struct archive_write *, struct isofile *);
 +static void	zisofs_detect_magic(struct archive_write *,
 +		    const void *, size_t);
 +static int	zisofs_write_to_temp(struct archive_write *,
 +		    const void *, size_t);
 +static int	zisofs_finish_entry(struct archive_write *);
 +static int	zisofs_rewind_boot_file(struct archive_write *);
 +static int	zisofs_free(struct archive_write *);
 +
 +int
 +archive_write_set_format_iso9660(struct archive *_a)
 +{
 +	struct archive_write *a = (struct archive_write *)_a;
 +	struct iso9660 *iso9660;
 +
 +	archive_check_magic(_a, ARCHIVE_WRITE_MAGIC,
 +	    ARCHIVE_STATE_NEW, "archive_write_set_format_iso9660");
 +
 +	/* If another format was already registered, unregister it. */
 +	if (a->format_free != NULL)
 +		(a->format_free)(a);
 +
 +	iso9660 = calloc(1, sizeof(*iso9660));
 +	if (iso9660 == NULL) {
 +		archive_set_error(&a->archive, ENOMEM,
 +		    "Can't allocate iso9660 data");
 +		return (ARCHIVE_FATAL);
 +	}
 +	iso9660->birth_time = 0;
 +	iso9660->temp_fd = -1;
 +	iso9660->cur_file = NULL;
 +	iso9660->primary.max_depth = 0;
 +	iso9660->primary.vdd_type = VDD_PRIMARY;
 +	iso9660->primary.pathtbl = NULL;
 +	iso9660->joliet.rootent = NULL;
 +	iso9660->joliet.max_depth = 0;
 +	iso9660->joliet.vdd_type = VDD_JOLIET;
 +	iso9660->joliet.pathtbl = NULL;
 +	isofile_init_entry_list(iso9660);
 +	isofile_init_entry_data_file_list(iso9660);
 +	isofile_init_hardlinks(iso9660);
 +	iso9660->directories_too_deep = NULL;
 +	iso9660->dircnt_max = 1;
 +	iso9660->wbuff_remaining = wb_buffmax();
 +	iso9660->wbuff_type = WB_TO_TEMP;
 +	iso9660->wbuff_offset = 0;
 +	iso9660->wbuff_written = 0;
 +	iso9660->wbuff_tail = 0;
 +	archive_string_init(&(iso9660->utf16be));
 +	archive_string_init(&(iso9660->mbs));
 +
 +	/*
 +	 * Init Identifiers used for PVD and SVD.
 +	 */
 +	archive_string_init(&(iso9660->volume_identifier));
 +	archive_strcpy(&(iso9660->volume_identifier), "CDROM");
 +	archive_string_init(&(iso9660->publisher_identifier));
 +	archive_string_init(&(iso9660->data_preparer_identifier));
 +	archive_string_init(&(iso9660->application_identifier));
 +	archive_strcpy(&(iso9660->application_identifier),
 +	    archive_version_string());
 +	archive_string_init(&(iso9660->copyright_file_identifier));
 +	archive_string_init(&(iso9660->abstract_file_identifier));
 +	archive_string_init(&(iso9660->bibliographic_file_identifier));
 +
 +	/*
 +	 * Init El Torito bootable CD variables.
 +	 */
 +	archive_string_init(&(iso9660->el_torito.catalog_filename));
 +	iso9660->el_torito.catalog = NULL;
 +	/* Set default file name of boot catalog  */
 +	archive_strcpy(&(iso9660->el_torito.catalog_filename),
 +	    "boot.catalog");
 +	archive_string_init(&(iso9660->el_torito.boot_filename));
 +	iso9660->el_torito.boot = NULL;
 +	iso9660->el_torito.platform_id = BOOT_PLATFORM_X86;
 +	archive_string_init(&(iso9660->el_torito.id));
 +	iso9660->el_torito.boot_load_seg = 0;
 +	iso9660->el_torito.boot_load_size = BOOT_LOAD_SIZE;
 +
 +	/*
 +	 * Init zisofs variables.
 +	 */
 +#ifdef HAVE_ZLIB_H
 +	iso9660->zisofs.block_pointers = NULL;
 +	iso9660->zisofs.block_pointers_allocated = 0;
 +	iso9660->zisofs.stream_valid = 0;
 +	iso9660->zisofs.compression_level = 9;
 +	memset(&(iso9660->zisofs.stream), 0,
 +	    sizeof(iso9660->zisofs.stream));
 +#endif
 +
 +	/*
 +	 * Set default value of iso9660 options.
 +	 */
 +	iso9660->opt.abstract_file = OPT_ABSTRACT_FILE_DEFAULT;
 +	iso9660->opt.application_id = OPT_APPLICATION_ID_DEFAULT;
 +	iso9660->opt.allow_vernum = OPT_ALLOW_VERNUM_DEFAULT;
 +	iso9660->opt.biblio_file = OPT_BIBLIO_FILE_DEFAULT;
 +	iso9660->opt.boot = OPT_BOOT_DEFAULT;
 +	iso9660->opt.boot_catalog = OPT_BOOT_CATALOG_DEFAULT;
 +	iso9660->opt.boot_info_table = OPT_BOOT_INFO_TABLE_DEFAULT;
 +	iso9660->opt.boot_load_seg = OPT_BOOT_LOAD_SEG_DEFAULT;
 +	iso9660->opt.boot_load_size = OPT_BOOT_LOAD_SIZE_DEFAULT;
 +	iso9660->opt.boot_type = OPT_BOOT_TYPE_DEFAULT;
 +	iso9660->opt.compression_level = OPT_COMPRESSION_LEVEL_DEFAULT;
 +	iso9660->opt.copyright_file = OPT_COPYRIGHT_FILE_DEFAULT;
 +	iso9660->opt.iso_level = OPT_ISO_LEVEL_DEFAULT;
 +	iso9660->opt.joliet = OPT_JOLIET_DEFAULT;
 +	iso9660->opt.limit_depth = OPT_LIMIT_DEPTH_DEFAULT;
 +	iso9660->opt.limit_dirs = OPT_LIMIT_DIRS_DEFAULT;
 +	iso9660->opt.pad = OPT_PAD_DEFAULT;
 +	iso9660->opt.publisher = OPT_PUBLISHER_DEFAULT;
 +	iso9660->opt.rr = OPT_RR_DEFAULT;
 +	iso9660->opt.volume_id = OPT_VOLUME_ID_DEFAULT;
 +	iso9660->opt.zisofs = OPT_ZISOFS_DEFAULT;
 +
 +	/* Create the root directory. */
 +	iso9660->primary.rootent =
 +	    isoent_create_virtual_dir(a, iso9660, "");
 +	if (iso9660->primary.rootent == NULL) {
 +		free(iso9660);
 +		archive_set_error(&a->archive, ENOMEM,
 +		    "Can't allocate memory");
 +		return (ARCHIVE_FATAL);
 +	}
 +	iso9660->primary.rootent->parent = iso9660->primary.rootent;
 +	iso9660->cur_dirent = iso9660->primary.rootent;
 +	archive_string_init(&(iso9660->cur_dirstr));
 +	archive_string_ensure(&(iso9660->cur_dirstr), 1);
 +	iso9660->cur_dirstr.s[0] = 0;
 +	iso9660->sconv_to_utf16be = NULL;
 +	iso9660->sconv_from_utf16be = NULL;
 +
 +	a->format_data = iso9660;
 +	a->format_name = "iso9660";
 +	a->format_options = iso9660_options;
 +	a->format_write_header = iso9660_write_header;
 +	a->format_write_data = iso9660_write_data;
 +	a->format_finish_entry = iso9660_finish_entry;
 +	a->format_close = iso9660_close;
 +	a->format_free = iso9660_free;
 +	a->archive.archive_format = ARCHIVE_FORMAT_ISO9660;
 +	a->archive.archive_format_name = "ISO9660";
 +
 +	return (ARCHIVE_OK);
 +}
 +
 +static int
 +get_str_opt(struct archive_write *a, struct archive_string *s,
 +    size_t maxsize, const char *key, const char *value)
 +{
 +
 +	if (strlen(value) > maxsize) {
 +		archive_set_error(&a->archive, ARCHIVE_ERRNO_MISC,
 +		    "Value is longer than %zu characters "
 +		    "for option ``%s''", maxsize, key);
 +		return (ARCHIVE_FATAL);
 +	}
 +	archive_strcpy(s, value);
 +	return (ARCHIVE_OK);
 +}
 +
 +static int
 +get_num_opt(struct archive_write *a, int *num, int high, int low,
 +    const char *key, const char *value)
 +{
 +	const char *p = value;
 +	int data = 0;
 +	int neg = 0;
 +
 +	if (p == NULL) {
 +		archive_set_error(&a->archive, ARCHIVE_ERRNO_MISC,
 +		    "Invalid value(empty) for option ``%s''", key);
 +		return (ARCHIVE_FATAL);
 +	}
 +	if (*p == '-') {
 +		neg = 1;
 +		p++;
 +	}
 +	while (*p) {
 +		if (*p >= '0' && *p <= '9')
 +			data = data * 10 + *p - '0';
 +		else {
 +			archive_set_error(&a->archive, ARCHIVE_ERRNO_MISC,
 +			    "Invalid value for option ``%s''", key);
 +			return (ARCHIVE_FATAL);
 +		}
 +		if (data > high) {
 +			archive_set_error(&a->archive, ARCHIVE_ERRNO_MISC,
 +			    "Invalid value(over %d) for "
 +			    "option ``%s''", high, key);
 +			return (ARCHIVE_FATAL);
 +		}
 +		if (data < low) {
 +			archive_set_error(&a->archive, ARCHIVE_ERRNO_MISC,
 +			    "Invalid value(under %d) for "
 +			    "option ``%s''", low, key);
 +			return (ARCHIVE_FATAL);
 +		}
 +		p++;
 +	}
 +	if (neg)
 +		data *= -1;
 +	*num = data;
 +
 +	return (ARCHIVE_OK);
 +}
 +
 +static int
 +iso9660_options(struct archive_write *a, const char *key, const char *value)
 +{
 +	struct iso9660 *iso9660 = a->format_data;
 +	const char *p;
 +	int r;
 +
 +	switch (key[0]) {
 +	case 'a':
 +		if (strcmp(key, "abstract-file") == 0) {
 +			r = get_str_opt(a,
 +			    &(iso9660->abstract_file_identifier),
 +			    ABSTRACT_FILE_SIZE, key, value);
 +			iso9660->opt.abstract_file = r == ARCHIVE_OK;
 +			return (r);
 +		}
 +		if (strcmp(key, "application-id") == 0) {
 +			r = get_str_opt(a,
 +			    &(iso9660->application_identifier),
 +			    APPLICATION_IDENTIFIER_SIZE, key, value);
 +			iso9660->opt.application_id = r == ARCHIVE_OK;
 +			return (r);
 +		}
 +		if (strcmp(key, "allow-vernum") == 0) {
 +			iso9660->opt.allow_vernum = value != NULL;
 +			return (ARCHIVE_OK);
 +		}
 +		break;
 +	case 'b':
 +		if (strcmp(key, "biblio-file") == 0) {
 +			r = get_str_opt(a,
 +			    &(iso9660->bibliographic_file_identifier),
 +			    BIBLIO_FILE_SIZE, key, value);
 +			iso9660->opt.biblio_file = r == ARCHIVE_OK;
 +			return (r);
 +		}
 +		if (strcmp(key, "boot") == 0) {
 +			if (value == NULL)
 +				iso9660->opt.boot = 0;
 +			else {
 +				iso9660->opt.boot = 1;
 +				archive_strcpy(
 +				    &(iso9660->el_torito.boot_filename),
 +				    value);
 +			}
 +			return (ARCHIVE_OK);
 +		}
 +		if (strcmp(key, "boot-catalog") == 0) {
 +			r = get_str_opt(a,
 +			    &(iso9660->el_torito.catalog_filename),
 +			    1024, key, value);
 +			iso9660->opt.boot_catalog = r == ARCHIVE_OK;
 +			return (r);
 +		}
 +		if (strcmp(key, "boot-info-table") == 0) {
 +			iso9660->opt.boot_info_table = value != NULL;
 +			return (ARCHIVE_OK);
 +		}
 +		if (strcmp(key, "boot-load-seg") == 0) {
 +			uint32_t seg;
 +
 +			iso9660->opt.boot_load_seg = 0;
 +			if (value == NULL)
 +				goto invalid_value;
 +			seg = 0;
 +			p = value;
 +			if (p[0] == '0' && (p[1] == 'x' || p[1] == 'X'))
 +				p += 2;
 +			while (*p) {
 +				if (seg)
 +					seg <<= 4;
 +				if (*p >= 'A' && *p <= 'F')
 +					seg += *p - 'A' + 0x0a;
 +				else if (*p >= 'a' && *p <= 'f')
 +					seg += *p - 'a' + 0x0a;
 +				else if (*p >= '0' && *p <= '9')
 +					seg += *p - '0';
 +				else
 +					goto invalid_value;
 +				if (seg > 0xffff) {
 +					archive_set_error(&a->archive,
 +					    ARCHIVE_ERRNO_MISC,
 +					    "Invalid value(over 0xffff) for "
 +					    "option ``%s''", key);
 +					return (ARCHIVE_FATAL);
 +				}
 +				p++;
 +			}
 +			iso9660->el_torito.boot_load_seg = (uint16_t)seg;
 +			iso9660->opt.boot_load_seg = 1;
 +			return (ARCHIVE_OK);
 +		}
 +		if (strcmp(key, "boot-load-size") == 0) {
 +			int num = 0;
 +			r = get_num_opt(a, &num, 0xffff, 1, key, value);
 +			iso9660->opt.boot_load_size = r == ARCHIVE_OK;
 +			if (r != ARCHIVE_OK)
 +				return (ARCHIVE_FATAL);
 +			iso9660->el_torito.boot_load_size = (uint16_t)num;
 +			return (ARCHIVE_OK);
 +		}
 +		if (strcmp(key, "boot-type") == 0) {
 +			if (value == NULL)
 +				goto invalid_value;
 +			if (strcmp(value, "no-emulation") == 0)
 +				iso9660->opt.boot_type = OPT_BOOT_TYPE_NO_EMU;
 +			else if (strcmp(value, "fd") == 0)
 +				iso9660->opt.boot_type = OPT_BOOT_TYPE_FD;
 +			else if (strcmp(value, "hard-disk") == 0)
 +				iso9660->opt.boot_type = OPT_BOOT_TYPE_HARD_DISK;
 +			else
 +				goto invalid_value;
 +			return (ARCHIVE_OK);
 +		}
 +		break;
 +	case 'c':
 +		if (strcmp(key, "compression-level") == 0) {
 +#ifdef HAVE_ZLIB_H
 +			if (value == NULL ||
 +			    !(value[0] >= '0' && value[0] <= '9') ||
 +			    value[1] != '\0')
 +				goto invalid_value;
 +                	iso9660->zisofs.compression_level = value[0] - '0';
 +			iso9660->opt.compression_level = 1;
 +                	return (ARCHIVE_OK);
 +#else
 +			archive_set_error(&a->archive,
 +			    ARCHIVE_ERRNO_MISC,
 +			    "Option ``%s'' "
 +			    "is not supported on this platform.", key);
 +			return (ARCHIVE_FATAL);
 +#endif
 +		}
 +		if (strcmp(key, "copyright-file") == 0) {
 +			r = get_str_opt(a,
 +			    &(iso9660->copyright_file_identifier),
 +			    COPYRIGHT_FILE_SIZE, key, value);
 +			iso9660->opt.copyright_file = r == ARCHIVE_OK;
 +			return (r);
 +		}
 +#ifdef DEBUG
 +		/* Specifies Volume creation date and time;
 +		 * year(4),month(2),day(2),hour(2),minute(2),second(2).
 +		 * e.g. "20090929033757"
 +		 */
 +		if (strcmp(key, "creation") == 0) {
 +			struct tm tm;
 +			char buf[5];
 +
 +			p = value;
 +			if (p == NULL || strlen(p) < 14)
 +				goto invalid_value;
 +			memset(&tm, 0, sizeof(tm));
 +			memcpy(buf, p, 4); buf[4] = '\0'; p += 4;
 +			tm.tm_year = strtol(buf, NULL, 10) - 1900;
 +			memcpy(buf, p, 2); buf[2] = '\0'; p += 2;
 +			tm.tm_mon = strtol(buf, NULL, 10) - 1;
 +			memcpy(buf, p, 2); buf[2] = '\0'; p += 2;
 +			tm.tm_mday = strtol(buf, NULL, 10);
 +			memcpy(buf, p, 2); buf[2] = '\0'; p += 2;
 +			tm.tm_hour = strtol(buf, NULL, 10);
 +			memcpy(buf, p, 2); buf[2] = '\0'; p += 2;
 +			tm.tm_min = strtol(buf, NULL, 10);
 +			memcpy(buf, p, 2); buf[2] = '\0';
 +			tm.tm_sec = strtol(buf, NULL, 10);
 +			iso9660->birth_time = mktime(&tm);
 +			return (ARCHIVE_OK);
 +		}
 +#endif
 +		break;
 +	case 'i':
 +		if (strcmp(key, "iso-level") == 0) {
 +			if (value != NULL && value[1] == '\0' &&
 +			    (value[0] >= '1' && value[0] <= '4')) {
 +				iso9660->opt.iso_level = value[0]-'0';
 +				return (ARCHIVE_OK);
 +			}
 +			goto invalid_value;
 +		}
 +		break;
 +	case 'j':
 +		if (strcmp(key, "joliet") == 0) {
 +			if (value == NULL)
 +				iso9660->opt.joliet = OPT_JOLIET_DISABLE;
 +			else if (strcmp(value, "1") == 0)
 +				iso9660->opt.joliet = OPT_JOLIET_ENABLE;
 +			else if (strcmp(value, "long") == 0)
 +				iso9660->opt.joliet = OPT_JOLIET_LONGNAME;
 +			else
 +				goto invalid_value;
 +			return (ARCHIVE_OK);
 +		}
 +		break;
 +	case 'l':
 +		if (strcmp(key, "limit-depth") == 0) {
 +			iso9660->opt.limit_depth = value != NULL;
 +			return (ARCHIVE_OK);
 +		}
 +		if (strcmp(key, "limit-dirs") == 0) {
 +			iso9660->opt.limit_dirs = value != NULL;
 +			return (ARCHIVE_OK);
 +		}
 +		break;
 +	case 'p':
 +		if (strcmp(key, "pad") == 0) {
 +			iso9660->opt.pad = value != NULL;
 +			return (ARCHIVE_OK);
 +		}
 +		if (strcmp(key, "publisher") == 0) {
 +			r = get_str_opt(a,
 +			    &(iso9660->publisher_identifier),
 +			    PUBLISHER_IDENTIFIER_SIZE, key, value);
 +			iso9660->opt.publisher = r == ARCHIVE_OK;
 +			return (r);
 +		}
 +		break;
 +	case 'r':
 +		if (strcmp(key, "rockridge") == 0 ||
 +		    strcmp(key, "Rockridge") == 0) {
 +			if (value == NULL)
 +				iso9660->opt.rr = OPT_RR_DISABLED;
 +			else if (strcmp(value, "1") == 0)
 +				iso9660->opt.rr = OPT_RR_USEFUL;
 +			else if (strcmp(value, "strict") == 0)
 +				iso9660->opt.rr = OPT_RR_STRICT;
 +			else if (strcmp(value, "useful") == 0)
 +				iso9660->opt.rr = OPT_RR_USEFUL;
 +			else
 +				goto invalid_value;
 +			return (ARCHIVE_OK);
 +		}
 +		break;
 +	case 'v':
 +		if (strcmp(key, "volume-id") == 0) {
 +			r = get_str_opt(a, &(iso9660->volume_identifier),
 +			    VOLUME_IDENTIFIER_SIZE, key, value);
 +			iso9660->opt.volume_id = r == ARCHIVE_OK;
 +			return (r);
 +		}
 +		break;
 +	case 'z':
 +		if (strcmp(key, "zisofs") == 0) {
 +			if (value == NULL)
 +				iso9660->opt.zisofs = OPT_ZISOFS_DISABLED;
 +			else {
 +#ifdef HAVE_ZLIB_H
 +				iso9660->opt.zisofs = OPT_ZISOFS_DIRECT;
 +#else
 +				archive_set_error(&a->archive,
 +				    ARCHIVE_ERRNO_MISC,
 +				    "``zisofs'' "
 +				    "is not supported on this platform.");
 +				return (ARCHIVE_FATAL);
 +#endif
 +			}
 +			return (ARCHIVE_OK);
 +		}
 +		break;
 +	}
 +
 +	/* Note: The "warn" return is just to inform the options
 +	 * supervisor that we didn't handle it.  It will generate
 +	 * a suitable error if no one used this option. */
 +	return (ARCHIVE_WARN);
 +
 +invalid_value:
 +	archive_set_error(&a->archive, ARCHIVE_ERRNO_MISC,
 +	    "Invalid value for option ``%s''", key);
 +	return (ARCHIVE_FAILED);
 +}
 +
 +static int
 +iso9660_write_header(struct archive_write *a, struct archive_entry *entry)
 +{
 +	struct iso9660 *iso9660;
 +	struct isofile *file;
 +	struct isoent *isoent;
 +	int r, ret = ARCHIVE_OK;
 +
 +	iso9660 = a->format_data;
 +
 +	iso9660->cur_file = NULL;
 +	iso9660->bytes_remaining = 0;
 +	iso9660->need_multi_extent = 0;
 +	if (archive_entry_filetype(entry) == AE_IFLNK
 +	    && iso9660->opt.rr == OPT_RR_DISABLED) {
 +		archive_set_error(&a->archive, ARCHIVE_ERRNO_MISC,
 +		    "Ignore symlink file.");
 +		iso9660->cur_file = NULL;
 +		return (ARCHIVE_WARN);
 +	}
 +	if (archive_entry_filetype(entry) == AE_IFREG &&
 +	    archive_entry_size(entry) >= MULTI_EXTENT_SIZE) {
 +		if (iso9660->opt.iso_level < 3) {
 +			archive_set_error(&a->archive,
 +			    ARCHIVE_ERRNO_MISC,
 +			    "Ignore over %lld bytes file. "
 +			    "This file too large.",
 +			    MULTI_EXTENT_SIZE);
 +				iso9660->cur_file = NULL;
 +			return (ARCHIVE_WARN);
 +		}
 +		iso9660->need_multi_extent = 1;
 +	}
 +
 +	file = isofile_new(a, entry);
 +	if (file == NULL) {
 +		archive_set_error(&a->archive, ENOMEM,
 +		    "Can't allocate data");
 +		return (ARCHIVE_FATAL);
 +	}
 +	r = isofile_gen_utility_names(a, file);
 +	if (r < ARCHIVE_WARN) {
 +		isofile_free(file);
 +		return (r);
 +	}
 +	else if (r < ret)
 +		ret = r;
 +
 +	/*
 +	 * Ignore a path which looks like the top of directory name
 +	 * since we have already made the root directory of an ISO image.
 +	 */
 +	if (archive_strlen(&(file->parentdir)) == 0 &&
 +	    archive_strlen(&(file->basename)) == 0) {
 +		isofile_free(file);
 +		return (r);
 +	}
 +
 +	isofile_add_entry(iso9660, file);
 +	isoent = isoent_new(file);
 +	if (isoent == NULL) {
 +		archive_set_error(&a->archive, ENOMEM,
 +		    "Can't allocate data");
 +		return (ARCHIVE_FATAL);
 +	}
 +	if (isoent->file->dircnt > iso9660->dircnt_max)
 +		iso9660->dircnt_max = isoent->file->dircnt;
 +
 +	/* Add the current file into tree */
 +	r = isoent_tree(a, &isoent);
 +	if (r != ARCHIVE_OK)
 +		return (r);
 +
 +	/* If there is the same file in tree and
 +	 * the current file is older than the file in tree.
 +	 * So we don't need the current file data anymore. */
 +	if (isoent->file != file)
 +		return (ARCHIVE_OK);
 +
 +	/* Non regular files contents are unneeded to be saved to
 +	 * temporary files. */
 +	if (archive_entry_filetype(file->entry) != AE_IFREG)
 +		return (ret);
 +
 +	/*
 +	 * Set the current file to cur_file to read its contents.
 +	 */
 +	iso9660->cur_file = file;
 +
 +	if (archive_entry_nlink(file->entry) > 1) {
 +		r = isofile_register_hardlink(a, file);
 +		if (r != ARCHIVE_OK)
 +			return (ARCHIVE_FATAL);
 +	}
 +
 +	/*
 +	 * Prepare to save the contents of the file.
 +	 */
 +	if (iso9660->temp_fd < 0) {
 +		iso9660->temp_fd = __archive_mktemp(NULL);
 +		if (iso9660->temp_fd < 0) {
 +			archive_set_error(&a->archive, errno,
 +			    "Couldn't create temporary file");
 +			return (ARCHIVE_FATAL);
 +		}
 +	}
 +
 +	/* Save an offset of current file in temporary file. */
 +	file->content.offset_of_temp = wb_offset(a);
 +	file->cur_content = &(file->content);
 +	r = zisofs_init(a, file);
 +	if (r < ret)
 +		ret = r;
 +	iso9660->bytes_remaining =  archive_entry_size(file->entry);
 +
 +	return (ret);
 +}
 +
 +static int
 +write_to_temp(struct archive_write *a, const void *buff, size_t s)
 +{
 +	struct iso9660 *iso9660 = a->format_data;
 +	ssize_t written;
 +	const unsigned char *b;
 +
 +	b = (const unsigned char *)buff;
 +	while (s) {
 +		written = write(iso9660->temp_fd, b, s);
 +		if (written < 0) {
 +			archive_set_error(&a->archive, errno,
 +			    "Can't write to temporary file");
 +			return (ARCHIVE_FATAL);
 +		}
 +		s -= written;
 +		b += written;
 +	}
 +	return (ARCHIVE_OK);
 +}
 +
 +static int
 +wb_write_to_temp(struct archive_write *a, const void *buff, size_t s)
 +{
 +	const char *xp = buff;
 +	size_t xs = s;
 +
 +	/*
 +	 * If a written data size is big enough to use system-call
 +	 * and there is no waiting data, this calls write_to_temp() in
 +	 * order to reduce a extra memory copy.
 +	 */
 +	if (wb_remaining(a) == wb_buffmax() && s > (1024 * 16)) {
 +		struct iso9660 *iso9660 = (struct iso9660 *)a->format_data;
 +		xs = s % LOGICAL_BLOCK_SIZE;
 +		iso9660->wbuff_offset += s - xs;
 +		if (write_to_temp(a, buff, s - xs) != ARCHIVE_OK)
 +			return (ARCHIVE_FATAL);
 +		if (xs == 0)
 +			return (ARCHIVE_OK);
 +		xp += s - xs;
 +	}
 +
 +	while (xs) {
 +		size_t size = xs;
 +		if (size > wb_remaining(a))
 +			size = wb_remaining(a);
 +		memcpy(wb_buffptr(a), xp, size);
 +		if (wb_consume(a, size) != ARCHIVE_OK)
 +			return (ARCHIVE_FATAL);
 +		xs -= size;
 +		xp += size;
 +	}
 +	return (ARCHIVE_OK);
 +}
 +
 +static int
 +wb_write_padding_to_temp(struct archive_write *a, int64_t csize)
 +{
 +	size_t ns;
 +	int ret;
 +
 +	ns = (size_t)(csize % LOGICAL_BLOCK_SIZE);
 +	if (ns != 0)
 +		ret = write_null(a, LOGICAL_BLOCK_SIZE - ns);
 +	else
 +		ret = ARCHIVE_OK;
 +	return (ret);
 +}
 +
 +static ssize_t
 +write_iso9660_data(struct archive_write *a, const void *buff, size_t s)
 +{
 +	struct iso9660 *iso9660 = a->format_data;
 +	size_t ws;
 +
 +	if (iso9660->temp_fd < 0) {
 +		archive_set_error(&a->archive, ARCHIVE_ERRNO_MISC,
 +		    "Couldn't create temporary file");
 +		return (ARCHIVE_FATAL);
 +	}
 +
 +	ws = s;
 +	if (iso9660->need_multi_extent &&
 +	    (iso9660->cur_file->cur_content->size + ws) >=
 +	      (MULTI_EXTENT_SIZE - LOGICAL_BLOCK_SIZE)) {
 +		struct content *con;
 +		size_t ts;
 +
 +		ts = (size_t)(MULTI_EXTENT_SIZE - LOGICAL_BLOCK_SIZE -
 +		    iso9660->cur_file->cur_content->size);
 +
 +		if (iso9660->zisofs.detect_magic)
 +			zisofs_detect_magic(a, buff, ts);
 +
 +		if (iso9660->zisofs.making) {
 +			if (zisofs_write_to_temp(a, buff, ts) != ARCHIVE_OK)
 +				return (ARCHIVE_FATAL);
 +		} else {
 +			if (wb_write_to_temp(a, buff, ts) != ARCHIVE_OK)
 +				return (ARCHIVE_FATAL);
 +			iso9660->cur_file->cur_content->size += ts;
 +		}
 +
 +		/* Write padding. */
 +		if (wb_write_padding_to_temp(a,
 +		    iso9660->cur_file->cur_content->size) != ARCHIVE_OK)
 +			return (ARCHIVE_FATAL);
 +
 +		/* Compute the logical block number. */
 +		iso9660->cur_file->cur_content->blocks = (int)
 +		    ((iso9660->cur_file->cur_content->size
 +		     + LOGICAL_BLOCK_SIZE -1) >> LOGICAL_BLOCK_BITS);
 +
 +		/*
 +		 * Make next extent.
 +		 */
 +		ws -= ts;
 +		buff = (const void *)(((const unsigned char *)buff) + ts);
 +		/* Make a content for next extent. */
 +		con = calloc(1, sizeof(*con));
 +		if (con == NULL) {
 +			archive_set_error(&a->archive, ENOMEM,
 +			    "Can't allocate content data");
 +			return (ARCHIVE_FATAL);
 +		}
 +		con->offset_of_temp = wb_offset(a);
 +		iso9660->cur_file->cur_content->next = con;
 +		iso9660->cur_file->cur_content = con;
 +#ifdef HAVE_ZLIB_H
 +		iso9660->zisofs.block_offset = 0;
 +#endif
 +	}
 +
 +	if (iso9660->zisofs.detect_magic)
 +		zisofs_detect_magic(a, buff, ws);
 +
 +	if (iso9660->zisofs.making) {
 +		if (zisofs_write_to_temp(a, buff, ws) != ARCHIVE_OK)
 +			return (ARCHIVE_FATAL);
 +	} else {
 +		if (wb_write_to_temp(a, buff, ws) != ARCHIVE_OK)
 +			return (ARCHIVE_FATAL);
 +		iso9660->cur_file->cur_content->size += ws;
 +	}
 +
 +	return (s);
 +}
 +
 +static ssize_t
 +iso9660_write_data(struct archive_write *a, const void *buff, size_t s)
 +{
 +	struct iso9660 *iso9660 = a->format_data;
 +	ssize_t r;
 +
 +	if (iso9660->cur_file == NULL)
 +		return (0);
 +	if (archive_entry_filetype(iso9660->cur_file->entry) != AE_IFREG)
 +		return (0);
 +	if (s > iso9660->bytes_remaining)
 +		s = (size_t)iso9660->bytes_remaining;
 +	if (s == 0)
 +		return (0);
 +
 +	r = write_iso9660_data(a, buff, s);
 +	if (r > 0)
 +		iso9660->bytes_remaining -= r;
 +	return (r);
 +}
 +
 +static int
 +iso9660_finish_entry(struct archive_write *a)
 +{
 +	struct iso9660 *iso9660 = a->format_data;
 +
 +	if (iso9660->cur_file == NULL)
 +		return (ARCHIVE_OK);
 +	if (archive_entry_filetype(iso9660->cur_file->entry) != AE_IFREG)
 +		return (ARCHIVE_OK);
 +	if (iso9660->cur_file->content.size == 0)
 +		return (ARCHIVE_OK);
 +
 +	/* If there are unwritten data, write null data instead. */
 +	while (iso9660->bytes_remaining > 0) {
 +		size_t s;
 +
 +		s = (iso9660->bytes_remaining > a->null_length)?
 +		    a->null_length: (size_t)iso9660->bytes_remaining;
 +		if (write_iso9660_data(a, a->nulls, s) < 0)
 +			return (ARCHIVE_FATAL);
 +		iso9660->bytes_remaining -= s;
 +	}
 +
 +	if (iso9660->zisofs.making && zisofs_finish_entry(a) != ARCHIVE_OK)
 +		return (ARCHIVE_FATAL);
 +
 +	/* Write padding. */
 +	if (wb_write_padding_to_temp(a, iso9660->cur_file->cur_content->size)
 +	    != ARCHIVE_OK)
 +		return (ARCHIVE_FATAL);
 +
 +	/* Compute the logical block number. */
 +	iso9660->cur_file->cur_content->blocks = (int)
 +	    ((iso9660->cur_file->cur_content->size
 +	     + LOGICAL_BLOCK_SIZE -1) >> LOGICAL_BLOCK_BITS);
 +
 +	/* Add the current file to data file list. */
 +	isofile_add_data_file(iso9660, iso9660->cur_file);
 +
 +	return (ARCHIVE_OK);
 +}
 +
 +static int
 +iso9660_close(struct archive_write *a)
 +{
 +	struct iso9660 *iso9660;
 +	int ret, blocks;
 +
 +	iso9660 = a->format_data;
 +
 +	/*
 +	 * Write remaining data out to the temporary file.
 +	 */
 +	if (wb_remaining(a) > 0) {
 +		ret = wb_write_out(a);
 +		if (ret < 0)
 +			return (ret);
 +	}
 +
 +	/*
 +	 * Preparations...
 +	 */
 +#ifdef DEBUG
 +	if (iso9660->birth_time == 0)
 +#endif
 +		time(&(iso9660->birth_time));
 +
 +	/*
 +	 * Prepare a bootable ISO image.
 +	 */
 +	if (iso9660->opt.boot) {
 +		/* Find out the boot file entry. */
 +		ret = isoent_find_out_boot_file(a, iso9660->primary.rootent);
 +		if (ret < 0)
 +			return (ret);
 +		/* Reconvert the boot file from zisofs'ed form to
 +		 * plain form. */
 +		ret = zisofs_rewind_boot_file(a);
 +		if (ret < 0)
 +			return (ret);
 +		/* Write remaining data out to the temporary file. */
 +		if (wb_remaining(a) > 0) {
 +			ret = wb_write_out(a);
 +			if (ret < 0)
 +				return (ret);
 +		}
 +		/* Create the boot catalog. */
 +		ret = isoent_create_boot_catalog(a, iso9660->primary.rootent);
 +		if (ret < 0)
 +			return (ret);
 +	}
 +
 +	/*
 +	 * Prepare joliet extensions.
 +	 */
 +	if (iso9660->opt.joliet) {
 +		/* Make a new tree for joliet. */
 +		ret = isoent_clone_tree(a, &(iso9660->joliet.rootent),
 +		    iso9660->primary.rootent);
 +		if (ret < 0)
 +			return (ret);
- 		/* Make sure we have UTF-16BE convertors.
- 		 * if there is no file entry, convertors are still
- 		 * uninitilized. */
++		/* Make sure we have UTF-16BE converters.
++		 * if there is no file entry, converters are still
++		 * uninitialized. */
 +		if (iso9660->sconv_to_utf16be == NULL) {
 +			iso9660->sconv_to_utf16be =
 +			    archive_string_conversion_to_charset(
 +				&(a->archive), "UTF-16BE", 1);
 +			if (iso9660->sconv_to_utf16be == NULL)
 +				/* Couldn't allocate memory */
 +				return (ARCHIVE_FATAL);
 +			iso9660->sconv_from_utf16be =
 +			    archive_string_conversion_from_charset(
 +				&(a->archive), "UTF-16BE", 1);
 +			if (iso9660->sconv_from_utf16be == NULL)
 +				/* Couldn't allocate memory */
 +				return (ARCHIVE_FATAL);
 +		}
 +	}
 +
 +	/*
 +	 * Make Path Tables.
 +	 */
 +	ret = isoent_make_path_table(a);
 +	if (ret < 0)
 +		return (ret);
 +
 +	/*
 +	 * Calculate a total volume size and setup all locations of
 +	 * contents of an iso9660 image.
 +	 */
 +	blocks = SYSTEM_AREA_BLOCK
 +		+ PRIMARY_VOLUME_DESCRIPTOR_BLOCK
 +		+ VOLUME_DESCRIPTOR_SET_TERMINATOR_BLOCK
 +		+ NON_ISO_FILE_SYSTEM_INFORMATION_BLOCK;
 +	if (iso9660->opt.boot)
 +		blocks += BOOT_RECORD_DESCRIPTOR_BLOCK;
 +	if (iso9660->opt.joliet)
 +		blocks += SUPPLEMENTARY_VOLUME_DESCRIPTOR_BLOCK;
 +	if (iso9660->opt.iso_level == 4)
 +		blocks += SUPPLEMENTARY_VOLUME_DESCRIPTOR_BLOCK;
 +
 +	/* Setup the locations of Path Table. */
 +	iso9660->primary.location_type_L_path_table = blocks;
 +	blocks += iso9660->primary.path_table_block;
 +	iso9660->primary.location_type_M_path_table = blocks;
 +	blocks += iso9660->primary.path_table_block;
 +	if (iso9660->opt.joliet) {
 +		iso9660->joliet.location_type_L_path_table = blocks;
 +		blocks += iso9660->joliet.path_table_block;
 +		iso9660->joliet.location_type_M_path_table = blocks;
 +		blocks += iso9660->joliet.path_table_block;
 +	}
 +
 +	/* Setup the locations of directories. */
 +	isoent_setup_directory_location(iso9660, blocks,
 +	    &(iso9660->primary));
 +	blocks += iso9660->primary.total_dir_block;
 +	if (iso9660->opt.joliet) {
 +		isoent_setup_directory_location(iso9660, blocks,
 +		    &(iso9660->joliet));
 +		blocks += iso9660->joliet.total_dir_block;
 +	}
 +
 +	if (iso9660->opt.rr) {
 +		iso9660->location_rrip_er = blocks;
 +		blocks += RRIP_ER_BLOCK;
 +	}
 +
 +	/* Setup the locations of all file contents. */
 + 	isoent_setup_file_location(iso9660, blocks);
 +	blocks += iso9660->total_file_block;
 +	if (iso9660->opt.boot && iso9660->opt.boot_info_table) {
 +		ret = setup_boot_information(a);
 +		if (ret < 0)
 +			return (ret);
 +	}
 +
 +	/* Now we have a total volume size. */
 +	iso9660->volume_space_size = blocks;
 +	if (iso9660->opt.pad)
 +		iso9660->volume_space_size += PADDING_BLOCK;
 +	iso9660->volume_sequence_number = 1;
 +
 +
 +	/*
 +	 * Write an ISO 9660 image.
 +	 */
 +
- 	/* Switc to start using wbuff as file buffer. */
++	/* Switch to start using wbuff as file buffer. */
 +	iso9660->wbuff_remaining = wb_buffmax();
 +	iso9660->wbuff_type = WB_TO_STREAM;
 +	iso9660->wbuff_offset = 0;
 +	iso9660->wbuff_written = 0;
 +	iso9660->wbuff_tail = 0;
 +
 +	/* Write The System Area */
 +	ret = write_null(a, SYSTEM_AREA_BLOCK * LOGICAL_BLOCK_SIZE);
 +	if (ret != ARCHIVE_OK)
 +		return (ARCHIVE_FATAL);
 +
 +	/* Write Primary Volume Descriptor */
 +	ret = write_VD(a, &(iso9660->primary));
 +	if (ret != ARCHIVE_OK)
 +		return (ARCHIVE_FATAL);
 +
 +	if (iso9660->opt.boot) {
 +		/* Write Boot Record Volume Descriptor */
 +		ret = write_VD_boot_record(a);
 +		if (ret != ARCHIVE_OK)
 +			return (ARCHIVE_FATAL);
 +	}
 +
 +	if (iso9660->opt.iso_level == 4) {
 +		/* Write Enhanced Volume Descriptor */
 +		iso9660->primary.vdd_type = VDD_ENHANCED;
 +		ret = write_VD(a, &(iso9660->primary));
 +		iso9660->primary.vdd_type = VDD_PRIMARY;
 +		if (ret != ARCHIVE_OK)
 +			return (ARCHIVE_FATAL);
 +	}
 +
 +	if (iso9660->opt.joliet) {
 +		ret = write_VD(a, &(iso9660->joliet));
 +		if (ret != ARCHIVE_OK)
 +			return (ARCHIVE_FATAL);
 +	}
 +
 +	/* Write Volume Descriptor Set Terminator */
 +	ret = write_VD_terminator(a);
 +	if (ret != ARCHIVE_OK)
 +		return (ARCHIVE_FATAL);
 +
 +	/* Write Non-ISO File System Information */
 +	ret = write_information_block(a);
 +	if (ret != ARCHIVE_OK)
 +		return (ARCHIVE_FATAL);
 +
 +	/* Write Type L Path Table */
 +	ret = write_path_table(a, 0, &(iso9660->primary));
 +	if (ret != ARCHIVE_OK)
 +		return (ARCHIVE_FATAL);
 +
 +	/* Write Type M Path Table */
 +	ret = write_path_table(a, 1, &(iso9660->primary));
 +	if (ret != ARCHIVE_OK)
 +		return (ARCHIVE_FATAL);
 +
 +	if (iso9660->opt.joliet) {
 +		/* Write Type L Path Table */
 +		ret = write_path_table(a, 0, &(iso9660->joliet));
 +		if (ret != ARCHIVE_OK)
 +			return (ARCHIVE_FATAL);
 +
 +		/* Write Type M Path Table */
 +		ret = write_path_table(a, 1, &(iso9660->joliet));
 +		if (ret != ARCHIVE_OK)
 +			return (ARCHIVE_FATAL);
 +	}
 +
 +	/* Write Directory Descriptors */
 +	ret = write_directory_descriptors(a, &(iso9660->primary));
 +	if (ret != ARCHIVE_OK)
 +		return (ARCHIVE_FATAL);
 +
 +	if (iso9660->opt.joliet) {
 +		ret = write_directory_descriptors(a, &(iso9660->joliet));
 +		if (ret != ARCHIVE_OK)
 +			return (ARCHIVE_FATAL);
 +	}
 +
 +	if (iso9660->opt.rr) {
 +		/* Write Rockridge ER(Extensions Reference) */
 +		ret = write_rr_ER(a);
 +		if (ret != ARCHIVE_OK)
 +			return (ARCHIVE_FATAL);
 +	}
 +
 +	/* Write File Descriptors */
 +	ret = write_file_descriptors(a);
 +	if (ret != ARCHIVE_OK)
 +		return (ARCHIVE_FATAL);
 +
 +	/* Write Padding  */
 +	if (iso9660->opt.pad) {
 +		ret = write_null(a, PADDING_BLOCK * LOGICAL_BLOCK_SIZE);
 +		if (ret != ARCHIVE_OK)
 +			return (ARCHIVE_FATAL);
 +	}
 +
 +	if (iso9660->directories_too_deep != NULL) {
 +		archive_set_error(&a->archive, ARCHIVE_ERRNO_MISC,
 +		    "%s: Directories too deep.",
 +		    archive_entry_pathname(
 +			iso9660->directories_too_deep->file->entry));
 +		return (ARCHIVE_WARN);
 +	}
 +
 +	/* Write remaining data out. */
 +	ret = wb_write_out(a);
 +
 +	return (ret);
 +}
 +
 +static int
 +iso9660_free(struct archive_write *a)
 +{
 +	struct iso9660 *iso9660;
 +	int i, ret;
 +
 +	iso9660 = a->format_data;
 +
 +	/* Close the temporary file. */
 +	if (iso9660->temp_fd >= 0)
 +		close(iso9660->temp_fd);
 +
 +	/* Free some stuff for zisofs operations. */
 +	ret = zisofs_free(a);
 +
 +	/* Remove directory entries in tree which includes file entries. */
 +	isoent_free_all(iso9660->primary.rootent);
 +	for (i = 0; i < iso9660->primary.max_depth; i++)
 +		free(iso9660->primary.pathtbl[i].sorted);
 +	free(iso9660->primary.pathtbl);
 +
 +	if (iso9660->opt.joliet) {
 +		isoent_free_all(iso9660->joliet.rootent);
 +		for (i = 0; i < iso9660->joliet.max_depth; i++)
 +			free(iso9660->joliet.pathtbl[i].sorted);
 +		free(iso9660->joliet.pathtbl);
 +	}
 +
 +	/* Remove isofile entries. */
 +	isofile_free_all_entries(iso9660);
 +	isofile_free_hardlinks(iso9660);
 +
 +	archive_string_free(&(iso9660->cur_dirstr));
 +	archive_string_free(&(iso9660->volume_identifier));
 +	archive_string_free(&(iso9660->publisher_identifier));
 +	archive_string_free(&(iso9660->data_preparer_identifier));
 +	archive_string_free(&(iso9660->application_identifier));
 +	archive_string_free(&(iso9660->copyright_file_identifier));
 +	archive_string_free(&(iso9660->abstract_file_identifier));
 +	archive_string_free(&(iso9660->bibliographic_file_identifier));
 +	archive_string_free(&(iso9660->el_torito.catalog_filename));
 +	archive_string_free(&(iso9660->el_torito.boot_filename));
 +	archive_string_free(&(iso9660->el_torito.id));
 +	archive_string_free(&(iso9660->utf16be));
 +	archive_string_free(&(iso9660->mbs));
 +
 +	free(iso9660);
 +	a->format_data = NULL;
 +
 +	return (ret);
 +}
 +
 +/*
 + * Get the System Identifier
 + */
 +static void
 +get_system_identitier(char *system_id, size_t size)
 +{
 +#if defined(HAVE_SYS_UTSNAME_H)
 +	struct utsname u;
 +
 +	uname(&u);
 +	strncpy(system_id, u.sysname, size-1);
 +	system_id[size-1] = '\0';
 +#elif defined(_WIN32) && !defined(__CYGWIN__)
 +	strncpy(system_id, "Windows", size-1);
 +	system_id[size-1] = '\0';
 +#else
 +#error no way to get the system identifier on your platform.
 +#endif
 +}
 +
 +static void
 +set_str(unsigned char *p, const char *s, size_t l, char f, const char *map)
 +{
 +	unsigned char c;
 +
 +	if (s == NULL)
 +		s = "";
 +	while ((c = *s++) != 0 && l > 0) {
 +		if (c >= 0x80 || map[c] == 0)
 +		 {
 +			/* illegal character */
 +			if (c >= 'a' && c <= 'z') {
 +				/* convert c from a-z to A-Z */
 +				c -= 0x20;
 +			} else
 +				c = 0x5f;
 +		}
 +		*p++ = c;
 +		l--;
 +	}
 +	/* If l isn't zero, fill p buffer by the character
 +	 * which indicated by f. */
 +	if (l > 0)
 +		memset(p , f, l);
 +}
 +
 +static inline int
 +joliet_allowed_char(unsigned char high, unsigned char low)
 +{
 +	int utf16 = (high << 8) | low;
 +
 +	if (utf16 <= 0x001F)
 +		return (0);
 +
 +	switch (utf16) {
 +	case 0x002A: /* '*' */
 +	case 0x002F: /* '/' */
 +	case 0x003A: /* ':' */
 +	case 0x003B: /* ';' */
 +	case 0x003F: /* '?' */
 +	case 0x005C: /* '\' */
 +		return (0);/* Not allowed. */
 +	}
 +	return (1);
 +}
 +
 +static int
 +set_str_utf16be(struct archive_write *a, unsigned char *p, const char *s,
 +    size_t l, uint16_t uf, enum vdc vdc)
 +{
 +	size_t size, i;
 +	int onepad;
 +
 +	if (s == NULL)
 +		s = "";
 +	if (l & 0x01) {
 +		onepad = 1;
 +		l &= ~1;
 +	} else
 +		onepad = 0;
 +	if (vdc == VDC_UCS2) {
 +		struct iso9660 *iso9660 = a->format_data;
 +		if (archive_strncpy_l(&iso9660->utf16be, s, strlen(s),
 +		    iso9660->sconv_to_utf16be) != 0 && errno == ENOMEM) {
 +			archive_set_error(&a->archive, ENOMEM,
 +			    "Can't allocate memory for UTF-16BE");
 +			return (ARCHIVE_FATAL);
 +		}
 +		size = iso9660->utf16be.length;
 +		if (size > l)
 +			size = l;
 +		memcpy(p, iso9660->utf16be.s, size);
 +	} else {
 +		const uint16_t *u16 = (const uint16_t *)s;
 +
 +		size = 0;
 +		while (*u16++)
 +			size += 2;
 +		if (size > l)
 +			size = l;
 +		memcpy(p, s, size);
 +	}
 +	for (i = 0; i < size; i += 2, p += 2) {
 +		if (!joliet_allowed_char(p[0], p[1]))
 +			archive_be16enc(p, 0x005F);/* '_' */
 +	}
 +	l -= size;
 +	while (l > 0) {
 +		archive_be16enc(p, uf);
 +		p += 2;
 +		l -= 2;
 +	}
 +	if (onepad)
 +		*p = 0;
 +	return (ARCHIVE_OK);
 +}
 +
 +static const char a_characters_map[0x80] = {
 +/*  0  1  2  3  4  5  6  7  8  9  A  B  C  D  E  F          */
 +    0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0,/* 00-0F */
 +    0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0,/* 10-1F */
 +    1, 1, 1, 0, 0, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1,/* 20-2F */
 +    1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1,/* 30-3F */
 +    0, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1,/* 40-4F */
 +    1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 0, 0, 0, 0, 1,/* 50-5F */
 +    0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0,/* 60-6F */
 +    0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0,/* 70-7F */
 +};
 +
 +static const char a1_characters_map[0x80] = {
 +/*  0  1  2  3  4  5  6  7  8  9  A  B  C  D  E  F          */
 +    0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0,/* 00-0F */
 +    0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0,/* 10-1F */
 +    1, 1, 1, 0, 0, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1,/* 20-2F */
 +    1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1,/* 30-3F */
 +    0, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1,/* 40-4F */
 +    1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 0, 0, 0, 0, 1,/* 50-5F */
 +    0, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1,/* 60-6F */
 +    1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 0, 0, 0, 0, 0,/* 70-7F */
 +};
 +
 +static const char d_characters_map[0x80] = {
 +/*  0  1  2  3  4  5  6  7  8  9  A  B  C  D  E  F          */
 +    0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0,/* 00-0F */
 +    0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0,/* 10-1F */
 +    0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0,/* 20-2F */
 +    1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 0, 0, 0, 0, 0, 0,/* 30-3F */
 +    0, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1,/* 40-4F */
 +    1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 0, 0, 0, 0, 1,/* 50-5F */
 +    0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0,/* 60-6F */
 +    0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0,/* 70-7F */
 +};
 +
 +static const char d1_characters_map[0x80] = {
 +/*  0  1  2  3  4  5  6  7  8  9  A  B  C  D  E  F          */
 +    0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0,/* 00-0F */
 +    0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0,/* 10-1F */
 +    0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0,/* 20-2F */
 +    1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 0, 0, 0, 0, 0, 0,/* 30-3F */
 +    0, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1,/* 40-4F */
 +    1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 0, 0, 0, 0, 1,/* 50-5F */
 +    0, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1,/* 60-6F */
 +    1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 0, 0, 0, 0, 0,/* 70-7F */
 +};
 +
 +static int
 +set_str_a_characters_bp(struct archive_write *a, unsigned char *bp,
 +    int from, int to, const char *s, enum vdc vdc)
 +{
 +	int r;
 +
 +	switch (vdc) {
 +	case VDC_STD:
 +		set_str(bp+from, s, to - from + 1, 0x20,
 +		    a_characters_map);
 +		r = ARCHIVE_OK;
 +		break;
 +	case VDC_LOWERCASE:
 +		set_str(bp+from, s, to - from + 1, 0x20,
 +		    a1_characters_map);
 +		r = ARCHIVE_OK;
 +		break;
 +	case VDC_UCS2:
 +	case VDC_UCS2_DIRECT:
 +		r = set_str_utf16be(a, bp+from, s, to - from + 1,
 +		    0x0020, vdc);
 +		break;
 +	default:
 +		r = ARCHIVE_FATAL;
 +	}
 +	return (r);
 +}
 +
 +static int
 +set_str_d_characters_bp(struct archive_write *a, unsigned char *bp,
 +    int from, int to, const char *s, enum  vdc vdc)
 +{
 +	int r;
 +
 +	switch (vdc) {
 +	case VDC_STD:
 +		set_str(bp+from, s, to - from + 1, 0x20,
 +		    d_characters_map);
 +		r = ARCHIVE_OK;
 +		break;
 +	case VDC_LOWERCASE:
 +		set_str(bp+from, s, to - from + 1, 0x20,
 +		    d1_characters_map);
 +		r = ARCHIVE_OK;
 +		break;
 +	case VDC_UCS2:
 +	case VDC_UCS2_DIRECT:
 +		r = set_str_utf16be(a, bp+from, s, to - from + 1,
 +		    0x0020, vdc);
 +		break;
 +	default:
 +		r = ARCHIVE_FATAL;
 +	}
 +	return (r);
 +}
 +
 +static void
 +set_VD_bp(unsigned char *bp, enum VD_type type, unsigned char ver)
 +{
 +
 +	/* Volume Descriptor Type */
 +	bp[1] = (unsigned char)type;
 +	/* Standard Identifier */
 +	memcpy(bp + 2, "CD001", 5);
 +	/* Volume Descriptor Version */
 +	bp[7] = ver;
 +}
 +
 +static inline void
 +set_unused_field_bp(unsigned char *bp, int from, int to)
 +{
 +	memset(bp + from, 0, to - from + 1);
 +}
 +
 +/*
 + * 8-bit unsigned numerical values.
 + * ISO9660 Standard 7.1.1
 + */
 +static inline void
 +set_num_711(unsigned char *p, unsigned char value)
 +{
 +	*p = value;
 +}
 +
 +/*
 + * 8-bit signed numerical values.
 + * ISO9660 Standard 7.1.2
 + */
 +static inline void
 +set_num_712(unsigned char *p, char value)
 +{
 +	*((char *)p) = value;
 +}
 +
 +/*
 + * Least significant byte first.
 + * ISO9660 Standard 7.2.1
 + */
 +static inline void
 +set_num_721(unsigned char *p, uint16_t value)
 +{
 +	archive_le16enc(p, value);
 +}
 +
 +/*
 + * Most significant byte first.
 + * ISO9660 Standard 7.2.2
 + */
 +static inline void
 +set_num_722(unsigned char *p, uint16_t value)
 +{
 +	archive_be16enc(p, value);
 +}
 +
 +/*
 + * Both-byte orders.
 + * ISO9660 Standard 7.2.3
 + */
 +static void
 +set_num_723(unsigned char *p, uint16_t value)
 +{
 +	archive_le16enc(p, value);
 +	archive_be16enc(p+2, value);
 +}
 +
 +/*
 + * Least significant byte first.
 + * ISO9660 Standard 7.3.1
 + */
 +static inline void
 +set_num_731(unsigned char *p, uint32_t value)
 +{
 +	archive_le32enc(p, value);
 +}
 +
 +/*
 + * Most significant byte first.
 + * ISO9660 Standard 7.3.2
 + */
 +static inline void
 +set_num_732(unsigned char *p, uint32_t value)
 +{
 +	archive_be32enc(p, value);
 +}
 +
 +/*
 + * Both-byte orders.
 + * ISO9660 Standard 7.3.3
 + */
 +static inline void
 +set_num_733(unsigned char *p, uint32_t value)
 +{
 +	archive_le32enc(p, value);
 +	archive_be32enc(p+4, value);
 +}
 +
 +static void
 +set_digit(unsigned char *p, size_t s, int value)
 +{
 +
 +	while (s--) {
 +		p[s] = '0' + (value % 10);
 +		value /= 10;
 +	}
 +}
 +
 +#if defined(HAVE_STRUCT_TM_TM_GMTOFF)
 +#define get_gmoffset(tm)	((tm)->tm_gmtoff)
 +#elif defined(HAVE_STRUCT_TM___TM_GMTOFF)
 +#define get_gmoffset(tm)	((tm)->__tm_gmtoff)
 +#else
 +static long
 +get_gmoffset(struct tm *tm)
 +{
 +	long offset;
 +
 +#if defined(HAVE__GET_TIMEZONE)
 +	_get_timezone(&offset);
 +#elif defined(__CYGWIN__) || defined(__MINGW32__) || defined(__BORLANDC__)
 +	offset = _timezone;
 +#else
 +	offset = timezone;
 +#endif
 +	offset *= -1;
 +	if (tm->tm_isdst)
 +		offset += 3600;
 +	return (offset);
 +}
 +#endif
 +
 +static void
 +get_tmfromtime(struct tm *tm, time_t *t)
 +{
 +#if HAVE_LOCALTIME_R
 +	tzset();
 +	localtime_r(t, tm);
 +#elif HAVE__LOCALTIME64_S
- 	_localtime64_s(tm, t);
++	__time64_t tmp_t = (__time64_t) *t; //time_t may be shorter than 64 bits
++	_localtime64_s(tm, &tmp_t);
 +#else
 +	memcpy(tm, localtime(t), sizeof(*tm));
 +#endif
 +}
 +
 +/*
 + * Date and Time Format.
 + * ISO9660 Standard 8.4.26.1
 + */
 +static void
 +set_date_time(unsigned char *p, time_t t)
 +{
 +	struct tm tm;
 +
 +	get_tmfromtime(&tm, &t);
 +	set_digit(p, 4, tm.tm_year + 1900);
 +	set_digit(p+4, 2, tm.tm_mon + 1);
 +	set_digit(p+6, 2, tm.tm_mday);
 +	set_digit(p+8, 2, tm.tm_hour);
 +	set_digit(p+10, 2, tm.tm_min);
 +	set_digit(p+12, 2, tm.tm_sec);
 +	set_digit(p+14, 2, 0);
 +	set_num_712(p+16, (char)(get_gmoffset(&tm)/(60*15)));
 +}
 +
 +static void
 +set_date_time_null(unsigned char *p)
 +{
- 	memset(p, '0', 16);
++	memset(p, (int)'0', 16);
 +	p[16] = 0;
 +}
 +
 +static void
 +set_time_915(unsigned char *p, time_t t)
 +{
 +	struct tm tm;
 +
 +	get_tmfromtime(&tm, &t);
 +	set_num_711(p+0, tm.tm_year);
 +	set_num_711(p+1, tm.tm_mon+1);
 +	set_num_711(p+2, tm.tm_mday);
 +	set_num_711(p+3, tm.tm_hour);
 +	set_num_711(p+4, tm.tm_min);
 +	set_num_711(p+5, tm.tm_sec);
 +	set_num_712(p+6, (char)(get_gmoffset(&tm)/(60*15)));
 +}
 +
 +
 +/*
 + * Write SUSP "CE" System Use Entry.
 + */
 +static int
 +set_SUSP_CE(unsigned char *p, int location, int offset, int size)
 +{
 +	unsigned char *bp = p -1;
 +	/*  Extend the System Use Area
 +	 *   "CE" Format:
 +	 *               len  ver
 +	 *    +----+----+----+----+-----------+-----------+
 +	 *    | 'C'| 'E'| 1C | 01 | LOCATION1 | LOCATION2 |
 +	 *    +----+----+----+----+-----------+-----------+
 +	 *    0    1    2    3    4          12          20
 +	 *    +-----------+
 +	 *    | LOCATION3 |
 +	 *    +-----------+
 +	 *   20          28
 +	 *   LOCATION1 : Location of Continuation of System Use Area.
 +	 *   LOCATION2 : Offset to Start of Continuation.
 +	 *   LOCATION3 : Length of the Continuation.
 +	 */
 +
 +	bp[1] = 'C';
 +	bp[2] = 'E';
 +	bp[3] = RR_CE_SIZE;	/* length	*/
 +	bp[4] = 1;		/* version	*/
 +	set_num_733(bp+5, location);
 +	set_num_733(bp+13, offset);
 +	set_num_733(bp+21, size);
 +	return (RR_CE_SIZE);
 +}
 +
 +/*
 + * The functions, which names are beginning with extra_, are used to
 + * control extra records.
 + * The maximum size of a Directory Record is 254. When a filename is
 + * very long, all of RRIP data of a file won't stored to the Directory
 + * Record and so remaining RRIP data store to an extra record instead.
 + */
 +static unsigned char *
 +extra_open_record(unsigned char *bp, int dr_len, struct isoent *isoent,
 +    struct ctl_extr_rec *ctl)
 +{
 +	ctl->bp = bp;
 +	if (bp != NULL)
 +		bp += dr_len;
 +	ctl->use_extr = 0;
 +	ctl->isoent = isoent;
 +	ctl->ce_ptr = NULL;
 +	ctl->cur_len = ctl->dr_len = dr_len;
 +	ctl->limit = DR_LIMIT;
 +
 +	return (bp);
 +}
 +
 +static void
 +extra_close_record(struct ctl_extr_rec *ctl, int ce_size)
 +{
 +	int padding = 0;
 +
 +	if (ce_size > 0)
 +		extra_tell_used_size(ctl, ce_size);
 +	/* Padding. */
 +	if (ctl->cur_len & 0x01) {
 +		ctl->cur_len++;
 +		if (ctl->bp != NULL)
 +			ctl->bp[ctl->cur_len] = 0;
 +		padding = 1;
 +	}
 +	if (ctl->use_extr) {
 +		if (ctl->ce_ptr != NULL)
 +			set_SUSP_CE(ctl->ce_ptr, ctl->extr_loc,
 +			    ctl->extr_off, ctl->cur_len - padding);
 +	} else
 +		ctl->dr_len = ctl->cur_len;
 +}
 +
 +#define extra_space(ctl)	((ctl)->limit - (ctl)->cur_len)
 +
 +static unsigned char *
 +extra_next_record(struct ctl_extr_rec *ctl, int length)
 +{
 +	int cur_len = ctl->cur_len;/* save cur_len */
 +
 +	/* Close the current extra record or Directory Record. */
 +	extra_close_record(ctl, RR_CE_SIZE);
 +
 +	/* Get a next extra record. */
 +	ctl->use_extr = 1;
 +	if (ctl->bp != NULL) {
 +		/* Storing data into an extra record. */
 +		unsigned char *p;
 +
 +		/* Save the pointer where a CE extension will be
 +		 * stored to. */
 +		ctl->ce_ptr = &ctl->bp[cur_len+1];
 +		p = extra_get_record(ctl->isoent,
 +		    &ctl->limit, &ctl->extr_off, &ctl->extr_loc);
 +		ctl->bp = p - 1;/* the base of bp offset is 1. */
 +	} else
 +		/* Calculating the size of an extra record. */
 +		(void)extra_get_record(ctl->isoent,
 +		    &ctl->limit, NULL, NULL);
 +	ctl->cur_len = 0;
 +	/* Check if an extra record is almost full.
 +	 * If so, get a next one. */
 +	if (extra_space(ctl) < length)
 +		(void)extra_next_record(ctl, length);
 +
 +	return (ctl->bp);
 +}
 +
 +static inline struct extr_rec *
 +extra_last_record(struct isoent *isoent)
 +{
 +	if (isoent->extr_rec_list.first == NULL)
 +		return (NULL);
 +	return ((struct extr_rec *)(void *)
 +		((char *)(isoent->extr_rec_list.last)
 +		    - offsetof(struct extr_rec, next)));
 +}
 +
 +static unsigned char *
 +extra_get_record(struct isoent *isoent, int *space, int *off, int *loc)
 +{
 +	struct extr_rec *rec;
 +
 +	isoent = isoent->parent;
 +	if (off != NULL) {
 +		/* Storing data into an extra record. */
 +		rec = isoent->extr_rec_list.current;
 +		if (DR_SAFETY > LOGICAL_BLOCK_SIZE - rec->offset)
 +			rec = rec->next;
 +	} else {
 +		/* Calculating the size of an extra record. */
 +		rec = extra_last_record(isoent);
 +		if (rec == NULL ||
 +		    DR_SAFETY > LOGICAL_BLOCK_SIZE - rec->offset) {
 +			rec = malloc(sizeof(*rec));
 +			if (rec == NULL)
 +				return (NULL);
 +			rec->location = 0;
 +			rec->offset = 0;
 +			/* Insert `rec` into the tail of isoent->extr_rec_list */
 +			rec->next = NULL;
 +			/*
 +			 * Note: testing isoent->extr_rec_list.last == NULL
 +			 * here is really unneeded since it has been already
 +			 * initialized at isoent_new function but Clang Static
 +			 * Analyzer claims that it is dereference of null
 +			 * pointer.
 +			 */
 +			if (isoent->extr_rec_list.last == NULL)
 +				isoent->extr_rec_list.last =
 +					&(isoent->extr_rec_list.first);
 +			*isoent->extr_rec_list.last = rec;
 +			isoent->extr_rec_list.last = &(rec->next);
 +		}
 +	}
 +	*space = LOGICAL_BLOCK_SIZE - rec->offset - DR_SAFETY;
 +	if (*space & 0x01)
 +		*space -= 1;/* Keep padding space. */
 +	if (off != NULL)
 +		*off = rec->offset;
 +	if (loc != NULL)
 +		*loc = rec->location;
 +	isoent->extr_rec_list.current = rec;
 +
 +	return (&rec->buf[rec->offset]);
 +}
 +
 +static void
 +extra_tell_used_size(struct ctl_extr_rec *ctl, int size)
 +{
 +	struct isoent *isoent;
 +	struct extr_rec *rec;
 +
 +	if (ctl->use_extr) {
 +		isoent = ctl->isoent->parent;
 +		rec = isoent->extr_rec_list.current;
 +		if (rec != NULL)
 +			rec->offset += size;
 +	}
 +	ctl->cur_len += size;
 +}
 +
 +static int
 +extra_setup_location(struct isoent *isoent, int location)
 +{
 +	struct extr_rec *rec;
 +	int cnt;
 +
 +	cnt = 0;
 +	rec = isoent->extr_rec_list.first;
 +	isoent->extr_rec_list.current = rec;
 +	while (rec) {
 +		cnt++;
 +		rec->location = location++;
 +		rec->offset = 0;
 +		rec = rec->next;
 +	}
 +	return (cnt);
 +}
 +
 +/*
 + * Create the RRIP entries.
 + */
 +static int
 +set_directory_record_rr(unsigned char *bp, int dr_len,
 +    struct isoent *isoent, struct iso9660 *iso9660, enum dir_rec_type t)
 +{
 +	/* Flags(BP 5) of the Rockridge "RR" System Use Field */
 +	unsigned char rr_flag;
 +#define RR_USE_PX	0x01
 +#define RR_USE_PN	0x02
 +#define RR_USE_SL	0x04
 +#define RR_USE_NM	0x08
 +#define RR_USE_CL	0x10
 +#define RR_USE_PL	0x20
 +#define RR_USE_RE	0x40
 +#define RR_USE_TF	0x80
 +	int length;
 +	struct ctl_extr_rec ctl;
 +	struct isoent *rr_parent, *pxent;
 +	struct isofile *file;
 +
 +	bp = extra_open_record(bp, dr_len, isoent, &ctl);
 +
 +	if (t == DIR_REC_PARENT) {
 +		rr_parent = isoent->rr_parent;
 +		pxent = isoent->parent;
 +		if (rr_parent != NULL)
 +			isoent = rr_parent;
 +		else
 +			isoent = isoent->parent;
 +	} else {
 +		rr_parent = NULL;
 +		pxent = isoent;
 +	}
 +	file = isoent->file;
 +
 +	if (t != DIR_REC_NORMAL) {
 +		rr_flag = RR_USE_PX | RR_USE_TF;
 +		if (rr_parent != NULL)
 +			rr_flag |= RR_USE_PL;
 +	} else {
 +		rr_flag = RR_USE_PX | RR_USE_NM | RR_USE_TF;
 +		if (archive_entry_filetype(file->entry) == AE_IFLNK)
 +			rr_flag |= RR_USE_SL;
 +		if (isoent->rr_parent != NULL)
 +			rr_flag |= RR_USE_RE;
 +		if (isoent->rr_child != NULL)
 +			rr_flag |= RR_USE_CL;
 +		if (archive_entry_filetype(file->entry) == AE_IFCHR ||
 +		    archive_entry_filetype(file->entry) == AE_IFBLK)
 +			rr_flag |= RR_USE_PN;
 +#ifdef COMPAT_MKISOFS
 +		/*
 +		 * mkisofs 2.01.01a63 records "RE" extension to
 +		 * the entry of "rr_moved" directory.
 +		 * I don't understand this behavior.
 +		 */
 +		if (isoent->virtual &&
 +		    isoent->parent == iso9660->primary.rootent &&
 +		    strcmp(isoent->file->basename.s, "rr_moved") == 0)
 +			rr_flag |= RR_USE_RE;
 +#endif
 +	}
 +
 +	/* Write "SP" System Use Entry. */
 +	if (t == DIR_REC_SELF && isoent == isoent->parent) {
 +		length = 7;
 +		if (bp != NULL) {
 +			bp[1] = 'S';
 +			bp[2] = 'P';
 +			bp[3] = length;
 +			bp[4] = 1;	/* version	*/
 +			bp[5] = 0xBE;  /* Check Byte	*/
 +			bp[6] = 0xEF;  /* Check Byte	*/
 +			bp[7] = 0;
 +			bp += length;
 +		}
 +		extra_tell_used_size(&ctl, length);
 +	}
 +
 +	/* Write "RR" System Use Entry. */
 +	length = 5;
 +	if (extra_space(&ctl) < length)
 +		bp = extra_next_record(&ctl, length);
 +	if (bp != NULL) {
 +		bp[1] = 'R';
 +		bp[2] = 'R';
 +		bp[3] = length;
 +		bp[4] = 1;	/* version */
 +		bp[5] = rr_flag;
 +		bp += length;
 +	}
 +	extra_tell_used_size(&ctl, length);
 +
 +	/* Write "NM" System Use Entry. */
 +	if (rr_flag & RR_USE_NM) {
 +		/*
 +		 *   "NM" Format:
 +		 *     e.g. a basename is 'foo'
 +		 *               len  ver  flg
 +		 *    +----+----+----+----+----+----+----+----+
 +		 *    | 'N'| 'M'| 08 | 01 | 00 | 'f'| 'o'| 'o'|
 +		 *    +----+----+----+----+----+----+----+----+
 +		 *    <----------------- len ----------------->
 +		 */
 +		size_t nmlen = file->basename.length;
 +		const char *nm = file->basename.s;
 +		size_t nmmax;
 +
 +		if (extra_space(&ctl) < 6)
 +			bp = extra_next_record(&ctl, 6);
 +		if (bp != NULL) {
 +			bp[1] = 'N';
 +			bp[2] = 'M';
 +			bp[4] = 1;	    /* version	*/
 +		}
 +		nmmax = extra_space(&ctl);
 +		if (nmmax > 0xff)
 +			nmmax = 0xff;
 +		while (nmlen + 5 > nmmax) {
 +			length = (int)nmmax;
 +			if (bp != NULL) {
 +				bp[3] = length;
 +				bp[5] = 0x01;/* Alternate Name continues
 +					       * in next "NM" field */
 +				memcpy(bp+6, nm, length - 5);
 +				bp += length;
 +			}
 +			nmlen -= length - 5;
 +			nm += length - 5;
 +			extra_tell_used_size(&ctl, length);
 +			if (extra_space(&ctl) < 6) {
 +				bp = extra_next_record(&ctl, 6);
 +				nmmax = extra_space(&ctl);
 +				if (nmmax > 0xff)
 +					nmmax = 0xff;
 +			}
 +			if (bp != NULL) {
 +				bp[1] = 'N';
 +				bp[2] = 'M';
 +				bp[4] = 1;    /* version */
 +			}
 +		}
 +		length = 5 + (int)nmlen;
 +		if (bp != NULL) {
 +			bp[3] = length;
 +			bp[5] = 0;
 +			memcpy(bp+6, nm, nmlen);
 +			bp += length;
 +		}
 +		extra_tell_used_size(&ctl, length);
 +	}
 +
 +	/* Write "PX" System Use Entry. */
 +	if (rr_flag & RR_USE_PX) {
 +		/*
 +		 *   "PX" Format:
 +		 *               len  ver
 +		 *    +----+----+----+----+-----------+-----------+
 +		 *    | 'P'| 'X'| 2C | 01 | FILE MODE |   LINKS   |
 +		 *    +----+----+----+----+-----------+-----------+
 +		 *    0    1    2    3    4          12          20
 +		 *    +-----------+-----------+------------------+
 +		 *    |  USER ID  | GROUP ID  |FILE SERIAL NUMBER|
 +		 *    +-----------+-----------+------------------+
 +		 *   20          28          36                 44
 +		 */
 +		length = 44;
 +		if (extra_space(&ctl) < length)
 +			bp = extra_next_record(&ctl, length);
 +		if (bp != NULL) {
 +			mode_t mode;
 +			int64_t uid;
 +			int64_t gid;
 +
 +			mode = archive_entry_mode(file->entry);
 +			uid = archive_entry_uid(file->entry);
 +			gid = archive_entry_gid(file->entry);
 +			if (iso9660->opt.rr == OPT_RR_USEFUL) {
 +				/*
- 				 * This action is simular mkisofs -r option
++				 * This action is similar to mkisofs -r option
 +				 * but our rockridge=useful option does not
 +				 * set a zero to uid and gid.
 +				 */
 +				/* set all read bit ON */
 +				mode |= 0444;
 +#if !defined(_WIN32) && !defined(__CYGWIN__)
 +				if (mode & 0111)
 +#endif
 +					/* set all exec bit ON */
 +					mode |= 0111;
 +				/* clear all write bits. */
 +				mode &= ~0222;
 +				/* clear setuid,setgid,sticky bits. */
 +				mode &= ~07000;
 +			}
 +
 +			bp[1] = 'P';
 +			bp[2] = 'X';
 +			bp[3] = length;
 +			bp[4] = 1;	/* version	*/
 +			/* file mode */
 +			set_num_733(bp+5, mode);
 +			/* file links (stat.st_nlink) */
 +			set_num_733(bp+13,
 +			    archive_entry_nlink(file->entry));
 +			set_num_733(bp+21, (uint32_t)uid);
 +			set_num_733(bp+29, (uint32_t)gid);
 +			/* File Serial Number */
 +			if (pxent->dir)
 +				set_num_733(bp+37, pxent->dir_location);
 +			else if (file->hardlink_target != NULL)
 +				set_num_733(bp+37,
 +				    file->hardlink_target->cur_content->location);
 +			else
 +				set_num_733(bp+37,
 +				    file->cur_content->location);
 +			bp += length;
 +		}
 +		extra_tell_used_size(&ctl, length);
 +	}
 +
 +	/* Write "SL" System Use Entry. */
 +	if (rr_flag & RR_USE_SL) {
 +		/*
 +		 *   "SL" Format:
 +		 *     e.g. a symbolic name is 'foo/bar'
 +		 *               len  ver  flg
 +		 *    +----+----+----+----+----+------------+
 +		 *    | 'S'| 'L'| 0F | 01 | 00 | components |
 +		 *    +----+----+----+----+----+-----+------+
 +		 *    0    1    2    3    4    5  ...|...  15
 +		 *    <----------------- len --------+------>
 +		 *    components :                   |
 +		 *     cflg clen                     |
 +		 *    +----+----+----+----+----+     |
 +		 *    | 00 | 03 | 'f'| 'o'| 'o'| <---+
 +		 *    +----+----+----+----+----+     |
 +		 *    5    6    7    8    9   10     |
 +		 *     cflg clen                     |
 +		 *    +----+----+----+----+----+     |
 +		 *    | 00 | 03 | 'b'| 'a'| 'r'| <---+
 +		 *    +----+----+----+----+----+
 +		 *   10   11   12   13   14   15
 +		 *
- 	 	 *    - cflg : flag of componet
- 		 *    - clen : length of componet
++		 *    - cflg : flag of component
++		 *    - clen : length of component
 +		 */
 +		const char *sl;
 +		char sl_last;
 +
 +		if (extra_space(&ctl) < 7)
 +			bp = extra_next_record(&ctl, 7);
 +		sl = file->symlink.s;
 +		sl_last = '\0';
 +		if (bp != NULL) {
 +			bp[1] = 'S';
 +			bp[2] = 'L';
 +			bp[4] = 1;	/* version	*/
 +		}
 +		for (;;) {
 +			unsigned char *nc, *cf,  *cl, cldmy = 0;
 +			int sllen, slmax;
 +
 +			slmax = extra_space(&ctl);
 +			if (slmax > 0xff)
 +				slmax = 0xff;
 +			if (bp != NULL)
 +				nc = &bp[6];
 +			else
 +				nc = NULL;
 +			cf = cl = NULL;
 +			sllen = 0;
 +			while (*sl && sllen + 11 < slmax) {
 +				if (sl_last == '\0' && sl[0] == '/') {
 +					/*
 +					 *     flg  len
 +					 *    +----+----+
 +					 *    | 08 | 00 | ROOT component.
 +					 *    +----+----+ ("/")
 +					 *
 +				 	 * Root component has to appear
 +				 	 * at the first component only.
 +					 */
 +					if (nc != NULL) {
 +						cf = nc++;
 +						*cf = 0x08; /* ROOT */
 +						*nc++ = 0;
 +					}
 +					sllen += 2;
 +					sl++;
 +					sl_last = '/';
 +					cl = NULL;
 +					continue;
 +				}
 +				if (((sl_last == '\0' || sl_last == '/') &&
 +				      sl[0] == '.' && sl[1] == '.' &&
 +				     (sl[2] == '/' || sl[2] == '\0')) ||
 +				    (sl[0] == '/' &&
 +				      sl[1] == '.' && sl[2] == '.' &&
 +				     (sl[3] == '/' || sl[3] == '\0'))) {
 +					/*
 +					 *     flg  len
 +					 *    +----+----+
 +					 *    | 04 | 00 | PARENT component.
 +					 *    +----+----+ ("..")
 +					 */
 +					if (nc != NULL) {
 +						cf = nc++;
 +						*cf = 0x04; /* PARENT */
 +						*nc++ = 0;
 +					}
 +					sllen += 2;
 +					if (sl[0] == '/')
 +						sl += 3;/* skip "/.." */
 +					else
 +						sl += 2;/* skip ".." */
 +					sl_last = '.';
 +					cl = NULL;
 +					continue;
 +				}
 +				if (((sl_last == '\0' || sl_last == '/') &&
 +				      sl[0] == '.' &&
 +				     (sl[1] == '/' || sl[1] == '\0')) ||
 +				    (sl[0] == '/' && sl[1] == '.' &&
 +				     (sl[2] == '/' || sl[2] == '\0'))) {
 +					/*
 +					 *     flg  len
 +					 *    +----+----+
- 					 *    | 02 | 00 | CURREENT component.
++					 *    | 02 | 00 | CURRENT component.
 +					 *    +----+----+ (".")
 +					 */
 +					if (nc != NULL) {
 +						cf = nc++;
 +						*cf = 0x02; /* CURRENT */
 +						*nc++ = 0;
 +					}
 +					sllen += 2;
 +					if (sl[0] == '/')
 +						sl += 2;/* skip "/." */
 +					else
 +						sl ++;  /* skip "." */
 +					sl_last = '.';
 +					cl = NULL;
 +					continue;
 +				}
 +				if (sl[0] == '/' || cl == NULL) {
 +					if (nc != NULL) {
 +						cf = nc++;
 +						*cf = 0;
 +						cl = nc++;
 +						*cl = 0;
 +					} else
 +						cl = &cldmy;
 +					sllen += 2;
 +					if (sl[0] == '/') {
 +						sl_last = *sl++;
 +						continue;
 +					}
 +				}
 +				sl_last = *sl++;
 +				if (nc != NULL) {
 +					*nc++ = sl_last;
 +					(*cl) ++;
 +				}
 +				sllen++;
 +			}
 +			if (*sl) {
 +				length = 5 + sllen;
 +				if (bp != NULL) {
 +					/*
 +					 * Mark flg as CONTINUE component.
 +					 */
 +					*cf |= 0x01;
 +					/*
 +					 *               len  ver  flg
 +					 *    +----+----+----+----+----+-
 +					 *    | 'S'| 'L'| XX | 01 | 01 |
 +					 *    +----+----+----+----+----+-
 +					 *                           ^
 +					 *           continues in next "SL"
 +					 */
 +					bp[3] = length;
 +					bp[5] = 0x01;/* This Symbolic Link
 +						      * continues in next
 +						      * "SL" field */
 +					bp += length;
 +				}
 +				extra_tell_used_size(&ctl, length);
 +				if (extra_space(&ctl) < 11)
 +					bp = extra_next_record(&ctl, 11);
 +				if (bp != NULL) {
 +					/* Next 'SL' */
 +					bp[1] = 'S';
 +					bp[2] = 'L';
 +					bp[4] = 1;    /* version */
 +				}
 +			} else {
 +				length = 5 + sllen;
 +				if (bp != NULL) {
 +					bp[3] = length;
 +					bp[5] = 0;
 +					bp += length;
 +				}
 +				extra_tell_used_size(&ctl, length);
 +				break;
 +			}
 +		}
 +	}
 +
 +	/* Write "TF" System Use Entry. */
 +	if (rr_flag & RR_USE_TF) {
 +		/*
 +		 *   "TF" Format:
 +		 *               len  ver
 +		 *    +----+----+----+----+-----+-------------+
 +		 *    | 'T'| 'F'| XX | 01 |FLAGS| TIME STAMPS |
 +		 *    +----+----+----+----+-----+-------------+
 +		 *    0    1    2    3    4     5            XX
 +		 *    TIME STAMPS : ISO 9660 Standard 9.1.5.
 +		 *                  If TF_LONG_FORM FLAGS is set,
 +		 *                  use ISO9660 Standard 8.4.26.1.
 +		 */
 +#define TF_CREATION	0x01	/* Creation time recorded		*/
 +#define TF_MODIFY	0x02	/* Modification time recorded		*/
 +#define TF_ACCESS	0x04	/* Last Access time recorded		*/
 +#define TF_ATTRIBUTES	0x08	/* Last Attribute Change time recorded  */
 +#define TF_BACKUP	0x10	/* Last Backup time recorded		*/
 +#define TF_EXPIRATION	0x20	/* Expiration time recorded		*/
 +#define TF_EFFECTIVE	0x40	/* Effective time recorded		*/
 +#define TF_LONG_FORM	0x80	/* ISO 9660 17-byte time format used	*/
 +		unsigned char tf_flags;
 +
 +		length = 5;
 +		tf_flags = 0;
 +#ifndef COMPAT_MKISOFS
 +		if (archive_entry_birthtime_is_set(file->entry) &&
 +		    archive_entry_birthtime(file->entry) <=
 +		    archive_entry_mtime(file->entry)) {
 +			length += 7;
 +			tf_flags |= TF_CREATION;
 +		}
 +#endif
 +		if (archive_entry_mtime_is_set(file->entry)) {
 +			length += 7;
 +			tf_flags |= TF_MODIFY;
 +		}
 +		if (archive_entry_atime_is_set(file->entry)) {
 +			length += 7;
 +			tf_flags |= TF_ACCESS;
 +		}
 +		if (archive_entry_ctime_is_set(file->entry)) {
 +			length += 7;
 +			tf_flags |= TF_ATTRIBUTES;
 +		}
 +		if (extra_space(&ctl) < length)
 +			bp = extra_next_record(&ctl, length);
 +		if (bp != NULL) {
 +			bp[1] = 'T';
 +			bp[2] = 'F';
 +			bp[3] = length;
 +			bp[4] = 1;	/* version	*/
 +			bp[5] = tf_flags;
 +			bp += 5;
 +			/* Creation time */
 +			if (tf_flags & TF_CREATION) {
 +				set_time_915(bp+1,
 +				    archive_entry_birthtime(file->entry));
 +				bp += 7;
 +			}
 +			/* Modification time */
 +			if (tf_flags & TF_MODIFY) {
 +				set_time_915(bp+1,
 +				    archive_entry_mtime(file->entry));
 +				bp += 7;
 +			}
 +			/* Last Access time */
 +			if (tf_flags & TF_ACCESS) {
 +				set_time_915(bp+1,
 +				    archive_entry_atime(file->entry));
 +				bp += 7;
 +			}
 +			/* Last Attribute Change time */
 +			if (tf_flags & TF_ATTRIBUTES) {
 +				set_time_915(bp+1,
 +				    archive_entry_ctime(file->entry));
 +				bp += 7;
 +			}
 +		}
 +		extra_tell_used_size(&ctl, length);
 +	}
 +
 +	/* Write "RE" System Use Entry. */
 +	if (rr_flag & RR_USE_RE) {
 +		/*
 +		 *   "RE" Format:
 +		 *               len  ver
 +		 *    +----+----+----+----+
 +		 *    | 'R'| 'E'| 04 | 01 |
 +		 *    +----+----+----+----+
 +		 *    0    1    2    3    4
 +		 */
 +		length = 4;
 +		if (extra_space(&ctl) < length)
 +			bp = extra_next_record(&ctl, length);
 +		if (bp != NULL) {
 +			bp[1] = 'R';
 +			bp[2] = 'E';
 +			bp[3] = length;
 +			bp[4] = 1;	/* version	*/
 +			bp += length;
 +		}
 +		extra_tell_used_size(&ctl, length);
 +	}
 +
 +	/* Write "PL" System Use Entry. */
 +	if (rr_flag & RR_USE_PL) {
 +		/*
 +		 *   "PL" Format:
 +		 *               len  ver
 +		 *    +----+----+----+----+------------+
 +		 *    | 'P'| 'L'| 0C | 01 | *LOCATION  |
 +		 *    +----+----+----+----+------------+
 +		 *    0    1    2    3    4           12
 +		 *    *LOCATION: location of parent directory
 +		 */
 +		length = 12;
 +		if (extra_space(&ctl) < length)
 +			bp = extra_next_record(&ctl, length);
 +		if (bp != NULL) {
 +			bp[1] = 'P';
 +			bp[2] = 'L';
 +			bp[3] = length;
 +			bp[4] = 1;	/* version	*/
 +			set_num_733(bp + 5,
 +			    rr_parent->dir_location);
 +			bp += length;
 +		}
 +		extra_tell_used_size(&ctl, length);
 +	}
 +
 +	/* Write "CL" System Use Entry. */
 +	if (rr_flag & RR_USE_CL) {
 +		/*
 +		 *   "CL" Format:
 +		 *               len  ver
 +		 *    +----+----+----+----+------------+
 +		 *    | 'C'| 'L'| 0C | 01 | *LOCATION  |
 +		 *    +----+----+----+----+------------+
 +		 *    0    1    2    3    4           12
 +		 *    *LOCATION: location of child directory
 +		 */
 +		length = 12;
 +		if (extra_space(&ctl) < length)
 +			bp = extra_next_record(&ctl, length);
 +		if (bp != NULL) {
 +			bp[1] = 'C';
 +			bp[2] = 'L';
 +			bp[3] = length;
 +			bp[4] = 1;	/* version	*/
 +			set_num_733(bp + 5,
 +			    isoent->rr_child->dir_location);
 +			bp += length;
 +		}
 +		extra_tell_used_size(&ctl, length);
 +	}
 +
 +	/* Write "PN" System Use Entry. */
 +	if (rr_flag & RR_USE_PN) {
 +		/*
 +		 *   "PN" Format:
 +		 *               len  ver
 +		 *    +----+----+----+----+------------+------------+
 +		 *    | 'P'| 'N'| 14 | 01 | dev_t high | dev_t low  |
 +		 *    +----+----+----+----+------------+------------+
 +		 *    0    1    2    3    4           12           20
 +		 */
 +		length = 20;
 +		if (extra_space(&ctl) < length)
 +			bp = extra_next_record(&ctl, length);
 +		if (bp != NULL) {
 +			uint64_t dev;
 +
 +			bp[1] = 'P';
 +			bp[2] = 'N';
 +			bp[3] = length;
 +			bp[4] = 1;	/* version	*/
 +			dev = (uint64_t)archive_entry_rdev(file->entry);
 +			set_num_733(bp + 5, (uint32_t)(dev >> 32));
 +			set_num_733(bp + 13, (uint32_t)(dev & 0xFFFFFFFF));
 +			bp += length;
 +		}
 +		extra_tell_used_size(&ctl, length);
 +	}
 +
 +	/* Write "ZF" System Use Entry. */
 +	if (file->zisofs.header_size) {
 +		/*
 +		 *   "ZF" Format:
 +		 *               len  ver
 +		 *    +----+----+----+----+----+----+-------------+
 +		 *    | 'Z'| 'F'| 10 | 01 | 'p'| 'z'| Header Size |
 +		 *    +----+----+----+----+----+----+-------------+
 +		 *    0    1    2    3    4    5    6             7
 +		 *    +--------------------+-------------------+
 +		 *    | Log2 of block Size | Uncompressed Size |
 +		 *    +--------------------+-------------------+
 +		 *    7                    8                   16
 +		 */
 +		length = 16;
 +		if (extra_space(&ctl) < length)
 +			bp = extra_next_record(&ctl, length);
 +		if (bp != NULL) {
 +			bp[1] = 'Z';
 +			bp[2] = 'F';
 +			bp[3] = length;
 +			bp[4] = 1;	/* version	*/
 +			bp[5] = 'p';
 +			bp[6] = 'z';
 +			bp[7] = file->zisofs.header_size;
 +			bp[8] = file->zisofs.log2_bs;
 +			set_num_733(bp + 9, file->zisofs.uncompressed_size);
 +			bp += length;
 +		}
 +		extra_tell_used_size(&ctl, length);
 +	}
 +
 +	/* Write "CE" System Use Entry. */
 +	if (t == DIR_REC_SELF && isoent == isoent->parent) {
 +		length = RR_CE_SIZE;
 +		if (bp != NULL)
 +			set_SUSP_CE(bp+1, iso9660->location_rrip_er,
 +			    0, RRIP_ER_SIZE);
 +		extra_tell_used_size(&ctl, length);
 +	}
 +
 +	extra_close_record(&ctl, 0);
 +
 +	return (ctl.dr_len);
 +}
 +
 +/*
 + * Write data of a Directory Record or calculate writing bytes itself.
 + * If parameter `p' is NULL, calculates the size of writing data, which
 + * a Directory Record needs to write, then it saved and return
 + * the calculated size.
 + * Parameter `n' is a remaining size of buffer. when parameter `p' is
 + * not NULL, check whether that `n' is not less than the saved size.
 + * if that `n' is small, return zero.
 + *
 + * This format of the Directory Record is according to
 + * ISO9660 Standard 9.1
 + */
 +static int
 +set_directory_record(unsigned char *p, size_t n, struct isoent *isoent,
 +    struct iso9660 *iso9660, enum dir_rec_type t,
 +    enum vdd_type vdd_type)
 +{
 +	unsigned char *bp;
 +	size_t dr_len;
 +	size_t fi_len;
 +
 +	if (p != NULL) {
 +		/*
 +		 * Check whether a write buffer size is less than the
 +		 * saved size which is needed to write this Directory
 +		 * Record.
 +		 */
 +		switch (t) {
 +		case DIR_REC_VD:
 +			dr_len = isoent->dr_len.vd; break;
 +		case DIR_REC_SELF:
 +			dr_len = isoent->dr_len.self; break;
 +		case DIR_REC_PARENT:
 +			dr_len = isoent->dr_len.parent; break;
 +		case DIR_REC_NORMAL:
 +		default:
 +			dr_len = isoent->dr_len.normal; break;
 +		}
 +		if (dr_len > n)
 +			return (0);/* Needs more buffer size. */
 +	}
 +
 +	if (t == DIR_REC_NORMAL && isoent->identifier != NULL)
 +		fi_len = isoent->id_len;
 +	else
 +		fi_len = 1;
 +
 +	if (p != NULL) {
 +		struct isoent *xisoent;
 +		struct isofile *file;
 +		unsigned char flag;
 +
 +		if (t == DIR_REC_PARENT)
 +			xisoent = isoent->parent;
 +		else
 +			xisoent = isoent;
 +		file = isoent->file;
 +		if (file->hardlink_target != NULL)
 +			file = file->hardlink_target;
 +		/* Make a file flag. */
 +		if (xisoent->dir)
 +			flag = FILE_FLAG_DIRECTORY;
 +		else {
 +			if (file->cur_content->next != NULL)
 +				flag = FILE_FLAG_MULTI_EXTENT;
 +			else
 +				flag = 0;
 +		}
 +
 +		bp = p -1;
 +		/* Extended Attribute Record Length */
 +		set_num_711(bp+2, 0);
 +		/* Location of Extent */
 +		if (xisoent->dir)
 +			set_num_733(bp+3, xisoent->dir_location);
 +		else
 +			set_num_733(bp+3, file->cur_content->location);
 +		/* Data Length */
 +		if (xisoent->dir)
 +			set_num_733(bp+11,
 +			    xisoent->dir_block * LOGICAL_BLOCK_SIZE);
 +		else
 +			set_num_733(bp+11, (uint32_t)file->cur_content->size);
 +		/* Recording Date and Time */
 +		/* NOTE:
 +		 *  If a file type is symbolic link, you are seeing this
 +		 *  field value is different from a value mkisofs makes.
 +		 *  libarchive uses lstat to get this one, but it
 +		 *  seems mkisofs uses stat to get.
 +		 */
 +		set_time_915(bp+19,
 +		    archive_entry_mtime(xisoent->file->entry));
 +		/* File Flags */
 +		bp[26] = flag;
 +		/* File Unit Size */
 +		set_num_711(bp+27, 0);
 +		/* Interleave Gap Size */
 +		set_num_711(bp+28, 0);
 +		/* Volume Sequence Number */
 +		set_num_723(bp+29, iso9660->volume_sequence_number);
 +		/* Length of File Identifier */
 +		set_num_711(bp+33, (unsigned char)fi_len);
 +		/* File Identifier */
 +		switch (t) {
 +		case DIR_REC_VD:
 +		case DIR_REC_SELF:
 +			set_num_711(bp+34, 0);
 +			break;
 +		case DIR_REC_PARENT:
 +			set_num_711(bp+34, 1);
 +			break;
 +		case DIR_REC_NORMAL:
 +			if (isoent->identifier != NULL)
 +				memcpy(bp+34, isoent->identifier, fi_len);
 +			else
 +				set_num_711(bp+34, 0);
 +			break;
 +		}
 +	} else
 +		bp = NULL;
 +	dr_len = 33 + fi_len;
 +	/* Padding Field */
 +	if (dr_len & 0x01) {
 +		dr_len ++;
 +		if (p != NULL)
 +			bp[dr_len] = 0;
 +	}
 +
 +	/* Volume Descriptor does not record extension. */
 +	if (t == DIR_REC_VD) {
 +		if (p != NULL)
 +			/* Length of Directory Record */
 +			set_num_711(p, (unsigned char)dr_len);
 +		else
 +			isoent->dr_len.vd = (int)dr_len;
 +		return ((int)dr_len);
 +	}
 +
 +	/* Rockridge */
 +	if (iso9660->opt.rr && vdd_type != VDD_JOLIET)
 +		dr_len = set_directory_record_rr(bp, (int)dr_len,
 +		    isoent, iso9660, t);
 +
 +	if (p != NULL)
 +		/* Length of Directory Record */
 +		set_num_711(p, (unsigned char)dr_len);
 +	else {
 +		/*
 +		 * Save the size which is needed to write this
 +		 * Directory Record.
 +		 */
 +		switch (t) {
 +		case DIR_REC_VD:
 +			/* This case does not come, but compiler
 +			 * complains that DIR_REC_VD not handled
 +			 *  in switch ....  */
 +			break;
 +		case DIR_REC_SELF:
 +			isoent->dr_len.self = (int)dr_len; break;
 +		case DIR_REC_PARENT:
 +			isoent->dr_len.parent = (int)dr_len; break;
 +		case DIR_REC_NORMAL:
 +			isoent->dr_len.normal = (int)dr_len; break;
 +		}
 +	}
 +
 +	return ((int)dr_len);
 +}
 +
 +/*
 + * Calculate the size of a directory record.
 + */
 +static inline int
 +get_dir_rec_size(struct iso9660 *iso9660, struct isoent *isoent,
 +    enum dir_rec_type t, enum vdd_type vdd_type)
 +{
 +
 +	return (set_directory_record(NULL, SIZE_MAX,
 +	    isoent, iso9660, t, vdd_type));
 +}
 +
 +/*
 + * Manage to write ISO-image data with wbuff to reduce calling
 + * __archive_write_output() for performance.
 + */
 +
 +
 +static inline unsigned char *
 +wb_buffptr(struct archive_write *a)
 +{
 +	struct iso9660 *iso9660 = (struct iso9660 *)a->format_data;
 +
 +	return (&(iso9660->wbuff[sizeof(iso9660->wbuff)
 +		- iso9660->wbuff_remaining]));
 +}
 +
 +static int
 +wb_write_out(struct archive_write *a)
 +{
 +	struct iso9660 *iso9660 = (struct iso9660 *)a->format_data;
 +	size_t wsize, nw;
 +	int r;
 +
 +	wsize = sizeof(iso9660->wbuff) - iso9660->wbuff_remaining;
 +	nw = wsize % LOGICAL_BLOCK_SIZE;
 +	if (iso9660->wbuff_type == WB_TO_STREAM)
 +		r = __archive_write_output(a, iso9660->wbuff, wsize - nw);
 +	else
 +		r = write_to_temp(a, iso9660->wbuff, wsize - nw);
 +	/* Increase the offset. */
 +	iso9660->wbuff_offset += wsize - nw;
 +	if (iso9660->wbuff_offset > iso9660->wbuff_written)
 +		iso9660->wbuff_written = iso9660->wbuff_offset;
 +	iso9660->wbuff_remaining = sizeof(iso9660->wbuff);
 +	if (nw) {
 +		iso9660->wbuff_remaining -= nw;
 +		memmove(iso9660->wbuff, iso9660->wbuff + wsize - nw, nw);
 +	}
 +	return (r);
 +}
 +
 +static int
 +wb_consume(struct archive_write *a, size_t size)
 +{
 +	struct iso9660 *iso9660 = (struct iso9660 *)a->format_data;
 +
 +	if (size > iso9660->wbuff_remaining ||
 +	    iso9660->wbuff_remaining == 0) {
 +		archive_set_error(&a->archive, ARCHIVE_ERRNO_MISC,
 +		    "Internal Programing error: iso9660:wb_consume()"
 +		    " size=%jd, wbuff_remaining=%jd",
 +		    (intmax_t)size, (intmax_t)iso9660->wbuff_remaining);
 +		return (ARCHIVE_FATAL);
 +	}
 +	iso9660->wbuff_remaining -= size;
 +	if (iso9660->wbuff_remaining < LOGICAL_BLOCK_SIZE)
 +		return (wb_write_out(a));
 +	return (ARCHIVE_OK);
 +}
 +
 +#ifdef HAVE_ZLIB_H
 +
 +static int
 +wb_set_offset(struct archive_write *a, int64_t off)
 +{
 +	struct iso9660 *iso9660 = (struct iso9660 *)a->format_data;
 +	int64_t used, ext_bytes;
 +
 +	if (iso9660->wbuff_type != WB_TO_TEMP) {
 +		archive_set_error(&a->archive, ARCHIVE_ERRNO_MISC,
 +		    "Internal Programing error: iso9660:wb_set_offset()");
 +		return (ARCHIVE_FATAL);
 +	}
 +
 +	used = sizeof(iso9660->wbuff) - iso9660->wbuff_remaining;
 +	if (iso9660->wbuff_offset + used > iso9660->wbuff_tail)
 +		iso9660->wbuff_tail = iso9660->wbuff_offset + used;
 +	if (iso9660->wbuff_offset < iso9660->wbuff_written) {
 +		if (used > 0 &&
 +		    write_to_temp(a, iso9660->wbuff, (size_t)used) != ARCHIVE_OK)
 +			return (ARCHIVE_FATAL);
 +		iso9660->wbuff_offset = iso9660->wbuff_written;
 +		lseek(iso9660->temp_fd, iso9660->wbuff_offset, SEEK_SET);
 +		iso9660->wbuff_remaining = sizeof(iso9660->wbuff);
 +		used = 0;
 +	}
 +	if (off < iso9660->wbuff_offset) {
 +		/*
 +		 * Write out waiting data.
 +		 */
 +		if (used > 0) {
 +			if (wb_write_out(a) != ARCHIVE_OK)
 +				return (ARCHIVE_FATAL);
 +		}
 +		lseek(iso9660->temp_fd, off, SEEK_SET);
 +		iso9660->wbuff_offset = off;
 +		iso9660->wbuff_remaining = sizeof(iso9660->wbuff);
 +	} else if (off <= iso9660->wbuff_tail) {
 +		iso9660->wbuff_remaining = (size_t)
 +		    (sizeof(iso9660->wbuff) - (off - iso9660->wbuff_offset));
 +	} else {
 +		ext_bytes = off - iso9660->wbuff_tail;
 +		iso9660->wbuff_remaining = (size_t)(sizeof(iso9660->wbuff)
 +		   - (iso9660->wbuff_tail - iso9660->wbuff_offset));
 +		while (ext_bytes >= (int64_t)iso9660->wbuff_remaining) {
 +			if (write_null(a, (size_t)iso9660->wbuff_remaining)
 +			    != ARCHIVE_OK)
 +				return (ARCHIVE_FATAL);
 +			ext_bytes -= iso9660->wbuff_remaining;
 +		}
 +		if (ext_bytes > 0) {
 +			if (write_null(a, (size_t)ext_bytes) != ARCHIVE_OK)
 +				return (ARCHIVE_FATAL);
 +		}
 +	}
 +	return (ARCHIVE_OK);
 +}
 +
 +#endif /* HAVE_ZLIB_H */
 +
 +static int
 +write_null(struct archive_write *a, size_t size)
 +{
 +	size_t remaining;
 +	unsigned char *p, *old;
 +	int r;
 +
 +	remaining = wb_remaining(a);
 +	p = wb_buffptr(a);
 +	if (size <= remaining) {
 +		memset(p, 0, size);
 +		return (wb_consume(a, size));
 +	}
 +	memset(p, 0, remaining);
 +	r = wb_consume(a, remaining);
 +	if (r != ARCHIVE_OK)
 +		return (r);
 +	size -= remaining;
 +	old = p;
 +	p = wb_buffptr(a);
 +	memset(p, 0, old - p);
 +	remaining = wb_remaining(a);
 +	while (size) {
 +		size_t wsize = size;
 +
 +		if (wsize > remaining)
 +			wsize = remaining;
 +		r = wb_consume(a, wsize);
 +		if (r != ARCHIVE_OK)
 +			return (r);
 +		size -= wsize;
 +	}
 +	return (ARCHIVE_OK);
 +}
 +
 +/*
 + * Write Volume Descriptor Set Terminator
 + */
 +static int
 +write_VD_terminator(struct archive_write *a)
 +{
 +	unsigned char *bp;
 +
 +	bp = wb_buffptr(a) -1;
 +	set_VD_bp(bp, VDT_TERMINATOR, 1);
 +	set_unused_field_bp(bp, 8, LOGICAL_BLOCK_SIZE);
 +
 +	return (wb_consume(a, LOGICAL_BLOCK_SIZE));
 +}
 +
 +static int
 +set_file_identifier(unsigned char *bp, int from, int to, enum vdc vdc,
 +    struct archive_write *a, struct vdd *vdd, struct archive_string *id,
 +    const char *label, int leading_under, enum char_type char_type)
 +{
 +	char identifier[256];
 +	struct isoent *isoent;
 +	const char *ids;
 +	size_t len;
 +	int r;
 +
 +	if (id->length > 0 && leading_under && id->s[0] != '_') {
 +		if (char_type == A_CHAR)
 +			r = set_str_a_characters_bp(a, bp, from, to, id->s, vdc);
 +		else
 +			r = set_str_d_characters_bp(a, bp, from, to, id->s, vdc);
 +	} else if (id->length > 0) {
 +		ids = id->s;
 +		if (leading_under)
 +			ids++;
 +		isoent = isoent_find_entry(vdd->rootent, ids);
 +		if (isoent == NULL) {
 +			archive_set_error(&a->archive, ARCHIVE_ERRNO_MISC,
 +			    "Not Found %s `%s'.",
 +			    label, ids);
 +			return (ARCHIVE_FATAL);
 +		}
 +		len = isoent->ext_off + isoent->ext_len;
 +		if (vdd->vdd_type == VDD_JOLIET) {
 +			if (len > sizeof(identifier)-2)
 +				len = sizeof(identifier)-2;
 +		} else {
 +			if (len > sizeof(identifier)-1)
 +				len = sizeof(identifier)-1;
 +		}
 +		memcpy(identifier, isoent->identifier, len);
 +		identifier[len] = '\0';
 +		if (vdd->vdd_type == VDD_JOLIET) {
 +			identifier[len+1] = 0;
 +			vdc = VDC_UCS2_DIRECT;
 +		}
 +		if (char_type == A_CHAR)
 +			r = set_str_a_characters_bp(a, bp, from, to,
 +			    identifier, vdc);
 +		else
 +			r = set_str_d_characters_bp(a, bp, from, to,
 +			    identifier, vdc);
 +	} else {
 +		if (char_type == A_CHAR)
 +			r = set_str_a_characters_bp(a, bp, from, to, NULL, vdc);
 +		else
 +			r = set_str_d_characters_bp(a, bp, from, to, NULL, vdc);
 +	}
 +	return (r);
 +}
 +
 +/*
 + * Write Primary/Supplementary Volume Descriptor
 + */
 +static int
 +write_VD(struct archive_write *a, struct vdd *vdd)
 +{
 +	struct iso9660 *iso9660;
 +	unsigned char *bp;
 +	uint16_t volume_set_size = 1;
 +	char identifier[256];
 +	enum VD_type vdt;
 +	enum vdc vdc;
 +	unsigned char vd_ver, fst_ver;
 +	int r;
 +
 +	iso9660 = a->format_data;
 +	switch (vdd->vdd_type) {
 +	case VDD_JOLIET:
 +		vdt = VDT_SUPPLEMENTARY;
 +		vd_ver = fst_ver = 1;
 +		vdc = VDC_UCS2;
 +		break;
 +	case VDD_ENHANCED:
 +		vdt = VDT_SUPPLEMENTARY;
 +		vd_ver = fst_ver = 2;
 +		vdc = VDC_LOWERCASE;
 +		break;
 +	case VDD_PRIMARY:
 +	default:
 +		vdt = VDT_PRIMARY;
 +		vd_ver = fst_ver = 1;
 +#ifdef COMPAT_MKISOFS
 +		vdc = VDC_LOWERCASE;
 +#else
 +		vdc = VDC_STD;
 +#endif
 +		break;
 +	}
 +
 +	bp = wb_buffptr(a) -1;
 +	/* Volume Descriptor Type */
 +	set_VD_bp(bp, vdt, vd_ver);
 +	/* Unused Field */
 +	set_unused_field_bp(bp, 8, 8);
 +	/* System Identifier */
 +	get_system_identitier(identifier, sizeof(identifier));
 +	r = set_str_a_characters_bp(a, bp, 9, 40, identifier, vdc);
 +	if (r != ARCHIVE_OK)
 +		return (r);
 +	/* Volume Identifier */
 +	r = set_str_d_characters_bp(a, bp, 41, 72,
 +	    iso9660->volume_identifier.s, vdc);
 +	if (r != ARCHIVE_OK)
 +		return (r);
 +	/* Unused Field */
 +	set_unused_field_bp(bp, 73, 80);
 +	/* Volume Space Size */
 +	set_num_733(bp+81, iso9660->volume_space_size);
 +	if (vdd->vdd_type == VDD_JOLIET) {
 +		/* Escape Sequences */
 +		bp[89] = 0x25;/* UCS-2 Level 3 */
 +		bp[90] = 0x2F;
 +		bp[91] = 0x45;
 +		memset(bp + 92, 0, 120 - 92 + 1);
 +	} else {
 +		/* Unused Field */
 +		set_unused_field_bp(bp, 89, 120);
 +	}
 +	/* Volume Set Size */
 +	set_num_723(bp+121, volume_set_size);
 +	/* Volume Sequence Number */
 +	set_num_723(bp+125, iso9660->volume_sequence_number);
 +	/* Logical Block Size */
 +	set_num_723(bp+129, LOGICAL_BLOCK_SIZE);
 +	/* Path Table Size */
 +	set_num_733(bp+133, vdd->path_table_size);
 +	/* Location of Occurrence of Type L Path Table */
 +	set_num_731(bp+141, vdd->location_type_L_path_table);
 +	/* Location of Optional Occurrence of Type L Path Table */
 +	set_num_731(bp+145, 0);
 +	/* Location of Occurrence of Type M Path Table */
 +	set_num_732(bp+149, vdd->location_type_M_path_table);
 +	/* Location of Optional Occurrence of Type M Path Table */
 +	set_num_732(bp+153, 0);
 +	/* Directory Record for Root Directory(BP 157 to 190) */
 +	set_directory_record(bp+157, 190-157+1, vdd->rootent,
 +	    iso9660, DIR_REC_VD, vdd->vdd_type);
 +	/* Volume Set Identifier */
 +	r = set_str_d_characters_bp(a, bp, 191, 318, "", vdc);
 +	if (r != ARCHIVE_OK)
 +		return (r);
 +	/* Publisher Identifier */
 +	r = set_file_identifier(bp, 319, 446, vdc, a, vdd,
 +	    &(iso9660->publisher_identifier),
 +	    "Publisher File", 1, A_CHAR);
 +	if (r != ARCHIVE_OK)
 +		return (r);
 +	/* Data Preparer Identifier */
 +	r = set_file_identifier(bp, 447, 574, vdc, a, vdd,
 +	    &(iso9660->data_preparer_identifier),
 +	    "Data Preparer File", 1, A_CHAR);
 +	if (r != ARCHIVE_OK)
 +		return (r);
 +	/* Application Identifier */
 +	r = set_file_identifier(bp, 575, 702, vdc, a, vdd,
 +	    &(iso9660->application_identifier),
 +	    "Application File", 1, A_CHAR);
 +	if (r != ARCHIVE_OK)
 +		return (r);
 +	/* Copyright File Identifier */
 +	r = set_file_identifier(bp, 703, 739, vdc, a, vdd,
 +	    &(iso9660->copyright_file_identifier),
 +	    "Copyright File", 0, D_CHAR);
 +	if (r != ARCHIVE_OK)
 +		return (r);
 +	/* Abstract File Identifier */
 +	r = set_file_identifier(bp, 740, 776, vdc, a, vdd,
 +	    &(iso9660->abstract_file_identifier),
 +	    "Abstract File", 0, D_CHAR);
 +	if (r != ARCHIVE_OK)
 +		return (r);
- 	/* Bibliongraphic File Identifier */
++	/* Bibliographic File Identifier */
 +	r = set_file_identifier(bp, 777, 813, vdc, a, vdd,
 +	    &(iso9660->bibliographic_file_identifier),
 +	    "Bibliongraphic File", 0, D_CHAR);
 +	if (r != ARCHIVE_OK)
 +		return (r);
 +	/* Volume Creation Date and Time */
 +	set_date_time(bp+814, iso9660->birth_time);
 +	/* Volume Modification Date and Time */
 +	set_date_time(bp+831, iso9660->birth_time);
 +	/* Volume Expiration Date and Time(obsolete) */
 +	set_date_time_null(bp+848);
 +	/* Volume Effective Date and Time */
 +	set_date_time(bp+865, iso9660->birth_time);
 +	/* File Structure Version */
 +	bp[882] = fst_ver;
 +	/* Reserved */
 +	bp[883] = 0;
 +	/* Application Use */
 +	memset(bp + 884, 0x20, 1395 - 884 + 1);
 +	/* Reserved */
 +	set_unused_field_bp(bp, 1396, LOGICAL_BLOCK_SIZE);
 +
 +	return (wb_consume(a, LOGICAL_BLOCK_SIZE));
 +}
 +
 +/*
 + * Write Boot Record Volume Descriptor
 + */
 +static int
 +write_VD_boot_record(struct archive_write *a)
 +{
 +	struct iso9660 *iso9660;
 +	unsigned char *bp;
 +
 +	iso9660 = a->format_data;
 +	bp = wb_buffptr(a) -1;
 +	/* Volume Descriptor Type */
 +	set_VD_bp(bp, VDT_BOOT_RECORD, 1);
 +	/* Boot System Identifier */
 +	memcpy(bp+8, "EL TORITO SPECIFICATION", 23);
 +	set_unused_field_bp(bp, 8+23, 39);
 +	/* Unused */
 +	set_unused_field_bp(bp, 40, 71);
 +	/* Absolute pointer to first sector of Boot Catalog */
 +	set_num_731(bp+72,
 +	    iso9660->el_torito.catalog->file->content.location);
 +	/* Unused */
 +	set_unused_field_bp(bp, 76, LOGICAL_BLOCK_SIZE);
 +
 +	return (wb_consume(a, LOGICAL_BLOCK_SIZE));
 +}
 +
 +enum keytype {
 +	KEY_FLG,
 +	KEY_STR,
 +	KEY_INT,
 +	KEY_HEX
 +};
 +static void
 +set_option_info(struct archive_string *info, int *opt, const char *key,
 +    enum keytype type,  ...)
 +{
 +	va_list ap;
 +	char prefix;
 +	const char *s;
 +	int d;
 +
 +	prefix = (*opt==0)? ' ':',';
 +	va_start(ap, type);
 +	switch (type) {
 +	case KEY_FLG:
 +		d = va_arg(ap, int);
 +		archive_string_sprintf(info, "%c%s%s",
 +		    prefix, (d == 0)?"!":"", key);
 +		break;
 +	case KEY_STR:
 +		s = va_arg(ap, const char *);
 +		archive_string_sprintf(info, "%c%s=%s",
 +		    prefix, key, s);
 +		break;
 +	case KEY_INT:
 +		d = va_arg(ap, int);
 +		archive_string_sprintf(info, "%c%s=%d",
 +		    prefix, key, d);
 +		break;
 +	case KEY_HEX:
 +		d = va_arg(ap, int);
 +		archive_string_sprintf(info, "%c%s=%x",
 +		    prefix, key, d);
 +		break;
 +	}
 +	va_end(ap);
 +
 +	*opt = 1;
 +}
 +
 +/*
 + * Make Non-ISO File System Information
 + */
 +static int
 +write_information_block(struct archive_write *a)
 +{
 +	struct iso9660 *iso9660;
 +	char buf[128];
 +	const char *v;
 +	int opt, r;
 +	struct archive_string info;
 +	size_t info_size = LOGICAL_BLOCK_SIZE *
 +			       NON_ISO_FILE_SYSTEM_INFORMATION_BLOCK;
 +
 +	iso9660 = (struct iso9660 *)a->format_data;
 +	if (info_size > wb_remaining(a)) {
 +		r = wb_write_out(a);
 +		if (r != ARCHIVE_OK)
 +			return (r);
 +	}
 +	archive_string_init(&info);
 +	if (archive_string_ensure(&info, info_size) == NULL) {
 +		archive_set_error(&a->archive, ENOMEM,
 +		    "Can't allocate memory");
 +		return (ARCHIVE_FATAL);
 +	}
 +	memset(info.s, 0, info_size);
 +	opt = 0;
 +#if defined(HAVE__CTIME64_S)
- 	_ctime64_s(buf, sizeof(buf), &(iso9660->birth_time));
++	__time64_t iso9660_birth_time_tmp = (__time64_t) iso9660->birth_time; //time_t may be shorter than 64 bits
++	_ctime64_s(buf, sizeof(buf), &(iso9660_birth_time_tmp));
 +#elif defined(HAVE_CTIME_R)
 +	ctime_r(&(iso9660->birth_time), buf);
 +#else
 +	strncpy(buf, ctime(&(iso9660->birth_time)), sizeof(buf)-1);
 +	buf[sizeof(buf)-1] = '\0';
 +#endif
 +	archive_string_sprintf(&info,
 +	    "INFO %s%s", buf, archive_version_string());
 +	if (iso9660->opt.abstract_file != OPT_ABSTRACT_FILE_DEFAULT)
 +		set_option_info(&info, &opt, "abstract-file",
 +		    KEY_STR, iso9660->abstract_file_identifier.s);
 +	if (iso9660->opt.application_id != OPT_APPLICATION_ID_DEFAULT)
 +		set_option_info(&info, &opt, "application-id",
 +		    KEY_STR, iso9660->application_identifier.s);
 +	if (iso9660->opt.allow_vernum != OPT_ALLOW_VERNUM_DEFAULT)
 +		set_option_info(&info, &opt, "allow-vernum",
 +		    KEY_FLG, iso9660->opt.allow_vernum);
 +	if (iso9660->opt.biblio_file != OPT_BIBLIO_FILE_DEFAULT)
 +		set_option_info(&info, &opt, "biblio-file",
 +		    KEY_STR, iso9660->bibliographic_file_identifier.s);
 +	if (iso9660->opt.boot != OPT_BOOT_DEFAULT)
 +		set_option_info(&info, &opt, "boot",
 +		    KEY_STR, iso9660->el_torito.boot_filename.s);
 +	if (iso9660->opt.boot_catalog != OPT_BOOT_CATALOG_DEFAULT)
 +		set_option_info(&info, &opt, "boot-catalog",
 +		    KEY_STR, iso9660->el_torito.catalog_filename.s);
 +	if (iso9660->opt.boot_info_table != OPT_BOOT_INFO_TABLE_DEFAULT)
 +		set_option_info(&info, &opt, "boot-info-table",
 +		    KEY_FLG, iso9660->opt.boot_info_table);
 +	if (iso9660->opt.boot_load_seg != OPT_BOOT_LOAD_SEG_DEFAULT)
 +		set_option_info(&info, &opt, "boot-load-seg",
 +		    KEY_HEX, iso9660->el_torito.boot_load_seg);
 +	if (iso9660->opt.boot_load_size != OPT_BOOT_LOAD_SIZE_DEFAULT)
 +		set_option_info(&info, &opt, "boot-load-size",
 +		    KEY_INT, iso9660->el_torito.boot_load_size);
 +	if (iso9660->opt.boot_type != OPT_BOOT_TYPE_DEFAULT) {
 +		v = "no-emulation";
 +		if (iso9660->opt.boot_type == OPT_BOOT_TYPE_FD)
 +			v = "fd";
 +		if (iso9660->opt.boot_type == OPT_BOOT_TYPE_HARD_DISK)
 +			v = "hard-disk";
 +		set_option_info(&info, &opt, "boot-type",
 +		    KEY_STR, v);
 +	}
 +#ifdef HAVE_ZLIB_H
 +	if (iso9660->opt.compression_level != OPT_COMPRESSION_LEVEL_DEFAULT)
 +		set_option_info(&info, &opt, "compression-level",
 +		    KEY_INT, iso9660->zisofs.compression_level);
 +#endif
 +	if (iso9660->opt.copyright_file != OPT_COPYRIGHT_FILE_DEFAULT)
 +		set_option_info(&info, &opt, "copyright-file",
 +		    KEY_STR, iso9660->copyright_file_identifier.s);
 +	if (iso9660->opt.iso_level != OPT_ISO_LEVEL_DEFAULT)
 +		set_option_info(&info, &opt, "iso-level",
 +		    KEY_INT, iso9660->opt.iso_level);
 +	if (iso9660->opt.joliet != OPT_JOLIET_DEFAULT) {
 +		if (iso9660->opt.joliet == OPT_JOLIET_LONGNAME)
 +			set_option_info(&info, &opt, "joliet",
 +			    KEY_STR, "long");
 +		else
 +			set_option_info(&info, &opt, "joliet",
 +			    KEY_FLG, iso9660->opt.joliet);
 +	}
 +	if (iso9660->opt.limit_depth != OPT_LIMIT_DEPTH_DEFAULT)
 +		set_option_info(&info, &opt, "limit-depth",
 +		    KEY_FLG, iso9660->opt.limit_depth);
 +	if (iso9660->opt.limit_dirs != OPT_LIMIT_DIRS_DEFAULT)
 +		set_option_info(&info, &opt, "limit-dirs",
 +		    KEY_FLG, iso9660->opt.limit_dirs);
 +	if (iso9660->opt.pad != OPT_PAD_DEFAULT)
 +		set_option_info(&info, &opt, "pad",
 +		    KEY_FLG, iso9660->opt.pad);
 +	if (iso9660->opt.publisher != OPT_PUBLISHER_DEFAULT)
 +		set_option_info(&info, &opt, "publisher",
 +		    KEY_STR, iso9660->publisher_identifier.s);
 +	if (iso9660->opt.rr != OPT_RR_DEFAULT) {
 +		if (iso9660->opt.rr == OPT_RR_DISABLED)
 +			set_option_info(&info, &opt, "rockridge",
 +			    KEY_FLG, iso9660->opt.rr);
 +		else if (iso9660->opt.rr == OPT_RR_STRICT)
 +			set_option_info(&info, &opt, "rockridge",
 +			    KEY_STR, "strict");
 +		else if (iso9660->opt.rr == OPT_RR_USEFUL)
 +			set_option_info(&info, &opt, "rockridge",
 +			    KEY_STR, "useful");
 +	}
 +	if (iso9660->opt.volume_id != OPT_VOLUME_ID_DEFAULT)
 +		set_option_info(&info, &opt, "volume-id",
 +		    KEY_STR, iso9660->volume_identifier.s);
 +	if (iso9660->opt.zisofs != OPT_ZISOFS_DEFAULT)
 +		set_option_info(&info, &opt, "zisofs",
 +		    KEY_FLG, iso9660->opt.zisofs);
 +
 +	memcpy(wb_buffptr(a), info.s, info_size);
 +	archive_string_free(&info);
 +	return (wb_consume(a, info_size));
 +}
 +
 +static int
 +write_rr_ER(struct archive_write *a)
 +{
 +	unsigned char *p;
 +
 +	p = wb_buffptr(a);
 +
 +	memset(p, 0, LOGICAL_BLOCK_SIZE);
 +	p[0] = 'E';
 +	p[1] = 'R';
 +	p[3] = 0x01;
 +	p[2] = RRIP_ER_SIZE;
 +	p[4] = RRIP_ER_ID_SIZE;
 +	p[5] = RRIP_ER_DSC_SIZE;
 +	p[6] = RRIP_ER_SRC_SIZE;
 +	p[7] = 0x01;
 +	memcpy(&p[8], rrip_identifier, p[4]);
 +	memcpy(&p[8+p[4]], rrip_descriptor, p[5]);
 +	memcpy(&p[8+p[4]+p[5]], rrip_source, p[6]);
 +
 +	return (wb_consume(a, LOGICAL_BLOCK_SIZE));
 +}
 +
 +static void
 +calculate_path_table_size(struct vdd *vdd)
 +{
 +	int depth, size;
 +	struct path_table *pt;
 +
 +	pt = vdd->pathtbl;
 +	size = 0;
 +	for (depth = 0; depth < vdd->max_depth; depth++) {
 +		struct isoent **ptbl;
 +		int i, cnt;
 +
 +		if ((cnt = pt[depth].cnt) == 0)
 +			break;
 +
 +		ptbl = pt[depth].sorted;
 +		for (i = 0; i < cnt; i++) {
 +			int len;
 +
 +			if (ptbl[i]->identifier == NULL)
 +				len = 1; /* root directory */
 +			else
 +				len = ptbl[i]->id_len;
 +			if (len & 0x01)
 +				len++; /* Padding Field */
 +			size += 8 + len;
 +		}
 +	}
 +	vdd->path_table_size = size;
 +	vdd->path_table_block =
 +	    ((size + PATH_TABLE_BLOCK_SIZE -1) /
 +	    PATH_TABLE_BLOCK_SIZE) *
 +	    (PATH_TABLE_BLOCK_SIZE / LOGICAL_BLOCK_SIZE);
 +}
 +
 +static int
 +_write_path_table(struct archive_write *a, int type_m, int depth,
 +    struct vdd *vdd)
 +{
 +	unsigned char *bp, *wb;
 +	struct isoent **ptbl;
 +	size_t wbremaining;
 +	int i, r, wsize;
 +
 +	if (vdd->pathtbl[depth].cnt == 0)
 +		return (0);
 +
 +	wsize = 0;
 +	wb = wb_buffptr(a);
 +	wbremaining = wb_remaining(a);
 +	bp = wb - 1;
 +	ptbl = vdd->pathtbl[depth].sorted;
 +	for (i = 0; i < vdd->pathtbl[depth].cnt; i++) {
 +		struct isoent *np;
 +		size_t len;
 +
 +		np = ptbl[i];
 +		if (np->identifier == NULL)
 +			len = 1; /* root directory */
 +		else
 +			len = np->id_len;
 +		if (wbremaining - ((bp+1) - wb) < (len + 1 + 8)) {
 +			r = wb_consume(a, (bp+1) - wb);
 +			if (r < 0)
 +				return (r);
 +			wb = wb_buffptr(a);
 +			wbremaining = wb_remaining(a);
 +			bp = wb -1;
 +		}
 +		/* Length of Directory Identifier */
 +		set_num_711(bp+1, (unsigned char)len);
 +		/* Extended Attribute Record Length */
 +		set_num_711(bp+2, 0);
 +		/* Location of Extent */
 +		if (type_m)
 +			set_num_732(bp+3, np->dir_location);
 +		else
 +			set_num_731(bp+3, np->dir_location);
 +		/* Parent Directory Number */
 +		if (type_m)
 +			set_num_722(bp+7, np->parent->dir_number);
 +		else
 +			set_num_721(bp+7, np->parent->dir_number);
 +		/* Directory Identifier */
 +		if (np->identifier == NULL)
 +			bp[9] = 0;
 +		else
 +			memcpy(&bp[9], np->identifier, len);
 +		if (len & 0x01) {
 +			/* Padding Field */
 +			bp[9+len] = 0;
 +			len++;
 +		}
 +		wsize += 8 + (int)len;
 +		bp += 8 + len;
 +	}
 +	if ((bp + 1) > wb) {
 +		r = wb_consume(a, (bp+1)-wb);
 +		if (r < 0)
 +			return (r);
 +	}
 +	return (wsize);
 +}
 +
 +static int
 +write_path_table(struct archive_write *a, int type_m, struct vdd *vdd)
 +{
 +	int depth, r;
 +	size_t path_table_size;
 +
 +	r = ARCHIVE_OK;
 +	path_table_size = 0;
 +	for (depth = 0; depth < vdd->max_depth; depth++) {
 +		r = _write_path_table(a, type_m, depth, vdd);
 +		if (r < 0)
 +			return (r);
 +		path_table_size += r;
 +	}
 +
 +	/* Write padding data. */
 +	path_table_size = path_table_size % PATH_TABLE_BLOCK_SIZE;
 +	if (path_table_size > 0)
 +		r = write_null(a, PATH_TABLE_BLOCK_SIZE - path_table_size);
 +	return (r);
 +}
 +
 +static int
 +calculate_directory_descriptors(struct iso9660 *iso9660, struct vdd *vdd,
 +    struct isoent *isoent, int depth)
 +{
 +	struct isoent **enttbl;
 +	int bs, block, i;
 +
 +	block = 1;
 +	bs = get_dir_rec_size(iso9660, isoent, DIR_REC_SELF, vdd->vdd_type);
 +	bs += get_dir_rec_size(iso9660, isoent, DIR_REC_PARENT, vdd->vdd_type);
 +
 +	if (isoent->children.cnt <= 0 || (vdd->vdd_type != VDD_JOLIET &&
 +	    !iso9660->opt.rr && depth + 1 >= vdd->max_depth))
 +		return (block);
 +
 +	enttbl = isoent->children_sorted;
 +	for (i = 0; i < isoent->children.cnt; i++) {
 +		struct isoent *np = enttbl[i];
 +		struct isofile *file;
 +
 +		file = np->file;
 +		if (file->hardlink_target != NULL)
 +			file = file->hardlink_target;
 +		file->cur_content = &(file->content);
 +		do {
 +			int dr_l;
 +
 +			dr_l = get_dir_rec_size(iso9660, np, DIR_REC_NORMAL,
 +			    vdd->vdd_type);
 +			if ((bs + dr_l) > LOGICAL_BLOCK_SIZE) {
 +				block ++;
 +				bs = dr_l;
 +			} else
 +				bs += dr_l;
 +			file->cur_content = file->cur_content->next;
 +		} while (file->cur_content != NULL);
 +	}
 +	return (block);
 +}
 +
 +static int
 +_write_directory_descriptors(struct archive_write *a, struct vdd *vdd,
 +    struct isoent *isoent, int depth)
 +{
 +	struct iso9660 *iso9660 = a->format_data;
 +	struct isoent **enttbl;
 +	unsigned char *p, *wb;
 +	int i, r;
 +	int dr_l;
 +
 +	p = wb = wb_buffptr(a);
 +#define WD_REMAINING	(LOGICAL_BLOCK_SIZE - (p - wb))
 +	p += set_directory_record(p, WD_REMAINING, isoent,
 +	    iso9660, DIR_REC_SELF, vdd->vdd_type);
 +	p += set_directory_record(p, WD_REMAINING, isoent,
 +	    iso9660, DIR_REC_PARENT, vdd->vdd_type);
 +
 +	if (isoent->children.cnt <= 0 || (vdd->vdd_type != VDD_JOLIET &&
 +	    !iso9660->opt.rr && depth + 1 >= vdd->max_depth)) {
 +		memset(p, 0, WD_REMAINING);
 +		return (wb_consume(a, LOGICAL_BLOCK_SIZE));
 +	}
 +
 +	enttbl = isoent->children_sorted;
 +	for (i = 0; i < isoent->children.cnt; i++) {
 +		struct isoent *np = enttbl[i];
 +		struct isofile *file = np->file;
 +
 +		if (file->hardlink_target != NULL)
 +			file = file->hardlink_target;
 +		file->cur_content = &(file->content);
 +		do {
 +			dr_l = set_directory_record(p, WD_REMAINING,
 +			    np, iso9660, DIR_REC_NORMAL,
 +			    vdd->vdd_type);
 +			if (dr_l == 0) {
 +				memset(p, 0, WD_REMAINING);
 +				r = wb_consume(a, LOGICAL_BLOCK_SIZE);
 +				if (r < 0)
 +					return (r);
 +				p = wb = wb_buffptr(a);
 +				dr_l = set_directory_record(p,
 +				    WD_REMAINING, np, iso9660,
 +				    DIR_REC_NORMAL, vdd->vdd_type);
 +			}
 +			p += dr_l;
 +			file->cur_content = file->cur_content->next;
 +		} while (file->cur_content != NULL);
 +	}
 +	memset(p, 0, WD_REMAINING);
 +	return (wb_consume(a, LOGICAL_BLOCK_SIZE));
 +}
 +
 +static int
 +write_directory_descriptors(struct archive_write *a, struct vdd *vdd)
 +{
 +	struct isoent *np;
 +	int depth, r;
 +
 +	depth = 0;
 +	np = vdd->rootent;
 +	do {
 +		struct extr_rec *extr;
 +
 +		r = _write_directory_descriptors(a, vdd, np, depth);
 +		if (r < 0)
 +			return (r);
 +		if (vdd->vdd_type != VDD_JOLIET) {
 +			/*
 +			 * This extract record is used by SUSP,RRIP.
 +			 * Not for joliet.
 +			 */
 +			for (extr = np->extr_rec_list.first;
 +			    extr != NULL;
 +			    extr = extr->next) {
 +				unsigned char *wb;
 +
 +				wb = wb_buffptr(a);
 +				memcpy(wb, extr->buf, extr->offset);
 +				memset(wb + extr->offset, 0,
 +				    LOGICAL_BLOCK_SIZE - extr->offset);
 +				r = wb_consume(a, LOGICAL_BLOCK_SIZE);
 +				if (r < 0)
 +					return (r);
 +			}
 +		}
 +
 +		if (np->subdirs.first != NULL && depth + 1 < vdd->max_depth) {
 +			/* Enter to sub directories. */
 +			np = np->subdirs.first;
 +			depth++;
 +			continue;
 +		}
 +		while (np != np->parent) {
 +			if (np->drnext == NULL) {
 +				/* Return to the parent directory. */
 +				np = np->parent;
 +				depth--;
 +			} else {
 +				np = np->drnext;
 +				break;
 +			}
 +		}
 +	} while (np != np->parent);
 +
 +	return (ARCHIVE_OK);
 +}
 +
 +/*
 + * Read file contents from the temporary file, and write it.
 + */
 +static int
 +write_file_contents(struct archive_write *a, int64_t offset, int64_t size)
 +{
 +	struct iso9660 *iso9660 = a->format_data;
 +	int r;
 +
 +	lseek(iso9660->temp_fd, offset, SEEK_SET);
 +
 +	while (size) {
 +		size_t rsize;
 +		ssize_t rs;
 +		unsigned char *wb;
 +
 +		wb = wb_buffptr(a);
 +		rsize = wb_remaining(a);
 +		if (rsize > (size_t)size)
 +			rsize = (size_t)size;
 +		rs = read(iso9660->temp_fd, wb, rsize);
 +		if (rs <= 0) {
 +			archive_set_error(&a->archive, errno,
 +			    "Can't read temporary file(%jd)", (intmax_t)rs);
 +			return (ARCHIVE_FATAL);
 +		}
 +		size -= rs;
 +		r = wb_consume(a, rs);
 +		if (r < 0)
 +			return (r);
 +	}
 +	return (ARCHIVE_OK);
 +}
 +
 +static int
 +write_file_descriptors(struct archive_write *a)
 +{
 +	struct iso9660 *iso9660 = a->format_data;
 +	struct isofile *file;
 +	int64_t blocks, offset;
 +	int r;
 +
 +	blocks = 0;
 +	offset = 0;
 +
 +	/* Make the boot catalog contents, and write it. */
 +	if (iso9660->el_torito.catalog != NULL) {
 +		r = make_boot_catalog(a);
 +		if (r < 0)
 +			return (r);
 +	}
 +
 +	/* Write the boot file contents. */
 +	if (iso9660->el_torito.boot != NULL) {
 +		file = iso9660->el_torito.boot->file;
 +		blocks = file->content.blocks;
 +		offset = file->content.offset_of_temp;
 +		if (offset != 0) {
 +			r = write_file_contents(a, offset,
 +			    blocks << LOGICAL_BLOCK_BITS);
 +			if (r < 0)
 +				return (r);
 +			blocks = 0;
 +			offset = 0;
 +		}
 +	}
 +
 +	/* Write out all file contents. */
 +	for (file = iso9660->data_file_list.first;
 +	    file != NULL; file = file->datanext) {
 +
 +		if (!file->write_content)
 +			continue;
 +
 +		if ((offset + (blocks << LOGICAL_BLOCK_BITS)) <
 +		     file->content.offset_of_temp) {
 +			if (blocks > 0) {
 +				r = write_file_contents(a, offset,
 +				    blocks << LOGICAL_BLOCK_BITS);
 +				if (r < 0)
 +					return (r);
 +			}
 +			blocks = 0;
 +			offset = file->content.offset_of_temp;
 +		}
 +
 +		file->cur_content = &(file->content);
 +		do {
 +			blocks += file->cur_content->blocks;
- 			/* Next fragument */
++			/* Next fragment */
 +			file->cur_content = file->cur_content->next;
 +		} while (file->cur_content != NULL);
 +	}
 +
 +	/* Flush out remaining blocks. */
 +	if (blocks > 0) {
 +		r = write_file_contents(a, offset,
 +		    blocks << LOGICAL_BLOCK_BITS);
 +		if (r < 0)
 +			return (r);
 +	}
 +
 +	return (ARCHIVE_OK);
 +}
 +
 +static void
 +isofile_init_entry_list(struct iso9660 *iso9660)
 +{
 +	iso9660->all_file_list.first = NULL;
 +	iso9660->all_file_list.last = &(iso9660->all_file_list.first);
 +}
 +
 +static void
 +isofile_add_entry(struct iso9660 *iso9660, struct isofile *file)
 +{
 +	file->allnext = NULL;
 +	*iso9660->all_file_list.last = file;
 +	iso9660->all_file_list.last = &(file->allnext);
 +}
 +
 +static void
 +isofile_free_all_entries(struct iso9660 *iso9660)
 +{
 +	struct isofile *file, *file_next;
 +
 +	file = iso9660->all_file_list.first;
 +	while (file != NULL) {
 +		file_next = file->allnext;
 +		isofile_free(file);
 +		file = file_next;
 +	}
 +}
 +
 +static void
 +isofile_init_entry_data_file_list(struct iso9660 *iso9660)
 +{
 +	iso9660->data_file_list.first = NULL;
 +	iso9660->data_file_list.last = &(iso9660->data_file_list.first);
 +}
 +
 +static void
 +isofile_add_data_file(struct iso9660 *iso9660, struct isofile *file)
 +{
 +	file->datanext = NULL;
 +	*iso9660->data_file_list.last = file;
 +	iso9660->data_file_list.last = &(file->datanext);
 +}
 +
 +
 +static struct isofile *
 +isofile_new(struct archive_write *a, struct archive_entry *entry)
 +{
 +	struct isofile *file;
 +
 +	file = calloc(1, sizeof(*file));
 +	if (file == NULL)
 +		return (NULL);
 +
 +	if (entry != NULL)
 +		file->entry = archive_entry_clone(entry);
 +	else
 +		file->entry = archive_entry_new2(&a->archive);
 +	if (file->entry == NULL) {
 +		free(file);
 +		return (NULL);
 +	}
 +	archive_string_init(&(file->parentdir));
 +	archive_string_init(&(file->basename));
 +	archive_string_init(&(file->basename_utf16));
 +	archive_string_init(&(file->symlink));
 +	file->cur_content = &(file->content);
 +
 +	return (file);
 +}
 +
 +static void
 +isofile_free(struct isofile *file)
 +{
 +	struct content *con, *tmp;
 +
 +	con = file->content.next;
 +	while (con != NULL) {
 +		tmp = con;
 +		con = con->next;
 +		free(tmp);
 +	}
 +	archive_entry_free(file->entry);
 +	archive_string_free(&(file->parentdir));
 +	archive_string_free(&(file->basename));
 +	archive_string_free(&(file->basename_utf16));
 +	archive_string_free(&(file->symlink));
 +	free(file);
 +}
 +
 +#if defined(_WIN32) || defined(__CYGWIN__)
 +static int
 +cleanup_backslash_1(char *p)
 +{
 +	int mb, dos;
 +
 +	mb = dos = 0;
 +	while (*p) {
 +		if (*(unsigned char *)p > 127)
 +			mb = 1;
 +		if (*p == '\\') {
 +			/* If we have not met any multi-byte characters,
 +			 * we can replace '\' with '/'. */
 +			if (!mb)
 +				*p = '/';
 +			dos = 1;
 +		}
 +		p++;
 +	}
 +	if (!mb || !dos)
 +		return (0);
 +	return (-1);
 +}
 +
 +static void
 +cleanup_backslash_2(wchar_t *p)
 +{
 +
 +	/* Convert a path-separator from '\' to  '/' */
 +	while (*p != L'\0') {
 +		if (*p == L'\\')
 +			*p = L'/';
 +		p++;
 +	}
 +}
 +#endif
 +
 +/*
 + * Generate a parent directory name and a base name from a pathname.
 + */
 +static int
 +isofile_gen_utility_names(struct archive_write *a, struct isofile *file)
 +{
 +	struct iso9660 *iso9660;
 +	const char *pathname;
 +	char *p, *dirname, *slash;
 +	size_t len;
 +	int ret = ARCHIVE_OK;
 +
 +	iso9660 = a->format_data;
 +
 +	archive_string_empty(&(file->parentdir));
 +	archive_string_empty(&(file->basename));
 +	archive_string_empty(&(file->basename_utf16));
 +	archive_string_empty(&(file->symlink));
 +
 +	pathname =  archive_entry_pathname(file->entry);
 +	if (pathname == NULL || pathname[0] == '\0') {/* virtual root */
 +		file->dircnt = 0;
 +		return (ret);
 +	}
 +
 +	/*
 +	 * Make a UTF-16BE basename if Joliet extension enabled.
 +	 */
 +	if (iso9660->opt.joliet) {
 +		const char *u16, *ulast;
 +		size_t u16len, ulen_last;
 +
 +		if (iso9660->sconv_to_utf16be == NULL) {
 +			iso9660->sconv_to_utf16be =
 +			    archive_string_conversion_to_charset(
 +				&(a->archive), "UTF-16BE", 1);
 +			if (iso9660->sconv_to_utf16be == NULL)
 +				/* Couldn't allocate memory */
 +				return (ARCHIVE_FATAL);
 +			iso9660->sconv_from_utf16be =
 +			    archive_string_conversion_from_charset(
 +				&(a->archive), "UTF-16BE", 1);
 +			if (iso9660->sconv_from_utf16be == NULL)
 +				/* Couldn't allocate memory */
 +				return (ARCHIVE_FATAL);
 +		}
 +
 +		/*
- 		 * Converte a filename to UTF-16BE.
++		 * Convert a filename to UTF-16BE.
 +		 */
 +		if (0 > archive_entry_pathname_l(file->entry, &u16, &u16len,
 +		    iso9660->sconv_to_utf16be)) {
 +			if (errno == ENOMEM) {
 +				archive_set_error(&a->archive, ENOMEM,
 +				    "Can't allocate memory for UTF-16BE");
 +				return (ARCHIVE_FATAL);
 +			}
 +			archive_set_error(&a->archive, ARCHIVE_ERRNO_MISC,
 +			    "A filename cannot be converted to UTF-16BE;"
 +			    "You should disable making Joliet extension");
 +			ret = ARCHIVE_WARN;
 +		}
 +
 +		/*
 +		 * Make sure a path separator is not in the last;
 +		 * Remove trailing '/'.
 +		 */
 +		while (u16len >= 2) {
 +#if defined(_WIN32) || defined(__CYGWIN__)
 +			if (u16[u16len-2] == 0 &&
 +			    (u16[u16len-1] == '/' || u16[u16len-1] == '\\'))
 +#else
 +			if (u16[u16len-2] == 0 && u16[u16len-1] == '/')
 +#endif
 +			{
 +				u16len -= 2;
 +			} else
 +				break;
 +		}
 +
 +		/*
 +		 * Find a basename in UTF-16BE.
 +		 */
 +		ulast = u16;
 +		u16len >>= 1;
 +		ulen_last = u16len;
 +		while (u16len > 0) {
 +#if defined(_WIN32) || defined(__CYGWIN__)
 +			if (u16[0] == 0 && (u16[1] == '/' || u16[1] == '\\'))
 +#else
 +			if (u16[0] == 0 && u16[1] == '/')
 +#endif
 +			{
 +				ulast = u16 + 2;
 +				ulen_last = u16len -1;
 +			}
 +			u16 += 2;
 +			u16len --;
 +		}
 +		ulen_last <<= 1;
 +		if (archive_string_ensure(&(file->basename_utf16),
 +		    ulen_last) == NULL) {
 +			archive_set_error(&a->archive, ENOMEM,
 +			    "Can't allocate memory for UTF-16BE");
 +			return (ARCHIVE_FATAL);
 +		}
 +
 +		/*
 +		 * Set UTF-16BE basename.
 +		 */
 +		memcpy(file->basename_utf16.s, ulast, ulen_last);
 +		file->basename_utf16.length = ulen_last;
 +	}
 +
 +	archive_strcpy(&(file->parentdir), pathname);
 +#if defined(_WIN32) || defined(__CYGWIN__)
 +	/*
 +	 * Convert a path-separator from '\' to  '/'
 +	 */
 +	if (cleanup_backslash_1(file->parentdir.s) != 0) {
 +		const wchar_t *wp = archive_entry_pathname_w(file->entry);
 +		struct archive_wstring ws;
 +
 +		if (wp != NULL) {
 +			int r;
 +			archive_string_init(&ws);
 +			archive_wstrcpy(&ws, wp);
 +			cleanup_backslash_2(ws.s);
 +			archive_string_empty(&(file->parentdir));
 +			r = archive_string_append_from_wcs(&(file->parentdir),
 +			    ws.s, ws.length);
 +			archive_wstring_free(&ws);
 +			if (r < 0 && errno == ENOMEM) {
 +				archive_set_error(&a->archive, ENOMEM,
 +				    "Can't allocate memory");
 +				return (ARCHIVE_FATAL);
 +			}
 +		}
 +	}
 +#endif
 +
 +	len = file->parentdir.length;
 +	p = dirname = file->parentdir.s;
 +
 +	/*
 +	 * Remove leading '/', '../' and './' elements
 +	 */
 +	while (*p) {
 +		if (p[0] == '/') {
 +			p++;
 +			len--;
 +		} else if (p[0] != '.')
 +			break;
 +		else if (p[1] == '.' && p[2] == '/') {
 +			p += 3;
 +			len -= 3;
 +		} else if (p[1] == '/' || (p[1] == '.' && p[2] == '\0')) {
 +			p += 2;
 +			len -= 2;
 +		} else if (p[1] == '\0') {
 +			p++;
 +			len--;
 +		} else
 +			break;
 +	}
 +	if (p != dirname) {
 +		memmove(dirname, p, len+1);
 +		p = dirname;
 +	}
 +	/*
 +	 * Remove "/","/." and "/.." elements from tail.
 +	 */
 +	while (len > 0) {
 +		size_t ll = len;
 +
 +		if (len > 0 && p[len-1] == '/') {
 +			p[len-1] = '\0';
 +			len--;
 +		}
 +		if (len > 1 && p[len-2] == '/' && p[len-1] == '.') {
 +			p[len-2] = '\0';
 +			len -= 2;
 +		}
 +		if (len > 2 && p[len-3] == '/' && p[len-2] == '.' &&
 +		    p[len-1] == '.') {
 +			p[len-3] = '\0';
 +			len -= 3;
 +		}
 +		if (ll == len)
 +			break;
 +	}
 +	while (*p) {
 +		if (p[0] == '/') {
 +			if (p[1] == '/')
 +				/* Convert '//' --> '/' */
 +				strcpy(p, p+1);
 +			else if (p[1] == '.' && p[2] == '/')
 +				/* Convert '/./' --> '/' */
 +				strcpy(p, p+2);
 +			else if (p[1] == '.' && p[2] == '.' && p[3] == '/') {
 +				/* Convert 'dir/dir1/../dir2/'
 +				 *     --> 'dir/dir2/'
 +				 */
 +				char *rp = p -1;
 +				while (rp >= dirname) {
 +					if (*rp == '/')
 +						break;
 +					--rp;
 +				}
 +				if (rp > dirname) {
 +					strcpy(rp, p+3);
 +					p = rp;
 +				} else {
 +					strcpy(dirname, p+4);
 +					p = dirname;
 +				}
 +			} else
 +				p++;
 +		} else
 +			p++;
 +	}
 +	p = dirname;
 +	len = strlen(p);
 +
 +	if (archive_entry_filetype(file->entry) == AE_IFLNK) {
 +		/* Convert symlink name too. */
 +		pathname = archive_entry_symlink(file->entry);
 +		archive_strcpy(&(file->symlink),  pathname);
 +#if defined(_WIN32) || defined(__CYGWIN__)
 +		/*
 +		 * Convert a path-separator from '\' to  '/'
 +		 */
 +		if (archive_strlen(&(file->symlink)) > 0 &&
 +		    cleanup_backslash_1(file->symlink.s) != 0) {
 +			const wchar_t *wp =
 +			    archive_entry_symlink_w(file->entry);
 +			struct archive_wstring ws;
 +
 +			if (wp != NULL) {
 +				int r;
 +				archive_string_init(&ws);
 +				archive_wstrcpy(&ws, wp);
 +				cleanup_backslash_2(ws.s);
 +				archive_string_empty(&(file->symlink));
 +				r = archive_string_append_from_wcs(
 +				    &(file->symlink),
 +				    ws.s, ws.length);
 +				archive_wstring_free(&ws);
 +				if (r < 0 && errno == ENOMEM) {
 +					archive_set_error(&a->archive, ENOMEM,
 +					    "Can't allocate memory");
 +					return (ARCHIVE_FATAL);
 +				}
 +			}
 +		}
 +#endif
 +	}
 +	/*
 +	 * - Count up directory elements.
 +	 * - Find out the position which points the last position of
 +	 *   path separator('/').
 +	 */
 +	slash = NULL;
 +	file->dircnt = 0;
 +	for (; *p != '\0'; p++)
 +		if (*p == '/') {
 +			slash = p;
 +			file->dircnt++;
 +		}
 +	if (slash == NULL) {
 +		/* The pathname doesn't have a parent directory. */
 +		file->parentdir.length = len;
 +		archive_string_copy(&(file->basename), &(file->parentdir));
 +		archive_string_empty(&(file->parentdir));
 +		*file->parentdir.s = '\0';
 +		return (ret);
 +	}
 +
 +	/* Make a basename from dirname and slash */
 +	*slash  = '\0';
 +	file->parentdir.length = slash - dirname;
 +	archive_strcpy(&(file->basename),  slash + 1);
 +	if (archive_entry_filetype(file->entry) == AE_IFDIR)
 +		file->dircnt ++;
 +	return (ret);
 +}
 +
 +/*
 + * Register a entry to get a hardlink target.
 + */
 +static int
 +isofile_register_hardlink(struct archive_write *a, struct isofile *file)
 +{
 +	struct iso9660 *iso9660 = a->format_data;
 +	struct hardlink *hl;
 +	const char *pathname;
 +
 +	archive_entry_set_nlink(file->entry, 1);
 +	pathname = archive_entry_hardlink(file->entry);
 +	if (pathname == NULL) {
 +		/* This `file` is a hardlink target. */
 +		hl = malloc(sizeof(*hl));
 +		if (hl == NULL) {
 +			archive_set_error(&a->archive, ENOMEM,
 +			    "Can't allocate memory");
 +			return (ARCHIVE_FATAL);
 +		}
 +		hl->nlink = 1;
 +		/* A hardlink target must be the first position. */
 +		file->hlnext = NULL;
 +		hl->file_list.first = file;
 +		hl->file_list.last = &(file->hlnext);
 +		__archive_rb_tree_insert_node(&(iso9660->hardlink_rbtree),
 +		    (struct archive_rb_node *)hl);
 +	} else {
 +		hl = (struct hardlink *)__archive_rb_tree_find_node(
 +		    &(iso9660->hardlink_rbtree), pathname);
 +		if (hl != NULL) {
 +			/* Insert `file` entry into the tail. */
 +			file->hlnext = NULL;
 +			*hl->file_list.last = file;
 +			hl->file_list.last = &(file->hlnext);
 +			hl->nlink++;
 +		}
 +		archive_entry_unset_size(file->entry);
 +	}
 +
 +	return (ARCHIVE_OK);
 +}
 +
 +/*
 + * Hardlinked files have to have the same location of extent.
 + * We have to find out hardlink target entries for the entries
 + * which have a hardlink target name.
 + */
 +static void
 +isofile_connect_hardlink_files(struct iso9660 *iso9660)
 +{
 +	struct archive_rb_node *n;
 +	struct hardlink *hl;
 +	struct isofile *target, *nf;
 +
 +	ARCHIVE_RB_TREE_FOREACH(n, &(iso9660->hardlink_rbtree)) {
 +		hl = (struct hardlink *)n;
 +
 +		/* The first entry must be a hardlink target. */
 +		target = hl->file_list.first;
 +		archive_entry_set_nlink(target->entry, hl->nlink);
 +		/* Set a hardlink target to reference entries. */
 +		for (nf = target->hlnext;
 +		    nf != NULL; nf = nf->hlnext) {
 +			nf->hardlink_target = target;
 +			archive_entry_set_nlink(nf->entry, hl->nlink);
 +		}
 +	}
 +}
 +
 +static int
 +isofile_hd_cmp_node(const struct archive_rb_node *n1,
 +    const struct archive_rb_node *n2)
 +{
 +	const struct hardlink *h1 = (const struct hardlink *)n1;
 +	const struct hardlink *h2 = (const struct hardlink *)n2;
 +
 +	return (strcmp(archive_entry_pathname(h1->file_list.first->entry),
 +		       archive_entry_pathname(h2->file_list.first->entry)));
 +}
 +
 +static int
 +isofile_hd_cmp_key(const struct archive_rb_node *n, const void *key)
 +{
 +	const struct hardlink *h = (const struct hardlink *)n;
 +
 +	return (strcmp(archive_entry_pathname(h->file_list.first->entry),
 +		       (const char *)key));
 +}
 +
 +static void
 +isofile_init_hardlinks(struct iso9660 *iso9660)
 +{
 +	static const struct archive_rb_tree_ops rb_ops = {
 +		isofile_hd_cmp_node, isofile_hd_cmp_key,
 +	};
 +
 +	__archive_rb_tree_init(&(iso9660->hardlink_rbtree), &rb_ops);
 +}
 +
 +static void
 +isofile_free_hardlinks(struct iso9660 *iso9660)
 +{
 +	struct archive_rb_node *n, *next;
 +
 +	for (n = ARCHIVE_RB_TREE_MIN(&(iso9660->hardlink_rbtree)); n;) {
 +		next = __archive_rb_tree_iterate(&(iso9660->hardlink_rbtree),
 +		    n, ARCHIVE_RB_DIR_RIGHT);
 +		free(n);
 +		n = next;
 +	}
 +}
 +
 +static struct isoent *
 +isoent_new(struct isofile *file)
 +{
 +	struct isoent *isoent;
 +	static const struct archive_rb_tree_ops rb_ops = {
 +		isoent_cmp_node, isoent_cmp_key,
 +	};
 +
 +	isoent = calloc(1, sizeof(*isoent));
 +	if (isoent == NULL)
 +		return (NULL);
 +	isoent->file = file;
 +	isoent->children.first = NULL;
 +	isoent->children.last = &(isoent->children.first);
 +	__archive_rb_tree_init(&(isoent->rbtree), &rb_ops);
 +	isoent->subdirs.first = NULL;
 +	isoent->subdirs.last = &(isoent->subdirs.first);
 +	isoent->extr_rec_list.first = NULL;
 +	isoent->extr_rec_list.last = &(isoent->extr_rec_list.first);
 +	isoent->extr_rec_list.current = NULL;
 +	if (archive_entry_filetype(file->entry) == AE_IFDIR)
 +		isoent->dir = 1;
 +
 +	return (isoent);
 +}
 +
 +static inline struct isoent *
 +isoent_clone(struct isoent *src)
 +{
 +	return (isoent_new(src->file));
 +}
 +
 +static void
 +_isoent_free(struct isoent *isoent)
 +{
 +	struct extr_rec *er, *er_next;
 +
 +	free(isoent->children_sorted);
 +	free(isoent->identifier);
 +	er = isoent->extr_rec_list.first;
 +	while (er != NULL) {
 +		er_next = er->next;
 +		free(er);
 +		er = er_next;
 +	}
 +	free(isoent);
 +}
 +
 +static void
 +isoent_free_all(struct isoent *isoent)
 +{
 +	struct isoent *np, *np_temp;
 +
 +	if (isoent == NULL)
 +		return;
 +	np = isoent;
 +	for (;;) {
 +		if (np->dir) {
 +			if (np->children.first != NULL) {
 +				/* Enter to sub directories. */
 +				np = np->children.first;
 +				continue;
 +			}
 +		}
 +		for (;;) {
 +			np_temp = np;
 +			if (np->chnext == NULL) {
 +				/* Return to the parent directory. */
 +				np = np->parent;
 +				_isoent_free(np_temp);
 +				if (np == np_temp)
 +					return;
 +			} else {
 +				np = np->chnext;
 +				_isoent_free(np_temp);
 +				break;
 +			}
 +		}
 +	}
 +}
 +
 +static struct isoent *
 +isoent_create_virtual_dir(struct archive_write *a, struct iso9660 *iso9660, const char *pathname)
 +{
 +	struct isofile *file;
 +	struct isoent *isoent;
 +
 +	file = isofile_new(a, NULL);
 +	if (file == NULL)
 +		return (NULL);
 +	archive_entry_set_pathname(file->entry, pathname);
 +	archive_entry_unset_mtime(file->entry);
 +	archive_entry_unset_atime(file->entry);
 +	archive_entry_unset_ctime(file->entry);
 +	archive_entry_set_uid(file->entry, getuid());
 +	archive_entry_set_gid(file->entry, getgid());
 +	archive_entry_set_mode(file->entry, 0555 | AE_IFDIR);
 +	archive_entry_set_nlink(file->entry, 2);
 +	if (isofile_gen_utility_names(a, file) < ARCHIVE_WARN) {
 +		isofile_free(file);
 +		return (NULL);
 +	}
 +	isofile_add_entry(iso9660, file);
 +
 +	isoent = isoent_new(file);
 +	if (isoent == NULL)
 +		return (NULL);
 +	isoent->dir = 1;
 +	isoent->virtual = 1;
 +
 +	return (isoent);
 +}
 +
 +static int
 +isoent_cmp_node(const struct archive_rb_node *n1,
 +    const struct archive_rb_node *n2)
 +{
 +	const struct isoent *e1 = (const struct isoent *)n1;
 +	const struct isoent *e2 = (const struct isoent *)n2;
 +
 +	return (strcmp(e1->file->basename.s, e2->file->basename.s));
 +}
 +
 +static int
 +isoent_cmp_key(const struct archive_rb_node *n, const void *key)
 +{
 +	const struct isoent *e = (const struct isoent *)n;
 +
 +	return (strcmp(e->file->basename.s, (const char *)key));
 +}
 +
 +static int
 +isoent_add_child_head(struct isoent *parent, struct isoent *child)
 +{
 +
 +	if (!__archive_rb_tree_insert_node(
 +	    &(parent->rbtree), (struct archive_rb_node *)child))
 +		return (0);
 +	if ((child->chnext = parent->children.first) == NULL)
 +		parent->children.last = &(child->chnext);
 +	parent->children.first = child;
 +	parent->children.cnt++;
 +	child->parent = parent;
 +
 +	/* Add a child to a sub-directory chain */
 +	if (child->dir) {
 +		if ((child->drnext = parent->subdirs.first) == NULL)
 +			parent->subdirs.last = &(child->drnext);
 +		parent->subdirs.first = child;
 +		parent->subdirs.cnt++;
 +		child->parent = parent;
 +	} else
 +		child->drnext = NULL;
 +	return (1);
 +}
 +
 +static int
 +isoent_add_child_tail(struct isoent *parent, struct isoent *child)
 +{
 +
 +	if (!__archive_rb_tree_insert_node(
 +	    &(parent->rbtree), (struct archive_rb_node *)child))
 +		return (0);
 +	child->chnext = NULL;
 +	*parent->children.last = child;
 +	parent->children.last = &(child->chnext);
 +	parent->children.cnt++;
 +	child->parent = parent;
 +
 +	/* Add a child to a sub-directory chain */
 +	child->drnext = NULL;
 +	if (child->dir) {
 +		*parent->subdirs.last = child;
 +		parent->subdirs.last = &(child->drnext);
 +		parent->subdirs.cnt++;
 +		child->parent = parent;
 +	}
 +	return (1);
 +}
 +
 +static void
 +isoent_remove_child(struct isoent *parent, struct isoent *child)
 +{
 +	struct isoent *ent;
 +
 +	/* Remove a child entry from children chain. */
 +	ent = parent->children.first;
 +	while (ent->chnext != child)
 +		ent = ent->chnext;
 +	if ((ent->chnext = ent->chnext->chnext) == NULL)
 +		parent->children.last = &(ent->chnext);
 +	parent->children.cnt--;
 +
 +	if (child->dir) {
 +		/* Remove a child entry from sub-directory chain. */
 +		ent = parent->subdirs.first;
 +		while (ent->drnext != child)
 +			ent = ent->drnext;
 +		if ((ent->drnext = ent->drnext->drnext) == NULL)
 +			parent->subdirs.last = &(ent->drnext);
 +		parent->subdirs.cnt--;
 +	}
 +
 +	__archive_rb_tree_remove_node(&(parent->rbtree),
 +	    (struct archive_rb_node *)child);
 +}
 +
 +static int
 +isoent_clone_tree(struct archive_write *a, struct isoent **nroot,
 +    struct isoent *root)
 +{
 +	struct isoent *np, *xroot, *newent;
 +
 +	np = root;
 +	xroot = NULL;
 +	do {
 +		newent = isoent_clone(np);
 +		if (newent == NULL) {
 +			archive_set_error(&a->archive, ENOMEM,
 +			    "Can't allocate memory");
 +			return (ARCHIVE_FATAL);
 +		}
 +		if (xroot == NULL) {
 +			*nroot = xroot = newent;
 +			newent->parent = xroot;
 +		} else
 +			isoent_add_child_tail(xroot, newent);
 +		if (np->dir && np->children.first != NULL) {
 +			/* Enter to sub directories. */
 +			np = np->children.first;
 +			xroot = newent;
 +			continue;
 +		}
 +		while (np != np->parent) {
 +			if (np->chnext == NULL) {
 +				/* Return to the parent directory. */
 +				np = np->parent;
 +				xroot = xroot->parent;
 +			} else {
 +				np = np->chnext;
 +				break;
 +			}
 +		}
 +	} while (np != np->parent);
 +
 +	return (ARCHIVE_OK);
 +}
 +
 +/*
 + * Setup directory locations.
 + */
 +static void
 +isoent_setup_directory_location(struct iso9660 *iso9660, int location,
 +    struct vdd *vdd)
 +{
 +	struct isoent *np;
 +	int depth;
 +
 +	vdd->total_dir_block = 0;
 +	depth = 0;
 +	np = vdd->rootent;
 +	do {
 +		int block;
 +
 +		np->dir_block = calculate_directory_descriptors(
 +		    iso9660, vdd, np, depth);
 +		vdd->total_dir_block += np->dir_block;
 +		np->dir_location = location;
 +		location += np->dir_block;
 +		block = extra_setup_location(np, location);
 +		vdd->total_dir_block += block;
 +		location += block;
 +
 +		if (np->subdirs.first != NULL && depth + 1 < vdd->max_depth) {
 +			/* Enter to sub directories. */
 +			np = np->subdirs.first;
 +			depth++;
 +			continue;
 +		}
 +		while (np != np->parent) {
 +			if (np->drnext == NULL) {
 +				/* Return to the parent directory. */
 +				np = np->parent;
 +				depth--;
 +			} else {
 +				np = np->drnext;
 +				break;
 +			}
 +		}
 +	} while (np != np->parent);
 +}
 +
 +static void
 +_isoent_file_location(struct iso9660 *iso9660, struct isoent *isoent,
 +    int *symlocation)
 +{
 +	struct isoent **children;
 +	int n;
 +
 +	if (isoent->children.cnt == 0)
 +		return;
 +
 +	children = isoent->children_sorted;
 +	for (n = 0; n < isoent->children.cnt; n++) {
 +		struct isoent *np;
 +		struct isofile *file;
 +
 +		np = children[n];
 +		if (np->dir)
 +			continue;
 +		if (np == iso9660->el_torito.boot)
 +			continue;
 +		file = np->file;
 +		if (file->boot || file->hardlink_target != NULL)
 +			continue;
 +		if (archive_entry_filetype(file->entry) == AE_IFLNK ||
 +		    file->content.size == 0) {
 +			/*
 +			 * Do not point a valid location.
 +			 * Make sure entry is not hardlink file.
 +			 */
 +			file->content.location = (*symlocation)--;
 +			continue;
 +		}
 +
 +		file->write_content = 1;
 +	}
 +}
 +
 +/*
 + * Setup file locations.
 + */
 +static void
 +isoent_setup_file_location(struct iso9660 *iso9660, int location)
 +{
 +	struct isoent *isoent;
 +	struct isoent *np;
 +	struct isofile *file;
 +	size_t size;
 +	int block;
 +	int depth;
 +	int joliet;
 +	int symlocation;
 +	int total_block;
 +
 +	iso9660->total_file_block = 0;
 +	if ((isoent = iso9660->el_torito.catalog) != NULL) {
 +		isoent->file->content.location = location;
 +		block = (int)((archive_entry_size(isoent->file->entry) +
 +		    LOGICAL_BLOCK_SIZE -1) >> LOGICAL_BLOCK_BITS);
 +		location += block;
 +		iso9660->total_file_block += block;
 +	}
 +	if ((isoent = iso9660->el_torito.boot) != NULL) {
 +		isoent->file->content.location = location;
 +		size = fd_boot_image_size(iso9660->el_torito.media_type);
 +		if (size == 0)
 +			size = (size_t)archive_entry_size(isoent->file->entry);
 +		block = ((int)size + LOGICAL_BLOCK_SIZE -1)
 +		    >> LOGICAL_BLOCK_BITS;
 +		location += block;
 +		iso9660->total_file_block += block;
 +		isoent->file->content.blocks = block;
 +	}
 +
 +	depth = 0;
 +	symlocation = -16;
 +	if (!iso9660->opt.rr && iso9660->opt.joliet) {
 +		joliet = 1;
 +		np = iso9660->joliet.rootent;
 +	} else {
 +		joliet = 0;
 +		np = iso9660->primary.rootent;
 +	}
 +	do {
 +		_isoent_file_location(iso9660, np, &symlocation);
 +
 +		if (np->subdirs.first != NULL &&
 +		    (joliet ||
 +		    ((iso9660->opt.rr == OPT_RR_DISABLED &&
 +		      depth + 2 < iso9660->primary.max_depth) ||
 +		     (iso9660->opt.rr &&
 +		      depth + 1 < iso9660->primary.max_depth)))) {
 +			/* Enter to sub directories. */
 +			np = np->subdirs.first;
 +			depth++;
 +			continue;
 +		}
 +		while (np != np->parent) {
 +			if (np->drnext == NULL) {
 +				/* Return to the parent directory. */
 +				np = np->parent;
 +				depth--;
 +			} else {
 +				np = np->drnext;
 +				break;
 +			}
 +		}
 +	} while (np != np->parent);
 +
 +	total_block = 0;
 +	for (file = iso9660->data_file_list.first;
 +	    file != NULL; file = file->datanext) {
 +
 +		if (!file->write_content)
 +			continue;
 +
 +		file->cur_content = &(file->content);
 +		do {
 +			file->cur_content->location = location;
 +			location += file->cur_content->blocks;
 +			total_block += file->cur_content->blocks;
- 			/* Next fragument */
++			/* Next fragment */
 +			file->cur_content = file->cur_content->next;
 +		} while (file->cur_content != NULL);
 +	}
 +	iso9660->total_file_block += total_block;
 +}
 +
 +static int
 +get_path_component(char *name, size_t n, const char *fn)
 +{
 +	char *p;
 +	size_t l;
 +
 +	p = strchr(fn, '/');
 +	if (p == NULL) {
 +		if ((l = strlen(fn)) == 0)
 +			return (0);
 +	} else
 +		l = p - fn;
 +	if (l > n -1)
 +		return (-1);
 +	memcpy(name, fn, l);
 +	name[l] = '\0';
 +
 +	return ((int)l);
 +}
 +
 +/*
 + * Add a new entry into the tree.
 + */
 +static int
 +isoent_tree(struct archive_write *a, struct isoent **isoentpp)
 +{
 +#if defined(_WIN32) && !defined(__CYGWIN__)
 +	char name[_MAX_FNAME];/* Included null terminator size. */
 +#elif defined(NAME_MAX) && NAME_MAX >= 255
 +	char name[NAME_MAX+1];
 +#else
 +	char name[256];
 +#endif
 +	struct iso9660 *iso9660 = a->format_data;
 +	struct isoent *dent, *isoent, *np;
 +	struct isofile *f1, *f2;
 +	const char *fn, *p;
 +	int l;
 +
 +	isoent = *isoentpp;
 +	dent = iso9660->primary.rootent;
 +	if (isoent->file->parentdir.length > 0)
 +		fn = p = isoent->file->parentdir.s;
 +	else
 +		fn = p = "";
 +
 +	/*
 +	 * If the path of the parent directory of `isoent' entry is
 +	 * the same as the path of `cur_dirent', add isoent to
 +	 * `cur_dirent'.
 +	 */
 +	if (archive_strlen(&(iso9660->cur_dirstr))
 +	      == archive_strlen(&(isoent->file->parentdir)) &&
 +	    strcmp(iso9660->cur_dirstr.s, fn) == 0) {
 +		if (!isoent_add_child_tail(iso9660->cur_dirent, isoent)) {
 +			np = (struct isoent *)__archive_rb_tree_find_node(
 +			    &(iso9660->cur_dirent->rbtree),
 +			    isoent->file->basename.s);
 +			goto same_entry;
 +		}
 +		return (ARCHIVE_OK);
 +	}
 +
 +	for (;;) {
 +		l = get_path_component(name, sizeof(name), fn);
 +		if (l == 0) {
 +			np = NULL;
 +			break;
 +		}
 +		if (l < 0) {
 +			archive_set_error(&a->archive,
 +			    ARCHIVE_ERRNO_MISC,
 +			    "A name buffer is too small");
 +			_isoent_free(isoent);
 +			return (ARCHIVE_FATAL);
 +		}
 +
 +		np = isoent_find_child(dent, name);
 +		if (np == NULL || fn[0] == '\0')
 +			break;
 +
 +		/* Find next subdirectory. */
 +		if (!np->dir) {
 +			/* NOT Directory! */
 +			archive_set_error(&a->archive,
 +			    ARCHIVE_ERRNO_MISC,
 +			    "`%s' is not directory, we cannot insert `%s' ",
 +			    archive_entry_pathname(np->file->entry),
 +			    archive_entry_pathname(isoent->file->entry));
 +			_isoent_free(isoent);
 +			*isoentpp = NULL;
 +			return (ARCHIVE_FAILED);
 +		}
 +		fn += l;
 +		if (fn[0] == '/')
 +			fn++;
 +		dent = np;
 +	}
 +	if (np == NULL) {
 +		/*
 +		 * Create virtual parent directories.
 +		 */
 +		while (fn[0] != '\0') {
 +			struct isoent *vp;
 +			struct archive_string as;
 +
 +			archive_string_init(&as);
 +			archive_strncat(&as, p, fn - p + l);
 +			if (as.s[as.length-1] == '/') {
 +				as.s[as.length-1] = '\0';
 +				as.length--;
 +			}
 +			vp = isoent_create_virtual_dir(a, iso9660, as.s);
 +			if (vp == NULL) {
 +				archive_string_free(&as);
 +				archive_set_error(&a->archive, ENOMEM,
 +				    "Can't allocate memory");
 +				_isoent_free(isoent);
 +				*isoentpp = NULL;
 +				return (ARCHIVE_FATAL);
 +			}
 +			archive_string_free(&as);
 +
 +			if (vp->file->dircnt > iso9660->dircnt_max)
 +				iso9660->dircnt_max = vp->file->dircnt;
 +			isoent_add_child_tail(dent, vp);
 +			np = vp;
 +
 +			fn += l;
 +			if (fn[0] == '/')
 +				fn++;
 +			l = get_path_component(name, sizeof(name), fn);
 +			if (l < 0) {
 +				archive_string_free(&as);
 +				archive_set_error(&a->archive,
 +				    ARCHIVE_ERRNO_MISC,
 +				    "A name buffer is too small");
 +				_isoent_free(isoent);
 +				*isoentpp = NULL;
 +				return (ARCHIVE_FATAL);
 +			}
 +			dent = np;
 +		}
 +
 +		/* Found out the parent directory where isoent can be
 +		 * inserted. */
 +		iso9660->cur_dirent = dent;
 +		archive_string_empty(&(iso9660->cur_dirstr));
 +		archive_string_ensure(&(iso9660->cur_dirstr),
 +		    archive_strlen(&(dent->file->parentdir)) +
 +		    archive_strlen(&(dent->file->basename)) + 2);
 +		if (archive_strlen(&(dent->file->parentdir)) +
 +		    archive_strlen(&(dent->file->basename)) == 0)
 +			iso9660->cur_dirstr.s[0] = 0;
 +		else {
 +			if (archive_strlen(&(dent->file->parentdir)) > 0) {
 +				archive_string_copy(&(iso9660->cur_dirstr),
 +				    &(dent->file->parentdir));
 +				archive_strappend_char(&(iso9660->cur_dirstr), '/');
 +			}
 +			archive_string_concat(&(iso9660->cur_dirstr),
 +			    &(dent->file->basename));
 +		}
 +
 +		if (!isoent_add_child_tail(dent, isoent)) {
 +			np = (struct isoent *)__archive_rb_tree_find_node(
 +			    &(dent->rbtree), isoent->file->basename.s);
 +			goto same_entry;
 +		}
 +		return (ARCHIVE_OK);
 +	}
 +
 +same_entry:
 +	/*
 +	 * We have already has the entry the filename of which is
 +	 * the same.
 +	 */
 +	f1 = np->file;
 +	f2 = isoent->file;
 +
 +	/* If the file type of entries is different,
 +	 * we cannot handle it. */
 +	if (archive_entry_filetype(f1->entry) !=
 +	    archive_entry_filetype(f2->entry)) {
 +		archive_set_error(&a->archive, ARCHIVE_ERRNO_MISC,
 +		    "Found duplicate entries `%s' and its file type is "
 +		    "different",
 +		    archive_entry_pathname(f1->entry));
 +		_isoent_free(isoent);
 +		*isoentpp = NULL;
 +		return (ARCHIVE_FAILED);
 +	}
 +
 +	/* Swap file entries. */
 +	np->file = f2;
 +	isoent->file = f1;
 +	np->virtual = 0;
 +
 +	_isoent_free(isoent);
 +	*isoentpp = np;
 +	return (ARCHIVE_OK);
 +}
 +
 +/*
 + * Find a entry from `isoent'
 + */
 +static struct isoent *
 +isoent_find_child(struct isoent *isoent, const char *child_name)
 +{
 +	struct isoent *np;
 +
 +	np = (struct isoent *)__archive_rb_tree_find_node(
 +	    &(isoent->rbtree), child_name);
 +	return (np);
 +}
 +
 +/*
 + * Find a entry full-path of which is specified by `fn' parameter,
 + * in the tree.
 + */
 +static struct isoent *
 +isoent_find_entry(struct isoent *rootent, const char *fn)
 +{
 +#if defined(_WIN32) && !defined(__CYGWIN__)
 +	char name[_MAX_FNAME];/* Included null terminator size. */
 +#elif defined(NAME_MAX) && NAME_MAX >= 255
 +	char name[NAME_MAX+1];
 +#else
 +	char name[256];
 +#endif
 +	struct isoent *isoent, *np;
 +	int l;
 +
 +	isoent = rootent;
 +	np = NULL;
 +	for (;;) {
 +		l = get_path_component(name, sizeof(name), fn);
 +		if (l == 0)
 +			break;
 +		fn += l;
 +		if (fn[0] == '/')
 +			fn++;
 +
 +		np = isoent_find_child(isoent, name);
 +		if (np == NULL)
 +			break;
 +		if (fn[0] == '\0')
 +			break;/* We found out the entry */
 +
 +		/* Try sub directory. */
 +		isoent = np;
 +		np = NULL;
 +		if (!isoent->dir)
 +			break;/* Not directory */
 +	}
 +
 +	return (np);
 +}
 +
 +/*
 + * Following idr_* functions are used for resolving duplicated filenames
 + * and unreceivable filenames to generate ISO9660/Joliet Identifiers.
 + */
 +
 +static void
 +idr_relaxed_filenames(char *map)
 +{
 +	int i;
 +
 +	for (i = 0x21; i <= 0x2F; i++)
 +		map[i] = 1;
 +	for (i = 0x3A; i <= 0x41; i++)
 +		map[i] = 1;
 +	for (i = 0x5B; i <= 0x5E; i++)
 +		map[i] = 1;
 +	map[0x60] = 1;
 +	for (i = 0x7B; i <= 0x7E; i++)
 +		map[i] = 1;
 +}
 +
 +static void
 +idr_init(struct iso9660 *iso9660, struct vdd *vdd, struct idr *idr)
 +{
 +
 +	idr->idrent_pool = NULL;
 +	idr->pool_size = 0;
 +	if (vdd->vdd_type != VDD_JOLIET) {
 +		if (iso9660->opt.iso_level <= 3) {
 +			memcpy(idr->char_map, d_characters_map,
 +			    sizeof(idr->char_map));
 +		} else {
 +			memcpy(idr->char_map, d1_characters_map,
 +			    sizeof(idr->char_map));
 +			idr_relaxed_filenames(idr->char_map);
 +		}
 +	}
 +}
 +
 +static void
 +idr_cleanup(struct idr *idr)
 +{
 +	free(idr->idrent_pool);
 +}
 +
 +static int
 +idr_ensure_poolsize(struct archive_write *a, struct idr *idr,
 +    int cnt)
 +{
 +
 +	if (idr->pool_size < cnt) {
 +		void *p;
 +		const int bk = (1 << 7) - 1;
 +		int psize;
 +
 +		psize = (cnt + bk) & ~bk;
 +		p = realloc(idr->idrent_pool, sizeof(struct idrent) * psize);
 +		if (p == NULL) {
 +			archive_set_error(&a->archive, ENOMEM,
 +			    "Can't allocate memory");
 +			return (ARCHIVE_FATAL);
 +		}
 +		idr->idrent_pool = (struct idrent *)p;
 +		idr->pool_size = psize;
 +	}
 +	return (ARCHIVE_OK);
 +}
 +
 +static int
 +idr_start(struct archive_write *a, struct idr *idr, int cnt, int ffmax,
 +    int num_size, int null_size, const struct archive_rb_tree_ops *rbt_ops)
 +{
 +	int r;
 +
 +	(void)ffmax; /* UNUSED */
 +
 +	r = idr_ensure_poolsize(a, idr, cnt);
 +	if (r != ARCHIVE_OK)
 +		return (r);
 +	__archive_rb_tree_init(&(idr->rbtree), rbt_ops);
 +	idr->wait_list.first = NULL;
 +	idr->wait_list.last = &(idr->wait_list.first);
 +	idr->pool_idx = 0;
 +	idr->num_size = num_size;
 +	idr->null_size = null_size;
 +	return (ARCHIVE_OK);
 +}
 +
 +static void
 +idr_register(struct idr *idr, struct isoent *isoent, int weight, int noff)
 +{
 +	struct idrent *idrent, *n;
 +
 +	idrent = &(idr->idrent_pool[idr->pool_idx++]);
 +	idrent->wnext = idrent->avail = NULL;
 +	idrent->isoent = isoent;
 +	idrent->weight = weight;
 +	idrent->noff = noff;
 +	idrent->rename_num = 0;
 +
 +	if (!__archive_rb_tree_insert_node(&(idr->rbtree), &(idrent->rbnode))) {
 +		n = (struct idrent *)__archive_rb_tree_find_node(
 +		    &(idr->rbtree), idrent->isoent);
 +		if (n != NULL) {
 +			/* this `idrent' needs to rename. */
 +			idrent->avail = n;
 +			*idr->wait_list.last = idrent;
 +			idr->wait_list.last = &(idrent->wnext);
 +		}
 +	}
 +}
 +
 +static void
 +idr_extend_identifier(struct idrent *wnp, int numsize, int nullsize)
 +{
 +	unsigned char *p;
 +	int wnp_ext_off;
 +
 +	wnp_ext_off = wnp->isoent->ext_off;
 +	if (wnp->noff + numsize != wnp_ext_off) {
 +		p = (unsigned char *)wnp->isoent->identifier;
 +		/* Extend the filename; foo.c --> foo___.c */
 +		memmove(p + wnp->noff + numsize, p + wnp_ext_off,
 +		    wnp->isoent->ext_len + nullsize);
 +		wnp->isoent->ext_off = wnp_ext_off = wnp->noff + numsize;
 +		wnp->isoent->id_len = wnp_ext_off + wnp->isoent->ext_len;
 +	}
 +}
 +
 +static void
 +idr_resolve(struct idr *idr, void (*fsetnum)(unsigned char *p, int num))
 +{
 +	struct idrent *n;
 +	unsigned char *p;
 +
 +	for (n = idr->wait_list.first; n != NULL; n = n->wnext) {
 +		idr_extend_identifier(n, idr->num_size, idr->null_size);
 +		p = (unsigned char *)n->isoent->identifier + n->noff;
 +		do {
 +			fsetnum(p, n->avail->rename_num++);
 +		} while (!__archive_rb_tree_insert_node(
 +		    &(idr->rbtree), &(n->rbnode)));
 +	}
 +}
 +
 +static void
 +idr_set_num(unsigned char *p, int num)
 +{
 +	static const char xdig[] = {
 +		'0', '1', '2', '3', '4', '5', '6', '7', '8', '9',
 +		'A', 'B', 'C', 'D', 'E', 'F', 'G', 'H', 'I', 'J',
 +		'K', 'L', 'M', 'N', 'O', 'P', 'Q', 'R', 'S', 'T',
 +		'U', 'V', 'W', 'X', 'Y', 'Z'
 +	};
 +
 +	num %= sizeof(xdig) * sizeof(xdig) * sizeof(xdig);
 +	p[0] = xdig[(num / (sizeof(xdig) * sizeof(xdig)))];
 +	num %= sizeof(xdig) * sizeof(xdig);
 +	p[1] = xdig[ (num / sizeof(xdig))];
 +	num %= sizeof(xdig);
 +	p[2] = xdig[num];
 +}
 +
 +static void
 +idr_set_num_beutf16(unsigned char *p, int num)
 +{
 +	static const uint16_t xdig[] = {
 +		0x0030, 0x0031, 0x0032, 0x0033, 0x0034, 0x0035,
 +		0x0036, 0x0037, 0x0038, 0x0039,
 +		0x0041, 0x0042, 0x0043, 0x0044, 0x0045, 0x0046,
 +		0x0047, 0x0048, 0x0049, 0x004A, 0x004B, 0x004C,
 +		0x004D, 0x004E, 0x004F, 0x0050, 0x0051, 0x0052,
 +		0x0053, 0x0054, 0x0055, 0x0056, 0x0057, 0x0058,
 +		0x0059, 0x005A
 +	};
 +#define XDIG_CNT	(sizeof(xdig)/sizeof(xdig[0]))
 +
 +	num %= XDIG_CNT * XDIG_CNT * XDIG_CNT;
 +	archive_be16enc(p, xdig[(num / (XDIG_CNT * XDIG_CNT))]);
 +	num %= XDIG_CNT * XDIG_CNT;
 +	archive_be16enc(p+2, xdig[ (num / XDIG_CNT)]);
 +	num %= XDIG_CNT;
 +	archive_be16enc(p+4, xdig[num]);
 +}
 +
 +/*
 + * Generate ISO9660 Identifier.
 + */
 +static int
 +isoent_gen_iso9660_identifier(struct archive_write *a, struct isoent *isoent,
 +    struct idr *idr)
 +{
 +	struct iso9660 *iso9660;
 +	struct isoent *np;
 +	char *p;
 +	int l, r;
 +	const char *char_map;
 +	char allow_ldots, allow_multidot, allow_period, allow_vernum;
 +	int fnmax, ffmax, dnmax;
 +	static const struct archive_rb_tree_ops rb_ops = {
 +		isoent_cmp_node_iso9660, isoent_cmp_key_iso9660
 +	};
 +
 +	if (isoent->children.cnt == 0)
 +		return (0);
 +
 +	iso9660 = a->format_data;
 +	char_map = idr->char_map;
 +	if (iso9660->opt.iso_level <= 3) {
 +		allow_ldots = 0;
 +		allow_multidot = 0;
 +		allow_period = 1;
 +		allow_vernum = iso9660->opt.allow_vernum;
 +		if (iso9660->opt.iso_level == 1) {
 +			fnmax = 8;
 +			ffmax = 12;/* fnmax + '.' + 3 */
 +			dnmax = 8;
 +		} else {
 +			fnmax = 30;
 +			ffmax = 31;
 +			dnmax = 31;
 +		}
 +	} else {
 +		allow_ldots = allow_multidot = 1;
 +		allow_period = allow_vernum = 0;
 +		if (iso9660->opt.rr)
 +			/*
 +			 * MDR : The maximum size of Directory Record(254).
 +			 * DRL : A Directory Record Length(33).
 +			 * CE  : A size of SUSP CE System Use Entry(28).
 +			 * MDR - DRL - CE = 254 - 33 - 28 = 193.
 +			 */
 +			fnmax = ffmax = dnmax = 193;
 +		else
 +			/*
 +			 * XA  : CD-ROM XA System Use Extension
 +			 *       Information(14).
 +			 * MDR - DRL - XA = 254 - 33 -14 = 207.
 +			 */
 +			fnmax = ffmax = dnmax = 207;
 +	}
 +
 +	r = idr_start(a, idr, isoent->children.cnt, ffmax, 3, 1, &rb_ops);
 +	if (r < 0)
 +		return (r);
 +
 +	for (np = isoent->children.first; np != NULL; np = np->chnext) {
 +		char *dot, *xdot;
 +		int ext_off, noff, weight;
 +
 +		l = (int)np->file->basename.length;
 +		p = malloc(l+31+2+1);
 +		if (p == NULL) {
 +			archive_set_error(&a->archive, ENOMEM,
 +			    "Can't allocate memory");
 +			return (ARCHIVE_FATAL);
 +		}
 +		memcpy(p, np->file->basename.s, l);
 +		p[l] = '\0';
 +		np->identifier = p;
 +
 +		dot = xdot = NULL;
 +		if (!allow_ldots) {
 +			/*
 +			 * If there is a '.' character at the first byte,
 +			 * it has to be replaced by '_' character.
 +			 */
 +			if (*p == '.')
 +				*p++ = '_';
 +		}
 +		for (;*p; p++) {
 +			if (*p & 0x80) {
 +				*p = '_';
 +				continue;
 +			}
 +			if (char_map[(unsigned char)*p]) {
 +				/* if iso-level is '4', a character '.' is
 +				 * allowed by char_map. */
 +				if (*p == '.') {
 +					xdot = dot;
 +					dot = p;
 +				}
 +				continue;
 +			}
 +			if (*p >= 'a' && *p <= 'z') {
 +				*p -= 'a' - 'A';
 +				continue;
 +			}
 +			if (*p == '.') {
 +				xdot = dot;
 +				dot = p;
 +				if (allow_multidot)
 +					continue;
 +			}
 +			*p = '_';
 +		}
 +		p = np->identifier;
 +		weight = -1;
 +		if (dot == NULL) {
 +			int nammax;
 +
 +			if (np->dir)
 +				nammax = dnmax;
 +			else
 +				nammax = fnmax;
 +
 +			if (l > nammax) {
 +				p[nammax] = '\0';
 +				weight = nammax;
 +				ext_off = nammax;
 +			} else
 +				ext_off = l;
 +		} else {
 +			*dot = '.';
 +			ext_off = (int)(dot - p);
 +
 +			if (iso9660->opt.iso_level == 1) {
 +				if (dot - p <= 8) {
 +					if (strlen(dot) > 4) {
 +						/* A length of a file extension
 +						 * must be less than 4 */
 +						dot[4] = '\0';
 +						weight = 0;
 +					}
 +				} else {
 +					p[8] = dot[0];
 +					p[9] = dot[1];
 +					p[10] = dot[2];
 +					p[11] = dot[3];
 +					p[12] = '\0';
 +					weight = 8;
 +					ext_off = 8;
 +				}
 +			} else if (np->dir) {
 +				if (l > dnmax) {
 +					p[dnmax] = '\0';
 +					weight = dnmax;
 +					if (ext_off > dnmax)
 +						ext_off = dnmax;
 +				}
 +			} else if (l > ffmax) {
 +				int extlen = (int)strlen(dot);
 +				int xdoff;
 +
 +				if (xdot != NULL)
 +					xdoff = (int)(xdot - p);
 +				else
 +					xdoff = 0;
 +
 +				if (extlen > 1 && xdoff < fnmax-1) {
 +					int off;
 +
 +					if (extlen > ffmax)
 +						extlen = ffmax;
 +					off = ffmax - extlen;
 +					if (off == 0) {
 +						/* A dot('.')  character
- 						 * does't place to the first
++						 * doesn't place to the first
 +						 * byte of identifier. */
 +						off ++;
 +						extlen --;
 +					}
 +					memmove(p+off, dot, extlen);
 +					p[ffmax] = '\0';
 +					ext_off = off;
 +					weight = off;
 +#ifdef COMPAT_MKISOFS
 +				} else if (xdoff >= fnmax-1) {
 +					/* Simulate a bug(?) of mkisofs. */
 +					p[fnmax-1] = '\0';
 +					ext_off = fnmax-1;
 +					weight = fnmax-1;
 +#endif
 +				} else {
 +					p[fnmax] = '\0';
 +					ext_off = fnmax;
 +					weight = fnmax;
 +				}
 +			}
 +		}
 +		/* Save an offset of a file name extension to sort files. */
 +		np->ext_off = ext_off;
 +		np->ext_len = (int)strlen(&p[ext_off]);
 +		np->id_len = l = ext_off + np->ext_len;
 +
 +		/* Make an offset of the number which is used to be set
- 		 * hexadecimal number to avoid duplicate identififier. */
++		 * hexadecimal number to avoid duplicate identifier. */
 +		if (iso9660->opt.iso_level == 1) {
 +			if (ext_off >= 5)
 +				noff = 5;
 +			else
 +				noff = ext_off;
 +		} else {
 +			if (l == ffmax)
 +				noff = ext_off - 3;
 +			else if (l == ffmax-1)
 +				noff = ext_off - 2;
 +			else if (l == ffmax-2)
 +				noff = ext_off - 1;
 +			else
 +				noff = ext_off;
 +		}
 +		/* Register entry to the identifier resolver. */
 +		idr_register(idr, np, weight, noff);
 +	}
 +
 +	/* Resolve duplicate identifier. */
 +	idr_resolve(idr, idr_set_num);
 +
 +	/* Add a period and a version number to identifiers. */
 +	for (np = isoent->children.first; np != NULL; np = np->chnext) {
 +		if (!np->dir && np->rr_child == NULL) {
 +			p = np->identifier + np->ext_off + np->ext_len;
 +			if (np->ext_len == 0 && allow_period) {
 +				*p++ = '.';
 +				np->ext_len = 1;
 +			}
 +			if (np->ext_len == 1 && !allow_period) {
 +				*--p = '\0';
 +				np->ext_len = 0;
 +			}
 +			np->id_len = np->ext_off + np->ext_len;
 +			if (allow_vernum) {
 +				*p++ = ';';
 +				*p++ = '1';
 +				np->id_len += 2;
 +			}
 +			*p = '\0';
 +		} else
 +			np->id_len = np->ext_off + np->ext_len;
 +		np->mb_len = np->id_len;
 +	}
 +	return (ARCHIVE_OK);
 +}
 +
 +/*
 + * Generate Joliet Identifier.
 + */
 +static int
 +isoent_gen_joliet_identifier(struct archive_write *a, struct isoent *isoent,
 +    struct idr *idr)
 +{
 +	struct iso9660 *iso9660;
 +	struct isoent *np;
 +	unsigned char *p;
 +	size_t l;
 +	int r;
 +	size_t ffmax, parent_len;
 +	static const struct archive_rb_tree_ops rb_ops = {
 +		isoent_cmp_node_joliet, isoent_cmp_key_joliet
 +	};
 +
 +	if (isoent->children.cnt == 0)
 +		return (0);
 +
 +	iso9660 = a->format_data;
 +	if (iso9660->opt.joliet == OPT_JOLIET_LONGNAME)
 +		ffmax = 206;
 +	else
 +		ffmax = 128;
 +
 +	r = idr_start(a, idr, isoent->children.cnt, (int)ffmax, 6, 2, &rb_ops);
 +	if (r < 0)
 +		return (r);
 +
 +	parent_len = 1;
 +	for (np = isoent; np->parent != np; np = np->parent)
 +		parent_len += np->mb_len + 1;
 +
 +	for (np = isoent->children.first; np != NULL; np = np->chnext) {
 +		unsigned char *dot;
 +		int ext_off, noff, weight;
 +		size_t lt;
 +
 +		if ((l = np->file->basename_utf16.length) > ffmax)
 +			l = ffmax;
 +
 +		p = malloc((l+1)*2);
 +		if (p == NULL) {
 +			archive_set_error(&a->archive, ENOMEM,
 +			    "Can't allocate memory");
 +			return (ARCHIVE_FATAL);
 +		}
 +		memcpy(p, np->file->basename_utf16.s, l);
 +		p[l] = 0;
 +		p[l+1] = 0;
 +
 +		np->identifier = (char *)p;
 +		lt = l;
 +		dot = p + l;
 +		weight = 0;
 +		while (lt > 0) {
 +			if (!joliet_allowed_char(p[0], p[1]))
 +				archive_be16enc(p, 0x005F); /* '_' */
 +			else if (p[0] == 0 && p[1] == 0x2E) /* '.' */
 +				dot = p;
 +			p += 2;
 +			lt -= 2;
 +		}
 +		ext_off = (int)(dot - (unsigned char *)np->identifier);
 +		np->ext_off = ext_off;
 +		np->ext_len = (int)l - ext_off;
 +		np->id_len = (int)l;
 +
 +		/*
 +		 * Get a length of MBS of a full-pathname.
 +		 */
 +		if (np->file->basename_utf16.length > ffmax) {
 +			if (archive_strncpy_l(&iso9660->mbs,
 +			    (const char *)np->identifier, l,
 +				iso9660->sconv_from_utf16be) != 0 &&
 +			    errno == ENOMEM) {
 +				archive_set_error(&a->archive, errno,
 +				    "No memory");
 +				return (ARCHIVE_FATAL);
 +			}
 +			np->mb_len = (int)iso9660->mbs.length;
 +			if (np->mb_len != (int)np->file->basename.length)
 +				weight = np->mb_len;
 +		} else
 +			np->mb_len = (int)np->file->basename.length;
 +
 +		/* If a length of full-pathname is longer than 240 bytes,
 +		 * it violates Joliet extensions regulation. */
 +		if (parent_len > 240
 +		    || np->mb_len > 240
 +		    || parent_len + np->mb_len > 240) {
 +			archive_set_error(&a->archive, ARCHIVE_ERRNO_MISC,
 +			    "The regulation of Joliet extensions;"
 +			    " A length of a full-pathname of `%s' is "
 +			    "longer than 240 bytes, (p=%d, b=%d)",
 +			    archive_entry_pathname(np->file->entry),
 +			    (int)parent_len, (int)np->mb_len);
 +			return (ARCHIVE_FATAL);
 +		}
 +
 +		/* Make an offset of the number which is used to be set
 +		 * hexadecimal number to avoid duplicate identifier. */
 +		if (l == ffmax)
 +			noff = ext_off - 6;
 +		else if (l == ffmax-2)
 +			noff = ext_off - 4;
 +		else if (l == ffmax-4)
 +			noff = ext_off - 2;
 +		else
 +			noff = ext_off;
 +		/* Register entry to the identifier resolver. */
 +		idr_register(idr, np, weight, noff);
 +	}
 +
 +	/* Resolve duplicate identifier with Joliet Volume. */
 +	idr_resolve(idr, idr_set_num_beutf16);
 +
 +	return (ARCHIVE_OK);
 +}
 +
 +/*
 + * This comparing rule is according to ISO9660 Standard 9.3
 + */
 +static int
 +isoent_cmp_iso9660_identifier(const struct isoent *p1, const struct isoent *p2)
 +{
 +	const char *s1, *s2;
 +	int cmp;
 +	int l;
 +
 +	s1 = p1->identifier;
 +	s2 = p2->identifier;
 +
 +	/* Compare File Name */
 +	l = p1->ext_off;
 +	if (l > p2->ext_off)
 +		l = p2->ext_off;
 +	cmp = memcmp(s1, s2, l);
 +	if (cmp != 0)
 +		return (cmp);
 +	if (p1->ext_off < p2->ext_off) {
 +		s2 += l;
 +		l = p2->ext_off - p1->ext_off;
 +		while (l--)
 +			if (0x20 != *s2++)
 +				return (0x20
 +				    - *(const unsigned char *)(s2 - 1));
 +	} else if (p1->ext_off > p2->ext_off) {
 +		s1 += l;
 +		l = p1->ext_off - p2->ext_off;
 +		while (l--)
 +			if (0x20 != *s1++)
 +				return (*(const unsigned char *)(s1 - 1)
 +				    - 0x20);
 +	}
 +	/* Compare File Name Extension */
 +	if (p1->ext_len == 0 && p2->ext_len == 0)
 +		return (0);
 +	if (p1->ext_len == 1 && p2->ext_len == 1)
 +		return (0);
 +	if (p1->ext_len <= 1)
 +		return (-1);
 +	if (p2->ext_len <= 1)
 +		return (1);
 +	l = p1->ext_len;
 +	if (l > p2->ext_len)
 +		l = p2->ext_len;
 +	s1 = p1->identifier + p1->ext_off;
 +	s2 = p2->identifier + p2->ext_off;
 +	if (l > 1) {
 +		cmp = memcmp(s1, s2, l);
 +		if (cmp != 0)
 +			return (cmp);
 +	}
 +	if (p1->ext_len < p2->ext_len) {
 +		s2 += l;
 +		l = p2->ext_len - p1->ext_len;
 +		while (l--)
 +			if (0x20 != *s2++)
 +				return (0x20
 +				    - *(const unsigned char *)(s2 - 1));
 +	} else if (p1->ext_len > p2->ext_len) {
 +		s1 += l;
 +		l = p1->ext_len - p2->ext_len;
 +		while (l--)
 +			if (0x20 != *s1++)
 +				return (*(const unsigned char *)(s1 - 1)
 +				    - 0x20);
 +	}
 +	/* Compare File Version Number */
 +	/* No operation. The File Version Number is always one. */
 +
 +	return (cmp);
 +}
 +
 +static int
 +isoent_cmp_node_iso9660(const struct archive_rb_node *n1,
 +    const struct archive_rb_node *n2)
 +{
 +	const struct idrent *e1 = (const struct idrent *)n1;
 +	const struct idrent *e2 = (const struct idrent *)n2;
 +
 +	return (isoent_cmp_iso9660_identifier(e2->isoent, e1->isoent));
 +}
 +
 +static int
 +isoent_cmp_key_iso9660(const struct archive_rb_node *node, const void *key)
 +{
 +	const struct isoent *isoent = (const struct isoent *)key;
 +	const struct idrent *idrent = (const struct idrent *)node;
 +
 +	return (isoent_cmp_iso9660_identifier(isoent, idrent->isoent));
 +}
 +
 +static int
 +isoent_cmp_joliet_identifier(const struct isoent *p1, const struct isoent *p2)
 +{
 +	const unsigned char *s1, *s2;
 +	int cmp;
 +	int l;
 +
 +	s1 = (const unsigned char *)p1->identifier;
 +	s2 = (const unsigned char *)p2->identifier;
 +
 +	/* Compare File Name */
 +	l = p1->ext_off;
 +	if (l > p2->ext_off)
 +		l = p2->ext_off;
 +	cmp = memcmp(s1, s2, l);
 +	if (cmp != 0)
 +		return (cmp);
 +	if (p1->ext_off < p2->ext_off) {
 +		s2 += l;
 +		l = p2->ext_off - p1->ext_off;
 +		while (l--)
 +			if (0 != *s2++)
 +				return (- *(const unsigned char *)(s2 - 1));
 +	} else if (p1->ext_off > p2->ext_off) {
 +		s1 += l;
 +		l = p1->ext_off - p2->ext_off;
 +		while (l--)
 +			if (0 != *s1++)
 +				return (*(const unsigned char *)(s1 - 1));
 +	}
 +	/* Compare File Name Extension */
 +	if (p1->ext_len == 0 && p2->ext_len == 0)
 +		return (0);
 +	if (p1->ext_len == 2 && p2->ext_len == 2)
 +		return (0);
 +	if (p1->ext_len <= 2)
 +		return (-1);
 +	if (p2->ext_len <= 2)
 +		return (1);
 +	l = p1->ext_len;
 +	if (l > p2->ext_len)
 +		l = p2->ext_len;
 +	s1 = (unsigned char *)(p1->identifier + p1->ext_off);
 +	s2 = (unsigned char *)(p2->identifier + p2->ext_off);
 +	if (l > 1) {
 +		cmp = memcmp(s1, s2, l);
 +		if (cmp != 0)
 +			return (cmp);
 +	}
 +	if (p1->ext_len < p2->ext_len) {
 +		s2 += l;
 +		l = p2->ext_len - p1->ext_len;
 +		while (l--)
 +			if (0 != *s2++)
 +				return (- *(const unsigned char *)(s2 - 1));
 +	} else if (p1->ext_len > p2->ext_len) {
 +		s1 += l;
 +		l = p1->ext_len - p2->ext_len;
 +		while (l--)
 +			if (0 != *s1++)
 +				return (*(const unsigned char *)(s1 - 1));
 +	}
 +	/* Compare File Version Number */
 +	/* No operation. The File Version Number is always one. */
 +
 +	return (cmp);
 +}
 +
 +static int
 +isoent_cmp_node_joliet(const struct archive_rb_node *n1,
 +    const struct archive_rb_node *n2)
 +{
 +	const struct idrent *e1 = (const struct idrent *)n1;
 +	const struct idrent *e2 = (const struct idrent *)n2;
 +
 +	return (isoent_cmp_joliet_identifier(e2->isoent, e1->isoent));
 +}
 +
 +static int
 +isoent_cmp_key_joliet(const struct archive_rb_node *node, const void *key)
 +{
 +	const struct isoent *isoent = (const struct isoent *)key;
 +	const struct idrent *idrent = (const struct idrent *)node;
 +
 +	return (isoent_cmp_joliet_identifier(isoent, idrent->isoent));
 +}
 +
 +static int
 +isoent_make_sorted_files(struct archive_write *a, struct isoent *isoent,
 +    struct idr *idr)
 +{
 +	struct archive_rb_node *rn;
 +	struct isoent **children;
 +
 +	children = malloc(isoent->children.cnt * sizeof(struct isoent *));
 +	if (children == NULL) {
 +		archive_set_error(&a->archive, ENOMEM,
 +		    "Can't allocate memory");
 +		return (ARCHIVE_FATAL);
 +	}
 +	isoent->children_sorted = children;
 +
 +	ARCHIVE_RB_TREE_FOREACH(rn, &(idr->rbtree)) {
 +		struct idrent *idrent = (struct idrent *)rn;
 +		*children ++ = idrent->isoent;
 +	}
 +	return (ARCHIVE_OK);
 +}
 +
 +/*
 + * - Generate ISO9660 and Joliet identifiers from basenames.
 + * - Sort files by each directory.
 + */
 +static int
 +isoent_traverse_tree(struct archive_write *a, struct vdd* vdd)
 +{
 +	struct iso9660 *iso9660 = a->format_data;
 +	struct isoent *np;
 +	struct idr idr;
 +	int depth;
 +	int r;
 +	int (*genid)(struct archive_write *, struct isoent *, struct idr *);
 +
 +	idr_init(iso9660, vdd, &idr);
 +	np = vdd->rootent;
 +	depth = 0;
 +	if (vdd->vdd_type == VDD_JOLIET)
 +		genid = isoent_gen_joliet_identifier;
 +	else
 +		genid = isoent_gen_iso9660_identifier;
 +	do {
 +		if (np->virtual &&
 +		    !archive_entry_mtime_is_set(np->file->entry)) {
 +			/* Set properly times to virtual directory */
 +			archive_entry_set_mtime(np->file->entry,
 +			    iso9660->birth_time, 0);
 +			archive_entry_set_atime(np->file->entry,
 +			    iso9660->birth_time, 0);
 +			archive_entry_set_ctime(np->file->entry,
 +			    iso9660->birth_time, 0);
 +		}
 +		if (np->children.first != NULL) {
 +			if (vdd->vdd_type != VDD_JOLIET &&
 +			    !iso9660->opt.rr && depth + 1 >= vdd->max_depth) {
 +				if (np->children.cnt > 0)
 +					iso9660->directories_too_deep = np;
 +			} else {
 +				/* Generate Identifier */
 +				r = genid(a, np, &idr);
 +				if (r < 0)
 +					goto exit_traverse_tree;
 +				r = isoent_make_sorted_files(a, np, &idr);
 +				if (r < 0)
 +					goto exit_traverse_tree;
 +
 +				if (np->subdirs.first != NULL &&
 +				    depth + 1 < vdd->max_depth) {
 +					/* Enter to sub directories. */
 +					np = np->subdirs.first;
 +					depth++;
 +					continue;
 +				}
 +			}
 +		}
 +		while (np != np->parent) {
 +			if (np->drnext == NULL) {
 +				/* Return to the parent directory. */
 +				np = np->parent;
 +				depth--;
 +			} else {
 +				np = np->drnext;
 +				break;
 +			}
 +		}
 +	} while (np != np->parent);
 +
 +	r = ARCHIVE_OK;
 +exit_traverse_tree:
 +	idr_cleanup(&idr);
 +
 +	return (r);
 +}
 +
 +/*
 + * Collect directory entries into path_table by a directory depth.
 + */
 +static int
 +isoent_collect_dirs(struct vdd *vdd, struct isoent *rootent, int depth)
 +{
 +	struct isoent *np;
 +
 +	if (rootent == NULL)
 +		rootent = vdd->rootent;
 +	np = rootent;
 +	do {
 +		/* Register current directory to pathtable. */
 +		path_table_add_entry(&(vdd->pathtbl[depth]), np);
 +
 +		if (np->subdirs.first != NULL && depth + 1 < vdd->max_depth) {
 +			/* Enter to sub directories. */
 +			np = np->subdirs.first;
 +			depth++;
 +			continue;
 +		}
 +		while (np != rootent) {
 +			if (np->drnext == NULL) {
 +				/* Return to the parent directory. */
 +				np = np->parent;
 +				depth--;
 +			} else {
 +				np = np->drnext;
 +				break;
 +			}
 +		}
 +	} while (np != rootent);
 +
 +	return (ARCHIVE_OK);
 +}
 +
 +/*
 + * The entry whose number of levels in a directory hierarchy is
 + * large than eight relocate to rr_move directory.
 + */
 +static int
 +isoent_rr_move_dir(struct archive_write *a, struct isoent **rr_moved,
 +    struct isoent *curent, struct isoent **newent)
 +{
 +	struct iso9660 *iso9660 = a->format_data;
 +	struct isoent *rrmoved, *mvent, *np;
 +
 +	if ((rrmoved = *rr_moved) == NULL) {
 +		struct isoent *rootent = iso9660->primary.rootent;
 +		/* There isn't rr_move entry.
 +		 * Create rr_move entry and insert it into the root entry.
 +		 */
 +		rrmoved = isoent_create_virtual_dir(a, iso9660, "rr_moved");
 +		if (rrmoved == NULL) {
 +			archive_set_error(&a->archive, ENOMEM,
 +			    "Can't allocate memory");
 +			return (ARCHIVE_FATAL);
 +		}
 +		/* Add "rr_moved" entry to the root entry. */
 +		isoent_add_child_head(rootent, rrmoved);
 +		archive_entry_set_nlink(rootent->file->entry,
 +		    archive_entry_nlink(rootent->file->entry) + 1);
 +		/* Register "rr_moved" entry to second level pathtable. */
 +		path_table_add_entry(&(iso9660->primary.pathtbl[1]), rrmoved);
 +		/* Save rr_moved. */
 +		*rr_moved = rrmoved;
 +	}
 +	/*
 +	 * Make a clone of curent which is going to be relocated
 +	 * to rr_moved.
 +	 */
 +	mvent = isoent_clone(curent);
 +	if (mvent == NULL) {
 +		archive_set_error(&a->archive, ENOMEM,
 +		    "Can't allocate memory");
 +		return (ARCHIVE_FATAL);
 +	}
 +	/* linking..  and use for creating "CL", "PL" and "RE" */
 +	mvent->rr_parent = curent->parent;
 +	curent->rr_child = mvent;
 +	/*
 +	 * Move subdirectories from the curent to mvent
 +	 */
 +	if (curent->children.first != NULL) {
 +		*mvent->children.last = curent->children.first;
 +		mvent->children.last = curent->children.last;
 +	}
 +	for (np = mvent->children.first; np != NULL; np = np->chnext)
 +		np->parent = mvent;
 +	mvent->children.cnt = curent->children.cnt;
 +	curent->children.cnt = 0;
 +	curent->children.first = NULL;
 +	curent->children.last = &curent->children.first;
 +
 +	if (curent->subdirs.first != NULL) {
 +		*mvent->subdirs.last = curent->subdirs.first;
 +		mvent->subdirs.last = curent->subdirs.last;
 +	}
 +	mvent->subdirs.cnt = curent->subdirs.cnt;
 +	curent->subdirs.cnt = 0;
 +	curent->subdirs.first = NULL;
 +	curent->subdirs.last = &curent->subdirs.first;
 +
 +	/*
 +	 * The mvent becomes a child of the rr_moved entry.
 +	 */
 +	isoent_add_child_tail(rrmoved, mvent);
 +	archive_entry_set_nlink(rrmoved->file->entry,
 +	    archive_entry_nlink(rrmoved->file->entry) + 1);
 +	/*
 +	 * This entry which relocated to the rr_moved directory
 +	 * has to set the flag as a file.
 +	 * See also RRIP 4.1.5.1 Description of the "CL" System Use Entry.
 +	 */
 +	curent->dir = 0;
 +
 +	*newent = mvent;
 +
 +	return (ARCHIVE_OK);
 +}
 +
 +static int
 +isoent_rr_move(struct archive_write *a)
 +{
 +	struct iso9660 *iso9660 = a->format_data;
 +	struct path_table *pt;
 +	struct isoent *rootent, *rr_moved;
 +	struct isoent *np, *last;
 +	int r;
 +
 +	pt = &(iso9660->primary.pathtbl[MAX_DEPTH-1]);
- 	/* Theare aren't level 8 directories reaching a deepr level. */
++	/* There aren't level 8 directories reaching a deeper level. */
 +	if (pt->cnt == 0)
 +		return (ARCHIVE_OK);
 +
 +	rootent = iso9660->primary.rootent;
 +	/* If "rr_moved" directory is already existing,
 +	 * we have to use it. */
 +	rr_moved = isoent_find_child(rootent, "rr_moved");
 +	if (rr_moved != NULL &&
 +	    rr_moved != rootent->children.first) {
 +		/*
 +		 * It's necessary that rr_move is the first entry
 +		 * of the root.
 +		 */
 +		/* Remove "rr_moved" entry from children chain. */
 +		isoent_remove_child(rootent, rr_moved);
 +
 +		/* Add "rr_moved" entry into the head of children chain. */
 +		isoent_add_child_head(rootent, rr_moved);
 +	}
 +
 +	/*
 +	 * Check level 8 path_table.
 +	 * If find out sub directory entries, that entries move to rr_move.
 +	 */
 +	np = pt->first;
 +	while (np != NULL) {
 +		last = path_table_last_entry(pt);
 +		for (; np != NULL; np = np->ptnext) {
 +			struct isoent *mvent;
 +			struct isoent *newent;
 +
 +			if (!np->dir)
 +				continue;
 +			for (mvent = np->subdirs.first;
 +			    mvent != NULL; mvent = mvent->drnext) {
 +				r = isoent_rr_move_dir(a, &rr_moved,
 +				    mvent, &newent);
 +				if (r < 0)
 +					return (r);
 +				isoent_collect_dirs(&(iso9660->primary),
 +				    newent, 2);
 +			}
 +		}
 +		/* If new entries are added to level 8 path_talbe,
 +		 * its sub directory entries move to rr_move too.
 +		 */
 +		np = last->ptnext;
 +	}
 +
 +	return (ARCHIVE_OK);
 +}
 +
 +/*
 + * This comparing rule is according to ISO9660 Standard 6.9.1
 + */
 +static int
 +_compare_path_table(const void *v1, const void *v2)
 +{
 +	const struct isoent *p1, *p2;
 +	const char *s1, *s2;
 +	int cmp, l;
 +
 +	p1 = *((const struct isoent **)(uintptr_t)v1);
 +	p2 = *((const struct isoent **)(uintptr_t)v2);
 +
 +	/* Compare parent directory number */
 +	cmp = p1->parent->dir_number - p2->parent->dir_number;
 +	if (cmp != 0)
 +		return (cmp);
 +
- 	/* Compare indetifier */
++	/* Compare identifier */
 +	s1 = p1->identifier;
 +	s2 = p2->identifier;
 +	l = p1->ext_off;
 +	if (l > p2->ext_off)
 +		l = p2->ext_off;
 +	cmp = strncmp(s1, s2, l);
 +	if (cmp != 0)
 +		return (cmp);
 +	if (p1->ext_off < p2->ext_off) {
 +		s2 += l;
 +		l = p2->ext_off - p1->ext_off;
 +		while (l--)
 +			if (0x20 != *s2++)
 +				return (0x20
 +				    - *(const unsigned char *)(s2 - 1));
 +	} else if (p1->ext_off > p2->ext_off) {
 +		s1 += l;
 +		l = p1->ext_off - p2->ext_off;
 +		while (l--)
 +			if (0x20 != *s1++)
 +				return (*(const unsigned char *)(s1 - 1)
 +				    - 0x20);
 +	}
 +	return (0);
 +}
 +
 +static int
 +_compare_path_table_joliet(const void *v1, const void *v2)
 +{
 +	const struct isoent *p1, *p2;
 +	const unsigned char *s1, *s2;
 +	int cmp, l;
 +
 +	p1 = *((const struct isoent **)(uintptr_t)v1);
 +	p2 = *((const struct isoent **)(uintptr_t)v2);
 +
 +	/* Compare parent directory number */
 +	cmp = p1->parent->dir_number - p2->parent->dir_number;
 +	if (cmp != 0)
 +		return (cmp);
 +
- 	/* Compare indetifier */
++	/* Compare identifier */
 +	s1 = (const unsigned char *)p1->identifier;
 +	s2 = (const unsigned char *)p2->identifier;
 +	l = p1->ext_off;
 +	if (l > p2->ext_off)
 +		l = p2->ext_off;
 +	cmp = memcmp(s1, s2, l);
 +	if (cmp != 0)
 +		return (cmp);
 +	if (p1->ext_off < p2->ext_off) {
 +		s2 += l;
 +		l = p2->ext_off - p1->ext_off;
 +		while (l--)
 +			if (0 != *s2++)
 +				return (- *(const unsigned char *)(s2 - 1));
 +	} else if (p1->ext_off > p2->ext_off) {
 +		s1 += l;
 +		l = p1->ext_off - p2->ext_off;
 +		while (l--)
 +			if (0 != *s1++)
 +				return (*(const unsigned char *)(s1 - 1));
 +	}
 +	return (0);
 +}
 +
 +static inline void
 +path_table_add_entry(struct path_table *pathtbl, struct isoent *ent)
 +{
 +	ent->ptnext = NULL;
 +	*pathtbl->last = ent;
 +	pathtbl->last = &(ent->ptnext);
 +	pathtbl->cnt ++;
 +}
 +
 +static inline struct isoent *
 +path_table_last_entry(struct path_table *pathtbl)
 +{
 +	if (pathtbl->first == NULL)
 +		return (NULL);
 +	return (((struct isoent *)(void *)
 +		((char *)(pathtbl->last) - offsetof(struct isoent, ptnext))));
 +}
 +
 +/*
 + * Sort directory entries in path_table
 + * and assign directory number to each entries.
 + */
 +static int
 +isoent_make_path_table_2(struct archive_write *a, struct vdd *vdd,
 +    int depth, int *dir_number)
 +{
 +	struct isoent *np;
 +	struct isoent **enttbl;
 +	struct path_table *pt;
 +	int i;
 +
 +	pt = &vdd->pathtbl[depth];
 +	if (pt->cnt == 0) {
 +		pt->sorted = NULL;
 +		return (ARCHIVE_OK);
 +	}
 +	enttbl = malloc(pt->cnt * sizeof(struct isoent *));
 +	if (enttbl == NULL) {
 +		archive_set_error(&a->archive, ENOMEM,
 +		    "Can't allocate memory");
 +		return (ARCHIVE_FATAL);
 +	}
 +	pt->sorted = enttbl;
 +	for (np = pt->first; np != NULL; np = np->ptnext)
 +		*enttbl ++ = np;
 +	enttbl = pt->sorted;
 +
 +	switch (vdd->vdd_type) {
 +	case VDD_PRIMARY:
 +	case VDD_ENHANCED:
 +#ifdef __COMPAR_FN_T
 +		qsort(enttbl, pt->cnt, sizeof(struct isoent *),
 +		    (__compar_fn_t)_compare_path_table);
 +#else
 +		qsort(enttbl, pt->cnt, sizeof(struct isoent *),
 +		    _compare_path_table);
 +#endif
 +		break;
 +	case VDD_JOLIET:
 +#ifdef __COMPAR_FN_T
 +		qsort(enttbl, pt->cnt, sizeof(struct isoent *),
 +		    (__compar_fn_t)_compare_path_table_joliet);
 +#else
 +		qsort(enttbl, pt->cnt, sizeof(struct isoent *),
 +		    _compare_path_table_joliet);
 +#endif
 +		break;
 +	}
 +	for (i = 0; i < pt->cnt; i++)
 +		enttbl[i]->dir_number = (*dir_number)++;
 +
 +	return (ARCHIVE_OK);
 +}
 +
 +static int
 +isoent_alloc_path_table(struct archive_write *a, struct vdd *vdd,
 +    int max_depth)
 +{
 +	int i;
 +
 +	vdd->max_depth = max_depth;
 +	vdd->pathtbl = malloc(sizeof(*vdd->pathtbl) * vdd->max_depth);
 +	if (vdd->pathtbl == NULL) {
 +		archive_set_error(&a->archive, ENOMEM,
 +		    "Can't allocate memory");
 +		return (ARCHIVE_FATAL);
 +	}
 +	for (i = 0; i < vdd->max_depth; i++) {
 +		vdd->pathtbl[i].first = NULL;
 +		vdd->pathtbl[i].last = &(vdd->pathtbl[i].first);
 +		vdd->pathtbl[i].sorted = NULL;
 +		vdd->pathtbl[i].cnt = 0;
 +	}
 +	return (ARCHIVE_OK);
 +}
 +
 +/*
 + * Make Path Tables
 + */
 +static int
 +isoent_make_path_table(struct archive_write *a)
 +{
 +	struct iso9660 *iso9660 = a->format_data;
 +	int depth, r;
 +	int dir_number;
 +
 +	/*
 +	 * Init Path Table.
 +	 */
 +	if (iso9660->dircnt_max >= MAX_DEPTH &&
 +	    (!iso9660->opt.limit_depth || iso9660->opt.iso_level == 4))
 +		r = isoent_alloc_path_table(a, &(iso9660->primary),
 +		    iso9660->dircnt_max + 1);
 +	else
 +		/* The number of levels in the hierarchy cannot exceed
 +		 * eight. */
 +		r = isoent_alloc_path_table(a, &(iso9660->primary),
 +		    MAX_DEPTH);
 +	if (r < 0)
 +		return (r);
 +	if (iso9660->opt.joliet) {
 +		r = isoent_alloc_path_table(a, &(iso9660->joliet),
 +		    iso9660->dircnt_max + 1);
 +		if (r < 0)
 +			return (r);
 +	}
 +
 +	/* Step 0.
 +	 * - Collect directories for primary and joliet.
 +	 */
 +	isoent_collect_dirs(&(iso9660->primary), NULL, 0);
 +	if (iso9660->opt.joliet)
 +		isoent_collect_dirs(&(iso9660->joliet), NULL, 0);
 +	/*
 +	 * Rockridge; move deeper depth directories to rr_moved.
 +	 */
 +	if (iso9660->opt.rr) {
 +		r = isoent_rr_move(a);
 +		if (r < 0)
 +			return (r);
 +	}
 +
 + 	/* Update nlink. */
 +	isofile_connect_hardlink_files(iso9660);
 +
 +	/* Step 1.
 +	 * - Renew a value of the depth of that directories.
 +	 * - Resolve hardlinks.
 + 	 * - Convert pathnames to ISO9660 name or UCS2(joliet).
 +	 * - Sort files by each directory.
 +	 */
 +	r = isoent_traverse_tree(a, &(iso9660->primary));
 +	if (r < 0)
 +		return (r);
 +	if (iso9660->opt.joliet) {
 +		r = isoent_traverse_tree(a, &(iso9660->joliet));
 +		if (r < 0)
 +			return (r);
 +	}
 +
 +	/* Step 2.
 +	 * - Sort directories.
 +	 * - Assign all directory number.
 +	 */
 +	dir_number = 1;
 +	for (depth = 0; depth < iso9660->primary.max_depth; depth++) {
 +		r = isoent_make_path_table_2(a, &(iso9660->primary),
 +		    depth, &dir_number);
 +		if (r < 0)
 +			return (r);
 +	}
 +	if (iso9660->opt.joliet) {
 +		dir_number = 1;
 +		for (depth = 0; depth < iso9660->joliet.max_depth; depth++) {
 +			r = isoent_make_path_table_2(a, &(iso9660->joliet),
 +			    depth, &dir_number);
 +			if (r < 0)
 +				return (r);
 +		}
 +	}
 +	if (iso9660->opt.limit_dirs && dir_number > 0xffff) {
 +		/*
 +		 * Maximum number of directories is 65535(0xffff)
 +		 * doe to size(16bit) of Parent Directory Number of
 +		 * the Path Table.
 +		 * See also ISO9660 Standard 9.4.
 +		 */
 +		archive_set_error(&a->archive, ARCHIVE_ERRNO_MISC,
 +		    "Too many directories(%d) over 65535.", dir_number);
 +		return (ARCHIVE_FATAL);
 +	}
 +
 +	/* Get the size of the Path Table. */
 +	calculate_path_table_size(&(iso9660->primary));
 +	if (iso9660->opt.joliet)
 +		calculate_path_table_size(&(iso9660->joliet));
 +
 +	return (ARCHIVE_OK);
 +}
 +
 +static int
 +isoent_find_out_boot_file(struct archive_write *a, struct isoent *rootent)
 +{
 +	struct iso9660 *iso9660 = a->format_data;
 +
 +	/* Find a isoent of the boot file. */
 +	iso9660->el_torito.boot = isoent_find_entry(rootent,
 +	    iso9660->el_torito.boot_filename.s);
 +	if (iso9660->el_torito.boot == NULL) {
 +		archive_set_error(&a->archive, ARCHIVE_ERRNO_MISC,
 +		    "Can't find the boot image file ``%s''",
 +		    iso9660->el_torito.boot_filename.s);
 +		return (ARCHIVE_FATAL);
 +	}
 +	iso9660->el_torito.boot->file->boot = BOOT_IMAGE;
 +	return (ARCHIVE_OK);
 +}
 +
 +static int
 +isoent_create_boot_catalog(struct archive_write *a, struct isoent *rootent)
 +{
 +	struct iso9660 *iso9660 = a->format_data;
 +	struct isofile *file;
 +	struct isoent *isoent;
 +	struct archive_entry *entry;
 +
 +	(void)rootent; /* UNUSED */
 +	/*
 +	 * Create the entry which is the "boot.catalog" file.
 +	 */
 +	file = isofile_new(a, NULL);
 +	if (file == NULL) {
 +		archive_set_error(&a->archive, ENOMEM,
 +		    "Can't allocate memory");
 +		return (ARCHIVE_FATAL);
 +	}
 +	archive_entry_set_pathname(file->entry,
 +	    iso9660->el_torito.catalog_filename.s);
 +	archive_entry_set_size(file->entry, LOGICAL_BLOCK_SIZE);
 +	archive_entry_set_mtime(file->entry, iso9660->birth_time, 0);
 +	archive_entry_set_atime(file->entry, iso9660->birth_time, 0);
 +	archive_entry_set_ctime(file->entry, iso9660->birth_time, 0);
 +	archive_entry_set_uid(file->entry, getuid());
 +	archive_entry_set_gid(file->entry, getgid());
 +	archive_entry_set_mode(file->entry, AE_IFREG | 0444);
 +	archive_entry_set_nlink(file->entry, 1);
 +
 +	if (isofile_gen_utility_names(a, file) < ARCHIVE_WARN) {
 +		isofile_free(file);
 +		return (ARCHIVE_FATAL);
 +	}
 +	file->boot = BOOT_CATALOG;
 +	file->content.size = LOGICAL_BLOCK_SIZE;
 +	isofile_add_entry(iso9660, file);
 +
 +	isoent = isoent_new(file);
 +	if (isoent == NULL) {
 +		archive_set_error(&a->archive, ENOMEM,
 +		    "Can't allocate memory");
 +		return (ARCHIVE_FATAL);
 +	}
 +	isoent->virtual = 1;
 +
 +	/* Add the "boot.catalog" entry into tree */
 +	if (isoent_tree(a, &isoent) != ARCHIVE_OK)
 +		return (ARCHIVE_FATAL);
 +
 +	iso9660->el_torito.catalog = isoent;
 +	/*
- 	 * Get a boot medai type.
++	 * Get a boot media type.
 +	 */
 +	switch (iso9660->opt.boot_type) {
 +	default:
 +	case OPT_BOOT_TYPE_AUTO:
 +		/* Try detecting a media type of the boot image. */
 +		entry = iso9660->el_torito.boot->file->entry;
 +		if (archive_entry_size(entry) == FD_1_2M_SIZE)
 +			iso9660->el_torito.media_type =
 +			    BOOT_MEDIA_1_2M_DISKETTE;
 +		else if (archive_entry_size(entry) == FD_1_44M_SIZE)
 +			iso9660->el_torito.media_type =
 +			    BOOT_MEDIA_1_44M_DISKETTE;
 +		else if (archive_entry_size(entry) == FD_2_88M_SIZE)
 +			iso9660->el_torito.media_type =
 +			    BOOT_MEDIA_2_88M_DISKETTE;
 +		else
 +			/* We cannot decide whether the boot image is
 +			 * hard-disk. */
 +			iso9660->el_torito.media_type =
 +			    BOOT_MEDIA_NO_EMULATION;
 +		break;
 +	case OPT_BOOT_TYPE_NO_EMU:
 +		iso9660->el_torito.media_type = BOOT_MEDIA_NO_EMULATION;
 +		break;
 +	case OPT_BOOT_TYPE_HARD_DISK:
 +		iso9660->el_torito.media_type = BOOT_MEDIA_HARD_DISK;
 +		break;
 +	case OPT_BOOT_TYPE_FD:
 +		entry = iso9660->el_torito.boot->file->entry;
 +		if (archive_entry_size(entry) <= FD_1_2M_SIZE)
 +			iso9660->el_torito.media_type =
 +			    BOOT_MEDIA_1_2M_DISKETTE;
 +		else if (archive_entry_size(entry) <= FD_1_44M_SIZE)
 +			iso9660->el_torito.media_type =
 +			    BOOT_MEDIA_1_44M_DISKETTE;
 +		else if (archive_entry_size(entry) <= FD_2_88M_SIZE)
 +			iso9660->el_torito.media_type =
 +			    BOOT_MEDIA_2_88M_DISKETTE;
 +		else {
 +			archive_set_error(&a->archive, ARCHIVE_ERRNO_MISC,
 +			    "Boot image file(``%s'') size is too big "
 +			    "for fd type.",
 +			    iso9660->el_torito.boot_filename.s);
 +			return (ARCHIVE_FATAL);
 +		}
 +		break;
 +	}
 +
 +	/*
 +	 * Get a system type.
 +	 * TODO: `El Torito' specification says "A copy of byte 5 from the
 +	 *       Partition Table found in the boot image".
 +	 */
 +	iso9660->el_torito.system_type = 0;
 +
 +	/*
 +	 * Get an ID.
 +	 */
 +	if (iso9660->opt.publisher)
 +		archive_string_copy(&(iso9660->el_torito.id),
 +		    &(iso9660->publisher_identifier));
 +
 +
 +	return (ARCHIVE_OK);
 +}
 +
 +/*
 + * If a media type is floppy, return its image size.
 + * otherwise return 0.
 + */
 +static size_t
 +fd_boot_image_size(int media_type)
 +{
 +	switch (media_type) {
 +	case BOOT_MEDIA_1_2M_DISKETTE:
 +		return (FD_1_2M_SIZE);
 +	case BOOT_MEDIA_1_44M_DISKETTE:
 +		return (FD_1_44M_SIZE);
 +	case BOOT_MEDIA_2_88M_DISKETTE:
 +		return (FD_2_88M_SIZE);
 +	default:
 +		return (0);
 +	}
 +}
 +
 +/*
 + * Make a boot catalog image data.
 + */
 +static int
 +make_boot_catalog(struct archive_write *a)
 +{
 +	struct iso9660 *iso9660 = a->format_data;
 +	unsigned char *block;
 +	unsigned char *p;
 +	uint16_t sum, *wp;
 +
 +	block = wb_buffptr(a);
 +	memset(block, 0, LOGICAL_BLOCK_SIZE);
 +	p = block;
 +	/*
 +	 * Validation Entry
 +	 */
 +	/* Header ID */
 +	p[0] = 1;
 +	/* Platform ID */
 +	p[1] = iso9660->el_torito.platform_id;
 +	/* Reserved */
 +	p[2] = p[3] = 0;
 +	/* ID */
 +	if (archive_strlen(&(iso9660->el_torito.id)) > 0)
 +		strncpy((char *)p+4, iso9660->el_torito.id.s, 23);
 +	p[27] = 0;
 +	/* Checksum */
 +	p[28] = p[29] = 0;
 +	/* Key */
 +	p[30] = 0x55;
 +	p[31] = 0xAA;
 +
 +	sum = 0;
 +	wp = (uint16_t *)block;
 +	while (wp < (uint16_t *)&block[32])
 +		sum += archive_le16dec(wp++);
 +	set_num_721(&block[28], (~sum) + 1);
 +
 +	/*
 +	 * Initial/Default Entry
 +	 */
 +	p = &block[32];
 +	/* Boot Indicator */
 +	p[0] = 0x88;
 +	/* Boot media type */
 +	p[1] = iso9660->el_torito.media_type;
 +	/* Load Segment */
 +	if (iso9660->el_torito.media_type == BOOT_MEDIA_NO_EMULATION)
 +		set_num_721(&p[2], iso9660->el_torito.boot_load_seg);
 +	else
 +		set_num_721(&p[2], 0);
 +	/* System Type */
 +	p[4] = iso9660->el_torito.system_type;
 +	/* Unused */
 +	p[5] = 0;
 +	/* Sector Count */
 +	if (iso9660->el_torito.media_type == BOOT_MEDIA_NO_EMULATION)
 +		set_num_721(&p[6], iso9660->el_torito.boot_load_size);
 +	else
 +		set_num_721(&p[6], 1);
 +	/* Load RBA */
 +	set_num_731(&p[8],
 +	    iso9660->el_torito.boot->file->content.location);
 +	/* Unused */
 +	memset(&p[12], 0, 20);
 +
 +	return (wb_consume(a, LOGICAL_BLOCK_SIZE));
 +}
 +
 +static int
 +setup_boot_information(struct archive_write *a)
 +{
 +	struct iso9660 *iso9660 = a->format_data;
 +	struct isoent *np;
 +	int64_t size;
 +	uint32_t sum;
 +	unsigned char buff[4096];
 +
 +	np = iso9660->el_torito.boot;
 +	lseek(iso9660->temp_fd,
 +	    np->file->content.offset_of_temp + 64, SEEK_SET);
 +	size = archive_entry_size(np->file->entry) - 64;
 +	if (size <= 0) {
 +		archive_set_error(&a->archive, errno,
 +		    "Boot file(%jd) is too small", (intmax_t)size + 64);
 +		return (ARCHIVE_FATAL);
 +	}
 +	sum = 0;
 +	while (size > 0) {
 +		size_t rsize;
 +		ssize_t i, rs;
 +
 +		if (size > (int64_t)sizeof(buff))
 +			rsize = sizeof(buff);
 +		else
 +			rsize = (size_t)size;
 +
 +		rs = read(iso9660->temp_fd, buff, rsize);
 +		if (rs <= 0) {
 +			archive_set_error(&a->archive, errno,
 +			    "Can't read temporary file(%jd)",
 +			    (intmax_t)rs);
 +			return (ARCHIVE_FATAL);
 +		}
 +		for (i = 0; i < rs; i += 4)
 +			sum += archive_le32dec(buff + i);
 +		size -= rs;
 +	}
 +	/* Set the location of Primary Volume Descriptor. */
 +	set_num_731(buff, SYSTEM_AREA_BLOCK);
 +	/* Set the location of the boot file. */
 +	set_num_731(buff+4, np->file->content.location);
 +	/* Set the size of the boot file. */
 +	size = fd_boot_image_size(iso9660->el_torito.media_type);
 +	if (size == 0)
 +		size = archive_entry_size(np->file->entry);
 +	set_num_731(buff+8, (uint32_t)size);
 +	/* Set the sum of the boot file. */
 +	set_num_731(buff+12, sum);
 +	/* Clear reserved bytes. */
 +	memset(buff+16, 0, 40);
 +
 +	/* Overwrite the boot file. */
 +	lseek(iso9660->temp_fd,
 +	    np->file->content.offset_of_temp + 8, SEEK_SET);
 +	return (write_to_temp(a, buff, 56));
 +}
 +
 +#ifdef HAVE_ZLIB_H
 +
 +static int
 +zisofs_init_zstream(struct archive_write *a)
 +{
 +	struct iso9660 *iso9660 = a->format_data;
 +	int r;
 +
 +	iso9660->zisofs.stream.next_in = NULL;
 +	iso9660->zisofs.stream.avail_in = 0;
 +	iso9660->zisofs.stream.total_in = 0;
 +	iso9660->zisofs.stream.total_out = 0;
 +	if (iso9660->zisofs.stream_valid)
 +		r = deflateReset(&(iso9660->zisofs.stream));
 +	else {
 +		r = deflateInit(&(iso9660->zisofs.stream),
 +		    iso9660->zisofs.compression_level);
 +		iso9660->zisofs.stream_valid = 1;
 +	}
 +	switch (r) {
 +	case Z_OK:
 +		break;
 +	default:
 +	case Z_STREAM_ERROR:
 +		archive_set_error(&a->archive, ARCHIVE_ERRNO_MISC,
 +		    "Internal error initializing "
 +		    "compression library: invalid setup parameter");
 +		return (ARCHIVE_FATAL);
 +	case Z_MEM_ERROR:
 +		archive_set_error(&a->archive, ENOMEM,
 +		    "Internal error initializing "
 +		    "compression library");
 +		return (ARCHIVE_FATAL);
 +	case Z_VERSION_ERROR:
 +		archive_set_error(&a->archive, ARCHIVE_ERRNO_MISC,
 +		    "Internal error initializing "
 +		    "compression library: invalid library version");
 +		return (ARCHIVE_FATAL);
 +	}
 +	return (ARCHIVE_OK);
 +}
 +
 +#endif /* HAVE_ZLIB_H */
 +
 +static int
 +zisofs_init(struct archive_write *a,  struct isofile *file)
 +{
 +	struct iso9660 *iso9660 = a->format_data;
 +#ifdef HAVE_ZLIB_H
 +	uint64_t tsize;
 +	size_t _ceil, bpsize;
 +	int r;
 +#endif
 +
 +	iso9660->zisofs.detect_magic = 0;
 +	iso9660->zisofs.making = 0;
 +
 +	if (!iso9660->opt.rr || !iso9660->opt.zisofs)
 +		return (ARCHIVE_OK);
 +
 +	if (archive_entry_size(file->entry) >= 24 &&
 +	    archive_entry_size(file->entry) < MULTI_EXTENT_SIZE) {
 +		/* Acceptable file size for zisofs. */
 +		iso9660->zisofs.detect_magic = 1;
 +		iso9660->zisofs.magic_cnt = 0;
 +	}
 +	if (!iso9660->zisofs.detect_magic)
 +		return (ARCHIVE_OK);
 +
 +#ifdef HAVE_ZLIB_H
 +	/* The number of Logical Blocks which uncompressed data
 +	 * will use in iso-image file is the same as the number of
 +	 * Logical Blocks which zisofs(compressed) data will use
 +	 * in ISO-image file. It won't reduce iso-image file size. */
 +	if (archive_entry_size(file->entry) <= LOGICAL_BLOCK_SIZE)
 +		return (ARCHIVE_OK);
 +
 +	/* Initialize compression library */
 +	r = zisofs_init_zstream(a);
 +	if (r != ARCHIVE_OK)
 +		return (ARCHIVE_FATAL);
 +
 +	/* Mark file->zisofs to create RRIP 'ZF' Use Entry. */
 +	file->zisofs.header_size = ZF_HEADER_SIZE >> 2;
 +	file->zisofs.log2_bs = ZF_LOG2_BS;
 +	file->zisofs.uncompressed_size =
 +		(uint32_t)archive_entry_size(file->entry);
 +
 +	/* Calculate a size of Block Pointers of zisofs. */
 +	_ceil = (file->zisofs.uncompressed_size + ZF_BLOCK_SIZE -1)
 +		>> file->zisofs.log2_bs;
 +	iso9660->zisofs.block_pointers_cnt = (int)_ceil + 1;
 +	iso9660->zisofs.block_pointers_idx = 0;
 +
 +	/* Ensure a buffer size used for Block Pointers */
 +	bpsize = iso9660->zisofs.block_pointers_cnt *
 +	    sizeof(iso9660->zisofs.block_pointers[0]);
 +	if (iso9660->zisofs.block_pointers_allocated < bpsize) {
 +		free(iso9660->zisofs.block_pointers);
 +		iso9660->zisofs.block_pointers = malloc(bpsize);
 +		if (iso9660->zisofs.block_pointers == NULL) {
 +			archive_set_error(&a->archive, ENOMEM,
 +			    "Can't allocate data");
 +			return (ARCHIVE_FATAL);
 +		}
 +		iso9660->zisofs.block_pointers_allocated = bpsize;
 +	}
 +
 +	/*
 +	 * Skip zisofs header and Block Pointers, which we will write
 +	 * after all compressed data of a file written to the temporary
 +	 * file.
 +	 */
 +	tsize = ZF_HEADER_SIZE + bpsize;
 +	if (write_null(a, (size_t)tsize) != ARCHIVE_OK)
 +		return (ARCHIVE_FATAL);
 +
 +	/*
 +	 * Initialize some variables to make zisofs.
 +	 */
 +	archive_le32enc(&(iso9660->zisofs.block_pointers[0]),
 +		(uint32_t)tsize);
 +	iso9660->zisofs.remaining = file->zisofs.uncompressed_size;
 +	iso9660->zisofs.making = 1;
 +	iso9660->zisofs.allzero = 1;
 +	iso9660->zisofs.block_offset = tsize;
 +	iso9660->zisofs.total_size = tsize;
 +	iso9660->cur_file->cur_content->size = tsize;
 +#endif
 +
 +	return (ARCHIVE_OK);
 +}
 +
 +static void
 +zisofs_detect_magic(struct archive_write *a, const void *buff, size_t s)
 +{
 +	struct iso9660 *iso9660 = a->format_data;
 +	struct isofile *file = iso9660->cur_file;
 +	const unsigned char *p, *endp;
 +	const unsigned char *magic_buff;
 +	uint32_t uncompressed_size;
 +	unsigned char header_size;
 +	unsigned char log2_bs;
 +	size_t _ceil, doff;
 +	uint32_t bst, bed;
 +	int magic_max;
 +	int64_t entry_size;
 +
 +	entry_size = archive_entry_size(file->entry);
 +	if ((int64_t)sizeof(iso9660->zisofs.magic_buffer) > entry_size)
 +		magic_max = (int)entry_size;
 +	else
 +		magic_max = sizeof(iso9660->zisofs.magic_buffer);
 +
 +	if (iso9660->zisofs.magic_cnt == 0 && s >= (size_t)magic_max)
 +		/* It's unnecessary we copy buffer. */
 +		magic_buff = buff;
 +	else {
 +		if (iso9660->zisofs.magic_cnt < magic_max) {
 +			size_t l;
 +
 +			l = sizeof(iso9660->zisofs.magic_buffer)
 +			    - iso9660->zisofs.magic_cnt;
 +			if (l > s)
 +				l = s;
 +			memcpy(iso9660->zisofs.magic_buffer
 +			    + iso9660->zisofs.magic_cnt, buff, l);
 +			iso9660->zisofs.magic_cnt += (int)l;
 +			if (iso9660->zisofs.magic_cnt < magic_max)
 +				return;
 +		}
 +		magic_buff = iso9660->zisofs.magic_buffer;
 +	}
 +	iso9660->zisofs.detect_magic = 0;
 +	p = magic_buff;
 +
 +	/* Check the magic code of zisofs. */
 +	if (memcmp(p, zisofs_magic, sizeof(zisofs_magic)) != 0)
 +		/* This is not zisofs file which made by mkzftree. */
 +		return;
 +	p += sizeof(zisofs_magic);
 +
 +	/* Read a zisofs header. */
 +	uncompressed_size = archive_le32dec(p);
 +	header_size = p[4];
 +	log2_bs = p[5];
 +	if (uncompressed_size < 24 || header_size != 4 ||
 +	    log2_bs > 30 || log2_bs < 7)
 +		return;/* Invalid or not supported header. */
 +
 +	/* Calculate a size of Block Pointers of zisofs. */
 +	_ceil = (uncompressed_size +
 +	        (ARCHIVE_LITERAL_LL(1) << log2_bs) -1) >> log2_bs;
 +	doff = (_ceil + 1) * 4 + 16;
 +	if (entry_size < (int64_t)doff)
 +		return;/* Invalid data. */
 +
 +	/* Check every Block Pointer has valid value. */
 +	p = magic_buff + 16;
 +	endp = magic_buff + magic_max;
 +	while (_ceil && p + 8 <= endp) {
 +		bst = archive_le32dec(p);
 +		if (bst != doff)
 +			return;/* Invalid data. */
 +		p += 4;
 +		bed = archive_le32dec(p);
 +		if (bed < bst || bed > entry_size)
 +			return;/* Invalid data. */
 +		doff += bed - bst;
 +		_ceil--;
 +	}
 +
 +	file->zisofs.uncompressed_size = uncompressed_size;
 +	file->zisofs.header_size = header_size;
 +	file->zisofs.log2_bs = log2_bs;
 +
 +	/* Disable making a zisofs image. */
 +	iso9660->zisofs.making = 0;
 +}
 +
 +#ifdef HAVE_ZLIB_H
 +
 +/*
 + * Compress data and write it to a temporary file.
 + */
 +static int
 +zisofs_write_to_temp(struct archive_write *a, const void *buff, size_t s)
 +{
 +	struct iso9660 *iso9660 = a->format_data;
 +	struct isofile *file = iso9660->cur_file;
 +	const unsigned char *b;
 +	z_stream *zstrm;
 +	size_t avail, csize;
 +	int flush, r;
 +
 +	zstrm = &(iso9660->zisofs.stream);
 +	zstrm->next_out = wb_buffptr(a);
 +	zstrm->avail_out = (uInt)wb_remaining(a);
 +	b = (const unsigned char *)buff;
 +	do {
 +		avail = ZF_BLOCK_SIZE - zstrm->total_in;
 +		if (s < avail) {
 +			avail = s;
 +			flush = Z_NO_FLUSH;
 +		} else
 +			flush = Z_FINISH;
 +		iso9660->zisofs.remaining -= avail;
 +		if (iso9660->zisofs.remaining <= 0)
 +			flush = Z_FINISH;
 +
 +		zstrm->next_in = (Bytef *)(uintptr_t)(const void *)b;
 +		zstrm->avail_in = (uInt)avail;
 +
 +		/*
 +		 * Check if current data block are all zero.
 +		 */
 +		if (iso9660->zisofs.allzero) {
 +			const unsigned char *nonzero = b;
 +			const unsigned char *nonzeroend = b + avail;
 +
 +			while (nonzero < nonzeroend)
 +				if (*nonzero++) {
 +					iso9660->zisofs.allzero = 0;
 +					break;
 +				}
 +		}
 +		b += avail;
 +		s -= avail;
 +
 +		/*
 +		 * If current data block are all zero, we do not use
 +		 * compressed data.
 +		 */
 +		if (flush == Z_FINISH && iso9660->zisofs.allzero &&
 +		    avail + zstrm->total_in == ZF_BLOCK_SIZE) {
 +			if (iso9660->zisofs.block_offset !=
 +			    file->cur_content->size) {
 +				int64_t diff;
 +
 +				r = wb_set_offset(a,
 +				    file->cur_content->offset_of_temp +
 +				        iso9660->zisofs.block_offset);
 +				if (r != ARCHIVE_OK)
 +					return (r);
 +				diff = file->cur_content->size -
 +				    iso9660->zisofs.block_offset;
 +				file->cur_content->size -= diff;
 +				iso9660->zisofs.total_size -= diff;
 +			}
 +			zstrm->avail_in = 0;
 +		}
 +
 +		/*
 +		 * Compress file data.
 +		 */
 +		while (zstrm->avail_in > 0) {
 +			csize = zstrm->total_out;
 +			r = deflate(zstrm, flush);
 +			switch (r) {
 +			case Z_OK:
 +			case Z_STREAM_END:
 +				csize = zstrm->total_out - csize;
 +				if (wb_consume(a, csize) != ARCHIVE_OK)
 +					return (ARCHIVE_FATAL);
 +				iso9660->zisofs.total_size += csize;
 +				iso9660->cur_file->cur_content->size += csize;
 +				zstrm->next_out = wb_buffptr(a);
 +				zstrm->avail_out = (uInt)wb_remaining(a);
 +				break;
 +			default:
 +				archive_set_error(&a->archive,
 +				    ARCHIVE_ERRNO_MISC,
 +				    "Compression failed:"
 +				    " deflate() call returned status %d",
 +				    r);
 +				return (ARCHIVE_FATAL);
 +			}
 +		}
 +
 +		if (flush == Z_FINISH) {
 +			/*
 +			 * Save the information of one zisofs block.
 +			 */
 +			iso9660->zisofs.block_pointers_idx ++;
 +			archive_le32enc(&(iso9660->zisofs.block_pointers[
 +			    iso9660->zisofs.block_pointers_idx]),
 +				(uint32_t)iso9660->zisofs.total_size);
 +			r = zisofs_init_zstream(a);
 +			if (r != ARCHIVE_OK)
 +				return (ARCHIVE_FATAL);
 +			iso9660->zisofs.allzero = 1;
 +			iso9660->zisofs.block_offset = file->cur_content->size;
 +		}
 +	} while (s);
 +
 +	return (ARCHIVE_OK);
 +}
 +
 +static int
 +zisofs_finish_entry(struct archive_write *a)
 +{
 +	struct iso9660 *iso9660 = a->format_data;
 +	struct isofile *file = iso9660->cur_file;
 +	unsigned char buff[16];
 +	size_t s;
 +	int64_t tail;
 +
 +	/* Direct temp file stream to zisofs temp file stream. */
 +	archive_entry_set_size(file->entry, iso9660->zisofs.total_size);
 +
 +	/*
 +	 * Save a file pointer which points the end of current zisofs data.
 +	 */
 +	tail = wb_offset(a);
 +
 +	/*
 +	 * Make a header.
 +	 *
 +	 * +-----------------+----------------+-----------------+
 +	 * | Header 16 bytes | Block Pointers | Compressed data |
 +	 * +-----------------+----------------+-----------------+
 +	 * 0                16               +X
 +	 * Block Pointers :
 +	 *   4 * (((Uncompressed file size + block_size -1) / block_size) + 1)
 +	 *
 +	 * Write zisofs header.
 +	 *    Magic number
 +	 * +----+----+----+----+----+----+----+----+
 +	 * | 37 | E4 | 53 | 96 | C9 | DB | D6 | 07 |
 +	 * +----+----+----+----+----+----+----+----+
 +	 * 0    1    2    3    4    5    6    7    8
 +	 *
 +	 * +------------------------+------------------+
 +	 * | Uncompressed file size | header_size >> 2 |
 +	 * +------------------------+------------------+
 +	 * 8                       12                 13
 +	 *
 +	 * +-----------------+----------------+
 +	 * | log2 block_size | Reserved(0000) |
 +	 * +-----------------+----------------+
 +	 * 13               14               16
 +	 */
 +	memcpy(buff, zisofs_magic, 8);
 +	set_num_731(buff+8, file->zisofs.uncompressed_size);
 +	buff[12] = file->zisofs.header_size;
 +	buff[13] = file->zisofs.log2_bs;
 +	buff[14] = buff[15] = 0;/* Reserved */
 +
 +	/* Move to the right position to write the header. */
 +	wb_set_offset(a, file->content.offset_of_temp);
 +
 +	/* Write the header. */
 +	if (wb_write_to_temp(a, buff, 16) != ARCHIVE_OK)
 +		return (ARCHIVE_FATAL);
 +
 +	/*
 +	 * Write zisofs Block Pointers.
 +	 */
 +	s = iso9660->zisofs.block_pointers_cnt *
 +	    sizeof(iso9660->zisofs.block_pointers[0]);
 +	if (wb_write_to_temp(a, iso9660->zisofs.block_pointers, s)
 +	    != ARCHIVE_OK)
 +		return (ARCHIVE_FATAL);
 +
 +	/* Set a file pointer back to the end of the temporary file. */
 +	wb_set_offset(a, tail);
 +
 +	return (ARCHIVE_OK);
 +}
 +
 +static int
 +zisofs_free(struct archive_write *a)
 +{
 +	struct iso9660 *iso9660 = a->format_data;
 +	int ret = ARCHIVE_OK;
 +
 +	free(iso9660->zisofs.block_pointers);
 +	if (iso9660->zisofs.stream_valid &&
 +	    deflateEnd(&(iso9660->zisofs.stream)) != Z_OK) {
 +		archive_set_error(&a->archive, ARCHIVE_ERRNO_MISC,
 +		    "Failed to clean up compressor");
 +		ret = ARCHIVE_FATAL;
 +	}
 +	iso9660->zisofs.block_pointers = NULL;
 +	iso9660->zisofs.stream_valid = 0;
 +	return (ret);
 +}
 +
 +struct zisofs_extract {
 +	int		 pz_log2_bs; /* Log2 of block size */
 +	uint64_t	 pz_uncompressed_size;
 +	size_t		 uncompressed_buffer_size;
 +
 +	int		 initialized:1;
 +	int		 header_passed:1;
 +
 +	uint32_t	 pz_offset;
 +	unsigned char	*block_pointers;
 +	size_t		 block_pointers_size;
 +	size_t		 block_pointers_avail;
 +	size_t		 block_off;
 +	uint32_t	 block_avail;
 +
 +	z_stream	 stream;
 +	int		 stream_valid;
 +};
 +
 +static ssize_t
 +zisofs_extract_init(struct archive_write *a, struct zisofs_extract *zisofs,
 +    const unsigned char *p, size_t bytes)
 +{
 +	size_t avail = bytes;
 +	size_t _ceil, xsize;
 +
 +	/* Allocate block pointers buffer. */
 +	_ceil = (size_t)((zisofs->pz_uncompressed_size +
 +		(((int64_t)1) << zisofs->pz_log2_bs) - 1)
 +		>> zisofs->pz_log2_bs);
 +	xsize = (_ceil + 1) * 4;
 +	if (zisofs->block_pointers == NULL) {
 +		size_t alloc = ((xsize >> 10) + 1) << 10;
 +		zisofs->block_pointers = malloc(alloc);
 +		if (zisofs->block_pointers == NULL) {
 +			archive_set_error(&a->archive, ENOMEM,
 +			    "No memory for zisofs decompression");
 +			return (ARCHIVE_FATAL);
 +		}
 +	}
 +	zisofs->block_pointers_size = xsize;
 +
 +	/* Allocate uncompressed data buffer. */
 +	zisofs->uncompressed_buffer_size = (size_t)1UL << zisofs->pz_log2_bs;
 +
 +	/*
 +	 * Read the file header, and check the magic code of zisofs.
 +	 */
 +	if (!zisofs->header_passed) {
 +		int err = 0;
 +		if (avail < 16) {
 +			archive_set_error(&a->archive,
 +			    ARCHIVE_ERRNO_FILE_FORMAT,
 +			    "Illegal zisofs file body");
 +			return (ARCHIVE_FATAL);
 +		}
 +
 +		if (memcmp(p, zisofs_magic, sizeof(zisofs_magic)) != 0)
 +			err = 1;
 +		else if (archive_le32dec(p + 8) != zisofs->pz_uncompressed_size)
 +			err = 1;
 +		else if (p[12] != 4 || p[13] != zisofs->pz_log2_bs)
 +			err = 1;
 +		if (err) {
 +			archive_set_error(&a->archive,
 +			    ARCHIVE_ERRNO_FILE_FORMAT,
 +			    "Illegal zisofs file body");
 +			return (ARCHIVE_FATAL);
 +		}
 +		avail -= 16;
 +		p += 16;
 +		zisofs->header_passed = 1;
 +	}
 +
 +	/*
 +	 * Read block pointers.
 +	 */
 +	if (zisofs->header_passed &&
 +	    zisofs->block_pointers_avail < zisofs->block_pointers_size) {
 +		xsize = zisofs->block_pointers_size
 +		    - zisofs->block_pointers_avail;
 +		if (avail < xsize)
 +			xsize = avail;
 +		memcpy(zisofs->block_pointers
 +		    + zisofs->block_pointers_avail, p, xsize);
 +		zisofs->block_pointers_avail += xsize;
 +		avail -= xsize;
 +	    	if (zisofs->block_pointers_avail
 +		    == zisofs->block_pointers_size) {
 +			/* We've got all block pointers and initialize
 +			 * related variables.	*/
 +			zisofs->block_off = 0;
 +			zisofs->block_avail = 0;
 +			/* Complete a initialization */
 +			zisofs->initialized = 1;
 +		}
 +	}
 +	return ((ssize_t)avail);
 +}
 +
 +static ssize_t
 +zisofs_extract(struct archive_write *a, struct zisofs_extract *zisofs,
 +    const unsigned char *p, size_t bytes)
 +{
 +	size_t avail;
 +	int r;
 +
 +	if (!zisofs->initialized) {
 +		ssize_t rs = zisofs_extract_init(a, zisofs, p, bytes);
 +		if (rs < 0)
 +			return (rs);
 +		if (!zisofs->initialized) {
 +			/* We need more data. */
 +			zisofs->pz_offset += (uint32_t)bytes;
 +			return (bytes);
 +		}
 +		avail = rs;
 +		p += bytes - avail;
 +	} else
 +		avail = bytes;
 +
 +	/*
 +	 * Get block offsets from block pointers.
 +	 */
 +	if (zisofs->block_avail == 0) {
 +		uint32_t bst, bed;
 +
 +		if (zisofs->block_off + 4 >= zisofs->block_pointers_size) {
 +			/* There isn't a pair of offsets. */
 +			archive_set_error(&a->archive,
 +			    ARCHIVE_ERRNO_FILE_FORMAT,
 +			    "Illegal zisofs block pointers");
 +			return (ARCHIVE_FATAL);
 +		}
 +		bst = archive_le32dec(
 +		    zisofs->block_pointers + zisofs->block_off);
 +		if (bst != zisofs->pz_offset + (bytes - avail)) {
 +			archive_set_error(&a->archive,
 +			    ARCHIVE_ERRNO_FILE_FORMAT,
 +			    "Illegal zisofs block pointers(cannot seek)");
 +			return (ARCHIVE_FATAL);
 +		}
 +		bed = archive_le32dec(
 +		    zisofs->block_pointers + zisofs->block_off + 4);
 +		if (bed < bst) {
 +			archive_set_error(&a->archive,
 +			    ARCHIVE_ERRNO_FILE_FORMAT,
 +			    "Illegal zisofs block pointers");
 +			return (ARCHIVE_FATAL);
 +		}
 +		zisofs->block_avail = bed - bst;
 +		zisofs->block_off += 4;
 +
 +		/* Initialize compression library for new block. */
 +		if (zisofs->stream_valid)
 +			r = inflateReset(&zisofs->stream);
 +		else
 +			r = inflateInit(&zisofs->stream);
 +		if (r != Z_OK) {
 +			archive_set_error(&a->archive, ARCHIVE_ERRNO_MISC,
 +			    "Can't initialize zisofs decompression.");
 +			return (ARCHIVE_FATAL);
 +		}
 +		zisofs->stream_valid = 1;
 +		zisofs->stream.total_in = 0;
 +		zisofs->stream.total_out = 0;
 +	}
 +
 +	/*
 +	 * Make uncompressed data.
 +	 */
 +	if (zisofs->block_avail == 0) {
 +		/*
 +		 * It's basically 32K bytes NUL data.
 +		 */
 +		unsigned char *wb;
 +		size_t size, wsize;
 +
 +		size = zisofs->uncompressed_buffer_size;
 +		while (size) {
 +			wb = wb_buffptr(a);
 +			if (size > wb_remaining(a))
 +				wsize = wb_remaining(a);
 +			else
 +				wsize = size;
 +			memset(wb, 0, wsize);
 +			r = wb_consume(a, wsize);
 +			if (r < 0)
 +				return (r);
 +			size -= wsize;
 +		}
 +	} else {
 +		zisofs->stream.next_in = (Bytef *)(uintptr_t)(const void *)p;
 +		if (avail > zisofs->block_avail)
 +			zisofs->stream.avail_in = zisofs->block_avail;
 +		else
 +			zisofs->stream.avail_in = (uInt)avail;
 +		zisofs->stream.next_out = wb_buffptr(a);
 +		zisofs->stream.avail_out = (uInt)wb_remaining(a);
 +
 +		r = inflate(&zisofs->stream, 0);
 +		switch (r) {
 +		case Z_OK: /* Decompressor made some progress.*/
 +		case Z_STREAM_END: /* Found end of stream. */
 +			break;
 +		default:
 +			archive_set_error(&a->archive, ARCHIVE_ERRNO_MISC,
 +			    "zisofs decompression failed (%d)", r);
 +			return (ARCHIVE_FATAL);
 +		}
 +		avail -= zisofs->stream.next_in - p;
 +		zisofs->block_avail -= (uint32_t)(zisofs->stream.next_in - p);
 +		r = wb_consume(a, wb_remaining(a) - zisofs->stream.avail_out);
 +		if (r < 0)
 +			return (r);
 +	}
 +	zisofs->pz_offset += (uint32_t)bytes;
 +	return (bytes - avail);
 +}
 +
 +static int
 +zisofs_rewind_boot_file(struct archive_write *a)
 +{
 +	struct iso9660 *iso9660 = a->format_data;
 +	struct isofile *file;
 +	unsigned char *rbuff;
 +	ssize_t r;
 +	size_t remaining, rbuff_size;
 +	struct zisofs_extract zext;
 +	int64_t read_offset, write_offset, new_offset;
 +	int fd, ret = ARCHIVE_OK;
 +
 +	file = iso9660->el_torito.boot->file;
 +	/*
 +	 * There is nothing to do if this boot file does not have
 +	 * zisofs header.
 +	 */
 +	if (file->zisofs.header_size == 0)
 +		return (ARCHIVE_OK);
 +
 +	/*
 +	 * Uncompress the zisofs'ed file contents.
 +	 */
 +	memset(&zext, 0, sizeof(zext));
 +	zext.pz_uncompressed_size = file->zisofs.uncompressed_size;
 +	zext.pz_log2_bs = file->zisofs.log2_bs;
 +
 +	fd = iso9660->temp_fd;
 +	new_offset = wb_offset(a);
 +	read_offset = file->content.offset_of_temp;
 +	remaining = (size_t)file->content.size;
 +	if (remaining > 1024 * 32)
 +		rbuff_size = 1024 * 32;
 +	else
 +		rbuff_size = remaining;
 +
 +	rbuff = malloc(rbuff_size);
 +	if (rbuff == NULL) {
 +		archive_set_error(&a->archive, ENOMEM, "Can't allocate memory");
 +		return (ARCHIVE_FATAL);
 +	}
 +	while (remaining) {
 +		size_t rsize;
 +		ssize_t rs;
 +
 +		/* Get the current file pointer. */
 +		write_offset = lseek(fd, 0, SEEK_CUR);
 +
 +		/* Change the file pointer to read. */
 +		lseek(fd, read_offset, SEEK_SET);
 +
 +		rsize = rbuff_size;
 +		if (rsize > remaining)
 +			rsize = remaining;
 +		rs = read(iso9660->temp_fd, rbuff, rsize);
 +		if (rs <= 0) {
 +			archive_set_error(&a->archive, errno,
 +			    "Can't read temporary file(%jd)", (intmax_t)rs);
 +			ret = ARCHIVE_FATAL;
 +			break;
 +		}
 +		remaining -= rs;
 +		read_offset += rs;
 +
 +		/* Put the file pointer back to write. */
 +		lseek(fd, write_offset, SEEK_SET);
 +
 +		r = zisofs_extract(a, &zext, rbuff, rs);
 +		if (r < 0) {
 +			ret = (int)r;
 +			break;
 +		}
 +	}
 +
 +	if (ret == ARCHIVE_OK) {
 +		/*
 +		 * Change the boot file content from zisofs'ed data
 +		 * to plain data.
 +		 */
 +		file->content.offset_of_temp = new_offset;
 +		file->content.size = file->zisofs.uncompressed_size;
 +		archive_entry_set_size(file->entry, file->content.size);
 +		/* Set to be no zisofs. */
 +		file->zisofs.header_size = 0;
 +		file->zisofs.log2_bs = 0;
 +		file->zisofs.uncompressed_size = 0;
 +		r = wb_write_padding_to_temp(a, file->content.size);
 +		if (r < 0)
 +			ret = ARCHIVE_FATAL;
 +	}
 +
 +	/*
 +	 * Free the resource we used in this function only.
 +	 */
 +	free(rbuff);
 +	free(zext.block_pointers);
 +	if (zext.stream_valid && inflateEnd(&(zext.stream)) != Z_OK) {
 +        	archive_set_error(&a->archive, ARCHIVE_ERRNO_MISC,
 +		    "Failed to clean up compressor");
 +		ret = ARCHIVE_FATAL;
 +	}
 +
 +	return (ret);
 +}
 +
 +#else
 +
 +static int
 +zisofs_write_to_temp(struct archive_write *a, const void *buff, size_t s)
 +{
 +	(void)buff; /* UNUSED */
 +	(void)s; /* UNUSED */
 +	archive_set_error(&a->archive, ARCHIVE_ERRNO_MISC, "Programing error");
 +	return (ARCHIVE_FATAL);
 +}
 +
 +static int
 +zisofs_rewind_boot_file(struct archive_write *a)
 +{
 +	struct iso9660 *iso9660 = a->format_data;
 +
 +	if (iso9660->el_torito.boot->file->zisofs.header_size != 0) {
 +		archive_set_error(&a->archive, ARCHIVE_ERRNO_MISC,
 +		    "We cannot extract the zisofs imaged boot file;"
 +		    " this may not boot in being zisofs imaged");
 +		return (ARCHIVE_FAILED);
 +	}
 +	return (ARCHIVE_OK);
 +}
 +
 +static int
 +zisofs_finish_entry(struct archive_write *a)
 +{
 +	(void)a; /* UNUSED */
 +	return (ARCHIVE_OK);
 +}
 +
 +static int
 +zisofs_free(struct archive_write *a)
 +{
 +	(void)a; /* UNUSED */
 +	return (ARCHIVE_OK);
 +}
 +
 +#endif /* HAVE_ZLIB_H */
 +
diff --cc Utilities/cmlibarchive/libarchive/archive_write_set_format_xar.c
index 58ad9e0,0000000..3c617ec
mode 100644,000000..100644
--- a/Utilities/cmlibarchive/libarchive/archive_write_set_format_xar.c
+++ b/Utilities/cmlibarchive/libarchive/archive_write_set_format_xar.c
@@@ -1,3223 -1,0 +1,3224 @@@
 +/*-
 + * Copyright (c) 2010-2012 Michihiro NAKAJIMA
 + * All rights reserved.
 + *
 + * Redistribution and use in source and binary forms, with or without
 + * modification, are permitted provided that the following conditions
 + * are met:
 + * 1. Redistributions of source code must retain the above copyright
 + *    notice, this list of conditions and the following disclaimer.
 + * 2. Redistributions in binary form must reproduce the above copyright
 + *    notice, this list of conditions and the following disclaimer in the
 + *    documentation and/or other materials provided with the distribution.
 + *
 + * THIS SOFTWARE IS PROVIDED BY THE AUTHOR(S) ``AS IS'' AND ANY EXPRESS OR
 + * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
 + * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
 + * IN NO EVENT SHALL THE AUTHOR(S) BE LIABLE FOR ANY DIRECT, INDIRECT,
 + * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
 + * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
 + * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
 + * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
 + * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
 + * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
 + */
 +
 +#include "archive_platform.h"
 +__FBSDID("$FreeBSD$");
 +
 +#ifdef HAVE_ERRNO_H
 +#include <errno.h>
 +#endif
 +#ifdef HAVE_LIMITS_H
 +#include <limits.h>
 +#endif
 +#include <stdlib.h>
 +#if HAVE_LIBXML_XMLWRITER_H
 +#include <libxml/xmlwriter.h>
 +#endif
 +#ifdef HAVE_BZLIB_H
 +#include <cm_bzlib.h>
 +#endif
 +#if HAVE_LZMA_H
 +#include <cm_lzma.h>
 +#endif
 +#ifdef HAVE_ZLIB_H
 +#include <cm_zlib.h>
 +#endif
 +
 +#include "archive.h"
 +#include "archive_digest_private.h"
 +#include "archive_endian.h"
 +#include "archive_entry.h"
 +#include "archive_entry_locale.h"
 +#include "archive_private.h"
 +#include "archive_rb.h"
 +#include "archive_string.h"
 +#include "archive_write_private.h"
 +
 +/*
 + * Differences to xar utility.
 + * - Subdocument is not supported yet.
 + * - ACL is not supported yet.
 + * - When writing an XML element <link type="<file-type>">, <file-type>
 + *   which is a file type a symbolic link is referencing is always marked
 + *   as "broken". Xar utility uses stat(2) to get the file type, but, in
-  *   libarcive format writer, we should not use it; if it is needed, we
++ *   libarchive format writer, we should not use it; if it is needed, we
 + *   should get about it at archive_read_disk.c.
 + * - It is possible to appear both <flags> and <ext2> elements.
 + *   Xar utility generates <flags> on BSD platform and <ext2> on Linux
 + *   platform.
 + *
 + */
 +
 +#if !(defined(HAVE_LIBXML_XMLWRITER_H) && defined(LIBXML_VERSION) &&\
 +	LIBXML_VERSION >= 20703) ||\
 +	!defined(HAVE_ZLIB_H) || \
 +	!defined(ARCHIVE_HAS_MD5) || !defined(ARCHIVE_HAS_SHA1)
 +/*
 + * xar needs several external libraries.
 + *   o libxml2
 + *   o openssl or MD5/SHA1 hash function
 + *   o zlib
 + *   o bzlib2 (option)
 + *   o liblzma (option)
 + */
 +int
 +archive_write_set_format_xar(struct archive *_a)
 +{
 +	struct archive_write *a = (struct archive_write *)_a;
 +
 +	archive_set_error(&a->archive, ARCHIVE_ERRNO_MISC,
 +	    "Xar not supported on this platform");
 +	return (ARCHIVE_WARN);
 +}
 +
 +#else	/* Support xar format */
 +
 +/*#define DEBUG_PRINT_TOC		1 */
 +
 +#define BAD_CAST_CONST (const xmlChar *)
 +
 +#define HEADER_MAGIC	0x78617221
 +#define HEADER_SIZE	28
 +#define HEADER_VERSION	1
 +
 +enum sumalg {
 +	CKSUM_NONE = 0,
 +	CKSUM_SHA1 = 1,
 +	CKSUM_MD5 = 2
 +};
 +
 +#define MD5_SIZE	16
 +#define SHA1_SIZE	20
 +#define MAX_SUM_SIZE	20
 +#define MD5_NAME	"md5"
 +#define SHA1_NAME	"sha1"
 +
 +enum enctype {
 +	NONE,
 +	GZIP,
 +	BZIP2,
 +	LZMA,
 +	XZ,
 +};
 +
 +struct chksumwork {
 +	enum sumalg		 alg;
 +#ifdef ARCHIVE_HAS_MD5
 +	archive_md5_ctx		 md5ctx;
 +#endif
 +#ifdef ARCHIVE_HAS_SHA1
 +	archive_sha1_ctx	 sha1ctx;
 +#endif
 +};
 +
 +enum la_zaction {
 +	ARCHIVE_Z_FINISH,
 +	ARCHIVE_Z_RUN
 +};
 +
 +/*
 + * Universal zstream.
 + */
 +struct la_zstream {
 +	const unsigned char	*next_in;
 +	size_t			 avail_in;
 +	uint64_t		 total_in;
 +
 +	unsigned char		*next_out;
 +	size_t			 avail_out;
 +	uint64_t		 total_out;
 +
 +	int			 valid;
 +	void			*real_stream;
 +	int			 (*code) (struct archive *a,
 +				    struct la_zstream *lastrm,
 +				    enum la_zaction action);
 +	int			 (*end)(struct archive *a,
 +				    struct la_zstream *lastrm);
 +};
 +
 +struct chksumval {
 +	enum sumalg		 alg;
 +	size_t			 len;
 +	unsigned char		 val[MAX_SUM_SIZE];
 +};
 +
 +struct heap_data {
 +	int			 id;
 +	struct heap_data	*next;
 +	uint64_t		 temp_offset;
 +	uint64_t		 length;	/* archived size.	*/
 +	uint64_t		 size;		/* extracted size.	*/
 +	enum enctype		 compression;
 +	struct chksumval	 a_sum;		/* archived checksum.	*/
 +	struct chksumval	 e_sum;		/* extracted checksum.	*/
 +};
 +
 +struct file {
 +	struct archive_rb_node	 rbnode;
 +
 +	int			 id;
 +	struct archive_entry	*entry;
 +
 +	struct archive_rb_tree	 rbtree;
 +	struct file		*next;
 +	struct file		*chnext;
 +	struct file		*hlnext;
 +	/* For hardlinked files.
 +	 * Use only when archive_entry_nlink() > 1 */
 +	struct file		*hardlink_target;
 +	struct file		*parent;	/* parent directory entry */
 +	/*
 +	 * To manage sub directory files.
- 	 * We use 'chnext' a menber of struct file to chain.
++	 * We use 'chnext' (a member of struct file) to chain.
 +	 */
 +	struct {
 +		struct file	*first;
 +		struct file	**last;
 +	}			 children;
 +
 +	/* For making a directory tree. */
 +        struct archive_string    parentdir;
 +        struct archive_string    basename;
 +        struct archive_string    symlink;
 +
 +	int			 ea_idx;
 +	struct {
 +		struct heap_data *first;
 +		struct heap_data **last;
 +	}			 xattr;
 +	struct heap_data	 data;
 +        struct archive_string    script;
 +
 +	int			 virtual:1;
 +	int			 dir:1;
 +};
 +
 +struct hardlink {
 +	struct archive_rb_node	 rbnode;
 +	int			 nlink;
 +	struct {
 +		struct file	*first;
 +		struct file	**last;
 +	}			 file_list;
 +};
 +
 +struct xar {
 +	int			 temp_fd;
 +	uint64_t		 temp_offset;
 +
 +	int			 file_idx;
 +	struct file		*root;
 +	struct file		*cur_dirent;
 +	struct archive_string	 cur_dirstr;
 +	struct file		*cur_file;
 +	uint64_t		 bytes_remaining;
 +	struct archive_string	 tstr;
 +	struct archive_string	 vstr;
 +
 +	enum sumalg		 opt_toc_sumalg;
 +	enum sumalg		 opt_sumalg;
 +	enum enctype		 opt_compression;
 +	int			 opt_compression_level;
 +	uint32_t		 opt_threads;
 +
 +	struct chksumwork	 a_sumwrk;	/* archived checksum.	*/
 +	struct chksumwork	 e_sumwrk;	/* extracted checksum.	*/
 +	struct la_zstream	 stream;
 +	struct archive_string_conv *sconv;
 +	/*
 +	 * Compressed data buffer.
 +	 */
 +	unsigned char		 wbuff[1024 * 64];
 +	size_t			 wbuff_remaining;
 +
 +	struct heap_data	 toc;
 +	/*
 +	 * The list of all file entries is used to manage struct file
 +	 * objects.
- 	 * We use 'next' a menber of struct file to chain.
++	 * We use 'next' (a member of struct file) to chain.
 +	 */
 +	struct {
 +		struct file	*first;
 +		struct file	**last;
 +	}			 file_list;
 +	/*
 +	 * The list of hard-linked file entries.
- 	 * We use 'hlnext' a menber of struct file to chain.
++	 * We use 'hlnext' (a member of struct file) to chain.
 +	 */
 +	struct archive_rb_tree	 hardlink_rbtree;
 +};
 +
 +static int	xar_options(struct archive_write *,
 +		    const char *, const char *);
 +static int	xar_write_header(struct archive_write *,
 +		    struct archive_entry *);
 +static ssize_t	xar_write_data(struct archive_write *,
 +		    const void *, size_t);
 +static int	xar_finish_entry(struct archive_write *);
 +static int	xar_close(struct archive_write *);
 +static int	xar_free(struct archive_write *);
 +
 +static struct file *file_new(struct archive_write *a, struct archive_entry *);
 +static void	file_free(struct file *);
 +static struct file *file_create_virtual_dir(struct archive_write *a, struct xar *,
 +		    const char *);
 +static int	file_add_child_tail(struct file *, struct file *);
 +static struct file *file_find_child(struct file *, const char *);
 +static int	file_gen_utility_names(struct archive_write *,
 +		    struct file *);
 +static int	get_path_component(char *, int, const char *);
 +static int	file_tree(struct archive_write *, struct file **);
 +static void	file_register(struct xar *, struct file *);
 +static void	file_init_register(struct xar *);
 +static void	file_free_register(struct xar *);
 +static int	file_register_hardlink(struct archive_write *,
 +		    struct file *);
 +static void	file_connect_hardlink_files(struct xar *);
 +static void	file_init_hardlinks(struct xar *);
 +static void	file_free_hardlinks(struct xar *);
 +
 +static void	checksum_init(struct chksumwork *, enum sumalg);
 +static void	checksum_update(struct chksumwork *, const void *, size_t);
 +static void	checksum_final(struct chksumwork *, struct chksumval *);
 +static int	compression_init_encoder_gzip(struct archive *,
 +		    struct la_zstream *, int, int);
 +static int	compression_code_gzip(struct archive *,
 +		    struct la_zstream *, enum la_zaction);
 +static int	compression_end_gzip(struct archive *, struct la_zstream *);
 +static int	compression_init_encoder_bzip2(struct archive *,
 +		    struct la_zstream *, int);
 +#if defined(HAVE_BZLIB_H) && defined(BZ_CONFIG_ERROR)
 +static int	compression_code_bzip2(struct archive *,
 +		    struct la_zstream *, enum la_zaction);
 +static int	compression_end_bzip2(struct archive *, struct la_zstream *);
 +#endif
 +static int	compression_init_encoder_lzma(struct archive *,
 +		    struct la_zstream *, int);
 +static int	compression_init_encoder_xz(struct archive *,
 +		    struct la_zstream *, int, int);
 +#if defined(HAVE_LZMA_H)
 +static int	compression_code_lzma(struct archive *,
 +		    struct la_zstream *, enum la_zaction);
 +static int	compression_end_lzma(struct archive *, struct la_zstream *);
 +#endif
 +static int	xar_compression_init_encoder(struct archive_write *);
 +static int	compression_code(struct archive *,
 +		    struct la_zstream *, enum la_zaction);
 +static int	compression_end(struct archive *,
 +		    struct la_zstream *);
 +static int	save_xattrs(struct archive_write *, struct file *);
 +static int	getalgsize(enum sumalg);
 +static const char *getalgname(enum sumalg);
 +
 +int
 +archive_write_set_format_xar(struct archive *_a)
 +{
 +	struct archive_write *a = (struct archive_write *)_a;
 +	struct xar *xar;
 +
 +	archive_check_magic(_a, ARCHIVE_WRITE_MAGIC,
 +	    ARCHIVE_STATE_NEW, "archive_write_set_format_xar");
 +
 +	/* If another format was already registered, unregister it. */
 +	if (a->format_free != NULL)
 +		(a->format_free)(a);
 +
 +	xar = calloc(1, sizeof(*xar));
 +	if (xar == NULL) {
 +		archive_set_error(&a->archive, ENOMEM,
 +		    "Can't allocate xar data");
 +		return (ARCHIVE_FATAL);
 +	}
 +	xar->temp_fd = -1;
 +	file_init_register(xar);
 +	file_init_hardlinks(xar);
 +	archive_string_init(&(xar->tstr));
 +	archive_string_init(&(xar->vstr));
 +
 +	/*
 +	 * Create the root directory.
 +	 */
 +	xar->root = file_create_virtual_dir(a, xar, "");
 +	if (xar->root == NULL) {
 +		free(xar);
 +		archive_set_error(&a->archive, ENOMEM,
 +		    "Can't allocate xar data");
 +		return (ARCHIVE_FATAL);
 +	}
 +	xar->root->parent = xar->root;
 +	file_register(xar, xar->root);
 +	xar->cur_dirent = xar->root;
 +	archive_string_init(&(xar->cur_dirstr));
 +	archive_string_ensure(&(xar->cur_dirstr), 1);
 +	xar->cur_dirstr.s[0] = 0;
 +
 +	/*
 +	 * Initialize option.
 +	 */
 +	/* Set default checksum type. */
 +	xar->opt_toc_sumalg = CKSUM_SHA1;
 +	xar->opt_sumalg = CKSUM_SHA1;
 +	/* Set default compression type, level, and number of threads. */
 +	xar->opt_compression = GZIP;
 +	xar->opt_compression_level = 6;
 +	xar->opt_threads = 1;
 +
 +	a->format_data = xar;
 +
 +	a->format_name = "xar";
 +	a->format_options = xar_options;
 +	a->format_write_header = xar_write_header;
 +	a->format_write_data = xar_write_data;
 +	a->format_finish_entry = xar_finish_entry;
 +	a->format_close = xar_close;
 +	a->format_free = xar_free;
 +	a->archive.archive_format = ARCHIVE_FORMAT_XAR;
 +	a->archive.archive_format_name = "xar";
 +
 +	return (ARCHIVE_OK);
 +}
 +
 +static int
 +xar_options(struct archive_write *a, const char *key, const char *value)
 +{
 +	struct xar *xar;
 +
 +	xar = (struct xar *)a->format_data;
 +
 +	if (strcmp(key, "checksum") == 0) {
 +		if (value == NULL)
 +			xar->opt_sumalg = CKSUM_NONE;
 +		else if (strcmp(value, "sha1") == 0)
 +			xar->opt_sumalg = CKSUM_SHA1;
 +		else if (strcmp(value, "md5") == 0)
 +			xar->opt_sumalg = CKSUM_MD5;
 +		else {
 +			archive_set_error(&(a->archive),
 +			    ARCHIVE_ERRNO_MISC,
 +			    "Unknown checksum name: `%s'",
 +			    value);
 +			return (ARCHIVE_FAILED);
 +		}
 +		return (ARCHIVE_OK);
 +	}
 +	if (strcmp(key, "compression") == 0) {
 +		const char *name = NULL;
 +
 +		if (value == NULL)
 +			xar->opt_compression = NONE;
 +		else if (strcmp(value, "gzip") == 0)
 +			xar->opt_compression = GZIP;
 +		else if (strcmp(value, "bzip2") == 0)
 +#if defined(HAVE_BZLIB_H) && defined(BZ_CONFIG_ERROR)
 +			xar->opt_compression = BZIP2;
 +#else
 +			name = "bzip2";
 +#endif
 +		else if (strcmp(value, "lzma") == 0)
 +#if HAVE_LZMA_H
 +			xar->opt_compression = LZMA;
 +#else
 +			name = "lzma";
 +#endif
 +		else if (strcmp(value, "xz") == 0)
 +#if HAVE_LZMA_H
 +			xar->opt_compression = XZ;
 +#else
 +			name = "xz";
 +#endif
 +		else {
 +			archive_set_error(&(a->archive),
 +			    ARCHIVE_ERRNO_MISC,
 +			    "Unknown compression name: `%s'",
 +			    value);
 +			return (ARCHIVE_FAILED);
 +		}
 +		if (name != NULL) {
 +			archive_set_error(&(a->archive),
 +			    ARCHIVE_ERRNO_MISC,
 +			    "`%s' compression not supported "
 +			    "on this platform",
 +			    name);
 +			return (ARCHIVE_FAILED);
 +		}
 +		return (ARCHIVE_OK);
 +	}
 +	if (strcmp(key, "compression-level") == 0) {
 +		if (value == NULL ||
 +		    !(value[0] >= '0' && value[0] <= '9') ||
 +		    value[1] != '\0') {
 +			archive_set_error(&(a->archive),
 +			    ARCHIVE_ERRNO_MISC,
 +			    "Illegal value `%s'",
 +			    value);
 +			return (ARCHIVE_FAILED);
 +		}
 +		xar->opt_compression_level = value[0] - '0';
 +		return (ARCHIVE_OK);
 +	}
 +	if (strcmp(key, "toc-checksum") == 0) {
 +		if (value == NULL)
 +			xar->opt_toc_sumalg = CKSUM_NONE;
 +		else if (strcmp(value, "sha1") == 0)
 +			xar->opt_toc_sumalg = CKSUM_SHA1;
 +		else if (strcmp(value, "md5") == 0)
 +			xar->opt_toc_sumalg = CKSUM_MD5;
 +		else {
 +			archive_set_error(&(a->archive),
 +			    ARCHIVE_ERRNO_MISC,
 +			    "Unknown checksum name: `%s'",
 +			    value);
 +			return (ARCHIVE_FAILED);
 +		}
 +		return (ARCHIVE_OK);
 +	}
 +	if (strcmp(key, "threads") == 0) {
 +		if (value == NULL)
 +			return (ARCHIVE_FAILED);
 +		xar->opt_threads = (int)strtoul(value, NULL, 10);
 +		if (xar->opt_threads == 0 && errno != 0) {
 +			xar->opt_threads = 1;
 +			archive_set_error(&(a->archive),
 +			    ARCHIVE_ERRNO_MISC,
 +			    "Illegal value `%s'",
 +			    value);
 +			return (ARCHIVE_FAILED);
 +		}
 +		if (xar->opt_threads == 0) {
 +#ifdef HAVE_LZMA_STREAM_ENCODER_MT
 +			xar->opt_threads = lzma_cputhreads();
 +#else
 +			xar->opt_threads = 1;
 +#endif
 +		}
 +	}
 +
 +	/* Note: The "warn" return is just to inform the options
 +	 * supervisor that we didn't handle it.  It will generate
 +	 * a suitable error if no one used this option. */
 +	return (ARCHIVE_WARN);
 +}
 +
 +static int
 +xar_write_header(struct archive_write *a, struct archive_entry *entry)
 +{
 +	struct xar *xar;
 +	struct file *file;
 +	struct archive_entry *file_entry;
 +	int r, r2;
 +
 +	xar = (struct xar *)a->format_data;
 +	xar->cur_file = NULL;
 +	xar->bytes_remaining = 0;
 +
 +	if (xar->sconv == NULL) {
 +		xar->sconv = archive_string_conversion_to_charset(
 +		    &a->archive, "UTF-8", 1);
 +		if (xar->sconv == NULL)
 +			return (ARCHIVE_FATAL);
 +	}
 +
 +	file = file_new(a, entry);
 +	if (file == NULL) {
 +		archive_set_error(&a->archive, ENOMEM,
 +		    "Can't allocate data");
 +		return (ARCHIVE_FATAL);
 +	}
 +	r2 = file_gen_utility_names(a, file);
 +	if (r2 < ARCHIVE_WARN)
 +		return (r2);
 +
 +	/*
 +	 * Ignore a path which looks like the top of directory name
 +	 * since we have already made the root directory of an Xar archive.
 +	 */
 +	if (archive_strlen(&(file->parentdir)) == 0 &&
 +	    archive_strlen(&(file->basename)) == 0) {
 +		file_free(file);
 +		return (r2);
 +	}
 +
 +	/* Add entry into tree */
 +	file_entry = file->entry;
 +	r = file_tree(a, &file);
 +	if (r != ARCHIVE_OK)
 +		return (r);
 +	/* There is the same file in tree and
 +	 * the current file is older than the file in tree.
 +	 * So we don't need the current file data anymore. */
 +	if (file->entry != file_entry)
 +		return (r2);
 +	if (file->id == 0)
 +		file_register(xar, file);
 +
 +	/* A virtual file, which is a directory, does not have
 +	 * any contents and we won't store it into a archive
 +	 * file other than its name. */
 +	if (file->virtual)
 +		return (r2);
 +
 +	/*
 +	 * Prepare to save the contents of the file.
 +	 */
 +	if (xar->temp_fd == -1) {
 +		int algsize;
 +		xar->temp_offset = 0;
 +		xar->temp_fd = __archive_mktemp(NULL);
 +		if (xar->temp_fd < 0) {
 +			archive_set_error(&a->archive, errno,
 +			    "Couldn't create temporary file");
 +			return (ARCHIVE_FATAL);
 +		}
 +		algsize = getalgsize(xar->opt_toc_sumalg);
 +		if (algsize > 0) {
 +			if (lseek(xar->temp_fd, algsize, SEEK_SET) < 0) {
 +				archive_set_error(&(a->archive), errno,
 +				    "lseek failed");
 +				return (ARCHIVE_FATAL);
 +			}
 +			xar->temp_offset = algsize;
 +		}
 +	}
 +
 +	if (archive_entry_hardlink(file->entry) == NULL) {
 +		r = save_xattrs(a, file);
 +		if (r != ARCHIVE_OK)
 +			return (ARCHIVE_FATAL);
 +	}
 +
 +	/* Non regular files contents are unneeded to be saved to
 +	 * a temporary file. */
 +	if (archive_entry_filetype(file->entry) != AE_IFREG)
 +		return (r2);
 +
 +	/*
 +	 * Set the current file to cur_file to read its contents.
 +	 */
 +	xar->cur_file = file;
 +
 +	if (archive_entry_nlink(file->entry) > 1) {
 +		r = file_register_hardlink(a, file);
 +		if (r != ARCHIVE_OK)
 +			return (r);
 +		if (archive_entry_hardlink(file->entry) != NULL) {
 +			archive_entry_unset_size(file->entry);
 +			return (r2);
 +		}
 +	}
 +
 +	/* Save a offset of current file in temporary file. */
 +	file->data.temp_offset = xar->temp_offset;
 +	file->data.size = archive_entry_size(file->entry);
 +	file->data.compression = xar->opt_compression;
 +	xar->bytes_remaining = archive_entry_size(file->entry);
 +	checksum_init(&(xar->a_sumwrk), xar->opt_sumalg);
 +	checksum_init(&(xar->e_sumwrk), xar->opt_sumalg);
 +	r = xar_compression_init_encoder(a);
 +
 +	if (r != ARCHIVE_OK)
 +		return (r);
 +	else
 +		return (r2);
 +}
 +
 +static int
 +write_to_temp(struct archive_write *a, const void *buff, size_t s)
 +{
 +	struct xar *xar;
 +	const unsigned char *p;
 +	ssize_t ws;
 +
 +	xar = (struct xar *)a->format_data;
 +	p = (const unsigned char *)buff;
 +	while (s) {
 +		ws = write(xar->temp_fd, p, s);
 +		if (ws < 0) {
 +			archive_set_error(&(a->archive), errno,
 +			    "fwrite function failed");
 +			return (ARCHIVE_FATAL);
 +		}
 +		s -= ws;
 +		p += ws;
 +		xar->temp_offset += ws;
 +	}
 +	return (ARCHIVE_OK);
 +}
 +
 +static ssize_t
 +xar_write_data(struct archive_write *a, const void *buff, size_t s)
 +{
 +	struct xar *xar;
 +	enum la_zaction run;
 +	size_t size, rsize;
 +	int r;
 +
 +	xar = (struct xar *)a->format_data;
 +
 +	if (s > xar->bytes_remaining)
 +		s = (size_t)xar->bytes_remaining;
 +	if (s == 0 || xar->cur_file == NULL)
 +		return (0);
 +	if (xar->cur_file->data.compression == NONE) {
 +		checksum_update(&(xar->e_sumwrk), buff, s);
 +		checksum_update(&(xar->a_sumwrk), buff, s);
 +		size = rsize = s;
 +	} else {
 +		xar->stream.next_in = (const unsigned char *)buff;
 +		xar->stream.avail_in = s;
 +		if (xar->bytes_remaining > s)
 +			run = ARCHIVE_Z_RUN;
 +		else
 +			run = ARCHIVE_Z_FINISH;
 +		/* Compress file data. */
 +		r = compression_code(&(a->archive), &(xar->stream), run);
 +		if (r != ARCHIVE_OK && r != ARCHIVE_EOF)
 +			return (ARCHIVE_FATAL);
 +		rsize = s - xar->stream.avail_in;
 +		checksum_update(&(xar->e_sumwrk), buff, rsize);
 +		size = sizeof(xar->wbuff) - xar->stream.avail_out;
 +		checksum_update(&(xar->a_sumwrk), xar->wbuff, size);
 +	}
 +#if !defined(_WIN32) || defined(__CYGWIN__)
 +	if (xar->bytes_remaining ==
 +	    (uint64_t)archive_entry_size(xar->cur_file->entry)) {
 +		/*
 +		 * Get the path of a shell script if so.
 +		 */
 +		const unsigned char *b = (const unsigned char *)buff;
 +
 +		archive_string_empty(&(xar->cur_file->script));
 +		if (rsize > 2 && b[0] == '#' && b[1] == '!') {
 +			size_t i, end, off;
 +
 +			off = 2;
 +			if (b[off] == ' ')
 +				off++;
 +#ifdef PATH_MAX
 +			if ((rsize - off) > PATH_MAX)
 +				end = off + PATH_MAX;
 +			else
 +#endif
 +				end = rsize;
 +			/* Find the end of a script path. */
 +			for (i = off; i < end && b[i] != '\0' &&
 +			    b[i] != '\n' && b[i] != '\r' &&
 +			    b[i] != ' ' && b[i] != '\t'; i++)
 +				;
 +			archive_strncpy(&(xar->cur_file->script), b + off,
 +			    i - off);
 +		}
 +	}
 +#endif
 +
 +	if (xar->cur_file->data.compression == NONE) {
 +		if (write_to_temp(a, buff, size) != ARCHIVE_OK)
 +			return (ARCHIVE_FATAL);
 +	} else {
 +		if (write_to_temp(a, xar->wbuff, size) != ARCHIVE_OK)
 +			return (ARCHIVE_FATAL);
 +	}
 +	xar->bytes_remaining -= rsize;
 +	xar->cur_file->data.length += size;
 +
 +	return (rsize);
 +}
 +
 +static int
 +xar_finish_entry(struct archive_write *a)
 +{
 +	struct xar *xar;
 +	struct file *file;
 +	size_t s;
 +	ssize_t w;
 +
 +	xar = (struct xar *)a->format_data;
 +	if (xar->cur_file == NULL)
 +		return (ARCHIVE_OK);
 +
 +	while (xar->bytes_remaining > 0) {
 +		s = (size_t)xar->bytes_remaining;
 +		if (s > a->null_length)
 +			s = a->null_length;
 +		w = xar_write_data(a, a->nulls, s);
 +		if (w > 0)
 +			xar->bytes_remaining -= w;
 +		else
 +			return (w);
 +	}
 +	file = xar->cur_file;
 +	checksum_final(&(xar->e_sumwrk), &(file->data.e_sum));
 +	checksum_final(&(xar->a_sumwrk), &(file->data.a_sum));
 +	xar->cur_file = NULL;
 +
 +	return (ARCHIVE_OK);
 +}
 +
 +static int
 +xmlwrite_string_attr(struct archive_write *a, xmlTextWriterPtr writer,
 +	const char *key, const char *value,
 +	const char *attrkey, const char *attrvalue)
 +{
 +	int r;
 +
 +	r = xmlTextWriterStartElement(writer, BAD_CAST_CONST(key));
 +	if (r < 0) {
 +		archive_set_error(&a->archive,
 +		    ARCHIVE_ERRNO_MISC,
 +		    "xmlTextWriterStartElement() failed: %d", r);
 +		return (ARCHIVE_FATAL);
 +	}
 +	if (attrkey != NULL && attrvalue != NULL) {
 +		r = xmlTextWriterWriteAttribute(writer,
 +		    BAD_CAST_CONST(attrkey), BAD_CAST_CONST(attrvalue));
 +		if (r < 0) {
 +			archive_set_error(&a->archive,
 +			    ARCHIVE_ERRNO_MISC,
 +			    "xmlTextWriterWriteAttribute() failed: %d", r);
 +			return (ARCHIVE_FATAL);
 +		}
 +	}
 +	if (value != NULL) {
 +		r = xmlTextWriterWriteString(writer, BAD_CAST_CONST(value));
 +		if (r < 0) {
 +			archive_set_error(&a->archive,
 +			    ARCHIVE_ERRNO_MISC,
 +			    "xmlTextWriterWriteString() failed: %d", r);
 +			return (ARCHIVE_FATAL);
 +		}
 +	}
 +	r = xmlTextWriterEndElement(writer);
 +	if (r < 0) {
 +		archive_set_error(&a->archive,
 +		    ARCHIVE_ERRNO_MISC,
 +		    "xmlTextWriterEndElement() failed: %d", r);
 +		return (ARCHIVE_FATAL);
 +	}
 +	return (ARCHIVE_OK);
 +}
 +
 +static int
 +xmlwrite_string(struct archive_write *a, xmlTextWriterPtr writer,
 +	const char *key, const char *value)
 +{
 +	int r;
 +
 +	if (value == NULL)
 +		return (ARCHIVE_OK);
 +
 +	r = xmlTextWriterStartElement(writer, BAD_CAST_CONST(key));
 +	if (r < 0) {
 +		archive_set_error(&a->archive,
 +		    ARCHIVE_ERRNO_MISC,
 +		    "xmlTextWriterStartElement() failed: %d", r);
 +		return (ARCHIVE_FATAL);
 +	}
 +	if (value != NULL) {
 +		r = xmlTextWriterWriteString(writer, BAD_CAST_CONST(value));
 +		if (r < 0) {
 +			archive_set_error(&a->archive,
 +			    ARCHIVE_ERRNO_MISC,
 +			    "xmlTextWriterWriteString() failed: %d", r);
 +			return (ARCHIVE_FATAL);
 +		}
 +	}
 +	r = xmlTextWriterEndElement(writer);
 +	if (r < 0) {
 +		archive_set_error(&a->archive,
 +		    ARCHIVE_ERRNO_MISC,
 +		    "xmlTextWriterEndElement() failed: %d", r);
 +		return (ARCHIVE_FATAL);
 +	}
 +	return (ARCHIVE_OK);
 +}
 +
 +static int
 +xmlwrite_fstring(struct archive_write *a, xmlTextWriterPtr writer,
 +	const char *key, const char *fmt, ...)
 +{
 +	struct xar *xar;
 +	va_list ap;
 +
 +	xar = (struct xar *)a->format_data;
 +	va_start(ap, fmt);
 +	archive_string_empty(&xar->vstr);
 +	archive_string_vsprintf(&xar->vstr, fmt, ap);
 +	va_end(ap);
 +	return (xmlwrite_string(a, writer, key, xar->vstr.s));
 +}
 +
 +static int
 +xmlwrite_time(struct archive_write *a, xmlTextWriterPtr writer,
 +	const char *key, time_t t, int z)
 +{
 +	char timestr[100];
 +	struct tm tm;
 +
 +#if defined(HAVE_GMTIME_R)
 +	gmtime_r(&t, &tm);
 +#elif defined(HAVE__GMTIME64_S)
 +	_gmtime64_s(&tm, &t);
 +#else
 +	memcpy(&tm, gmtime(&t), sizeof(tm));
 +#endif
 +	memset(&timestr, 0, sizeof(timestr));
 +	/* Do not use %F and %T for portability. */
 +	strftime(timestr, sizeof(timestr), "%Y-%m-%dT%H:%M:%S", &tm);
 +	if (z)
 +		strcat(timestr, "Z");
 +	return (xmlwrite_string(a, writer, key, timestr));
 +}
 +
 +static int
 +xmlwrite_mode(struct archive_write *a, xmlTextWriterPtr writer,
 +	const char *key, mode_t mode)
 +{
 +	char ms[5];
 +
 +	ms[0] = '0';
 +	ms[1] = '0' + ((mode >> 6) & 07);
 +	ms[2] = '0' + ((mode >> 3) & 07);
 +	ms[3] = '0' + (mode & 07);
 +	ms[4] = '\0';
 +
 +	return (xmlwrite_string(a, writer, key, ms));
 +}
 +
 +static int
 +xmlwrite_sum(struct archive_write *a, xmlTextWriterPtr writer,
 +	const char *key, struct chksumval *sum)
 +{
 +	const char *algname;
 +	int algsize;
 +	char buff[MAX_SUM_SIZE*2 + 1];
 +	char *p;
 +	unsigned char *s;
 +	int i, r;
 +
 +	if (sum->len > 0) {
 +		algname = getalgname(sum->alg);
 +		algsize = getalgsize(sum->alg);
 +		if (algname != NULL) {
 +			const char *hex = "0123456789abcdef";
 +			p = buff;
 +			s = sum->val;
 +			for (i = 0; i < algsize; i++) {
 +				*p++ = hex[(*s >> 4)];
 +				*p++ = hex[(*s & 0x0f)];
 +				s++;
 +			}
 +			*p = '\0';
 +			r = xmlwrite_string_attr(a, writer,
 +			    key, buff,
 +			    "style", algname);
 +			if (r < 0)
 +				return (ARCHIVE_FATAL);
 +		}
 +	}
 +	return (ARCHIVE_OK);
 +}
 +
 +static int
 +xmlwrite_heap(struct archive_write *a, xmlTextWriterPtr writer,
 +	struct heap_data *heap)
 +{
 +	const char *encname;
 +	int r;
 +
 +	r = xmlwrite_fstring(a, writer, "length", "%ju", heap->length);
 +	if (r < 0)
 +		return (ARCHIVE_FATAL);
 +	r = xmlwrite_fstring(a, writer, "offset", "%ju", heap->temp_offset);
 +	if (r < 0)
 +		return (ARCHIVE_FATAL);
 +	r = xmlwrite_fstring(a, writer, "size", "%ju", heap->size);
 +	if (r < 0)
 +		return (ARCHIVE_FATAL);
 +	switch (heap->compression) {
 +	case GZIP:
 +		encname = "application/x-gzip"; break;
 +	case BZIP2:
 +		encname = "application/x-bzip2"; break;
 +	case LZMA:
 +		encname = "application/x-lzma"; break;
 +	case XZ:
 +		encname = "application/x-xz"; break;
 +	default:
 +		encname = "application/octet-stream"; break;
 +	}
 +	r = xmlwrite_string_attr(a, writer, "encoding", NULL,
 +	    "style", encname);
 +	if (r < 0)
 +		return (ARCHIVE_FATAL);
 +	r = xmlwrite_sum(a, writer, "archived-checksum", &(heap->a_sum));
 +	if (r < 0)
 +		return (ARCHIVE_FATAL);
 +	r = xmlwrite_sum(a, writer, "extracted-checksum", &(heap->e_sum));
 +	if (r < 0)
 +		return (ARCHIVE_FATAL);
 +	return (ARCHIVE_OK);
 +}
 +
 +/*
 + * xar utility records fflags as following xml elements:
 + *   <flags>
 + *     <UserNoDump/>
 + *     .....
 + *   </flags>
 + * or
 + *   <ext2>
 + *     <NoDump/>
 + *     .....
 + *   </ext2>
 + * If xar is running on BSD platform, records <flags>..</flags>;
 + * if xar is running on linux platform, records <ext2>..</ext2>;
 + * otherwise does not record.
 + *
 + * Our implements records both <flags> and <ext2> if it's necessary.
 + */
 +static int
 +make_fflags_entry(struct archive_write *a, xmlTextWriterPtr writer,
 +    const char *element, const char *fflags_text)
 +{
 +	static const struct flagentry {
 +		const char	*name;
 +		const char	*xarname;
 +	}
 +	flagbsd[] = {
 +		{ "sappnd",	"SystemAppend"},
 +		{ "sappend",	"SystemAppend"},
 +		{ "arch",	"SystemArchived"},
 +		{ "archived",	"SystemArchived"},
 +		{ "schg",	"SystemImmutable"},
 +		{ "schange",	"SystemImmutable"},
 +		{ "simmutable",	"SystemImmutable"},
 +		{ "nosunlnk",	"SystemNoUnlink"},
 +		{ "nosunlink",	"SystemNoUnlink"},
 +		{ "snapshot",	"SystemSnapshot"},
 +		{ "uappnd",	"UserAppend"},
 +		{ "uappend",	"UserAppend"},
 +		{ "uchg",	"UserImmutable"},
 +		{ "uchange",	"UserImmutable"},
 +		{ "uimmutable",	"UserImmutable"},
 +		{ "nodump",	"UserNoDump"},
 +		{ "noopaque",	"UserOpaque"},
 +		{ "nouunlnk",	"UserNoUnlink"},
 +		{ "nouunlink",	"UserNoUnlink"},
 +		{ NULL, NULL}
 +	},
 +	flagext2[] = {
 +		{ "sappnd",	"AppendOnly"},
 +		{ "sappend",	"AppendOnly"},
 +		{ "schg",	"Immutable"},
 +		{ "schange",	"Immutable"},
 +		{ "simmutable",	"Immutable"},
 +		{ "nodump",	"NoDump"},
 +		{ "nouunlnk",	"Undelete"},
 +		{ "nouunlink",	"Undelete"},
 +		{ "btree",	"BTree"},
 +		{ "comperr",	"CompError"},
 +		{ "compress",	"Compress"},
 +		{ "noatime",	"NoAtime"},
 +		{ "compdirty",	"CompDirty"},
 +		{ "comprblk",	"CompBlock"},
 +		{ "dirsync",	"DirSync"},
 +		{ "hashidx",	"HashIndexed"},
 +		{ "imagic",	"iMagic"},
 +		{ "journal",	"Journaled"},
 +		{ "securedeletion",	"SecureDeletion"},
 +		{ "sync",	"Synchronous"},
 +		{ "notail",	"NoTail"},
 +		{ "topdir",	"TopDir"},
 +		{ "reserved",	"Reserved"},
 +		{ NULL, NULL}
 +	};
 +	const struct flagentry *fe, *flagentry;
 +#define FLAGENTRY_MAXSIZE ((sizeof(flagbsd)+sizeof(flagext2))/sizeof(flagbsd))
 +	const struct flagentry *avail[FLAGENTRY_MAXSIZE];
 +	const char *p;
 +	int i, n, r;
 +
 +	if (strcmp(element, "ext2") == 0)
 +		flagentry = flagext2;
 +	else
 +		flagentry = flagbsd;
 +	n = 0;
 +	p = fflags_text;
 +	do {
 +		const char *cp;
 +
 +		cp = strchr(p, ',');
 +		if (cp == NULL)
 +			cp = p + strlen(p);
 +
 +		for (fe = flagentry; fe->name != NULL; fe++) {
 +			if (fe->name[cp - p] != '\0'
 +			    || p[0] != fe->name[0])
 +				continue;
 +			if (strncmp(p, fe->name, cp - p) == 0) {
 +				avail[n++] = fe;
 +				break;
 +			}
 +		}
 +		if (*cp == ',')
 +			p = cp + 1;
 +		else
 +			p = NULL;
 +	} while (p != NULL);
 +
 +	if (n > 0) {
 +		r = xmlTextWriterStartElement(writer, BAD_CAST_CONST(element));
 +		if (r < 0) {
 +			archive_set_error(&a->archive,
 +			    ARCHIVE_ERRNO_MISC,
 +			    "xmlTextWriterStartElement() failed: %d", r);
 +			return (ARCHIVE_FATAL);
 +		}
 +		for (i = 0; i < n; i++) {
 +			r = xmlwrite_string(a, writer,
 +			    avail[i]->xarname, NULL);
 +			if (r != ARCHIVE_OK)
 +				return (r);
 +		}
 +
 +		r = xmlTextWriterEndElement(writer);
 +		if (r < 0) {
 +			archive_set_error(&a->archive,
 +			    ARCHIVE_ERRNO_MISC,
 +			    "xmlTextWriterEndElement() failed: %d", r);
 +			return (ARCHIVE_FATAL);
 +		}
 +	}
 +	return (ARCHIVE_OK);
 +}
 +
 +static int
 +make_file_entry(struct archive_write *a, xmlTextWriterPtr writer,
 +    struct file *file)
 +{
 +	struct xar *xar;
 +	const char *filetype, *filelink, *fflags;
 +	struct archive_string linkto;
 +	struct heap_data *heap;
 +	unsigned char *tmp;
 +	const char *p;
 +	size_t len;
 +	int r, r2, l, ll;
 +
 +	xar = (struct xar *)a->format_data;
 +	r2 = ARCHIVE_OK;
 +
 +	/*
 +	 * Make a file name entry, "<name>".
 +	 */
 +	l = ll = archive_strlen(&(file->basename));
 +	tmp = malloc(l);
 +	if (tmp == NULL) {
 +		archive_set_error(&a->archive, ENOMEM,
 +		    "Can't allocate memory");
 +		return (ARCHIVE_FATAL);
 +	}
 +	r = UTF8Toisolat1(tmp, &l, BAD_CAST(file->basename.s), &ll);
 +	free(tmp);
 +	if (r < 0) {
 +		r = xmlTextWriterStartElement(writer, BAD_CAST("name"));
 +		if (r < 0) {
 +			archive_set_error(&a->archive,
 +			    ARCHIVE_ERRNO_MISC,
 +			    "xmlTextWriterStartElement() failed: %d", r);
 +			return (ARCHIVE_FATAL);
 +		}
 +		r = xmlTextWriterWriteAttribute(writer,
 +		    BAD_CAST("enctype"), BAD_CAST("base64"));
 +		if (r < 0) {
 +			archive_set_error(&a->archive,
 +			    ARCHIVE_ERRNO_MISC,
 +			    "xmlTextWriterWriteAttribute() failed: %d", r);
 +			return (ARCHIVE_FATAL);
 +		}
 +		r = xmlTextWriterWriteBase64(writer, file->basename.s,
 +		    0, archive_strlen(&(file->basename)));
 +		if (r < 0) {
 +			archive_set_error(&a->archive,
 +			    ARCHIVE_ERRNO_MISC,
 +			    "xmlTextWriterWriteBase64() failed: %d", r);
 +			return (ARCHIVE_FATAL);
 +		}
 +		r = xmlTextWriterEndElement(writer);
 +		if (r < 0) {
 +			archive_set_error(&a->archive,
 +			    ARCHIVE_ERRNO_MISC,
 +			    "xmlTextWriterEndElement() failed: %d", r);
 +			return (ARCHIVE_FATAL);
 +		}
 +	} else {
 +		r = xmlwrite_string(a, writer, "name", file->basename.s);
 +		if (r < 0)
 +			return (ARCHIVE_FATAL);
 +	}
 +
 +	/*
 +	 * Make a file type entry, "<type>".
 +	 */
 +	filelink = NULL;
 +	archive_string_init(&linkto);
 +	switch (archive_entry_filetype(file->entry)) {
 +	case AE_IFDIR:
 +		filetype = "directory"; break;
 +	case AE_IFLNK:
 +		filetype = "symlink"; break;
 +	case AE_IFCHR:
 +		filetype = "character special"; break;
 +	case AE_IFBLK:
 +		filetype = "block special"; break;
 +	case AE_IFSOCK:
 +		filetype = "socket"; break;
 +	case AE_IFIFO:
 +		filetype = "fifo"; break;
 +	case AE_IFREG:
 +	default:
 +		if (file->hardlink_target != NULL) {
 +			filetype = "hardlink";
 +			filelink = "link";
 +			if (file->hardlink_target == file)
 +				archive_strcpy(&linkto, "original");
 +			else
 +				archive_string_sprintf(&linkto, "%d",
 +				    file->hardlink_target->id);
 +		} else
 +			filetype = "file";
 +		break;
 +	}
 +	r = xmlwrite_string_attr(a, writer, "type", filetype,
 +	    filelink, linkto.s);
 +	archive_string_free(&linkto);
 +	if (r < 0)
 +		return (ARCHIVE_FATAL);
 +
 +	/*
 +	 * On a virtual directory, we record "name" and "type" only.
 +	 */
 +	if (file->virtual)
 +		return (ARCHIVE_OK);
 +
 +	switch (archive_entry_filetype(file->entry)) {
 +	case AE_IFLNK:
 +		/*
 +		 * xar utility has checked a file type, which
- 		 * a symblic-link file has referenced.
++		 * a symbolic-link file has referenced.
 +		 * For example:
 +		 *   <link type="directory">../ref/</link>
 +		 *   The symlink target file is "../ref/" and its
 +		 *   file type is a directory.
 +		 *
 +		 *   <link type="file">../f</link>
 +		 *   The symlink target file is "../f" and its
 +		 *   file type is a regular file.
 +		 *
- 		 * But our implemention cannot do it, and then we
- 		 * always record that a attribute "type" is "borken",
++		 * But our implementation cannot do it, and then we
++		 * always record that a attribute "type" is "broken",
 +		 * for example:
 +		 *   <link type="broken">foo/bar</link>
 +		 *   It means "foo/bar" is not reachable.
 +		 */
 +		r = xmlwrite_string_attr(a, writer, "link",
 +		    file->symlink.s,
 +		    "type", "broken");
 +		if (r < 0)
 +			return (ARCHIVE_FATAL);
 +		break;
 +	case AE_IFCHR:
 +	case AE_IFBLK:
 +		r = xmlTextWriterStartElement(writer, BAD_CAST("device"));
 +		if (r < 0) {
 +			archive_set_error(&a->archive,
 +			    ARCHIVE_ERRNO_MISC,
 +			    "xmlTextWriterStartElement() failed: %d", r);
 +			return (ARCHIVE_FATAL);
 +		}
 +		r = xmlwrite_fstring(a, writer, "major",
 +		    "%d", archive_entry_rdevmajor(file->entry));
 +		if (r < 0)
 +			return (ARCHIVE_FATAL);
 +		r = xmlwrite_fstring(a, writer, "minor",
 +		    "%d", archive_entry_rdevminor(file->entry));
 +		if (r < 0)
 +			return (ARCHIVE_FATAL);
 +		r = xmlTextWriterEndElement(writer);
 +		if (r < 0) {
 +			archive_set_error(&a->archive,
 +			    ARCHIVE_ERRNO_MISC,
 +			    "xmlTextWriterEndElement() failed: %d", r);
 +			return (ARCHIVE_FATAL);
 +		}
 +		break;
 +	default:
 +		break;
 +	}
 +
 +	/*
 +	 * Make a inode entry, "<inode>".
 +	 */
 +	r = xmlwrite_fstring(a, writer, "inode",
 +	    "%jd", archive_entry_ino64(file->entry));
 +	if (r < 0)
 +		return (ARCHIVE_FATAL);
 +	if (archive_entry_dev(file->entry) != 0) {
 +		r = xmlwrite_fstring(a, writer, "deviceno",
 +		    "%d", archive_entry_dev(file->entry));
 +		if (r < 0)
 +			return (ARCHIVE_FATAL);
 +	}
 +
 +	/*
 +	 * Make a file mode entry, "<mode>".
 +	 */
 +	r = xmlwrite_mode(a, writer, "mode",
 +	    archive_entry_mode(file->entry));
 +	if (r < 0)
 +		return (ARCHIVE_FATAL);
 +
 +	/*
 +	 * Make a user entry, "<uid>" and "<user>.
 +	 */
 +	r = xmlwrite_fstring(a, writer, "uid",
 +	    "%d", archive_entry_uid(file->entry));
 +	if (r < 0)
 +		return (ARCHIVE_FATAL);
 +	r = archive_entry_uname_l(file->entry, &p, &len, xar->sconv);
 +	if (r != 0) {
 +		if (errno == ENOMEM) {
 +			archive_set_error(&a->archive, ENOMEM,
 +			    "Can't allocate memory for Uname");
 +			return (ARCHIVE_FATAL);
 +		}
 +		archive_set_error(&a->archive,
 +		    ARCHIVE_ERRNO_FILE_FORMAT,
 +		    "Can't translate uname '%s' to UTF-8",
 +		    archive_entry_uname(file->entry));
 +		r2 = ARCHIVE_WARN;
 +	}
 +	if (len > 0) {
 +		r = xmlwrite_string(a, writer, "user", p);
 +		if (r < 0)
 +			return (ARCHIVE_FATAL);
 +	}
 +
 +	/*
 +	 * Make a group entry, "<gid>" and "<group>.
 +	 */
 +	r = xmlwrite_fstring(a, writer, "gid",
 +	    "%d", archive_entry_gid(file->entry));
 +	if (r < 0)
 +		return (ARCHIVE_FATAL);
 +	r = archive_entry_gname_l(file->entry, &p, &len, xar->sconv);
 +	if (r != 0) {
 +		if (errno == ENOMEM) {
 +			archive_set_error(&a->archive, ENOMEM,
 +			    "Can't allocate memory for Gname");
 +			return (ARCHIVE_FATAL);
 +		}
 +		archive_set_error(&a->archive,
 +		    ARCHIVE_ERRNO_FILE_FORMAT,
 +		    "Can't translate gname '%s' to UTF-8",
 +		    archive_entry_gname(file->entry));
 +		r2 = ARCHIVE_WARN;
 +	}
 +	if (len > 0) {
 +		r = xmlwrite_string(a, writer, "group", p);
 +		if (r < 0)
 +			return (ARCHIVE_FATAL);
 +	}
 +
 +	/*
 +	 * Make a ctime entry, "<ctime>".
 +	 */
 +	if (archive_entry_ctime_is_set(file->entry)) {
 +		r = xmlwrite_time(a, writer, "ctime",
 +		    archive_entry_ctime(file->entry), 1);
 +		if (r < 0)
 +			return (ARCHIVE_FATAL);
 +	}
 +
 +	/*
 +	 * Make a mtime entry, "<mtime>".
 +	 */
 +	if (archive_entry_mtime_is_set(file->entry)) {
 +		r = xmlwrite_time(a, writer, "mtime",
 +		    archive_entry_mtime(file->entry), 1);
 +		if (r < 0)
 +			return (ARCHIVE_FATAL);
 +	}
 +
 +	/*
 +	 * Make a atime entry, "<atime>".
 +	 */
 +	if (archive_entry_atime_is_set(file->entry)) {
 +		r = xmlwrite_time(a, writer, "atime",
 +		    archive_entry_atime(file->entry), 1);
 +		if (r < 0)
 +			return (ARCHIVE_FATAL);
 +	}
 +
 +	/*
 +	 * Make fflags entries, "<flags>" and "<ext2>".
 +	 */
 +	fflags = archive_entry_fflags_text(file->entry);
 +	if (fflags != NULL) {
 +		r = make_fflags_entry(a, writer, "flags", fflags);
 +		if (r < 0)
 +			return (r);
 +		r = make_fflags_entry(a, writer, "ext2", fflags);
 +		if (r < 0)
 +			return (r);
 +	}
 +
 +	/*
 +	 * Make extended attribute entries, "<ea>".
 +	 */
 +	archive_entry_xattr_reset(file->entry);
 +	for (heap = file->xattr.first; heap != NULL; heap = heap->next) {
 +		const char *name;
 +		const void *value;
 +		size_t size;
 +
 +		archive_entry_xattr_next(file->entry,
 +		    &name, &value, &size);
 +		r = xmlTextWriterStartElement(writer, BAD_CAST("ea"));
 +		if (r < 0) {
 +			archive_set_error(&a->archive,
 +			    ARCHIVE_ERRNO_MISC,
 +			    "xmlTextWriterStartElement() failed: %d", r);
 +			return (ARCHIVE_FATAL);
 +		}
 +		r = xmlTextWriterWriteFormatAttribute(writer,
 +		    BAD_CAST("id"), "%d", heap->id);
 +		if (r < 0) {
 +			archive_set_error(&a->archive,
 +			    ARCHIVE_ERRNO_MISC,
 +			    "xmlTextWriterWriteAttribute() failed: %d", r);
 +			return (ARCHIVE_FATAL);
 +		}
 +		r = xmlwrite_heap(a, writer, heap);
 +		if (r < 0)
 +			return (ARCHIVE_FATAL);
 +		r = xmlwrite_string(a, writer, "name", name);
 +		if (r < 0)
 +			return (ARCHIVE_FATAL);
 +
 +		r = xmlTextWriterEndElement(writer);
 +		if (r < 0) {
 +			archive_set_error(&a->archive,
 +			    ARCHIVE_ERRNO_MISC,
 +			    "xmlTextWriterEndElement() failed: %d", r);
 +			return (ARCHIVE_FATAL);
 +		}
 +	}
 +
 +	/*
 +	 * Make a file data entry, "<data>".
 +	 */
 +	if (file->data.length > 0) {
 +		r = xmlTextWriterStartElement(writer, BAD_CAST("data"));
 +		if (r < 0) {
 +			archive_set_error(&a->archive,
 +			    ARCHIVE_ERRNO_MISC,
 +			    "xmlTextWriterStartElement() failed: %d", r);
 +			return (ARCHIVE_FATAL);
 +		}
 +
 +		r = xmlwrite_heap(a, writer, &(file->data));
 +		if (r < 0)
 +			return (ARCHIVE_FATAL);
 +
 +		r = xmlTextWriterEndElement(writer);
 +		if (r < 0) {
 +			archive_set_error(&a->archive,
 +			    ARCHIVE_ERRNO_MISC,
 +			    "xmlTextWriterEndElement() failed: %d", r);
 +			return (ARCHIVE_FATAL);
 +		}
 +	}
 +
 +	if (archive_strlen(&file->script) > 0) {
 +		r = xmlTextWriterStartElement(writer, BAD_CAST("content"));
 +		if (r < 0) {
 +			archive_set_error(&a->archive,
 +			    ARCHIVE_ERRNO_MISC,
 +			    "xmlTextWriterStartElement() failed: %d", r);
 +			return (ARCHIVE_FATAL);
 +		}
 +
 +		r = xmlwrite_string(a, writer,
 +		    "interpreter", file->script.s);
 +		if (r < 0)
 +			return (ARCHIVE_FATAL);
 +
 +		r = xmlwrite_string(a, writer, "type", "script");
 +		if (r < 0)
 +			return (ARCHIVE_FATAL);
 +
 +		r = xmlTextWriterEndElement(writer);
 +		if (r < 0) {
 +			archive_set_error(&a->archive,
 +			    ARCHIVE_ERRNO_MISC,
 +			    "xmlTextWriterEndElement() failed: %d", r);
 +			return (ARCHIVE_FATAL);
 +		}
 +	}
 +
 +	return (r2);
 +}
 +
 +/*
 + * Make the TOC
 + */
 +static int
 +make_toc(struct archive_write *a)
 +{
 +	struct xar *xar;
 +	struct file *np;
 +	xmlBufferPtr bp;
 +	xmlTextWriterPtr writer;
 +	int algsize;
 +	int r, ret;
 +
 +	xar = (struct xar *)a->format_data;
 +
 +	ret = ARCHIVE_FATAL;
 +
 +	/*
 +	 * Initialize xml writer.
 +	 */
 +	writer = NULL;
 +	bp = xmlBufferCreate();
 +	if (bp == NULL) {
 +		archive_set_error(&a->archive, ENOMEM,
 +		    "xmlBufferCreate() "
 +		    "couldn't create xml buffer");
 +		goto exit_toc;
 +	}
 +	writer = xmlNewTextWriterMemory(bp, 0);
 +	if (writer == NULL) {
 +		archive_set_error(&a->archive,
 +		    ARCHIVE_ERRNO_MISC,
 +		    "xmlNewTextWriterMemory() "
 +		    "couldn't create xml writer");
 +		goto exit_toc;
 +	}
 +	r = xmlTextWriterStartDocument(writer, "1.0", "UTF-8", NULL);
 +	if (r < 0) {
 +		archive_set_error(&a->archive,
 +		    ARCHIVE_ERRNO_MISC,
 +		    "xmlTextWriterStartDocument() failed: %d", r);
 +		goto exit_toc;
 +	}
 +	r = xmlTextWriterSetIndent(writer, 4);
 +	if (r < 0) {
 +		archive_set_error(&a->archive,
 +		    ARCHIVE_ERRNO_MISC,
 +		    "xmlTextWriterSetIndent() failed: %d", r);
 +		goto exit_toc;
 +	}
 +
 +	/*
- 	 * Start recoding TOC
++	 * Start recording TOC
 +	 */
 +	r = xmlTextWriterStartElement(writer, BAD_CAST("xar"));
 +	if (r < 0) {
 +		archive_set_error(&a->archive,
 +		    ARCHIVE_ERRNO_MISC,
 +		    "xmlTextWriterStartElement() failed: %d", r);
 +		goto exit_toc;
 +	}
 +	r = xmlTextWriterStartElement(writer, BAD_CAST("toc"));
 +	if (r < 0) {
 +		archive_set_error(&a->archive,
 +		    ARCHIVE_ERRNO_MISC,
 +		    "xmlTextWriterStartDocument() failed: %d", r);
 +		goto exit_toc;
 +	}
 +
 +	/*
 +	 * Record the creation time of the archive file.
 +	 */
 +	r = xmlwrite_time(a, writer, "creation-time", time(NULL), 0);
 +	if (r < 0)
 +		goto exit_toc;
 +
 +	/*
 +	 * Record the checksum value of TOC
 +	 */
 +	algsize = getalgsize(xar->opt_toc_sumalg);
 +	if (algsize) {
 +		/*
 +		 * Record TOC checksum
 +		 */
 +		r = xmlTextWriterStartElement(writer, BAD_CAST("checksum"));
 +		if (r < 0) {
 +			archive_set_error(&a->archive,
 +			    ARCHIVE_ERRNO_MISC,
 +			    "xmlTextWriterStartElement() failed: %d", r);
 +			goto exit_toc;
 +		}
 +		r = xmlTextWriterWriteAttribute(writer, BAD_CAST("style"),
 +		    BAD_CAST_CONST(getalgname(xar->opt_toc_sumalg)));
 +		if (r < 0) {
 +			archive_set_error(&a->archive,
 +			    ARCHIVE_ERRNO_MISC,
 +			    "xmlTextWriterWriteAttribute() failed: %d", r);
 +			goto exit_toc;
 +		}
 +
 +		/*
 +		 * Record the offset of the value of checksum of TOC
 +		 */
 +		r = xmlwrite_string(a, writer, "offset", "0");
 +		if (r < 0)
 +			goto exit_toc;
 +
 +		/*
 +		 * Record the size of the value of checksum of TOC
 +		 */
 +		r = xmlwrite_fstring(a, writer, "size", "%d", algsize);
 +		if (r < 0)
 +			goto exit_toc;
 +
 +		r = xmlTextWriterEndElement(writer);
 +		if (r < 0) {
 +			archive_set_error(&a->archive,
 +			    ARCHIVE_ERRNO_MISC,
 +			    "xmlTextWriterEndElement() failed: %d", r);
 +			goto exit_toc;
 +		}
 +	}
 +
 +	np = xar->root;
 +	do {
 +		if (np != np->parent) {
 +			r = make_file_entry(a, writer, np);
 +			if (r != ARCHIVE_OK)
 +				goto exit_toc;
 +		}
 +
 +		if (np->dir && np->children.first != NULL) {
 +			/* Enter to sub directories. */
 +			np = np->children.first;
 +			r = xmlTextWriterStartElement(writer,
 +			    BAD_CAST("file"));
 +			if (r < 0) {
 +				archive_set_error(&a->archive,
 +				    ARCHIVE_ERRNO_MISC,
 +				    "xmlTextWriterStartElement() "
 +				    "failed: %d", r);
 +				goto exit_toc;
 +			}
 +			r = xmlTextWriterWriteFormatAttribute(
 +			    writer, BAD_CAST("id"), "%d", np->id);
 +			if (r < 0) {
 +				archive_set_error(&a->archive,
 +				    ARCHIVE_ERRNO_MISC,
 +				    "xmlTextWriterWriteAttribute() "
 +				    "failed: %d", r);
 +				goto exit_toc;
 +			}
 +			continue;
 +		}
 +		while (np != np->parent) {
 +			r = xmlTextWriterEndElement(writer);
 +			if (r < 0) {
 +				archive_set_error(&a->archive,
 +				    ARCHIVE_ERRNO_MISC,
 +				    "xmlTextWriterEndElement() "
 +				    "failed: %d", r);
 +				goto exit_toc;
 +			}
 +			if (np->chnext == NULL) {
 +				/* Return to the parent directory. */
 +				np = np->parent;
 +			} else {
 +				np = np->chnext;
 +				r = xmlTextWriterStartElement(writer,
 +				    BAD_CAST("file"));
 +				if (r < 0) {
 +					archive_set_error(&a->archive,
 +					    ARCHIVE_ERRNO_MISC,
 +					    "xmlTextWriterStartElement() "
 +					    "failed: %d", r);
 +					goto exit_toc;
 +				}
 +				r = xmlTextWriterWriteFormatAttribute(
 +				    writer, BAD_CAST("id"), "%d", np->id);
 +				if (r < 0) {
 +					archive_set_error(&a->archive,
 +					    ARCHIVE_ERRNO_MISC,
 +					    "xmlTextWriterWriteAttribute() "
 +					    "failed: %d", r);
 +					goto exit_toc;
 +				}
 +				break;
 +			}
 +		}
 +	} while (np != np->parent);
 +
 +	r = xmlTextWriterEndDocument(writer);
 +	if (r < 0) {
 +		archive_set_error(&a->archive,
 +		    ARCHIVE_ERRNO_MISC,
 +		    "xmlTextWriterEndDocument() failed: %d", r);
 +		goto exit_toc;
 +	}
 +#if DEBUG_PRINT_TOC
 +	fprintf(stderr, "\n---TOC-- %d bytes --\n%s\n",
 +	    strlen((const char *)bp->content), bp->content);
 +#endif
 +
 +	/*
 +	 * Compress the TOC and calculate the sum of the TOC.
 +	 */
 +	xar->toc.temp_offset = xar->temp_offset;
 +	xar->toc.size = bp->use;
 +	checksum_init(&(xar->a_sumwrk), xar->opt_toc_sumalg);
 +
 +	r = compression_init_encoder_gzip(&(a->archive),
 +	    &(xar->stream), 6, 1);
 +	if (r != ARCHIVE_OK)
 +		goto exit_toc;
 +	xar->stream.next_in = bp->content;
 +	xar->stream.avail_in = bp->use;
 +	xar->stream.total_in = 0;
 +	xar->stream.next_out = xar->wbuff;
 +	xar->stream.avail_out = sizeof(xar->wbuff);
 +	xar->stream.total_out = 0;
 +	for (;;) {
 +		size_t size;
 +
 +		r = compression_code(&(a->archive),
 +		    &(xar->stream), ARCHIVE_Z_FINISH);
 +		if (r != ARCHIVE_OK && r != ARCHIVE_EOF)
 +			goto exit_toc;
 +		size = sizeof(xar->wbuff) - xar->stream.avail_out;
 +		checksum_update(&(xar->a_sumwrk), xar->wbuff, size);
 +		if (write_to_temp(a, xar->wbuff, size) != ARCHIVE_OK)
 +			goto exit_toc;
 +		if (r == ARCHIVE_EOF)
 +			break;
 +		xar->stream.next_out = xar->wbuff;
 +		xar->stream.avail_out = sizeof(xar->wbuff);
 +	}
 +	r = compression_end(&(a->archive), &(xar->stream));
 +	if (r != ARCHIVE_OK)
 +		goto exit_toc;
 +	xar->toc.length = xar->stream.total_out;
 +	xar->toc.compression = GZIP;
 +	checksum_final(&(xar->a_sumwrk), &(xar->toc.a_sum));
 +
 +	ret = ARCHIVE_OK;
 +exit_toc:
 +	if (writer)
 +		xmlFreeTextWriter(writer);
 +	if (bp)
 +		xmlBufferFree(bp);
 +
 +	return (ret);
 +}
 +
 +static int
 +flush_wbuff(struct archive_write *a)
 +{
 +	struct xar *xar;
 +	int r;
 +	size_t s;
 +
 +	xar = (struct xar *)a->format_data;
 +	s = sizeof(xar->wbuff) - xar->wbuff_remaining;
 +	r = __archive_write_output(a, xar->wbuff, s);
 +	if (r != ARCHIVE_OK)
 +		return (r);
 +	xar->wbuff_remaining = sizeof(xar->wbuff);
 +	return (r);
 +}
 +
 +static int
 +copy_out(struct archive_write *a, uint64_t offset, uint64_t length)
 +{
 +	struct xar *xar;
 +	int r;
 +
 +	xar = (struct xar *)a->format_data;
 +	if (lseek(xar->temp_fd, offset, SEEK_SET) < 0) {
 +		archive_set_error(&(a->archive), errno, "lseek failed");
 +		return (ARCHIVE_FATAL);
 +	}
 +	while (length) {
 +		size_t rsize;
 +		ssize_t rs;
 +		unsigned char *wb;
 +
 +		if (length > xar->wbuff_remaining)
 +			rsize = xar->wbuff_remaining;
 +		else
 +			rsize = (size_t)length;
 +		wb = xar->wbuff + (sizeof(xar->wbuff) - xar->wbuff_remaining);
 +		rs = read(xar->temp_fd, wb, rsize);
 +		if (rs < 0) {
 +			archive_set_error(&(a->archive), errno,
 +			    "Can't read temporary file(%jd)",
 +			    (intmax_t)rs);
 +			return (ARCHIVE_FATAL);
 +		}
 +		if (rs == 0) {
 +			archive_set_error(&(a->archive), 0,
 +			    "Truncated xar archive");
 +			return (ARCHIVE_FATAL);
 +		}
 +		xar->wbuff_remaining -= rs;
 +		length -= rs;
 +		if (xar->wbuff_remaining == 0) {
 +			r = flush_wbuff(a);
 +			if (r != ARCHIVE_OK)
 +				return (r);
 +		}
 +	}
 +	return (ARCHIVE_OK);
 +}
 +
 +static int
 +xar_close(struct archive_write *a)
 +{
 +	struct xar *xar;
 +	unsigned char *wb;
 +	uint64_t length;
 +	int r;
 +
 +	xar = (struct xar *)a->format_data;
 +
 +	/* Empty! */
 +	if (xar->root->children.first == NULL)
 +		return (ARCHIVE_OK);
 +
 +	/* Save the length of all file extended attributes and contents. */
 +	length = xar->temp_offset;
 +
 +	/* Connect hardlinked files */
 +	file_connect_hardlink_files(xar);
 +
 +	/* Make the TOC */
 +	r = make_toc(a);
 +	if (r != ARCHIVE_OK)
 +		return (r);
 +	/*
 +	 * Make the xar header on wbuff(write buffer).
 +	 */
 +	wb = xar->wbuff;
 +	xar->wbuff_remaining = sizeof(xar->wbuff);
 +	archive_be32enc(&wb[0], HEADER_MAGIC);
 +	archive_be16enc(&wb[4], HEADER_SIZE);
 +	archive_be16enc(&wb[6], HEADER_VERSION);
 +	archive_be64enc(&wb[8], xar->toc.length);
 +	archive_be64enc(&wb[16], xar->toc.size);
 +	archive_be32enc(&wb[24], xar->toc.a_sum.alg);
 +	xar->wbuff_remaining -= HEADER_SIZE;
 +
 +	/*
 +	 * Write the TOC
 +	 */
 +	r = copy_out(a, xar->toc.temp_offset, xar->toc.length);
 +	if (r != ARCHIVE_OK)
 +		return (r);
 +
 +	/* Write the checksum value of the TOC. */
 +	if (xar->toc.a_sum.len) {
 +		if (xar->wbuff_remaining < xar->toc.a_sum.len) {
 +			r = flush_wbuff(a);
 +			if (r != ARCHIVE_OK)
 +				return (r);
 +		}
 +		wb = xar->wbuff + (sizeof(xar->wbuff) - xar->wbuff_remaining);
 +		memcpy(wb, xar->toc.a_sum.val, xar->toc.a_sum.len);
 +		xar->wbuff_remaining -= xar->toc.a_sum.len;
 +	}
 +
 +	/*
 +	 * Write all file extended attributes and contents.
 +	 */
 +	r = copy_out(a, xar->toc.a_sum.len, length);
 +	if (r != ARCHIVE_OK)
 +		return (r);
 +	r = flush_wbuff(a);
 +	return (r);
 +}
 +
 +static int
 +xar_free(struct archive_write *a)
 +{
 +	struct xar *xar;
 +
 +	xar = (struct xar *)a->format_data;
 +
 +	/* Close the temporary file. */
 +	if (xar->temp_fd >= 0)
 +		close(xar->temp_fd);
 +
 +	archive_string_free(&(xar->cur_dirstr));
 +	archive_string_free(&(xar->tstr));
 +	archive_string_free(&(xar->vstr));
 +	file_free_hardlinks(xar);
 +	file_free_register(xar);
 +	compression_end(&(a->archive), &(xar->stream));
 +	free(xar);
 +
 +	return (ARCHIVE_OK);
 +}
 +
 +static int
 +file_cmp_node(const struct archive_rb_node *n1,
 +    const struct archive_rb_node *n2)
 +{
 +	const struct file *f1 = (const struct file *)n1;
 +	const struct file *f2 = (const struct file *)n2;
 +
 +	return (strcmp(f1->basename.s, f2->basename.s));
 +}
 +
 +static int
 +file_cmp_key(const struct archive_rb_node *n, const void *key)
 +{
 +	const struct file *f = (const struct file *)n;
 +
 +	return (strcmp(f->basename.s, (const char *)key));
 +}
 +
 +static struct file *
 +file_new(struct archive_write *a, struct archive_entry *entry)
 +{
 +	struct file *file;
 +	static const struct archive_rb_tree_ops rb_ops = {
 +		file_cmp_node, file_cmp_key
 +	};
 +
 +	file = calloc(1, sizeof(*file));
 +	if (file == NULL)
 +		return (NULL);
 +
 +	if (entry != NULL)
 +		file->entry = archive_entry_clone(entry);
 +	else
 +		file->entry = archive_entry_new2(&a->archive);
 +	if (file->entry == NULL) {
 +		free(file);
 +		return (NULL);
 +	}
 +	__archive_rb_tree_init(&(file->rbtree), &rb_ops);
 +	file->children.first = NULL;
 +	file->children.last = &(file->children.first);
 +	file->xattr.first = NULL;
 +	file->xattr.last = &(file->xattr.first);
 +	archive_string_init(&(file->parentdir));
 +	archive_string_init(&(file->basename));
 +	archive_string_init(&(file->symlink));
 +	archive_string_init(&(file->script));
 +	if (entry != NULL && archive_entry_filetype(entry) == AE_IFDIR)
 +		file->dir = 1;
 +
 +	return (file);
 +}
 +
 +static void
 +file_free(struct file *file)
 +{
 +	struct heap_data *heap, *next_heap;
 +
 +	heap = file->xattr.first;
 +	while (heap != NULL) {
 +		next_heap = heap->next;
 +		free(heap);
 +		heap = next_heap;
 +	}
 +	archive_string_free(&(file->parentdir));
 +	archive_string_free(&(file->basename));
 +	archive_string_free(&(file->symlink));
 +	archive_string_free(&(file->script));
++	archive_entry_free(file->entry);
 +	free(file);
 +}
 +
 +static struct file *
 +file_create_virtual_dir(struct archive_write *a, struct xar *xar,
 +    const char *pathname)
 +{
 +	struct file *file;
 +
 +	(void)xar; /* UNUSED */
 +
 +	file = file_new(a, NULL);
 +	if (file == NULL)
 +		return (NULL);
 +	archive_entry_set_pathname(file->entry, pathname);
 +	archive_entry_set_mode(file->entry, 0555 | AE_IFDIR);
 +
 +	file->dir = 1;
 +	file->virtual = 1;
 +
 +	return (file);
 +}
 +
 +static int
 +file_add_child_tail(struct file *parent, struct file *child)
 +{
 +	if (!__archive_rb_tree_insert_node(
 +	    &(parent->rbtree), (struct archive_rb_node *)child))
 +		return (0);
 +	child->chnext = NULL;
 +	*parent->children.last = child;
 +	parent->children.last = &(child->chnext);
 +	child->parent = parent;
 +	return (1);
 +}
 +
 +/*
 + * Find a entry from `parent'
 + */
 +static struct file *
 +file_find_child(struct file *parent, const char *child_name)
 +{
 +	struct file *np;
 +
 +	np = (struct file *)__archive_rb_tree_find_node(
 +	    &(parent->rbtree), child_name);
 +	return (np);
 +}
 +
 +#if defined(_WIN32) || defined(__CYGWIN__)
 +static void
 +cleanup_backslash(char *utf8, size_t len)
 +{
 +
 +	/* Convert a path-separator from '\' to  '/' */
 +	while (*utf8 != '\0' && len) {
 +		if (*utf8 == '\\')
 +			*utf8 = '/';
 +		++utf8;
 +		--len;
 +	}
 +}
 +#else
 +#define cleanup_backslash(p, len)	/* nop */
 +#endif
 +
 +/*
 + * Generate a parent directory name and a base name from a pathname.
 + */
 +static int
 +file_gen_utility_names(struct archive_write *a, struct file *file)
 +{
 +	struct xar *xar;
 +	const char *pp;
 +	char *p, *dirname, *slash;
 +	size_t len;
 +	int r = ARCHIVE_OK;
 +
 +	xar = (struct xar *)a->format_data;
 +	archive_string_empty(&(file->parentdir));
 +	archive_string_empty(&(file->basename));
 +	archive_string_empty(&(file->symlink));
 +
 +	if (file->parent == file)/* virtual root */
 +		return (ARCHIVE_OK);
 +
 +	if (archive_entry_pathname_l(file->entry, &pp, &len, xar->sconv)
 +	    != 0) {
 +		if (errno == ENOMEM) {
 +			archive_set_error(&a->archive, ENOMEM,
 +			    "Can't allocate memory for Pathname");
 +			return (ARCHIVE_FATAL);
 +		}
 +		archive_set_error(&a->archive,
 +		    ARCHIVE_ERRNO_FILE_FORMAT,
 +		    "Can't translate pathname '%s' to UTF-8",
 +		    archive_entry_pathname(file->entry));
 +		r = ARCHIVE_WARN;
 +	}
 +	archive_strncpy(&(file->parentdir), pp, len);
 +	len = file->parentdir.length;
 +	p = dirname = file->parentdir.s;
 +	/*
 +	 * Convert a path-separator from '\' to  '/'
 +	 */
 +	cleanup_backslash(p, len);
 +
 +	/*
 +	 * Remove leading '/', '../' and './' elements
 +	 */
 +	while (*p) {
 +		if (p[0] == '/') {
 +			p++;
 +			len--;
 +		} else if (p[0] != '.')
 +			break;
 +		else if (p[1] == '.' && p[2] == '/') {
 +			p += 3;
 +			len -= 3;
 +		} else if (p[1] == '/' || (p[1] == '.' && p[2] == '\0')) {
 +			p += 2;
 +			len -= 2;
 +		} else if (p[1] == '\0') {
 +			p++;
 +			len--;
 +		} else
 +			break;
 +	}
 +	if (p != dirname) {
 +		memmove(dirname, p, len+1);
 +		p = dirname;
 +	}
 +	/*
 +	 * Remove "/","/." and "/.." elements from tail.
 +	 */
 +	while (len > 0) {
 +		size_t ll = len;
 +
 +		if (len > 0 && p[len-1] == '/') {
 +			p[len-1] = '\0';
 +			len--;
 +		}
 +		if (len > 1 && p[len-2] == '/' && p[len-1] == '.') {
 +			p[len-2] = '\0';
 +			len -= 2;
 +		}
 +		if (len > 2 && p[len-3] == '/' && p[len-2] == '.' &&
 +		    p[len-1] == '.') {
 +			p[len-3] = '\0';
 +			len -= 3;
 +		}
 +		if (ll == len)
 +			break;
 +	}
 +	while (*p) {
 +		if (p[0] == '/') {
 +			if (p[1] == '/')
 +				/* Convert '//' --> '/' */
 +				strcpy(p, p+1);
 +			else if (p[1] == '.' && p[2] == '/')
 +				/* Convert '/./' --> '/' */
 +				strcpy(p, p+2);
 +			else if (p[1] == '.' && p[2] == '.' && p[3] == '/') {
 +				/* Convert 'dir/dir1/../dir2/'
 +				 *     --> 'dir/dir2/'
 +				 */
 +				char *rp = p -1;
 +				while (rp >= dirname) {
 +					if (*rp == '/')
 +						break;
 +					--rp;
 +				}
 +				if (rp > dirname) {
 +					strcpy(rp, p+3);
 +					p = rp;
 +				} else {
 +					strcpy(dirname, p+4);
 +					p = dirname;
 +				}
 +			} else
 +				p++;
 +		} else
 +			p++;
 +	}
 +	p = dirname;
 +	len = strlen(p);
 +
 +	if (archive_entry_filetype(file->entry) == AE_IFLNK) {
 +		size_t len2;
 +		/* Convert symlink name too. */
 +		if (archive_entry_symlink_l(file->entry, &pp, &len2,
 +		    xar->sconv) != 0) {
 +			if (errno == ENOMEM) {
 +				archive_set_error(&a->archive, ENOMEM,
 +				    "Can't allocate memory for Linkname");
 +				return (ARCHIVE_FATAL);
 +			}
 +			archive_set_error(&a->archive,
 +			    ARCHIVE_ERRNO_FILE_FORMAT,
 +			    "Can't translate symlink '%s' to UTF-8",
 +			    archive_entry_symlink(file->entry));
 +			r = ARCHIVE_WARN;
 +		}
 +		archive_strncpy(&(file->symlink), pp, len2);
 +		cleanup_backslash(file->symlink.s, file->symlink.length);
 +	}
 +	/*
 +	 * - Count up directory elements.
 +	 * - Find out the position which points the last position of
 +	 *   path separator('/').
 +	 */
 +	slash = NULL;
 +	for (; *p != '\0'; p++)
 +		if (*p == '/')
 +			slash = p;
 +	if (slash == NULL) {
 +		/* The pathname doesn't have a parent directory. */
 +		file->parentdir.length = len;
 +		archive_string_copy(&(file->basename), &(file->parentdir));
 +		archive_string_empty(&(file->parentdir));
 +		*file->parentdir.s = '\0';
 +		return (r);
 +	}
 +
 +	/* Make a basename from dirname and slash */
 +	*slash  = '\0';
 +	file->parentdir.length = slash - dirname;
 +	archive_strcpy(&(file->basename),  slash + 1);
 +	return (r);
 +}
 +
 +static int
 +get_path_component(char *name, int n, const char *fn)
 +{
 +	char *p;
 +	int l;
 +
 +	p = strchr(fn, '/');
 +	if (p == NULL) {
 +		if ((l = strlen(fn)) == 0)
 +			return (0);
 +	} else
 +		l = p - fn;
 +	if (l > n -1)
 +		return (-1);
 +	memcpy(name, fn, l);
 +	name[l] = '\0';
 +
 +	return (l);
 +}
 +
 +/*
 + * Add a new entry into the tree.
 + */
 +static int
 +file_tree(struct archive_write *a, struct file **filepp)
 +{
 +#if defined(_WIN32) && !defined(__CYGWIN__)
 +	char name[_MAX_FNAME];/* Included null terminator size. */
 +#elif defined(NAME_MAX) && NAME_MAX >= 255
 +	char name[NAME_MAX+1];
 +#else
 +	char name[256];
 +#endif
 +	struct xar *xar = (struct xar *)a->format_data;
 +	struct file *dent, *file, *np;
 +	struct archive_entry *ent;
 +	const char *fn, *p;
 +	int l;
 +
 +	file = *filepp;
 +	dent = xar->root;
 +	if (file->parentdir.length > 0)
 +		fn = p = file->parentdir.s;
 +	else
 +		fn = p = "";
 +
 +	/*
 +	 * If the path of the parent directory of `file' entry is
 +	 * the same as the path of `cur_dirent', add isoent to
 +	 * `cur_dirent'.
 +	 */
 +	if (archive_strlen(&(xar->cur_dirstr))
 +	      == archive_strlen(&(file->parentdir)) &&
 +	    strcmp(xar->cur_dirstr.s, fn) == 0) {
 +		if (!file_add_child_tail(xar->cur_dirent, file)) {
 +			np = (struct file *)__archive_rb_tree_find_node(
 +			    &(xar->cur_dirent->rbtree),
 +			    file->basename.s);
 +			goto same_entry;
 +		}
 +		return (ARCHIVE_OK);
 +	}
 +
 +	for (;;) {
 +		l = get_path_component(name, sizeof(name), fn);
 +		if (l == 0) {
 +			np = NULL;
 +			break;
 +		}
 +		if (l < 0) {
 +			archive_set_error(&a->archive,
 +			    ARCHIVE_ERRNO_MISC,
 +			    "A name buffer is too small");
 +			file_free(file);
 +			*filepp = NULL;
 +			return (ARCHIVE_FATAL);
 +		}
 +
 +		np = file_find_child(dent, name);
 +		if (np == NULL || fn[0] == '\0')
 +			break;
 +
 +		/* Find next subdirectory. */
 +		if (!np->dir) {
 +			/* NOT Directory! */
 +			archive_set_error(&a->archive,
 +			    ARCHIVE_ERRNO_MISC,
 +			    "`%s' is not directory, we cannot insert `%s' ",
 +			    archive_entry_pathname(np->entry),
 +			    archive_entry_pathname(file->entry));
 +			file_free(file);
 +			*filepp = NULL;
 +			return (ARCHIVE_FAILED);
 +		}
 +		fn += l;
 +		if (fn[0] == '/')
 +			fn++;
 +		dent = np;
 +	}
 +	if (np == NULL) {
 +		/*
 +		 * Create virtual parent directories.
 +		 */
 +		while (fn[0] != '\0') {
 +			struct file *vp;
 +			struct archive_string as;
 +
 +			archive_string_init(&as);
 +			archive_strncat(&as, p, fn - p + l);
 +			if (as.s[as.length-1] == '/') {
 +				as.s[as.length-1] = '\0';
 +				as.length--;
 +			}
 +			vp = file_create_virtual_dir(a, xar, as.s);
 +			if (vp == NULL) {
 +				archive_string_free(&as);
 +				archive_set_error(&a->archive, ENOMEM,
 +				    "Can't allocate memory");
 +				file_free(file);
 +				*filepp = NULL;
 +				return (ARCHIVE_FATAL);
 +			}
 +			archive_string_free(&as);
 +			if (file_gen_utility_names(a, vp) <= ARCHIVE_FAILED)
 +				return (ARCHIVE_FATAL);
 +			file_add_child_tail(dent, vp);
 +			file_register(xar, vp);
 +			np = vp;
 +
 +			fn += l;
 +			if (fn[0] == '/')
 +				fn++;
 +			l = get_path_component(name, sizeof(name), fn);
 +			if (l < 0) {
 +				archive_string_free(&as);
 +				archive_set_error(&a->archive,
 +				    ARCHIVE_ERRNO_MISC,
 +				    "A name buffer is too small");
 +				file_free(file);
 +				*filepp = NULL;
 +				return (ARCHIVE_FATAL);
 +			}
 +			dent = np;
 +		}
 +
 +		/* Found out the parent directory where isoent can be
 +		 * inserted. */
 +		xar->cur_dirent = dent;
 +		archive_string_empty(&(xar->cur_dirstr));
 +		archive_string_ensure(&(xar->cur_dirstr),
 +		    archive_strlen(&(dent->parentdir)) +
 +		    archive_strlen(&(dent->basename)) + 2);
 +		if (archive_strlen(&(dent->parentdir)) +
 +		    archive_strlen(&(dent->basename)) == 0)
 +			xar->cur_dirstr.s[0] = 0;
 +		else {
 +			if (archive_strlen(&(dent->parentdir)) > 0) {
 +				archive_string_copy(&(xar->cur_dirstr),
 +				    &(dent->parentdir));
 +				archive_strappend_char(&(xar->cur_dirstr), '/');
 +			}
 +			archive_string_concat(&(xar->cur_dirstr),
 +			    &(dent->basename));
 +		}
 +
 +		if (!file_add_child_tail(dent, file)) {
 +			np = (struct file *)__archive_rb_tree_find_node(
 +			    &(dent->rbtree), file->basename.s);
 +			goto same_entry;
 +		}
 +		return (ARCHIVE_OK);
 +	}
 +
 +same_entry:
 +	/*
 +	 * We have already has the entry the filename of which is
 +	 * the same.
 +	 */
 +	if (archive_entry_filetype(np->entry) !=
 +	    archive_entry_filetype(file->entry)) {
 +		archive_set_error(&a->archive, ARCHIVE_ERRNO_MISC,
 +		    "Found duplicate entries `%s' and its file type is "
 +		    "different",
 +		    archive_entry_pathname(np->entry));
 +		file_free(file);
 +		*filepp = NULL;
 +		return (ARCHIVE_FAILED);
 +	}
 +
 +	/* Swap files. */
 +	ent = np->entry;
 +	np->entry = file->entry;
 +	file->entry = ent;
 +	np->virtual = 0;
 +
 +	file_free(file);
 +	*filepp = np;
 +	return (ARCHIVE_OK);
 +}
 +
 +static void
 +file_register(struct xar *xar, struct file *file)
 +{
 +	file->id = xar->file_idx++;
 +        file->next = NULL;
 +        *xar->file_list.last = file;
 +        xar->file_list.last = &(file->next);
 +}
 +
 +static void
 +file_init_register(struct xar *xar)
 +{
 +	xar->file_list.first = NULL;
 +	xar->file_list.last = &(xar->file_list.first);
 +}
 +
 +static void
 +file_free_register(struct xar *xar)
 +{
 +	struct file *file, *file_next;
 +
 +	file = xar->file_list.first;
 +	while (file != NULL) {
 +		file_next = file->next;
 +		file_free(file);
 +		file = file_next;
 +	}
 +}
 +
 +/*
 + * Register entry to get a hardlink target.
 + */
 +static int
 +file_register_hardlink(struct archive_write *a, struct file *file)
 +{
 +	struct xar *xar = (struct xar *)a->format_data;
 +	struct hardlink *hl;
 +	const char *pathname;
 +
 +	archive_entry_set_nlink(file->entry, 1);
 +	pathname = archive_entry_hardlink(file->entry);
 +	if (pathname == NULL) {
 +		/* This `file` is a hardlink target. */
 +		hl = malloc(sizeof(*hl));
 +		if (hl == NULL) {
 +			archive_set_error(&a->archive, ENOMEM,
 +			    "Can't allocate memory");
 +			return (ARCHIVE_FATAL);
 +		}
 +		hl->nlink = 1;
 +		/* A hardlink target must be the first position. */
 +		file->hlnext = NULL;
 +		hl->file_list.first = file;
 +		hl->file_list.last = &(file->hlnext);
 +		__archive_rb_tree_insert_node(&(xar->hardlink_rbtree),
 +		    (struct archive_rb_node *)hl);
 +	} else {
 +		hl = (struct hardlink *)__archive_rb_tree_find_node(
 +		    &(xar->hardlink_rbtree), pathname);
 +		if (hl != NULL) {
 +			/* Insert `file` entry into the tail. */
 +			file->hlnext = NULL;
 +			*hl->file_list.last = file;
 +			hl->file_list.last = &(file->hlnext);
 +			hl->nlink++;
 +		}
 +		archive_entry_unset_size(file->entry);
 +	}
 +
 +	return (ARCHIVE_OK);
 +}
 +
 +/*
 + * Hardlinked files have to have the same location of extent.
 + * We have to find out hardlink target entries for entries which
 + * have a hardlink target name.
 + */
 +static void
 +file_connect_hardlink_files(struct xar *xar)
 +{
 +	struct archive_rb_node *n;
 +	struct hardlink *hl;
 +	struct file *target, *nf;
 +
 +	ARCHIVE_RB_TREE_FOREACH(n, &(xar->hardlink_rbtree)) {
 +		hl = (struct hardlink *)n;
 +
 +		/* The first entry must be a hardlink target. */
 +		target = hl->file_list.first;
 +		archive_entry_set_nlink(target->entry, hl->nlink);
 +		if (hl->nlink > 1)
 +			/* It means this file is a hardlink
- 			 * targe itself. */
++			 * target itself. */
 +			target->hardlink_target = target;
 +		for (nf = target->hlnext;
 +		    nf != NULL; nf = nf->hlnext) {
 +			nf->hardlink_target = target;
 +			archive_entry_set_nlink(nf->entry, hl->nlink);
 +		}
 +	}
 +}
 +
 +static int
 +file_hd_cmp_node(const struct archive_rb_node *n1,
 +    const struct archive_rb_node *n2)
 +{
 +	const struct hardlink *h1 = (const struct hardlink *)n1;
 +	const struct hardlink *h2 = (const struct hardlink *)n2;
 +
 +	return (strcmp(archive_entry_pathname(h1->file_list.first->entry),
 +		       archive_entry_pathname(h2->file_list.first->entry)));
 +}
 +
 +static int
 +file_hd_cmp_key(const struct archive_rb_node *n, const void *key)
 +{
 +	const struct hardlink *h = (const struct hardlink *)n;
 +
 +	return (strcmp(archive_entry_pathname(h->file_list.first->entry),
 +		       (const char *)key));
 +}
 +
 +
 +static void
 +file_init_hardlinks(struct xar *xar)
 +{
 +	static const struct archive_rb_tree_ops rb_ops = {
 +		file_hd_cmp_node, file_hd_cmp_key,
 +	};
 +
 +	__archive_rb_tree_init(&(xar->hardlink_rbtree), &rb_ops);
 +}
 +
 +static void
 +file_free_hardlinks(struct xar *xar)
 +{
 +	struct archive_rb_node *n, *next;
 +
 +	for (n = ARCHIVE_RB_TREE_MIN(&(xar->hardlink_rbtree)); n;) {
 +		next = __archive_rb_tree_iterate(&(xar->hardlink_rbtree),
 +		    n, ARCHIVE_RB_DIR_RIGHT);
 +		free(n);
 +		n = next;
 +	}
 +}
 +
 +static void
 +checksum_init(struct chksumwork *sumwrk, enum sumalg sum_alg)
 +{
 +	sumwrk->alg = sum_alg;
 +	switch (sum_alg) {
 +	case CKSUM_NONE:
 +		break;
 +	case CKSUM_SHA1:
 +		archive_sha1_init(&(sumwrk->sha1ctx));
 +		break;
 +	case CKSUM_MD5:
 +		archive_md5_init(&(sumwrk->md5ctx));
 +		break;
 +	}
 +}
 +
 +static void
 +checksum_update(struct chksumwork *sumwrk, const void *buff, size_t size)
 +{
 +
 +	switch (sumwrk->alg) {
 +	case CKSUM_NONE:
 +		break;
 +	case CKSUM_SHA1:
 +		archive_sha1_update(&(sumwrk->sha1ctx), buff, size);
 +		break;
 +	case CKSUM_MD5:
 +		archive_md5_update(&(sumwrk->md5ctx), buff, size);
 +		break;
 +	}
 +}
 +
 +static void
 +checksum_final(struct chksumwork *sumwrk, struct chksumval *sumval)
 +{
 +
 +	switch (sumwrk->alg) {
 +	case CKSUM_NONE:
 +		sumval->len = 0;
 +		break;
 +	case CKSUM_SHA1:
 +		archive_sha1_final(&(sumwrk->sha1ctx), sumval->val);
 +		sumval->len = SHA1_SIZE;
 +		break;
 +	case CKSUM_MD5:
 +		archive_md5_final(&(sumwrk->md5ctx), sumval->val);
 +		sumval->len = MD5_SIZE;
 +		break;
 +	}
 +	sumval->alg = sumwrk->alg;
 +}
 +
 +#if !defined(HAVE_BZLIB_H) || !defined(BZ_CONFIG_ERROR) || !defined(HAVE_LZMA_H)
 +static int
 +compression_unsupported_encoder(struct archive *a,
 +    struct la_zstream *lastrm, const char *name)
 +{
 +
 +	archive_set_error(a, ARCHIVE_ERRNO_MISC,
 +	    "%s compression not supported on this platform", name);
 +	lastrm->valid = 0;
 +	lastrm->real_stream = NULL;
 +	return (ARCHIVE_FAILED);
 +}
 +#endif
 +
 +static int
 +compression_init_encoder_gzip(struct archive *a,
 +    struct la_zstream *lastrm, int level, int withheader)
 +{
 +	z_stream *strm;
 +
 +	if (lastrm->valid)
 +		compression_end(a, lastrm);
 +	strm = calloc(1, sizeof(*strm));
 +	if (strm == NULL) {
 +		archive_set_error(a, ENOMEM,
 +		    "Can't allocate memory for gzip stream");
 +		return (ARCHIVE_FATAL);
 +	}
 +	/* zlib.h is not const-correct, so we need this one bit
 +	 * of ugly hackery to convert a const * pointer to
 +	 * a non-const pointer. */
 +	strm->next_in = (Bytef *)(uintptr_t)(const void *)lastrm->next_in;
 +	strm->avail_in = lastrm->avail_in;
 +	strm->total_in = (uLong)lastrm->total_in;
 +	strm->next_out = lastrm->next_out;
 +	strm->avail_out = lastrm->avail_out;
 +	strm->total_out = (uLong)lastrm->total_out;
 +	if (deflateInit2(strm, level, Z_DEFLATED,
 +	    (withheader)?15:-15,
 +	    8, Z_DEFAULT_STRATEGY) != Z_OK) {
 +		free(strm);
 +		lastrm->real_stream = NULL;
 +		archive_set_error(a, ARCHIVE_ERRNO_MISC,
 +		    "Internal error initializing compression library");
 +		return (ARCHIVE_FATAL);
 +	}
 +	lastrm->real_stream = strm;
 +	lastrm->valid = 1;
 +	lastrm->code = compression_code_gzip;
 +	lastrm->end = compression_end_gzip;
 +	return (ARCHIVE_OK);
 +}
 +
 +static int
 +compression_code_gzip(struct archive *a,
 +    struct la_zstream *lastrm, enum la_zaction action)
 +{
 +	z_stream *strm;
 +	int r;
 +
 +	strm = (z_stream *)lastrm->real_stream;
 +	/* zlib.h is not const-correct, so we need this one bit
 +	 * of ugly hackery to convert a const * pointer to
 +	 * a non-const pointer. */
 +	strm->next_in = (Bytef *)(uintptr_t)(const void *)lastrm->next_in;
 +	strm->avail_in = lastrm->avail_in;
 +	strm->total_in = (uLong)lastrm->total_in;
 +	strm->next_out = lastrm->next_out;
 +	strm->avail_out = lastrm->avail_out;
 +	strm->total_out = (uLong)lastrm->total_out;
 +	r = deflate(strm,
 +	    (action == ARCHIVE_Z_FINISH)? Z_FINISH: Z_NO_FLUSH);
 +	lastrm->next_in = strm->next_in;
 +	lastrm->avail_in = strm->avail_in;
 +	lastrm->total_in = strm->total_in;
 +	lastrm->next_out = strm->next_out;
 +	lastrm->avail_out = strm->avail_out;
 +	lastrm->total_out = strm->total_out;
 +	switch (r) {
 +	case Z_OK:
 +		return (ARCHIVE_OK);
 +	case Z_STREAM_END:
 +		return (ARCHIVE_EOF);
 +	default:
 +		archive_set_error(a, ARCHIVE_ERRNO_MISC,
 +		    "GZip compression failed:"
 +		    " deflate() call returned status %d", r);
 +		return (ARCHIVE_FATAL);
 +	}
 +}
 +
 +static int
 +compression_end_gzip(struct archive *a, struct la_zstream *lastrm)
 +{
 +	z_stream *strm;
 +	int r;
 +
 +	strm = (z_stream *)lastrm->real_stream;
 +	r = deflateEnd(strm);
 +	free(strm);
 +	lastrm->real_stream = NULL;
 +	lastrm->valid = 0;
 +	if (r != Z_OK) {
 +		archive_set_error(a, ARCHIVE_ERRNO_MISC,
 +		    "Failed to clean up compressor");
 +		return (ARCHIVE_FATAL);
 +	}
 +	return (ARCHIVE_OK);
 +}
 +
 +#if defined(HAVE_BZLIB_H) && defined(BZ_CONFIG_ERROR)
 +static int
 +compression_init_encoder_bzip2(struct archive *a,
 +    struct la_zstream *lastrm, int level)
 +{
 +	bz_stream *strm;
 +
 +	if (lastrm->valid)
 +		compression_end(a, lastrm);
 +	strm = calloc(1, sizeof(*strm));
 +	if (strm == NULL) {
 +		archive_set_error(a, ENOMEM,
 +		    "Can't allocate memory for bzip2 stream");
 +		return (ARCHIVE_FATAL);
 +	}
 +	/* bzlib.h is not const-correct, so we need this one bit
 +	 * of ugly hackery to convert a const * pointer to
 +	 * a non-const pointer. */
 +	strm->next_in = (char *)(uintptr_t)(const void *)lastrm->next_in;
 +	strm->avail_in = lastrm->avail_in;
 +	strm->total_in_lo32 = (uint32_t)(lastrm->total_in & 0xffffffff);
 +	strm->total_in_hi32 = (uint32_t)(lastrm->total_in >> 32);
 +	strm->next_out = (char *)lastrm->next_out;
 +	strm->avail_out = lastrm->avail_out;
 +	strm->total_out_lo32 = (uint32_t)(lastrm->total_out & 0xffffffff);
 +	strm->total_out_hi32 = (uint32_t)(lastrm->total_out >> 32);
 +	if (BZ2_bzCompressInit(strm, level, 0, 30) != BZ_OK) {
 +		free(strm);
 +		lastrm->real_stream = NULL;
 +		archive_set_error(a, ARCHIVE_ERRNO_MISC,
 +		    "Internal error initializing compression library");
 +		return (ARCHIVE_FATAL);
 +	}
 +	lastrm->real_stream = strm;
 +	lastrm->valid = 1;
 +	lastrm->code = compression_code_bzip2;
 +	lastrm->end = compression_end_bzip2;
 +	return (ARCHIVE_OK);
 +}
 +
 +static int
 +compression_code_bzip2(struct archive *a,
 +    struct la_zstream *lastrm, enum la_zaction action)
 +{
 +	bz_stream *strm;
 +	int r;
 +
 +	strm = (bz_stream *)lastrm->real_stream;
 +	/* bzlib.h is not const-correct, so we need this one bit
 +	 * of ugly hackery to convert a const * pointer to
 +	 * a non-const pointer. */
 +	strm->next_in = (char *)(uintptr_t)(const void *)lastrm->next_in;
 +	strm->avail_in = lastrm->avail_in;
 +	strm->total_in_lo32 = (uint32_t)(lastrm->total_in & 0xffffffff);
 +	strm->total_in_hi32 = (uint32_t)(lastrm->total_in >> 32);
 +	strm->next_out = (char *)lastrm->next_out;
 +	strm->avail_out = lastrm->avail_out;
 +	strm->total_out_lo32 = (uint32_t)(lastrm->total_out & 0xffffffff);
 +	strm->total_out_hi32 = (uint32_t)(lastrm->total_out >> 32);
 +	r = BZ2_bzCompress(strm,
 +	    (action == ARCHIVE_Z_FINISH)? BZ_FINISH: BZ_RUN);
 +	lastrm->next_in = (const unsigned char *)strm->next_in;
 +	lastrm->avail_in = strm->avail_in;
 +	lastrm->total_in =
 +	    (((uint64_t)(uint32_t)strm->total_in_hi32) << 32)
 +	    + (uint64_t)(uint32_t)strm->total_in_lo32;
 +	lastrm->next_out = (unsigned char *)strm->next_out;
 +	lastrm->avail_out = strm->avail_out;
 +	lastrm->total_out =
 +	    (((uint64_t)(uint32_t)strm->total_out_hi32) << 32)
 +	    + (uint64_t)(uint32_t)strm->total_out_lo32;
 +	switch (r) {
 +	case BZ_RUN_OK:     /* Non-finishing */
 +	case BZ_FINISH_OK:  /* Finishing: There's more work to do */
 +		return (ARCHIVE_OK);
 +	case BZ_STREAM_END: /* Finishing: all done */
 +		/* Only occurs in finishing case */
 +		return (ARCHIVE_EOF);
 +	default:
 +		/* Any other return value indicates an error */
 +		archive_set_error(a, ARCHIVE_ERRNO_MISC,
 +		    "Bzip2 compression failed:"
 +		    " BZ2_bzCompress() call returned status %d", r);
 +		return (ARCHIVE_FATAL);
 +	}
 +}
 +
 +static int
 +compression_end_bzip2(struct archive *a, struct la_zstream *lastrm)
 +{
 +	bz_stream *strm;
 +	int r;
 +
 +	strm = (bz_stream *)lastrm->real_stream;
 +	r = BZ2_bzCompressEnd(strm);
 +	free(strm);
 +	lastrm->real_stream = NULL;
 +	lastrm->valid = 0;
 +	if (r != BZ_OK) {
 +		archive_set_error(a, ARCHIVE_ERRNO_MISC,
 +		    "Failed to clean up compressor");
 +		return (ARCHIVE_FATAL);
 +	}
 +	return (ARCHIVE_OK);
 +}
 +
 +#else
 +static int
 +compression_init_encoder_bzip2(struct archive *a,
 +    struct la_zstream *lastrm, int level)
 +{
 +
 +	(void) level; /* UNUSED */
 +	if (lastrm->valid)
 +		compression_end(a, lastrm);
 +	return (compression_unsupported_encoder(a, lastrm, "bzip2"));
 +}
 +#endif
 +
 +#if defined(HAVE_LZMA_H)
 +static int
 +compression_init_encoder_lzma(struct archive *a,
 +    struct la_zstream *lastrm, int level)
 +{
 +	static const lzma_stream lzma_init_data = LZMA_STREAM_INIT;
 +	lzma_stream *strm;
 +	lzma_options_lzma lzma_opt;
 +	int r;
 +
 +	if (lastrm->valid)
 +		compression_end(a, lastrm);
 +	if (lzma_lzma_preset(&lzma_opt, level)) {
 +		lastrm->real_stream = NULL;
 +		archive_set_error(a, ENOMEM,
 +		    "Internal error initializing compression library");
 +		return (ARCHIVE_FATAL);
 +	}
 +	strm = calloc(1, sizeof(*strm));
 +	if (strm == NULL) {
 +		archive_set_error(a, ENOMEM,
 +		    "Can't allocate memory for lzma stream");
 +		return (ARCHIVE_FATAL);
 +	}
 +	*strm = lzma_init_data;
 +	r = lzma_alone_encoder(strm, &lzma_opt);
 +	switch (r) {
 +	case LZMA_OK:
 +		lastrm->real_stream = strm;
 +		lastrm->valid = 1;
 +		lastrm->code = compression_code_lzma;
 +		lastrm->end = compression_end_lzma;
 +		r = ARCHIVE_OK;
 +		break;
 +	case LZMA_MEM_ERROR:
 +		free(strm);
 +		lastrm->real_stream = NULL;
 +		archive_set_error(a, ENOMEM,
 +		    "Internal error initializing compression library: "
 +		    "Cannot allocate memory");
 +		r =  ARCHIVE_FATAL;
 +		break;
 +        default:
 +		free(strm);
 +		lastrm->real_stream = NULL;
 +		archive_set_error(a, ARCHIVE_ERRNO_MISC,
 +		    "Internal error initializing compression library: "
 +		    "It's a bug in liblzma");
 +		r =  ARCHIVE_FATAL;
 +		break;
 +	}
 +	return (r);
 +}
 +
 +static int
 +compression_init_encoder_xz(struct archive *a,
 +    struct la_zstream *lastrm, int level, int threads)
 +{
 +	static const lzma_stream lzma_init_data = LZMA_STREAM_INIT;
 +	lzma_stream *strm;
 +	lzma_filter *lzmafilters;
 +	lzma_options_lzma lzma_opt;
 +	int r;
 +#ifdef HAVE_LZMA_STREAM_ENCODER_MT
 +	lzma_mt mt_options;
 +#endif
 +
 +	(void)threads; /* UNUSED (if multi-threaded LZMA library not avail) */
 +
 +	if (lastrm->valid)
 +		compression_end(a, lastrm);
 +	strm = calloc(1, sizeof(*strm) + sizeof(*lzmafilters) * 2);
 +	if (strm == NULL) {
 +		archive_set_error(a, ENOMEM,
 +		    "Can't allocate memory for xz stream");
 +		return (ARCHIVE_FATAL);
 +	}
 +	lzmafilters = (lzma_filter *)(strm+1);
 +	if (level > 6)
 +		level = 6;
 +	if (lzma_lzma_preset(&lzma_opt, level)) {
 +		free(strm);
 +		lastrm->real_stream = NULL;
 +		archive_set_error(a, ENOMEM,
 +		    "Internal error initializing compression library");
 +		return (ARCHIVE_FATAL);
 +	}
 +	lzmafilters[0].id = LZMA_FILTER_LZMA2;
 +	lzmafilters[0].options = &lzma_opt;
 +	lzmafilters[1].id = LZMA_VLI_UNKNOWN;/* Terminate */
 +
 +	*strm = lzma_init_data;
 +#ifdef HAVE_LZMA_STREAM_ENCODER_MT
 +	if (threads > 1) {
- 		bzero(&mt_options, sizeof(mt_options));
++		memset(&mt_options, 0, sizeof(mt_options));
 +		mt_options.threads = threads;
 +		mt_options.timeout = 300;
 +		mt_options.filters = lzmafilters;
 +		mt_options.check = LZMA_CHECK_CRC64;
 +		r = lzma_stream_encoder_mt(strm, &mt_options);
 +	} else
 +#endif
 +		r = lzma_stream_encoder(strm, lzmafilters, LZMA_CHECK_CRC64);
 +	switch (r) {
 +	case LZMA_OK:
 +		lastrm->real_stream = strm;
 +		lastrm->valid = 1;
 +		lastrm->code = compression_code_lzma;
 +		lastrm->end = compression_end_lzma;
 +		r = ARCHIVE_OK;
 +		break;
 +	case LZMA_MEM_ERROR:
 +		free(strm);
 +		lastrm->real_stream = NULL;
 +		archive_set_error(a, ENOMEM,
 +		    "Internal error initializing compression library: "
 +		    "Cannot allocate memory");
 +		r =  ARCHIVE_FATAL;
 +		break;
 +        default:
 +		free(strm);
 +		lastrm->real_stream = NULL;
 +		archive_set_error(a, ARCHIVE_ERRNO_MISC,
 +		    "Internal error initializing compression library: "
 +		    "It's a bug in liblzma");
 +		r =  ARCHIVE_FATAL;
 +		break;
 +	}
 +	return (r);
 +}
 +
 +static int
 +compression_code_lzma(struct archive *a,
 +    struct la_zstream *lastrm, enum la_zaction action)
 +{
 +	lzma_stream *strm;
 +	int r;
 +
 +	strm = (lzma_stream *)lastrm->real_stream;
 +	strm->next_in = lastrm->next_in;
 +	strm->avail_in = lastrm->avail_in;
 +	strm->total_in = lastrm->total_in;
 +	strm->next_out = lastrm->next_out;
 +	strm->avail_out = lastrm->avail_out;
 +	strm->total_out = lastrm->total_out;
 +	r = lzma_code(strm,
 +	    (action == ARCHIVE_Z_FINISH)? LZMA_FINISH: LZMA_RUN);
 +	lastrm->next_in = strm->next_in;
 +	lastrm->avail_in = strm->avail_in;
 +	lastrm->total_in = strm->total_in;
 +	lastrm->next_out = strm->next_out;
 +	lastrm->avail_out = strm->avail_out;
 +	lastrm->total_out = strm->total_out;
 +	switch (r) {
 +	case LZMA_OK:
 +		/* Non-finishing case */
 +		return (ARCHIVE_OK);
 +	case LZMA_STREAM_END:
 +		/* This return can only occur in finishing case. */
 +		return (ARCHIVE_EOF);
 +	case LZMA_MEMLIMIT_ERROR:
 +		archive_set_error(a, ENOMEM,
 +		    "lzma compression error:"
 +		    " %ju MiB would have been needed",
 +		    (uintmax_t)((lzma_memusage(strm) + 1024 * 1024 -1)
 +			/ (1024 * 1024)));
 +		return (ARCHIVE_FATAL);
 +	default:
 +		/* Any other return value indicates an error */
 +		archive_set_error(a, ARCHIVE_ERRNO_MISC,
 +		    "lzma compression failed:"
 +		    " lzma_code() call returned status %d", r);
 +		return (ARCHIVE_FATAL);
 +	}
 +}
 +
 +static int
 +compression_end_lzma(struct archive *a, struct la_zstream *lastrm)
 +{
 +	lzma_stream *strm;
 +
 +	(void)a; /* UNUSED */
 +	strm = (lzma_stream *)lastrm->real_stream;
 +	lzma_end(strm);
 +	free(strm);
 +	lastrm->valid = 0;
 +	lastrm->real_stream = NULL;
 +	return (ARCHIVE_OK);
 +}
 +#else
 +static int
 +compression_init_encoder_lzma(struct archive *a,
 +    struct la_zstream *lastrm, int level)
 +{
 +
 +	(void) level; /* UNUSED */
 +	if (lastrm->valid)
 +		compression_end(a, lastrm);
 +	return (compression_unsupported_encoder(a, lastrm, "lzma"));
 +}
 +static int
 +compression_init_encoder_xz(struct archive *a,
 +    struct la_zstream *lastrm, int level, int threads)
 +{
 +
 +	(void) level; /* UNUSED */
 +	(void) threads; /* UNUSED */
 +	if (lastrm->valid)
 +		compression_end(a, lastrm);
 +	return (compression_unsupported_encoder(a, lastrm, "xz"));
 +}
 +#endif
 +
 +static int
 +xar_compression_init_encoder(struct archive_write *a)
 +{
 +	struct xar *xar;
 +	int r;
 +
 +	xar = (struct xar *)a->format_data;
 +	switch (xar->opt_compression) {
 +	case GZIP:
 +		r = compression_init_encoder_gzip(
 +		    &(a->archive), &(xar->stream),
 +		    xar->opt_compression_level, 1);
 +		break;
 +	case BZIP2:
 +		r = compression_init_encoder_bzip2(
 +		    &(a->archive), &(xar->stream),
 +		    xar->opt_compression_level);
 +		break;
 +	case LZMA:
 +		r = compression_init_encoder_lzma(
 +		    &(a->archive), &(xar->stream),
 +		    xar->opt_compression_level);
 +		break;
 +	case XZ:
 +		r = compression_init_encoder_xz(
 +		    &(a->archive), &(xar->stream),
 +		    xar->opt_compression_level, xar->opt_threads);
 +		break;
 +	default:
 +		r = ARCHIVE_OK;
 +		break;
 +	}
 +	if (r == ARCHIVE_OK) {
 +		xar->stream.total_in = 0;
 +		xar->stream.next_out = xar->wbuff;
 +		xar->stream.avail_out = sizeof(xar->wbuff);
 +		xar->stream.total_out = 0;
 +	}
 +
 +	return (r);
 +}
 +
 +static int
 +compression_code(struct archive *a, struct la_zstream *lastrm,
 +    enum la_zaction action)
 +{
 +	if (lastrm->valid)
 +		return (lastrm->code(a, lastrm, action));
 +	return (ARCHIVE_OK);
 +}
 +
 +static int
 +compression_end(struct archive *a, struct la_zstream *lastrm)
 +{
 +	if (lastrm->valid)
 +		return (lastrm->end(a, lastrm));
 +	return (ARCHIVE_OK);
 +}
 +
 +
 +static int
 +save_xattrs(struct archive_write *a, struct file *file)
 +{
 +	struct xar *xar;
 +	const char *name;
 +	const void *value;
 +	struct heap_data *heap;
 +	size_t size;
 +	int count, r;
 +
 +	xar = (struct xar *)a->format_data;
 +	count = archive_entry_xattr_reset(file->entry);
 +	if (count == 0)
 +		return (ARCHIVE_OK);
 +	while (count--) {
 +		archive_entry_xattr_next(file->entry,
 +		    &name, &value, &size);
 +		checksum_init(&(xar->a_sumwrk), xar->opt_sumalg);
 +		checksum_init(&(xar->e_sumwrk), xar->opt_sumalg);
 +
 +		heap = calloc(1, sizeof(*heap));
 +		if (heap == NULL) {
 +			archive_set_error(&a->archive, ENOMEM,
 +			    "Can't allocate memory for xattr");
 +			return (ARCHIVE_FATAL);
 +		}
 +		heap->id = file->ea_idx++;
 +		heap->temp_offset = xar->temp_offset;
 +		heap->size = size;/* save a extracted size */
 +		heap->compression = xar->opt_compression;
 +		/* Get a extracted sumcheck value. */
 +		checksum_update(&(xar->e_sumwrk), value, size);
 +		checksum_final(&(xar->e_sumwrk), &(heap->e_sum));
 +
 +		/*
 +		 * Not compression to xattr is simple way.
 +		 */
 +		if (heap->compression == NONE) {
 +			checksum_update(&(xar->a_sumwrk), value, size);
 +			checksum_final(&(xar->a_sumwrk), &(heap->a_sum));
 +			if (write_to_temp(a, value, size)
 +			    != ARCHIVE_OK) {
 +				free(heap);
 +				return (ARCHIVE_FATAL);
 +			}
 +			heap->length = size;
 +			/* Add heap to the tail of file->xattr. */
 +			heap->next = NULL;
 +			*file->xattr.last = heap;
 +			file->xattr.last = &(heap->next);
 +			/* Next xattr */
 +			continue;
 +		}
 +
 +		/*
 +		 * Init compression library.
 +		 */
 +		r = xar_compression_init_encoder(a);
 +		if (r != ARCHIVE_OK) {
 +			free(heap);
 +			return (ARCHIVE_FATAL);
 +		}
 +
 +		xar->stream.next_in = (const unsigned char *)value;
 +		xar->stream.avail_in = size;
 +		for (;;) {
 +			r = compression_code(&(a->archive),
 +			    &(xar->stream), ARCHIVE_Z_FINISH);
 +			if (r != ARCHIVE_OK && r != ARCHIVE_EOF) {
 +				free(heap);
 +				return (ARCHIVE_FATAL);
 +			}
 +			size = sizeof(xar->wbuff) - xar->stream.avail_out;
 +			checksum_update(&(xar->a_sumwrk),
 +			    xar->wbuff, size);
 +			if (write_to_temp(a, xar->wbuff, size)
 +			    != ARCHIVE_OK)
 +				return (ARCHIVE_FATAL);
 +			if (r == ARCHIVE_OK) {
 +				xar->stream.next_out = xar->wbuff;
 +				xar->stream.avail_out = sizeof(xar->wbuff);
 +			} else {
 +				checksum_final(&(xar->a_sumwrk),
 +				    &(heap->a_sum));
 +				heap->length = xar->stream.total_out;
 +				/* Add heap to the tail of file->xattr. */
 +				heap->next = NULL;
 +				*file->xattr.last = heap;
 +				file->xattr.last = &(heap->next);
 +				break;
 +			}
 +		}
 +		/* Clean up compression library. */
 +		r = compression_end(&(a->archive), &(xar->stream));
 +		if (r != ARCHIVE_OK)
 +			return (ARCHIVE_FATAL);
 +	}
 +	return (ARCHIVE_OK);
 +}
 +
 +static int
 +getalgsize(enum sumalg sumalg)
 +{
 +	switch (sumalg) {
 +	default:
 +	case CKSUM_NONE:
 +		return (0);
 +	case CKSUM_SHA1:
 +		return (SHA1_SIZE);
 +	case CKSUM_MD5:
 +		return (MD5_SIZE);
 +	}
 +}
 +
 +static const char *
 +getalgname(enum sumalg sumalg)
 +{
 +	switch (sumalg) {
 +	default:
 +	case CKSUM_NONE:
 +		return (NULL);
 +	case CKSUM_SHA1:
 +		return (SHA1_NAME);
 +	case CKSUM_MD5:
 +		return (MD5_NAME);
 +	}
 +}
 +
 +#endif /* Support xar format */
diff --cc Utilities/cmlibarchive/libarchive/archive_write_set_format_zip.c
index 0b2c69b,0000000..a4ae229
mode 100644,000000..100644
--- a/Utilities/cmlibarchive/libarchive/archive_write_set_format_zip.c
+++ b/Utilities/cmlibarchive/libarchive/archive_write_set_format_zip.c
@@@ -1,1678 -1,0 +1,1678 @@@
 +/*-
 + * Copyright (c) 2008 Anselm Strauss
 + * Copyright (c) 2009 Joerg Sonnenberger
 + * Copyright (c) 2011-2012,2014 Michihiro NAKAJIMA
 + * All rights reserved.
 + *
 + * Redistribution and use in source and binary forms, with or without
 + * modification, are permitted provided that the following conditions
 + * are met:
 + * 1. Redistributions of source code must retain the above copyright
 + *    notice, this list of conditions and the following disclaimer.
 + * 2. Redistributions in binary form must reproduce the above copyright
 + *    notice, this list of conditions and the following disclaimer in the
 + *    documentation and/or other materials provided with the distribution.
 + *
 + * THIS SOFTWARE IS PROVIDED BY THE AUTHOR(S) ``AS IS'' AND ANY EXPRESS OR
 + * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
 + * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
 + * IN NO EVENT SHALL THE AUTHOR(S) BE LIABLE FOR ANY DIRECT, INDIRECT,
 + * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
 + * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
 + * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
 + * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
 + * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
 + * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
 + */
 +
 +/*
 + * Development supported by Google Summer of Code 2008.
 + */
 +
 +#include "archive_platform.h"
 +__FBSDID("$FreeBSD: head/lib/libarchive/archive_write_set_format_zip.c 201168 2009-12-29 06:15:32Z kientzle $");
 +
 +#ifdef HAVE_ERRNO_H
 +#include <errno.h>
 +#endif
 +#ifdef HAVE_LANGINFO_H
 +#include <langinfo.h>
 +#endif
 +#ifdef HAVE_STDLIB_H
 +#include <stdlib.h>
 +#endif
 +#ifdef HAVE_STRING_H
 +#include <string.h>
 +#endif
 +#ifdef HAVE_ZLIB_H
 +#include <cm_zlib.h>
 +#endif
 +
 +#include "archive.h"
 +#include "archive_cryptor_private.h"
 +#include "archive_endian.h"
 +#include "archive_entry.h"
 +#include "archive_entry_locale.h"
 +#include "archive_hmac_private.h"
 +#include "archive_private.h"
 +#include "archive_random_private.h"
 +#include "archive_write_private.h"
 +
 +#ifndef HAVE_ZLIB_H
 +#include "archive_crc32.h"
 +#endif
 +
 +#define ZIP_ENTRY_FLAG_ENCRYPTED	(1<<0)
 +#define ZIP_ENTRY_FLAG_LENGTH_AT_END	(1<<3)
 +#define ZIP_ENTRY_FLAG_UTF8_NAME	(1 << 11)
 +
 +#define ZIP_4GB_MAX ARCHIVE_LITERAL_LL(0xffffffff)
 +#define ZIP_4GB_MAX_UNCOMPRESSED ARCHIVE_LITERAL_LL(0xff000000)
 +
 +enum compression {
 +	COMPRESSION_UNSPECIFIED = -1,
 +	COMPRESSION_STORE = 0,
 +	COMPRESSION_DEFLATE = 8
 +};
 +
 +#ifdef HAVE_ZLIB_H
 +#define COMPRESSION_DEFAULT	COMPRESSION_DEFLATE
 +#else
 +#define COMPRESSION_DEFAULT	COMPRESSION_STORE
 +#endif
 +
 +enum encryption {
 +	ENCRYPTION_NONE	= 0,
 +	ENCRYPTION_TRADITIONAL, /* Traditional PKWARE encryption. */
 +	ENCRYPTION_WINZIP_AES128, /* WinZIP AES-128 encryption. */
 +	ENCRYPTION_WINZIP_AES256, /* WinZIP AES-256 encryption. */
 +};
 +
 +#define TRAD_HEADER_SIZE	12
 +/*
 + * See "WinZip - AES Encryption Information"
 + *     http://www.winzip.com/aes_info.htm
 + */
 +/* Value used in compression method. */
 +#define WINZIP_AES_ENCRYPTION	99
 +/* A WinZip AES header size which is stored at the beginning of
 + * file contents. */
 +#define WINZIP_AES128_HEADER_SIZE	(8 + 2)
 +#define WINZIP_AES256_HEADER_SIZE	(16 + 2)
 +/* AES vendor version. */
 +#define AES_VENDOR_AE_1 0x0001
 +#define AES_VENDOR_AE_2 0x0002
 +/* Authentication code size. */
 +#define AUTH_CODE_SIZE		10
 +/**/
 +#define MAX_DERIVED_KEY_BUF_SIZE (AES_MAX_KEY_SIZE * 2 + 2)
 +
 +struct cd_segment {
 +	struct cd_segment *next;
 +	size_t buff_size;
 +	unsigned char *buff;
 +	unsigned char *p;
 +};
 +
 +struct trad_enc_ctx {
 +	uint32_t keys[3];
 +};
 +
 +struct zip {
 +
 +	int64_t entry_offset;
 +	int64_t entry_compressed_size;
 +	int64_t entry_uncompressed_size;
 +	int64_t entry_compressed_written;
 +	int64_t entry_uncompressed_written;
 +	int64_t entry_uncompressed_limit;
 +	struct archive_entry *entry;
 +	uint32_t entry_crc32;
 +	enum compression entry_compression;
 +	enum encryption  entry_encryption;
 +	int entry_flags;
 +	int entry_uses_zip64;
 +	int experiments;
 +	struct trad_enc_ctx tctx;
 +	char tctx_valid;
 +	unsigned char trad_chkdat;
 +	unsigned aes_vendor;
 +	archive_crypto_ctx cctx;
 +	char cctx_valid;
 +	archive_hmac_sha1_ctx hctx;
 +	char hctx_valid;
 +
 +	unsigned char *file_header;
 +	size_t file_header_extra_offset;
 +	unsigned long (*crc32func)(unsigned long crc, const void *buff, size_t len);
 +
 +	struct cd_segment *central_directory;
 +	struct cd_segment *central_directory_last;
 +	size_t central_directory_bytes;
 +	size_t central_directory_entries;
 +
 +	int64_t written_bytes; /* Overall position in file. */
 +
 +	struct archive_string_conv *opt_sconv;
 +	struct archive_string_conv *sconv_default;
 +	enum compression requested_compression;
 +	int deflate_compression_level;
 +	int init_default_conversion;
 +	enum encryption  encryption_type;
 +
 +#define ZIP_FLAG_AVOID_ZIP64 1
 +#define ZIP_FLAG_FORCE_ZIP64 2
 +#define ZIP_FLAG_EXPERIMENT_xl 4
 +	int flags;
 +
 +#ifdef HAVE_ZLIB_H
 +	z_stream stream;
 +#endif
 +	size_t len_buf;
 +	unsigned char *buf;
 +};
 +
 +/* Don't call this min or MIN, since those are already defined
 +   on lots of platforms (but not all). */
 +#define zipmin(a, b) ((a) > (b) ? (b) : (a))
 +
 +static ssize_t archive_write_zip_data(struct archive_write *,
 +		   const void *buff, size_t s);
 +static int archive_write_zip_close(struct archive_write *);
 +static int archive_write_zip_free(struct archive_write *);
 +static int archive_write_zip_finish_entry(struct archive_write *);
 +static int archive_write_zip_header(struct archive_write *,
 +	      struct archive_entry *);
 +static int archive_write_zip_options(struct archive_write *,
 +	      const char *, const char *);
 +static unsigned int dos_time(const time_t);
 +static size_t path_length(struct archive_entry *);
 +static int write_path(struct archive_entry *, struct archive_write *);
 +static void copy_path(struct archive_entry *, unsigned char *);
 +static struct archive_string_conv *get_sconv(struct archive_write *, struct zip *);
 +static int trad_enc_init(struct trad_enc_ctx *, const char *, size_t);
 +static unsigned trad_enc_encrypt_update(struct trad_enc_ctx *, const uint8_t *,
 +    size_t, uint8_t *, size_t);
 +static int init_traditional_pkware_encryption(struct archive_write *);
 +static int is_traditional_pkware_encryption_supported(void);
 +static int init_winzip_aes_encryption(struct archive_write *);
 +static int is_winzip_aes_encryption_supported(int encryption);
 +
 +static unsigned char *
 +cd_alloc(struct zip *zip, size_t length)
 +{
 +	unsigned char *p;
 +
 +	if (zip->central_directory == NULL
 +	    || (zip->central_directory_last->p + length
 +		> zip->central_directory_last->buff + zip->central_directory_last->buff_size)) {
 +		struct cd_segment *segment = calloc(1, sizeof(*segment));
 +		if (segment == NULL)
 +			return NULL;
 +		segment->buff_size = 64 * 1024;
 +		segment->buff = malloc(segment->buff_size);
 +		if (segment->buff == NULL) {
 +			free(segment);
 +			return NULL;
 +		}
 +		segment->p = segment->buff;
 +
 +		if (zip->central_directory == NULL) {
 +			zip->central_directory
 +			    = zip->central_directory_last
 +			    = segment;
 +		} else {
 +			zip->central_directory_last->next = segment;
 +			zip->central_directory_last = segment;
 +		}
 +	}
 +
 +	p = zip->central_directory_last->p;
 +	zip->central_directory_last->p += length;
 +	zip->central_directory_bytes += length;
 +	return (p);
 +}
 +
 +static unsigned long
 +real_crc32(unsigned long crc, const void *buff, size_t len)
 +{
 +	return crc32(crc, buff, (unsigned int)len);
 +}
 +
 +static unsigned long
 +fake_crc32(unsigned long crc, const void *buff, size_t len)
 +{
 +	(void)crc; /* UNUSED */
 +	(void)buff; /* UNUSED */
 +	(void)len; /* UNUSED */
 +	return 0;
 +}
 +
 +static int
 +archive_write_zip_options(struct archive_write *a, const char *key,
 +    const char *val)
 +{
 +	struct zip *zip = a->format_data;
 +	int ret = ARCHIVE_FAILED;
 +
 +	if (strcmp(key, "compression") == 0) {
 +		/*
 +		 * Set compression to use on all future entries.
 +		 * This only affects regular files.
 +		 */
 +		if (val == NULL || val[0] == 0) {
 +			archive_set_error(&a->archive, ARCHIVE_ERRNO_MISC,
 +			    "%s: compression option needs a compression name",
 +			    a->format_name);
 +		} else if (strcmp(val, "deflate") == 0) {
 +#ifdef HAVE_ZLIB_H
 +			zip->requested_compression = COMPRESSION_DEFLATE;
 +			ret = ARCHIVE_OK;
 +#else
 +			archive_set_error(&a->archive, ARCHIVE_ERRNO_MISC,
 +			    "deflate compression not supported");
 +#endif
 +		} else if (strcmp(val, "store") == 0) {
 +			zip->requested_compression = COMPRESSION_STORE;
 +			ret = ARCHIVE_OK;
 +		}
 +		return (ret);
 +	} else if (strcmp(key, "compression-level") == 0) {
 +		if (val == NULL || !(val[0] >= '0' && val[0] <= '9') || val[1] != '\0') {
 +			return ARCHIVE_WARN;
 +		}
 +
 +		if (val[0] == '0') {
 +			zip->requested_compression = COMPRESSION_STORE;
 +			return ARCHIVE_OK;
 +		} else {
 +#ifdef HAVE_ZLIB_H
 +			zip->requested_compression = COMPRESSION_DEFLATE;
 +			zip->deflate_compression_level = val[0] - '0';
 +			return ARCHIVE_OK;
 +#else
 +			archive_set_error(&a->archive, ARCHIVE_ERRNO_MISC,
 +			    "deflate compression not supported");
 +#endif
 +		}
 +	} else if (strcmp(key, "encryption") == 0) {
 +		if (val == NULL) {
 +			zip->encryption_type = ENCRYPTION_NONE;
 +			ret = ARCHIVE_OK;
 +		} else if (val[0] == '1' || strcmp(val, "traditional") == 0
 +		    || strcmp(val, "zipcrypt") == 0
 +		    || strcmp(val, "ZipCrypt") == 0) {
 +			if (is_traditional_pkware_encryption_supported()) {
 +				zip->encryption_type = ENCRYPTION_TRADITIONAL;
 +				ret = ARCHIVE_OK;
 +			} else {
 +				archive_set_error(&a->archive,
 +				    ARCHIVE_ERRNO_MISC,
 +				    "encryption not supported");
 +			}
 +		} else if (strcmp(val, "aes128") == 0) {
 +			if (is_winzip_aes_encryption_supported(
 +			    ENCRYPTION_WINZIP_AES128)) {
 +				zip->encryption_type = ENCRYPTION_WINZIP_AES128;
 +				ret = ARCHIVE_OK;
 +			} else {
 +				archive_set_error(&a->archive,
 +				    ARCHIVE_ERRNO_MISC,
 +				    "encryption not supported");
 +			}
 +		} else if (strcmp(val, "aes256") == 0) {
 +			if (is_winzip_aes_encryption_supported(
 +			    ENCRYPTION_WINZIP_AES256)) {
 +				zip->encryption_type = ENCRYPTION_WINZIP_AES256;
 +				ret = ARCHIVE_OK;
 +			} else {
 +				archive_set_error(&a->archive,
 +				    ARCHIVE_ERRNO_MISC,
 +				    "encryption not supported");
 +			}
 +		} else {
 +			archive_set_error(&a->archive, ARCHIVE_ERRNO_MISC,
 +			    "%s: unknown encryption '%s'",
 +			    a->format_name, val);
 +		}
 +		return (ret);
 +	} else if (strcmp(key, "experimental") == 0) {
 +		if (val == NULL || val[0] == 0) {
 +			zip->flags &= ~ ZIP_FLAG_EXPERIMENT_xl;
 +		} else {
 +			zip->flags |= ZIP_FLAG_EXPERIMENT_xl;
 +		}
 +		return (ARCHIVE_OK);
 +	} else if (strcmp(key, "fakecrc32") == 0) {
 +		/*
 +		 * FOR TESTING ONLY:  disable CRC calculation to speed up
 +		 * certain complex tests.
 +		 */
 +		if (val == NULL || val[0] == 0) {
 +			zip->crc32func = real_crc32;
 +		} else {
 +			zip->crc32func = fake_crc32;
 +		}
 +		return (ARCHIVE_OK);
 +	} else if (strcmp(key, "hdrcharset")  == 0) {
 +		/*
 +		 * Set the character set used in translating filenames.
 +		 */
 +		if (val == NULL || val[0] == 0) {
 +			archive_set_error(&a->archive, ARCHIVE_ERRNO_MISC,
 +			    "%s: hdrcharset option needs a character-set name",
 +			    a->format_name);
 +		} else {
 +			zip->opt_sconv = archive_string_conversion_to_charset(
 +			    &a->archive, val, 0);
 +			if (zip->opt_sconv != NULL)
 +				ret = ARCHIVE_OK;
 +			else
 +				ret = ARCHIVE_FATAL;
 +		}
 +		return (ret);
 +	} else if (strcmp(key, "zip64") == 0) {
 +		/*
 +		 * Bias decisions about Zip64: force them to be
 +		 * generated in certain cases where they are not
 +		 * forbidden or avoid them in certain cases where they
 +		 * are not strictly required.
 +		 */
 +		if (val != NULL && *val != '\0') {
 +			zip->flags |= ZIP_FLAG_FORCE_ZIP64;
 +			zip->flags &= ~ZIP_FLAG_AVOID_ZIP64;
 +		} else {
 +			zip->flags &= ~ZIP_FLAG_FORCE_ZIP64;
 +			zip->flags |= ZIP_FLAG_AVOID_ZIP64;
 +		}
 +		return (ARCHIVE_OK);
 +	}
 +
 +	/* Note: The "warn" return is just to inform the options
 +	 * supervisor that we didn't handle it.  It will generate
 +	 * a suitable error if no one used this option. */
 +	return (ARCHIVE_WARN);
 +}
 +
 +int
 +archive_write_zip_set_compression_deflate(struct archive *_a)
 +{
 +	struct archive_write *a = (struct archive_write *)_a;
 +	int ret = ARCHIVE_FAILED;
 +
 +	archive_check_magic(_a, ARCHIVE_WRITE_MAGIC,
 +		ARCHIVE_STATE_NEW | ARCHIVE_STATE_HEADER | ARCHIVE_STATE_DATA,
 +		"archive_write_zip_set_compression_deflate");
 +	if (a->archive.archive_format != ARCHIVE_FORMAT_ZIP) {
 +		archive_set_error(&a->archive, ARCHIVE_ERRNO_MISC,
 +		"Can only use archive_write_zip_set_compression_deflate"
 +		" with zip format");
 +		ret = ARCHIVE_FATAL;
 +	} else {
 +#ifdef HAVE_ZLIB_H
 +		struct zip *zip = a->format_data;
 +		zip->requested_compression = COMPRESSION_DEFLATE;
 +		ret = ARCHIVE_OK;
 +#else
 +		archive_set_error(&a->archive, ARCHIVE_ERRNO_MISC,
 +			"deflate compression not supported");
 +		ret = ARCHIVE_FAILED;
 +#endif
 +	}
 +	return (ret);
 +}
 +
 +int
 +archive_write_zip_set_compression_store(struct archive *_a)
 +{
 +	struct archive_write *a = (struct archive_write *)_a;
 +	struct zip *zip = a->format_data;
 +	int ret = ARCHIVE_FAILED;
 +
 +	archive_check_magic(_a, ARCHIVE_WRITE_MAGIC,
 +		ARCHIVE_STATE_NEW | ARCHIVE_STATE_HEADER | ARCHIVE_STATE_DATA,
 +		"archive_write_zip_set_compression_deflate");
 +	if (a->archive.archive_format != ARCHIVE_FORMAT_ZIP) {
 +		archive_set_error(&a->archive, ARCHIVE_ERRNO_MISC,
 +			"Can only use archive_write_zip_set_compression_store"
 +			" with zip format");
 +		ret = ARCHIVE_FATAL;
 +	} else {
 +		zip->requested_compression = COMPRESSION_STORE;
 +		ret = ARCHIVE_OK;
 +	}
 +	return (ret);
 +}
 +
 +int
 +archive_write_set_format_zip(struct archive *_a)
 +{
 +	struct archive_write *a = (struct archive_write *)_a;
 +	struct zip *zip;
 +
 +	archive_check_magic(_a, ARCHIVE_WRITE_MAGIC,
 +	    ARCHIVE_STATE_NEW, "archive_write_set_format_zip");
 +
 +	/* If another format was already registered, unregister it. */
 +	if (a->format_free != NULL)
 +		(a->format_free)(a);
 +
 +	zip = (struct zip *) calloc(1, sizeof(*zip));
 +	if (zip == NULL) {
 +		archive_set_error(&a->archive, ENOMEM,
 +		    "Can't allocate zip data");
 +		return (ARCHIVE_FATAL);
 +	}
 +
 +	/* "Unspecified" lets us choose the appropriate compression. */
 +	zip->requested_compression = COMPRESSION_UNSPECIFIED;
 +#ifdef HAVE_ZLIB_H
 +	zip->deflate_compression_level = Z_DEFAULT_COMPRESSION;
 +#endif
 +	zip->crc32func = real_crc32;
 +
 +	/* A buffer used for both compression and encryption. */
 +	zip->len_buf = 65536;
 +	zip->buf = malloc(zip->len_buf);
 +	if (zip->buf == NULL) {
 +		free(zip);
 +		archive_set_error(&a->archive, ENOMEM,
 +		    "Can't allocate compression buffer");
 +		return (ARCHIVE_FATAL);
 +	}
 +
 +	a->format_data = zip;
 +	a->format_name = "zip";
 +	a->format_options = archive_write_zip_options;
 +	a->format_write_header = archive_write_zip_header;
 +	a->format_write_data = archive_write_zip_data;
 +	a->format_finish_entry = archive_write_zip_finish_entry;
 +	a->format_close = archive_write_zip_close;
 +	a->format_free = archive_write_zip_free;
 +	a->archive.archive_format = ARCHIVE_FORMAT_ZIP;
 +	a->archive.archive_format_name = "ZIP";
 +
 +	return (ARCHIVE_OK);
 +}
 +
 +static int
 +is_all_ascii(const char *p)
 +{
 +	const unsigned char *pp = (const unsigned char *)p;
 +
 +	while (*pp) {
 +		if (*pp++ > 127)
 +			return (0);
 +	}
 +	return (1);
 +}
 +
 +static int
 +archive_write_zip_header(struct archive_write *a, struct archive_entry *entry)
 +{
 +	unsigned char local_header[32];
 +	unsigned char local_extra[144];
 +	struct zip *zip = a->format_data;
 +	unsigned char *e;
 +	unsigned char *cd_extra;
 +	size_t filename_length;
 +	const char *slink = NULL;
 +	size_t slink_size = 0;
 +	struct archive_string_conv *sconv = get_sconv(a, zip);
 +	int ret, ret2 = ARCHIVE_OK;
 +	mode_t type;
 +	int version_needed = 10;
 +
 +	/* Ignore types of entries that we don't support. */
 +	type = archive_entry_filetype(entry);
 +	if (type != AE_IFREG && type != AE_IFDIR && type != AE_IFLNK) {
 +		archive_set_error(&a->archive, ARCHIVE_ERRNO_MISC,
 +		    "Filetype not supported");
 +		return ARCHIVE_FAILED;
 +	};
 +
 +	/* If we're not using Zip64, reject large files. */
 +	if (zip->flags & ZIP_FLAG_AVOID_ZIP64) {
 +		/* Reject entries over 4GB. */
 +		if (archive_entry_size_is_set(entry)
 +		    && (archive_entry_size(entry) > ZIP_4GB_MAX)) {
 +			archive_set_error(&a->archive, ARCHIVE_ERRNO_MISC,
 +			    "Files > 4GB require Zip64 extensions");
 +			return ARCHIVE_FAILED;
 +		}
 +		/* Reject entries if archive is > 4GB. */
 +		if (zip->written_bytes > ZIP_4GB_MAX) {
 +			archive_set_error(&a->archive, ARCHIVE_ERRNO_MISC,
 +			    "Archives > 4GB require Zip64 extensions");
 +			return ARCHIVE_FAILED;
 +		}
 +	}
 +
 +	/* Only regular files can have size > 0. */
 +	if (type != AE_IFREG)
 +		archive_entry_set_size(entry, 0);
 +
 +
 +	/* Reset information from last entry. */
 +	zip->entry_offset = zip->written_bytes;
 +	zip->entry_uncompressed_limit = INT64_MAX;
 +	zip->entry_compressed_size = 0;
 +	zip->entry_uncompressed_size = 0;
 +	zip->entry_compressed_written = 0;
 +	zip->entry_uncompressed_written = 0;
 +	zip->entry_flags = 0;
 +	zip->entry_uses_zip64 = 0;
 +	zip->entry_crc32 = zip->crc32func(0, NULL, 0);
 +	zip->entry_encryption = 0;
 +	if (zip->entry != NULL) {
 +		archive_entry_free(zip->entry);
 +		zip->entry = NULL;
 +	}
 +
 +	if (zip->cctx_valid)
 +		archive_encrypto_aes_ctr_release(&zip->cctx);
 +	if (zip->hctx_valid)
 +		archive_hmac_sha1_cleanup(&zip->hctx);
 +	zip->tctx_valid = zip->cctx_valid = zip->hctx_valid = 0;
 +
 +	if (type == AE_IFREG
 +		    &&(!archive_entry_size_is_set(entry)
 +			|| archive_entry_size(entry) > 0)) {
 +		switch (zip->encryption_type) {
 +		case ENCRYPTION_TRADITIONAL:
 +		case ENCRYPTION_WINZIP_AES128:
 +		case ENCRYPTION_WINZIP_AES256:
 +			zip->entry_flags |= ZIP_ENTRY_FLAG_ENCRYPTED;
 +			zip->entry_encryption = zip->encryption_type;
 +			break;
 +		default:
 +			break;
 +		}
 +	}
 +
 +
 +#if defined(_WIN32) && !defined(__CYGWIN__)
- 	/* Make sure the path separators in pahtname, hardlink and symlink
++	/* Make sure the path separators in pathname, hardlink and symlink
 +	 * are all slash '/', not the Windows path separator '\'. */
 +	zip->entry = __la_win_entry_in_posix_pathseparator(entry);
 +	if (zip->entry == entry)
 +		zip->entry = archive_entry_clone(entry);
 +#else
 +	zip->entry = archive_entry_clone(entry);
 +#endif
 +	if (zip->entry == NULL) {
 +		archive_set_error(&a->archive, ENOMEM,
 +		    "Can't allocate zip header data");
 +		return (ARCHIVE_FATAL);
 +	}
 +
 +	if (sconv != NULL) {
 +		const char *p;
 +		size_t len;
 +
 +		if (archive_entry_pathname_l(entry, &p, &len, sconv) != 0) {
 +			if (errno == ENOMEM) {
 +				archive_set_error(&a->archive, ENOMEM,
 +				    "Can't allocate memory for Pathname");
 +				return (ARCHIVE_FATAL);
 +			}
 +			archive_set_error(&a->archive,
 +			    ARCHIVE_ERRNO_FILE_FORMAT,
 +			    "Can't translate Pathname '%s' to %s",
 +			    archive_entry_pathname(entry),
 +			    archive_string_conversion_charset_name(sconv));
 +			ret2 = ARCHIVE_WARN;
 +		}
 +		if (len > 0)
 +			archive_entry_set_pathname(zip->entry, p);
 +
 +		/*
 +		 * There is no standard for symlink handling; we convert
 +		 * it using the same character-set translation that we use
 +		 * for filename.
 +		 */
 +		if (type == AE_IFLNK) {
 +			if (archive_entry_symlink_l(entry, &p, &len, sconv)) {
 +				if (errno == ENOMEM) {
 +					archive_set_error(&a->archive, ENOMEM,
 +					    "Can't allocate memory "
 +					    " for Symlink");
 +					return (ARCHIVE_FATAL);
 +				}
 +				/* No error if we can't convert. */
 +			} else if (len > 0)
 +				archive_entry_set_symlink(zip->entry, p);
 +		}
 +	}
 +
 +	/* If filename isn't ASCII and we can use UTF-8, set the UTF-8 flag. */
 +	if (!is_all_ascii(archive_entry_pathname(zip->entry))) {
 +		if (zip->opt_sconv != NULL) {
 +			if (strcmp(archive_string_conversion_charset_name(
 +					zip->opt_sconv), "UTF-8") == 0)
 +				zip->entry_flags |= ZIP_ENTRY_FLAG_UTF8_NAME;
 +#if HAVE_NL_LANGINFO
 +		} else if (strcmp(nl_langinfo(CODESET), "UTF-8") == 0) {
 +			zip->entry_flags |= ZIP_ENTRY_FLAG_UTF8_NAME;
 +#endif
 +		}
 +	}
 +	filename_length = path_length(zip->entry);
 +
 +	/* Determine appropriate compression and size for this entry. */
 +	if (type == AE_IFLNK) {
 +		slink = archive_entry_symlink(zip->entry);
 +		if (slink != NULL)
 +			slink_size = strlen(slink);
 +		else
 +			slink_size = 0;
 +		zip->entry_uncompressed_limit = slink_size;
 +		zip->entry_compressed_size = slink_size;
 +		zip->entry_uncompressed_size = slink_size;
 +		zip->entry_crc32 = zip->crc32func(zip->entry_crc32,
 +		    (const unsigned char *)slink, slink_size);
 +		zip->entry_compression = COMPRESSION_STORE;
 +		version_needed = 20;
 +	} else if (type != AE_IFREG) {
 +		zip->entry_compression = COMPRESSION_STORE;
 +		zip->entry_uncompressed_limit = 0;
 +		version_needed = 20;
 +	} else if (archive_entry_size_is_set(zip->entry)) {
 +		int64_t size = archive_entry_size(zip->entry);
 +		int64_t additional_size = 0;
 +
 +		zip->entry_uncompressed_limit = size;
 +		zip->entry_compression = zip->requested_compression;
 +		if (zip->entry_compression == COMPRESSION_UNSPECIFIED) {
 +			zip->entry_compression = COMPRESSION_DEFAULT;
 +		}
 +		if (zip->entry_compression == COMPRESSION_STORE) {
 +			zip->entry_compressed_size = size;
 +			zip->entry_uncompressed_size = size;
 +			version_needed = 10;
 +		} else {
 +			zip->entry_uncompressed_size = size;
 +			version_needed = 20;
 +		}
 +
 +		if (zip->entry_flags & ZIP_ENTRY_FLAG_ENCRYPTED) {
 +			switch (zip->entry_encryption) {
 +			case ENCRYPTION_TRADITIONAL:
 +				additional_size = TRAD_HEADER_SIZE;
 +				version_needed = 20;
 +				break;
 +			case ENCRYPTION_WINZIP_AES128:
 +				additional_size = WINZIP_AES128_HEADER_SIZE
 +				    + AUTH_CODE_SIZE;
 +				version_needed = 20;
 +				break;
 +			case ENCRYPTION_WINZIP_AES256:
 +				additional_size = WINZIP_AES256_HEADER_SIZE
 +				    + AUTH_CODE_SIZE;
 +				version_needed = 20;
 +				break;
 +			default:
 +				break;
 +			}
 +			if (zip->entry_compression == COMPRESSION_STORE)
 +				zip->entry_compressed_size += additional_size;
 +		}
 +
 +		/*
 +		 * Set Zip64 extension in any of the following cases
 +		 * (this was suggested by discussion on info-zip-dev
 +		 * mailing list):
 +		 *  = Zip64 is being forced by user
 +		 *  = File is over 4GiB uncompressed
 +		 *    (including encryption header, if any)
 +		 *  = File is close to 4GiB and is being compressed
 +		 *    (compression might make file larger)
 +		 */
 +		if ((zip->flags & ZIP_FLAG_FORCE_ZIP64)
 +		    || (zip->entry_uncompressed_size + additional_size > ZIP_4GB_MAX)
 +		    || (zip->entry_uncompressed_size > ZIP_4GB_MAX_UNCOMPRESSED
 +			&& zip->entry_compression != COMPRESSION_STORE)) {
 +			zip->entry_uses_zip64 = 1;
 +			version_needed = 45;
 +		}
 +
 +		/* We may know the size, but never the CRC. */
 +		zip->entry_flags |= ZIP_ENTRY_FLAG_LENGTH_AT_END;
 +	} else {
 +		/* We don't know the size.  In this case, we prefer
 +		 * deflate (it has a clear end-of-data marker which
 +		 * makes length-at-end more reliable) and will
 +		 * enable Zip64 extensions unless we're told not to.
 +		 */
 +		zip->entry_compression = COMPRESSION_DEFAULT;
 +		zip->entry_flags |= ZIP_ENTRY_FLAG_LENGTH_AT_END;
 +		if ((zip->flags & ZIP_FLAG_AVOID_ZIP64) == 0) {
 +			zip->entry_uses_zip64 = 1;
 +			version_needed = 45;
 +		} else if (zip->entry_compression == COMPRESSION_STORE) {
 +			version_needed = 10;
 +		} else {
 +			version_needed = 20;
 +		}
 +
 +		if (zip->entry_flags & ZIP_ENTRY_FLAG_ENCRYPTED) {
 +			switch (zip->entry_encryption) {
 +			case ENCRYPTION_TRADITIONAL:
 +			case ENCRYPTION_WINZIP_AES128:
 +			case ENCRYPTION_WINZIP_AES256:
 +				if (version_needed < 20)
 +					version_needed = 20;
 +				break;
 +			default:
 +				break;
 +			}
 +		}
 +	}
 +
 +	/* Format the local header. */
 +	memset(local_header, 0, sizeof(local_header));
 +	memcpy(local_header, "PK\003\004", 4);
 +	archive_le16enc(local_header + 4, version_needed);
 +	archive_le16enc(local_header + 6, zip->entry_flags);
 +	if (zip->entry_encryption == ENCRYPTION_WINZIP_AES128
 +	    || zip->entry_encryption == ENCRYPTION_WINZIP_AES256)
 +		archive_le16enc(local_header + 8, WINZIP_AES_ENCRYPTION);
 +	else
 +		archive_le16enc(local_header + 8, zip->entry_compression);
 +	archive_le32enc(local_header + 10,
 +		dos_time(archive_entry_mtime(zip->entry)));
 +	archive_le32enc(local_header + 14, zip->entry_crc32);
 +	if (zip->entry_uses_zip64) {
 +		/* Zip64 data in the local header "must" include both
 +		 * compressed and uncompressed sizes AND those fields
 +		 * are included only if these are 0xffffffff;
 +		 * THEREFORE these must be set this way, even if we
 +		 * know one of them is smaller. */
 +		archive_le32enc(local_header + 18, ZIP_4GB_MAX);
 +		archive_le32enc(local_header + 22, ZIP_4GB_MAX);
 +	} else {
 +		archive_le32enc(local_header + 18, (uint32_t)zip->entry_compressed_size);
 +		archive_le32enc(local_header + 22, (uint32_t)zip->entry_uncompressed_size);
 +	}
 +	archive_le16enc(local_header + 26, (uint16_t)filename_length);
 +
 +	if (zip->entry_encryption == ENCRYPTION_TRADITIONAL) {
 +		if (zip->entry_flags & ZIP_ENTRY_FLAG_LENGTH_AT_END)
 +			zip->trad_chkdat = local_header[11];
 +		else
 +			zip->trad_chkdat = local_header[17];
 +	}
 +
 +	/* Format as much of central directory file header as we can: */
 +	zip->file_header = cd_alloc(zip, 46);
 +	/* If (zip->file_header == NULL) XXXX */
 +	++zip->central_directory_entries;
 +	memset(zip->file_header, 0, 46);
 +	memcpy(zip->file_header, "PK\001\002", 4);
 +	/* "Made by PKZip 2.0 on Unix." */
 +	archive_le16enc(zip->file_header + 4, 3 * 256 + version_needed);
 +	archive_le16enc(zip->file_header + 6, version_needed);
 +	archive_le16enc(zip->file_header + 8, zip->entry_flags);
 +	if (zip->entry_encryption == ENCRYPTION_WINZIP_AES128
 +	    || zip->entry_encryption == ENCRYPTION_WINZIP_AES256)
 +		archive_le16enc(zip->file_header + 10, WINZIP_AES_ENCRYPTION);
 +	else
 +		archive_le16enc(zip->file_header + 10, zip->entry_compression);
 +	archive_le32enc(zip->file_header + 12,
 +		dos_time(archive_entry_mtime(zip->entry)));
 +	archive_le16enc(zip->file_header + 28, (uint16_t)filename_length);
 +	/* Following Info-Zip, store mode in the "external attributes" field. */
 +	archive_le32enc(zip->file_header + 38,
 +	    ((uint32_t)archive_entry_mode(zip->entry)) << 16);
 +	e = cd_alloc(zip, filename_length);
 +	/* If (e == NULL) XXXX */
 +	copy_path(zip->entry, e);
 +
 +	/* Format extra data. */
 +	memset(local_extra, 0, sizeof(local_extra));
 +	e = local_extra;
 +
 +	/* First, extra blocks that are the same between
 +	 * the local file header and the central directory.
 +	 * We format them once and then duplicate them. */
 +
 +	/* UT timestamp, length depends on what timestamps are set. */
 +	memcpy(e, "UT", 2);
 +	archive_le16enc(e + 2,
 +	    1
 +	    + (archive_entry_mtime_is_set(entry) ? 4 : 0)
 +	    + (archive_entry_atime_is_set(entry) ? 4 : 0)
 +	    + (archive_entry_ctime_is_set(entry) ? 4 : 0));
 +	e += 4;
 +	*e++ =
 +	    (archive_entry_mtime_is_set(entry) ? 1 : 0)
 +	    | (archive_entry_atime_is_set(entry) ? 2 : 0)
 +	    | (archive_entry_ctime_is_set(entry) ? 4 : 0);
 +	if (archive_entry_mtime_is_set(entry)) {
 +		archive_le32enc(e, (uint32_t)archive_entry_mtime(entry));
 +		e += 4;
 +	}
 +	if (archive_entry_atime_is_set(entry)) {
 +		archive_le32enc(e, (uint32_t)archive_entry_atime(entry));
 +		e += 4;
 +	}
 +	if (archive_entry_ctime_is_set(entry)) {
 +		archive_le32enc(e, (uint32_t)archive_entry_ctime(entry));
 +		e += 4;
 +	}
 +
 +	/* ux Unix extra data, length 11, version 1 */
 +	/* TODO: If uid < 64k, use 2 bytes, ditto for gid. */
 +	memcpy(e, "ux\013\000\001", 5);
 +	e += 5;
 +	*e++ = 4; /* Length of following UID */
 +	archive_le32enc(e, (uint32_t)archive_entry_uid(entry));
 +	e += 4;
 +	*e++ = 4; /* Length of following GID */
 +	archive_le32enc(e, (uint32_t)archive_entry_gid(entry));
 +	e += 4;
 +
 +	/* AES extra data field: WinZIP AES information, ID=0x9901 */
 +	if ((zip->entry_flags & ZIP_ENTRY_FLAG_ENCRYPTED)
 +	    && (zip->entry_encryption == ENCRYPTION_WINZIP_AES128
 +	        || zip->entry_encryption == ENCRYPTION_WINZIP_AES256)) {
 +
 +		memcpy(e, "\001\231\007\000\001\000AE", 8);
- 		/* AES vendoer version AE-2 does not store a CRC.
++		/* AES vendor version AE-2 does not store a CRC.
 +		 * WinZip 11 uses AE-1, which does store the CRC,
 +		 * but it does not store the CRC when the file size
 +		 * is less than 20 bytes. So we simulate what
 +		 * WinZip 11 does.
 +		 * NOTE: WinZip 9.0 and 10.0 uses AE-2 by default. */
 +		if (archive_entry_size_is_set(zip->entry)
 +		    && archive_entry_size(zip->entry) < 20) {
 +			archive_le16enc(e+4, AES_VENDOR_AE_2);
 +			zip->aes_vendor = AES_VENDOR_AE_2;/* no CRC. */
 +		} else
 +			zip->aes_vendor = AES_VENDOR_AE_1;
 +		e += 8;
 +		/* AES encryption strength. */
 +		*e++ = (zip->entry_encryption == ENCRYPTION_WINZIP_AES128)?1:3;
 +		/* Actual compression method. */
 +		archive_le16enc(e, zip->entry_compression);
 +		e += 2;
 +	}
 +
 +	/* Copy UT ,ux, and AES-extra into central directory as well. */
 +	zip->file_header_extra_offset = zip->central_directory_bytes;
 +	cd_extra = cd_alloc(zip, e - local_extra);
 +	memcpy(cd_extra, local_extra, e - local_extra);
 +
 +	/*
 +	 * Following extra blocks vary between local header and
 +	 * central directory. These are the local header versions.
 +	 * Central directory versions get formatted in
 +	 * archive_write_zip_finish_entry() below.
 +	 */
 +
 +	/* "[Zip64 entry] in the local header MUST include BOTH
 +	 * original [uncompressed] and compressed size fields." */
 +	if (zip->entry_uses_zip64) {
 +		unsigned char *zip64_start = e;
 +		memcpy(e, "\001\000\020\000", 4);
 +		e += 4;
 +		archive_le64enc(e, zip->entry_uncompressed_size);
 +		e += 8;
 +		archive_le64enc(e, zip->entry_compressed_size);
 +		e += 8;
 +		archive_le16enc(zip64_start + 2, (uint16_t)(e - (zip64_start + 4)));
 +	}
 +
 +	if (zip->flags & ZIP_FLAG_EXPERIMENT_xl) {
 +		/* Experimental 'xl' extension to improve streaming. */
 +		unsigned char *external_info = e;
 +		int included = 7;
 +		memcpy(e, "xl\000\000", 4); // 0x6c65 + 2-byte length
 +		e += 4;
 +		e[0] = included; /* bitmap of included fields */
 +		e += 1;
 +		if (included & 1) {
 +			archive_le16enc(e, /* "Version created by" */
 +			    3 * 256 + version_needed);
 +			e += 2;
 +		}
 +		if (included & 2) {
 +			archive_le16enc(e, 0); /* internal file attributes */
 +			e += 2;
 +		}
 +		if (included & 4) {
 +			archive_le32enc(e,  /* external file attributes */
 +			    ((uint32_t)archive_entry_mode(zip->entry)) << 16);
 +			e += 4;
 +		}
 +		if (included & 8) {
 +			// Libarchive does not currently support file comments.
 +		}
 +		archive_le16enc(external_info + 2, (uint16_t)(e - (external_info + 4)));
 +	}
 +
 +	/* Update local header with size of extra data and write it all out: */
 +	archive_le16enc(local_header + 28, (uint16_t)(e - local_extra));
 +
 +	ret = __archive_write_output(a, local_header, 30);
 +	if (ret != ARCHIVE_OK)
 +		return (ARCHIVE_FATAL);
 +	zip->written_bytes += 30;
 +
 +	ret = write_path(zip->entry, a);
 +	if (ret <= ARCHIVE_OK)
 +		return (ARCHIVE_FATAL);
 +	zip->written_bytes += ret;
 +
 +	ret = __archive_write_output(a, local_extra, e - local_extra);
 +	if (ret != ARCHIVE_OK)
 +		return (ARCHIVE_FATAL);
 +	zip->written_bytes += e - local_extra;
 +
 +	/* For symlinks, write the body now. */
 +	if (slink != NULL) {
 +		ret = __archive_write_output(a, slink, slink_size);
 +		if (ret != ARCHIVE_OK)
 +			return (ARCHIVE_FATAL);
 +		zip->entry_compressed_written += slink_size;
 +		zip->entry_uncompressed_written += slink_size;
 +		zip->written_bytes += slink_size;
 +	}
 +
 +#ifdef HAVE_ZLIB_H
 +	if (zip->entry_compression == COMPRESSION_DEFLATE) {
 +		zip->stream.zalloc = Z_NULL;
 +		zip->stream.zfree = Z_NULL;
 +		zip->stream.opaque = Z_NULL;
 +		zip->stream.next_out = zip->buf;
 +		zip->stream.avail_out = (uInt)zip->len_buf;
 +		if (deflateInit2(&zip->stream, zip->deflate_compression_level,
 +		    Z_DEFLATED, -15, 8, Z_DEFAULT_STRATEGY) != Z_OK) {
 +			archive_set_error(&a->archive, ENOMEM,
 +			    "Can't init deflate compressor");
 +			return (ARCHIVE_FATAL);
 +		}
 +	}
 +#endif
 +
 +	return (ret2);
 +}
 +
 +static ssize_t
 +archive_write_zip_data(struct archive_write *a, const void *buff, size_t s)
 +{
 +	int ret;
 +	struct zip *zip = a->format_data;
 +
 +	if ((int64_t)s > zip->entry_uncompressed_limit)
 +		s = (size_t)zip->entry_uncompressed_limit;
 +	zip->entry_uncompressed_written += s;
 +
 +	if (s == 0) return 0;
 +
 +	if (zip->entry_flags & ZIP_ENTRY_FLAG_ENCRYPTED) {
 +		switch (zip->entry_encryption) {
 +		case ENCRYPTION_TRADITIONAL:
- 			/* Initialize traditoinal PKWARE encryption context. */
++			/* Initialize traditional PKWARE encryption context. */
 +			if (!zip->tctx_valid) {
 +				ret = init_traditional_pkware_encryption(a);
 +				if (ret != ARCHIVE_OK)
 +					return (ret);
 +				zip->tctx_valid = 1;
 +			}
 +			break;
 +		case ENCRYPTION_WINZIP_AES128:
 +		case ENCRYPTION_WINZIP_AES256:
 +			if (!zip->cctx_valid) {
 +				ret = init_winzip_aes_encryption(a);
 +				if (ret != ARCHIVE_OK)
 +					return (ret);
 +				zip->cctx_valid = zip->hctx_valid = 1;
 +			}
 +			break;
 +		default:
 +			break;
 +		}
 +	}
 +
 +	switch (zip->entry_compression) {
 +	case COMPRESSION_STORE:
 +		if (zip->tctx_valid || zip->cctx_valid) {
 +			const uint8_t *rb = (const uint8_t *)buff;
 +			const uint8_t * const re = rb + s;
 +
 +			while (rb < re) {
 +				size_t l;
 +
 +				if (zip->tctx_valid) {
 +					l = trad_enc_encrypt_update(&zip->tctx,
 +					    rb, re - rb,
 +					    zip->buf, zip->len_buf);
 +				} else {
 +					l = zip->len_buf;
 +					ret = archive_encrypto_aes_ctr_update(
 +					    &zip->cctx,
 +					    rb, re - rb, zip->buf, &l);
 +					if (ret < 0) {
 +						archive_set_error(&a->archive,
 +						    ARCHIVE_ERRNO_MISC,
 +						    "Failed to encrypt file");
 +						return (ARCHIVE_FAILED);
 +					}
 +					archive_hmac_sha1_update(&zip->hctx,
 +					    zip->buf, l);
 +				}
 +				ret = __archive_write_output(a, zip->buf, l);
 +				if (ret != ARCHIVE_OK)
 +					return (ret);
 +				zip->entry_compressed_written += l;
 +				zip->written_bytes += l;
 +				rb += l;
 +			}
 +		} else {
 +			ret = __archive_write_output(a, buff, s);
 +			if (ret != ARCHIVE_OK)
 +				return (ret);
 +			zip->written_bytes += s;
 +			zip->entry_compressed_written += s;
 +		}
 +		break;
 +#if HAVE_ZLIB_H
 +	case COMPRESSION_DEFLATE:
 +		zip->stream.next_in = (unsigned char*)(uintptr_t)buff;
 +		zip->stream.avail_in = (uInt)s;
 +		do {
 +			ret = deflate(&zip->stream, Z_NO_FLUSH);
 +			if (ret == Z_STREAM_ERROR)
 +				return (ARCHIVE_FATAL);
 +			if (zip->stream.avail_out == 0) {
 +				if (zip->tctx_valid) {
 +					trad_enc_encrypt_update(&zip->tctx,
 +					    zip->buf, zip->len_buf,
 +					    zip->buf, zip->len_buf);
 +				} else if (zip->cctx_valid) {
 +					size_t outl = zip->len_buf;
 +					ret = archive_encrypto_aes_ctr_update(
 +					    &zip->cctx,
 +					    zip->buf, zip->len_buf,
 +					    zip->buf, &outl);
 +					if (ret < 0) {
 +						archive_set_error(&a->archive,
 +						    ARCHIVE_ERRNO_MISC,
 +						    "Failed to encrypt file");
 +						return (ARCHIVE_FAILED);
 +					}
 +					archive_hmac_sha1_update(&zip->hctx,
 +					    zip->buf, zip->len_buf);
 +				}
 +				ret = __archive_write_output(a, zip->buf,
 +					zip->len_buf);
 +				if (ret != ARCHIVE_OK)
 +					return (ret);
 +				zip->entry_compressed_written += zip->len_buf;
 +				zip->written_bytes += zip->len_buf;
 +				zip->stream.next_out = zip->buf;
 +				zip->stream.avail_out = (uInt)zip->len_buf;
 +			}
 +		} while (zip->stream.avail_in != 0);
 +		break;
 +#endif
 +
 +	default:
 +		archive_set_error(&a->archive, ARCHIVE_ERRNO_MISC,
 +		    "Invalid ZIP compression type");
 +		return ARCHIVE_FATAL;
 +	}
 +
 +	zip->entry_uncompressed_limit -= s;
 +	if (!zip->cctx_valid || zip->aes_vendor != AES_VENDOR_AE_2)
 +		zip->entry_crc32 =
 +		    zip->crc32func(zip->entry_crc32, buff, (unsigned)s);
 +	return (s);
 +
 +}
 +
 +static int
 +archive_write_zip_finish_entry(struct archive_write *a)
 +{
 +	struct zip *zip = a->format_data;
 +	int ret;
 +
 +#if HAVE_ZLIB_H
 +	if (zip->entry_compression == COMPRESSION_DEFLATE) {
 +		for (;;) {
 +			size_t remainder;
 +
 +			ret = deflate(&zip->stream, Z_FINISH);
 +			if (ret == Z_STREAM_ERROR)
 +				return (ARCHIVE_FATAL);
 +			remainder = zip->len_buf - zip->stream.avail_out;
 +			if (zip->tctx_valid) {
 +				trad_enc_encrypt_update(&zip->tctx,
 +				    zip->buf, remainder, zip->buf, remainder);
 +			} else if (zip->cctx_valid) {
 +				size_t outl = remainder;
 +				ret = archive_encrypto_aes_ctr_update(
 +				    &zip->cctx, zip->buf, remainder,
 +				    zip->buf, &outl);
 +				if (ret < 0) {
 +					archive_set_error(&a->archive,
 +					    ARCHIVE_ERRNO_MISC,
 +					    "Failed to encrypt file");
 +					return (ARCHIVE_FAILED);
 +				}
 +				archive_hmac_sha1_update(&zip->hctx,
 +				    zip->buf, remainder);
 +			}
 +			ret = __archive_write_output(a, zip->buf, remainder);
 +			if (ret != ARCHIVE_OK)
 +				return (ret);
 +			zip->entry_compressed_written += remainder;
 +			zip->written_bytes += remainder;
 +			zip->stream.next_out = zip->buf;
 +			if (zip->stream.avail_out != 0)
 +				break;
 +			zip->stream.avail_out = (uInt)zip->len_buf;
 +		}
 +		deflateEnd(&zip->stream);
 +	}
 +#endif
 +	if (zip->hctx_valid) {
 +		uint8_t hmac[20];
 +		size_t hmac_len = 20;
 +
 +		archive_hmac_sha1_final(&zip->hctx, hmac, &hmac_len);
 +		ret = __archive_write_output(a, hmac, AUTH_CODE_SIZE);
 +		if (ret != ARCHIVE_OK)
 +			return (ret);
 +		zip->entry_compressed_written += AUTH_CODE_SIZE;
 +		zip->written_bytes += AUTH_CODE_SIZE;
 +	}
 +
 +	/* Write trailing data descriptor. */
 +	if ((zip->entry_flags & ZIP_ENTRY_FLAG_LENGTH_AT_END) != 0) {
 +		char d[24];
 +		memcpy(d, "PK\007\010", 4);
 +		if (zip->cctx_valid && zip->aes_vendor == AES_VENDOR_AE_2)
 +			archive_le32enc(d + 4, 0);/* no CRC.*/
 +		else
 +			archive_le32enc(d + 4, zip->entry_crc32);
 +		if (zip->entry_uses_zip64) {
 +			archive_le64enc(d + 8,
 +				(uint64_t)zip->entry_compressed_written);
 +			archive_le64enc(d + 16,
 +				(uint64_t)zip->entry_uncompressed_written);
 +			ret = __archive_write_output(a, d, 24);
 +			zip->written_bytes += 24;
 +		} else {
 +			archive_le32enc(d + 8,
 +				(uint32_t)zip->entry_compressed_written);
 +			archive_le32enc(d + 12,
 +				(uint32_t)zip->entry_uncompressed_written);
 +			ret = __archive_write_output(a, d, 16);
 +			zip->written_bytes += 16;
 +		}
 +		if (ret != ARCHIVE_OK)
 +			return (ARCHIVE_FATAL);
 +	}
 +
 +	/* Append Zip64 extra data to central directory information. */
 +	if (zip->entry_compressed_written > ZIP_4GB_MAX
 +	    || zip->entry_uncompressed_written > ZIP_4GB_MAX
 +	    || zip->entry_offset > ZIP_4GB_MAX) {
 +		unsigned char zip64[32];
 +		unsigned char *z = zip64, *zd;
 +		memcpy(z, "\001\000\000\000", 4);
 +		z += 4;
 +		if (zip->entry_uncompressed_written >= ZIP_4GB_MAX) {
 +			archive_le64enc(z, zip->entry_uncompressed_written);
 +			z += 8;
 +		}
 +		if (zip->entry_compressed_written >= ZIP_4GB_MAX) {
 +			archive_le64enc(z, zip->entry_compressed_written);
 +			z += 8;
 +		}
 +		if (zip->entry_offset >= ZIP_4GB_MAX) {
 +			archive_le64enc(z, zip->entry_offset);
 +			z += 8;
 +		}
 +		archive_le16enc(zip64 + 2, (uint16_t)(z - (zip64 + 4)));
 +		zd = cd_alloc(zip, z - zip64);
 +		if (zd == NULL) {
 +			archive_set_error(&a->archive, ENOMEM,
 +				"Can't allocate zip data");
 +			return (ARCHIVE_FATAL);
 +		}
 +		memcpy(zd, zip64, z - zip64);
 +		/* Zip64 means version needs to be set to at least 4.5 */
 +		if (archive_le16dec(zip->file_header + 6) < 45)
 +			archive_le16enc(zip->file_header + 6, 45);
 +	}
 +
 +	/* Fix up central directory file header. */
 +	if (zip->cctx_valid && zip->aes_vendor == AES_VENDOR_AE_2)
 +		archive_le32enc(zip->file_header + 16, 0);/* no CRC.*/
 +	else
 +		archive_le32enc(zip->file_header + 16, zip->entry_crc32);
 +	archive_le32enc(zip->file_header + 20,
 +		(uint32_t)zipmin(zip->entry_compressed_written,
 +				 ZIP_4GB_MAX));
 +	archive_le32enc(zip->file_header + 24,
 +		(uint32_t)zipmin(zip->entry_uncompressed_written,
 +				 ZIP_4GB_MAX));
 +	archive_le16enc(zip->file_header + 30,
 +	    (uint16_t)(zip->central_directory_bytes - zip->file_header_extra_offset));
 +	archive_le32enc(zip->file_header + 42,
 +		(uint32_t)zipmin(zip->entry_offset,
 +				 ZIP_4GB_MAX));
 +
 +	return (ARCHIVE_OK);
 +}
 +
 +static int
 +archive_write_zip_close(struct archive_write *a)
 +{
 +	uint8_t buff[64];
 +	int64_t offset_start, offset_end;
 +	struct zip *zip = a->format_data;
 +	struct cd_segment *segment;
 +	int ret;
 +
 +	offset_start = zip->written_bytes;
 +	segment = zip->central_directory;
 +	while (segment != NULL) {
 +		ret = __archive_write_output(a,
 +		    segment->buff, segment->p - segment->buff);
 +		if (ret != ARCHIVE_OK)
 +			return (ARCHIVE_FATAL);
 +		zip->written_bytes += segment->p - segment->buff;
 +		segment = segment->next;
 +	}
 +	offset_end = zip->written_bytes;
 +
 +	/* If central dir info is too large, write Zip64 end-of-cd */
 +	if (offset_end - offset_start > ZIP_4GB_MAX
 +	    || offset_start > ZIP_4GB_MAX
 +	    || zip->central_directory_entries > 0xffffUL
 +	    || (zip->flags & ZIP_FLAG_FORCE_ZIP64)) {
 +	  /* Zip64 end-of-cd record */
 +	  memset(buff, 0, 56);
 +	  memcpy(buff, "PK\006\006", 4);
 +	  archive_le64enc(buff + 4, 44);
 +	  archive_le16enc(buff + 12, 45);
 +	  archive_le16enc(buff + 14, 45);
 +	  /* This is disk 0 of 0. */
 +	  archive_le64enc(buff + 24, zip->central_directory_entries);
 +	  archive_le64enc(buff + 32, zip->central_directory_entries);
 +	  archive_le64enc(buff + 40, offset_end - offset_start);
 +	  archive_le64enc(buff + 48, offset_start);
 +	  ret = __archive_write_output(a, buff, 56);
 +	  if (ret != ARCHIVE_OK)
 +		  return (ARCHIVE_FATAL);
 +	  zip->written_bytes += 56;
 +
 +	  /* Zip64 end-of-cd locator record. */
 +	  memset(buff, 0, 20);
 +	  memcpy(buff, "PK\006\007", 4);
 +	  archive_le32enc(buff + 4, 0);
 +	  archive_le64enc(buff + 8, offset_end);
 +	  archive_le32enc(buff + 16, 1);
 +	  ret = __archive_write_output(a, buff, 20);
 +	  if (ret != ARCHIVE_OK)
 +		  return (ARCHIVE_FATAL);
 +	  zip->written_bytes += 20;
 +
 +	}
 +
 +	/* Format and write end of central directory. */
 +	memset(buff, 0, sizeof(buff));
 +	memcpy(buff, "PK\005\006", 4);
 +	archive_le16enc(buff + 8, (uint16_t)zipmin(0xffffU,
 +		zip->central_directory_entries));
 +	archive_le16enc(buff + 10, (uint16_t)zipmin(0xffffU,
 +		zip->central_directory_entries));
 +	archive_le32enc(buff + 12,
 +		(uint32_t)zipmin(ZIP_4GB_MAX, (offset_end - offset_start)));
 +	archive_le32enc(buff + 16,
 +		(uint32_t)zipmin(ZIP_4GB_MAX, offset_start));
 +	ret = __archive_write_output(a, buff, 22);
 +	if (ret != ARCHIVE_OK)
 +		return (ARCHIVE_FATAL);
 +	zip->written_bytes += 22;
 +	return (ARCHIVE_OK);
 +}
 +
 +static int
 +archive_write_zip_free(struct archive_write *a)
 +{
 +	struct zip *zip;
 +	struct cd_segment *segment;
 +
 +	zip = a->format_data;
 +	while (zip->central_directory != NULL) {
 +		segment = zip->central_directory;
 +		zip->central_directory = segment->next;
 +		free(segment->buff);
 +		free(segment);
 +	}
 +	free(zip->buf);
 +	archive_entry_free(zip->entry);
 +	if (zip->cctx_valid)
 +		archive_encrypto_aes_ctr_release(&zip->cctx);
 +	if (zip->hctx_valid)
 +		archive_hmac_sha1_cleanup(&zip->hctx);
 +	/* TODO: Free opt_sconv, sconv_default */
 +
 +	free(zip);
 +	a->format_data = NULL;
 +	return (ARCHIVE_OK);
 +}
 +
 +/* Convert into MSDOS-style date/time. */
 +static unsigned int
 +dos_time(const time_t unix_time)
 +{
 +	struct tm *t;
 +	unsigned int dt;
 +
 +	/* This will not preserve time when creating/extracting the archive
 +	 * on two systems with different time zones. */
 +	t = localtime(&unix_time);
 +
 +	/* MSDOS-style date/time is only between 1980-01-01 and 2107-12-31 */
 +	if (t->tm_year < 1980 - 1900)
 +		/* Set minimum date/time '1980-01-01 00:00:00'. */
 +		dt = 0x00210000U;
 +	else if (t->tm_year > 2107 - 1900)
 +		/* Set maximum date/time '2107-12-31 23:59:58'. */
 +		dt = 0xff9fbf7dU;
 +	else {
 +		dt = 0;
 +		dt += ((t->tm_year - 80) & 0x7f) << 9;
 +		dt += ((t->tm_mon + 1) & 0x0f) << 5;
 +		dt += (t->tm_mday & 0x1f);
 +		dt <<= 16;
 +		dt += (t->tm_hour & 0x1f) << 11;
 +		dt += (t->tm_min & 0x3f) << 5;
 +		dt += (t->tm_sec & 0x3e) >> 1; /* Only counting every 2 seconds. */
 +	}
 +	return dt;
 +}
 +
 +static size_t
 +path_length(struct archive_entry *entry)
 +{
 +	mode_t type;
 +	const char *path;
 +
 +	type = archive_entry_filetype(entry);
 +	path = archive_entry_pathname(entry);
 +
 +	if (path == NULL)
 +		return (0);
 +	if (type == AE_IFDIR &&
 +	    (path[0] == '\0' || path[strlen(path) - 1] != '/')) {
 +		return strlen(path) + 1;
 +	} else {
 +		return strlen(path);
 +	}
 +}
 +
 +static int
 +write_path(struct archive_entry *entry, struct archive_write *archive)
 +{
 +	int ret;
 +	const char *path;
 +	mode_t type;
 +	size_t written_bytes;
 +
 +	path = archive_entry_pathname(entry);
 +	type = archive_entry_filetype(entry);
 +	written_bytes = 0;
 +
 +	ret = __archive_write_output(archive, path, strlen(path));
 +	if (ret != ARCHIVE_OK)
 +		return (ARCHIVE_FATAL);
 +	written_bytes += strlen(path);
 +
 +	/* Folders are recognized by a trailing slash. */
 +	if ((type == AE_IFDIR) & (path[strlen(path) - 1] != '/')) {
 +		ret = __archive_write_output(archive, "/", 1);
 +		if (ret != ARCHIVE_OK)
 +			return (ARCHIVE_FATAL);
 +		written_bytes += 1;
 +	}
 +
 +	return ((int)written_bytes);
 +}
 +
 +static void
 +copy_path(struct archive_entry *entry, unsigned char *p)
 +{
 +	const char *path;
 +	size_t pathlen;
 +	mode_t type;
 +
 +	path = archive_entry_pathname(entry);
 +	pathlen = strlen(path);
 +	type = archive_entry_filetype(entry);
 +
 +	memcpy(p, path, pathlen);
 +
 +	/* Folders are recognized by a trailing slash. */
 +	if ((type == AE_IFDIR) & (path[pathlen - 1] != '/')) {
 +		p[pathlen] = '/';
 +		p[pathlen + 1] = '\0';
 +	}
 +}
 +
 +
 +static struct archive_string_conv *
 +get_sconv(struct archive_write *a, struct zip *zip)
 +{
 +	if (zip->opt_sconv != NULL)
 +		return (zip->opt_sconv);
 +
 +	if (!zip->init_default_conversion) {
 +		zip->sconv_default =
 +		    archive_string_default_conversion_for_write(&(a->archive));
 +		zip->init_default_conversion = 1;
 +	}
 +	return (zip->sconv_default);
 +}
 +
 +/*
 +  Traditional PKWARE Decryption functions.
 + */
 +
 +static void
 +trad_enc_update_keys(struct trad_enc_ctx *ctx, uint8_t c)
 +{
 +	uint8_t t;
 +#define CRC32(c, b) (crc32(c ^ 0xffffffffUL, &b, 1) ^ 0xffffffffUL)
 +
 +	ctx->keys[0] = CRC32(ctx->keys[0], c);
 +	ctx->keys[1] = (ctx->keys[1] + (ctx->keys[0] & 0xff)) * 134775813L + 1;
 +	t = (ctx->keys[1] >> 24) & 0xff;
 +	ctx->keys[2] = CRC32(ctx->keys[2], t);
 +#undef CRC32
 +}
 +
 +static uint8_t
- trad_enc_decypt_byte(struct trad_enc_ctx *ctx)
++trad_enc_decrypt_byte(struct trad_enc_ctx *ctx)
 +{
 +	unsigned temp = ctx->keys[2] | 2;
 +	return (uint8_t)((temp * (temp ^ 1)) >> 8) & 0xff;
 +}
 +
 +static unsigned
 +trad_enc_encrypt_update(struct trad_enc_ctx *ctx, const uint8_t *in,
 +    size_t in_len, uint8_t *out, size_t out_len)
 +{
 +	unsigned i, max;
 +
 +	max = (unsigned)((in_len < out_len)? in_len: out_len);
 +
 +	for (i = 0; i < max; i++) {
 +		uint8_t t = in[i];
- 		out[i] = t ^ trad_enc_decypt_byte(ctx);
++		out[i] = t ^ trad_enc_decrypt_byte(ctx);
 +		trad_enc_update_keys(ctx, t);
 +	}
 +	return i;
 +}
 +
 +static int
 +trad_enc_init(struct trad_enc_ctx *ctx, const char *pw, size_t pw_len)
 +{
 +
 +	ctx->keys[0] = 305419896L;
 +	ctx->keys[1] = 591751049L;
 +	ctx->keys[2] = 878082192L;
 +
 +	for (;pw_len; --pw_len)
 +		trad_enc_update_keys(ctx, *pw++);
 +	return 0;
 +}
 +
 +static int
 +is_traditional_pkware_encryption_supported(void)
 +{
 +	uint8_t key[TRAD_HEADER_SIZE];
 +
 +	if (archive_random(key, sizeof(key)-1) != ARCHIVE_OK)
 +		return (0);
 +	return (1);
 +}
 +
 +static int
 +init_traditional_pkware_encryption(struct archive_write *a)
 +{
 +	struct zip *zip = a->format_data;
 +	const char *passphrase;
 +	uint8_t key[TRAD_HEADER_SIZE];
 +	uint8_t key_encrypted[TRAD_HEADER_SIZE];
 +	int ret;
 +
 +	passphrase = __archive_write_get_passphrase(a);
 +	if (passphrase == NULL) {
 +		archive_set_error(&a->archive, ARCHIVE_ERRNO_MISC,
 +		    "Encryption needs passphrase");
 +		return ARCHIVE_FAILED;
 +	}
 +	if (archive_random(key, sizeof(key)-1) != ARCHIVE_OK) {
 +		archive_set_error(&a->archive, ARCHIVE_ERRNO_MISC,
 +		    "Can't generate random number for encryption");
 +		return ARCHIVE_FATAL;
 +	}
 +	trad_enc_init(&zip->tctx, passphrase, strlen(passphrase));
 +	/* Set the last key code which will be used as a check code
 +	 * for verifying passphrase in decryption. */
 +	key[TRAD_HEADER_SIZE-1] = zip->trad_chkdat;
 +	trad_enc_encrypt_update(&zip->tctx, key, TRAD_HEADER_SIZE,
 +	    key_encrypted, TRAD_HEADER_SIZE);
 +	/* Write encrypted keys in the top of the file content. */
 +	ret = __archive_write_output(a, key_encrypted, TRAD_HEADER_SIZE);
 +	if (ret != ARCHIVE_OK)
 +		return (ret);
 +	zip->written_bytes += TRAD_HEADER_SIZE;
 +	zip->entry_compressed_written += TRAD_HEADER_SIZE;
 +	return (ret);
 +}
 +
 +static int
 +init_winzip_aes_encryption(struct archive_write *a)
 +{
 +	struct zip *zip = a->format_data;
 +	const char *passphrase;
 +	size_t key_len, salt_len;
 +	uint8_t salt[16 + 2];
 +	uint8_t derived_key[MAX_DERIVED_KEY_BUF_SIZE];
 +	int ret;
 +
 +	passphrase = __archive_write_get_passphrase(a);
 +	if (passphrase == NULL) {
 +		archive_set_error(&a->archive, ARCHIVE_ERRNO_MISC,
 +		    "Encryption needs passphrase");
 +		return (ARCHIVE_FAILED);
 +	}
 +	if (zip->entry_encryption == ENCRYPTION_WINZIP_AES128) {
 +		salt_len = 8;
 +		key_len = 16;
 +	} else {
 +		/* AES 256 */
 +		salt_len = 16;
 +		key_len = 32;
 +	}
 +	if (archive_random(salt, salt_len) != ARCHIVE_OK) {
 +		archive_set_error(&a->archive, ARCHIVE_ERRNO_MISC,
 +		    "Can't generate random number for encryption");
 +		return (ARCHIVE_FATAL);
 +	}
 +	archive_pbkdf2_sha1(passphrase, strlen(passphrase),
 +	    salt, salt_len, 1000, derived_key, key_len * 2 + 2);
 +
 +	ret = archive_encrypto_aes_ctr_init(&zip->cctx, derived_key, key_len);
 +	if (ret != 0) {
 +		archive_set_error(&a->archive, ARCHIVE_ERRNO_MISC,
 +		    "Decryption is unsupported due to lack of crypto library");
 +		return (ARCHIVE_FAILED);
 +	}
 +	ret = archive_hmac_sha1_init(&zip->hctx, derived_key + key_len,
 +	    key_len);
 +	if (ret != 0) {
 +		archive_encrypto_aes_ctr_release(&zip->cctx);
 +		archive_set_error(&a->archive, ARCHIVE_ERRNO_MISC,
 +		    "Failed to initialize HMAC-SHA1");
 +		return (ARCHIVE_FAILED);
 +        }
 +
- 	/* Set a passowrd verification value after the 'salt'. */
++	/* Set a password verification value after the 'salt'. */
 +	salt[salt_len] = derived_key[key_len * 2];
 +	salt[salt_len + 1] = derived_key[key_len * 2 + 1];
 +
 +	/* Write encrypted keys in the top of the file content. */
 +	ret = __archive_write_output(a, salt, salt_len + 2);
 +	if (ret != ARCHIVE_OK)
 +		return (ret);
 +	zip->written_bytes += salt_len + 2;
 +	zip->entry_compressed_written += salt_len + 2;
 +
 +	return (ARCHIVE_OK);
 +}
 +
 +static int
 +is_winzip_aes_encryption_supported(int encryption)
 +{
 +	size_t key_len, salt_len;
 +	uint8_t salt[16 + 2];
 +	uint8_t derived_key[MAX_DERIVED_KEY_BUF_SIZE];
 +	archive_crypto_ctx cctx;
 +	archive_hmac_sha1_ctx hctx;
 +	int ret;
 +
 +	if (encryption == ENCRYPTION_WINZIP_AES128) {
 +		salt_len = 8;
 +		key_len = 16;
 +	} else {
 +		/* AES 256 */
 +		salt_len = 16;
 +		key_len = 32;
 +	}
 +	if (archive_random(salt, salt_len) != ARCHIVE_OK)
 +		return (0);
 +	ret = archive_pbkdf2_sha1("p", 1, salt, salt_len, 1000,
 +	    derived_key, key_len * 2 + 2);
 +	if (ret != 0)
 +		return (0);
 +
 +	ret = archive_encrypto_aes_ctr_init(&cctx, derived_key, key_len);
 +	if (ret != 0)
 +		return (0);
 +	ret = archive_hmac_sha1_init(&hctx, derived_key + key_len,
 +	    key_len);
 +	archive_encrypto_aes_ctr_release(&cctx);
 +	if (ret != 0)
 +		return (0);
 +	archive_hmac_sha1_cleanup(&hctx);
 +	return (1);
 +}

https://cmake.org/gitweb?p=cmake.git;a=commitdiff;h=c206211af647dd1f7039da91c34c9c72e50aefdf
commit c206211af647dd1f7039da91c34c9c72e50aefdf
Author:     LibArchive Upstream <libarchive-discuss at googlegroups.com>
AuthorDate: Sun Feb 19 20:35:52 2017 -0800
Commit:     Brad King <brad.king at kitware.com>
CommitDate: Mon Feb 20 07:50:48 2017 -0500

    LibArchive 2017-02-19 (100ee75a)
    
    Code extracted from:
    
        https://github.com/libarchive/libarchive.git
    
    at commit 100ee75a01f1f785fc681f616db49a33405f8bf3 (v3.3.0).

diff --git a/CMakeLists.txt b/CMakeLists.txt
index 68e94a6..eb36b5b 100644
--- a/CMakeLists.txt
+++ b/CMakeLists.txt
@@ -179,13 +179,15 @@ include(CTest)
 
 OPTION(ENABLE_NETTLE "Enable use of Nettle" ON)
 OPTION(ENABLE_OPENSSL "Enable use of OpenSSL" ON)
-OPTION(ENABLE_LZMA "Enable the use of the system found LZMA library if found" ON)
-OPTION(ENABLE_ZLIB "Enable the use of the system found ZLIB library if found" ON)
-OPTION(ENABLE_BZip2 "Enable the use of the system found BZip2 library if found" ON)
-OPTION(ENABLE_LIBXML2 "Enable the use of the system found libxml2 library if found" ON)
-OPTION(ENABLE_EXPAT "Enable the use of the system found EXPAT library if found" ON)
-OPTION(ENABLE_PCREPOSIX "Enable the use of the system found PCREPOSIX library if found" ON)
-OPTION(ENABLE_LibGCC "Enable the use of the system found LibGCC library if found" ON)
+OPTION(ENABLE_LZO "Enable the use of the system LZO library if found" OFF)
+OPTION(ENABLE_LZMA "Enable the use of the system LZMA library if found" ON)
+
+OPTION(ENABLE_ZLIB "Enable the use of the system ZLIB library if found" ON)
+OPTION(ENABLE_BZip2 "Enable the use of the system BZip2 library if found" ON)
+OPTION(ENABLE_LIBXML2 "Enable the use of the system libxml2 library if found" ON)
+OPTION(ENABLE_EXPAT "Enable the use of the system EXPAT library if found" ON)
+OPTION(ENABLE_PCREPOSIX "Enable the use of the system PCREPOSIX library if found" ON)
+OPTION(ENABLE_LibGCC "Enable the use of the system LibGCC library if found" ON)
 # CNG is used for encrypt/decrypt Zip archives on Windows.
 OPTION(ENABLE_CNG "Enable the use of CNG(Crypto Next Generation)" ON)
 
@@ -274,7 +276,7 @@ INCLUDE(CheckHeaderDirent)
 INCLUDE(CheckIncludeFile)
 INCLUDE(CheckIncludeFiles)
 INCLUDE(CheckLibraryExists)
-INCLUDE(CheckStructMember)
+INCLUDE(CheckStructHasMember)
 INCLUDE(CheckSymbolExists)
 INCLUDE(CheckTypeExists)
 INCLUDE(CheckTypeSize)
@@ -452,46 +454,44 @@ MARK_AS_ADVANCED(CLEAR BZIP2_LIBRARIES)
 # Find LZMA
 #
 IF(ENABLE_LZMA)
-  FIND_PACKAGE(LZMA)
+  FIND_PACKAGE(LibLZMA)
 ELSE()
-  SET(LZMA_FOUND FALSE) # Override cached value
-  SET(LZMADEC_FOUND FALSE) # Override cached value
+  SET(LIBZMA_FOUND FALSE) # Override cached value
 ENDIF()
 
-IF(LZMA_FOUND)
+IF(LIBLZMA_FOUND)
   SET(HAVE_LIBLZMA 1)
   SET(HAVE_LZMA_H 1)
-  INCLUDE_DIRECTORIES(${LZMA_INCLUDE_DIR})
-  LIST(APPEND ADDITIONAL_LIBS ${LZMA_LIBRARIES})
+  INCLUDE_DIRECTORIES(${LIBLZMA_INCLUDE_DIRS})
+  LIST(APPEND ADDITIONAL_LIBS ${LIBLZMA_LIBRARIES})
   # Test if a macro is needed for the library.
   TRY_MACRO_FOR_LIBRARY(
-    "${LZMA_INCLUDE_DIR}" "${LZMA_LIBRARIES}"
+    "${LIBLZMA_INCLUDE_DIRS}" "${LIBLZMA_LIBRARIES}"
     COMPILES
     "#include <lzma.h>\nint main() {return (int)lzma_version_number(); }"
     "WITHOUT_LZMA_API_STATIC;LZMA_API_STATIC")
   IF(NOT WITHOUT_LZMA_API_STATIC AND LZMA_API_STATIC)
     ADD_DEFINITIONS(-DLZMA_API_STATIC)
   ENDIF(NOT WITHOUT_LZMA_API_STATIC AND LZMA_API_STATIC)
-ELSEIF(LZMADEC_FOUND)
-  SET(HAVE_LIBLZMADEC 1)
-  SET(HAVE_LZMADEC_H 1)
-  INCLUDE_DIRECTORIES(${LZMADEC_INCLUDE_DIR})
-  LIST(APPEND ADDITIONAL_LIBS ${LZMADEC_LIBRARIES})
-ELSE(LZMA_FOUND)
+ELSE(LIBLZMA_FOUND)
 # LZMA not found and will not be used.
-ENDIF(LZMA_FOUND)
+ENDIF(LIBLZMA_FOUND)
 #
 # Find LZO2
 #
-IF (LZO2_INCLUDE_DIR)
-  # Already in cache, be silent
-  SET(LZO2_FIND_QUIETLY TRUE)
-ENDIF (LZO2_INCLUDE_DIR)
-
-FIND_PATH(LZO2_INCLUDE_DIR lzo/lzoconf.h)
-FIND_LIBRARY(LZO2_LIBRARY NAMES lzo2 liblzo2)
-INCLUDE(FindPackageHandleStandardArgs)
-FIND_PACKAGE_HANDLE_STANDARD_ARGS(LZO2 DEFAULT_MSG LZO2_LIBRARY LZO2_INCLUDE_DIR)
+IF(ENABLE_LZO)
+  IF (LZO2_INCLUDE_DIR)
+    # Already in cache, be silent
+    SET(LZO2_FIND_QUIETLY TRUE)
+  ENDIF (LZO2_INCLUDE_DIR)
+
+  FIND_PATH(LZO2_INCLUDE_DIR lzo/lzoconf.h)
+  FIND_LIBRARY(LZO2_LIBRARY NAMES lzo2 liblzo2)
+  INCLUDE(FindPackageHandleStandardArgs)
+  FIND_PACKAGE_HANDLE_STANDARD_ARGS(LZO2 DEFAULT_MSG LZO2_LIBRARY LZO2_INCLUDE_DIR)
+ELSE(ENABLE_LZO)
+  SET(LIBZMA_FOUND FALSE) # Override cached value
+ENDIF(ENABLE_LZO)
 IF(LZO2_FOUND)
   SET(HAVE_LIBLZO2 1)
   SET(HAVE_LZO_LZOCONF_H 1)
@@ -614,7 +614,7 @@ IF(ENABLE_CNG)
 ELSE(ENABLE_CNG)
   UNSET(HAVE_BCRYPT_H CACHE)
 ENDIF(ENABLE_CNG)
-# Following files need windwos.h, so we should test it after windows.h test.
+# Following files need windows.h, so we should test it after windows.h test.
 LA_CHECK_INCLUDE_FILE("wincrypt.h" HAVE_WINCRYPT_H)
 LA_CHECK_INCLUDE_FILE("winioctl.h" HAVE_WINIOCTL_H)
 
@@ -1274,6 +1274,14 @@ CHECK_FUNCTION_EXISTS(wmemmove HAVE_WMEMMOVE)
 
 CMAKE_POP_CHECK_STATE()	# Restore the state of the variables
 
+CHECK_C_SOURCE_COMPILES(
+  "#include <sys/types.h>\n#include <sys/mount.h>\nint main(void) { struct vfsconf v; return sizeof(v);}"
+  HAVE_STRUCT_VFSCONF)
+
+CHECK_C_SOURCE_COMPILES(
+  "#include <sys/types.h>\n#include <sys/mount.h>\nint main(void) { struct xvfsconf v; return sizeof(v);}"
+  HAVE_STRUCT_XVFSCONF)
+
 # Make sure we have the POSIX version of readdir_r, not the
 # older 2-argument version.
 CHECK_C_SOURCE_COMPILES(
@@ -1299,6 +1307,10 @@ CHECK_C_SOURCE_COMPILES(
   "#include <sys/sysmacros.h>\nint main() { return major(256); }"
   MAJOR_IN_SYSMACROS)
 
+CHECK_C_SOURCE_COMPILES(
+  "#include <lzma.h>\n#if LZMA_VERSION < 50020000\n#error unsupported\n#endif\nint main(void){lzma_stream_encoder_mt(0, 0); return 0;}"
+  HAVE_LZMA_STREAM_ENCODER_MT)
+
 IF(HAVE_STRERROR_R)
   SET(HAVE_DECL_STRERROR_R 1)
 ENDIF(HAVE_STRERROR_R)
@@ -1332,47 +1344,47 @@ CHECK_SYMBOL_EXISTS(SSIZE_MAX        "limits.h"   HAVE_DECL_SSIZE_MAX)
 # Check struct members
 #
 # Check for tm_gmtoff in struct tm
-CHECK_STRUCT_MEMBER("struct tm" tm_gmtoff
+CHECK_STRUCT_HAS_MEMBER("struct tm" tm_gmtoff
     "time.h" HAVE_STRUCT_TM_TM_GMTOFF)
-CHECK_STRUCT_MEMBER("struct tm" __tm_gmtoff
+CHECK_STRUCT_HAS_MEMBER("struct tm" __tm_gmtoff
     "time.h" HAVE_STRUCT_TM___TM_GMTOFF)
 
 # Check for f_namemax in struct statfs
-CHECK_STRUCT_MEMBER("struct statfs" f_namemax
+CHECK_STRUCT_HAS_MEMBER("struct statfs" f_namemax
     "sys/param.h;sys/mount.h" HAVE_STRUCT_STATFS_F_NAMEMAX)
 
 # Check for birthtime in struct stat
-CHECK_STRUCT_MEMBER("struct stat" st_birthtime
+CHECK_STRUCT_HAS_MEMBER("struct stat" st_birthtime
     "sys/types.h;sys/stat.h" HAVE_STRUCT_STAT_ST_BIRTHTIME)
 
 # Check for high-resolution timestamps in struct stat
-CHECK_STRUCT_MEMBER("struct stat" st_birthtimespec.tv_nsec
+CHECK_STRUCT_HAS_MEMBER("struct stat" st_birthtimespec.tv_nsec
     "sys/types.h;sys/stat.h" HAVE_STRUCT_STAT_ST_BIRTHTIMESPEC_TV_NSEC)
-CHECK_STRUCT_MEMBER("struct stat" st_mtimespec.tv_nsec
+CHECK_STRUCT_HAS_MEMBER("struct stat" st_mtimespec.tv_nsec
     "sys/types.h;sys/stat.h" HAVE_STRUCT_STAT_ST_MTIMESPEC_TV_NSEC)
-CHECK_STRUCT_MEMBER("struct stat" st_mtim.tv_nsec
+CHECK_STRUCT_HAS_MEMBER("struct stat" st_mtim.tv_nsec
     "sys/types.h;sys/stat.h" HAVE_STRUCT_STAT_ST_MTIM_TV_NSEC)
-CHECK_STRUCT_MEMBER("struct stat" st_mtime_n
+CHECK_STRUCT_HAS_MEMBER("struct stat" st_mtime_n
     "sys/types.h;sys/stat.h" HAVE_STRUCT_STAT_ST_MTIME_N)
-CHECK_STRUCT_MEMBER("struct stat" st_umtime
+CHECK_STRUCT_HAS_MEMBER("struct stat" st_umtime
     "sys/types.h;sys/stat.h" HAVE_STRUCT_STAT_ST_UMTIME)
-CHECK_STRUCT_MEMBER("struct stat" st_mtime_usec
+CHECK_STRUCT_HAS_MEMBER("struct stat" st_mtime_usec
     "sys/types.h;sys/stat.h" HAVE_STRUCT_STAT_ST_MTIME_USEC)
 # Check for block size support in struct stat
-CHECK_STRUCT_MEMBER("struct stat" st_blksize
+CHECK_STRUCT_HAS_MEMBER("struct stat" st_blksize
     "sys/types.h;sys/stat.h" HAVE_STRUCT_STAT_ST_BLKSIZE)
 # Check for st_flags in struct stat (BSD fflags)
-CHECK_STRUCT_MEMBER("struct stat" st_flags
+CHECK_STRUCT_HAS_MEMBER("struct stat" st_flags
     "sys/types.h;sys/stat.h" HAVE_STRUCT_STAT_ST_FLAGS)
 
 IF(HAVE_SYS_STATVFS_H)
-  CHECK_STRUCT_MEMBER("struct statvfs" f_iosize
+  CHECK_STRUCT_HAS_MEMBER("struct statvfs" f_iosize
     "sys/types.h;sys/statvfs.h" HAVE_STRUCT_STATVFS_F_IOSIZE)
 ENDIF()
 
 #
 #
-CHECK_STRUCT_MEMBER("struct tm" tm_sec
+CHECK_STRUCT_HAS_MEMBER("struct tm" tm_sec
     "sys/types.h;sys/time.h;time.h" TIME_WITH_SYS_TIME)
 
 #
@@ -1592,16 +1604,36 @@ IF(ENABLE_ACL)
   # test for specific permissions in a permset.)  Linux uses the obvious
   # name, FreeBSD adds _np to mark it as "non-Posix extension."
   # Test for both as a double-check that we really have POSIX-style ACL support.
+  CHECK_FUNCTION_EXISTS(acl_get_fd_np HAVE_ACL_GET_FD_NP)
   CHECK_FUNCTION_EXISTS(acl_get_perm HAVE_ACL_GET_PERM)
   CHECK_FUNCTION_EXISTS(acl_get_perm_np HAVE_ACL_GET_PERM_NP)
   CHECK_FUNCTION_EXISTS(acl_get_link HAVE_ACL_GET_LINK)
   CHECK_FUNCTION_EXISTS(acl_get_link_np HAVE_ACL_GET_LINK_NP)
   CHECK_FUNCTION_EXISTS(acl_is_trivial_np HAVE_ACL_IS_TRIVIAL_NP)
   CHECK_FUNCTION_EXISTS(acl_set_link_np HAVE_ACL_SET_LINK_NP)
+  CHECK_SYMBOL_EXISTS(ACL_TYPE_NFS4 "${INCLUDES}" HAVE_ACL_TYPE_NFS4)
 
   # MacOS has an acl.h that isn't POSIX.  It can be detected by
   # checking for ACL_USER
   CHECK_SYMBOL_EXISTS(ACL_USER "${INCLUDES}" HAVE_ACL_USER)
+  CHECK_C_SOURCE_COMPILES("#include <sys/types.h>
+#include <sys/acl.h>
+int main(void) { return ACL_TYPE_EXTENDED; }" HAVE_ACL_TYPE_EXTENDED)
+
+  # Solaris and derivates ACLs
+  CHECK_LIBRARY_EXISTS(sec "acl_get" "" HAVE_LIBSEC)
+  IF(HAVE_LIBSEC)
+    SET(CMAKE_REQUIRED_LIBRARIES "sec")
+    FIND_LIBRARY(SEC_LIBRARY NAMES sec)
+    LIST(APPEND ADDITIONAL_LIBS ${SEC_LIBRARY})
+  ENDIF(HAVE_LIBSEC)
+  #
+  CHECK_TYPE_EXISTS(aclent_t "${INCLUDES}" HAVE_ACLENT_T)
+  CHECK_TYPE_EXISTS(ace_t "${INCLUDES}" HAVE_ACE_T)
+  CHECK_FUNCTION_EXISTS(acl_get HAVE_FACL_GET)
+  CHECK_FUNCTION_EXISTS(facl_get HAVE_FACL_GET)
+  CHECK_FUNCTION_EXISTS(acl_set HAVE_FACL_SET)
+  CHECK_FUNCTION_EXISTS(facl_set HAVE_FACL_SET)
 ELSE(ENABLE_ACL)
   # If someone runs cmake, then disables ACL support, we need
   # to forcibly override the cached values for these.
@@ -1616,7 +1648,15 @@ ELSE(ENABLE_ACL)
   SET(HAVE_ACL_SET_FD FALSE)
   SET(HAVE_ACL_SET_FD_NP FALSE)
   SET(HAVE_ACL_SET_FILE FALSE)
+  SET(HAVE_ACL_TYPE_NFS4 FALSE)
   SET(HAVE_ACL_USER FALSE)
+  SET(HAVE_ACL_TYPE_EXTENDED FALSE)
+  SET(HAVE_ACL_GET FALSE)
+  SET(HAVE_ACLENT_T FALSE)
+  SET(HAVE_ACE_T FALSE)
+  SET(HAVE_FACL_GET FALSE)
+  SET(HAVE_ACL_SET FALSE)
+  SET(HAVE_FACL_SET FALSE)
 ENDIF(ENABLE_ACL)
 
 #
diff --git a/build/cmake/CheckStructMember.cmake b/build/cmake/CheckStructMember.cmake
deleted file mode 100644
index 05ddb3a..0000000
--- a/build/cmake/CheckStructMember.cmake
+++ /dev/null
@@ -1,43 +0,0 @@
-# - Check if the given struct or class has the specified member variable
-# CHECK_STRUCT_MEMBER (STRUCT MEMBER HEADER VARIABLE)
-#
-#  STRUCT - the name of the struct or class you are interested in
-#  MEMBER - the member which existence you want to check
-#  HEADER - the header(s) where the prototype should be declared
-#  VARIABLE - variable to store the result
-#
-# The following variables may be set before calling this macro to
-# modify the way the check is run:
-#
-#  CMAKE_REQUIRED_FLAGS = string of compile command line flags
-#  CMAKE_REQUIRED_DEFINITIONS = list of macros to define (-DFOO=bar)
-#  CMAKE_REQUIRED_INCLUDES = list of include directories
-
-# Copyright (c) 2006, Alexander Neundorf, <neundorf at kde.org>
-#
-# Redistribution and use is allowed according to the terms of the BSD license.
-# For details see the accompanying COPYING-CMAKE-SCRIPTS file.
-
-
-INCLUDE(CheckCSourceCompiles)
-
-MACRO (CHECK_STRUCT_MEMBER _STRUCT _MEMBER _HEADER _RESULT)
-   SET(_INCLUDE_FILES)
-   FOREACH (it ${_HEADER})
-      SET(_INCLUDE_FILES "${_INCLUDE_FILES}#include <${it}>\n")
-   ENDFOREACH (it)
-
-   SET(_CHECK_STRUCT_MEMBER_SOURCE_CODE "
-${_INCLUDE_FILES}
-int main()
-{
-   static ${_STRUCT} tmp;
-   if (sizeof(tmp.${_MEMBER}))
-      return 0;
-  return 0;
-}
-")
-   CHECK_C_SOURCE_COMPILES("${_CHECK_STRUCT_MEMBER_SOURCE_CODE}" ${_RESULT})
-
-ENDMACRO (CHECK_STRUCT_MEMBER)
-
diff --git a/build/cmake/FindLZMA.cmake b/build/cmake/FindLZMA.cmake
deleted file mode 100644
index 0b46b2c..0000000
--- a/build/cmake/FindLZMA.cmake
+++ /dev/null
@@ -1,48 +0,0 @@
-# - Find lzma and lzmadec
-# Find the native LZMA includes and library
-#
-#  LZMA_INCLUDE_DIR    - where to find lzma.h, etc.
-#  LZMA_LIBRARIES      - List of libraries when using liblzma.
-#  LZMA_FOUND          - True if liblzma found.
-#  LZMADEC_INCLUDE_DIR - where to find lzmadec.h, etc.
-#  LZMADEC_LIBRARIES   - List of libraries when using liblzmadec.
-#  LZMADEC_FOUND       - True if liblzmadec found.
-
-IF (LZMA_INCLUDE_DIR)
-  # Already in cache, be silent
-  SET(LZMA_FIND_QUIETLY TRUE)
-ENDIF (LZMA_INCLUDE_DIR)
-
-FIND_PATH(LZMA_INCLUDE_DIR lzma.h)
-FIND_LIBRARY(LZMA_LIBRARY NAMES lzma liblzma)
-
-# handle the QUIETLY and REQUIRED arguments and set LZMA_FOUND to TRUE if 
-# all listed variables are TRUE
-INCLUDE(FindPackageHandleStandardArgs)
-FIND_PACKAGE_HANDLE_STANDARD_ARGS(LZMA DEFAULT_MSG LZMA_LIBRARY LZMA_INCLUDE_DIR)
-
-IF(LZMA_FOUND)
-  SET( LZMA_LIBRARIES ${LZMA_LIBRARY} )
-ELSE(LZMA_FOUND)
-  SET( LZMA_LIBRARIES )
-
-  IF (LZMADEC_INCLUDE_DIR)
-    # Already in cache, be silent
-    SET(LZMADEC_FIND_QUIETLY TRUE)
-  ENDIF (LZMADEC_INCLUDE_DIR)
-
-  FIND_PATH(LZMADEC_INCLUDE_DIR lzmadec.h)
-  FIND_LIBRARY(LZMADEC_LIBRARY NAMES lzmadec )
-
-  # handle the QUIETLY and REQUIRED arguments and set LZMADEC_FOUND to TRUE if 
-  # all listed variables are TRUE
-  INCLUDE(FindPackageHandleStandardArgs)
-  FIND_PACKAGE_HANDLE_STANDARD_ARGS(LZMADEC DEFAULT_MSG LZMADEC_LIBRARY
-    LZMADEC_INCLUDE_DIR)
-
-  IF(LZMADEC_FOUND)
-    SET( LZMADEC_LIBRARIES ${LZMADEC_LIBRARY} )
-  ELSE(LZMADEC_FOUND)
-    SET( LZMADEC_LIBRARIES )
-  ENDIF(LZMADEC_FOUND)
-ENDIF(LZMA_FOUND)
diff --git a/build/cmake/config.h.in b/build/cmake/config.h.in
index 64f4d4d..ec64d99 100644
--- a/build/cmake/config.h.in
+++ b/build/cmake/config.h.in
@@ -293,6 +293,9 @@ typedef uint64_t uintmax_t;
 /* Define to 1 if you have the `acl_create_entry' function. */
 #cmakedefine HAVE_ACL_CREATE_ENTRY 1
 
+/* Define to 1 if you have the `acl_get_fd_np' function. */
+#cmakedefine HAVE_ACL_GET_FD_NP 1
+
 /* Define to 1 if you have the `acl_get_link' function. */
 #cmakedefine HAVE_ACL_GET_LINK 1
 
@@ -323,6 +326,12 @@ typedef uint64_t uintmax_t;
 /* Define to 1 if you have the `acl_set_file' function. */
 #cmakedefine HAVE_ACL_SET_FILE 1
 
+/* True for FreeBSD with NFSv4 ACL support */
+#cmakedefine HAVE_ACL_TYPE_NFS4 1
+
+/* True for MacOS ACL support */
+#cmakedefine HAVE_ACL_TYPE_EXTENDED 1
+
 /* True for systems with POSIX ACL support */
 #cmakedefine HAVE_ACL_USER 1
 
@@ -721,6 +730,9 @@ typedef uint64_t uintmax_t;
 /* Define to 1 if you have the <lzma.h> header file. */
 #cmakedefine HAVE_LZMA_H 1
 
+/* Define to 1 if you have a working `lzma_stream_encoder_mt' function. */
+#cmakedefine HAVE_LZMA_STREAM_ENCODER_MT 1
+
 /* Define to 1 if you have the <lzo/lzo1x.h> header file. */
 #cmakedefine HAVE_LZO_LZO1X_H 1
 
@@ -923,6 +935,12 @@ typedef uint64_t uintmax_t;
 /* Define to 1 if `__tm_gmtoff' is a member of `struct tm'. */
 #cmakedefine HAVE_STRUCT_TM___TM_GMTOFF 1
 
+/* Define to 1 if you have `struct vfsconf'. */
+#cmakedefine HAVE_STRUCT_VFSCONF 1
+
+/* Define to 1 if you have `struct xvfsconf'. */
+#cmakedefine HAVE_STRUCT_XVFSCONF 1
+
 /* Define to 1 if you have the `symlink' function. */
 #cmakedefine HAVE_SYMLINK 1
 
diff --git a/build/version b/build/version
index f293156..a000b30 100644
--- a/build/version
+++ b/build/version
@@ -1 +1 @@
-3002001
+3003000
diff --git a/libarchive/CMakeLists.txt b/libarchive/CMakeLists.txt
index 4cc9a2c..1f85c01 100644
--- a/libarchive/CMakeLists.txt
+++ b/libarchive/CMakeLists.txt
@@ -38,6 +38,8 @@ SET(libarchive_SOURCES
   archive_hmac.c
   archive_hmac_private.h
   archive_match.c
+  archive_openssl_evp_private.h
+  archive_openssl_hmac_private.h
   archive_options.c
   archive_options_private.h
   archive_pack_dev.h
@@ -166,15 +168,33 @@ SET(libarchive_MANS
   archive_entry_time.3
   archive_read.3
   archive_read_add_passphrase.3
+  archive_read_data.3
   archive_read_disk.3
+  archive_read_extract.3
+  archive_read_filter.3
+  archive_read_format.3
+  archive_read_free.3
+  archive_read_header.3
+  archive_read_new.3
+  archive_read_open.3
   archive_read_set_options.3
   archive_util.3
   archive_write.3
+  archive_write_blocksize.3
+  archive_write_data.3
   archive_write_disk.3
+  archive_write_filter.3
+  archive_write_finish_entry.3
+  archive_write_format.3
+  archive_write_free.3
+  archive_write_header.3
+  archive_write_new.3
+  archive_write_open.3
   archive_write_set_options.3
   archive_write_set_passphrase.3
   cpio.5
   libarchive.3
+  libarchive_changes.3
   libarchive_internals.3
   libarchive-formats.5
   mtree.5
diff --git a/libarchive/archive.h b/libarchive/archive.h
index 1794dd3..cd27c90 100644
--- a/libarchive/archive.h
+++ b/libarchive/archive.h
@@ -36,7 +36,7 @@
  * assert that ARCHIVE_VERSION_NUMBER >= 2012108.
  */
 /* Note: Compiler will complain if this does not match archive_entry.h! */
-#define	ARCHIVE_VERSION_NUMBER 3002001
+#define	ARCHIVE_VERSION_NUMBER 3003000
 
 #include <sys/stat.h>
 #include <stddef.h>  /* for wchar_t */
@@ -155,7 +155,7 @@ __LA_DECL int		archive_version_number(void);
 /*
  * Textual name/version of the library, useful for version displays.
  */
-#define	ARCHIVE_VERSION_ONLY_STRING "3.2.1"
+#define	ARCHIVE_VERSION_ONLY_STRING "3.3.0"
 #define	ARCHIVE_VERSION_STRING "libarchive " ARCHIVE_VERSION_ONLY_STRING
 __LA_DECL const char *	archive_version_string(void);
 
@@ -373,7 +373,7 @@ typedef const char *archive_passphrase_callback(struct archive *,
  *   4) Repeatedly call archive_read_next_header to get information about
  *      successive archive entries.  Call archive_read_data to extract
  *      data for entries of interest.
- *   5) Call archive_read_finish to end processing.
+ *   5) Call archive_read_free to end processing.
  */
 __LA_DECL struct archive	*archive_read_new(void);
 
@@ -562,7 +562,7 @@ __LA_DECL la_int64_t		 archive_read_header_position(struct archive *);
  * we cannot say whether there are encrypted entries, then
  * ARCHIVE_READ_FORMAT_ENCRYPTION_DONT_KNOW is returned.
  * In general, this function will return values below zero when the
- * reader is uncertain or totally uncapable of encryption support.
+ * reader is uncertain or totally incapable of encryption support.
  * When this function returns 0 you can be sure that the reader
  * supports encryption detection but no encrypted entries have
  * been found yet.
@@ -984,12 +984,12 @@ __LA_DECL int	archive_read_disk_can_descend(struct archive *);
 __LA_DECL int	archive_read_disk_current_filesystem(struct archive *);
 __LA_DECL int	archive_read_disk_current_filesystem_is_synthetic(struct archive *);
 __LA_DECL int	archive_read_disk_current_filesystem_is_remote(struct archive *);
-/* Request that the access time of the entry visited by travesal be restored. */
+/* Request that the access time of the entry visited by traversal be restored. */
 __LA_DECL int  archive_read_disk_set_atime_restored(struct archive *);
 /*
  * Set behavior. The "flags" argument selects optional behavior.
  */
-/* Request that the access time of the entry visited by travesal be restored.
+/* Request that the access time of the entry visited by traversal be restored.
  * This is the same as archive_read_disk_set_atime_restored. */
 #define	ARCHIVE_READDISK_RESTORE_ATIME		(0x0001)
 /* Default: Do not skip an entry which has nodump flags. */
@@ -1124,7 +1124,7 @@ __LA_DECL int	archive_match_time_excluded(struct archive *,
 
 /*
  * Flags to tell a matching type of time stamps. These are used for
- * following functinos.
+ * following functions.
  */
 /* Time flag: mtime to be tested. */
 #define ARCHIVE_MATCH_MTIME	(0x0100)
@@ -1144,7 +1144,7 @@ __LA_DECL int	archive_match_include_date(struct archive *, int _flag,
 		    const char *_datestr);
 __LA_DECL int	archive_match_include_date_w(struct archive *, int _flag,
 		    const wchar_t *_datestr);
-/* Set inclusion time by a particluar file. */
+/* Set inclusion time by a particular file. */
 __LA_DECL int	archive_match_include_file_time(struct archive *,
 		    int _flag, const char *_pathname);
 __LA_DECL int	archive_match_include_file_time_w(struct archive *,
diff --git a/libarchive/archive_acl.c b/libarchive/archive_acl.c
index bf4b610..b8b6b63 100644
--- a/libarchive/archive_acl.c
+++ b/libarchive/archive_acl.c
@@ -1,5 +1,6 @@
 /*-
  * Copyright (c) 2003-2010 Tim Kientzle
+ * Copyright (c) 2016 Martin Matuska
  * All rights reserved.
  *
  * Redistribution and use in source and binary forms, with or without
@@ -55,25 +56,77 @@ static struct archive_acl_entry *acl_new_entry(struct archive_acl *acl,
 static int	archive_acl_add_entry_len_l(struct archive_acl *acl,
 		    int type, int permset, int tag, int id, const char *name,
 		    size_t len, struct archive_string_conv *sc);
+static int	archive_acl_text_want_type(struct archive_acl *acl, int flags);
+static ssize_t	archive_acl_text_len(struct archive_acl *acl, int want_type,
+		    int flags, int wide, struct archive *a,
+		    struct archive_string_conv *sc);
 static int	isint_w(const wchar_t *start, const wchar_t *end, int *result);
 static int	ismode_w(const wchar_t *start, const wchar_t *end, int *result);
+static int	is_nfs4_flags_w(const wchar_t *start, const wchar_t *end,
+		    int *result);
+static int	is_nfs4_perms_w(const wchar_t *start, const wchar_t *end,
+		    int *result);
 static void	next_field_w(const wchar_t **wp, const wchar_t **start,
 		    const wchar_t **end, wchar_t *sep);
-static int	prefix_w(const wchar_t *start, const wchar_t *end,
-		    const wchar_t *test);
-static void	append_entry_w(wchar_t **wp, const wchar_t *prefix, int tag,
-		    const wchar_t *wname, int perm, int id);
+static void	append_entry_w(wchar_t **wp, const wchar_t *prefix, int type,
+		    int tag, int flags, const wchar_t *wname, int perm, int id);
 static void	append_id_w(wchar_t **wp, int id);
 static int	isint(const char *start, const char *end, int *result);
 static int	ismode(const char *start, const char *end, int *result);
+static int	is_nfs4_flags(const char *start, const char *end,
+		    int *result);
+static int	is_nfs4_perms(const char *start, const char *end,
+		    int *result);
 static void	next_field(const char **p, const char **start,
 		    const char **end, char *sep);
-static int	prefix_c(const char *start, const char *end,
-		    const char *test);
-static void	append_entry(char **p, const char *prefix, int tag,
-		    const char *name, int perm, int id);
+static void	append_entry(char **p, const char *prefix, int type,
+		    int tag, int flags, const char *name, int perm, int id);
 static void	append_id(char **p, int id);
 
+static const struct {
+	const int perm;
+	const char c;
+	const wchar_t wc;
+} nfsv4_acl_perm_map[] = {
+	{ ARCHIVE_ENTRY_ACL_READ_DATA | ARCHIVE_ENTRY_ACL_LIST_DIRECTORY, 'r',
+	    L'r' },
+	{ ARCHIVE_ENTRY_ACL_WRITE_DATA | ARCHIVE_ENTRY_ACL_ADD_FILE, 'w',
+	    L'w' },
+	{ ARCHIVE_ENTRY_ACL_EXECUTE, 'x', L'x' },
+	{ ARCHIVE_ENTRY_ACL_APPEND_DATA | ARCHIVE_ENTRY_ACL_ADD_SUBDIRECTORY,
+	    'p', L'p' },
+	{ ARCHIVE_ENTRY_ACL_DELETE, 'd', L'd' },
+	{ ARCHIVE_ENTRY_ACL_DELETE_CHILD, 'D', L'D' },
+	{ ARCHIVE_ENTRY_ACL_READ_ATTRIBUTES, 'a', L'a' },
+	{ ARCHIVE_ENTRY_ACL_WRITE_ATTRIBUTES, 'A', L'A' },
+	{ ARCHIVE_ENTRY_ACL_READ_NAMED_ATTRS, 'R', L'R' },
+	{ ARCHIVE_ENTRY_ACL_WRITE_NAMED_ATTRS, 'W', L'W' },
+	{ ARCHIVE_ENTRY_ACL_READ_ACL, 'c', L'c' },
+	{ ARCHIVE_ENTRY_ACL_WRITE_ACL, 'C', L'C' },
+	{ ARCHIVE_ENTRY_ACL_WRITE_OWNER, 'o', L'o' },
+	{ ARCHIVE_ENTRY_ACL_SYNCHRONIZE, 's', L's' }
+};
+
+static const int nfsv4_acl_perm_map_size = (int)(sizeof(nfsv4_acl_perm_map) /
+    sizeof(nfsv4_acl_perm_map[0]));
+
+static const struct {
+	const int perm;
+	const char c;
+	const wchar_t wc;
+} nfsv4_acl_flag_map[] = {
+	{ ARCHIVE_ENTRY_ACL_ENTRY_FILE_INHERIT, 'f', L'f' },
+	{ ARCHIVE_ENTRY_ACL_ENTRY_DIRECTORY_INHERIT, 'd', L'd' },
+	{ ARCHIVE_ENTRY_ACL_ENTRY_INHERIT_ONLY, 'i', L'i' },
+	{ ARCHIVE_ENTRY_ACL_ENTRY_NO_PROPAGATE_INHERIT, 'n', L'n' },
+	{ ARCHIVE_ENTRY_ACL_ENTRY_SUCCESSFUL_ACCESS, 'S', L'S' },
+	{ ARCHIVE_ENTRY_ACL_ENTRY_FAILED_ACCESS, 'F', L'F' },
+	{ ARCHIVE_ENTRY_ACL_ENTRY_INHERITED, 'I', L'I' }
+};
+
+static const int nfsv4_acl_flag_map_size = (int)(sizeof(nfsv4_acl_flag_map) /
+    sizeof(nfsv4_acl_flag_map[0]));
+
 void
 archive_acl_clear(struct archive_acl *acl)
 {
@@ -94,6 +147,7 @@ archive_acl_clear(struct archive_acl *acl)
 		acl->acl_text = NULL;
 	}
 	acl->acl_p = NULL;
+	acl->acl_types = 0;
 	acl->acl_state = 0; /* Not counting. */
 }
 
@@ -279,23 +333,31 @@ acl_new_entry(struct archive_acl *acl,
 		acl->acl_text = NULL;
 	}
 
-	/* If there's a matching entry already in the list, overwrite it. */
+	/*
+	 * If there's a matching entry already in the list, overwrite it.
+	 * NFSv4 entries may be repeated and are not overwritten.
+	 *
+	 * TODO: compare names of no id is provided (needs more rework)
+	 */
 	ap = acl->acl_head;
 	aq = NULL;
 	while (ap != NULL) {
-		if (ap->type == type && ap->tag == tag && ap->id == id) {
-			ap->permset = permset;
-			return (ap);
+		if (((type & ARCHIVE_ENTRY_ACL_TYPE_NFS4) == 0) &&
+		    ap->type == type && ap->tag == tag && ap->id == id) {
+			if (id != -1 || (tag != ARCHIVE_ENTRY_ACL_USER &&
+			    tag != ARCHIVE_ENTRY_ACL_GROUP)) {
+				ap->permset = permset;
+				return (ap);
+			}
 		}
 		aq = ap;
 		ap = ap->next;
 	}
 
 	/* Add a new entry to the end of the list. */
-	ap = (struct archive_acl_entry *)malloc(sizeof(*ap));
+	ap = (struct archive_acl_entry *)calloc(1, sizeof(*ap));
 	if (ap == NULL)
 		return (NULL);
-	memset(ap, 0, sizeof(*ap));
 	if (aq == NULL)
 		acl->acl_head = ap;
 	else
@@ -331,6 +393,15 @@ archive_acl_count(struct archive_acl *acl, int want_type)
 }
 
 /*
+ * Return a bitmask of stored ACL types in an ACL list
+ */
+int
+archive_acl_types(struct archive_acl *acl)
+{
+	return (acl->acl_types);
+}
+
+/*
  * Prepare for reading entries from the ACL data.  Returns a count
  * of entries matching "want_type", or zero if there are no
  * non-extended ACL entries of that type.
@@ -366,8 +437,8 @@ archive_acl_reset(struct archive_acl *acl, int want_type)
  * standard permissions and include them in the returned list.
  */
 int
-archive_acl_next(struct archive *a, struct archive_acl *acl, int want_type, int *type,
-    int *permset, int *tag, int *id, const char **name)
+archive_acl_next(struct archive *a, struct archive_acl *acl, int want_type,
+    int *type, int *permset, int *tag, int *id, const char **name)
 {
 	*name = NULL;
 	*id = -1;
@@ -432,130 +503,273 @@ archive_acl_next(struct archive *a, struct archive_acl *acl, int want_type, int
 }
 
 /*
- * Generate a text version of the ACL.  The flags parameter controls
- * the style of the generated ACL.
+ * Determine what type of ACL do we want
  */
-const wchar_t *
-archive_acl_text_w(struct archive *a, struct archive_acl *acl, int flags)
+static int
+archive_acl_text_want_type(struct archive_acl *acl, int flags)
 {
-	int count;
-	size_t length;
-	const wchar_t *wname;
-	const wchar_t *prefix;
-	wchar_t separator;
-	struct archive_acl_entry *ap;
-	int id, r;
-	wchar_t *wp;
+	int want_type;
 
-	if (acl->acl_text_w != NULL) {
-		free (acl->acl_text_w);
-		acl->acl_text_w = NULL;
+	/* Check if ACL is NFSv4 */
+	if ((acl->acl_types & ARCHIVE_ENTRY_ACL_TYPE_NFS4) != 0) {
+		/* NFSv4 should never mix with POSIX.1e */
+		if ((acl->acl_types & ARCHIVE_ENTRY_ACL_TYPE_POSIX1E) != 0)
+			return (0);
+		else
+			return (ARCHIVE_ENTRY_ACL_TYPE_NFS4);
 	}
 
-	separator = L',';
+	/* Now deal with POSIX.1e ACLs */
+
+	want_type = 0;
+	if ((flags & ARCHIVE_ENTRY_ACL_TYPE_ACCESS) != 0)
+		want_type |= ARCHIVE_ENTRY_ACL_TYPE_ACCESS;
+	if ((flags & ARCHIVE_ENTRY_ACL_TYPE_DEFAULT) != 0)
+		want_type |= ARCHIVE_ENTRY_ACL_TYPE_DEFAULT;
+
+	/* By default we want both access and default ACLs */
+	if (want_type == 0)
+		return (ARCHIVE_ENTRY_ACL_TYPE_POSIX1E);
+
+	return (want_type);
+}
+
+/*
+ * Calculate ACL text string length
+ */
+static ssize_t
+archive_acl_text_len(struct archive_acl *acl, int want_type, int flags,
+    int wide, struct archive *a, struct archive_string_conv *sc) {
+	struct archive_acl_entry *ap;
+	const char *name;
+	const wchar_t *wname;
+	int count, idlen, tmp, r;
+	ssize_t length;
+	size_t len;
+
 	count = 0;
 	length = 0;
-	ap = acl->acl_head;
-	while (ap != NULL) {
-		if ((ap->type & flags) != 0) {
-			count++;
-			if ((flags & ARCHIVE_ENTRY_ACL_STYLE_MARK_DEFAULT) &&
-			    (ap->type & ARCHIVE_ENTRY_ACL_TYPE_DEFAULT))
-				length += 8; /* "default:" */
-			length += 5; /* tag name */
-			length += 1; /* colon */
-			r = archive_mstring_get_wcs(a, &ap->name, &wname);
-			if (r == 0 && wname != NULL)
-				length += wcslen(wname);
-			else if (r < 0 && errno == ENOMEM)
-				return (NULL);
-			else
-				length += sizeof(uid_t) * 3 + 1;
-			length ++; /* colon */
+	for (ap = acl->acl_head; ap != NULL; ap = ap->next) {
+		if ((ap->type & want_type) == 0)
+			continue;
+		/*
+		 * Filemode-mapping ACL entries are stored exclusively in
+		 * ap->mode so they should not be in the list
+		 */
+		if ((ap->type == ARCHIVE_ENTRY_ACL_TYPE_ACCESS)
+		    && (ap->tag == ARCHIVE_ENTRY_ACL_USER_OBJ
+		    || ap->tag == ARCHIVE_ENTRY_ACL_GROUP_OBJ
+		    || ap->tag == ARCHIVE_ENTRY_ACL_OTHER))
+			continue;
+		count++;
+		if ((want_type & ARCHIVE_ENTRY_ACL_TYPE_DEFAULT) != 0
+		    && (ap->type & ARCHIVE_ENTRY_ACL_TYPE_DEFAULT) != 0)
+			length += 8; /* "default:" */
+		switch (ap->tag) {
+		case ARCHIVE_ENTRY_ACL_USER_OBJ:
+			if (want_type == ARCHIVE_ENTRY_ACL_TYPE_NFS4) {
+				length += 6; /* "owner@" */
+				break;
+			}
+			/* FALLTHROUGH */
+		case ARCHIVE_ENTRY_ACL_USER:
+		case ARCHIVE_ENTRY_ACL_MASK:
+			length += 4; /* "user", "mask" */
+			break;
+		case ARCHIVE_ENTRY_ACL_GROUP_OBJ:
+			if (want_type == ARCHIVE_ENTRY_ACL_TYPE_NFS4) {
+				length += 6; /* "group@" */
+				break;
+			}
+			/* FALLTHROUGH */
+		case ARCHIVE_ENTRY_ACL_GROUP:
+		case ARCHIVE_ENTRY_ACL_OTHER:
+			length += 5; /* "group", "other" */
+			break;
+		case ARCHIVE_ENTRY_ACL_EVERYONE:
+			length += 9; /* "everyone@" */
+			break;
+		}
+		length += 1; /* colon after tag */
+		if (ap->tag == ARCHIVE_ENTRY_ACL_USER ||
+		    ap->tag == ARCHIVE_ENTRY_ACL_GROUP) {
+			if (wide) {
+				r = archive_mstring_get_wcs(a, &ap->name,
+				    &wname);
+				if (r == 0 && wname != NULL)
+					length += wcslen(wname);
+				else if (r < 0 && errno == ENOMEM)
+					return (0);
+				else
+					length += sizeof(uid_t) * 3 + 1;
+			} else {
+				r = archive_mstring_get_mbs_l(&ap->name, &name,
+				    &len, sc);
+				if (r != 0)
+					return (0);
+				if (len > 0 && name != NULL)
+					length += len;
+				else
+					length += sizeof(uid_t) * 3 + 1;
+			}
+			length += 1; /* colon after user or group name */
+		} else if (want_type != ARCHIVE_ENTRY_ACL_TYPE_NFS4)
+			length += 1; /* 2nd colon empty user,group or other */
+
+		if (((flags & ARCHIVE_ENTRY_ACL_STYLE_SOLARIS) != 0)
+		    && ((want_type & ARCHIVE_ENTRY_ACL_TYPE_POSIX1E) != 0)
+		    && (ap->tag == ARCHIVE_ENTRY_ACL_OTHER
+		    || ap->tag == ARCHIVE_ENTRY_ACL_MASK)) {
+			/* Solaris has no colon after other: and mask: */
+			length = length - 1;
+		}
+
+		if (want_type == ARCHIVE_ENTRY_ACL_TYPE_NFS4) {
+			/* rwxpdDaARWcCos:fdinSFI:deny */
+			length += 27;
+			if ((ap->type & ARCHIVE_ENTRY_ACL_TYPE_DENY) == 0)
+				length += 1; /* allow, alarm, audit */
+		} else
 			length += 3; /* rwx */
+
+		if ((ap->tag == ARCHIVE_ENTRY_ACL_USER ||
+		    ap->tag == ARCHIVE_ENTRY_ACL_GROUP) &&
+		    (flags & ARCHIVE_ENTRY_ACL_STYLE_EXTRA_ID) != 0) {
 			length += 1; /* colon */
-			length += max(sizeof(uid_t), sizeof(gid_t)) * 3 + 1;
-			length ++; /* newline */
+			/* ID digit count */
+			idlen = 1;
+			tmp = ap->id;
+			while (tmp > 9) {
+				tmp = tmp / 10;
+				idlen++;
+			}
+			length += idlen;
 		}
-		ap = ap->next;
+		length ++; /* entry separator */
 	}
 
-	if (count > 0 && ((flags & ARCHIVE_ENTRY_ACL_TYPE_ACCESS) != 0)) {
-		length += 10; /* "user::rwx\n" */
-		length += 11; /* "group::rwx\n" */
-		length += 11; /* "other::rwx\n" */
-	}
+	/* Add filemode-mapping access entries to the length */
+	if ((want_type & ARCHIVE_ENTRY_ACL_TYPE_ACCESS) != 0) {
+		if ((flags & ARCHIVE_ENTRY_ACL_STYLE_SOLARIS) != 0) {
+			/* "user::rwx\ngroup::rwx\nother:rwx\n" */
+			length += 31;
+		} else {
+			/* "user::rwx\ngroup::rwx\nother::rwx\n" */
+			length += 32;
+		}
+	} else if (count == 0)
+		return (0);
+
+	/* The terminating character is included in count */
+	return (length);
+}
+
+/*
+ * Generate a wide text version of the ACL. The flags parameter controls
+ * the type and style of the generated ACL.
+ */
+wchar_t *
+archive_acl_to_text_w(struct archive_acl *acl, ssize_t *text_len, int flags,
+    struct archive *a)
+{
+	int count;
+	ssize_t length;
+	size_t len;
+	const wchar_t *wname;
+	const wchar_t *prefix;
+	wchar_t separator;
+	struct archive_acl_entry *ap;
+	int id, r, want_type;
+	wchar_t *wp, *ws;
+
+	want_type = archive_acl_text_want_type(acl, flags);
+
+	/* Both NFSv4 and POSIX.1 types found */
+	if (want_type == 0)
+		return (NULL);
+
+	if (want_type == ARCHIVE_ENTRY_ACL_TYPE_POSIX1E)
+		flags |= ARCHIVE_ENTRY_ACL_STYLE_MARK_DEFAULT;
+
+	length = archive_acl_text_len(acl, want_type, flags, 1, a, NULL);
 
-	if (count == 0)
+	if (length == 0)
 		return (NULL);
 
+	if (flags & ARCHIVE_ENTRY_ACL_STYLE_SEPARATOR_COMMA)
+		separator = L',';
+	else
+		separator = L'\n';
+
 	/* Now, allocate the string and actually populate it. */
-	wp = acl->acl_text_w = (wchar_t *)malloc(length * sizeof(wchar_t));
-	if (wp == NULL)
+	wp = ws = (wchar_t *)malloc(length * sizeof(wchar_t));
+	if (wp == NULL) {
+		if (errno == ENOMEM)
+			__archive_errx(1, "No memory");
 		return (NULL);
+	}
 	count = 0;
-	if ((flags & ARCHIVE_ENTRY_ACL_TYPE_ACCESS) != 0) {
-		append_entry_w(&wp, NULL, ARCHIVE_ENTRY_ACL_USER_OBJ, NULL,
+
+	if ((want_type & ARCHIVE_ENTRY_ACL_TYPE_ACCESS) != 0) {
+		append_entry_w(&wp, NULL, ARCHIVE_ENTRY_ACL_TYPE_ACCESS,
+		    ARCHIVE_ENTRY_ACL_USER_OBJ, flags, NULL,
 		    acl->mode & 0700, -1);
-		*wp++ = ',';
-		append_entry_w(&wp, NULL, ARCHIVE_ENTRY_ACL_GROUP_OBJ, NULL,
+		*wp++ = separator;
+		append_entry_w(&wp, NULL, ARCHIVE_ENTRY_ACL_TYPE_ACCESS,
+		    ARCHIVE_ENTRY_ACL_GROUP_OBJ, flags, NULL,
 		    acl->mode & 0070, -1);
-		*wp++ = ',';
-		append_entry_w(&wp, NULL, ARCHIVE_ENTRY_ACL_OTHER, NULL,
+		*wp++ = separator;
+		append_entry_w(&wp, NULL, ARCHIVE_ENTRY_ACL_TYPE_ACCESS,
+		    ARCHIVE_ENTRY_ACL_OTHER, flags, NULL,
 		    acl->mode & 0007, -1);
 		count += 3;
-
-		ap = acl->acl_head;
-		while (ap != NULL) {
-			if ((ap->type & ARCHIVE_ENTRY_ACL_TYPE_ACCESS) != 0) {
-				r = archive_mstring_get_wcs(a, &ap->name, &wname);
-				if (r == 0) {
-					*wp++ = separator;
-					if (flags & ARCHIVE_ENTRY_ACL_STYLE_EXTRA_ID)
-						id = ap->id;
-					else
-						id = -1;
-					append_entry_w(&wp, NULL, ap->tag, wname,
-					    ap->permset, id);
-					count++;
-				} else if (r < 0 && errno == ENOMEM)
-					return (NULL);
-			}
-			ap = ap->next;
-		}
 	}
 
-
-	if ((flags & ARCHIVE_ENTRY_ACL_TYPE_DEFAULT) != 0) {
-		if (flags & ARCHIVE_ENTRY_ACL_STYLE_MARK_DEFAULT)
+	for (ap = acl->acl_head; ap != NULL; ap = ap->next) {
+		if ((ap->type & want_type) == 0)
+			continue;
+		/*
+		 * Filemode-mapping ACL entries are stored exclusively in
+		 * ap->mode so they should not be in the list
+		 */
+		if ((ap->type == ARCHIVE_ENTRY_ACL_TYPE_ACCESS)
+		    && (ap->tag == ARCHIVE_ENTRY_ACL_USER_OBJ
+		    || ap->tag == ARCHIVE_ENTRY_ACL_GROUP_OBJ
+		    || ap->tag == ARCHIVE_ENTRY_ACL_OTHER))
+			continue;
+		if (ap->type == ARCHIVE_ENTRY_ACL_TYPE_DEFAULT &&
+		    (flags & ARCHIVE_ENTRY_ACL_STYLE_MARK_DEFAULT) != 0)
 			prefix = L"default:";
 		else
 			prefix = NULL;
-		ap = acl->acl_head;
-		count = 0;
-		while (ap != NULL) {
-			if ((ap->type & ARCHIVE_ENTRY_ACL_TYPE_DEFAULT) != 0) {
-				r = archive_mstring_get_wcs(a, &ap->name, &wname);
-				if (r == 0) {
-					if (count > 0)
-						*wp++ = separator;
-					if (flags & ARCHIVE_ENTRY_ACL_STYLE_EXTRA_ID)
-						id = ap->id;
-					else
-						id = -1;
-					append_entry_w(&wp, prefix, ap->tag,
-					    wname, ap->permset, id);
-					count ++;
-				} else if (r < 0 && errno == ENOMEM)
-					return (NULL);
-			}
-			ap = ap->next;
-		}
+		r = archive_mstring_get_wcs(a, &ap->name, &wname);
+		if (r == 0) {
+			if (count > 0)
+				*wp++ = separator;
+			if (flags & ARCHIVE_ENTRY_ACL_STYLE_EXTRA_ID)
+				id = ap->id;
+			else
+				id = -1;
+			append_entry_w(&wp, prefix, ap->type, ap->tag, flags,
+			    wname, ap->permset, id);
+			count++;
+		} else if (r < 0 && errno == ENOMEM)
+			return (NULL);
 	}
 
-	return (acl->acl_text_w);
-}
+	/* Add terminating character */
+	*wp++ = L'\0';
+
+	len = wcslen(ws);
 
+	if ((ssize_t)len > (length - 1))
+		__archive_errx(1, "Buffer overrun");
+
+	if (text_len != NULL)
+		*text_len = len;
+
+	return (ws);
+}
 
 static void
 append_id_w(wchar_t **wp, int id)
@@ -568,9 +782,11 @@ append_id_w(wchar_t **wp, int id)
 }
 
 static void
-append_entry_w(wchar_t **wp, const wchar_t *prefix, int tag,
-    const wchar_t *wname, int perm, int id)
+append_entry_w(wchar_t **wp, const wchar_t *prefix, int type,
+    int tag, int flags, const wchar_t *wname, int perm, int id)
 {
+	int i;
+
 	if (prefix != NULL) {
 		wcscpy(*wp, prefix);
 		*wp += wcslen(*wp);
@@ -579,6 +795,10 @@ append_entry_w(wchar_t **wp, const wchar_t *prefix, int tag,
 	case ARCHIVE_ENTRY_ACL_USER_OBJ:
 		wname = NULL;
 		id = -1;
+		if ((type & ARCHIVE_ENTRY_ACL_TYPE_NFS4) != 0) {
+			wcscpy(*wp, L"owner@");
+			break;
+		}
 		/* FALLTHROUGH */
 	case ARCHIVE_ENTRY_ACL_USER:
 		wcscpy(*wp, L"user");
@@ -586,6 +806,10 @@ append_entry_w(wchar_t **wp, const wchar_t *prefix, int tag,
 	case ARCHIVE_ENTRY_ACL_GROUP_OBJ:
 		wname = NULL;
 		id = -1;
+		if ((type & ARCHIVE_ENTRY_ACL_TYPE_NFS4) != 0) {
+			wcscpy(*wp, L"group@");
+			break;
+		}
 		/* FALLTHROUGH */
 	case ARCHIVE_ENTRY_ACL_GROUP:
 		wcscpy(*wp, L"group");
@@ -600,153 +824,184 @@ append_entry_w(wchar_t **wp, const wchar_t *prefix, int tag,
 		wname = NULL;
 		id = -1;
 		break;
+	case ARCHIVE_ENTRY_ACL_EVERYONE:
+		wcscpy(*wp, L"everyone@");
+		wname = NULL;
+		id = -1;
+		break;
 	}
 	*wp += wcslen(*wp);
 	*(*wp)++ = L':';
-	if (wname != NULL) {
-		wcscpy(*wp, wname);
+	if (((type & ARCHIVE_ENTRY_ACL_TYPE_POSIX1E) != 0) ||
+	    tag == ARCHIVE_ENTRY_ACL_USER ||
+	    tag == ARCHIVE_ENTRY_ACL_GROUP) {
+		if (wname != NULL) {
+			wcscpy(*wp, wname);
+			*wp += wcslen(*wp);
+		} else if (tag == ARCHIVE_ENTRY_ACL_USER
+		    || tag == ARCHIVE_ENTRY_ACL_GROUP) {
+			append_id_w(wp, id);
+			if ((type & ARCHIVE_ENTRY_ACL_TYPE_NFS4) == 0)
+				id = -1;
+		}
+		/* Solaris style has no second colon after other and mask */
+		if (((flags & ARCHIVE_ENTRY_ACL_STYLE_SOLARIS) == 0)
+		    || (tag != ARCHIVE_ENTRY_ACL_OTHER
+		    && tag != ARCHIVE_ENTRY_ACL_MASK))
+			*(*wp)++ = L':';
+	}
+	if ((type & ARCHIVE_ENTRY_ACL_TYPE_POSIX1E) != 0) {
+		/* POSIX.1e ACL perms */
+		*(*wp)++ = (perm & 0444) ? L'r' : L'-';
+		*(*wp)++ = (perm & 0222) ? L'w' : L'-';
+		*(*wp)++ = (perm & 0111) ? L'x' : L'-';
+	} else {
+		/* NFSv4 ACL perms */
+		for (i = 0; i < nfsv4_acl_perm_map_size; i++) {
+			if (perm & nfsv4_acl_perm_map[i].perm)
+				*(*wp)++ = nfsv4_acl_perm_map[i].wc;
+			else if ((flags & ARCHIVE_ENTRY_ACL_STYLE_COMPACT) == 0)
+				*(*wp)++ = L'-';
+		}
+		*(*wp)++ = L':';
+		for (i = 0; i < nfsv4_acl_flag_map_size; i++) {
+			if (perm & nfsv4_acl_flag_map[i].perm)
+				*(*wp)++ = nfsv4_acl_flag_map[i].wc;
+			else if ((flags & ARCHIVE_ENTRY_ACL_STYLE_COMPACT) == 0)
+				*(*wp)++ = L'-';
+		}
+		*(*wp)++ = L':';
+		switch (type) {
+		case ARCHIVE_ENTRY_ACL_TYPE_ALLOW:
+			wcscpy(*wp, L"allow");
+			break;
+		case ARCHIVE_ENTRY_ACL_TYPE_DENY:
+			wcscpy(*wp, L"deny");
+			break;
+		case ARCHIVE_ENTRY_ACL_TYPE_AUDIT:
+			wcscpy(*wp, L"audit");
+			break;
+		case ARCHIVE_ENTRY_ACL_TYPE_ALARM:
+			wcscpy(*wp, L"alarm");
+			break;
+		default:
+			break;
+		}
 		*wp += wcslen(*wp);
-	} else if (tag == ARCHIVE_ENTRY_ACL_USER
-	    || tag == ARCHIVE_ENTRY_ACL_GROUP) {
-		append_id_w(wp, id);
-		id = -1;
 	}
-	*(*wp)++ = L':';
-	*(*wp)++ = (perm & 0444) ? L'r' : L'-';
-	*(*wp)++ = (perm & 0222) ? L'w' : L'-';
-	*(*wp)++ = (perm & 0111) ? L'x' : L'-';
 	if (id != -1) {
 		*(*wp)++ = L':';
 		append_id_w(wp, id);
 	}
-	**wp = L'\0';
 }
 
-int
-archive_acl_text_l(struct archive_acl *acl, int flags,
-    const char **acl_text, size_t *acl_text_len,
+/*
+ * Generate a text version of the ACL. The flags parameter controls
+ * the type and style of the generated ACL.
+ */
+char *
+archive_acl_to_text_l(struct archive_acl *acl, ssize_t *text_len, int flags,
     struct archive_string_conv *sc)
 {
 	int count;
-	size_t length;
+	ssize_t length;
+	size_t len;
 	const char *name;
 	const char *prefix;
 	char separator;
 	struct archive_acl_entry *ap;
-	size_t len;
-	int id, r;
-	char *p;
+	int id, r, want_type;
+	char *p, *s;
 
-	if (acl->acl_text != NULL) {
-		free (acl->acl_text);
-		acl->acl_text = NULL;
-	}
+	want_type = archive_acl_text_want_type(acl, flags);
 
-	*acl_text = NULL;
-	if (acl_text_len != NULL)
-		*acl_text_len = 0;
-	separator = ',';
-	count = 0;
-	length = 0;
-	ap = acl->acl_head;
-	while (ap != NULL) {
-		if ((ap->type & flags) != 0) {
-			count++;
-			if ((flags & ARCHIVE_ENTRY_ACL_STYLE_MARK_DEFAULT) &&
-			    (ap->type & ARCHIVE_ENTRY_ACL_TYPE_DEFAULT))
-				length += 8; /* "default:" */
-			length += 5; /* tag name */
-			length += 1; /* colon */
-			r = archive_mstring_get_mbs_l(
-			    &ap->name, &name, &len, sc);
-			if (r != 0)
-				return (-1);
-			if (len > 0 && name != NULL)
-				length += len;
-			else
-				length += sizeof(uid_t) * 3 + 1;
-			length ++; /* colon */
-			length += 3; /* rwx */
-			length += 1; /* colon */
-			length += max(sizeof(uid_t), sizeof(gid_t)) * 3 + 1;
-			length ++; /* newline */
-		}
-		ap = ap->next;
-	}
+	/* Both NFSv4 and POSIX.1 types found */
+	if (want_type == 0)
+		return (NULL);
 
-	if (count > 0 && ((flags & ARCHIVE_ENTRY_ACL_TYPE_ACCESS) != 0)) {
-		length += 10; /* "user::rwx\n" */
-		length += 11; /* "group::rwx\n" */
-		length += 11; /* "other::rwx\n" */
-	}
+	if (want_type == ARCHIVE_ENTRY_ACL_TYPE_POSIX1E)
+		flags |= ARCHIVE_ENTRY_ACL_STYLE_MARK_DEFAULT;
 
-	if (count == 0)
-		return (0);
+	length = archive_acl_text_len(acl, want_type, flags, 0, NULL, sc);
+
+	if (length == 0)
+		return (NULL);
+
+	if (flags & ARCHIVE_ENTRY_ACL_STYLE_SEPARATOR_COMMA)
+		separator = ',';
+	else
+		separator = '\n';
 
 	/* Now, allocate the string and actually populate it. */
-	p = acl->acl_text = (char *)malloc(length);
-	if (p == NULL)
-		return (-1);
+	p = s = (char *)malloc(length * sizeof(char));
+	if (p == NULL) {
+		if (errno == ENOMEM)
+			__archive_errx(1, "No memory");
+		return (NULL);
+	}
 	count = 0;
-	if ((flags & ARCHIVE_ENTRY_ACL_TYPE_ACCESS) != 0) {
-		append_entry(&p, NULL, ARCHIVE_ENTRY_ACL_USER_OBJ, NULL,
+
+	if ((want_type & ARCHIVE_ENTRY_ACL_TYPE_ACCESS) != 0) {
+		append_entry(&p, NULL, ARCHIVE_ENTRY_ACL_TYPE_ACCESS,
+		    ARCHIVE_ENTRY_ACL_USER_OBJ, flags, NULL,
 		    acl->mode & 0700, -1);
-		*p++ = ',';
-		append_entry(&p, NULL, ARCHIVE_ENTRY_ACL_GROUP_OBJ, NULL,
+		*p++ = separator;
+		append_entry(&p, NULL, ARCHIVE_ENTRY_ACL_TYPE_ACCESS,
+		    ARCHIVE_ENTRY_ACL_GROUP_OBJ, flags, NULL,
 		    acl->mode & 0070, -1);
-		*p++ = ',';
-		append_entry(&p, NULL, ARCHIVE_ENTRY_ACL_OTHER, NULL,
+		*p++ = separator;
+		append_entry(&p, NULL, ARCHIVE_ENTRY_ACL_TYPE_ACCESS,
+		    ARCHIVE_ENTRY_ACL_OTHER, flags, NULL,
 		    acl->mode & 0007, -1);
 		count += 3;
-
-		for (ap = acl->acl_head; ap != NULL; ap = ap->next) {
-			if ((ap->type & ARCHIVE_ENTRY_ACL_TYPE_ACCESS) == 0)
-				continue;
-			r = archive_mstring_get_mbs_l(
-			    &ap->name, &name, &len, sc);
-			if (r != 0)
-				return (-1);
-			*p++ = separator;
-			if (flags & ARCHIVE_ENTRY_ACL_STYLE_EXTRA_ID)
-				id = ap->id;
-			else
-				id = -1;
-			append_entry(&p, NULL, ap->tag, name,
-			    ap->permset, id);
-			count++;
-		}
 	}
 
-
-	if ((flags & ARCHIVE_ENTRY_ACL_TYPE_DEFAULT) != 0) {
-		if (flags & ARCHIVE_ENTRY_ACL_STYLE_MARK_DEFAULT)
+	for (ap = acl->acl_head; ap != NULL; ap = ap->next) {
+		if ((ap->type & want_type) == 0)
+			continue;
+		/*
+		 * Filemode-mapping ACL entries are stored exclusively in
+		 * ap->mode so they should not be in the list
+		 */
+		if ((ap->type == ARCHIVE_ENTRY_ACL_TYPE_ACCESS)
+		    && (ap->tag == ARCHIVE_ENTRY_ACL_USER_OBJ
+		    || ap->tag == ARCHIVE_ENTRY_ACL_GROUP_OBJ
+		    || ap->tag == ARCHIVE_ENTRY_ACL_OTHER))
+			continue;
+		if (ap->type == ARCHIVE_ENTRY_ACL_TYPE_DEFAULT &&
+		    (flags & ARCHIVE_ENTRY_ACL_STYLE_MARK_DEFAULT) != 0)
 			prefix = "default:";
 		else
 			prefix = NULL;
-		count = 0;
-		for (ap = acl->acl_head; ap != NULL; ap = ap->next) {
-			if ((ap->type & ARCHIVE_ENTRY_ACL_TYPE_DEFAULT) == 0)
-				continue;
-			r = archive_mstring_get_mbs_l(
-			    &ap->name, &name, &len, sc);
-			if (r != 0)
-				return (-1);
-			if (count > 0)
-				*p++ = separator;
-			if (flags & ARCHIVE_ENTRY_ACL_STYLE_EXTRA_ID)
-				id = ap->id;
-			else
-				id = -1;
-			append_entry(&p, prefix, ap->tag,
-			    name, ap->permset, id);
-			count ++;
+		r = archive_mstring_get_mbs_l(
+		    &ap->name, &name, &len, sc);
+		if (r != 0)
+			return (NULL);
+		if (count > 0)
+			*p++ = separator;
+		if (name == NULL ||
+		    (flags & ARCHIVE_ENTRY_ACL_STYLE_EXTRA_ID)) {
+			id = ap->id;
+		} else {
+			id = -1;
 		}
+		append_entry(&p, prefix, ap->type, ap->tag, flags, name,
+		    ap->permset, id);
+		count++;
 	}
 
-	*acl_text = acl->acl_text;
-	if (acl_text_len != NULL)
-		*acl_text_len = strlen(acl->acl_text);
-	return (0);
+	/* Add terminating character */
+	*p++ = '\0';
+
+	len = strlen(s);
+
+	if ((ssize_t)len > (length - 1))
+		__archive_errx(1, "Buffer overrun");
+
+	if (text_len != NULL)
+		*text_len = len;
+
+	return (s);
 }
 
 static void
@@ -760,9 +1015,11 @@ append_id(char **p, int id)
 }
 
 static void
-append_entry(char **p, const char *prefix, int tag,
-    const char *name, int perm, int id)
+append_entry(char **p, const char *prefix, int type,
+    int tag, int flags, const char *name, int perm, int id)
 {
+	int i;
+
 	if (prefix != NULL) {
 		strcpy(*p, prefix);
 		*p += strlen(*p);
@@ -771,6 +1028,10 @@ append_entry(char **p, const char *prefix, int tag,
 	case ARCHIVE_ENTRY_ACL_USER_OBJ:
 		name = NULL;
 		id = -1;
+		if ((type & ARCHIVE_ENTRY_ACL_TYPE_NFS4) != 0) {
+			strcpy(*p, "owner@");
+			break;
+		}
 		/* FALLTHROUGH */
 	case ARCHIVE_ENTRY_ACL_USER:
 		strcpy(*p, "user");
@@ -778,6 +1039,10 @@ append_entry(char **p, const char *prefix, int tag,
 	case ARCHIVE_ENTRY_ACL_GROUP_OBJ:
 		name = NULL;
 		id = -1;
+		if ((type & ARCHIVE_ENTRY_ACL_TYPE_NFS4) != 0) {
+			strcpy(*p, "group@");
+			break;
+		}
 		/* FALLTHROUGH */
 	case ARCHIVE_ENTRY_ACL_GROUP:
 		strcpy(*p, "group");
@@ -792,48 +1057,120 @@ append_entry(char **p, const char *prefix, int tag,
 		name = NULL;
 		id = -1;
 		break;
+	case ARCHIVE_ENTRY_ACL_EVERYONE:
+		strcpy(*p, "everyone@");
+		name = NULL;
+		id = -1;
+		break;
 	}
 	*p += strlen(*p);
 	*(*p)++ = ':';
-	if (name != NULL) {
-		strcpy(*p, name);
+	if (((type & ARCHIVE_ENTRY_ACL_TYPE_POSIX1E) != 0) ||
+	    tag == ARCHIVE_ENTRY_ACL_USER ||
+	    tag == ARCHIVE_ENTRY_ACL_GROUP) {
+		if (name != NULL) {
+			strcpy(*p, name);
+			*p += strlen(*p);
+		} else if (tag == ARCHIVE_ENTRY_ACL_USER
+		    || tag == ARCHIVE_ENTRY_ACL_GROUP) {
+			append_id(p, id);
+			if ((type & ARCHIVE_ENTRY_ACL_TYPE_NFS4) == 0)
+				id = -1;
+		}
+		/* Solaris style has no second colon after other and mask */
+		if (((flags & ARCHIVE_ENTRY_ACL_STYLE_SOLARIS) == 0)
+		    || (tag != ARCHIVE_ENTRY_ACL_OTHER
+		    && tag != ARCHIVE_ENTRY_ACL_MASK))
+			*(*p)++ = ':';
+	}
+	if ((type & ARCHIVE_ENTRY_ACL_TYPE_POSIX1E) != 0) {
+		/* POSIX.1e ACL perms */
+		*(*p)++ = (perm & 0444) ? 'r' : '-';
+		*(*p)++ = (perm & 0222) ? 'w' : '-';
+		*(*p)++ = (perm & 0111) ? 'x' : '-';
+	} else {
+		/* NFSv4 ACL perms */
+		for (i = 0; i < nfsv4_acl_perm_map_size; i++) {
+			if (perm & nfsv4_acl_perm_map[i].perm)
+				*(*p)++ = nfsv4_acl_perm_map[i].c;
+			else if ((flags & ARCHIVE_ENTRY_ACL_STYLE_COMPACT) == 0)
+				*(*p)++ = '-';
+		}
+		*(*p)++ = ':';
+		for (i = 0; i < nfsv4_acl_flag_map_size; i++) {
+			if (perm & nfsv4_acl_flag_map[i].perm)
+				*(*p)++ = nfsv4_acl_flag_map[i].c;
+			else if ((flags & ARCHIVE_ENTRY_ACL_STYLE_COMPACT) == 0)
+				*(*p)++ = '-';
+		}
+		*(*p)++ = ':';
+		switch (type) {
+		case ARCHIVE_ENTRY_ACL_TYPE_ALLOW:
+			strcpy(*p, "allow");
+			break;
+		case ARCHIVE_ENTRY_ACL_TYPE_DENY:
+			strcpy(*p, "deny");
+			break;
+		case ARCHIVE_ENTRY_ACL_TYPE_AUDIT:
+			strcpy(*p, "audit");
+			break;
+		case ARCHIVE_ENTRY_ACL_TYPE_ALARM:
+			strcpy(*p, "alarm");
+			break;
+		}
 		*p += strlen(*p);
-	} else if (tag == ARCHIVE_ENTRY_ACL_USER
-	    || tag == ARCHIVE_ENTRY_ACL_GROUP) {
-		append_id(p, id);
-		id = -1;
 	}
-	*(*p)++ = ':';
-	*(*p)++ = (perm & 0444) ? 'r' : '-';
-	*(*p)++ = (perm & 0222) ? 'w' : '-';
-	*(*p)++ = (perm & 0111) ? 'x' : '-';
 	if (id != -1) {
 		*(*p)++ = ':';
 		append_id(p, id);
 	}
-	**p = '\0';
 }
 
 /*
- * Parse a textual ACL.  This automatically recognizes and supports
- * extensions described above.  The 'type' argument is used to
- * indicate the type that should be used for any entries not
- * explicitly marked as "default:".
+ * Parse a wide ACL text string.
+ *
+ * The want_type argument may be one of the following:
+ * ARCHIVE_ENTRY_ACL_TYPE_ACCESS - text is a POSIX.1e ACL of type ACCESS
+ * ARCHIVE_ENTRY_ACL_TYPE_DEFAULT - text is a POSIX.1e ACL of type DEFAULT
+ * ARCHIVE_ENTRY_ACL_TYPE_NFS4 - text is as a NFSv4 ACL
+ *
+ * POSIX.1e ACL entries prefixed with "default:" are treated as
+ * ARCHIVE_ENTRY_ACL_TYPE_DEFAULT unless type is ARCHIVE_ENTRY_ACL_TYPE_NFS4
  */
 int
-archive_acl_parse_w(struct archive_acl *acl,
-    const wchar_t *text, int default_type)
+archive_acl_from_text_w(struct archive_acl *acl, const wchar_t *text,
+    int want_type)
 {
 	struct {
 		const wchar_t *start;
 		const wchar_t *end;
-	} field[4], name;
+	} field[6], name;
+
+	const wchar_t *s, *st;
 
-	int fields, n;
-	int type, tag, permset, id;
+	int numfields, fields, n, r, sol, ret;
+	int type, types, tag, permset, id;
+	size_t len;
 	wchar_t sep;
 
-	while (text != NULL  &&  *text != L'\0') {
+	ret = ARCHIVE_OK;
+	types = 0;
+
+	switch (want_type) {
+	case ARCHIVE_ENTRY_ACL_TYPE_POSIX1E:
+		want_type = ARCHIVE_ENTRY_ACL_TYPE_ACCESS;
+	case ARCHIVE_ENTRY_ACL_TYPE_ACCESS:
+	case ARCHIVE_ENTRY_ACL_TYPE_DEFAULT:
+		numfields = 5;
+		break;
+	case ARCHIVE_ENTRY_ACL_TYPE_NFS4:
+		numfields = 6;
+		break;
+	default:
+		return (ARCHIVE_FATAL);
+	}
+
+	while (text != NULL && *text != L'\0') {
 		/*
 		 * Parse the fields out of the next entry,
 		 * advance 'text' to start of next entry.
@@ -842,7 +1179,7 @@ archive_acl_parse_w(struct archive_acl *acl,
 		do {
 			const wchar_t *start, *end;
 			next_field_w(&text, &start, &end, &sep);
-			if (fields < 4) {
+			if (fields < numfields) {
 				field[fields].start = start;
 				field[fields].end = end;
 			}
@@ -850,78 +1187,210 @@ archive_acl_parse_w(struct archive_acl *acl,
 		} while (sep == L':');
 
 		/* Set remaining fields to blank. */
-		for (n = fields; n < 4; ++n)
+		for (n = fields; n < numfields; ++n)
 			field[n].start = field[n].end = NULL;
 
-		/* Check for a numeric ID in field 1 or 3. */
-		id = -1;
-		isint_w(field[1].start, field[1].end, &id);
-		/* Field 3 is optional. */
-		if (id == -1 && fields > 3)
-			isint_w(field[3].start, field[3].end, &id);
-
-		/*
-		 * Solaris extension:  "defaultuser::rwx" is the
-		 * default ACL corresponding to "user::rwx", etc.
-		 */
-		if (field[0].end - field[0].start > 7
-		    && wmemcmp(field[0].start, L"default", 7) == 0) {
-			type = ARCHIVE_ENTRY_ACL_TYPE_DEFAULT;
-			field[0].start += 7;
-		} else
-			type = default_type;
+		if (field[0].start != NULL && *(field[0].start) == L'#') {
+			/* Comment, skip entry */
+			continue;
+		}
 
+		n = 0;
+		sol = 0;
+		id = -1;
+		permset = 0;
 		name.start = name.end = NULL;
-		if (prefix_w(field[0].start, field[0].end, L"user")) {
-			if (!ismode_w(field[2].start, field[2].end, &permset))
-				return (ARCHIVE_WARN);
-			if (id != -1 || field[1].start < field[1].end) {
-				tag = ARCHIVE_ENTRY_ACL_USER;
-				name = field[1];
+
+		if (want_type != ARCHIVE_ENTRY_ACL_TYPE_NFS4) {
+			/* POSIX.1e ACLs */
+			/*
+			 * Default keyword "default:user::rwx"
+			 * if found, we have one more field
+			 *
+			 * We also support old Solaris extension:
+			 * "defaultuser::rwx" is the default ACL corresponding
+			 * to "user::rwx", etc. valid only for first field
+			 */
+			s = field[0].start;
+			len = field[0].end - field[0].start;
+			if (*s == L'd' && (len == 1 || (len >= 7
+			    && wmemcmp((s + 1), L"efault", 6) == 0))) {
+				type = ARCHIVE_ENTRY_ACL_TYPE_DEFAULT;
+				if (len > 7)
+					field[0].start += 7;
+				else
+					n = 1;
 			} else
-				tag = ARCHIVE_ENTRY_ACL_USER_OBJ;
-		} else if (prefix_w(field[0].start, field[0].end, L"group")) {
-			if (!ismode_w(field[2].start, field[2].end, &permset))
-				return (ARCHIVE_WARN);
-			if (id != -1 || field[1].start < field[1].end) {
-				tag = ARCHIVE_ENTRY_ACL_GROUP;
+				type = want_type;
+
+			/* Check for a numeric ID in field n+1 or n+3. */
+			isint_w(field[n + 1].start, field[n + 1].end, &id);
+			/* Field n+3 is optional. */
+			if (id == -1 && fields > n+3)
+				isint_w(field[n + 3].start, field[n + 3].end,
+				    &id);
+
+			tag = 0;
+			s = field[n].start;
+			st = field[n].start + 1;
+			len = field[n].end - field[n].start;
+
+			switch (*s) {
+			case L'u':
+				if (len == 1 || (len == 4
+				    && wmemcmp(st, L"ser", 3) == 0))
+					tag = ARCHIVE_ENTRY_ACL_USER_OBJ;
+				break;
+			case L'g':
+				if (len == 1 || (len == 5
+				    && wmemcmp(st, L"roup", 4) == 0))
+					tag = ARCHIVE_ENTRY_ACL_GROUP_OBJ;
+				break;
+			case L'o':
+				if (len == 1 || (len == 5
+				    && wmemcmp(st, L"ther", 4) == 0))
+					tag = ARCHIVE_ENTRY_ACL_OTHER;
+				break;
+			case L'm':
+				if (len == 1 || (len == 4
+				    && wmemcmp(st, L"ask", 3) == 0))
+					tag = ARCHIVE_ENTRY_ACL_MASK;
+				break;
+			default:
+					break;
+			}
+
+			switch (tag) {
+			case ARCHIVE_ENTRY_ACL_OTHER:
+			case ARCHIVE_ENTRY_ACL_MASK:
+				if (fields == (n + 2)
+				    && field[n + 1].start < field[n + 1].end
+				    && ismode_w(field[n + 1].start,
+				    field[n + 1].end, &permset)) {
+					/* This is Solaris-style "other:rwx" */
+					sol = 1;
+				} else if (fields == (n + 3) &&
+				    field[n + 1].start < field[n + 1].end) {
+					/* Invalid mask or other field */
+					ret = ARCHIVE_WARN;
+					continue;
+				}
+				break;
+			case ARCHIVE_ENTRY_ACL_USER_OBJ:
+			case ARCHIVE_ENTRY_ACL_GROUP_OBJ:
+				if (id != -1 ||
+				    field[n + 1].start < field[n + 1].end) {
+					name = field[n + 1];
+					if (tag == ARCHIVE_ENTRY_ACL_USER_OBJ)
+						tag = ARCHIVE_ENTRY_ACL_USER;
+					else
+						tag = ARCHIVE_ENTRY_ACL_GROUP;
+				}
+				break;
+			default:
+				/* Invalid tag, skip entry */
+				ret = ARCHIVE_WARN;
+				continue;
+			}
+
+			/*
+			 * Without "default:" we expect mode in field 2
+			 * Exception: Solaris other and mask fields
+			 */
+			if (permset == 0 && !ismode_w(field[n + 2 - sol].start,
+			    field[n + 2 - sol].end, &permset)) {
+				/* Invalid mode, skip entry */
+				ret = ARCHIVE_WARN;
+				continue;
+			}
+		} else {
+			/* NFS4 ACLs */
+			s = field[0].start;
+			len = field[0].end - field[0].start;
+			tag = 0;
+
+			switch (len) {
+			case 4:
+				if (wmemcmp(s, L"user", 4) == 0)
+					tag = ARCHIVE_ENTRY_ACL_USER;
+				break;
+			case 5:
+				if (wmemcmp(s, L"group", 5) == 0)
+					tag = ARCHIVE_ENTRY_ACL_GROUP;
+				break;
+			case 6:
+				if (wmemcmp(s, L"owner@", 6) == 0)
+					tag = ARCHIVE_ENTRY_ACL_USER_OBJ;
+				else if (wmemcmp(s, L"group@", len) == 0)
+					tag = ARCHIVE_ENTRY_ACL_GROUP_OBJ;
+				break;
+			case 9:
+				if (wmemcmp(s, L"everyone@", 9) == 0)
+					tag = ARCHIVE_ENTRY_ACL_EVERYONE;
+			default:
+				break;
+			}
+
+			if (tag == 0) {
+				/* Invalid tag, skip entry */
+				ret = ARCHIVE_WARN;
+				continue;
+			} else if (tag == ARCHIVE_ENTRY_ACL_USER ||
+			    tag == ARCHIVE_ENTRY_ACL_GROUP) {
+				n = 1;
 				name = field[1];
+				isint_w(name.start, name.end, &id);
 			} else
-				tag = ARCHIVE_ENTRY_ACL_GROUP_OBJ;
-		} else if (prefix_w(field[0].start, field[0].end, L"other")) {
-			if (fields == 2
-			    && field[1].start < field[1].end
-			    && ismode_w(field[1].start, field[1].end, &permset)) {
-				/* This is Solaris-style "other:rwx" */
-			} else if (fields == 3
-			    && field[1].start == field[1].end
-			    && field[2].start < field[2].end
-			    && ismode_w(field[2].start, field[2].end, &permset)) {
-				/* This is FreeBSD-style "other::rwx" */
-			} else
-				return (ARCHIVE_WARN);
-			tag = ARCHIVE_ENTRY_ACL_OTHER;
-		} else if (prefix_w(field[0].start, field[0].end, L"mask")) {
-			if (fields == 2
-			    && field[1].start < field[1].end
-			    && ismode_w(field[1].start, field[1].end, &permset)) {
-				/* This is Solaris-style "mask:rwx" */
-			} else if (fields == 3
-			    && field[1].start == field[1].end
-			    && field[2].start < field[2].end
-			    && ismode_w(field[2].start, field[2].end, &permset)) {
-				/* This is FreeBSD-style "mask::rwx" */
-			} else
-				return (ARCHIVE_WARN);
-			tag = ARCHIVE_ENTRY_ACL_MASK;
-		} else
-			return (ARCHIVE_WARN);
+				n = 0;
+
+			if (!is_nfs4_perms_w(field[1 + n].start,
+			    field[1 + n].end, &permset)) {
+				/* Invalid NFSv4 perms, skip entry */
+				ret = ARCHIVE_WARN;
+				continue;
+			}
+			if (!is_nfs4_flags_w(field[2 + n].start,
+			    field[2 + n].end, &permset)) {
+				/* Invalid NFSv4 flags, skip entry */
+				ret = ARCHIVE_WARN;
+				continue;
+			}
+			s = field[3 + n].start;
+			len = field[3 + n].end - field[3 + n].start;
+			type = 0;
+			if (len == 4) {
+				if (wmemcmp(s, L"deny", 4) == 0)
+					type = ARCHIVE_ENTRY_ACL_TYPE_DENY;
+			} else if (len == 5) {
+				if (wmemcmp(s, L"allow", 5) == 0)
+					type = ARCHIVE_ENTRY_ACL_TYPE_ALLOW;
+				else if (wmemcmp(s, L"audit", 5) == 0)
+					type = ARCHIVE_ENTRY_ACL_TYPE_AUDIT;
+				else if (wmemcmp(s, L"alarm", 5) == 0)
+					type = ARCHIVE_ENTRY_ACL_TYPE_ALARM;
+			}
+			if (type == 0) {
+				/* Invalid entry type, skip entry */
+				ret = ARCHIVE_WARN;
+				continue;
+			}
+			isint_w(field[4 + n].start, field[4 + n].end, &id);
+		}
 
 		/* Add entry to the internal list. */
-		archive_acl_add_entry_w_len(acl, type, permset,
+		r = archive_acl_add_entry_w_len(acl, type, permset,
 		    tag, id, name.start, name.end - name.start);
+		if (r < ARCHIVE_WARN)
+			return (r);
+		if (r != ARCHIVE_OK)
+			ret = ARCHIVE_WARN;
+		types |= type;
 	}
-	return (ARCHIVE_OK);
+
+	/* Reset ACL */
+	archive_acl_reset(acl, types);
+
+	return (ret);
 }
 
 /*
@@ -967,16 +1436,122 @@ ismode_w(const wchar_t *start, const wchar_t *end, int *permset)
 	*permset = 0;
 	while (p < end) {
 		switch (*p++) {
-		case 'r': case 'R':
+		case L'r': case L'R':
 			*permset |= ARCHIVE_ENTRY_ACL_READ;
 			break;
-		case 'w': case 'W':
+		case L'w': case L'W':
 			*permset |= ARCHIVE_ENTRY_ACL_WRITE;
 			break;
-		case 'x': case 'X':
+		case L'x': case L'X':
 			*permset |= ARCHIVE_ENTRY_ACL_EXECUTE;
 			break;
-		case '-':
+		case L'-':
+			break;
+		default:
+			return (0);
+		}
+	}
+	return (1);
+}
+
+/*
+ * Parse a string as a NFS4 ACL permission field.
+ * Returns true if the string is non-empty and consists only of NFS4 ACL
+ * permission characters, false otherwise
+ */
+static int
+is_nfs4_perms_w(const wchar_t *start, const wchar_t *end, int *permset)
+{
+	const wchar_t *p = start;
+
+	while (p < end) {
+		switch (*p++) {
+		case L'r':
+			*permset |= ARCHIVE_ENTRY_ACL_READ_DATA;
+			break;
+		case L'w':
+			*permset |= ARCHIVE_ENTRY_ACL_WRITE_DATA;
+			break;
+		case L'x':
+			*permset |= ARCHIVE_ENTRY_ACL_EXECUTE;
+			break;
+		case L'p':
+			*permset |= ARCHIVE_ENTRY_ACL_APPEND_DATA;
+			break;
+		case L'D':
+			*permset |= ARCHIVE_ENTRY_ACL_DELETE_CHILD;
+			break;
+		case L'd':
+			*permset |= ARCHIVE_ENTRY_ACL_DELETE;
+			break;
+		case L'a':
+			*permset |= ARCHIVE_ENTRY_ACL_READ_ATTRIBUTES;
+			break;
+		case L'A':
+			*permset |= ARCHIVE_ENTRY_ACL_WRITE_ATTRIBUTES;
+			break;
+		case L'R':
+			*permset |= ARCHIVE_ENTRY_ACL_READ_NAMED_ATTRS;
+			break;
+		case L'W':
+			*permset |= ARCHIVE_ENTRY_ACL_WRITE_NAMED_ATTRS;
+			break;
+		case L'c':
+			*permset |= ARCHIVE_ENTRY_ACL_READ_ACL;
+			break;
+		case L'C':
+			*permset |= ARCHIVE_ENTRY_ACL_WRITE_ACL;
+			break;
+		case L'o':
+			*permset |= ARCHIVE_ENTRY_ACL_WRITE_OWNER;
+			break;
+		case L's':
+			*permset |= ARCHIVE_ENTRY_ACL_SYNCHRONIZE;
+			break;
+		case L'-':
+			break;
+		default:
+			return(0);
+		}
+	}
+	return (1);
+}
+
+/*
+ * Parse a string as a NFS4 ACL flags field.
+ * Returns true if the string is non-empty and consists only of NFS4 ACL
+ * flag characters, false otherwise
+ */
+static int
+is_nfs4_flags_w(const wchar_t *start, const wchar_t *end, int *permset)
+{
+	const wchar_t *p = start;
+
+	while (p < end) {
+		switch(*p++) {
+		case L'f':
+			*permset |= ARCHIVE_ENTRY_ACL_ENTRY_FILE_INHERIT;
+			break;
+		case L'd':
+			*permset |= ARCHIVE_ENTRY_ACL_ENTRY_DIRECTORY_INHERIT;
+			break;
+		case L'i':
+			*permset |= ARCHIVE_ENTRY_ACL_ENTRY_INHERIT_ONLY;
+			break;
+		case L'n':
+			*permset |=
+			    ARCHIVE_ENTRY_ACL_ENTRY_NO_PROPAGATE_INHERIT;
+			break;
+		case L'S':
+			*permset |= ARCHIVE_ENTRY_ACL_ENTRY_SUCCESSFUL_ACCESS;
+			break;
+		case L'F':
+			*permset |= ARCHIVE_ENTRY_ACL_ENTRY_FAILED_ACCESS;
+			break;
+		case L'I':
+			*permset |= ARCHIVE_ENTRY_ACL_ENTRY_INHERITED;
+			break;
+		case L'-':
 			break;
 		default:
 			return (0);
@@ -1023,46 +1598,48 @@ next_field_w(const wchar_t **wp, const wchar_t **start,
 }
 
 /*
- * Return true if the characters [start...end) are a prefix of 'test'.
- * This makes it easy to handle the obvious abbreviations: 'u' for 'user', etc.
- */
-static int
-prefix_w(const wchar_t *start, const wchar_t *end, const wchar_t *test)
-{
-	if (start == end)
-		return (0);
-
-	if (*start++ != *test++)
-		return (0);
-
-	while (start < end  &&  *start++ == *test++)
-		;
-
-	if (start < end)
-		return (0);
-
-	return (1);
-}
-
-/*
- * Parse a textual ACL.  This automatically recognizes and supports
- * extensions described above.  The 'type' argument is used to
- * indicate the type that should be used for any entries not
- * explicitly marked as "default:".
+ * Parse an ACL text string.
+ *
+ * The want_type argument may be one of the following:
+ * ARCHIVE_ENTRY_ACL_TYPE_ACCESS - text is a POSIX.1e ACL of type ACCESS
+ * ARCHIVE_ENTRY_ACL_TYPE_DEFAULT - text is a POSIX.1e ACL of type DEFAULT
+ * ARCHIVE_ENTRY_ACL_TYPE_NFS4 - text is as a NFSv4 ACL
+ *
+ * POSIX.1e ACL entries prefixed with "default:" are treated as
+ * ARCHIVE_ENTRY_ACL_TYPE_DEFAULT unless type is ARCHIVE_ENTRY_ACL_TYPE_NFS4
  */
 int
-archive_acl_parse_l(struct archive_acl *acl,
-    const char *text, int default_type, struct archive_string_conv *sc)
+archive_acl_from_text_l(struct archive_acl *acl, const char *text,
+    int want_type, struct archive_string_conv *sc)
 {
 	struct {
 		const char *start;
 		const char *end;
-	} field[4], name;
+	} field[6], name;
 
-	int fields, n, r, ret = ARCHIVE_OK;
-	int type, tag, permset, id;
+	const char *s, *st;
+	int numfields, fields, n, r, sol, ret;
+	int type, types, tag, permset, id;
+	size_t len;
 	char sep;
 
+	switch (want_type) {
+	case ARCHIVE_ENTRY_ACL_TYPE_POSIX1E:
+		want_type = ARCHIVE_ENTRY_ACL_TYPE_ACCESS;
+	case ARCHIVE_ENTRY_ACL_TYPE_ACCESS:
+	case ARCHIVE_ENTRY_ACL_TYPE_DEFAULT:
+		numfields = 5;
+		break;
+	case ARCHIVE_ENTRY_ACL_TYPE_NFS4:
+		numfields = 6;
+		break;
+	default:
+		return (ARCHIVE_FATAL);
+	}
+
+	ret = ARCHIVE_OK;
+	types = 0;
+
 	while (text != NULL  &&  *text != '\0') {
 		/*
 		 * Parse the fields out of the next entry,
@@ -1072,7 +1649,7 @@ archive_acl_parse_l(struct archive_acl *acl,
 		do {
 			const char *start, *end;
 			next_field(&text, &start, &end, &sep);
-			if (fields < 4) {
+			if (fields < numfields) {
 				field[fields].start = start;
 				field[fields].end = end;
 			}
@@ -1080,72 +1657,197 @@ archive_acl_parse_l(struct archive_acl *acl,
 		} while (sep == ':');
 
 		/* Set remaining fields to blank. */
-		for (n = fields; n < 4; ++n)
+		for (n = fields; n < numfields; ++n)
 			field[n].start = field[n].end = NULL;
 
-		/* Check for a numeric ID in field 1 or 3. */
-		id = -1;
-		isint(field[1].start, field[1].end, &id);
-		/* Field 3 is optional. */
-		if (id == -1 && fields > 3)
-			isint(field[3].start, field[3].end, &id);
-
-		/*
-		 * Solaris extension:  "defaultuser::rwx" is the
-		 * default ACL corresponding to "user::rwx", etc.
-		 */
-		if (field[0].end - field[0].start > 7
-		    && memcmp(field[0].start, "default", 7) == 0) {
-			type = ARCHIVE_ENTRY_ACL_TYPE_DEFAULT;
-			field[0].start += 7;
-		} else
-			type = default_type;
+		if (field[0].start != NULL && *(field[0].start) == '#') {
+			/* Comment, skip entry */
+			continue;
+		}
 
+		n = 0;
+		sol = 0;
+		id = -1;
+		permset = 0;
 		name.start = name.end = NULL;
-		if (prefix_c(field[0].start, field[0].end, "user")) {
-			if (!ismode(field[2].start, field[2].end, &permset))
-				return (ARCHIVE_WARN);
-			if (id != -1 || field[1].start < field[1].end) {
-				tag = ARCHIVE_ENTRY_ACL_USER;
-				name = field[1];
+
+		if (want_type != ARCHIVE_ENTRY_ACL_TYPE_NFS4) {
+			/* POSIX.1e ACLs */
+			/*
+			 * Default keyword "default:user::rwx"
+			 * if found, we have one more field
+			 *
+			 * We also support old Solaris extension:
+			 * "defaultuser::rwx" is the default ACL corresponding
+			 * to "user::rwx", etc. valid only for first field
+			 */
+			s = field[0].start;
+			len = field[0].end - field[0].start;
+			if (*s == 'd' && (len == 1 || (len >= 7
+			    && memcmp((s + 1), "efault", 6) == 0))) {
+				type = ARCHIVE_ENTRY_ACL_TYPE_DEFAULT;
+				if (len > 7)
+					field[0].start += 7;
+				else
+					n = 1;
 			} else
-				tag = ARCHIVE_ENTRY_ACL_USER_OBJ;
-		} else if (prefix_c(field[0].start, field[0].end, "group")) {
-			if (!ismode(field[2].start, field[2].end, &permset))
-				return (ARCHIVE_WARN);
-			if (id != -1 || field[1].start < field[1].end) {
-				tag = ARCHIVE_ENTRY_ACL_GROUP;
+				type = want_type;
+
+			/* Check for a numeric ID in field n+1 or n+3. */
+			isint(field[n + 1].start, field[n + 1].end, &id);
+			/* Field n+3 is optional. */
+			if (id == -1 && fields > (n + 3))
+				isint(field[n + 3].start, field[n + 3].end,
+				    &id);
+
+			tag = 0;
+			s = field[n].start;
+			st = field[n].start + 1;
+			len = field[n].end - field[n].start;
+
+			switch (*s) {
+			case 'u':
+				if (len == 1 || (len == 4
+				    && memcmp(st, "ser", 3) == 0))
+					tag = ARCHIVE_ENTRY_ACL_USER_OBJ;
+				break;
+			case 'g':
+				if (len == 1 || (len == 5
+				    && memcmp(st, "roup", 4) == 0))
+					tag = ARCHIVE_ENTRY_ACL_GROUP_OBJ;
+				break;
+			case 'o':
+				if (len == 1 || (len == 5
+				    && memcmp(st, "ther", 4) == 0))
+					tag = ARCHIVE_ENTRY_ACL_OTHER;
+				break;
+			case 'm':
+				if (len == 1 || (len == 4
+				    && memcmp(st, "ask", 3) == 0))
+					tag = ARCHIVE_ENTRY_ACL_MASK;
+				break;
+			default:
+					break;
+			}
+
+			switch (tag) {
+			case ARCHIVE_ENTRY_ACL_OTHER:
+			case ARCHIVE_ENTRY_ACL_MASK:
+				if (fields == (n + 2)
+				    && field[n + 1].start < field[n + 1].end
+				    && ismode(field[n + 1].start,
+				    field[n + 1].end, &permset)) {
+					/* This is Solaris-style "other:rwx" */
+					sol = 1;
+				} else if (fields == (n + 3) &&
+				    field[n + 1].start < field[n + 1].end) {
+					/* Invalid mask or other field */
+					ret = ARCHIVE_WARN;
+					continue;
+				}
+				break;
+			case ARCHIVE_ENTRY_ACL_USER_OBJ:
+			case ARCHIVE_ENTRY_ACL_GROUP_OBJ:
+				if (id != -1 ||
+				    field[n + 1].start < field[n + 1].end) {
+					name = field[n + 1];
+					if (tag == ARCHIVE_ENTRY_ACL_USER_OBJ)
+						tag = ARCHIVE_ENTRY_ACL_USER;
+					else
+						tag = ARCHIVE_ENTRY_ACL_GROUP;
+				}
+				break;
+			default:
+				/* Invalid tag, skip entry */
+				ret = ARCHIVE_WARN;
+				continue;
+			}
+
+			/*
+			 * Without "default:" we expect mode in field 3
+			 * Exception: Solaris other and mask fields
+			 */
+			if (permset == 0 && !ismode(field[n + 2 - sol].start,
+			    field[n + 2 - sol].end, &permset)) {
+				/* Invalid mode, skip entry */
+				ret = ARCHIVE_WARN;
+				continue;
+			}
+		} else {
+			/* NFS4 ACLs */
+			s = field[0].start;
+			len = field[0].end - field[0].start;
+			tag = 0;
+
+			switch (len) {
+			case 4:
+				if (memcmp(s, "user", 4) == 0)
+					tag = ARCHIVE_ENTRY_ACL_USER;
+				break;
+			case 5:
+				if (memcmp(s, "group", 5) == 0)
+					tag = ARCHIVE_ENTRY_ACL_GROUP;
+				break;
+			case 6:
+				if (memcmp(s, "owner@", 6) == 0)
+					tag = ARCHIVE_ENTRY_ACL_USER_OBJ;
+				else if (memcmp(s, "group@", 6) == 0)
+					tag = ARCHIVE_ENTRY_ACL_GROUP_OBJ;
+				break;
+			case 9:
+				if (memcmp(s, "everyone@", 9) == 0)
+					tag = ARCHIVE_ENTRY_ACL_EVERYONE;
+				break;
+			default:
+				break;
+			}
+
+			if (tag == 0) {
+				/* Invalid tag, skip entry */
+				ret = ARCHIVE_WARN;
+				continue;
+			} else if (tag == ARCHIVE_ENTRY_ACL_USER ||
+			    tag == ARCHIVE_ENTRY_ACL_GROUP) {
+				n = 1;
 				name = field[1];
+				isint(name.start, name.end, &id);
 			} else
-				tag = ARCHIVE_ENTRY_ACL_GROUP_OBJ;
-		} else if (prefix_c(field[0].start, field[0].end, "other")) {
-			if (fields == 2
-			    && field[1].start < field[1].end
-			    && ismode(field[1].start, field[1].end, &permset)) {
-				/* This is Solaris-style "other:rwx" */
-			} else if (fields == 3
-			    && field[1].start == field[1].end
-			    && field[2].start < field[2].end
-			    && ismode(field[2].start, field[2].end, &permset)) {
-				/* This is FreeBSD-style "other::rwx" */
-			} else
-				return (ARCHIVE_WARN);
-			tag = ARCHIVE_ENTRY_ACL_OTHER;
-		} else if (prefix_c(field[0].start, field[0].end, "mask")) {
-			if (fields == 2
-			    && field[1].start < field[1].end
-			    && ismode(field[1].start, field[1].end, &permset)) {
-				/* This is Solaris-style "mask:rwx" */
-			} else if (fields == 3
-			    && field[1].start == field[1].end
-			    && field[2].start < field[2].end
-			    && ismode(field[2].start, field[2].end, &permset)) {
-				/* This is FreeBSD-style "mask::rwx" */
-			} else
-				return (ARCHIVE_WARN);
-			tag = ARCHIVE_ENTRY_ACL_MASK;
-		} else
-			return (ARCHIVE_WARN);
+				n = 0;
+
+			if (!is_nfs4_perms(field[1 + n].start,
+			    field[1 + n].end, &permset)) {
+				/* Invalid NFSv4 perms, skip entry */
+				ret = ARCHIVE_WARN;
+				continue;
+			}
+			if (!is_nfs4_flags(field[2 + n].start,
+			    field[2 + n].end, &permset)) {
+				/* Invalid NFSv4 flags, skip entry */
+				ret = ARCHIVE_WARN;
+				continue;
+			}
+			s = field[3 + n].start;
+			len = field[3 + n].end - field[3 + n].start;
+			type = 0;
+			if (len == 4) {
+				if (memcmp(s, "deny", 4) == 0)
+					type = ARCHIVE_ENTRY_ACL_TYPE_DENY;
+			} else if (len == 5) {
+				if (memcmp(s, "allow", 5) == 0)
+					type = ARCHIVE_ENTRY_ACL_TYPE_ALLOW;
+				else if (memcmp(s, "audit", 5) == 0)
+					type = ARCHIVE_ENTRY_ACL_TYPE_AUDIT;
+				else if (memcmp(s, "alarm", 5) == 0)
+					type = ARCHIVE_ENTRY_ACL_TYPE_ALARM;
+			}
+			if (type == 0) {
+				/* Invalid entry type, skip entry */
+				ret = ARCHIVE_WARN;
+				continue;
+			}
+			isint(field[4 + n].start, field[4 + n].end,
+			    &id);
+		}
 
 		/* Add entry to the internal list. */
 		r = archive_acl_add_entry_len_l(acl, type, permset,
@@ -1154,7 +1856,12 @@ archive_acl_parse_l(struct archive_acl *acl,
 			return (r);
 		if (r != ARCHIVE_OK)
 			ret = ARCHIVE_WARN;
+		types |= type;
 	}
+
+	/* Reset ACL */
+	archive_acl_reset(acl, types);
+
 	return (ret);
 }
 
@@ -1220,6 +1927,112 @@ ismode(const char *start, const char *end, int *permset)
 }
 
 /*
+ * Parse a string as a NFS4 ACL permission field.
+ * Returns true if the string is non-empty and consists only of NFS4 ACL
+ * permission characters, false otherwise
+ */
+static int
+is_nfs4_perms(const char *start, const char *end, int *permset)
+{
+	const char *p = start;
+
+	while (p < end) {
+		switch (*p++) {
+		case 'r':
+			*permset |= ARCHIVE_ENTRY_ACL_READ_DATA;
+			break;
+		case 'w':
+			*permset |= ARCHIVE_ENTRY_ACL_WRITE_DATA;
+			break;
+		case 'x':
+			*permset |= ARCHIVE_ENTRY_ACL_EXECUTE;
+			break;
+		case 'p':
+			*permset |= ARCHIVE_ENTRY_ACL_APPEND_DATA;
+			break;
+		case 'D':
+			*permset |= ARCHIVE_ENTRY_ACL_DELETE_CHILD;
+			break;
+		case 'd':
+			*permset |= ARCHIVE_ENTRY_ACL_DELETE;
+			break;
+		case 'a':
+			*permset |= ARCHIVE_ENTRY_ACL_READ_ATTRIBUTES;
+			break;
+		case 'A':
+			*permset |= ARCHIVE_ENTRY_ACL_WRITE_ATTRIBUTES;
+			break;
+		case 'R':
+			*permset |= ARCHIVE_ENTRY_ACL_READ_NAMED_ATTRS;
+			break;
+		case 'W':
+			*permset |= ARCHIVE_ENTRY_ACL_WRITE_NAMED_ATTRS;
+			break;
+		case 'c':
+			*permset |= ARCHIVE_ENTRY_ACL_READ_ACL;
+			break;
+		case 'C':
+			*permset |= ARCHIVE_ENTRY_ACL_WRITE_ACL;
+			break;
+		case 'o':
+			*permset |= ARCHIVE_ENTRY_ACL_WRITE_OWNER;
+			break;
+		case 's':
+			*permset |= ARCHIVE_ENTRY_ACL_SYNCHRONIZE;
+			break;
+		case '-':
+			break;
+		default:
+			return(0);
+		}
+	}
+	return (1);
+}
+
+/*
+ * Parse a string as a NFS4 ACL flags field.
+ * Returns true if the string is non-empty and consists only of NFS4 ACL
+ * flag characters, false otherwise
+ */
+static int
+is_nfs4_flags(const char *start, const char *end, int *permset)
+{
+	const char *p = start;
+
+	while (p < end) {
+		switch(*p++) {
+		case 'f':
+			*permset |= ARCHIVE_ENTRY_ACL_ENTRY_FILE_INHERIT;
+			break;
+		case 'd':
+			*permset |= ARCHIVE_ENTRY_ACL_ENTRY_DIRECTORY_INHERIT;
+			break;
+		case 'i':
+			*permset |= ARCHIVE_ENTRY_ACL_ENTRY_INHERIT_ONLY;
+			break;
+		case 'n':
+			*permset |=
+			    ARCHIVE_ENTRY_ACL_ENTRY_NO_PROPAGATE_INHERIT;
+			break;
+		case 'S':
+			*permset |= ARCHIVE_ENTRY_ACL_ENTRY_SUCCESSFUL_ACCESS;
+			break;
+		case 'F':
+			*permset |= ARCHIVE_ENTRY_ACL_ENTRY_FAILED_ACCESS;
+			break;
+		case 'I':
+			*permset |= ARCHIVE_ENTRY_ACL_ENTRY_INHERITED;
+			break;
+		case '-':
+			break;
+		default:
+			return (0);
+		}
+	}
+	return (1);
+}
+
+/*
  * Match "[:whitespace:]*(.*)[:whitespace:]*[:,\n]".  *wp is updated
  * to point to just after the separator.  *start points to the first
  * character of the matched text and *end just after the last
@@ -1254,25 +2067,3 @@ next_field(const char **p, const char **start,
 	if (**p != '\0')
 		(*p)++;
 }
-
-/*
- * Return true if the characters [start...end) are a prefix of 'test'.
- * This makes it easy to handle the obvious abbreviations: 'u' for 'user', etc.
- */
-static int
-prefix_c(const char *start, const char *end, const char *test)
-{
-	if (start == end)
-		return (0);
-
-	if (*start++ != *test++)
-		return (0);
-
-	while (start < end  &&  *start++ == *test++)
-		;
-
-	if (start < end)
-		return (0);
-
-	return (1);
-}
diff --git a/libarchive/archive_acl_private.h b/libarchive/archive_acl_private.h
index 1421adb..ef0b023 100644
--- a/libarchive/archive_acl_private.h
+++ b/libarchive/archive_acl_private.h
@@ -56,6 +56,7 @@ struct archive_acl {
 void archive_acl_clear(struct archive_acl *);
 void archive_acl_copy(struct archive_acl *, struct archive_acl *);
 int archive_acl_count(struct archive_acl *, int);
+int archive_acl_types(struct archive_acl *);
 int archive_acl_reset(struct archive_acl *, int);
 int archive_acl_next(struct archive *, struct archive_acl *, int,
     int *, int *, int *, int *, const char **);
@@ -66,22 +67,17 @@ int archive_acl_add_entry_w_len(struct archive_acl *,
 int archive_acl_add_entry_len(struct archive_acl *,
     int, int, int, int, const char *, size_t);
 
-const wchar_t *archive_acl_text_w(struct archive *, struct archive_acl *, int);
-int archive_acl_text_l(struct archive_acl *, int, const char **, size_t *,
+wchar_t *archive_acl_to_text_w(struct archive_acl *, ssize_t *, int,
+    struct archive *);
+char *archive_acl_to_text_l(struct archive_acl *, ssize_t *, int,
     struct archive_string_conv *);
 
 /*
- * Private ACL parser.  This is private because it handles some
- * very weird formats that clients should not be messing with.
- * Clients should only deal with their platform-native formats.
- * Because of the need to support many formats cleanly, new arguments
- * are likely to get added on a regular basis.  Clients who try to use
- * this interface are likely to be surprised when it changes.
+ * ACL text parser.
  */
-int archive_acl_parse_w(struct archive_acl *,
-		    const wchar_t *, int /* type */);
-int archive_acl_parse_l(struct archive_acl *,
-		    const char *, int /* type */,
-		    struct archive_string_conv *);
+int archive_acl_from_text_w(struct archive_acl *, const wchar_t * /* wtext */,
+    int /* type */);
+int archive_acl_from_text_l(struct archive_acl *, const char * /* text */,
+    int /* type */, struct archive_string_conv *);
 
 #endif /* ARCHIVE_ENTRY_PRIVATE_H_INCLUDED */
diff --git a/libarchive/archive_cryptor.c b/libarchive/archive_cryptor.c
index 0be30c6..ced52fd 100644
--- a/libarchive/archive_cryptor.c
+++ b/libarchive/archive_cryptor.c
@@ -302,6 +302,8 @@ aes_ctr_release(archive_crypto_ctx *ctx)
 static int
 aes_ctr_init(archive_crypto_ctx *ctx, const uint8_t *key, size_t key_len)
 {
+	if ((ctx->ctx = EVP_CIPHER_CTX_new()) == NULL)
+		return -1;
 
 	switch (key_len) {
 	case 16: ctx->type = EVP_aes_128_ecb(); break;
@@ -314,7 +316,7 @@ aes_ctr_init(archive_crypto_ctx *ctx, const uint8_t *key, size_t key_len)
 	memcpy(ctx->key, key, key_len);
 	memset(ctx->nonce, 0, sizeof(ctx->nonce));
 	ctx->encr_pos = AES_BLOCK_SIZE;
-	EVP_CIPHER_CTX_init(&ctx->ctx);
+	EVP_CIPHER_CTX_init(ctx->ctx);
 	return 0;
 }
 
@@ -324,10 +326,10 @@ aes_ctr_encrypt_counter(archive_crypto_ctx *ctx)
 	int outl = 0;
 	int r;
 
-	r = EVP_EncryptInit_ex(&ctx->ctx, ctx->type, NULL, ctx->key, NULL);
+	r = EVP_EncryptInit_ex(ctx->ctx, ctx->type, NULL, ctx->key, NULL);
 	if (r == 0)
 		return -1;
-	r = EVP_EncryptUpdate(&ctx->ctx, ctx->encr_buf, &outl, ctx->nonce,
+	r = EVP_EncryptUpdate(ctx->ctx, ctx->encr_buf, &outl, ctx->nonce,
 	    AES_BLOCK_SIZE);
 	if (r == 0 || outl != AES_BLOCK_SIZE)
 		return -1;
@@ -337,7 +339,7 @@ aes_ctr_encrypt_counter(archive_crypto_ctx *ctx)
 static int
 aes_ctr_release(archive_crypto_ctx *ctx)
 {
-	EVP_CIPHER_CTX_cleanup(&ctx->ctx);
+	EVP_CIPHER_CTX_free(ctx->ctx);
 	memset(ctx->key, 0, ctx->key_len);
 	memset(ctx->nonce, 0, sizeof(ctx->nonce));
 	return 0;
diff --git a/libarchive/archive_cryptor_private.h b/libarchive/archive_cryptor_private.h
index 37eaad3..0ca544b 100644
--- a/libarchive/archive_cryptor_private.h
+++ b/libarchive/archive_cryptor_private.h
@@ -99,12 +99,12 @@ typedef struct {
 } archive_crypto_ctx;
 
 #elif defined(HAVE_LIBCRYPTO)
-#include <openssl/evp.h>
+#include "archive_openssl_evp_private.h"
 #define AES_BLOCK_SIZE	16
 #define AES_MAX_KEY_SIZE 32
 
 typedef struct {
-	EVP_CIPHER_CTX	ctx;
+	EVP_CIPHER_CTX	*ctx;
 	const EVP_CIPHER *type;
 	uint8_t		key[AES_MAX_KEY_SIZE];
 	unsigned	key_len;
diff --git a/libarchive/archive_digest.c b/libarchive/archive_digest.c
index f009d31..4153923 100644
--- a/libarchive/archive_digest.c
+++ b/libarchive/archive_digest.c
@@ -207,7 +207,9 @@ __archive_nettle_md5final(archive_md5_ctx *ctx, void *md)
 static int
 __archive_openssl_md5init(archive_md5_ctx *ctx)
 {
-  EVP_DigestInit(ctx, EVP_md5());
+  if ((*ctx = EVP_MD_CTX_new()) == NULL)
+	return (ARCHIVE_FAILED);
+  EVP_DigestInit(*ctx, EVP_md5());
   return (ARCHIVE_OK);
 }
 
@@ -215,7 +217,7 @@ static int
 __archive_openssl_md5update(archive_md5_ctx *ctx, const void *indata,
     size_t insize)
 {
-  EVP_DigestUpdate(ctx, indata, insize);
+  EVP_DigestUpdate(*ctx, indata, insize);
   return (ARCHIVE_OK);
 }
 
@@ -226,8 +228,11 @@ __archive_openssl_md5final(archive_md5_ctx *ctx, void *md)
    * this is meant to cope with that. Real fix is probably to fix
    * archive_write_set_format_xar.c
    */
-  if (ctx->digest)
-    EVP_DigestFinal(ctx, md, NULL);
+  if (*ctx) {
+    EVP_DigestFinal(*ctx, md, NULL);
+    EVP_MD_CTX_free(*ctx);
+    *ctx = NULL;
+  }
   return (ARCHIVE_OK);
 }
 
@@ -359,7 +364,9 @@ __archive_nettle_ripemd160final(archive_rmd160_ctx *ctx, void *md)
 static int
 __archive_openssl_ripemd160init(archive_rmd160_ctx *ctx)
 {
-  EVP_DigestInit(ctx, EVP_ripemd160());
+  if ((*ctx = EVP_MD_CTX_new()) == NULL)
+	return (ARCHIVE_FAILED);
+  EVP_DigestInit(*ctx, EVP_ripemd160());
   return (ARCHIVE_OK);
 }
 
@@ -367,14 +374,18 @@ static int
 __archive_openssl_ripemd160update(archive_rmd160_ctx *ctx, const void *indata,
     size_t insize)
 {
-  EVP_DigestUpdate(ctx, indata, insize);
+  EVP_DigestUpdate(*ctx, indata, insize);
   return (ARCHIVE_OK);
 }
 
 static int
 __archive_openssl_ripemd160final(archive_rmd160_ctx *ctx, void *md)
 {
-  EVP_DigestFinal(ctx, md, NULL);
+  if (*ctx) {
+    EVP_DigestFinal(*ctx, md, NULL);
+    EVP_MD_CTX_free(*ctx);
+    *ctx = NULL;
+  }
   return (ARCHIVE_OK);
 }
 
@@ -509,7 +520,9 @@ __archive_nettle_sha1final(archive_sha1_ctx *ctx, void *md)
 static int
 __archive_openssl_sha1init(archive_sha1_ctx *ctx)
 {
-  EVP_DigestInit(ctx, EVP_sha1());
+  if ((*ctx = EVP_MD_CTX_new()) == NULL)
+	return (ARCHIVE_FAILED);
+  EVP_DigestInit(*ctx, EVP_sha1());
   return (ARCHIVE_OK);
 }
 
@@ -517,7 +530,7 @@ static int
 __archive_openssl_sha1update(archive_sha1_ctx *ctx, const void *indata,
     size_t insize)
 {
-  EVP_DigestUpdate(ctx, indata, insize);
+  EVP_DigestUpdate(*ctx, indata, insize);
   return (ARCHIVE_OK);
 }
 
@@ -528,8 +541,11 @@ __archive_openssl_sha1final(archive_sha1_ctx *ctx, void *md)
    * this is meant to cope with that. Real fix is probably to fix
    * archive_write_set_format_xar.c
    */
-  if (ctx->digest)
-    EVP_DigestFinal(ctx, md, NULL);
+  if (*ctx) {
+    EVP_DigestFinal(*ctx, md, NULL);
+    EVP_MD_CTX_free(*ctx);
+    *ctx = NULL;
+  }
   return (ARCHIVE_OK);
 }
 
@@ -733,7 +749,9 @@ __archive_nettle_sha256final(archive_sha256_ctx *ctx, void *md)
 static int
 __archive_openssl_sha256init(archive_sha256_ctx *ctx)
 {
-  EVP_DigestInit(ctx, EVP_sha256());
+  if ((*ctx = EVP_MD_CTX_new()) == NULL)
+	return (ARCHIVE_FAILED);
+  EVP_DigestInit(*ctx, EVP_sha256());
   return (ARCHIVE_OK);
 }
 
@@ -741,14 +759,18 @@ static int
 __archive_openssl_sha256update(archive_sha256_ctx *ctx, const void *indata,
     size_t insize)
 {
-  EVP_DigestUpdate(ctx, indata, insize);
+  EVP_DigestUpdate(*ctx, indata, insize);
   return (ARCHIVE_OK);
 }
 
 static int
 __archive_openssl_sha256final(archive_sha256_ctx *ctx, void *md)
 {
-  EVP_DigestFinal(ctx, md, NULL);
+  if (*ctx) {
+    EVP_DigestFinal(*ctx, md, NULL);
+    EVP_MD_CTX_free(*ctx);
+    *ctx = NULL;
+  }
   return (ARCHIVE_OK);
 }
 
@@ -928,7 +950,9 @@ __archive_nettle_sha384final(archive_sha384_ctx *ctx, void *md)
 static int
 __archive_openssl_sha384init(archive_sha384_ctx *ctx)
 {
-  EVP_DigestInit(ctx, EVP_sha384());
+  if ((*ctx = EVP_MD_CTX_new()) == NULL)
+	return (ARCHIVE_FAILED);
+  EVP_DigestInit(*ctx, EVP_sha384());
   return (ARCHIVE_OK);
 }
 
@@ -936,14 +960,18 @@ static int
 __archive_openssl_sha384update(archive_sha384_ctx *ctx, const void *indata,
     size_t insize)
 {
-  EVP_DigestUpdate(ctx, indata, insize);
+  EVP_DigestUpdate(*ctx, indata, insize);
   return (ARCHIVE_OK);
 }
 
 static int
 __archive_openssl_sha384final(archive_sha384_ctx *ctx, void *md)
 {
-  EVP_DigestFinal(ctx, md, NULL);
+  if (*ctx) {
+    EVP_DigestFinal(*ctx, md, NULL);
+    EVP_MD_CTX_free(*ctx);
+    *ctx = NULL;
+  }
   return (ARCHIVE_OK);
 }
 
@@ -1147,7 +1175,9 @@ __archive_nettle_sha512final(archive_sha512_ctx *ctx, void *md)
 static int
 __archive_openssl_sha512init(archive_sha512_ctx *ctx)
 {
-  EVP_DigestInit(ctx, EVP_sha512());
+  if ((*ctx = EVP_MD_CTX_new()) == NULL)
+	return (ARCHIVE_FAILED);
+  EVP_DigestInit(*ctx, EVP_sha512());
   return (ARCHIVE_OK);
 }
 
@@ -1155,14 +1185,18 @@ static int
 __archive_openssl_sha512update(archive_sha512_ctx *ctx, const void *indata,
     size_t insize)
 {
-  EVP_DigestUpdate(ctx, indata, insize);
+  EVP_DigestUpdate(*ctx, indata, insize);
   return (ARCHIVE_OK);
 }
 
 static int
 __archive_openssl_sha512final(archive_sha512_ctx *ctx, void *md)
 {
-  EVP_DigestFinal(ctx, md, NULL);
+  if (*ctx) {
+    EVP_DigestFinal(*ctx, md, NULL);
+    EVP_MD_CTX_free(*ctx);
+    *ctx = NULL;
+  }
   return (ARCHIVE_OK);
 }
 
diff --git a/libarchive/archive_digest_private.h b/libarchive/archive_digest_private.h
index 77fad58..b58ffb3 100644
--- a/libarchive/archive_digest_private.h
+++ b/libarchive/archive_digest_private.h
@@ -134,7 +134,7 @@
   defined(ARCHIVE_CRYPTO_SHA384_OPENSSL) ||\
   defined(ARCHIVE_CRYPTO_SHA512_OPENSSL)
 #define	ARCHIVE_CRYPTO_OPENSSL 1
-#include <openssl/evp.h>
+#include "archive_openssl_evp_private.h"
 #endif
 
 /* Windows crypto headers */
@@ -161,7 +161,7 @@ typedef CC_MD5_CTX archive_md5_ctx;
 #elif defined(ARCHIVE_CRYPTO_MD5_NETTLE)
 typedef struct md5_ctx archive_md5_ctx;
 #elif defined(ARCHIVE_CRYPTO_MD5_OPENSSL)
-typedef EVP_MD_CTX archive_md5_ctx;
+typedef EVP_MD_CTX *archive_md5_ctx;
 #elif defined(ARCHIVE_CRYPTO_MD5_WIN)
 typedef Digest_CTX archive_md5_ctx;
 #else
@@ -175,7 +175,7 @@ typedef RIPEMD160_CTX archive_rmd160_ctx;
 #elif defined(ARCHIVE_CRYPTO_RMD160_NETTLE)
 typedef struct ripemd160_ctx archive_rmd160_ctx;
 #elif defined(ARCHIVE_CRYPTO_RMD160_OPENSSL)
-typedef EVP_MD_CTX archive_rmd160_ctx;
+typedef EVP_MD_CTX *archive_rmd160_ctx;
 #else
 typedef unsigned char archive_rmd160_ctx;
 #endif
@@ -189,7 +189,7 @@ typedef CC_SHA1_CTX archive_sha1_ctx;
 #elif defined(ARCHIVE_CRYPTO_SHA1_NETTLE)
 typedef struct sha1_ctx archive_sha1_ctx;
 #elif defined(ARCHIVE_CRYPTO_SHA1_OPENSSL)
-typedef EVP_MD_CTX archive_sha1_ctx;
+typedef EVP_MD_CTX *archive_sha1_ctx;
 #elif defined(ARCHIVE_CRYPTO_SHA1_WIN)
 typedef Digest_CTX archive_sha1_ctx;
 #else
@@ -209,7 +209,7 @@ typedef CC_SHA256_CTX archive_sha256_ctx;
 #elif defined(ARCHIVE_CRYPTO_SHA256_NETTLE)
 typedef struct sha256_ctx archive_sha256_ctx;
 #elif defined(ARCHIVE_CRYPTO_SHA256_OPENSSL)
-typedef EVP_MD_CTX archive_sha256_ctx;
+typedef EVP_MD_CTX *archive_sha256_ctx;
 #elif defined(ARCHIVE_CRYPTO_SHA256_WIN)
 typedef Digest_CTX archive_sha256_ctx;
 #else
@@ -227,7 +227,7 @@ typedef CC_SHA512_CTX archive_sha384_ctx;
 #elif defined(ARCHIVE_CRYPTO_SHA384_NETTLE)
 typedef struct sha384_ctx archive_sha384_ctx;
 #elif defined(ARCHIVE_CRYPTO_SHA384_OPENSSL)
-typedef EVP_MD_CTX archive_sha384_ctx;
+typedef EVP_MD_CTX *archive_sha384_ctx;
 #elif defined(ARCHIVE_CRYPTO_SHA384_WIN)
 typedef Digest_CTX archive_sha384_ctx;
 #else
@@ -247,7 +247,7 @@ typedef CC_SHA512_CTX archive_sha512_ctx;
 #elif defined(ARCHIVE_CRYPTO_SHA512_NETTLE)
 typedef struct sha512_ctx archive_sha512_ctx;
 #elif defined(ARCHIVE_CRYPTO_SHA512_OPENSSL)
-typedef EVP_MD_CTX archive_sha512_ctx;
+typedef EVP_MD_CTX *archive_sha512_ctx;
 #elif defined(ARCHIVE_CRYPTO_SHA512_WIN)
 typedef Digest_CTX archive_sha512_ctx;
 #else
diff --git a/libarchive/archive_entry.c b/libarchive/archive_entry.c
index 4ac1966..d4f061b 100644
--- a/libarchive/archive_entry.c
+++ b/libarchive/archive_entry.c
@@ -1,5 +1,6 @@
 /*-
  * Copyright (c) 2003-2007 Tim Kientzle
+ * Copyright (c) 2016 Martin Matuska
  * All rights reserved.
  *
  * Redistribution and use in source and binary forms, with or without
@@ -248,10 +249,9 @@ archive_entry_new2(struct archive *a)
 {
 	struct archive_entry *entry;
 
-	entry = (struct archive_entry *)malloc(sizeof(*entry));
+	entry = (struct archive_entry *)calloc(1, sizeof(*entry));
 	if (entry == NULL)
 		return (NULL);
-	memset(entry, 0, sizeof(*entry));
 	entry->archive = a;
 	return (entry);
 }
@@ -1442,6 +1442,15 @@ archive_entry_acl_add_entry_w(struct archive_entry *entry,
 }
 
 /*
+ * Return a bitmask of ACL types in an archive entry ACL list
+ */
+int
+archive_entry_acl_types(struct archive_entry *entry)
+{
+	return (archive_acl_types(&entry->acl));
+}
+
+/*
  * Return a count of entries matching "want_type".
  */
 int
@@ -1478,34 +1487,121 @@ archive_entry_acl_next(struct archive_entry *entry, int want_type, int *type,
 }
 
 /*
- * Generate a text version of the ACL.  The flags parameter controls
+ * Generate a text version of the ACL. The flags parameter controls
  * the style of the generated ACL.
  */
+wchar_t *
+archive_entry_acl_to_text_w(struct archive_entry *entry, ssize_t *len,
+    int flags)
+{
+	return (archive_acl_to_text_w(&entry->acl, len, flags,
+	    entry->archive));
+}
+
+char *
+archive_entry_acl_to_text(struct archive_entry *entry, ssize_t *len,
+    int flags)
+{
+	return (archive_acl_to_text_l(&entry->acl, len, flags, NULL));
+}
+
+char *
+_archive_entry_acl_to_text_l(struct archive_entry *entry, ssize_t *len,
+   int flags, struct archive_string_conv *sc)
+{
+	return (archive_acl_to_text_l(&entry->acl, len, flags, sc));
+}
+
+/*
+ * ACL text parser.
+ */
+int
+archive_entry_acl_from_text_w(struct archive_entry *entry,
+    const wchar_t *wtext, int type)
+{
+	return (archive_acl_from_text_w(&entry->acl, wtext, type));
+}
+
+int
+archive_entry_acl_from_text(struct archive_entry *entry,
+    const char *text, int type)
+{
+	return (archive_acl_from_text_l(&entry->acl, text, type, NULL));
+}
+
+int
+_archive_entry_acl_from_text_l(struct archive_entry *entry, const char *text,
+    int type, struct archive_string_conv *sc)
+{
+	return (archive_acl_from_text_l(&entry->acl, text, type, sc));
+}
+
+/* Deprecated */
+static int
+archive_entry_acl_text_compat(int *flags)
+{
+	if ((*flags & ARCHIVE_ENTRY_ACL_TYPE_POSIX1E) == 0)
+		return (1);
+
+	/* ABI compat with old ARCHIVE_ENTRY_ACL_STYLE_EXTRA_ID */
+	if ((*flags & OLD_ARCHIVE_ENTRY_ACL_STYLE_EXTRA_ID) != 0)
+		*flags |= ARCHIVE_ENTRY_ACL_STYLE_EXTRA_ID;
+
+	/* ABI compat with old ARCHIVE_ENTRY_ACL_STYLE_MARK_DEFAULT */
+	if ((*flags & OLD_ARCHIVE_ENTRY_ACL_STYLE_MARK_DEFAULT) != 0)
+		*flags |=  ARCHIVE_ENTRY_ACL_STYLE_MARK_DEFAULT;
+
+	*flags |= ARCHIVE_ENTRY_ACL_STYLE_SEPARATOR_COMMA;
+
+	return (0);
+}
+
+/* Deprecated */
 const wchar_t *
 archive_entry_acl_text_w(struct archive_entry *entry, int flags)
 {
-	const wchar_t *r;
-	r = archive_acl_text_w(entry->archive, &entry->acl, flags);
-	if (r == NULL && errno == ENOMEM)
-		__archive_errx(1, "No memory");
-	return (r);
+	if (entry->acl.acl_text_w != NULL) {
+		free(entry->acl.acl_text_w);
+		entry->acl.acl_text_w = NULL;
+	}
+	if (archive_entry_acl_text_compat(&flags) == 0)
+		entry->acl.acl_text_w = archive_acl_to_text_w(&entry->acl,
+		    NULL, flags, entry->archive);
+	return (entry->acl.acl_text_w);
 }
 
+/* Deprecated */
 const char *
 archive_entry_acl_text(struct archive_entry *entry, int flags)
 {
-	const char *p;
-	if (archive_acl_text_l(&entry->acl, flags, &p, NULL, NULL) != 0
-	    && errno == ENOMEM)
-		__archive_errx(1, "No memory");
-	return (p);
+	if (entry->acl.acl_text != NULL) {
+		free(entry->acl.acl_text);
+		entry->acl.acl_text = NULL;
+	}
+	if (archive_entry_acl_text_compat(&flags) == 0)
+		entry->acl.acl_text = archive_acl_to_text_l(&entry->acl, NULL,
+		    flags, NULL);
+
+	return (entry->acl.acl_text);
 }
 
+/* Deprecated */
 int
 _archive_entry_acl_text_l(struct archive_entry *entry, int flags,
     const char **acl_text, size_t *len, struct archive_string_conv *sc)
 {
-	return (archive_acl_text_l(&entry->acl, flags, acl_text, len, sc));
+	if (entry->acl.acl_text != NULL) {
+		free(entry->acl.acl_text);
+		entry->acl.acl_text = NULL;
+        }
+
+	if (archive_entry_acl_text_compat(&flags) == 0)
+		entry->acl.acl_text = archive_acl_to_text_l(&entry->acl,
+		    (ssize_t *)len, flags, sc);
+
+	*acl_text = entry->acl.acl_text;
+
+	return (0);
 }
 
 /*
diff --git a/libarchive/archive_entry.h b/libarchive/archive_entry.h
index dab2c9d..2dd557a 100644
--- a/libarchive/archive_entry.h
+++ b/libarchive/archive_entry.h
@@ -1,5 +1,6 @@
 /*-
  * Copyright (c) 2003-2008 Tim Kientzle
+ * Copyright (c) 2016 Martin Matuska
  * All rights reserved.
  *
  * Redistribution and use in source and binary forms, with or without
@@ -29,7 +30,7 @@
 #define	ARCHIVE_ENTRY_H_INCLUDED
 
 /* Note: Compiler will complain if this does not match archive.h! */
-#define	ARCHIVE_VERSION_NUMBER 3002001
+#define	ARCHIVE_VERSION_NUMBER 3003000
 
 /*
  * Note: archive_entry.h is for use outside of libarchive; the
@@ -104,6 +105,12 @@ typedef int64_t la_int64_t;
 # define __LA_DECL
 #endif
 
+#if defined(__GNUC__) && __GNUC__ >= 3 && __GNUC_MINOR__ >= 1
+# define __LA_DEPRECATED __attribute__((deprecated))
+#else
+# define __LA_DEPRECATED
+#endif
+
 #ifdef __cplusplus
 extern "C" {
 #endif
@@ -420,6 +427,7 @@ __LA_DECL void archive_entry_copy_mac_metadata(struct archive_entry *, const voi
 /*
  * Inheritance values (NFS4 ACLs only); included in permset.
  */
+#define	ARCHIVE_ENTRY_ACL_ENTRY_INHERITED                   0x01000000
 #define	ARCHIVE_ENTRY_ACL_ENTRY_FILE_INHERIT                0x02000000
 #define	ARCHIVE_ENTRY_ACL_ENTRY_DIRECTORY_INHERIT           0x04000000
 #define	ARCHIVE_ENTRY_ACL_ENTRY_NO_PROPAGATE_INHERIT        0x08000000
@@ -433,15 +441,16 @@ __LA_DECL void archive_entry_copy_mac_metadata(struct archive_entry *, const voi
 	    | ARCHIVE_ENTRY_ACL_ENTRY_NO_PROPAGATE_INHERIT	\
 	    | ARCHIVE_ENTRY_ACL_ENTRY_INHERIT_ONLY		\
 	    | ARCHIVE_ENTRY_ACL_ENTRY_SUCCESSFUL_ACCESS		\
-	    | ARCHIVE_ENTRY_ACL_ENTRY_FAILED_ACCESS)
+	    | ARCHIVE_ENTRY_ACL_ENTRY_FAILED_ACCESS		\
+	    | ARCHIVE_ENTRY_ACL_ENTRY_INHERITED)
 
 /* We need to be able to specify combinations of these. */
-#define	ARCHIVE_ENTRY_ACL_TYPE_ACCESS	256  /* POSIX.1e only */
-#define	ARCHIVE_ENTRY_ACL_TYPE_DEFAULT	512  /* POSIX.1e only */
-#define	ARCHIVE_ENTRY_ACL_TYPE_ALLOW	1024 /* NFS4 only */
-#define	ARCHIVE_ENTRY_ACL_TYPE_DENY	2048 /* NFS4 only */
-#define	ARCHIVE_ENTRY_ACL_TYPE_AUDIT	4096 /* NFS4 only */
-#define	ARCHIVE_ENTRY_ACL_TYPE_ALARM	8192 /* NFS4 only */
+#define	ARCHIVE_ENTRY_ACL_TYPE_ACCESS	0x00000100  /* POSIX.1e only */
+#define	ARCHIVE_ENTRY_ACL_TYPE_DEFAULT	0x00000200  /* POSIX.1e only */
+#define	ARCHIVE_ENTRY_ACL_TYPE_ALLOW	0x00000400 /* NFS4 only */
+#define	ARCHIVE_ENTRY_ACL_TYPE_DENY	0x00000800 /* NFS4 only */
+#define	ARCHIVE_ENTRY_ACL_TYPE_AUDIT	0x00001000 /* NFS4 only */
+#define	ARCHIVE_ENTRY_ACL_TYPE_ALARM	0x00002000 /* NFS4 only */
 #define	ARCHIVE_ENTRY_ACL_TYPE_POSIX1E	(ARCHIVE_ENTRY_ACL_TYPE_ACCESS \
 	    | ARCHIVE_ENTRY_ACL_TYPE_DEFAULT)
 #define	ARCHIVE_ENTRY_ACL_TYPE_NFS4	(ARCHIVE_ENTRY_ACL_TYPE_ALLOW \
@@ -492,21 +501,51 @@ __LA_DECL int	 archive_entry_acl_next_w(struct archive_entry *, int /* want_type
  * Construct a text-format ACL.  The flags argument is a bitmask that
  * can include any of the following:
  *
+ * Flags only for archive entries with POSIX.1e ACL:
  * ARCHIVE_ENTRY_ACL_TYPE_ACCESS - Include POSIX.1e "access" entries.
  * ARCHIVE_ENTRY_ACL_TYPE_DEFAULT - Include POSIX.1e "default" entries.
- * ARCHIVE_ENTRY_ACL_TYPE_NFS4 - Include NFS4 entries.
- * ARCHIVE_ENTRY_ACL_STYLE_EXTRA_ID - Include extra numeric ID field in
- *    each ACL entry.  ('star' introduced this for POSIX.1e, this flag
- *    also applies to NFS4.)
  * ARCHIVE_ENTRY_ACL_STYLE_MARK_DEFAULT - Include "default:" before each
- *    default ACL entry, as used in old Solaris ACLs.
+ *    default ACL entry.
+ * ARCHIVE_ENTRY_ACL_STYLE_SOLARIS - Output only one colon after "other" and
+ *    "mask" entries.
+ *
+ * Flags only for archive entries with NFSv4 ACL:
+ * ARCHIVE_ENTRY_ACL_STYLE_COMPACT - Do not output the minus character for
+ *    unset permissions and flags in NFSv4 ACL permission and flag fields
+ *
+ * Flags for for archive entries with POSIX.1e ACL or NFSv4 ACL:
+ * ARCHIVE_ENTRY_ACL_STYLE_EXTRA_ID - Include extra numeric ID field in
+ *    each ACL entry.
+ * ARCHIVE_ENTRY_ACL_STYLE_SEPARATOR_COMMA - Separate entries with comma
+ *    instead of newline.
  */
-#define	ARCHIVE_ENTRY_ACL_STYLE_EXTRA_ID	1024
-#define	ARCHIVE_ENTRY_ACL_STYLE_MARK_DEFAULT	2048
+#define	ARCHIVE_ENTRY_ACL_STYLE_EXTRA_ID	0x00000001
+#define	ARCHIVE_ENTRY_ACL_STYLE_MARK_DEFAULT	0x00000002
+#define	ARCHIVE_ENTRY_ACL_STYLE_SOLARIS		0x00000004
+#define	ARCHIVE_ENTRY_ACL_STYLE_SEPARATOR_COMMA	0x00000008
+#define	ARCHIVE_ENTRY_ACL_STYLE_COMPACT		0x00000010
+
+__LA_DECL wchar_t *archive_entry_acl_to_text_w(struct archive_entry *,
+	    ssize_t * /* len */, int /* flags */);
+__LA_DECL char *archive_entry_acl_to_text(struct archive_entry *,
+	    ssize_t * /* len */, int /* flags */);
+__LA_DECL int archive_entry_acl_from_text_w(struct archive_entry *,
+	    const wchar_t * /* wtext */, int /* type */);
+__LA_DECL int archive_entry_acl_from_text(struct archive_entry *,
+	    const char * /* text */, int /* type */);
+
+/* Deprecated constants */
+#define	OLD_ARCHIVE_ENTRY_ACL_STYLE_EXTRA_ID		1024
+#define	OLD_ARCHIVE_ENTRY_ACL_STYLE_MARK_DEFAULT	2048
+
+/* Deprecated functions */
 __LA_DECL const wchar_t	*archive_entry_acl_text_w(struct archive_entry *,
-		    int /* flags */);
+		    int /* flags */) __LA_DEPRECATED;
 __LA_DECL const char *archive_entry_acl_text(struct archive_entry *,
-		    int /* flags */);
+		    int /* flags */) __LA_DEPRECATED;
+
+/* Return bitmask of ACL types in an archive entry */
+__LA_DECL int	 archive_entry_acl_types(struct archive_entry *);
 
 /* Return a count of entries matching 'want_type' */
 __LA_DECL int	 archive_entry_acl_count(struct archive_entry *, int /* want_type */);
diff --git a/libarchive/archive_entry_acl.3 b/libarchive/archive_entry_acl.3
index 5aff996..c5115f7 100644
--- a/libarchive/archive_entry_acl.3
+++ b/libarchive/archive_entry_acl.3
@@ -1,4 +1,5 @@
 .\" Copyright (c) 2010 Joerg Sonnenberger
+.\" Copyright (c) 2016 Martin Matuska
 .\" All rights reserved.
 .\"
 .\" Redistribution and use in source and binary forms, with or without
@@ -22,7 +23,7 @@
 .\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
 .\" SUCH DAMAGE.
 .\"
-.Dd February 2, 2012
+.Dd February 15, 2017
 .Dt ARCHIVE_ENTRY_ACL 3
 .Os
 .Sh NAME
@@ -30,10 +31,14 @@
 .Nm archive_entry_acl_add_entry_w ,
 .Nm archive_entry_acl_clear ,
 .Nm archive_entry_acl_count ,
+.Nm archive_entry_acl_from_text ,
+.Nm archive_entry_acl_from_text_w,
 .Nm archive_entry_acl_next ,
 .Nm archive_entry_acl_next_w ,
 .Nm archive_entry_acl_reset ,
-.Nm archive_entry_acl_text_w
+.Nm archive_entry_acl_to_text ,
+.Nm archive_entry_acl_to_text_w ,
+.Nm archive_entry_acl_types
 .Nd functions for manipulating Access Control Lists in archive entry descriptions
 .Sh LIBRARY
 Streaming Archive Library (libarchive, -larchive)
@@ -62,6 +67,18 @@ Streaming Archive Library (libarchive, -larchive)
 .Ft int
 .Fn archive_entry_acl_count "struct archive_entry *a" "int type"
 .Ft int
+.Fo archive_entry_acl_from_text
+.Fa "struct archive_entry *a"
+.Fa "const char *text"
+.Fa "int type"
+.Fc
+.Ft int
+.Fo archive_entry_acl_from_text_w
+.Fa "struct archive_entry *a"
+.Fa "const wchar_t *text"
+.Fa "int type"
+.Fc
+.Ft int
 .Fo archive_entry_acl_next
 .Fa "struct archive_entry *a"
 .Fa "int type"
@@ -83,31 +100,48 @@ Streaming Archive Library (libarchive, -larchive)
 .Fc
 .Ft int
 .Fn archive_entry_acl_reset "struct archive_entry *a" "int type"
-.Ft const wchar_t *
-.Fn archive_entry_acl_text_w "struct archive_entry *a" "int flags"
+.Ft char *
+.Fo archive_entry_acl_to_text
+.Fa "struct archive_entry *a"
+.Fa "ssize_t *len_p"
+.Fa "int flags"
+.Fc
+.Ft wchar_t *
+.Fo archive_entry_acl_to_text_w
+.Fa "struct archive_entry *a"
+.Fa "ssize_t *len_p"
+.Fa "int flags"
+.Fc
+.Ft int
+.Fn archive_entry_acl_types "struct archive_entry *a"
 .\" enum?
 .Sh DESCRIPTION
-An
-.Dq Access Control List
-is a generalisation of the classic Unix permission system.
+The
+.Dq Access Control Lists (ACLs)
+extend the standard Unix perssion model.
 The ACL interface of
 .Nm libarchive
-is derived from the POSIX.1e draft, but restricted to simplify dealing
-with practical implementations in various Operating Systems and archive formats.
-.Pp
-An ACL consists of a number of independent entries.
+supports both POSIX.1e and NFSv4 style ACLs. Use of ACLs is restricted by
+various levels of ACL support in operating systems, file systems and archive
+formats.
+.Ss POSIX.1e Access Control Lists
+A POSIX.1e ACL consists of a number of independent entries.
 Each entry specifies the permission set as bitmask of basic permissions.
-Valid permissions are:
+Valid permissions in the
+.Fa permset
+are:
 .Bl -tag -offset indent -compact -width "ARCHIVE_ENTRY_ACL_EXECUTE"
-.It Dv ARCHIVE_ENTRY_ACL_EXECUTE
-.It Dv ARCHIVE_ENTRY_ACL_WRITE
-.It Dv ARCHIVE_ENTRY_ACL_READ
+.It Dv ARCHIVE_ENTRY_ACL_READ ( Sy r )
+.It Dv ARCHIVE_ENTRY_ACL_WRITE ( Sy w )
+.It Dv ARCHIVE_ENTRY_ACL_EXECUTE ( Sy x )
 .El
 The permissions correspond to the normal Unix permissions.
 .Pp
-The tag specifies the principal to which the permission applies.
+The
+.Fa tag
+specifies the principal to which the permission applies.
 Valid values are:
-.Bl -tag -offset indent -compact -width "ARCHIVE_ENTRY_ACL_GROUP_OBJ"
+.Bl -hang -offset indent -compact -width "ARCHIVE_ENTRY_ACL_GROUP_OBJ"
 .It Dv ARCHIVE_ENTRY_ACL_USER
 The user specified by the name field.
 .It Dv ARCHIVE_ENTRY_ACL_USER_OBJ
@@ -119,8 +153,9 @@ The group who owns the file.
 .It Dv ARCHIVE_ENTRY_ACL_MASK
 The maximum permissions to be obtained via group permissions.
 .It Dv ARCHIVE_ENTRY_ACL_OTHER
-Any principal who doesn't have a user or group entry.
+Any principal who is not file owner or a member of the owning group.
 .El
+.Pp
 The principals
 .Dv ARCHIVE_ENTRY_ACL_USER_OBJ ,
 .Dv ARCHIVE_ENTRY_ACL_GROUP_OBJ
@@ -129,19 +164,123 @@ and
 are equivalent to user, group and other in the classic Unix permission
 model and specify non-extended ACL entries.
 .Pp
-All files have an access ACL
+All files with have an access ACL
 .Pq Dv ARCHIVE_ENTRY_ACL_TYPE_ACCESS .
 This specifies the permissions required for access to the file itself.
 Directories have an additional ACL
 .Pq Dv ARCHIVE_ENTRY_ACL_TYPE_DEFAULT ,
 which controls the initial access ACL for newly created directory entries.
+.Ss NFSv4 Access Control Lists
+A NFSv4 ACL consists of multiple individual entries called Access Control
+Entries (ACEs).
+.Pp
+There are four possible types of a NFSv4 ACE:
+.Bl -hang -offset indent -compact -width "ARCHIVE_ENTRY_ACL_TYE_ALLOW"
+.It Dv ARCHIVE_ENTRY_ACL_TYPE_ALLOW
+Allow principal to perform actions requiring given permissions.
+.It Dv ARCHIVE_ENTRY_ACL_TYPE_DENY
+Prevent principal from performing actions requiring given permissions.
+.It Dv ARCHIVE_ENTRY_ACL_TYPE_AUDIT
+Log access attempts by principal which require given permissions.
+.It Dv ARCHIVE_ENTRY_ACL_TYPE_ALARM
+Trigger a system alarm on access attempts by principal which require given
+permissions.
+.El
+.Pp
+The
+.Fa tag
+specifies the principal to which the permission applies.
+Valid values are:
+.Bl -hang -offset indent -compact -width "ARCHIVE_ENTRY_ACL_GROUP_OBJ"
+.It Dv ARCHIVE_ENTRY_ACL_USER
+The user specified by the name field.
+.It Dv ARCHIVE_ENTRY_ACL_USER_OBJ
+The owner of the file.
+.It Dv ARCHIVE_ENTRY_ACL_GROUP
+The group specied by the name field.
+.It Dv ARCHIVE_ENTRY_ACL_GROUP_OBJ
+The group who owns the file.
+.It Dv ARCHIVE_ENTRY_ACL_EVERYONE
+Any principal who is not file owner or a member of the owning group.
+.El
+.Pp
+Entries with the
+.Dv ARCHIVE_ENTRY_ACL_USER
+or
+.Dv ARCHIVE_ENTRY_ACL_GROUP
+tag store the user and group name in the
+.Fa name
+string and optionally the user or group ID in the
+.Fa qualifier
+integer.
+.Pp
+NFSv4 ACE permissions and flags are stored in the same
+.Fa permset
+bitfield. Some permissions share the same constant and permission character but
+have different effect on directories than on files. The following ACE
+permissions are supported:
+.Bl -tag -offset indent -compact -width ARCHIV
+.It Dv ARCHIVE_ENTRY_ACL_READ_DATA ( Sy r )
+Read data (file).
+.It Dv ARCHIVE_ENTRY_ACL_LIST_DIRECTORY ( Sy r )
+List entries (directory).
+.It ARCHIVE_ENTRY_ACL_WRITE_DATA ( Sy w )
+Write data (file).
+.It ARCHIVE_ENTRY_ACL_ADD_FILE ( Sy w )
+Create files (directory).
+.It Dv ARCHIVE_ENTRY_ACL_EXECUTE ( Sy x )
+Execute file or change into a directory.
+.It Dv ARCHIVE_ENTRY_ACL_APPEND_DATA ( Sy p )
+Append data (file).
+.It Dv ARCHIVE_ENTRY_ACL_ADD_SUBDIRECTORY ( Sy p )
+Create subdirectories (directory).
+.It Dv ARCHIVE_ENTRY_ACL_DELETE_CHILD ( Sy D )
+Remove files and subdirectories inside a directory.
+.It Dv ARCHIVE_ENTRY_ACL_DELETE ( Sy d )
+Remove file or directory.
+.It Dv ARCHIVE_ENTRY_ACL_READ_ATTRIBUTES ( Sy a )
+Read file or directory attributes.
+.It Dv ARCHIVE_ENTRY_ACL_WRITE_ATTRIBUTES ( Sy A )
+Write file or directory attributes.
+.It Dv ARCHIVE_ENTRY_ACL_READ_NAMED_ATTRS ( Sy R )
+Read named file or directory attributes.
+.It Dv ARCHIVE_ENTRY_ACL_WRITE_NAMED_ATTRS ( Sy W )
+Write named file or directory attributes.
+.It Dv ARCHIVE_ENTRY_ACL_READ_ACL ( Sy c )
+Read file or directory ACL.
+.It Dv ARCHIVE_ENTRY_ACL_WRITE_ACL ( Sy C )
+Write file or directory ACL.
+.It Dv ARCHIVE_ENTRY_ACL_WRITE_OWNER ( Sy o )
+Change owner of a file or directory.
+.It Dv ARCHIVE_ENTRY_ACL_SYNCHRONIZE ( Sy s )
+Use synchronous I/O.
+.El
 .Pp
+The following NFSv4 ACL inheritance flags are supported:
+.Bl -tag -offset indent -compact -width ARCHIV
+.It Dv ARCHIVE_ENTRY_ACL_ENTRY_FILE_INHERIT ( Sy f )
+Inherit parent directory ACE to files.
+.It Dv ARCHIVE_ENTRY_ACL_ENTRY_DIRECTORY_INHERIT ( Sy d )
+Inherit parent directory ACE to subdirectories.
+.It Dv ARCHIVE_ENTRY_ACL_ENTRY_INHERIT_ONLY ( Sy i )
+Only inherit, do not apply the permission on the directory itself.
+.It Dv ARCHIVE_ENTRY_ACL_ENTRY_NO_PROPAGATE_INHERIT ( Sy n )
+Do not propagate inherit flags. Only first-level entries inherit ACLs.
+.It Dv ARCHIVE_ENTRY_ACL_ENTRY_SUCCESSFUL_ACCESS ( Sy S )
+Trigger alarm or audit on succesful access.
+.It Dv ARCHIVE_ENTRY_ACL_ENTRY_FAILED_ACCESS ( Sy F )
+Trigger alarm or audit on failed access.
+.It Dv ARCHIVE_ENTRY_ACL_ENTRY_INHERITED ( Sy I )
+Mark that ACE was inherited.
+.El
+.Ss Functions
 .Fn archive_entry_acl_add_entry
 and
 .Fn archive_entry_acl_add_entry_w
 add a single ACL entry.
 For the access ACL and non-extended principals, the classic Unix permissions
-are updated.
+are updated. An archive enry cannot contain both POSIX.1e and NFSv4 ACL
+entries.
 .Pp
 .Fn archive_entry_acl_clear
 removes all ACL entries and resets the enumeration pointer.
@@ -150,14 +289,58 @@ removes all ACL entries and resets the enumeration pointer.
 counts the ACL entries that have the given type mask.
 .Fa type
 can be the bitwise-or of
-.Dv ARCHIVE_ENTRY_ACL_TYPE_ACCESS
-and
-.Dv ARCHIVE_ENTRY_ACL_TYPE_DEFAULT .
-If
+.Bl -tag -offset indent -compact -width "ARCHIVE_ENTRY_ACL_TYPE_DEFAULT"
+.It Dv ARCHIVE_ENTRY_ACL_TYPE_ACCESS
+.It Dv ARCHIVE_ENTRY_ACL_TYPE_DEFAULT
+.El
+for POSIX.1e ACLs and
+.Bl -tag -offset indent -compact -width "ARCHIVE_ENTRY_ACL_TYPE_ALLOW"
+.It Dv ARCHIVE_ENTRY_ACL_TYPE_ALLOW
+.It Dv ARCHIVE_ENTRY_ACL_TYPE_DENY
+.It Dv ARCHIVE_ENTRY_ACL_TYPE_AUDIT
+.It Dv ARCHIVE_ENTRY_ACL_TYPE_ALARM
+.El
+for NFSv4 ACLs. For POSIX.1e ACLs if
 .Dv ARCHIVE_ENTRY_ACL_TYPE_ACCESS
 is included and at least one extended ACL entry is found,
 the three non-extened ACLs are added.
 .Pp
+.Fn archive_entry_acl_from_text
+and
+.Fn archive_entry_acl_from_text_w
+add new
+.Pq or merge with existing
+ACL entries from
+.Pq wide
+text. The argument
+.Fa type
+may take one of the following values:
+.Bl -tag -offset indent -compact -width "ARCHIVE_ENTRY_ACL_TYPE_DEFAULT"
+.It Dv ARCHIVE_ENTRY_ACL_TYPE_ACCESS
+.It Dv ARCHIVE_ENTRY_ACL_TYPE_DEFAULT
+.It Dv ARCHIVE_ENTRY_ACL_TYPE_NFS4
+.El
+Supports all formats that can be created with
+.Fn archive_entry_acl_to_text
+or respective
+.Fn archive_entry_acl_to_text_w .
+Existing ACL entries are preserved. To get a clean new ACL from text
+.Fn archive_entry_acl_clear
+must be called first. Entries prefixed with
+.Dq default:
+are treated as
+.Dv ARCHIVE_ENTRY_ACL_TYPE_DEFAULT
+unless
+.Fa type
+is
+.Dv ARCHIVE_ENTRY_ACL_TYPE_NFS4 .
+Invalid entries, non-parseable ACL entries and entries beginning with
+the
+.Sq #
+character
+.Pq comments
+are skipped.
+.Pp
 .Fn archive_entry_acl_next
 and
 .Fn archive_entry_acl_next_w
@@ -179,29 +362,81 @@ or set using
 Otherwise, the function returns the same value as
 .Fn archive_entry_acl_count .
 .Pp
-.Fn archive_entry_acl_text_w
-converts the ACL entries for the given type mask into a wide string.
-In addition to the normal type flags,
-.Dv ARCHIVE_ENTRY_ACL_STYLE_EXTRA_ID
+.Fn archive_entry_acl_to_text
 and
-.Dv ARCHIVE_ENTRY_ACL_STYLE_MARK_DEFAULT
-can be specified to further customize the result.
-The returned long string is valid until the next call to
-.Fn archive_entry_acl_clear ,
-.Fn archive_entry_acl_add_entry ,
-.Fn archive_entry_acl_add_entry_w
+.Fn archive_entry_acl_to_text_w
+convert the ACL entries for the given type into a
+.Pq wide
+string of ACL entries separated by newline. If the the pointer
+.Fa len_p
+is not NULL, then the function shall return the length of the string
+.Pq not including the NULL terminator
+in the location pointed to by
+.Fa len_p .
+The
+.Fa flag
+argument is a bitwise-or.
+.Pp
+The following flags are effective only on POSIX.1e ACL:
+.Bl -tag -offset indent -compact -width ARCHIV
+.It Dv ARCHIVE_ENTRY_ACL_TYPE_ACCESS
+Output access ACLs.
+.It Dv ARCHIVE_ENTRY_ACL_TYPE_DEFAULT
+Output POSIX.1e default ACLs.
+.It Dv ARCHIVE_ENTRY_ACL_STYLE_MARK_DEFAULT
+Prefix each default ACL entry with the word
+.Dq default: .
+.It Dv ARCHIVE_ENTRY_ACL_STYLE_SOLARIS
+The mask and other ACLs don not contain a double colon.
+.El
+.Pp
+The following flags are effecive only on NFSv4 ACL:
+.Bl -tag -offset indent -compact -width ARCHIV
+.It Dv ARCHIVE_ENTRY_ACL_STYLE_COMPACT
+Do not output minus characters for unset permissions and flags in NFSv4 ACL
+permission and flag fields.
+.El
+.Pp
+The following flags are effective on both POSIX.1e and NFSv4 ACL:
+.Bl -tag -offset indent -compact -width ARCHIV
+.It Dv ARCHIVE_ENTRY_ACL_STYLE_EXTRA_ID
+Add an additional colon-separated field containing the user or group id.
+.It Dv ARCHIVE_ENTRY_ACL_STYLE_SEPARATOR_COMMA
+Separate ACL entries with comma instead of newline.
+.El
+.Pp
+If the archive entry contains NFSv4 ACLs, all types of NFSv4 ACLs are returned.
+It the entry contains POSIX.1e ACLs and none of the flags
+.Dv ARCHIVE_ENTRY_ACL_TYPE_ACCESS
 or
-.Fn archive_entry_acl_text_w .
+.Dv ARCHIVE_ENTRY_ACL_TYPE_DEFAULT
+are specified, both access and default entries are returned and default entries
+are prefixed with
+.Dq default: .
+.Pp
+.Fn archive_entry_acl_types
+get ACL entry types contained in an archive entry's ACL. As POSIX.1e and NFSv4
+ACL entries cannot be mixed, this function is a very efficient way to detect if
+an ACL already contains POSIX.1e or NFSv4 ACL entries.
 .Sh RETURN VALUES
 .Fn archive_entry_acl_count
 and
 .Fn archive_entry_acl_reset
 returns the number of ACL entries that match the given type mask.
-If the type mask includes
+For POSIX.1e ACLS if the type mask includes
 .Dv ARCHIVE_ENTRY_ACL_TYPE_ACCESS
 and at least one extended ACL entry exists, the three classic Unix
 permissions are counted.
 .Pp
+.Fn archive_entry_acl_from_text
+and
+.Fn archive_entry_acl_from_text_w
+return
+.Dv ARCHIVE_OK
+if all entries were successfully parsed and
+.Dv ARCHIVE_WARN
+if one or more entries were invalid or non-parseable.
+.Pp
 .Fn archive_entry_acl_next
 and
 .Fn archive_entry_acl_next_w
@@ -216,20 +451,16 @@ if
 .Fn archive_entry_acl_reset
 has not been called first.
 .Pp
-.Fn archive_entry_text_w
-returns a wide string representation of the ACL entrise matching the
-given type mask.
-The returned long string is valid until the next call to
-.Fn archive_entry_acl_clear ,
-.Fn archive_entry_acl_add_entry ,
-.Fn archive_entry_acl_add_entry_w
-or
-.Fn archive_entry_acl_text_w .
+.Fn archive_entry_acl_to_text
+returns a string representing the ACL entries matching the given type and
+flags on success or NULL on error.
+.Pp
+.Fn archive_entry_acl_to_text_w
+returns a wide string representing the ACL entries matching the given type
+and flags on success or NULL on error.
+.Pp
+.Fn archive_entry_acl_types
+returns a bitmask of ACL entry types or 0 if archive entry has no ACL entries.
 .Sh SEE ALSO
-.Xr archive_entry 3
-.Xr libarchive 3 ,
-.Sh BUGS
-.Dv ARCHIVE_ENTRY_ACL_STYLE_EXTRA_ID
-and
-.Dv ARCHIVE_ENTRY_ACL_STYLE_MARK_DEFAULT
-are not documented.
+.Xr archive_entry 3 ,
+.Xr libarchive 3
diff --git a/libarchive/archive_entry_locale.h b/libarchive/archive_entry_locale.h
index 02e024a..44550c5 100644
--- a/libarchive/archive_entry_locale.h
+++ b/libarchive/archive_entry_locale.h
@@ -63,9 +63,13 @@ int _archive_entry_uname_l(struct archive_entry *,
     const char **, size_t *, struct archive_string_conv *);
 #define archive_entry_acl_text_l _archive_entry_acl_text_l
 int _archive_entry_acl_text_l(struct archive_entry *, int,
-    const char **, size_t *, struct archive_string_conv *);
-
-
+const char **, size_t *, struct archive_string_conv *) __LA_DEPRECATED;
+#define archive_entry_acl_to_text_l _archive_entry_acl_to_text_l
+char *_archive_entry_acl_to_text_l(struct archive_entry *, ssize_t *, int,
+    struct archive_string_conv *);
+#define archive_entry_acl_from_text_l _archive_entry_acl_from_text_l
+int _archive_entry_acl_from_text_l(struct archive_entry *, const char* text,
+    int type, struct archive_string_conv *);
 #define archive_entry_copy_gname_l	_archive_entry_copy_gname_l
 int _archive_entry_copy_gname_l(struct archive_entry *,
     const char *, size_t, struct archive_string_conv *);
diff --git a/libarchive/archive_entry_strmode.c b/libarchive/archive_entry_strmode.c
index 16cb3f7..af2517a 100644
--- a/libarchive/archive_entry_strmode.c
+++ b/libarchive/archive_entry_strmode.c
@@ -80,7 +80,7 @@ archive_entry_strmode(struct archive_entry *entry)
 		if (mode & 0001) bp[9] = 't';
 		else bp[9] = 'T';
 	}
-	if (archive_entry_acl_count(entry, ARCHIVE_ENTRY_ACL_TYPE_ACCESS))
+	if (archive_entry_acl_types(entry) != 0)
 		bp[10] = '+';
 
 	return (bp);
diff --git a/libarchive/archive_hmac.c b/libarchive/archive_hmac.c
index 7857c0f..1e0ae28 100644
--- a/libarchive/archive_hmac.c
+++ b/libarchive/archive_hmac.c
@@ -176,8 +176,10 @@ __hmac_sha1_cleanup(archive_hmac_sha1_ctx *ctx)
 static int
 __hmac_sha1_init(archive_hmac_sha1_ctx *ctx, const uint8_t *key, size_t key_len)
 {
-	HMAC_CTX_init(ctx);
-	HMAC_Init(ctx, key, key_len, EVP_sha1());
+	*ctx = HMAC_CTX_new();
+	if (*ctx == NULL)
+		return -1;
+	HMAC_Init_ex(*ctx, key, key_len, EVP_sha1(), NULL);
 	return 0;
 }
 
@@ -185,22 +187,22 @@ static void
 __hmac_sha1_update(archive_hmac_sha1_ctx *ctx, const uint8_t *data,
     size_t data_len)
 {
-	HMAC_Update(ctx, data, data_len);
+	HMAC_Update(*ctx, data, data_len);
 }
 
 static void
 __hmac_sha1_final(archive_hmac_sha1_ctx *ctx, uint8_t *out, size_t *out_len)
 {
 	unsigned int len = (unsigned int)*out_len;
-	HMAC_Final(ctx, out, &len);
+	HMAC_Final(*ctx, out, &len);
 	*out_len = len;
 }
 
 static void
 __hmac_sha1_cleanup(archive_hmac_sha1_ctx *ctx)
 {
-	HMAC_CTX_cleanup(ctx);
-	memset(ctx, 0, sizeof(*ctx));
+	HMAC_CTX_free(*ctx);
+	*ctx = NULL;
 }
 
 #else
diff --git a/libarchive/archive_hmac_private.h b/libarchive/archive_hmac_private.h
index 64de743..eb45c4e 100644
--- a/libarchive/archive_hmac_private.h
+++ b/libarchive/archive_hmac_private.h
@@ -70,9 +70,9 @@ typedef struct {
 typedef	struct hmac_sha1_ctx archive_hmac_sha1_ctx;
 
 #elif defined(HAVE_LIBCRYPTO)
-#include <openssl/hmac.h>
+#include "archive_openssl_hmac_private.h"
 
-typedef	HMAC_CTX archive_hmac_sha1_ctx;
+typedef	HMAC_CTX* archive_hmac_sha1_ctx;
 
 #else
 
diff --git a/libarchive/archive_match.c b/libarchive/archive_match.c
index 4c41bad..be72066 100644
--- a/libarchive/archive_match.c
+++ b/libarchive/archive_match.c
@@ -471,7 +471,7 @@ archive_match_path_excluded(struct archive *_a,
 }
 
 /*
- * Utilty functions to get statistic information for inclusion patterns.
+ * Utility functions to get statistic information for inclusion patterns.
  */
 int
 archive_match_path_unmatched_inclusions(struct archive *_a)
@@ -655,7 +655,7 @@ add_pattern_from_file(struct archive_match *a, struct match_list *mlist,
 		}
 	}
 
-	/* If something error happend, report it immediately. */ 
+	/* If an error occurred, report it immediately. */
 	if (r < ARCHIVE_OK) {
 		archive_copy_error(&(a->archive), ar);
 		archive_read_free(ar);
@@ -1270,7 +1270,7 @@ set_timefilter_pathname_wcs(struct archive_match *a, int timetype,
 #endif /* _WIN32 && !__CYGWIN__ */
 
 /*
- * Call back funtions for archive_rb.
+ * Call back functions for archive_rb.
  */
 static int
 cmp_node_mbs(const struct archive_rb_node *n1,
@@ -1405,7 +1405,7 @@ add_entry(struct archive_match *a, int flag,
 			&(a->exclusion_tree), pathname);
 
 		/*
-		 * We always overwrite comparison condision.
+		 * We always overwrite comparison condition.
 		 * If you do not want to overwrite it, you should not
 		 * call archive_match_exclude_entry(). We cannot know
 		 * what behavior you really expect since overwriting
@@ -1481,7 +1481,7 @@ time_excluded(struct archive_match *a, struct archive_entry *entry)
 			if (nsec == a->older_ctime_nsec &&
 			    (a->older_ctime_filter & ARCHIVE_MATCH_EQUAL)
 			      == 0)
-				return (1); /* Eeual, skip it. */
+				return (1); /* Equal, skip it. */
 		}
 	}
 	if (a->newer_mtime_filter) {
@@ -1513,7 +1513,7 @@ time_excluded(struct archive_match *a, struct archive_entry *entry)
 		}
 	}
 
-	/* If there is no excluson list, include the file. */
+	/* If there is no exclusion list, include the file. */
 	if (a->exclusion_entry_list.count == 0)
 		return (0);
 
@@ -1700,7 +1700,7 @@ add_owner_id(struct archive_match *a, struct id_array *ids, int64_t id)
 			break;
 	}
 
-	/* Add oowner id. */
+	/* Add owner id. */
 	if (i == ids->count)
 		ids->ids[ids->count++] = id;
 	else if (ids->ids[i] != id) {
diff --git a/libarchive/archive_openssl_evp_private.h b/libarchive/archive_openssl_evp_private.h
new file mode 100644
index 0000000..43a3ccc
--- /dev/null
+++ b/libarchive/archive_openssl_evp_private.h
@@ -0,0 +1,48 @@
+/*-
+ * Copyright (c) 2003-2007 Tim Kientzle
+ * All rights reserved.
+ *
+ * Redistribution and use in source and binary forms, with or without
+ * modification, are permitted provided that the following conditions
+ * are met:
+ * 1. Redistributions of source code must retain the above copyright
+ *    notice, this list of conditions and the following disclaimer.
+ * 2. Redistributions in binary form must reproduce the above copyright
+ *    notice, this list of conditions and the following disclaimer in the
+ *    documentation and/or other materials provided with the distribution.
+ *
+ * THIS SOFTWARE IS PROVIDED BY THE AUTHOR(S) ``AS IS'' AND ANY EXPRESS OR
+ * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
+ * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
+ * IN NO EVENT SHALL THE AUTHOR(S) BE LIABLE FOR ANY DIRECT, INDIRECT,
+ * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
+ * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
+ * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
+ * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
+ * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
+ * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
+ */
+#ifndef ARCHIVE_OPENSSL_EVP_PRIVATE_H_INCLUDED
+#define ARCHIVE_OPENSSL_EVP_PRIVATE_H_INCLUDED
+
+#include <openssl/evp.h>
+#include <openssl/opensslv.h>
+
+#if OPENSSL_VERSION_NUMBER < 0x10100000L
+#include <stdlib.h> /* malloc, free */
+#include <string.h> /* memset */
+static inline EVP_MD_CTX *EVP_MD_CTX_new(void)
+{
+	EVP_MD_CTX *ctx = (EVP_MD_CTX *)calloc(1, sizeof(EVP_MD_CTX));
+	return ctx;
+}
+
+static inline void EVP_MD_CTX_free(EVP_MD_CTX *ctx)
+{
+	EVP_MD_CTX_cleanup(ctx);
+	memset(ctx, 0, sizeof(*ctx));
+	free(ctx);
+}
+#endif
+
+#endif
diff --git a/libarchive/archive_openssl_hmac_private.h b/libarchive/archive_openssl_hmac_private.h
new file mode 100644
index 0000000..2deeb5f
--- /dev/null
+++ b/libarchive/archive_openssl_hmac_private.h
@@ -0,0 +1,48 @@
+/*-
+ * Copyright (c) 2003-2007 Tim Kientzle
+ * All rights reserved.
+ *
+ * Redistribution and use in source and binary forms, with or without
+ * modification, are permitted provided that the following conditions
+ * are met:
+ * 1. Redistributions of source code must retain the above copyright
+ *    notice, this list of conditions and the following disclaimer.
+ * 2. Redistributions in binary form must reproduce the above copyright
+ *    notice, this list of conditions and the following disclaimer in the
+ *    documentation and/or other materials provided with the distribution.
+ *
+ * THIS SOFTWARE IS PROVIDED BY THE AUTHOR(S) ``AS IS'' AND ANY EXPRESS OR
+ * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
+ * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
+ * IN NO EVENT SHALL THE AUTHOR(S) BE LIABLE FOR ANY DIRECT, INDIRECT,
+ * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
+ * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
+ * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
+ * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
+ * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
+ * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
+ */
+#ifndef ARCHIVE_OPENSSL_HMAC_PRIVATE_H_INCLUDED
+#define ARCHIVE_OPENSSL_HMAC_PRIVATE_H_INCLUDED
+
+#include <openssl/hmac.h>
+#include <openssl/opensslv.h>
+
+#if OPENSSL_VERSION_NUMBER < 0x10100000L
+#include <stdlib.h> /* malloc, free */
+#include <string.h> /* memset */
+static inline HMAC_CTX *HMAC_CTX_new(void)
+{
+	HMAC_CTX *ctx = (HMAC_CTX *)calloc(1, sizeof(HMAC_CTX));
+	return ctx;
+}
+
+static inline void HMAC_CTX_free(HMAC_CTX *ctx)
+{
+	HMAC_CTX_cleanup(ctx);
+	memset(ctx, 0, sizeof(*ctx));
+	free(ctx);
+}
+#endif
+
+#endif
diff --git a/libarchive/archive_options.c b/libarchive/archive_options.c
index dbf3e80..6496025 100644
--- a/libarchive/archive_options.c
+++ b/libarchive/archive_options.c
@@ -26,6 +26,10 @@
 #include "archive_platform.h"
 __FBSDID("$FreeBSD$");
 
+#ifdef HAVE_ERRNO_H
+#include <errno.h>
+#endif
+
 #include "archive_options_private.h"
 
 static const char *
@@ -105,8 +109,11 @@ _archive_set_options(struct archive *a, const char *options,
 	if (options == NULL || options[0] == '\0')
 		return ARCHIVE_OK;
 
-	data = (char *)malloc(strlen(options) + 1);
-	strcpy(data, options);
+	if ((data = strdup(options)) == NULL) {
+		archive_set_error(a,
+		    ENOMEM, "Out of memory adding file to list");
+		return (ARCHIVE_FATAL);
+	}
 	s = (const char *)data;
 
 	do {
diff --git a/libarchive/archive_platform.h b/libarchive/archive_platform.h
index b06c3cd..c9a9602 100644
--- a/libarchive/archive_platform.h
+++ b/libarchive/archive_platform.h
@@ -147,8 +147,25 @@
  * acl_set_file(), and ACL_USER, we assume it has the rest of the
  * POSIX.1e draft functions used in archive_read_extract.c.
  */
-#if HAVE_SYS_ACL_H && HAVE_ACL_CREATE_ENTRY && HAVE_ACL_INIT && HAVE_ACL_SET_FILE && HAVE_ACL_USER
+#if HAVE_SYS_ACL_H && HAVE_ACL_CREATE_ENTRY && HAVE_ACL_INIT && HAVE_ACL_SET_FILE
+#if HAVE_ACL_USER
 #define	HAVE_POSIX_ACL	1
+#elif HAVE_ACL_TYPE_EXTENDED
+#define HAVE_DARWIN_ACL 1
+#endif
+#endif
+
+/*
+ * If this platform has <sys/acl.h>, acl_get(), facl_get(), acl_set(),
+ * facl_set() and types aclent_t and ace_t it uses Solaris-style ACL functions
+ */
+#if HAVE_SYS_ACL_H && HAVE_ACL_GET && HAVE_FACL_GET && HAVE_ACL_SET && HAVE_FACL_SET && HAVE_ACLENT_T && HAVE_ACE_T
+#define	HAVE_SUN_ACL	1
+#endif
+
+/* Define if platform supports NFSv4 ACLs */
+#if (HAVE_POSIX_ACL && HAVE_ACL_TYPE_NFS4) || HAVE_SUN_ACL || HAVE_DARWIN_ACL
+#define HAVE_NFS4_ACL	1
 #endif
 
 /*
@@ -159,6 +176,15 @@
 #define	CAN_RESTORE_METADATA_FD
 #endif
 
+/*
+ * glibc 2.24 deprecates readdir_r
+ */
+#if defined(HAVE_READDIR_R) && (!defined(__GLIBC__) || !defined(__GLIBC_MINOR__) || __GLIBC__ < 2 || (__GLIBC__ == 2 && __GLIBC_MINOR__ < 24))
+#define	USE_READDIR_R	1
+#else
+#undef	USE_READDIR_R
+#endif
+
 /* Set up defaults for internal error codes. */
 #ifndef ARCHIVE_ERRNO_FILE_FORMAT
 #if HAVE_EFTYPE
diff --git a/libarchive/archive_ppmd7_private.h b/libarchive/archive_ppmd7_private.h
index 3a6b9eb..06c99e8 100644
--- a/libarchive/archive_ppmd7_private.h
+++ b/libarchive/archive_ppmd7_private.h
@@ -19,7 +19,7 @@ If you need the compatibility with original PPMd var.H, you can use external Ran
 #define PPMD7_MAX_ORDER 64
 
 #define PPMD7_MIN_MEM_SIZE (1 << 11)
-#define PPMD7_MAX_MEM_SIZE (0xFFFFFFFF - 12 * 3)
+#define PPMD7_MAX_MEM_SIZE (0xFFFFFFFFu - 12 * 3)
 
 struct CPpmd7_Context_;
 
diff --git a/libarchive/archive_random.c b/libarchive/archive_random.c
index a20b9b1..357f973 100644
--- a/libarchive/archive_random.c
+++ b/libarchive/archive_random.c
@@ -80,7 +80,7 @@ archive_random(void *buf, size_t nbytes)
 
 	success = CryptAcquireContext(&hProv, NULL, NULL, PROV_RSA_FULL,
 	    CRYPT_VERIFYCONTEXT);
-	if (!success && GetLastError() == NTE_BAD_KEYSET) {
+	if (!success && GetLastError() == (DWORD)NTE_BAD_KEYSET) {
 		success = CryptAcquireContext(&hProv, NULL, NULL,
 		    PROV_RSA_FULL, CRYPT_NEWKEYSET);
 	}
diff --git a/libarchive/archive_rb.c b/libarchive/archive_rb.c
index 5b5da20..cf58ac3 100644
--- a/libarchive/archive_rb.c
+++ b/libarchive/archive_rb.c
@@ -312,7 +312,7 @@ __archive_rb_tree_insert_rebalance(struct archive_rb_tree *rbt,
 		father = RB_FATHER(self);
 		if (RB_BLACK_P(father)) {
 			/*
-			 * If our greatgrandpa is black, we're done.
+			 * If our great-grandpa is black, we're done.
 			 */
 			return;
 		}
diff --git a/libarchive/archive_read.c b/libarchive/archive_read.c
index 0bbacc8..d1feceb 100644
--- a/libarchive/archive_read.c
+++ b/libarchive/archive_read.c
@@ -57,6 +57,7 @@ __FBSDID("$FreeBSD: head/lib/libarchive/archive_read.c 201157 2009-12-29 05:30:2
 
 static int	choose_filters(struct archive_read *);
 static int	choose_format(struct archive_read *);
+static int	close_filters(struct archive_read *);
 static struct archive_vtable *archive_read_vtable(void);
 static int64_t	_archive_filter_bytes(struct archive *, int);
 static int	_archive_filter_code(struct archive *, int);
@@ -528,7 +529,7 @@ archive_read_open1(struct archive *_a)
 	{
 		slot = choose_format(a);
 		if (slot < 0) {
-			__archive_read_close_filters(a);
+			close_filters(a);
 			a->archive.state = ARCHIVE_STATE_FATAL;
 			return (ARCHIVE_FATAL);
 		}
@@ -582,7 +583,6 @@ choose_filters(struct archive_read *a)
 			/* Verify the filter by asking it for some data. */
 			__archive_read_filter_ahead(a->filter, 1, &avail);
 			if (avail < 0) {
-				__archive_read_close_filters(a);
 				__archive_read_free_filters(a);
 				return (ARCHIVE_FATAL);
 			}
@@ -601,7 +601,6 @@ choose_filters(struct archive_read *a)
 		a->filter = filter;
 		r = (best_bidder->init)(a->filter);
 		if (r != ARCHIVE_OK) {
-			__archive_read_close_filters(a);
 			__archive_read_free_filters(a);
 			return (ARCHIVE_FATAL);
 		}
@@ -765,7 +764,7 @@ archive_read_header_position(struct archive *_a)
  * we cannot say whether there are encrypted entries, then
  * ARCHIVE_READ_FORMAT_ENCRYPTION_DONT_KNOW is returned.
  * In general, this function will return values below zero when the
- * reader is uncertain or totally uncapable of encryption support.
+ * reader is uncertain or totally incapable of encryption support.
  * When this function returns 0 you can be sure that the reader
  * supports encryption detection but no encrypted entries have
  * been found yet.
@@ -986,8 +985,8 @@ _archive_read_data_block(struct archive *_a,
 	return (a->format->read_data)(a, buff, size, offset);
 }
 
-int
-__archive_read_close_filters(struct archive_read *a)
+static int
+close_filters(struct archive_read *a)
 {
 	struct archive_read_filter *f = a->filter;
 	int r = ARCHIVE_OK;
@@ -1010,6 +1009,9 @@ __archive_read_close_filters(struct archive_read *a)
 void
 __archive_read_free_filters(struct archive_read *a)
 {
+	/* Make sure filters are closed and their buffers are freed */
+	close_filters(a);
+
 	while (a->filter != NULL) {
 		struct archive_read_filter *t = a->filter->upstream;
 		free(a->filter);
@@ -1052,7 +1054,7 @@ _archive_read_close(struct archive *_a)
 	/* TODO: Clean up the formatters. */
 
 	/* Release the filter objects. */
-	r1 = __archive_read_close_filters(a);
+	r1 = close_filters(a);
 	if (r1 < r)
 		r = r1;
 
diff --git a/libarchive/archive_read_add_passphrase.c b/libarchive/archive_read_add_passphrase.c
index f67f1eb..cf821b5 100644
--- a/libarchive/archive_read_add_passphrase.c
+++ b/libarchive/archive_read_add_passphrase.c
@@ -125,7 +125,7 @@ void
 __archive_read_reset_passphrase(struct archive_read *a)
 {
 
-	a->passphrases.candiate = -1;
+	a->passphrases.candidate = -1;
 }
 
 /*
@@ -137,31 +137,31 @@ __archive_read_next_passphrase(struct archive_read *a)
 	struct archive_read_passphrase *p;
 	const char *passphrase;
 
-	if (a->passphrases.candiate < 0) {
+	if (a->passphrases.candidate < 0) {
 		/* Count out how many passphrases we have. */
 		int cnt = 0;
 
 		for (p = a->passphrases.first; p != NULL; p = p->next)
 			cnt++;
-		a->passphrases.candiate = cnt;
+		a->passphrases.candidate = cnt;
 		p = a->passphrases.first;
-	} else if (a->passphrases.candiate > 1) {
+	} else if (a->passphrases.candidate > 1) {
 		/* Rotate a passphrase list. */
-		a->passphrases.candiate--;
+		a->passphrases.candidate--;
 		p = remove_passphrases_from_head(a);
 		add_passphrase_to_tail(a, p);
-		/* Pick a new passphrase candiate up. */
+		/* Pick a new passphrase candidate up. */
 		p = a->passphrases.first;
-	} else if (a->passphrases.candiate == 1) {
-		/* This case is that all cadiates failed to decryption. */
-		a->passphrases.candiate = 0;
+	} else if (a->passphrases.candidate == 1) {
+		/* This case is that all candidates failed to decrypt. */
+		a->passphrases.candidate = 0;
 		if (a->passphrases.first->next != NULL) {
 			/* Rotate a passphrase list. */
 			p = remove_passphrases_from_head(a);
 			add_passphrase_to_tail(a, p);
 		}
 		p = NULL;
-	} else  /* There is no passphrase candaite. */
+	} else  /* There is no passphrase candidate. */
 		p = NULL;
 
 	if (p != NULL)
@@ -177,7 +177,7 @@ __archive_read_next_passphrase(struct archive_read *a)
 			if (p == NULL)
 				return (NULL);
 			insert_passphrase_to_head(a, p);
-			a->passphrases.candiate = 1;
+			a->passphrases.candidate = 1;
 		}
 	} else
 		passphrase = NULL;
diff --git a/libarchive/archive_read_append_filter.c b/libarchive/archive_read_append_filter.c
index 3a0d4d6..5e4d163 100644
--- a/libarchive/archive_read_append_filter.c
+++ b/libarchive/archive_read_append_filter.c
@@ -133,7 +133,6 @@ archive_read_append_filter(struct archive *_a, int code)
     a->filter = filter;
     r2 = (bidder->init)(a->filter);
     if (r2 != ARCHIVE_OK) {
-      __archive_read_close_filters(a);
       __archive_read_free_filters(a);
       return (ARCHIVE_FATAL);
     }
@@ -191,7 +190,6 @@ archive_read_append_filter_program_signature(struct archive *_a,
   a->filter = filter;
   r = (bidder->init)(a->filter);
   if (r != ARCHIVE_OK) {
-    __archive_read_close_filters(a);
     __archive_read_free_filters(a);
     return (ARCHIVE_FATAL);
   }
diff --git a/libarchive/archive_read_disk.3 b/libarchive/archive_read_disk.3
index 525dc59..2a5c130 100644
--- a/libarchive/archive_read_disk.3
+++ b/libarchive/archive_read_disk.3
@@ -24,7 +24,7 @@
 .\"
 .\" $FreeBSD$
 .\"
-.Dd February 2, 2012
+.Dd December 30, 2016
 .Dt ARCHIVE_READ_DISK 3
 .Os
 .Sh NAME
@@ -54,9 +54,9 @@ Streaming Archive Library (libarchive, -larchive)
 .Fn archive_read_disk_set_symlink_physical "struct archive *"
 .Ft int
 .Fn archive_read_disk_set_symlink_hybrid "struct archive *"
-.Ft int
+.Ft const char *
 .Fn archive_read_disk_gname "struct archive *" "gid_t"
-.Ft int
+.Ft const char *
 .Fn archive_read_disk_uname "struct archive *" "uid_t"
 .Ft int
 .Fo archive_read_disk_set_gname_lookup
diff --git a/libarchive/archive_read_disk_entry_from_file.c b/libarchive/archive_read_disk_entry_from_file.c
index 74fe353..591a212 100644
--- a/libarchive/archive_read_disk_entry_from_file.c
+++ b/libarchive/archive_read_disk_entry_from_file.c
@@ -1,6 +1,7 @@
 /*-
  * Copyright (c) 2003-2009 Tim Kientzle
  * Copyright (c) 2010-2012 Michihiro NAKAJIMA
+ * Copyright (c) 2016 Martin Matuska
  * All rights reserved.
  *
  * Redistribution and use in source and binary forms, with or without
@@ -37,6 +38,11 @@ __FBSDID("$FreeBSD: head/lib/libarchive/archive_read_disk_entry_from_file.c 2010
 #ifdef HAVE_SYS_ACL_H
 #include <sys/acl.h>
 #endif
+#ifdef HAVE_DARWIN_ACL
+#include <membership.h>
+#include <grp.h>
+#include <pwd.h>
+#endif
 #ifdef HAVE_SYS_EXTATTR_H
 #include <sys/extattr.h>
 #endif
@@ -117,6 +123,15 @@ __FBSDID("$FreeBSD: head/lib/libarchive/archive_read_disk_entry_from_file.c 2010
 #define	ACL_GET_PERM acl_get_perm_np
 #endif
 
+/* NFSv4 platform ACL type */
+#if HAVE_SUN_ACL
+#define	ARCHIVE_PLATFORM_ACL_TYPE_NFS4	ACE_T
+#elif HAVE_DARWIN_ACL
+#define	ARCHIVE_PLATFORM_ACL_TYPE_NFS4	ACL_TYPE_EXTENDED
+#elif HAVE_ACL_TYPE_NFS4
+#define	ARCHIVE_PLATFORM_ACL_TYPE_NFS4	ACL_TYPE_NFS4
+#endif
+
 static int setup_acls(struct archive_read_disk *,
     struct archive_entry *, int *fd);
 static int setup_mac_metadata(struct archive_read_disk *,
@@ -125,6 +140,10 @@ static int setup_xattrs(struct archive_read_disk *,
     struct archive_entry *, int *fd);
 static int setup_sparse(struct archive_read_disk *,
     struct archive_entry *, int *fd);
+#if defined(HAVE_LINUX_FIEMAP_H)
+static int setup_sparse_fiemap(struct archive_read_disk *,
+    struct archive_entry *, int *fd);
+#endif
 
 int
 archive_read_disk_entry_from_file(struct archive *_a,
@@ -302,20 +321,17 @@ setup_mac_metadata(struct archive_read_disk *a,
 	name = archive_entry_sourcepath(entry);
 	if (name == NULL)
 		name = archive_entry_pathname(entry);
+	else if (a->tree != NULL && a->tree_enter_working_dir(a->tree) != 0) {
+		archive_set_error(&a->archive, errno,
+			    "Can't change dir to read extended attributes");
+			return (ARCHIVE_FAILED);
+	}
 	if (name == NULL) {
 		archive_set_error(&a->archive, ARCHIVE_ERRNO_MISC,
 		    "Can't open file to read extended attributes: No name");
 		return (ARCHIVE_WARN);
 	}
 
-	if (a->tree != NULL) {
-		if (a->tree_enter_working_dir(a->tree) != 0) {
-			archive_set_error(&a->archive, errno,
-				    "Couldn't change dir");
-				return (ARCHIVE_FAILED);
-		}
-	}
-
 	/* Short-circuit if there's nothing to do. */
 	have_attrs = copyfile(name, NULL, 0, copyfile_flags | COPYFILE_CHECK);
 	if (have_attrs == -1) {
@@ -400,34 +416,87 @@ setup_mac_metadata(struct archive_read_disk *a,
 }
 #endif
 
+#if HAVE_DARWIN_ACL
+static int translate_guid(struct archive *, acl_entry_t,
+    int *, int *, const char **);
+
+static void add_trivial_nfs4_acl(struct archive_entry *);
+#endif
+
+#if HAVE_SUN_ACL
+static int
+sun_acl_is_trivial(acl_t *, mode_t, int *trivialp);
+#endif
 
-#ifdef HAVE_POSIX_ACL
+#if HAVE_POSIX_ACL || HAVE_NFS4_ACL
 static int translate_acl(struct archive_read_disk *a,
-    struct archive_entry *entry, acl_t acl, int archive_entry_acl_type);
+    struct archive_entry *entry,
+#if HAVE_SUN_ACL
+    acl_t *acl,
+#else
+    acl_t acl,
+#endif
+    int archive_entry_acl_type);
 
 static int
 setup_acls(struct archive_read_disk *a,
     struct archive_entry *entry, int *fd)
 {
 	const char	*accpath;
-	acl_t		 acl;
-#if HAVE_ACL_IS_TRIVIAL_NP
-	int		r;
+#if HAVE_SUN_ACL
+	acl_t		*acl;
+#else
+	acl_t		acl;
 #endif
+	int		r;
 
-	accpath = archive_entry_sourcepath(entry);
-	if (accpath == NULL)
-		accpath = archive_entry_pathname(entry);
+	accpath = NULL;
+
+#if HAVE_SUN_ACL || HAVE_DARWIN_ACL || HAVE_ACL_GET_FD_NP
+	if (*fd < 0)
+#else
+	/* For default ACLs on Linux we need reachable accpath */
+	if (*fd < 0 || S_ISDIR(archive_entry_mode(entry)))
+#endif
+	{
+		accpath = archive_entry_sourcepath(entry);
+		if (accpath == NULL || (a->tree != NULL &&
+		    a->tree_enter_working_dir(a->tree) != 0))
+			accpath = archive_entry_pathname(entry);
+		if (accpath == NULL) {
+			archive_set_error(&a->archive, ARCHIVE_ERRNO_MISC,
+			    "Couldn't determine file path to read ACLs");
+			return (ARCHIVE_WARN);
+		}
+		if (a->tree != NULL &&
+#if !HAVE_SUN_ACL && !HAVE_DARWIN_ACL && !HAVE_ACL_GET_FD_NP
+		    *fd < 0 &&
+#endif
+		    (a->follow_symlinks ||
+		    archive_entry_filetype(entry) != AE_IFLNK)) {
+			*fd = a->open_on_current_dir(a->tree,
+			    accpath, O_RDONLY | O_NONBLOCK);
+		}
+	}
 
 	archive_entry_acl_clear(entry);
 
-#ifdef ACL_TYPE_NFS4
-	/* Try NFS4 ACL first. */
+	acl = NULL;
+
+#if HAVE_NFS4_ACL
+	/* Try NFSv4 ACL first. */
 	if (*fd >= 0)
+#if HAVE_SUN_ACL
+		/* Solaris reads both POSIX.1e and NFSv4 ACL here */
+		facl_get(*fd, 0, &acl);
+#elif HAVE_ACL_GET_FD_NP
+		acl = acl_get_fd_np(*fd, ARCHIVE_PLATFORM_ACL_TYPE_NFS4);
+#else
 		acl = acl_get_fd(*fd);
+#endif
 #if HAVE_ACL_GET_LINK_NP
 	else if (!a->follow_symlinks)
-		acl = acl_get_link_np(accpath, ACL_TYPE_NFS4);
+		acl = acl_get_link_np(accpath, ARCHIVE_PLATFORM_ACL_TYPE_NFS4);
 #else
 	else if ((!a->follow_symlinks)
 	    && (archive_entry_filetype(entry) == AE_IFLNK))
@@ -436,21 +505,62 @@ setup_acls(struct archive_read_disk *a,
 		acl = NULL;
 #endif
 	else
-		acl = acl_get_file(accpath, ACL_TYPE_NFS4);
-#if HAVE_ACL_IS_TRIVIAL_NP
+#if HAVE_SUN_ACL
+		/* Solaris reads both POSIX.1e and NFSv4 ACLs here */
+		acl_get(accpath, 0, &acl);
+#else
+		acl = acl_get_file(accpath, ARCHIVE_PLATFORM_ACL_TYPE_NFS4);
+#endif
+
+
+#if HAVE_ACL_IS_TRIVIAL_NP || HAVE_SUN_ACL
 	/* Ignore "trivial" ACLs that just mirror the file mode. */
-	acl_is_trivial_np(acl, &r);
-	if (r) {
-		acl_free(acl);
-		acl = NULL;
-	}
+	if (acl != NULL) {
+#if HAVE_SUN_ACL
+		if (sun_acl_is_trivial(acl, archive_entry_mode(entry),
+		    &r) == 0 && r == 1)
+#elif HAVE_ACL_IS_TRIVIAL_NP
+		if (acl_is_trivial_np(acl, &r) == 0 && r == 1)
 #endif
+		{
+			acl_free(acl);
+			acl = NULL;
+			/*
+			 * Simultaneous NFSv4 and POSIX.1e ACLs for the same
+			 * entry are not allowed, so we should return here
+			 */
+			return (ARCHIVE_OK);
+		}
+	}
+#endif	/* HAVE_ACL_IS_TRIVIAL_NP || HAVE_SUN_ACL */
 	if (acl != NULL) {
-		translate_acl(a, entry, acl, ARCHIVE_ENTRY_ACL_TYPE_NFS4);
+		r = translate_acl(a, entry, acl, ARCHIVE_ENTRY_ACL_TYPE_NFS4);
 		acl_free(acl);
-		return (ARCHIVE_OK);
-	}
+		if (r != ARCHIVE_OK) {
+			archive_set_error(&a->archive, errno,
+			    "Couldn't translate "
+#if !HAVE_SUN_ACL
+			    "NFSv4 "
+#endif
+			    "ACLs");
+		}
+#if HAVE_DARWIN_ACL
+		/*
+		 * Because Mac OS doesn't support owner@, group@ and everyone@
+		 * ACLs we need to add NFSv4 ACLs mirroring the file mode to
+		 * the archive entry. Otherwise extraction on non-Mac platforms
+		 * would lead to an invalid file mode.
+		 */
+		if ((archive_entry_acl_types(entry) &
+		    ARCHIVE_ENTRY_ACL_TYPE_NFS4) != 0)
+			add_trivial_nfs4_acl(entry);
 #endif
+		return (r);
+	}
+#endif	/* HAVE_NFS4_ACL */
+
+#if HAVE_POSIX_ACL
+	/* This code path is skipped on MacOS and Solaris */
 
 	/* Retrieve access ACL from file. */
 	if (*fd >= 0)
@@ -467,88 +577,609 @@ setup_acls(struct archive_read_disk *a,
 #endif
 	else
 		acl = acl_get_file(accpath, ACL_TYPE_ACCESS);
+
+#if HAVE_ACL_IS_TRIVIAL_NP
+	/* Ignore "trivial" ACLs that just mirror the file mode. */
+	if (acl != NULL && acl_is_trivial_np(acl, &r) == 0) {
+		if (r) {
+			acl_free(acl);
+			acl = NULL;
+		}
+	}
+#endif
+
 	if (acl != NULL) {
-		translate_acl(a, entry, acl,
-		    ARCHIVE_ENTRY_ACL_TYPE_ACCESS);
+		r = translate_acl(a, entry, acl, ARCHIVE_ENTRY_ACL_TYPE_ACCESS);
 		acl_free(acl);
+		acl = NULL;
+		if (r != ARCHIVE_OK) {
+			archive_set_error(&a->archive, errno,
+			    "Couldn't translate access ACLs");
+			return (r);
+		}
 	}
 
 	/* Only directories can have default ACLs. */
 	if (S_ISDIR(archive_entry_mode(entry))) {
+#if HAVE_ACL_GET_FD_NP
+		if (*fd >= 0)
+			acl = acl_get_fd_np(*fd, ACL_TYPE_DEFAULT);
+		else
+#endif
 		acl = acl_get_file(accpath, ACL_TYPE_DEFAULT);
 		if (acl != NULL) {
-			translate_acl(a, entry, acl,
+			r = translate_acl(a, entry, acl,
 			    ARCHIVE_ENTRY_ACL_TYPE_DEFAULT);
 			acl_free(acl);
+			if (r != ARCHIVE_OK) {
+				archive_set_error(&a->archive, errno,
+				    "Couldn't translate default ACLs");
+				return (r);
+			}
 		}
 	}
+#endif	/* HAVE_POSIX_ACL */
 	return (ARCHIVE_OK);
 }
 
 /*
- * Translate system ACL into libarchive internal structure.
+ * Translate system ACL permissions into libarchive internal structure
  */
-
-static struct {
-        int archive_perm;
-        int platform_perm;
+static const struct {
+	const int archive_perm;
+	const int platform_perm;
 } acl_perm_map[] = {
-        {ARCHIVE_ENTRY_ACL_EXECUTE, ACL_EXECUTE},
-        {ARCHIVE_ENTRY_ACL_WRITE, ACL_WRITE},
-        {ARCHIVE_ENTRY_ACL_READ, ACL_READ},
-#ifdef ACL_TYPE_NFS4
-        {ARCHIVE_ENTRY_ACL_READ_DATA, ACL_READ_DATA},
-        {ARCHIVE_ENTRY_ACL_LIST_DIRECTORY, ACL_LIST_DIRECTORY},
-        {ARCHIVE_ENTRY_ACL_WRITE_DATA, ACL_WRITE_DATA},
-        {ARCHIVE_ENTRY_ACL_ADD_FILE, ACL_ADD_FILE},
-        {ARCHIVE_ENTRY_ACL_APPEND_DATA, ACL_APPEND_DATA},
-        {ARCHIVE_ENTRY_ACL_ADD_SUBDIRECTORY, ACL_ADD_SUBDIRECTORY},
-        {ARCHIVE_ENTRY_ACL_READ_NAMED_ATTRS, ACL_READ_NAMED_ATTRS},
-        {ARCHIVE_ENTRY_ACL_WRITE_NAMED_ATTRS, ACL_WRITE_NAMED_ATTRS},
-        {ARCHIVE_ENTRY_ACL_DELETE_CHILD, ACL_DELETE_CHILD},
-        {ARCHIVE_ENTRY_ACL_READ_ATTRIBUTES, ACL_READ_ATTRIBUTES},
-        {ARCHIVE_ENTRY_ACL_WRITE_ATTRIBUTES, ACL_WRITE_ATTRIBUTES},
-        {ARCHIVE_ENTRY_ACL_DELETE, ACL_DELETE},
-        {ARCHIVE_ENTRY_ACL_READ_ACL, ACL_READ_ACL},
-        {ARCHIVE_ENTRY_ACL_WRITE_ACL, ACL_WRITE_ACL},
-        {ARCHIVE_ENTRY_ACL_WRITE_OWNER, ACL_WRITE_OWNER},
-        {ARCHIVE_ENTRY_ACL_SYNCHRONIZE, ACL_SYNCHRONIZE}
+#if HAVE_SUN_ACL	/* Solaris NFSv4 ACL permissions */
+	{ARCHIVE_ENTRY_ACL_EXECUTE, ACE_EXECUTE},
+	{ARCHIVE_ENTRY_ACL_READ_DATA, ACE_READ_DATA},
+	{ARCHIVE_ENTRY_ACL_LIST_DIRECTORY, ACE_LIST_DIRECTORY},
+	{ARCHIVE_ENTRY_ACL_WRITE_DATA, ACE_WRITE_DATA},
+	{ARCHIVE_ENTRY_ACL_ADD_FILE, ACE_ADD_FILE},
+	{ARCHIVE_ENTRY_ACL_APPEND_DATA, ACE_APPEND_DATA},
+	{ARCHIVE_ENTRY_ACL_ADD_SUBDIRECTORY, ACE_ADD_SUBDIRECTORY},
+	{ARCHIVE_ENTRY_ACL_READ_NAMED_ATTRS, ACE_READ_NAMED_ATTRS},
+	{ARCHIVE_ENTRY_ACL_WRITE_NAMED_ATTRS, ACE_WRITE_NAMED_ATTRS},
+	{ARCHIVE_ENTRY_ACL_DELETE_CHILD, ACE_DELETE_CHILD},
+	{ARCHIVE_ENTRY_ACL_READ_ATTRIBUTES, ACE_READ_ATTRIBUTES},
+	{ARCHIVE_ENTRY_ACL_WRITE_ATTRIBUTES, ACE_WRITE_ATTRIBUTES},
+	{ARCHIVE_ENTRY_ACL_DELETE, ACE_DELETE},
+	{ARCHIVE_ENTRY_ACL_READ_ACL, ACE_READ_ACL},
+	{ARCHIVE_ENTRY_ACL_WRITE_ACL, ACE_WRITE_ACL},
+	{ARCHIVE_ENTRY_ACL_WRITE_OWNER, ACE_WRITE_OWNER},
+	{ARCHIVE_ENTRY_ACL_SYNCHRONIZE, ACE_SYNCHRONIZE}
+#elif HAVE_DARWIN_ACL	/* MacOS ACL permissions */
+	{ARCHIVE_ENTRY_ACL_READ_DATA, ACL_READ_DATA},
+	{ARCHIVE_ENTRY_ACL_LIST_DIRECTORY, ACL_LIST_DIRECTORY},
+	{ARCHIVE_ENTRY_ACL_WRITE_DATA, ACL_WRITE_DATA},
+	{ARCHIVE_ENTRY_ACL_ADD_FILE, ACL_ADD_FILE},
+	{ARCHIVE_ENTRY_ACL_EXECUTE, ACL_EXECUTE},
+	{ARCHIVE_ENTRY_ACL_DELETE, ACL_DELETE},
+	{ARCHIVE_ENTRY_ACL_APPEND_DATA, ACL_APPEND_DATA},
+	{ARCHIVE_ENTRY_ACL_ADD_SUBDIRECTORY, ACL_ADD_SUBDIRECTORY},
+	{ARCHIVE_ENTRY_ACL_DELETE_CHILD, ACL_DELETE_CHILD},
+	{ARCHIVE_ENTRY_ACL_READ_ATTRIBUTES, ACL_READ_ATTRIBUTES},
+	{ARCHIVE_ENTRY_ACL_WRITE_ATTRIBUTES, ACL_WRITE_ATTRIBUTES},
+	{ARCHIVE_ENTRY_ACL_READ_NAMED_ATTRS, ACL_READ_EXTATTRIBUTES},
+	{ARCHIVE_ENTRY_ACL_WRITE_NAMED_ATTRS, ACL_WRITE_EXTATTRIBUTES},
+	{ARCHIVE_ENTRY_ACL_READ_ACL, ACL_READ_SECURITY},
+	{ARCHIVE_ENTRY_ACL_WRITE_ACL, ACL_WRITE_SECURITY},
+	{ARCHIVE_ENTRY_ACL_WRITE_OWNER, ACL_CHANGE_OWNER},
+	{ARCHIVE_ENTRY_ACL_SYNCHRONIZE, ACL_SYNCHRONIZE}
+#else	/* POSIX.1e ACL permissions */
+	{ARCHIVE_ENTRY_ACL_EXECUTE, ACL_EXECUTE},
+	{ARCHIVE_ENTRY_ACL_WRITE, ACL_WRITE},
+	{ARCHIVE_ENTRY_ACL_READ, ACL_READ},
+#if HAVE_ACL_TYPE_NFS4	/* FreeBSD NFSv4 ACL permissions */
+	{ARCHIVE_ENTRY_ACL_READ_DATA, ACL_READ_DATA},
+	{ARCHIVE_ENTRY_ACL_LIST_DIRECTORY, ACL_LIST_DIRECTORY},
+	{ARCHIVE_ENTRY_ACL_WRITE_DATA, ACL_WRITE_DATA},
+	{ARCHIVE_ENTRY_ACL_ADD_FILE, ACL_ADD_FILE},
+	{ARCHIVE_ENTRY_ACL_APPEND_DATA, ACL_APPEND_DATA},
+	{ARCHIVE_ENTRY_ACL_ADD_SUBDIRECTORY, ACL_ADD_SUBDIRECTORY},
+	{ARCHIVE_ENTRY_ACL_READ_NAMED_ATTRS, ACL_READ_NAMED_ATTRS},
+	{ARCHIVE_ENTRY_ACL_WRITE_NAMED_ATTRS, ACL_WRITE_NAMED_ATTRS},
+	{ARCHIVE_ENTRY_ACL_DELETE_CHILD, ACL_DELETE_CHILD},
+	{ARCHIVE_ENTRY_ACL_READ_ATTRIBUTES, ACL_READ_ATTRIBUTES},
+	{ARCHIVE_ENTRY_ACL_WRITE_ATTRIBUTES, ACL_WRITE_ATTRIBUTES},
+	{ARCHIVE_ENTRY_ACL_DELETE, ACL_DELETE},
+	{ARCHIVE_ENTRY_ACL_READ_ACL, ACL_READ_ACL},
+	{ARCHIVE_ENTRY_ACL_WRITE_ACL, ACL_WRITE_ACL},
+	{ARCHIVE_ENTRY_ACL_WRITE_OWNER, ACL_WRITE_OWNER},
+	{ARCHIVE_ENTRY_ACL_SYNCHRONIZE, ACL_SYNCHRONIZE}
 #endif
+#endif	/* !HAVE_SUN_ACL && !HAVE_DARWIN_ACL */
 };
 
-#ifdef ACL_TYPE_NFS4
-static struct {
-        int archive_inherit;
-        int platform_inherit;
+#if HAVE_NFS4_ACL
+/*
+ * Translate system NFSv4 inheritance flags into libarchive internal structure
+ */
+static const struct {
+	const int archive_inherit;
+	const int platform_inherit;
 } acl_inherit_map[] = {
-        {ARCHIVE_ENTRY_ACL_ENTRY_FILE_INHERIT, ACL_ENTRY_FILE_INHERIT},
+#if HAVE_SUN_ACL	/* Solaris ACL inheritance flags */
+	{ARCHIVE_ENTRY_ACL_ENTRY_FILE_INHERIT, ACE_FILE_INHERIT_ACE},
+	{ARCHIVE_ENTRY_ACL_ENTRY_DIRECTORY_INHERIT, ACE_DIRECTORY_INHERIT_ACE},
+	{ARCHIVE_ENTRY_ACL_ENTRY_NO_PROPAGATE_INHERIT, ACE_NO_PROPAGATE_INHERIT_ACE},
+	{ARCHIVE_ENTRY_ACL_ENTRY_INHERIT_ONLY, ACE_INHERIT_ONLY_ACE},
+	{ARCHIVE_ENTRY_ACL_ENTRY_SUCCESSFUL_ACCESS, ACE_SUCCESSFUL_ACCESS_ACE_FLAG},
+	{ARCHIVE_ENTRY_ACL_ENTRY_FAILED_ACCESS, ACE_FAILED_ACCESS_ACE_FLAG},
+	{ARCHIVE_ENTRY_ACL_ENTRY_INHERITED, ACE_INHERITED_ACE}
+#elif HAVE_DARWIN_ACL	/* MacOS NFSv4 inheritance flags */
+	{ARCHIVE_ENTRY_ACL_ENTRY_INHERITED, ACL_ENTRY_INHERITED},
+	{ARCHIVE_ENTRY_ACL_ENTRY_FILE_INHERIT, ACL_ENTRY_FILE_INHERIT},
+	{ARCHIVE_ENTRY_ACL_ENTRY_DIRECTORY_INHERIT, ACL_ENTRY_DIRECTORY_INHERIT},
+	{ARCHIVE_ENTRY_ACL_ENTRY_NO_PROPAGATE_INHERIT, ACL_ENTRY_LIMIT_INHERIT},
+	{ARCHIVE_ENTRY_ACL_ENTRY_INHERIT_ONLY, ACL_ENTRY_ONLY_INHERIT}
+#else	/* FreeBSD NFSv4 ACL inheritance flags */
+	{ARCHIVE_ENTRY_ACL_ENTRY_FILE_INHERIT, ACL_ENTRY_FILE_INHERIT},
 	{ARCHIVE_ENTRY_ACL_ENTRY_DIRECTORY_INHERIT, ACL_ENTRY_DIRECTORY_INHERIT},
 	{ARCHIVE_ENTRY_ACL_ENTRY_NO_PROPAGATE_INHERIT, ACL_ENTRY_NO_PROPAGATE_INHERIT},
-	{ARCHIVE_ENTRY_ACL_ENTRY_INHERIT_ONLY, ACL_ENTRY_INHERIT_ONLY}
+	{ARCHIVE_ENTRY_ACL_ENTRY_INHERIT_ONLY, ACL_ENTRY_INHERIT_ONLY},
+	{ARCHIVE_ENTRY_ACL_ENTRY_SUCCESSFUL_ACCESS, ACL_ENTRY_SUCCESSFUL_ACCESS},
+	{ARCHIVE_ENTRY_ACL_ENTRY_FAILED_ACCESS, ACL_ENTRY_FAILED_ACCESS},
+	{ARCHIVE_ENTRY_ACL_ENTRY_INHERITED, ACL_ENTRY_INHERITED}
+#endif	/* !HAVE_SUN_ACL && !HAVE_DARWIN_ACL */
 };
-#endif
+#endif	/* HAVE_NFS4_ACL */
+
+#if HAVE_DARWIN_ACL
+static int translate_guid(struct archive *a, acl_entry_t acl_entry,
+    int *ae_id, int *ae_tag, const char **ae_name)
+{
+	void *q;
+	uid_t ugid;
+	int r, idtype;
+	struct passwd *pwd;
+	struct group *grp;
+
+	q = acl_get_qualifier(acl_entry);
+	if (q == NULL)
+		return (1);
+	r = mbr_uuid_to_id((const unsigned char *)q, &ugid, &idtype);
+	if (r != 0) {
+		acl_free(q);
+		return (1);
+	}
+	if (idtype == ID_TYPE_UID) {
+		*ae_tag = ARCHIVE_ENTRY_ACL_USER;
+		pwd = getpwuuid(q);
+		if (pwd == NULL) {
+			*ae_id = ugid;
+			*ae_name = NULL;
+		} else {
+			*ae_id = pwd->pw_uid;
+			*ae_name = archive_read_disk_uname(a, *ae_id);
+		}
+	} else if (idtype == ID_TYPE_GID) {
+		*ae_tag = ARCHIVE_ENTRY_ACL_GROUP;
+		grp = getgruuid(q);
+		if (grp == NULL) {
+			*ae_id = ugid;
+			*ae_name = NULL;
+		} else {
+			*ae_id = grp->gr_gid;
+			*ae_name = archive_read_disk_gname(a, *ae_id);
+		}
+	} else
+		r = 1;
+
+	acl_free(q);
+	return (r);
+}
+
+/*
+ * Add trivial NFSv4 ACL entries from mode
+ */
+static void
+add_trivial_nfs4_acl(struct archive_entry *entry)
+{
+	mode_t mode;
+	int i;
+	const int rperm = ARCHIVE_ENTRY_ACL_READ_DATA;
+	const int wperm = ARCHIVE_ENTRY_ACL_WRITE_DATA |
+	    ARCHIVE_ENTRY_ACL_APPEND_DATA;
+	const int eperm = ARCHIVE_ENTRY_ACL_EXECUTE;
+	const int pubset = ARCHIVE_ENTRY_ACL_READ_ATTRIBUTES |
+	    ARCHIVE_ENTRY_ACL_READ_NAMED_ATTRS |
+	    ARCHIVE_ENTRY_ACL_READ_ACL |
+	    ARCHIVE_ENTRY_ACL_SYNCHRONIZE;
+	const int ownset = pubset | ARCHIVE_ENTRY_ACL_WRITE_ATTRIBUTES |
+	    ARCHIVE_ENTRY_ACL_WRITE_NAMED_ATTRS |
+	    ARCHIVE_ENTRY_ACL_WRITE_ACL |
+	    ARCHIVE_ENTRY_ACL_WRITE_OWNER;
+
+	struct {
+	    const int type;
+	    const int tag;
+	    int permset;
+	} tacl_entry[] = {
+	    {ARCHIVE_ENTRY_ACL_TYPE_ALLOW, ARCHIVE_ENTRY_ACL_USER_OBJ, 0},
+	    {ARCHIVE_ENTRY_ACL_TYPE_DENY, ARCHIVE_ENTRY_ACL_USER_OBJ, 0},
+	    {ARCHIVE_ENTRY_ACL_TYPE_DENY, ARCHIVE_ENTRY_ACL_GROUP_OBJ, 0},
+	    {ARCHIVE_ENTRY_ACL_TYPE_ALLOW, ARCHIVE_ENTRY_ACL_USER_OBJ, ownset},
+	    {ARCHIVE_ENTRY_ACL_TYPE_ALLOW, ARCHIVE_ENTRY_ACL_GROUP_OBJ, pubset},
+	    {ARCHIVE_ENTRY_ACL_TYPE_ALLOW, ARCHIVE_ENTRY_ACL_EVERYONE, pubset}
+	};
+
+	mode = archive_entry_mode(entry);
+
+	/* Permissions for everyone@ */
+	if (mode & 0004)
+		tacl_entry[5].permset |= rperm;
+	if (mode & 0002)
+		tacl_entry[5].permset |= wperm;
+	if (mode & 0001)
+		tacl_entry[5].permset |= eperm;
+
+	/* Permissions for group@ */
+	if (mode & 0040)
+		tacl_entry[4].permset |= rperm;
+	else if (mode & 0004)
+		tacl_entry[2].permset |= rperm;
+	if (mode & 0020)
+		tacl_entry[4].permset |= wperm;
+	else if (mode & 0002)
+		tacl_entry[2].permset |= wperm;
+	if (mode & 0010)
+		tacl_entry[4].permset |= eperm;
+	else if (mode & 0001)
+		tacl_entry[2].permset |= eperm;
+
+	/* Permissions for owner@ */
+	if (mode & 0400) {
+		tacl_entry[3].permset |= rperm;
+		if (!(mode & 0040) && (mode & 0004))
+			tacl_entry[0].permset |= rperm;
+	} else if ((mode & 0040) || (mode & 0004))
+		tacl_entry[1].permset |= rperm;
+	if (mode & 0200) {
+		tacl_entry[3].permset |= wperm;
+		if (!(mode & 0020) && (mode & 0002))
+			tacl_entry[0].permset |= wperm;
+	} else if ((mode & 0020) || (mode & 0002))
+		tacl_entry[1].permset |= wperm;
+	if (mode & 0100) {
+		tacl_entry[3].permset |= eperm;
+		if (!(mode & 0010) && (mode & 0001))
+			tacl_entry[0].permset |= eperm;
+	} else if ((mode & 0010) || (mode & 0001))
+		tacl_entry[1].permset |= eperm;
+
+	for (i = 0; i < 6; i++) {
+		if (tacl_entry[i].permset != 0) {
+			archive_entry_acl_add_entry(entry,
+			    tacl_entry[i].type, tacl_entry[i].permset,
+			    tacl_entry[i].tag, -1, NULL);
+		}
+	}
+
+	return;
+}
+#elif HAVE_SUN_ACL
+/*
+ * Check if acl is trivial
+ * This is a FreeBSD acl_is_trivial_np() implementation for Solaris
+ */
+static int
+sun_acl_is_trivial(acl_t *acl, mode_t mode, int *trivialp)
+{
+	int i, p;
+	const uint32_t rperm = ACE_READ_DATA;
+	const uint32_t wperm = ACE_WRITE_DATA | ACE_APPEND_DATA;
+	const uint32_t eperm = ACE_EXECUTE;
+	const uint32_t pubset = ACE_READ_ATTRIBUTES | ACE_READ_NAMED_ATTRS |
+	    ACE_READ_ACL | ACE_SYNCHRONIZE;
+	const uint32_t ownset = pubset | ACE_WRITE_ATTRIBUTES |
+	    ACE_WRITE_NAMED_ATTRS | ACE_WRITE_ACL | ACE_WRITE_OWNER;
+
+	ace_t *ace;
+	ace_t tace[6];
+
+	if (acl == NULL || trivialp == NULL)
+		return (-1);
+
+	*trivialp = 0;
+
+	/* ACL_IS_TRIVIAL flag must be set for both POSIX.1e and NFSv4 ACLs */
+	if ((acl->acl_flags & ACL_IS_TRIVIAL) == 0)
+		return (0);
+
+	/*
+	 * POSIX.1e ACLs marked with ACL_IS_TRIVIAL are compatible with
+	 * FreeBSD acl_is_trivial_np(). On Solaris they have 4 entries,
+	 * including mask.
+	 */
+	if (acl->acl_type == ACLENT_T) {
+		if (acl->acl_cnt == 4)
+			*trivialp = 1;
+		return (0);
+	}
+
+	if (acl->acl_type != ACE_T || acl->acl_entry_size != sizeof(ace_t))
+		return (-1);
+
+	/*
+	 * Continue with checking NFSv4 ACLs
+	 *
+	 * Create list of trivial ace's to be compared
+	 */
+
+	/* owner@ allow pre */
+	tace[0].a_flags = ACE_OWNER;
+	tace[0].a_type = ACE_ACCESS_ALLOWED_ACE_TYPE;
+	tace[0].a_access_mask = 0;
+
+	/* owner@ deny */
+	tace[1].a_flags = ACE_OWNER;
+	tace[1].a_type = ACE_ACCESS_DENIED_ACE_TYPE;
+	tace[1].a_access_mask = 0;
+
+	/* group@ deny */
+	tace[2].a_flags = ACE_GROUP | ACE_IDENTIFIER_GROUP;
+	tace[2].a_type = ACE_ACCESS_DENIED_ACE_TYPE;
+	tace[2].a_access_mask = 0;
+
+	/* owner@ allow */
+	tace[3].a_flags = ACE_OWNER;
+	tace[3].a_type = ACE_ACCESS_ALLOWED_ACE_TYPE;
+	tace[3].a_access_mask = ownset;
+
+	/* group@ allow */
+	tace[4].a_flags = ACE_GROUP | ACE_IDENTIFIER_GROUP;
+	tace[4].a_type = ACE_ACCESS_ALLOWED_ACE_TYPE;
+	tace[4].a_access_mask = pubset;
+
+	/* everyone@ allow */
+	tace[5].a_flags = ACE_EVERYONE;
+	tace[5].a_type = ACE_ACCESS_ALLOWED_ACE_TYPE;
+	tace[5].a_access_mask = pubset;
+
+	/* Permissions for everyone@ */
+	if (mode & 0004)
+		tace[5].a_access_mask |= rperm;
+	if (mode & 0002)
+		tace[5].a_access_mask |= wperm;
+	if (mode & 0001)
+		tace[5].a_access_mask |= eperm;
+
+	/* Permissions for group@ */
+	if (mode & 0040)
+		tace[4].a_access_mask |= rperm;
+	else if (mode & 0004)
+		tace[2].a_access_mask |= rperm;
+	if (mode & 0020)
+		tace[4].a_access_mask |= wperm;
+	else if (mode & 0002)
+		tace[2].a_access_mask |= wperm;
+	if (mode & 0010)
+		tace[4].a_access_mask |= eperm;
+	else if (mode & 0001)
+		tace[2].a_access_mask |= eperm;
+
+	/* Permissions for owner@ */
+	if (mode & 0400) {
+		tace[3].a_access_mask |= rperm;
+		if (!(mode & 0040) && (mode & 0004))
+			tace[0].a_access_mask |= rperm;
+	} else if ((mode & 0040) || (mode & 0004))
+		tace[1].a_access_mask |= rperm;
+	if (mode & 0200) {
+		tace[3].a_access_mask |= wperm;
+		if (!(mode & 0020) && (mode & 0002))
+			tace[0].a_access_mask |= wperm;
+	} else if ((mode & 0020) || (mode & 0002))
+		tace[1].a_access_mask |= wperm;
+	if (mode & 0100) {
+		tace[3].a_access_mask |= eperm;
+		if (!(mode & 0010) && (mode & 0001))
+			tace[0].a_access_mask |= eperm;
+	} else if ((mode & 0010) || (mode & 0001))
+		tace[1].a_access_mask |= eperm;
+
+	/* Check if the acl count matches */
+	p = 3;
+	for (i = 0; i < 3; i++) {
+		if (tace[i].a_access_mask != 0)
+			p++;
+	}
+	if (acl->acl_cnt != p)
+		return (0);
+
+	p = 0;
+	for (i = 0; i < 6; i++) {
+		if (tace[i].a_access_mask != 0) {
+			ace = &((ace_t *)acl->acl_aclp)[p];
+			/*
+			 * Illumos added ACE_DELETE_CHILD to write perms for
+			 * directories. We have to check against that, too.
+			 */
+			if (ace->a_flags != tace[i].a_flags ||
+			    ace->a_type != tace[i].a_type ||
+			    (ace->a_access_mask != tace[i].a_access_mask &&
+			    ((acl->acl_flags & ACL_IS_DIR) == 0 ||
+			    (tace[i].a_access_mask & wperm) == 0 ||
+			    ace->a_access_mask !=
+			    (tace[i].a_access_mask | ACE_DELETE_CHILD))))
+				return (0);
+			p++;
+		}
+	}
+
+	*trivialp = 1;
+	return (0);
+}
+#endif	/* HAVE_SUN_ACL */
+
+#if HAVE_SUN_ACL
+/*
+ * Translate Solaris POSIX.1e and NFSv4 ACLs into libarchive internal ACL
+ */
+static int
+translate_acl(struct archive_read_disk *a,
+    struct archive_entry *entry, acl_t *acl, int default_entry_acl_type)
+{
+	int e, i;
+	int ae_id, ae_tag, ae_perm;
+	int entry_acl_type;
+	const char *ae_name;
+	aclent_t *aclent;
+	ace_t *ace;
+
+	(void)default_entry_acl_type;
+
+	if (acl->acl_cnt <= 0)
+		return (ARCHIVE_OK);
+
+	for (e = 0; e < acl->acl_cnt; e++) {
+		ae_name = NULL;
+		ae_tag = 0;
+		ae_perm = 0;
+
+		if (acl->acl_type == ACE_T) {
+			ace = &((ace_t *)acl->acl_aclp)[e];
+			ae_id = ace->a_who;
+
+			switch(ace->a_type) {
+			case ACE_ACCESS_ALLOWED_ACE_TYPE:
+				entry_acl_type = ARCHIVE_ENTRY_ACL_TYPE_ALLOW;
+				break;
+			case ACE_ACCESS_DENIED_ACE_TYPE:
+				entry_acl_type = ARCHIVE_ENTRY_ACL_TYPE_DENY;
+				break;
+			case ACE_SYSTEM_AUDIT_ACE_TYPE:
+				entry_acl_type = ARCHIVE_ENTRY_ACL_TYPE_ACCESS;
+				break;
+			case ACE_SYSTEM_ALARM_ACE_TYPE:
+				entry_acl_type = ARCHIVE_ENTRY_ACL_TYPE_ALARM;
+				break;
+			default:
+				/* Unknown entry type, skip */
+				continue;
+			}
+
+			if ((ace->a_flags & ACE_OWNER) != 0)
+				ae_tag = ARCHIVE_ENTRY_ACL_USER_OBJ;
+			else if ((ace->a_flags & ACE_GROUP) != 0)
+				ae_tag = ARCHIVE_ENTRY_ACL_GROUP_OBJ;
+			else if ((ace->a_flags & ACE_EVERYONE) != 0)
+				ae_tag = ARCHIVE_ENTRY_ACL_EVERYONE;
+			else if ((ace->a_flags & ACE_IDENTIFIER_GROUP) != 0) {
+				ae_tag = ARCHIVE_ENTRY_ACL_GROUP;
+				ae_name = archive_read_disk_gname(&a->archive,
+				    ae_id);
+			} else {
+				ae_tag = ARCHIVE_ENTRY_ACL_USER;
+				ae_name = archive_read_disk_uname(&a->archive,
+				    ae_id);
+			}
+
+			for (i = 0; i < (int)(sizeof(acl_inherit_map) /
+			    sizeof(acl_inherit_map[0])); ++i) {
+				if ((ace->a_flags &
+				    acl_inherit_map[i].platform_inherit) != 0)
+					ae_perm |=
+					    acl_inherit_map[i].archive_inherit;
+			}
+
+			for (i = 0; i < (int)(sizeof(acl_perm_map) /
+			    sizeof(acl_perm_map[0])); ++i) {
+				if ((ace->a_access_mask &
+				    acl_perm_map[i].platform_perm) != 0)
+					ae_perm |=
+					    acl_perm_map[i].archive_perm;
+			}
+		} else {
+			aclent = &((aclent_t *)acl->acl_aclp)[e];
+			if ((aclent->a_type & ACL_DEFAULT) != 0)
+				entry_acl_type = ARCHIVE_ENTRY_ACL_TYPE_DEFAULT;
+			else
+				entry_acl_type = ARCHIVE_ENTRY_ACL_TYPE_ACCESS;
+			ae_id = aclent->a_id;
+
+			switch(aclent->a_type) {
+			case DEF_USER:
+			case USER:
+				ae_name = archive_read_disk_uname(&a->archive,
+				    ae_id);
+				ae_tag = ARCHIVE_ENTRY_ACL_USER;
+				break;
+			case DEF_GROUP:
+			case GROUP:
+				ae_name = archive_read_disk_gname(&a->archive,
+				    ae_id);
+				ae_tag = ARCHIVE_ENTRY_ACL_GROUP;
+				break;
+			case DEF_CLASS_OBJ:
+			case CLASS_OBJ:
+				ae_tag = ARCHIVE_ENTRY_ACL_MASK;
+				break;
+			case DEF_USER_OBJ:
+			case USER_OBJ:
+				ae_tag = ARCHIVE_ENTRY_ACL_USER_OBJ;
+				break;
+			case DEF_GROUP_OBJ:
+			case GROUP_OBJ:
+				ae_tag = ARCHIVE_ENTRY_ACL_GROUP_OBJ;
+				break;
+			case DEF_OTHER_OBJ:
+			case OTHER_OBJ:
+				ae_tag = ARCHIVE_ENTRY_ACL_OTHER;
+				break;
+			default:
+				/* Unknown tag type, skip */
+				continue;
+			}
+
+			if ((aclent->a_perm & 1) != 0)
+				ae_perm |= ARCHIVE_ENTRY_ACL_EXECUTE;
+			if ((aclent->a_perm & 2) != 0)
+				ae_perm |= ARCHIVE_ENTRY_ACL_WRITE;
+			if ((aclent->a_perm & 4) != 0)
+				ae_perm |= ARCHIVE_ENTRY_ACL_READ;
+		} /* default_entry_acl_type != ARCHIVE_ENTRY_ACL_TYPE_NFS4 */
+
+		archive_entry_acl_add_entry(entry, entry_acl_type,
+		    ae_perm, ae_tag, ae_id, ae_name);
+	}
+	return (ARCHIVE_OK);
+}
+#else	/* !HAVE_SUN_ACL */
+/*
+ * Translate POSIX.1e (Linux), FreeBSD (both POSIX.1e and NFSv4) and
+ * MacOS (NFSv4 only) ACLs into libarchive internal structure
+ */
 static int
 translate_acl(struct archive_read_disk *a,
     struct archive_entry *entry, acl_t acl, int default_entry_acl_type)
 {
 	acl_tag_t	 acl_tag;
-#ifdef ACL_TYPE_NFS4
+#if HAVE_ACL_TYPE_NFS4
 	acl_entry_type_t acl_type;
+	int brand;
+#endif
+#if HAVE_ACL_TYPE_NFS4 || HAVE_DARWIN_ACL
 	acl_flagset_t	 acl_flagset;
-	int brand, r;
 #endif
 	acl_entry_t	 acl_entry;
 	acl_permset_t	 acl_permset;
 	int		 i, entry_acl_type;
-	int		 s, ae_id, ae_tag, ae_perm;
+	int		 r, s, ae_id, ae_tag, ae_perm;
+#if !HAVE_DARWIN_ACL
+	void		*q;
+#endif
 	const char	*ae_name;
 
-
-#ifdef ACL_TYPE_NFS4
+#if HAVE_ACL_TYPE_NFS4
 	// FreeBSD "brands" ACLs as POSIX.1e or NFSv4
 	// Make sure the "brand" on this ACL is consistent
 	// with the default_entry_acl_type bits provided.
-	acl_get_brand_np(acl, &brand);
+	if (acl_get_brand_np(acl, &brand) != 0) {
+		archive_set_error(&a->archive, errno,
+		    "Failed to read ACL brand");
+		return (ARCHIVE_WARN);
+	}
 	switch (brand) {
 	case ACL_BRAND_POSIX:
 		switch (default_entry_acl_type) {
@@ -556,40 +1187,67 @@ translate_acl(struct archive_read_disk *a,
 		case ARCHIVE_ENTRY_ACL_TYPE_DEFAULT:
 			break;
 		default:
-			// XXX set warning message?
-			return ARCHIVE_FAILED;
+			archive_set_error(&a->archive, ARCHIVE_ERRNO_MISC,
+			    "Invalid ACL entry type for POSIX.1e ACL");
+			return (ARCHIVE_WARN);
 		}
 		break;
 	case ACL_BRAND_NFS4:
 		if (default_entry_acl_type & ~ARCHIVE_ENTRY_ACL_TYPE_NFS4) {
-			// XXX set warning message?
-			return ARCHIVE_FAILED;
+			archive_set_error(&a->archive, ARCHIVE_ERRNO_MISC,
+			    "Invalid ACL entry type for NFSv4 ACL");
+			return (ARCHIVE_WARN);
 		}
 		break;
 	default:
-		// XXX set warning message?
-		return ARCHIVE_FAILED;
-		break;
+		archive_set_error(&a->archive, ARCHIVE_ERRNO_MISC,
+		    "Unknown ACL brand");
+		return (ARCHIVE_WARN);
 	}
 #endif
 
-
 	s = acl_get_entry(acl, ACL_FIRST_ENTRY, &acl_entry);
-	while (s == 1) {
+	if (s == -1) {
+		archive_set_error(&a->archive, errno,
+		    "Failed to get first ACL entry");
+		return (ARCHIVE_WARN);
+	}
+
+#if HAVE_DARWIN_ACL
+	while (s == 0)
+#else	/* FreeBSD, Linux */
+	while (s == 1)
+#endif
+	{
 		ae_id = -1;
 		ae_name = NULL;
 		ae_perm = 0;
 
-		acl_get_tag_type(acl_entry, &acl_tag);
+		if (acl_get_tag_type(acl_entry, &acl_tag) != 0) {
+			archive_set_error(&a->archive, errno,
+			    "Failed to get ACL tag type");
+			return (ARCHIVE_WARN);
+		}
 		switch (acl_tag) {
+#if !HAVE_DARWIN_ACL	/* FreeBSD, Linux */
 		case ACL_USER:
-			ae_id = (int)*(uid_t *)acl_get_qualifier(acl_entry);
-			ae_name = archive_read_disk_uname(&a->archive, ae_id);
+			q = acl_get_qualifier(acl_entry);
+			if (q != NULL) {
+				ae_id = (int)*(uid_t *)q;
+				acl_free(q);
+				ae_name = archive_read_disk_uname(&a->archive,
+				    ae_id);
+			}
 			ae_tag = ARCHIVE_ENTRY_ACL_USER;
 			break;
 		case ACL_GROUP:
-			ae_id = (int)*(gid_t *)acl_get_qualifier(acl_entry);
-			ae_name = archive_read_disk_gname(&a->archive, ae_id);
+			q = acl_get_qualifier(acl_entry);
+			if (q != NULL) {
+				ae_id = (int)*(gid_t *)q;
+				acl_free(q);
+				ae_name = archive_read_disk_gname(&a->archive,
+				    ae_id);
+			}
 			ae_tag = ARCHIVE_ENTRY_ACL_GROUP;
 			break;
 		case ACL_MASK:
@@ -604,24 +1262,52 @@ translate_acl(struct archive_read_disk *a,
 		case ACL_OTHER:
 			ae_tag = ARCHIVE_ENTRY_ACL_OTHER;
 			break;
-#ifdef ACL_TYPE_NFS4
+#if HAVE_ACL_TYPE_NFS4
 		case ACL_EVERYONE:
 			ae_tag = ARCHIVE_ENTRY_ACL_EVERYONE;
 			break;
 #endif
+#else	/* HAVE_DARWIN_ACL */
+		case ACL_EXTENDED_ALLOW:
+			entry_acl_type = ARCHIVE_ENTRY_ACL_TYPE_ALLOW;
+			r = translate_guid(&a->archive, acl_entry, &ae_id,
+			    &ae_tag, &ae_name);
+			break;
+		case ACL_EXTENDED_DENY:
+			entry_acl_type = ARCHIVE_ENTRY_ACL_TYPE_DENY;
+			r = translate_guid(&a->archive, acl_entry, &ae_id,
+			    &ae_tag, &ae_name);
+			break;
+#endif	/* HAVE_DARWIN_ACL */
 		default:
 			/* Skip types that libarchive can't support. */
 			s = acl_get_entry(acl, ACL_NEXT_ENTRY, &acl_entry);
 			continue;
 		}
 
-		// XXX acl type maps to allow/deny/audit/YYYY bits
-		// XXX acl_get_entry_type_np on FreeBSD returns EINVAL for
-		// non-NFSv4 ACLs
+#if HAVE_DARWIN_ACL
+		/* Skip if translate_guid() above failed */
+		if (r != 0) {
+			s = acl_get_entry(acl, ACL_NEXT_ENTRY, &acl_entry);
+			continue;
+		}
+#endif
+
+#if !HAVE_DARWIN_ACL
+		// XXX acl_type maps to allow/deny/audit/YYYY bits
 		entry_acl_type = default_entry_acl_type;
-#ifdef ACL_TYPE_NFS4
-		r = acl_get_entry_type_np(acl_entry, &acl_type);
-		if (r == 0) {
+#endif
+#if HAVE_ACL_TYPE_NFS4 || HAVE_DARWIN_ACL
+		if (default_entry_acl_type & ARCHIVE_ENTRY_ACL_TYPE_NFS4) {
+#if HAVE_ACL_TYPE_NFS4
+			/*
+			 * acl_get_entry_type_np() fails with non-NFSv4 ACLs
+			 */
+			if (acl_get_entry_type_np(acl_entry, &acl_type) != 0) {
+				archive_set_error(&a->archive, errno, "Failed "
+				    "to get ACL type from a NFSv4 ACL entry");
+				return (ARCHIVE_WARN);
+			}
 			switch (acl_type) {
 			case ACL_ENTRY_TYPE_ALLOW:
 				entry_acl_type = ARCHIVE_ENTRY_ACL_TYPE_ALLOW;
@@ -635,29 +1321,54 @@ translate_acl(struct archive_read_disk *a,
 			case ACL_ENTRY_TYPE_ALARM:
 				entry_acl_type = ARCHIVE_ENTRY_ACL_TYPE_ALARM;
 				break;
+			default:
+				archive_set_error(&a->archive, errno,
+				    "Invalid NFSv4 ACL entry type");
+				return (ARCHIVE_WARN);
 			}
-		}
-
-		/*
-		 * Libarchive stores "flag" (NFSv4 inheritance bits)
-		 * in the ae_perm bitmap.
-		 */
-		acl_get_flagset_np(acl_entry, &acl_flagset);
-                for (i = 0; i < (int)(sizeof(acl_inherit_map) / sizeof(acl_inherit_map[0])); ++i) {
-			if (acl_get_flag_np(acl_flagset,
-					    acl_inherit_map[i].platform_inherit))
-				ae_perm |= acl_inherit_map[i].archive_inherit;
+#endif	/* HAVE_ACL_TYPE_NFS4 */
 
-                }
-#endif
+			/*
+			 * Libarchive stores "flag" (NFSv4 inheritance bits)
+			 * in the ae_perm bitmap.
+			 *
+			 * acl_get_flagset_np() fails with non-NFSv4 ACLs
+			 */
+			if (acl_get_flagset_np(acl_entry, &acl_flagset) != 0) {
+				archive_set_error(&a->archive, errno,
+				    "Failed to get flagset from a NFSv4 ACL entry");
+				return (ARCHIVE_WARN);
+			}
+			for (i = 0; i < (int)(sizeof(acl_inherit_map) / sizeof(acl_inherit_map[0])); ++i) {
+				r = acl_get_flag_np(acl_flagset,
+				    acl_inherit_map[i].platform_inherit);
+				if (r == -1) {
+					archive_set_error(&a->archive, errno,
+					    "Failed to check flag in a NFSv4 "
+					    "ACL flagset");
+					return (ARCHIVE_WARN);
+				} else if (r)
+					ae_perm |= acl_inherit_map[i].archive_inherit;
+			}
+		}
+#endif	/* HAVE_ACL_TYPE_NFS4 || HAVE_DARWIN_ACL */
 
-		acl_get_permset(acl_entry, &acl_permset);
+		if (acl_get_permset(acl_entry, &acl_permset) != 0) {
+			archive_set_error(&a->archive, errno,
+			    "Failed to get ACL permission set");
+			return (ARCHIVE_WARN);
+		}
 		for (i = 0; i < (int)(sizeof(acl_perm_map) / sizeof(acl_perm_map[0])); ++i) {
 			/*
 			 * acl_get_perm() is spelled differently on different
 			 * platforms; see above.
 			 */
-			if (ACL_GET_PERM(acl_permset, acl_perm_map[i].platform_perm))
+			r = ACL_GET_PERM(acl_permset, acl_perm_map[i].platform_perm);
+			if (r == -1) {
+				archive_set_error(&a->archive, errno,
+				    "Failed to check permission in an ACL permission set");
+				return (ARCHIVE_WARN);
+			} else if (r)
 				ae_perm |= acl_perm_map[i].archive_perm;
 		}
 
@@ -666,10 +1377,18 @@ translate_acl(struct archive_read_disk *a,
 					    ae_id, ae_name);
 
 		s = acl_get_entry(acl, ACL_NEXT_ENTRY, &acl_entry);
+#if !HAVE_DARWIN_ACL
+		if (s == -1) {
+			archive_set_error(&a->archive, errno,
+			    "Failed to get next ACL entry");
+			return (ARCHIVE_WARN);
+		}
+#endif
 	}
 	return (ARCHIVE_OK);
 }
-#else
+#endif	/* !HAVE_SUN_ACL */
+#else	/* !HAVE_POSIX_ACL && !HAVE_NFS4_ACL */
 static int
 setup_acls(struct archive_read_disk *a,
     struct archive_entry *entry, int *fd)
@@ -679,7 +1398,7 @@ setup_acls(struct archive_read_disk *a,
 	(void)fd;     /* UNUSED */
 	return (ARCHIVE_OK);
 }
-#endif
+#endif	/* !HAVE_POSIX_ACL && !HAVE_NFS4_ACL */
 
 #if (HAVE_FGETXATTR && HAVE_FLISTXATTR && HAVE_LISTXATTR && \
     HAVE_LLISTXATTR && HAVE_GETXATTR && HAVE_LGETXATTR) || \
@@ -699,15 +1418,10 @@ setup_acls(struct archive_read_disk *a,
 
 static int
 setup_xattr(struct archive_read_disk *a,
-    struct archive_entry *entry, const char *name, int fd)
+    struct archive_entry *entry, const char *name, int fd, const char *accpath)
 {
 	ssize_t size;
 	void *value = NULL;
-	const char *accpath;
-
-	accpath = archive_entry_sourcepath(entry);
-	if (accpath == NULL)
-		accpath = archive_entry_pathname(entry);
 
 #if HAVE_FGETXATTR
 	if (fd >= 0)
@@ -772,21 +1486,23 @@ setup_xattrs(struct archive_read_disk *a,
 	const char *path;
 	ssize_t list_size;
 
-	path = archive_entry_sourcepath(entry);
-	if (path == NULL)
-		path = archive_entry_pathname(entry);
+	path = NULL;
 
-	if (*fd < 0 && a->tree != NULL) {
-		if (a->follow_symlinks ||
-		    archive_entry_filetype(entry) != AE_IFLNK)
-			*fd = a->open_on_current_dir(a->tree, path,
-				O_RDONLY | O_NONBLOCK);
-		if (*fd < 0) {
-			if (a->tree_enter_working_dir(a->tree) != 0) {
-				archive_set_error(&a->archive, errno,
-				    "Couldn't access %s", path);
-				return (ARCHIVE_FAILED);
-			}
+	if (*fd < 0) {
+		path = archive_entry_sourcepath(entry);
+		if (path == NULL || (a->tree != NULL &&
+		    a->tree_enter_working_dir(a->tree) != 0))
+			path = archive_entry_pathname(entry);
+		if (path == NULL) {
+			archive_set_error(&a->archive, ARCHIVE_ERRNO_MISC,
+			    "Couldn't determine file path to read "
+			    "extended attributes");
+			return (ARCHIVE_WARN);
+		}
+		if (a->tree != NULL && (a->follow_symlinks ||
+		    archive_entry_filetype(entry) != AE_IFLNK)) {
+			*fd = a->open_on_current_dir(a->tree,
+			    path, O_RDONLY | O_NONBLOCK);
 		}
 	}
 
@@ -849,7 +1565,7 @@ setup_xattrs(struct archive_read_disk *a,
 		if (strncmp(p, "system.", 7) == 0 ||
 				strncmp(p, "xfsroot.", 8) == 0)
 			continue;
-		setup_xattr(a, entry, p, *fd);
+		setup_xattr(a, entry, p, *fd, path);
 	}
 
 	free(list);
@@ -870,19 +1586,16 @@ setup_xattrs(struct archive_read_disk *a,
  */
 static int
 setup_xattr(struct archive_read_disk *a, struct archive_entry *entry,
-    int namespace, const char *name, const char *fullname, int fd);
+    int namespace, const char *name, const char *fullname, int fd,
+    const char *path);
 
 static int
 setup_xattr(struct archive_read_disk *a, struct archive_entry *entry,
-    int namespace, const char *name, const char *fullname, int fd)
+    int namespace, const char *name, const char *fullname, int fd,
+    const char *accpath)
 {
 	ssize_t size;
 	void *value = NULL;
-	const char *accpath;
-
-	accpath = archive_entry_sourcepath(entry);
-	if (accpath == NULL)
-		accpath = archive_entry_pathname(entry);
 
 	if (fd >= 0)
 		size = extattr_get_fd(fd, namespace, name, NULL, 0);
@@ -932,21 +1645,23 @@ setup_xattrs(struct archive_read_disk *a,
 	const char *path;
 	int namespace = EXTATTR_NAMESPACE_USER;
 
-	path = archive_entry_sourcepath(entry);
-	if (path == NULL)
-		path = archive_entry_pathname(entry);
+	path = NULL;
 
-	if (*fd < 0 && a->tree != NULL) {
-		if (a->follow_symlinks ||
-		    archive_entry_filetype(entry) != AE_IFLNK)
-			*fd = a->open_on_current_dir(a->tree, path,
-				O_RDONLY | O_NONBLOCK);
-		if (*fd < 0) {
-			if (a->tree_enter_working_dir(a->tree) != 0) {
-				archive_set_error(&a->archive, errno,
-				    "Couldn't access %s", path);
-				return (ARCHIVE_FAILED);
-			}
+	if (*fd < 0) {
+		path = archive_entry_sourcepath(entry);
+		if (path == NULL || (a->tree != NULL &&
+		    a->tree_enter_working_dir(a->tree) != 0))
+			path = archive_entry_pathname(entry);
+		if (path == NULL) {
+			archive_set_error(&a->archive, ARCHIVE_ERRNO_MISC,
+			    "Couldn't determine file path to read "
+			    "extended attributes");
+			return (ARCHIVE_WARN);
+		}
+		if (a->tree != NULL && (a->follow_symlinks ||
+		    archive_entry_filetype(entry) != AE_IFLNK)) {
+			*fd = a->open_on_current_dir(a->tree,
+			    path, O_RDONLY | O_NONBLOCK);
 		}
 	}
 
@@ -996,7 +1711,7 @@ setup_xattrs(struct archive_read_disk *a,
 		name = buff + strlen(buff);
 		memcpy(name, p + 1, len);
 		name[len] = '\0';
-		setup_xattr(a, entry, namespace, name, buff, *fd);
+		setup_xattr(a, entry, namespace, name, buff, *fd, path);
 		p += 1 + len;
 	}
 
@@ -1024,7 +1739,7 @@ setup_xattrs(struct archive_read_disk *a,
 #if defined(HAVE_LINUX_FIEMAP_H)
 
 /*
- * Linux sparse interface.
+ * Linux FIEMAP sparse interface.
  *
  * The FIEMAP ioctl returns an "extent" for each physical allocation
  * on disk.  We need to process those to generate a more compact list
@@ -1039,7 +1754,7 @@ setup_xattrs(struct archive_read_disk *a,
  */
 
 static int
-setup_sparse(struct archive_read_disk *a,
+setup_sparse_fiemap(struct archive_read_disk *a,
     struct archive_entry *entry, int *fd)
 {
 	char buff[4096];
@@ -1090,8 +1805,8 @@ setup_sparse(struct archive_read_disk *a,
 		if (r < 0) {
 			/* When something error happens, it is better we
 			 * should return ARCHIVE_OK because an earlier
-			 * version(<2.6.28) cannot perfom FS_IOC_FIEMAP. */
-			goto exit_setup_sparse;
+			 * version(<2.6.28) cannot perform FS_IOC_FIEMAP. */
+			goto exit_setup_sparse_fiemap;
 		}
 		if (fm->fm_mapped_extents == 0) {
 			if (iters == 0) {
@@ -1126,14 +1841,24 @@ setup_sparse(struct archive_read_disk *a,
 		} else
 			break;
 	}
-exit_setup_sparse:
+exit_setup_sparse_fiemap:
 	return (exit_sts);
 }
 
-#elif defined(SEEK_HOLE) && defined(SEEK_DATA) && defined(_PC_MIN_HOLE_SIZE)
+#if !defined(SEEK_HOLE) || !defined(SEEK_DATA)
+static int
+setup_sparse(struct archive_read_disk *a,
+    struct archive_entry *entry, int *fd)
+{
+	return setup_sparse_fiemap(a, entry, fd);
+}
+#endif
+#endif	/* defined(HAVE_LINUX_FIEMAP_H) */
+
+#if defined(SEEK_HOLE) && defined(SEEK_DATA)
 
 /*
- * FreeBSD and Solaris sparse interface.
+ * SEEK_HOLE sparse interface (FreeBSD, Linux, Solaris)
  */
 
 static int
@@ -1141,8 +1866,8 @@ setup_sparse(struct archive_read_disk *a,
     struct archive_entry *entry, int *fd)
 {
 	int64_t size;
-	off_t initial_off; /* FreeBSD/Solaris only, so off_t okay here */
-	off_t off_s, off_e; /* FreeBSD/Solaris only, so off_t okay here */
+	off_t initial_off;
+	off_t off_s, off_e;
 	int exit_sts = ARCHIVE_OK;
 	int check_fully_sparse = 0;
 
@@ -1168,8 +1893,10 @@ setup_sparse(struct archive_read_disk *a,
 	}
 
 	if (*fd >= 0) {
+#ifdef _PC_MIN_HOLE_SIZE
 		if (fpathconf(*fd, _PC_MIN_HOLE_SIZE) <= 0)
 			return (ARCHIVE_OK);
+#endif
 		initial_off = lseek(*fd, 0, SEEK_CUR);
 		if (initial_off != 0)
 			lseek(*fd, 0, SEEK_SET);
@@ -1180,8 +1907,10 @@ setup_sparse(struct archive_read_disk *a,
 		if (path == NULL)
 			path = archive_entry_pathname(entry);
 			
+#ifdef _PC_MIN_HOLE_SIZE
 		if (pathconf(path, _PC_MIN_HOLE_SIZE) <= 0)
 			return (ARCHIVE_OK);
+#endif
 		*fd = open(path, O_RDONLY | O_NONBLOCK | O_CLOEXEC);
 		if (*fd < 0) {
 			archive_set_error(&a->archive, errno,
@@ -1192,6 +1921,19 @@ setup_sparse(struct archive_read_disk *a,
 		initial_off = 0;
 	}
 
+#ifndef _PC_MIN_HOLE_SIZE
+	/* Check if the underlying filesystem supports seek hole */
+	off_s = lseek(*fd, 0, SEEK_HOLE);
+	if (off_s < 0)
+#if defined(HAVE_LINUX_FIEMAP_H)
+		return setup_sparse_fiemap(a, entry, fd);
+#else
+		goto exit_setup_sparse;
+#endif
+	else if (off_s > 0)
+		lseek(*fd, 0, SEEK_SET);
+#endif
+
 	off_s = 0;
 	size = archive_entry_size(entry);
 	while (off_s < size) {
@@ -1223,7 +1965,7 @@ setup_sparse(struct archive_read_disk *a,
 			goto exit_setup_sparse;
 		}
 		if (off_s == 0 && off_e == size)
-			break;/* This is not spase. */
+			break;/* This is not sparse. */
 		archive_entry_sparse_add_entry(entry, off_s,
 			off_e - off_s);
 		off_s = off_e;
@@ -1241,7 +1983,7 @@ exit_setup_sparse:
 	return (exit_sts);
 }
 
-#else
+#elif !defined(HAVE_LINUX_FIEMAP_H)
 
 /*
  * Generic (stub) sparse support.
diff --git a/libarchive/archive_read_disk_posix.c b/libarchive/archive_read_disk_posix.c
index 22a1f14..b893704 100644
--- a/libarchive/archive_read_disk_posix.c
+++ b/libarchive/archive_read_disk_posix.c
@@ -165,7 +165,7 @@ struct filesystem {
 	int		synthetic;
 	int		remote;
 	int		noatime;
-#if defined(HAVE_READDIR_R)
+#if defined(USE_READDIR_R)
 	size_t		name_max;
 #endif
 	long		incr_xfer_size;
@@ -200,7 +200,7 @@ struct tree {
 	DIR			*d;
 #define	INVALID_DIR_HANDLE NULL
 	struct dirent		*de;
-#if defined(HAVE_READDIR_R)
+#if defined(USE_READDIR_R)
 	struct dirent		*dirent;
 	size_t			 dirent_allocated;
 #endif
@@ -244,7 +244,7 @@ struct tree {
 	int			 initial_filesystem_id;
 	int			 current_filesystem_id;
 	int			 max_filesystem_id;
-	int			 allocated_filesytem;
+	int			 allocated_filesystem;
 
 	int			 entry_fd;
 	int			 entry_eof;
@@ -675,7 +675,7 @@ setup_suitable_read_buffer(struct archive_read_disk *a)
 				asize = cf->min_xfer_size;
 
 			/* Increase a buffer size up to 64K bytes in
-			 * a proper incremant size. */
+			 * a proper increment size. */
 			while (asize < 1024*64)
 				asize += incr;
 			/* Take a margin to adjust to the filesystem
@@ -938,7 +938,7 @@ next_entry(struct archive_read_disk *a, struct tree *t,
 		r = archive_match_path_excluded(a->matching, entry);
 		if (r < 0) {
 			archive_set_error(&(a->archive), errno,
-			    "Faild : %s", archive_error_string(a->matching));
+			    "Failed : %s", archive_error_string(a->matching));
 			return (r);
 		}
 		if (r) {
@@ -1026,7 +1026,7 @@ next_entry(struct archive_read_disk *a, struct tree *t,
 
 	/* Save the times to be restored. This must be in before
 	 * calling archive_read_disk_descend() or any chance of it,
-	 * especially, invokng a callback. */
+	 * especially, invoking a callback. */
 	t->restore_time.mtime = archive_entry_mtime(entry);
 	t->restore_time.mtime_nsec = archive_entry_mtime_nsec(entry);
 	t->restore_time.atime = archive_entry_atime(entry);
@@ -1041,7 +1041,7 @@ next_entry(struct archive_read_disk *a, struct tree *t,
 		r = archive_match_time_excluded(a->matching, entry);
 		if (r < 0) {
 			archive_set_error(&(a->archive), errno,
-			    "Faild : %s", archive_error_string(a->matching));
+			    "Failed : %s", archive_error_string(a->matching));
 			return (r);
 		}
 		if (r) {
@@ -1067,7 +1067,7 @@ next_entry(struct archive_read_disk *a, struct tree *t,
 		r = archive_match_owner_excluded(a->matching, entry);
 		if (r < 0) {
 			archive_set_error(&(a->archive), errno,
-			    "Faild : %s", archive_error_string(a->matching));
+			    "Failed : %s", archive_error_string(a->matching));
 			return (r);
 		}
 		if (r) {
@@ -1382,7 +1382,7 @@ update_current_filesystem(struct archive_read_disk *a, int64_t dev)
 
 	for (i = 0; i < t->max_filesystem_id; i++) {
 		if (t->filesystem_table[i].dev == dev) {
-			/* There is the filesytem ID we've already generated. */
+			/* There is the filesystem ID we've already generated. */
 			t->current_filesystem_id = i;
 			t->current_filesystem = &(t->filesystem_table[i]);
 			return (ARCHIVE_OK);
@@ -1390,10 +1390,10 @@ update_current_filesystem(struct archive_read_disk *a, int64_t dev)
 	}
 
 	/*
-	 * This is the new filesytem which we have to generate a new ID for.
+	 * This is the new filesystem which we have to generate a new ID for.
 	 */
 	fid = t->max_filesystem_id++;
-	if (t->max_filesystem_id > t->allocated_filesytem) {
+	if (t->max_filesystem_id > t->allocated_filesystem) {
 		size_t s;
 		void *p;
 
@@ -1406,7 +1406,7 @@ update_current_filesystem(struct archive_read_disk *a, int64_t dev)
 			return (ARCHIVE_FATAL);
 		}
 		t->filesystem_table = (struct filesystem *)p;
-		t->allocated_filesytem = s;
+		t->allocated_filesystem = s;
 	}
 	t->current_filesystem_id = fid;
 	t->current_filesystem = &(t->filesystem_table[fid]);
@@ -1504,7 +1504,20 @@ setup_current_filesystem(struct archive_read_disk *a)
 	struct tree *t = a->tree;
 	struct statfs sfs;
 #if defined(HAVE_GETVFSBYNAME) && defined(VFCF_SYNTHETIC)
+/* TODO: configure should set GETVFSBYNAME_ARG_TYPE to make
+ * this accurate; some platforms have both and we need the one that's
+ * used by getvfsbyname()
+ *
+ * Then the following would become:
+ *  #if defined(GETVFSBYNAME_ARG_TYPE)
+ *   GETVFSBYNAME_ARG_TYPE vfc;
+ *  #endif
+ */
+#  if defined(HAVE_STRUCT_XVFSCONF)
 	struct xvfsconf vfc;
+#  else
+	struct vfsconf vfc;
+#  endif
 #endif
 	int r, xr = 0;
 #if !defined(HAVE_STRUCT_STATFS_F_NAMEMAX)
@@ -1579,7 +1592,7 @@ setup_current_filesystem(struct archive_read_disk *a)
 #endif
 		t->current_filesystem->noatime = 0;
 
-#if defined(HAVE_READDIR_R)
+#if defined(USE_READDIR_R)
 	/* Set maximum filename length. */
 #if defined(HAVE_STRUCT_STATFS_F_NAMEMAX)
 	t->current_filesystem->name_max = sfs.f_namemax;
@@ -1602,7 +1615,7 @@ setup_current_filesystem(struct archive_read_disk *a)
 	else
 		t->current_filesystem->name_max = nm;
 #endif
-#endif /* HAVE_READDIR_R */
+#endif /* USE_READDIR_R */
 	return (ARCHIVE_OK);
 }
 
@@ -1643,7 +1656,7 @@ setup_current_filesystem(struct archive_read_disk *a)
 		archive_set_error(&a->archive, errno, "statvfs failed");
 		return (ARCHIVE_FAILED);
 	} else if (xr == 1) {
-		/* Usuall come here unless NetBSD supports _PC_REC_XFER_ALIGN
+		/* Usually come here unless NetBSD supports _PC_REC_XFER_ALIGN
 		 * for pathconf() function. */
 		t->current_filesystem->xfer_align = sfs.f_frsize;
 		t->current_filesystem->max_xfer_size = -1;
@@ -1804,7 +1817,7 @@ setup_current_filesystem(struct archive_read_disk *a)
 #endif
 		t->current_filesystem->noatime = 0;
 
-#if defined(HAVE_READDIR_R)
+#if defined(USE_READDIR_R)
 	/* Set maximum filename length. */
 	t->current_filesystem->name_max = sfs.f_namelen;
 #endif
@@ -1888,7 +1901,7 @@ setup_current_filesystem(struct archive_read_disk *a)
 #endif
 		t->current_filesystem->noatime = 0;
 
-#if defined(HAVE_READDIR_R)
+#if defined(USE_READDIR_R)
 	/* Set maximum filename length. */
 	t->current_filesystem->name_max = sfs.f_namemax;
 #endif
@@ -1905,7 +1918,7 @@ static int
 setup_current_filesystem(struct archive_read_disk *a)
 {
 	struct tree *t = a->tree;
-#if defined(_PC_NAME_MAX) && defined(HAVE_READDIR_R)
+#if defined(_PC_NAME_MAX) && defined(USE_READDIR_R)
 	long nm;
 #endif
 	t->current_filesystem->synthetic = -1;/* Not supported */
@@ -1917,7 +1930,7 @@ setup_current_filesystem(struct archive_read_disk *a)
 	t->current_filesystem->min_xfer_size = -1;
 	t->current_filesystem->incr_xfer_size = -1;
 
-#if defined(HAVE_READDIR_R)
+#if defined(USE_READDIR_R)
 	/* Set maximum filename length. */
 #  if defined(_PC_NAME_MAX)
 	if (tree_current_is_symblic_link_target(t)) {
@@ -1931,7 +1944,7 @@ setup_current_filesystem(struct archive_read_disk *a)
 	if (nm == -1)
 #  endif /* _PC_NAME_MAX */
 		/*
-		 * Some sysmtes (HP-UX or others?) incorrectly defined
+		 * Some systems (HP-UX or others?) incorrectly defined
 		 * NAME_MAX macro to be a smaller value.
 		 */
 #  if defined(NAME_MAX) && NAME_MAX >= 255
@@ -1945,7 +1958,7 @@ setup_current_filesystem(struct archive_read_disk *a)
 	else
 		t->current_filesystem->name_max = nm;
 #  endif /* _PC_NAME_MAX */
-#endif /* HAVE_READDIR_R */
+#endif /* USE_READDIR_R */
 	return (ARCHIVE_OK);
 }
 
@@ -2050,8 +2063,7 @@ tree_push(struct tree *t, const char *path, int filesystem_id,
 {
 	struct tree_entry *te;
 
-	te = malloc(sizeof(*te));
-	memset(te, 0, sizeof(*te));
+	te = calloc(1, sizeof(*te));
 	te->next = t->stack;
 	te->parent = t->current;
 	if (te->parent)
@@ -2109,9 +2121,8 @@ tree_open(const char *path, int symlink_mode, int restore_time)
 {
 	struct tree *t;
 
-	if ((t = malloc(sizeof(*t))) == NULL)
+	if ((t = calloc(1, sizeof(*t))) == NULL)
 		return (NULL);
-	memset(t, 0, sizeof(*t));
 	archive_string_init(&t->path);
 	archive_string_ensure(&t->path, 31);
 	t->initial_symlink_mode = symlink_mode;
@@ -2353,7 +2364,7 @@ tree_dir_next_posix(struct tree *t)
 	size_t namelen;
 
 	if (t->d == NULL) {
-#if defined(HAVE_READDIR_R)
+#if defined(USE_READDIR_R)
 		size_t dirent_size;
 #endif
 
@@ -2374,7 +2385,7 @@ tree_dir_next_posix(struct tree *t)
 			t->visit_type = r != 0 ? r : TREE_ERROR_DIR;
 			return (t->visit_type);
 		}
-#if defined(HAVE_READDIR_R)
+#if defined(USE_READDIR_R)
 		dirent_size = offsetof(struct dirent, d_name) +
 		  t->filesystem_table[t->current->filesystem_id].name_max + 1;
 		if (t->dirent == NULL || t->dirent_allocated < dirent_size) {
@@ -2391,11 +2402,11 @@ tree_dir_next_posix(struct tree *t)
 			}
 			t->dirent_allocated = dirent_size;
 		}
-#endif /* HAVE_READDIR_R */
+#endif /* USE_READDIR_R */
 	}
 	for (;;) {
 		errno = 0;
-#if defined(HAVE_READDIR_R)
+#if defined(USE_READDIR_R)
 		r = readdir_r(t->d, t->dirent, &t->de);
 #ifdef _AIX
 		/* Note: According to the man page, return value 9 indicates
@@ -2647,7 +2658,7 @@ tree_free(struct tree *t)
 	if (t == NULL)
 		return;
 	archive_string_free(&t->path);
-#if defined(HAVE_READDIR_R)
+#if defined(USE_READDIR_R)
 	free(t->dirent);
 #endif
 	free(t->sparse_list);
diff --git a/libarchive/archive_read_disk_set_standard_lookup.c b/libarchive/archive_read_disk_set_standard_lookup.c
index d6b2d55..c7fd247 100644
--- a/libarchive/archive_read_disk_set_standard_lookup.c
+++ b/libarchive/archive_read_disk_set_standard_lookup.c
@@ -232,6 +232,7 @@ static const char *
 lookup_uname_helper(struct name_cache *cache, id_t id)
 {
 	struct passwd	*result;
+	(void)cache; /* UNUSED */
 
 	result = getpwuid((uid_t)id);
 
@@ -298,6 +299,7 @@ static const char *
 lookup_gname_helper(struct name_cache *cache, id_t id)
 {
 	struct group	*result;
+	(void)cache; /* UNUSED */
 
 	result = getgrgid((gid_t)id);
 
diff --git a/libarchive/archive_read_disk_windows.c b/libarchive/archive_read_disk_windows.c
index 566d264..27b75e3 100644
--- a/libarchive/archive_read_disk_windows.c
+++ b/libarchive/archive_read_disk_windows.c
@@ -168,7 +168,7 @@ struct tree {
 	int			 initial_filesystem_id;
 	int			 current_filesystem_id;
 	int			 max_filesystem_id;
-	int			 allocated_filesytem;
+	int			 allocated_filesystem;
 
 	HANDLE			 entry_fh;
 	int			 entry_eof;
@@ -389,10 +389,9 @@ archive_read_disk_new(void)
 {
 	struct archive_read_disk *a;
 
-	a = (struct archive_read_disk *)malloc(sizeof(*a));
+	a = (struct archive_read_disk *)calloc(1, sizeof(*a));
 	if (a == NULL)
 		return (NULL);
-	memset(a, 0, sizeof(*a));
 	a->archive.magic = ARCHIVE_READ_DISK_MAGIC;
 	a->archive.state = ARCHIVE_STATE_NEW;
 	a->archive.vtable = archive_read_disk_vtable();
@@ -803,7 +802,7 @@ next_entry(struct archive_read_disk *a, struct tree *t,
 		r = archive_match_path_excluded(a->matching, entry);
 		if (r < 0) {
 			archive_set_error(&(a->archive), errno,
-			    "Faild : %s", archive_error_string(a->matching));
+			    "Failed : %s", archive_error_string(a->matching));
 			return (r);
 		}
 		if (r) {
@@ -863,7 +862,7 @@ next_entry(struct archive_read_disk *a, struct tree *t,
 
 	/* Save the times to be restored. This must be in before
 	 * calling archive_read_disk_descend() or any chance of it,
-	 * especially, invokng a callback. */
+	 * especially, invoking a callback. */
 	t->restore_time.lastWriteTime = st->ftLastWriteTime;
 	t->restore_time.lastAccessTime = st->ftLastAccessTime;
 	t->restore_time.filetype = archive_entry_filetype(entry);
@@ -875,7 +874,7 @@ next_entry(struct archive_read_disk *a, struct tree *t,
 		r = archive_match_time_excluded(a->matching, entry);
 		if (r < 0) {
 			archive_set_error(&(a->archive), errno,
-			    "Faild : %s", archive_error_string(a->matching));
+			    "Failed : %s", archive_error_string(a->matching));
 			return (r);
 		}
 		if (r) {
@@ -901,7 +900,7 @@ next_entry(struct archive_read_disk *a, struct tree *t,
 		r = archive_match_owner_excluded(a->matching, entry);
 		if (r < 0) {
 			archive_set_error(&(a->archive), errno,
-			    "Faild : %s", archive_error_string(a->matching));
+			    "Failed : %s", archive_error_string(a->matching));
 			return (r);
 		}
 		if (r) {
@@ -1261,7 +1260,7 @@ update_current_filesystem(struct archive_read_disk *a, int64_t dev)
 
 	for (i = 0; i < t->max_filesystem_id; i++) {
 		if (t->filesystem_table[i].dev == dev) {
-			/* There is the filesytem ID we've already generated. */
+			/* There is the filesystem ID we've already generated. */
 			t->current_filesystem_id = i;
 			t->current_filesystem = &(t->filesystem_table[i]);
 			return (ARCHIVE_OK);
@@ -1269,10 +1268,10 @@ update_current_filesystem(struct archive_read_disk *a, int64_t dev)
 	}
 
 	/*
-	 * There is a new filesytem, we generate a new ID for.
+	 * There is a new filesystem, we generate a new ID for.
 	 */
 	fid = t->max_filesystem_id++;
-	if (t->max_filesystem_id > t->allocated_filesytem) {
+	if (t->max_filesystem_id > t->allocated_filesystem) {
 		size_t s;
 		void *p;
 
@@ -1285,7 +1284,7 @@ update_current_filesystem(struct archive_read_disk *a, int64_t dev)
 			return (ARCHIVE_FATAL);
 		}
 		t->filesystem_table = (struct filesystem *)p;
-		t->allocated_filesytem = (int)s;
+		t->allocated_filesystem = (int)s;
 	}
 	t->current_filesystem_id = fid;
 	t->current_filesystem = &(t->filesystem_table[fid]);
@@ -1402,7 +1401,7 @@ close_and_restore_time(HANDLE h, struct tree *t, struct restore_time *rt)
 	if (h == INVALID_HANDLE_VALUE && AE_IFLNK == rt->filetype)
 		return (0);
 
-	/* Close a file descritor.
+	/* Close a file descriptor.
 	 * It will not be used for SetFileTime() because it has been opened
 	 * by a read only mode.
 	 */
@@ -1437,8 +1436,7 @@ tree_push(struct tree *t, const wchar_t *path, const wchar_t *full_path,
 {
 	struct tree_entry *te;
 
-	te = malloc(sizeof(*te));
-	memset(te, 0, sizeof(*te));
+	te = calloc(1, sizeof(*te));
 	te->next = t->stack;
 	te->parent = t->current;
 	if (te->parent)
@@ -1507,8 +1505,7 @@ tree_open(const wchar_t *path, int symlink_mode, int restore_time)
 {
 	struct tree *t;
 
-	t = malloc(sizeof(*t));
-	memset(t, 0, sizeof(*t));
+	t = calloc(1, sizeof(*t));
 	archive_string_init(&(t->full_path));
 	archive_string_init(&t->path);
 	archive_wstring_ensure(&t->path, 15);
diff --git a/libarchive/archive_read_extract2.c b/libarchive/archive_read_extract2.c
index 7b2c126..4febd8c 100644
--- a/libarchive/archive_read_extract2.c
+++ b/libarchive/archive_read_extract2.c
@@ -52,12 +52,11 @@ struct archive_read_extract *
 __archive_read_get_extract(struct archive_read *a)
 {
 	if (a->extract == NULL) {
-		a->extract = (struct archive_read_extract *)malloc(sizeof(*a->extract));
+		a->extract = (struct archive_read_extract *)calloc(1, sizeof(*a->extract));
 		if (a->extract == NULL) {
 			archive_set_error(&a->archive, ENOMEM, "Can't extract");
 			return (NULL);
 		}
-		memset(a->extract, 0, sizeof(*a->extract));
 		a->cleanup_archive_extract = archive_read_extract_cleanup;
 	}
 	return (a->extract);
diff --git a/libarchive/archive_read_open_filename.c b/libarchive/archive_read_open_filename.c
index 5611aa8..86635e2 100644
--- a/libarchive/archive_read_open_filename.c
+++ b/libarchive/archive_read_open_filename.c
@@ -222,7 +222,7 @@ file_open(struct archive *a, void *client_data)
 	void *buffer;
 	const char *filename = NULL;
 	const wchar_t *wfilename = NULL;
-	int fd;
+	int fd = -1;
 	int is_disk_like = 0;
 #if defined(__FreeBSD__) || defined(__FreeBSD_kernel__)
 	off_t mediasize = 0; /* FreeBSD-specific, so off_t okay here. */
@@ -277,7 +277,7 @@ file_open(struct archive *a, void *client_data)
 #else
 		archive_set_error(a, ARCHIVE_ERRNO_MISC,
 		    "Unexpedted operation in archive_read_open_filename");
-		return (ARCHIVE_FATAL);
+		goto fail;
 #endif
 	}
 	if (fstat(fd, &st) != 0) {
@@ -287,7 +287,7 @@ file_open(struct archive *a, void *client_data)
 		else
 			archive_set_error(a, errno, "Can't stat '%s'",
 			    filename);
-		return (ARCHIVE_FATAL);
+		goto fail;
 	}
 
 	/*
@@ -356,11 +356,9 @@ file_open(struct archive *a, void *client_data)
 		mine->block_size = new_block_size;
 	}
 	buffer = malloc(mine->block_size);
-	if (mine == NULL || buffer == NULL) {
+	if (buffer == NULL) {
 		archive_set_error(a, ENOMEM, "No memory");
-		free(mine);
-		free(buffer);
-		return (ARCHIVE_FATAL);
+		goto fail;
 	}
 	mine->buffer = buffer;
 	mine->fd = fd;
@@ -372,6 +370,14 @@ file_open(struct archive *a, void *client_data)
 		mine->use_lseek = 1;
 
 	return (ARCHIVE_OK);
+fail:
+	/*
+	 * Don't close file descriptors not opened or ones pointing referring
+	 * to `FNT_STDIN`.
+	 */
+	if (fd != -1 && fd != 0)
+		close(fd);
+	return (ARCHIVE_FATAL);
 }
 
 static ssize_t
diff --git a/libarchive/archive_read_open_memory.c b/libarchive/archive_read_open_memory.c
index ff935a7..311be47 100644
--- a/libarchive/archive_read_open_memory.c
+++ b/libarchive/archive_read_open_memory.c
@@ -70,12 +70,11 @@ archive_read_open_memory2(struct archive *a, const void *buff,
 {
 	struct read_memory_data *mine;
 
-	mine = (struct read_memory_data *)malloc(sizeof(*mine));
+	mine = (struct read_memory_data *)calloc(1, sizeof(*mine));
 	if (mine == NULL) {
 		archive_set_error(a, ENOMEM, "No memory");
 		return (ARCHIVE_FATAL);
 	}
-	memset(mine, 0, sizeof(*mine));
 	mine->start = mine->p = (const unsigned char *)buff;
 	mine->end = mine->start + size;
 	mine->read_size = read_size;
diff --git a/libarchive/archive_read_private.h b/libarchive/archive_read_private.h
index 9b61a53..78546dc 100644
--- a/libarchive/archive_read_private.h
+++ b/libarchive/archive_read_private.h
@@ -221,7 +221,7 @@ struct archive_read {
 	struct {
 		struct archive_read_passphrase *first;
 		struct archive_read_passphrase **last;
-		int candiate;
+		int candidate;
 		archive_passphrase_callback *callback;
 		void *client_data;
 	}		passphrases;
@@ -252,7 +252,6 @@ int64_t	__archive_read_consume(struct archive_read *, int64_t);
 int64_t	__archive_read_filter_consume(struct archive_read_filter *, int64_t);
 int __archive_read_program(struct archive_read_filter *, const char *);
 void __archive_read_free_filters(struct archive_read *);
-int  __archive_read_close_filters(struct archive_read *);
 struct archive_read_extract *__archive_read_get_extract(struct archive_read *);
 
 
diff --git a/libarchive/archive_read_support_filter_lz4.c b/libarchive/archive_read_support_filter_lz4.c
index e877917..663e2d3 100644
--- a/libarchive/archive_read_support_filter_lz4.c
+++ b/libarchive/archive_read_support_filter_lz4.c
@@ -180,7 +180,7 @@ lz4_reader_bid(struct archive_read_filter_bidder *self,
 			return (0);
 		bits_checked += 8;
 		BD = buffer[5];
-		/* A block maximum size shuld be more than 3. */
+		/* A block maximum size should be more than 3. */
 		if (((BD & 0x70) >> 4) < 4)
 			return (0);
 		/* Reserved bits must be "0". */
@@ -417,7 +417,7 @@ lz4_filter_read_descriptor(struct archive_read_filter *self)
 	/* Reserved bits must be zero. */
 	if (bd & 0x8f)
 		goto malformed_error;
-	/* Get a maxinum block size. */
+	/* Get a maximum block size. */
 	switch (read_buf[1] >> 4) {
 	case 4: /* 64 KB */
 		state->flags.block_maximum_size = 64 * 1024;
@@ -595,7 +595,7 @@ lz4_filter_read_data_block(struct archive_read_filter *self, const void **p)
 #endif
 	}
 
-	/* Check if an error happend in decompression process. */
+	/* Check if an error occurred in the decompression process. */
 	if (uncompressed_size < 0) {
 		archive_set_error(&(self->archive->archive),
 		    ARCHIVE_ERRNO_MISC, "lz4 decompression failed");
@@ -627,7 +627,7 @@ lz4_filter_read_default_stream(struct archive_read_filter *self, const void **p)
 
 	if (state->stage == SELECT_STREAM) {
 		state->stage = READ_DEFAULT_STREAM;
-		/* First, read a desciprtor. */
+		/* First, read a descriptor. */
 		if((ret = lz4_filter_read_descriptor(self)) != ARCHIVE_OK)
 			return (ret);
 		state->stage = READ_DEFAULT_BLOCK;
@@ -706,6 +706,11 @@ lz4_filter_read_legacy_stream(struct archive_read_filter *self, const void **p)
 	/* Make sure we have a whole block. */
 	read_buf = __archive_read_filter_ahead(self->upstream,
 	    4 + compressed, NULL);
+	if (read_buf == NULL) {
+		archive_set_error(&(self->archive->archive),
+		    ARCHIVE_ERRNO_MISC, "truncated lz4 input");
+		return (ARCHIVE_FATAL);
+	}
 	ret = LZ4_decompress_safe(read_buf + 4, state->out_block,
 	    compressed, (int)state->out_block_size);
 	if (ret < 0) {
diff --git a/libarchive/archive_read_support_filter_lzop.c b/libarchive/archive_read_support_filter_lzop.c
index 44ac996..a1c392f 100644
--- a/libarchive/archive_read_support_filter_lzop.c
+++ b/libarchive/archive_read_support_filter_lzop.c
@@ -436,7 +436,7 @@ lzop_filter_read(struct archive_read_filter *self, const void **p)
 	}
 
 	/*
-	 * Drive lzo uncompresison.
+	 * Drive lzo uncompression.
 	 */
 	out_size = (lzo_uint)state->uncompressed_size;
 	r = lzo1x_decompress_safe(b, (lzo_uint)state->compressed_size,
diff --git a/libarchive/archive_read_support_filter_program.c b/libarchive/archive_read_support_filter_program.c
index 66dc2f4..b8bf128 100644
--- a/libarchive/archive_read_support_filter_program.c
+++ b/libarchive/archive_read_support_filter_program.c
@@ -430,6 +430,7 @@ __archive_read_program(struct archive_read_filter *self, const char *cmd)
 	    &state->child_stdout);
 	if (child == -1) {
 		free(state->out_buf);
+		archive_string_free(&state->description);
 		free(state);
 		archive_set_error(&self->archive->archive, EINVAL,
 		    "Can't initialize filter; unable to run program \"%s\"",
@@ -441,6 +442,7 @@ __archive_read_program(struct archive_read_filter *self, const char *cmd)
 	if (state->child == NULL) {
 		child_stop(self, state);
 		free(state->out_buf);
+		archive_string_free(&state->description);
 		free(state);
 		archive_set_error(&self->archive->archive, EINVAL,
 		    "Can't initialize filter; unable to run program \"%s\"",
diff --git a/libarchive/archive_read_support_filter_uu.c b/libarchive/archive_read_support_filter_uu.c
index 787a619..6412979 100644
--- a/libarchive/archive_read_support_filter_uu.c
+++ b/libarchive/archive_read_support_filter_uu.c
@@ -312,6 +312,7 @@ uudecode_bidder_bid(struct archive_read_filter_bidder *self,
 	avail -= len;
 
 	if (l == 6) {
+		/* "begin " */
 		if (!uuchar[*b])
 			return (0);
 		/* Get a length of decoded bytes. */
@@ -319,30 +320,14 @@ uudecode_bidder_bid(struct archive_read_filter_bidder *self,
 		if (l > 45)
 			/* Normally, maximum length is 45(character 'M'). */
 			return (0);
-		while (l && len-nl > 0) {
-			if (l > 0) {
-				if (!uuchar[*b++])
-					return (0);
-				if (!uuchar[*b++])
-					return (0);
-				len -= 2;
-				--l;
-			}
-			if (l > 0) {
-				if (!uuchar[*b++])
-					return (0);
-				--len;
-				--l;
-			}
-			if (l > 0) {
-				if (!uuchar[*b++])
-					return (0);
-				--len;
-				--l;
-			}
+		if (l > len - nl)
+			return (0); /* Line too short. */
+		while (l) {
+			if (!uuchar[*b++])
+				return (0);
+			--len;
+			--l;
 		}
-		if (len-nl < 0)
-			return (0);
 		if (len-nl == 1 &&
 		    (uuchar[*b] ||		 /* Check sum. */
 		     (*b >= 'a' && *b <= 'z'))) {/* Padding data(MINIX). */
@@ -352,8 +337,8 @@ uudecode_bidder_bid(struct archive_read_filter_bidder *self,
 		b += nl;
 		if (avail && uuchar[*b])
 			return (firstline+30);
-	}
-	if (l == 13) {
+	} else if (l == 13) {
+		/* "begin-base64 " */
 		while (len-nl > 0) {
 			if (!base64[*b++])
 				return (0);
@@ -510,6 +495,13 @@ read_more:
 		}
 		llen = len;
 		if ((nl == 0) && (uudecode->state != ST_UUEND)) {
+			if (total == 0 && ravail <= 0) {
+				/* There is nothing more to read, fail */
+				archive_set_error(&self->archive->archive,
+				    ARCHIVE_ERRNO_FILE_FORMAT,
+				    "Missing format data");
+				return (ARCHIVE_FATAL);
+			}
 			/*
 			 * Save remaining data which does not contain
 			 * NL('\n','\r').
@@ -566,7 +558,7 @@ read_more:
 				    "Insufficient compressed data");
 				return (ARCHIVE_FATAL);
 			}
-			/* Get length of undecoded bytes of curent line. */
+			/* Get length of undecoded bytes of current line. */
 			l = UUDECODE(*b++);
 			body--;
 			if (l > body) {
diff --git a/libarchive/archive_read_support_filter_xz.c b/libarchive/archive_read_support_filter_xz.c
index 4e0a95f..11807cf 100644
--- a/libarchive/archive_read_support_filter_xz.c
+++ b/libarchive/archive_read_support_filter_xz.c
@@ -43,8 +43,6 @@ __FBSDID("$FreeBSD$");
 #endif
 #if HAVE_LZMA_H
 #include <lzma.h>
-#elif HAVE_LZMADEC_H
-#include <lzmadec.h>
 #endif
 
 #include "archive.h"
@@ -82,19 +80,6 @@ static ssize_t	xz_filter_read(struct archive_read_filter *, const void **);
 static int	xz_filter_close(struct archive_read_filter *);
 static int	xz_lzma_bidder_init(struct archive_read_filter *);
 
-#elif HAVE_LZMADEC_H && HAVE_LIBLZMADEC
-
-struct private_data {
-	lzmadec_stream	 stream;
-	unsigned char	*out_block;
-	size_t		 out_block_size;
-	int64_t		 total_out;
-	char		 eof; /* True = found end of compressed data. */
-};
-
-/* Lzma-only filter */
-static ssize_t	lzma_filter_read(struct archive_read_filter *, const void **);
-static int	lzma_filter_close(struct archive_read_filter *);
 #endif
 
 /*
@@ -178,8 +163,6 @@ archive_read_support_filter_lzma(struct archive *_a)
 	bidder->free = NULL;
 #if HAVE_LZMA_H && HAVE_LIBLZMA
 	return (ARCHIVE_OK);
-#elif HAVE_LZMADEC_H && HAVE_LIBLZMADEC
-	return (ARCHIVE_OK);
 #else
 	archive_set_error(_a, ARCHIVE_ERRNO_MISC,
 	    "Using external lzma program for lzma decompression");
@@ -310,7 +293,7 @@ lzma_bidder_bid(struct archive_read_filter_bidder *self,
 	/* Second through fifth bytes are dictionary size, stored in
 	 * little-endian order. The minimum dictionary size is
 	 * 1 << 12(4KiB) which the lzma of LZMA SDK uses with option
-	 * -d12 and the maxinam dictionary size is 1 << 27(128MiB)
+	 * -d12 and the maximum dictionary size is 1 << 27(128MiB)
 	 * which the one uses with option -d27.
 	 * NOTE: A comment of LZMA SDK source code says this dictionary
 	 * range is from 1 << 12 to 1 << 30. */
@@ -601,9 +584,7 @@ lzip_init(struct archive_read_filter *self)
 		return (ARCHIVE_FATAL);
 	}
 	ret = lzma_raw_decoder(&(state->stream), filters);
-#if LZMA_VERSION < 50010000
 	free(filters[0].options);
-#endif
 	if (ret != LZMA_OK) {
 		set_error(self, ret);
 		return (ARCHIVE_FATAL);
@@ -763,175 +744,6 @@ xz_filter_close(struct archive_read_filter *self)
 
 #else
 
-#if HAVE_LZMADEC_H && HAVE_LIBLZMADEC
-
-/*
- * If we have the older liblzmadec library, then we can handle
- * LZMA streams but not XZ streams.
- */
-
-/*
- * Setup the callbacks.
- */
-static int
-lzma_bidder_init(struct archive_read_filter *self)
-{
-	static const size_t out_block_size = 64 * 1024;
-	void *out_block;
-	struct private_data *state;
-	ssize_t ret, avail_in;
-
-	self->code = ARCHIVE_FILTER_LZMA;
-	self->name = "lzma";
-
-	state = (struct private_data *)calloc(sizeof(*state), 1);
-	out_block = (unsigned char *)malloc(out_block_size);
-	if (state == NULL || out_block == NULL) {
-		archive_set_error(&self->archive->archive, ENOMEM,
-		    "Can't allocate data for lzma decompression");
-		free(out_block);
-		free(state);
-		return (ARCHIVE_FATAL);
-	}
-
-	self->data = state;
-	state->out_block_size = out_block_size;
-	state->out_block = out_block;
-	self->read = lzma_filter_read;
-	self->skip = NULL; /* not supported */
-	self->close = lzma_filter_close;
-
-	/* Prime the lzma library with 18 bytes of input. */
-	state->stream.next_in = (unsigned char *)(uintptr_t)
-	    __archive_read_filter_ahead(self->upstream, 18, &avail_in);
-	if (state->stream.next_in == NULL)
-		return (ARCHIVE_FATAL);
-	state->stream.avail_in = avail_in;
-	state->stream.next_out = state->out_block;
-	state->stream.avail_out = state->out_block_size;
-
-	/* Initialize compression library. */
-	ret = lzmadec_init(&(state->stream));
-	__archive_read_filter_consume(self->upstream,
-	    avail_in - state->stream.avail_in);
-	if (ret == LZMADEC_OK)
-		return (ARCHIVE_OK);
-
-	/* Library setup failed: Clean up. */
-	archive_set_error(&self->archive->archive, ARCHIVE_ERRNO_MISC,
-	    "Internal error initializing lzma library");
-
-	/* Override the error message if we know what really went wrong. */
-	switch (ret) {
-	case LZMADEC_HEADER_ERROR:
-		archive_set_error(&self->archive->archive,
-		    ARCHIVE_ERRNO_MISC,
-		    "Internal error initializing compression library: "
-		    "invalid header");
-		break;
-	case LZMADEC_MEM_ERROR:
-		archive_set_error(&self->archive->archive, ENOMEM,
-		    "Internal error initializing compression library: "
-		    "out of memory");
-		break;
-	}
-
-	free(state->out_block);
-	free(state);
-	self->data = NULL;
-	return (ARCHIVE_FATAL);
-}
-
-/*
- * Return the next block of decompressed data.
- */
-static ssize_t
-lzma_filter_read(struct archive_read_filter *self, const void **p)
-{
-	struct private_data *state;
-	size_t decompressed;
-	ssize_t avail_in, ret;
-
-	state = (struct private_data *)self->data;
-
-	/* Empty our output buffer. */
-	state->stream.next_out = state->out_block;
-	state->stream.avail_out = state->out_block_size;
-
-	/* Try to fill the output buffer. */
-	while (state->stream.avail_out > 0 && !state->eof) {
-		state->stream.next_in = (unsigned char *)(uintptr_t)
-		    __archive_read_filter_ahead(self->upstream, 1, &avail_in);
-		if (state->stream.next_in == NULL && avail_in < 0) {
-			archive_set_error(&self->archive->archive,
-			    ARCHIVE_ERRNO_MISC,
-			    "truncated lzma input");
-			return (ARCHIVE_FATAL);
-		}
-		state->stream.avail_in = avail_in;
-
-		/* Decompress as much as we can in one pass. */
-		ret = lzmadec_decode(&(state->stream), avail_in == 0);
-		switch (ret) {
-		case LZMADEC_STREAM_END: /* Found end of stream. */
-			state->eof = 1;
-			/* FALL THROUGH */
-		case LZMADEC_OK: /* Decompressor made some progress. */
-			__archive_read_filter_consume(self->upstream,
-			    avail_in - state->stream.avail_in);
-			break;
-		case LZMADEC_BUF_ERROR: /* Insufficient input data? */
-			archive_set_error(&self->archive->archive,
-			    ARCHIVE_ERRNO_MISC,
-			    "Insufficient compressed data");
-			return (ARCHIVE_FATAL);
-		default:
-			/* Return an error. */
-			archive_set_error(&self->archive->archive,
-			    ARCHIVE_ERRNO_MISC,
-			    "Lzma decompression failed");
-			return (ARCHIVE_FATAL);
-		}
-	}
-
-	decompressed = state->stream.next_out - state->out_block;
-	state->total_out += decompressed;
-	if (decompressed == 0)
-		*p = NULL;
-	else
-		*p = state->out_block;
-	return (decompressed);
-}
-
-/*
- * Clean up the decompressor.
- */
-static int
-lzma_filter_close(struct archive_read_filter *self)
-{
-	struct private_data *state;
-	int ret;
-
-	state = (struct private_data *)self->data;
-	ret = ARCHIVE_OK;
-	switch (lzmadec_end(&(state->stream))) {
-	case LZMADEC_OK:
-		break;
-	default:
-		archive_set_error(&(self->archive->archive),
-		    ARCHIVE_ERRNO_MISC,
-		    "Failed to clean up %s compressor",
-		    self->archive->archive.compression_name);
-		ret = ARCHIVE_FATAL;
-	}
-
-	free(state->out_block);
-	free(state);
-	return (ret);
-}
-
-#else
-
 /*
  *
  * If we have no suitable library on this system, we can't actually do
@@ -953,9 +765,6 @@ lzma_bidder_init(struct archive_read_filter *self)
 	return (r);
 }
 
-#endif /* HAVE_LZMADEC_H */
-
-
 static int
 xz_bidder_init(struct archive_read_filter *self)
 {
@@ -984,5 +793,4 @@ lzip_bidder_init(struct archive_read_filter *self)
 	return (r);
 }
 
-
 #endif /* HAVE_LZMA_H */
diff --git a/libarchive/archive_read_support_format_7zip.c b/libarchive/archive_read_support_format_7zip.c
index 1dfe52b..3387eaf 100644
--- a/libarchive/archive_read_support_format_7zip.c
+++ b/libarchive/archive_read_support_format_7zip.c
@@ -213,7 +213,7 @@ struct _7zip {
 	int			 header_is_encoded;
 	uint64_t		 header_bytes_remaining;
 	unsigned long		 header_crc32;
-	/* Header offset to check that reading pointes of the file contens
+	/* Header offset to check that reading points of the file contents
 	 * will not exceed the header. */
 	uint64_t		 header_offset;
 	/* Base offset of the archive file for a seek in case reading SFX. */
@@ -263,22 +263,22 @@ struct _7zip {
 	/*
 	 * Decompressor controllers.
 	 */
-	/* Decording LZMA1 and LZMA2 data. */
+	/* Decoding LZMA1 and LZMA2 data. */
 #ifdef HAVE_LZMA_H
 	lzma_stream		 lzstream;
 	int			 lzstream_valid;
 #endif
-	/* Decording bzip2 data. */
+	/* Decoding bzip2 data. */
 #if defined(HAVE_BZLIB_H) && defined(BZ_CONFIG_ERROR)
 	bz_stream		 bzstream;
 	int			 bzstream_valid;
 #endif
-	/* Decording deflate data. */
+	/* Decoding deflate data. */
 #ifdef HAVE_ZLIB_H
 	z_stream		 stream;
 	int			 stream_valid;
 #endif
-	/* Decording PPMd data. */
+	/* Decoding PPMd data. */
 	int			 ppmd7_stat;
 	CPpmd7			 ppmd7_context;
 	CPpmd7z_RangeDec	 range_dec;
@@ -552,7 +552,7 @@ skip_sfx(struct archive_read *a, ssize_t bytes_avail)
 	/*
 	 * If bytes_avail > SFX_MIN_ADDR we do not have to call
 	 * __archive_read_seek() at this time since we have
-	 * alredy had enough data.
+	 * already had enough data.
 	 */
 	if (bytes_avail > SFX_MIN_ADDR)
 		__archive_read_consume(a, SFX_MIN_ADDR);
@@ -760,7 +760,7 @@ archive_read_format_7zip_read_header(struct archive_read *a,
 			symsize += size;
 		}
 		if (symsize == 0) {
-			/* If there is no synname, handle it as a regular
+			/* If there is no symname, handle it as a regular
 			 * file. */
 			zip_entry->mode &= ~AE_IFMT;
 			zip_entry->mode |= AE_IFREG;
@@ -1056,10 +1056,7 @@ init_decompression(struct archive_read *a, struct _7zip *zip,
 #endif
 	{
 		lzma_options_delta delta_opt;
-		lzma_filter filters[LZMA_FILTERS_MAX];
-#if LZMA_VERSION < 50010000
-		lzma_filter *ff;
-#endif
+		lzma_filter filters[LZMA_FILTERS_MAX], *ff;
 		int fi = 0;
 
 		if (zip->lzstream_valid) {
@@ -1144,9 +1141,7 @@ init_decompression(struct archive_read *a, struct _7zip *zip,
 		else
 			filters[fi].id = LZMA_FILTER_LZMA1;
 		filters[fi].options = NULL;
-#if LZMA_VERSION < 50010000
 		ff = &filters[fi];
-#endif
 		r = lzma_properties_decode(&filters[fi], NULL,
 		    coder1->properties, (size_t)coder1->propertiesSize);
 		if (r != LZMA_OK) {
@@ -1158,9 +1153,7 @@ init_decompression(struct archive_read *a, struct _7zip *zip,
 		filters[fi].id = LZMA_VLI_UNKNOWN;
 		filters[fi].options = NULL;
 		r = lzma_raw_decoder(&(zip->lzstream), filters);
-#if LZMA_VERSION < 50010000
 		free(ff->options);
-#endif
 		if (r != LZMA_OK) {
 			set_error(a, r);
 			return (ARCHIVE_FAILED);
@@ -2431,6 +2424,8 @@ read_Header(struct archive_read *a, struct _7z_header_info *h,
 
 		switch (type) {
 		case kEmptyStream:
+			if (h->emptyStreamBools != NULL)
+				return (-1);
 			h->emptyStreamBools = calloc((size_t)zip->numFiles,
 			    sizeof(*h->emptyStreamBools));
 			if (h->emptyStreamBools == NULL)
@@ -2451,6 +2446,8 @@ read_Header(struct archive_read *a, struct _7z_header_info *h,
 					return (-1);
 				break;
 			}
+			if (h->emptyFileBools != NULL)
+				return (-1);
 			h->emptyFileBools = calloc(empty_streams,
 			    sizeof(*h->emptyFileBools));
 			if (h->emptyFileBools == NULL)
@@ -2465,6 +2462,8 @@ read_Header(struct archive_read *a, struct _7z_header_info *h,
 					return (-1);
 				break;
 			}
+			if (h->antiBools != NULL)
+				return (-1);
 			h->antiBools = calloc(empty_streams,
 			    sizeof(*h->antiBools));
 			if (h->antiBools == NULL)
@@ -2491,6 +2490,8 @@ read_Header(struct archive_read *a, struct _7z_header_info *h,
 			if ((ll & 1) || ll < zip->numFiles * 4)
 				return (-1);
 
+			if (zip->entry_names != NULL)
+				return (-1);
 			zip->entry_names = malloc(ll);
 			if (zip->entry_names == NULL)
 				return (-1);
@@ -2543,6 +2544,8 @@ read_Header(struct archive_read *a, struct _7z_header_info *h,
 			if ((p = header_bytes(a, 2)) == NULL)
 				return (-1);
 			allAreDefined = *p;
+			if (h->attrBools != NULL)
+				return (-1);
 			h->attrBools = calloc((size_t)zip->numFiles,
 			    sizeof(*h->attrBools));
 			if (h->attrBools == NULL)
@@ -3285,7 +3288,7 @@ read_stream(struct archive_read *a, const void **buff, size_t size,
 		return (r);
 
 	/*
-	 * Skip the bytes we alrady has skipped in skip_stream().
+	 * Skip the bytes we already has skipped in skip_stream().
 	 */
 	while (skip_bytes) {
 		ssize_t skipped;
@@ -3503,7 +3506,7 @@ setup_decode_folder(struct archive_read *a, struct _7z_folder *folder,
 				return (ARCHIVE_FATAL);
 			}
 
-			/* Allocate memory for the decorded data of a sub
+			/* Allocate memory for the decoded data of a sub
 			 * stream. */
 			b[i] = malloc((size_t)zip->folder_outbytes_remaining);
 			if (b[i] == NULL) {
@@ -3588,7 +3591,7 @@ skip_stream(struct archive_read *a, size_t skip_bytes)
 	if (zip->folder_index == 0) {
 		/*
 		 * Optimization for a list mode.
-		 * Avoid unncecessary decoding operations.
+		 * Avoid unnecessary decoding operations.
 		 */
 		zip->si.ci.folders[zip->entry->folderIndex].skipped_bytes
 		    += skip_bytes;
diff --git a/libarchive/archive_read_support_format_ar.c b/libarchive/archive_read_support_format_ar.c
index 4b5b66b..b6b9fc3 100644
--- a/libarchive/archive_read_support_format_ar.c
+++ b/libarchive/archive_read_support_format_ar.c
@@ -104,13 +104,12 @@ archive_read_support_format_ar(struct archive *_a)
 	archive_check_magic(_a, ARCHIVE_READ_MAGIC,
 	    ARCHIVE_STATE_NEW, "archive_read_support_format_ar");
 
-	ar = (struct ar *)malloc(sizeof(*ar));
+	ar = (struct ar *)calloc(1, sizeof(*ar));
 	if (ar == NULL) {
 		archive_set_error(&a->archive, ENOMEM,
 		    "Can't allocate ar data");
 		return (ARCHIVE_FATAL);
 	}
-	memset(ar, 0, sizeof(*ar));
 	ar->strtab = NULL;
 
 	r = __archive_read_register_format(a,
@@ -260,7 +259,7 @@ _ar_read_header(struct archive_read *a, struct archive_entry *entry,
 		archive_entry_set_filetype(entry, AE_IFREG);
 		/* Get the size of the filename table. */
 		number = ar_atol10(h + AR_size_offset, AR_size_size);
-		if (number > SIZE_MAX) {
+		if (number > SIZE_MAX || number > 1024 * 1024 * 1024) {
 			archive_set_error(&a->archive, ARCHIVE_ERRNO_MISC,
 			    "Filename table too large");
 			return (ARCHIVE_FATAL);
@@ -316,7 +315,7 @@ _ar_read_header(struct archive_read *a, struct archive_entry *entry,
 		 * If we can't look up the real name, warn and return
 		 * the entry with the wrong name.
 		 */
-		if (ar->strtab == NULL || number > ar->strtab_size) {
+		if (ar->strtab == NULL || number >= ar->strtab_size) {
 			archive_set_error(&a->archive, EINVAL,
 			    "Can't find long filename for GNU/SVR4 archive entry");
 			archive_entry_copy_pathname(entry, filename);
@@ -342,16 +341,19 @@ _ar_read_header(struct archive_read *a, struct archive_entry *entry,
 
 		/* Parse the size of the name, adjust the file size. */
 		number = ar_atol10(h + AR_name_offset + 3, AR_name_size - 3);
-		bsd_name_length = (size_t)number;
-		/* Guard against the filename + trailing NUL
-		 * overflowing a size_t and against the filename size
-		 * being larger than the entire entry. */
-		if (number > (uint64_t)(bsd_name_length + 1)
-		    || (int64_t)bsd_name_length > ar->entry_bytes_remaining) {
+		/* Sanity check the filename length:
+		 *   = Must be <= SIZE_MAX - 1
+		 *   = Must be <= 1MB
+		 *   = Cannot be bigger than the entire entry
+		 */
+		if (number > SIZE_MAX - 1
+		    || number > 1024 * 1024
+		    || (int64_t)number > ar->entry_bytes_remaining) {
 			archive_set_error(&a->archive, ARCHIVE_ERRNO_MISC,
 			    "Bad input file size");
 			return (ARCHIVE_FATAL);
 		}
+		bsd_name_length = (size_t)number;
 		ar->entry_bytes_remaining -= bsd_name_length;
 		/* Adjust file size reported to client. */
 		archive_entry_set_size(entry, ar->entry_bytes_remaining);
diff --git a/libarchive/archive_read_support_format_cab.c b/libarchive/archive_read_support_format_cab.c
index fc70684..e2f8c6b 100644
--- a/libarchive/archive_read_support_format_cab.c
+++ b/libarchive/archive_read_support_format_cab.c
@@ -67,7 +67,7 @@ struct lzx_dec {
 	/* The length how many bytes we can copy decoded code from
 	 * the window. */
 	int     		 copy_len;
-	/* Translation reversal for x86 proccessor CALL byte sequence(E8).
+	/* Translation reversal for x86 processor CALL byte sequence(E8).
 	 * This is used for LZX only. */
 	uint32_t		 translation_size;
 	char			 translation;
@@ -645,12 +645,13 @@ cab_read_header(struct archive_read *a)
 	cab = (struct cab *)(a->format->data);
 	if (cab->found_header == 0 &&
 	    p[0] == 'M' && p[1] == 'Z') {
-		/* This is an executable?  Must be self-extracting... 	*/
+		/* This is an executable?  Must be self-extracting... */
 		err = cab_skip_sfx(a);
 		if (err < ARCHIVE_WARN)
 			return (err);
 
-		if ((p = __archive_read_ahead(a, sizeof(*p), NULL)) == NULL)
+		/* Re-read header after processing the SFX. */
+		if ((p = __archive_read_ahead(a, 42, NULL)) == NULL)
 			return (truncated_error(a));
 	}
 
@@ -1494,6 +1495,8 @@ cab_read_ahead_cfdata_deflate(struct archive_read *a, ssize_t *avail)
 
 		/* Cut out a tow-byte MSZIP signature(0x43, 0x4b). */
 		if (mszip > 0) {
+			if (bytes_avail <= 0)
+				goto nomszip;
 			if (bytes_avail <= mszip) {
 				if (mszip == 2) {
 					if (cab->stream.next_in[0] != 0x43)
@@ -1554,7 +1557,7 @@ cab_read_ahead_cfdata_deflate(struct archive_read *a, ssize_t *avail)
 	/*
 	 * Note: I suspect there is a bug in makecab.exe because, in rare
 	 * case, compressed bytes are still remaining regardless we have
-	 * gotten all uncompressed bytes, which size is recoded in CFDATA,
+	 * gotten all uncompressed bytes, which size is recorded in CFDATA,
 	 * as much as we need, and we have to use the garbage so as to
 	 * correctly compute the sum of CFDATA accordingly.
 	 */
@@ -1741,7 +1744,7 @@ cab_read_ahead_cfdata_lzx(struct archive_read *a, ssize_t *avail)
 	}
 
 	/*
-	 * Translation reversal of x86 proccessor CALL byte sequence(E8).
+	 * Translation reversal of x86 processor CALL byte sequence(E8).
 	 */
 	lzx_translation(&cab->xstrm, cab->uncompressed_buffer,
 	    cfdata->uncompressed_size,
@@ -2270,7 +2273,7 @@ static int
 lzx_br_fillup(struct lzx_stream *strm, struct lzx_br *br)
 {
 /*
- * x86 proccessor family can read misaligned data without an access error.
+ * x86 processor family can read misaligned data without an access error.
  */
 	int n = CACHE_BITS - br->cache_avail;
 
diff --git a/libarchive/archive_read_support_format_cpio.c b/libarchive/archive_read_support_format_cpio.c
index b09db0e..ffd4a85 100644
--- a/libarchive/archive_read_support_format_cpio.c
+++ b/libarchive/archive_read_support_format_cpio.c
@@ -326,7 +326,7 @@ archive_read_format_cpio_options(struct archive_read *a,
 
 	cpio = (struct cpio *)(a->format->data);
 	if (strcmp(key, "compat-2x")  == 0) {
-		/* Handle filnames as libarchive 2.x */
+		/* Handle filenames as libarchive 2.x */
 		cpio->init_default_conversion = (val != NULL)?1:0;
 		return (ARCHIVE_OK);
 	} else if (strcmp(key, "hdrcharset")  == 0) {
@@ -356,7 +356,7 @@ archive_read_format_cpio_read_header(struct archive_read *a,
     struct archive_entry *entry)
 {
 	struct cpio *cpio;
-	const void *h;
+	const void *h, *hl;
 	struct archive_string_conv *sconv;
 	size_t namelength;
 	size_t name_pad;
@@ -406,11 +406,11 @@ archive_read_format_cpio_read_header(struct archive_read *a,
 			    "Rejecting malformed cpio archive: symlink contents exceed 1 megabyte");
 			return (ARCHIVE_FATAL);
 		}
-		h = __archive_read_ahead(a,
+		hl = __archive_read_ahead(a,
 			(size_t)cpio->entry_bytes_remaining, NULL);
-		if (h == NULL)
+		if (hl == NULL)
 			return (ARCHIVE_FATAL);
-		if (archive_entry_copy_symlink_l(entry, (const char *)h,
+		if (archive_entry_copy_symlink_l(entry, (const char *)hl,
 		    (size_t)cpio->entry_bytes_remaining, sconv) != 0) {
 			if (errno == ENOMEM) {
 				archive_set_error(&a->archive, ENOMEM,
@@ -434,7 +434,8 @@ archive_read_format_cpio_read_header(struct archive_read *a,
 	 * header.  XXX */
 
 	/* Compare name to "TRAILER!!!" to test for end-of-archive. */
-	if (namelength == 11 && strcmp((const char *)h, "TRAILER!!!") == 0) {
+	if (namelength == 11 && strncmp((const char *)h, "TRAILER!!!",
+	    11) == 0) {
 		/* TODO: Store file location of start of block. */
 		archive_clear_error(&a->archive);
 		return (ARCHIVE_EOF);
@@ -814,8 +815,8 @@ header_odc(struct archive_read *a, struct cpio *cpio,
  * NOTE: if a filename suffix is ".z", it is the file gziped by afio.
  * it would be nice that we can show uncompressed file size and we can
  * uncompressed file contents automatically, unfortunately we have nothing
- * to get a uncompressed file size while reading each header. it means
- * we also cannot uncompressed file contens under the our framework.
+ * to get a uncompressed file size while reading each header. It means
+ * we also cannot uncompress file contents under our framework.
  */
 static int
 header_afiol(struct archive_read *a, struct cpio *cpio,
diff --git a/libarchive/archive_read_support_format_iso9660.c b/libarchive/archive_read_support_format_iso9660.c
index f41ba38..76da406 100644
--- a/libarchive/archive_read_support_format_iso9660.c
+++ b/libarchive/archive_read_support_format_iso9660.c
@@ -322,7 +322,7 @@ struct iso9660 {
 
 	struct archive_string pathname;
 	char	seenRockridge;	/* Set true if RR extensions are used. */
-	char	seenSUSP;	/* Set true if SUSP is beging used. */
+	char	seenSUSP;	/* Set true if SUSP is being used. */
 	char	seenJoliet;
 
 	unsigned char	suspOffset;
@@ -374,7 +374,7 @@ struct iso9660 {
 	size_t		 utf16be_path_len;
 	unsigned char *utf16be_previous_path;
 	size_t		 utf16be_previous_path_len;
-	/* Null buufer used in bidder to improve its performance. */
+	/* Null buffer used in bidder to improve its performance. */
 	unsigned char	 null[2048];
 };
 
@@ -1199,7 +1199,7 @@ archive_read_format_iso9660_read_header(struct archive_read *a,
 			    archive_string_conversion_from_charset(
 				&(a->archive), "UTF-16BE", 1);
 			if (iso9660->sconv_utf16be == NULL)
-				/* Coundn't allocate memory */
+				/* Couldn't allocate memory */
 				return (ARCHIVE_FATAL);
 		}
 		if (iso9660->utf16be_path == NULL) {
@@ -1864,7 +1864,7 @@ parse_file_info(struct archive_read *a, struct file_info *parent,
 		if ((file->utf16be_name = malloc(name_len)) == NULL) {
 			archive_set_error(&a->archive, ENOMEM,
 			    "No memory for file name");
-			return (NULL);
+			goto fail;
 		}
 		memcpy(file->utf16be_name, p, name_len);
 		file->utf16be_bytes = name_len;
@@ -1943,10 +1943,8 @@ parse_file_info(struct archive_read *a, struct file_info *parent,
 			file->symlink_continues = 0;
 			rr_start += iso9660->suspOffset;
 			r = parse_rockridge(a, file, rr_start, rr_end);
-			if (r != ARCHIVE_OK) {
-				free(file);
-				return (NULL);
-			}
+			if (r != ARCHIVE_OK)
+				goto fail;
 			/*
 			 * A file size of symbolic link files in ISO images
 			 * made by makefs is not zero and its location is
@@ -1990,7 +1988,7 @@ parse_file_info(struct archive_read *a, struct file_info *parent,
 				archive_set_error(&a->archive,
 				    ARCHIVE_ERRNO_MISC,
 				    "Invalid Rockridge RE");
-				return (NULL);
+				goto fail;
 			}
 			/*
 			 * Sanity check: file does not have "CL" extension.
@@ -1999,7 +1997,7 @@ parse_file_info(struct archive_read *a, struct file_info *parent,
 				archive_set_error(&a->archive,
 				    ARCHIVE_ERRNO_MISC,
 				    "Invalid Rockridge RE and CL");
-				return (NULL);
+				goto fail;
 			}
 			/*
 			 * Sanity check: The file type must be a directory.
@@ -2008,7 +2006,7 @@ parse_file_info(struct archive_read *a, struct file_info *parent,
 				archive_set_error(&a->archive,
 				    ARCHIVE_ERRNO_MISC,
 				    "Invalid Rockridge RE");
-				return (NULL);
+				goto fail;
 			}
 		} else if (parent != NULL && parent->rr_moved)
 			file->rr_moved_has_re_only = 0;
@@ -2022,7 +2020,7 @@ parse_file_info(struct archive_read *a, struct file_info *parent,
 				archive_set_error(&a->archive,
 				    ARCHIVE_ERRNO_MISC,
 				    "Invalid Rockridge CL");
-				return (NULL);
+				goto fail;
 			}
 			/*
 			 * Sanity check: The file type must be a regular file.
@@ -2031,7 +2029,7 @@ parse_file_info(struct archive_read *a, struct file_info *parent,
 				archive_set_error(&a->archive,
 				    ARCHIVE_ERRNO_MISC,
 				    "Invalid Rockridge CL");
-				return (NULL);
+				goto fail;
 			}
 			parent->subdirs++;
 			/* Overwrite an offset and a number of this "CL" entry
@@ -2049,7 +2047,7 @@ parse_file_info(struct archive_read *a, struct file_info *parent,
 					archive_set_error(&a->archive,
 					    ARCHIVE_ERRNO_MISC,
 					    "Invalid Rockridge CL");
-					return (NULL);
+					goto fail;
 				}
 			}
 			if (file->cl_offset == file->offset ||
@@ -2057,7 +2055,7 @@ parse_file_info(struct archive_read *a, struct file_info *parent,
 				archive_set_error(&a->archive,
 				    ARCHIVE_ERRNO_MISC,
 				    "Invalid Rockridge CL");
-				return (NULL);
+				goto fail;
 			}
 		}
 	}
@@ -2088,6 +2086,10 @@ parse_file_info(struct archive_read *a, struct file_info *parent,
 #endif
 	register_file(iso9660, file);
 	return (file);
+fail:
+	archive_string_free(&file->name);
+	free(file);
+	return (NULL);
 }
 
 static int
@@ -2407,7 +2409,7 @@ read_CE(struct archive_read *a, struct iso9660 *iso9660)
 				return (ARCHIVE_FATAL);
 		} while (heap->cnt &&
 		    heap->reqs[0].offset == iso9660->current_position);
-		/* NOTE: Do not move this consume's code to fron of
+		/* NOTE: Do not move this consume's code to front of
 		 * do-while loop. Registration of nested CE extension
 		 * might cause error because of current position. */
 		__archive_read_consume(a, step);
@@ -2729,7 +2731,7 @@ next_cache_entry(struct archive_read *a, struct iso9660 *iso9660,
 		if (file == NULL) {
 			/*
 			 * If directory entries all which are descendant of
-			 * rr_moved are stil remaning, expose their. 
+			 * rr_moved are still remaining, expose their.
 			 */
 			if (iso9660->re_files.first != NULL && 
 			    iso9660->rr_moved != NULL &&
@@ -2852,7 +2854,7 @@ next_cache_entry(struct archive_read *a, struct iso9660 *iso9660,
 	empty_files.last = &empty_files.first;
 	/* Collect files which has the same file serial number.
 	 * Peek pending_files so that file which number is different
-	 * is not put bak. */
+	 * is not put back. */
 	while (iso9660->pending_files.used > 0 &&
 	    (iso9660->pending_files.files[0]->number == -1 ||
 	     iso9660->pending_files.files[0]->number == number)) {
@@ -2860,7 +2862,7 @@ next_cache_entry(struct archive_read *a, struct iso9660 *iso9660,
 			/* This file has the same offset
 			 * but it's wrong offset which empty files
 			 * and symlink files have.
-			 * NOTE: This wrong offse was recorded by
+			 * NOTE: This wrong offset was recorded by
 			 * old mkisofs utility. If ISO images is
 			 * created by latest mkisofs, this does not
 			 * happen.
diff --git a/libarchive/archive_read_support_format_lha.c b/libarchive/archive_read_support_format_lha.c
index c359d83..d77a7c2 100644
--- a/libarchive/archive_read_support_format_lha.c
+++ b/libarchive/archive_read_support_format_lha.c
@@ -924,6 +924,9 @@ lha_read_file_header_1(struct archive_read *a, struct lha *lha)
 	/* Get a real compressed file size. */
 	lha->compsize -= extdsize - 2;
 
+	if (lha->compsize < 0)
+		goto invalid;	/* Invalid compressed file size */
+
 	if (sum_calculated != headersum) {
 		archive_set_error(&a->archive, ARCHIVE_ERRNO_MISC,
 		    "LHa header sum error");
@@ -1711,11 +1714,15 @@ lha_crc16(uint16_t crc, const void *pp, size_t len)
 	 */
 	for (;len >= 8; len -= 8) {
 		/* This if statement expects compiler optimization will
-		 * remove the stament which will not be executed. */
+		 * remove the statement which will not be executed. */
+#undef bswap16
 #if defined(_MSC_VER) && _MSC_VER >= 1400  /* Visual Studio */
 #  define bswap16(x) _byteswap_ushort(x)
-#elif (defined(__GNUC__) && __GNUC__ >= 4 && __GNUC_MINOR__ >= 8) \
-      || defined(__clang__)
+#elif defined(__GNUC__) && ((__GNUC__ == 4 && __GNUC_MINOR__ >= 8) || __GNUC__ > 4)
+/* GCC 4.8 and later has __builtin_bswap16() */
+#  define bswap16(x) __builtin_bswap16(x)
+#elif defined(__clang__)
+/* All clang versions have __builtin_bswap16() */
 #  define bswap16(x) __builtin_bswap16(x)
 #else
 #  define bswap16(x) ((((x) >> 8) & 0xff) | ((x) << 8))
diff --git a/libarchive/archive_read_support_format_mtree.c b/libarchive/archive_read_support_format_mtree.c
index 8c3be9a..4231ff5 100644
--- a/libarchive/archive_read_support_format_mtree.c
+++ b/libarchive/archive_read_support_format_mtree.c
@@ -75,6 +75,8 @@ __FBSDID("$FreeBSD: head/lib/libarchive/archive_read_support_format_mtree.c 2011
 #define	MTREE_HAS_OPTIONAL	0x0800
 #define	MTREE_HAS_NOCHANGE	0x1000 /* FreeBSD specific */
 
+#define	MTREE_HASHTABLE_SIZE 1024
+
 struct mtree_option {
 	struct mtree_option *next;
 	char *value;
@@ -86,6 +88,8 @@ struct mtree_entry {
 	char *name;
 	char full;
 	char used;
+	unsigned int name_hash;
+	struct mtree_entry *hashtable_next;
 };
 
 struct mtree {
@@ -98,6 +102,7 @@ struct mtree {
 	const char		*archive_format_name;
 	struct mtree_entry	*entries;
 	struct mtree_entry	*this_entry;
+	struct mtree_entry	*entry_hashtable[MTREE_HASHTABLE_SIZE];
 	struct archive_string	 current_dir;
 	struct archive_string	 contents_name;
 
@@ -110,6 +115,7 @@ struct mtree {
 static int	bid_keycmp(const char *, const char *, ssize_t);
 static int	cleanup(struct archive_read *);
 static int	detect_form(struct archive_read *, int *);
+static unsigned int	hash(const char *);
 static int	mtree_bid(struct archive_read *, int);
 static int	parse_file(struct archive_read *, struct archive_entry *,
 		    struct mtree *, struct mtree_entry *, int *);
@@ -223,13 +229,12 @@ archive_read_support_format_mtree(struct archive *_a)
 	archive_check_magic(_a, ARCHIVE_READ_MAGIC,
 	    ARCHIVE_STATE_NEW, "archive_read_support_format_mtree");
 
-	mtree = (struct mtree *)malloc(sizeof(*mtree));
+	mtree = (struct mtree *)calloc(1, sizeof(*mtree));
 	if (mtree == NULL) {
 		archive_set_error(&a->archive, ENOMEM,
 		    "Can't allocate mtree data");
 		return (ARCHIVE_FATAL);
 	}
-	memset(mtree, 0, sizeof(*mtree));
 	mtree->fd = -1;
 
 	r = __archive_read_register_format(a, mtree, "mtree",
@@ -301,6 +306,15 @@ get_line_size(const char *b, ssize_t avail, ssize_t *nlsize)
 	return (avail);
 }
 
+/*
+ *  <---------------- ravail --------------------->
+ *  <-- diff ------> <---  avail ----------------->
+ *                   <---- len ----------->
+ * | Previous lines | line being parsed  nl extra |
+ *                  ^
+ *                  b
+ *
+ */
 static ssize_t
 next_line(struct archive_read *a,
     const char **b, ssize_t *avail, ssize_t *ravail, ssize_t *nl)
@@ -339,7 +353,7 @@ next_line(struct archive_read *a,
 		*b += diff;
 		*avail -= diff;
 		tested = len;/* Skip some bytes we already determinated. */
-		len = get_line_size(*b, *avail, nl);
+		len = get_line_size(*b + len, *avail - len, nl);
 		if (len >= 0)
 			len += tested;
 	}
@@ -701,13 +715,13 @@ detect_form(struct archive_read *a, int *is_form_d)
 				}
 			} else
 				break;
-		} else if (strncmp(p, "/set", 4) == 0) {
+		} else if (len > 4 && strncmp(p, "/set", 4) == 0) {
 			if (bid_keyword_list(p+4, len-4, 0, 0) <= 0)
 				break;
 			/* This line continues. */
 			if (p[len-nl-1] == '\\')
 				multiline = 2;
-		} else if (strncmp(p, "/unset", 6) == 0) {
+		} else if (len > 6 && strncmp(p, "/unset", 6) == 0) {
 			if (bid_keyword_list(p+6, len-6, 1, 0) <= 0)
 				break;
 			/* This line continues. */
@@ -853,11 +867,12 @@ process_add_entry(struct archive_read *a, struct mtree *mtree,
     struct mtree_option **global, const char *line, ssize_t line_len,
     struct mtree_entry **last_entry, int is_form_d)
 {
-	struct mtree_entry *entry;
+	struct mtree_entry *entry, *ht_iter;
 	struct mtree_option *iter;
 	const char *next, *eq, *name, *end;
 	size_t name_len, len;
 	int r, i;
+	unsigned int ht_idx;
 
 	if ((entry = malloc(sizeof(*entry))) == NULL) {
 		archive_set_error(&a->archive, errno, "Can't allocate memory");
@@ -868,6 +883,8 @@ process_add_entry(struct archive_read *a, struct mtree *mtree,
 	entry->name = NULL;
 	entry->used = 0;
 	entry->full = 0;
+	entry->name_hash = 0;
+	entry->hashtable_next = NULL;
 
 	/* Add this entry to list. */
 	if (*last_entry == NULL)
@@ -920,6 +937,16 @@ process_add_entry(struct archive_read *a, struct mtree *mtree,
 	memcpy(entry->name, name, name_len);
 	entry->name[name_len] = '\0';
 	parse_escapes(entry->name, entry);
+	entry->name_hash = hash(entry->name);
+
+	ht_idx = entry->name_hash % MTREE_HASHTABLE_SIZE;
+	if ((ht_iter = mtree->entry_hashtable[ht_idx]) != NULL) {
+		while (ht_iter->hashtable_next)
+			ht_iter = ht_iter->hashtable_next;
+		ht_iter->hashtable_next = entry;
+	} else {
+		mtree->entry_hashtable[ht_idx] = entry;
+	}
 
 	for (iter = *global; iter != NULL; iter = iter->next) {
 		r = add_option(a, &entry->options, iter->value,
@@ -992,11 +1019,11 @@ read_mtree(struct archive_read *a, struct mtree *mtree)
 		if (*p != '/') {
 			r = process_add_entry(a, mtree, &global, p, len,
 			    &last_entry, is_form_d);
-		} else if (strncmp(p, "/set", 4) == 0) {
+		} else if (len > 4 && strncmp(p, "/set", 4) == 0) {
 			if (p[4] != ' ' && p[4] != '\t')
 				break;
 			r = process_global_set(a, &global, p);
-		} else if (strncmp(p, "/unset", 6) == 0) {
+		} else if (len > 6 && strncmp(p, "/unset", 6) == 0) {
 			if (p[6] != ' ' && p[6] != '\t')
 				break;
 			r = process_global_unset(a, &global, p);
@@ -1113,9 +1140,10 @@ parse_file(struct archive_read *a, struct archive_entry *entry,
 		 * with pathname canonicalization, which is a very
 		 * tricky subject.)
 		 */
-		for (mp = mentry->next; mp != NULL; mp = mp->next) {
+		for (mp = mentry->hashtable_next; mp != NULL; mp = mp->hashtable_next) {
 			if (mp->full && !mp->used
-			    && strcmp(mentry->name, mp->name) == 0) {
+					&& mentry->name_hash == mp->name_hash
+					&& strcmp(mentry->name, mp->name) == 0) {
 				/* Later lines override earlier ones. */
 				mp->used = 1;
 				r1 = parse_line(a, entry, mtree, mp,
@@ -1580,8 +1608,11 @@ parse_keyword(struct archive_read *a, struct mtree *mtree,
 			if (*val == '.') {
 				++val;
 				ns = (long)mtree_atol10(&val);
-			} else
-				ns = 0;
+				if (ns < 0)
+					ns = 0;
+				else if (ns > 999999999)
+					ns = 999999999;
+			}
 			if (m > my_time_t_max)
 				m = my_time_t_max;
 			else if (m < my_time_t_min)
@@ -1991,3 +2022,19 @@ readline(struct archive_read *a, struct mtree *mtree, char **start,
 		find_off = u - mtree->line.s;
 	}
 }
+
+static unsigned int
+hash(const char *p)
+{
+	/* A 32-bit version of Peter Weinberger's (PJW) hash algorithm,
+	   as used by ELF for hashing function names. */
+	unsigned g, h = 0;
+	while (*p != '\0') {
+		h = (h << 4) + *p++;
+		if ((g = h & 0xF0000000) != 0) {
+			h ^= g >> 24;
+			h &= 0x0FFFFFFF;
+		}
+	}
+	return h;
+}
diff --git a/libarchive/archive_read_support_format_rar.c b/libarchive/archive_read_support_format_rar.c
index f729f17..1e9849f 100644
--- a/libarchive/archive_read_support_format_rar.c
+++ b/libarchive/archive_read_support_format_rar.c
@@ -647,13 +647,12 @@ archive_read_support_format_rar(struct archive *_a)
   archive_check_magic(_a, ARCHIVE_READ_MAGIC, ARCHIVE_STATE_NEW,
                       "archive_read_support_format_rar");
 
-  rar = (struct rar *)malloc(sizeof(*rar));
+  rar = (struct rar *)calloc(sizeof(*rar), 1);
   if (rar == NULL)
   {
     archive_set_error(&a->archive, ENOMEM, "Can't allocate rar data");
     return (ARCHIVE_FATAL);
   }
-  memset(rar, 0, sizeof(*rar));
 
 	/*
 	 * Until enough data has been read, we cannot tell about
@@ -907,7 +906,7 @@ archive_read_format_rar_read_header(struct archive_read *a,
                             sizeof(rar->reserved2));
       }
 
-      /* Main header is password encrytped, so we cannot read any
+      /* Main header is password encrypted, so we cannot read any
          file names or any other info about files from the header. */
       if (rar->main_flags & MHD_PASSWORD)
       {
diff --git a/libarchive/archive_read_support_format_tar.c b/libarchive/archive_read_support_format_tar.c
index b0521a6..bd7f13d 100644
--- a/libarchive/archive_read_support_format_tar.c
+++ b/libarchive/archive_read_support_format_tar.c
@@ -1,6 +1,7 @@
 /*-
  * Copyright (c) 2003-2007 Tim Kientzle
  * Copyright (c) 2011-2012 Michihiro NAKAJIMA
+ * Copyright (c) 2016 Martin Matuska
  * All rights reserved.
  *
  * Redistribution and use in source and binary forms, with or without
@@ -136,6 +137,7 @@ struct tar {
 	int64_t			 entry_padding;
 	int64_t 		 entry_bytes_unconsumed;
 	int64_t			 realsize;
+	int			 sparse_allowed;
 	struct sparse_block	*sparse_list;
 	struct sparse_block	*sparse_last;
 	int64_t			 sparse_offset;
@@ -202,9 +204,14 @@ static int	archive_read_format_tar_read_header(struct archive_read *,
 		    struct archive_entry *);
 static int	checksum(struct archive_read *, const void *);
 static int 	pax_attribute(struct archive_read *, struct tar *,
-		    struct archive_entry *, const char *key, const char *value);
+		    struct archive_entry *, const char *key, const char *value,
+		    size_t value_length);
+static int	pax_attribute_acl(struct archive_read *, struct tar *,
+		    struct archive_entry *, const char *, int);
+static int	pax_attribute_xattr(struct archive_entry *, const char *,
+		    const char *);
 static int 	pax_header(struct archive_read *, struct tar *,
-		    struct archive_entry *, char *attr);
+		    struct archive_entry *, struct archive_string *);
 static void	pax_time(const char *, int64_t *sec, long *nanos);
 static ssize_t	readline(struct archive_read *, struct tar *, const char **,
 		    ssize_t limit, size_t *);
@@ -293,6 +300,57 @@ archive_read_format_tar_cleanup(struct archive_read *a)
 	return (ARCHIVE_OK);
 }
 
+/*
+ * Validate number field
+ *
+ * This has to be pretty lenient in order to accommodate the enormous
+ * variety of tar writers in the world:
+ *  = POSIX (IEEE Std 1003.1-1988) ustar requires octal values with leading
+ *    zeros and allows fields to be terminated with space or null characters
+ *  = Many writers use different termination (in particular, libarchive
+ *    omits terminator bytes to squeeze one or two more digits)
+ *  = Many writers pad with space and omit leading zeros
+ *  = GNU tar and star write base-256 values if numbers are too
+ *    big to be represented in octal
+ *
+ *  Examples of specific tar headers that we should support:
+ *  = Perl Archive::Tar terminates uid, gid, devminor and devmajor with two
+ *    null bytes, pads size with spaces and other numeric fields with zeroes
+ *  = plexus-archiver prior to 2.6.3 (before switching to commons-compress)
+ *    may have uid and gid fields filled with spaces without any octal digits
+ *    at all and pads all numeric fields with spaces
+ *
+ * This should tolerate all variants in use.  It will reject a field
+ * where the writer just left garbage after a trailing NUL.
+ */
+static int
+validate_number_field(const char* p_field, size_t i_size)
+{
+	unsigned char marker = (unsigned char)p_field[0];
+	if (marker == 128 || marker == 255 || marker == 0) {
+		/* Base-256 marker, there's nothing we can check. */
+		return 1;
+	} else {
+		/* Must be octal */
+		size_t i = 0;
+		/* Skip any leading spaces */
+		while (i < i_size && p_field[i] == ' ') {
+			++i;
+		}
+		/* Skip octal digits. */
+		while (i < i_size && p_field[i] >= '0' && p_field[i] <= '7') {
+			++i;
+		}
+		/* Any remaining characters must be space or NUL padding. */
+		while (i < i_size) {
+			if (p_field[i] != ' ' && p_field[i] != 0) {
+				return 0;
+			}
+			++i;
+		}
+		return 1;
+	}
+}
 
 static int
 archive_read_format_tar_bid(struct archive_read *a, int best_bid)
@@ -345,23 +403,19 @@ archive_read_format_tar_bid(struct archive_read *a, int best_bid)
 		return (0);
 	bid += 2;  /* 6 bits of variation in an 8-bit field leaves 2 bits. */
 
-	/* Sanity check: Look at first byte of mode field. */
-	switch (255 & (unsigned)header->mode[0]) {
-	case 0: case 255:
-		/* Base-256 value: No further verification possible! */
-		break;
-	case ' ': /* Not recommended, but not illegal, either. */
-		break;
-	case '0': case '1': case '2': case '3':
-	case '4': case '5': case '6': case '7':
-		/* Octal Value. */
-		/* TODO: Check format of remainder of this field. */
-		break;
-	default:
-		/* Not a valid mode; bail out here. */
-		return (0);
+	/*
+	 * Check format of mode/uid/gid/mtime/size/rdevmajor/rdevminor fields.
+	 */
+	if (bid > 0 && (
+	    validate_number_field(header->mode, sizeof(header->mode)) == 0
+	    || validate_number_field(header->uid, sizeof(header->uid)) == 0
+	    || validate_number_field(header->gid, sizeof(header->gid)) == 0
+	    || validate_number_field(header->mtime, sizeof(header->mtime)) == 0
+	    || validate_number_field(header->size, sizeof(header->size)) == 0
+	    || validate_number_field(header->rdevmajor, sizeof(header->rdevmajor)) == 0
+	    || validate_number_field(header->rdevminor, sizeof(header->rdevminor)) == 0)) {
+		bid = 0;
 	}
-	/* TODO: Sanity test uid/gid/size/mtime/rdevmajor/rdevminor fields. */
 
 	return (bid);
 }
@@ -375,7 +429,7 @@ archive_read_format_tar_options(struct archive_read *a,
 
 	tar = (struct tar *)(a->format->data);
 	if (strcmp(key, "compat-2x")  == 0) {
-		/* Handle UTF-8 filnames as libarchive 2.x */
+		/* Handle UTF-8 filenames as libarchive 2.x */
 		tar->compat_2x = (val != NULL && val[0] != 0);
 		tar->init_default_conversion = tar->compat_2x;
 		return (ARCHIVE_OK);
@@ -793,9 +847,9 @@ tar_read_header(struct archive_read *a, struct tar *tar,
 				tar->sparse_gnu_pending = 0;
 				/* Read initial sparse map. */
 				bytes_read = gnu_sparse_10_read(a, tar, unconsumed);
-				tar->entry_bytes_remaining -= bytes_read;
 				if (bytes_read < 0)
 					return ((int)bytes_read);
+				tar->entry_bytes_remaining -= bytes_read;
 			} else {
 				archive_set_error(&a->archive,
 				    ARCHIVE_ERRNO_MISC,
@@ -890,7 +944,7 @@ header_Solaris_ACL(struct archive_read *a, struct tar *tar,
 {
 	const struct archive_entry_header_ustar *header;
 	size_t size;
-	int err;
+	int err, acl_type;
 	int64_t type;
 	char *acl, *p;
 
@@ -935,11 +989,12 @@ header_Solaris_ACL(struct archive_read *a, struct tar *tar,
 	switch ((int)type & ~0777777) {
 	case 01000000:
 		/* POSIX.1e ACL */
+		acl_type = ARCHIVE_ENTRY_ACL_TYPE_ACCESS;
 		break;
 	case 03000000:
-		archive_set_error(&a->archive, ARCHIVE_ERRNO_MISC,
-		    "Solaris NFSv4 ACLs not supported");
-		return (ARCHIVE_WARN);
+		/* NFSv4 ACL */
+		acl_type = ARCHIVE_ENTRY_ACL_TYPE_NFS4;
+		break;
 	default:
 		archive_set_error(&a->archive, ARCHIVE_ERRNO_MISC,
 		    "Malformed Solaris ACL attribute (unsupported type %o)",
@@ -968,8 +1023,8 @@ header_Solaris_ACL(struct archive_read *a, struct tar *tar,
 			return (ARCHIVE_FATAL);
 	}
 	archive_strncpy(&(tar->localname), acl, p - acl);
-	err = archive_acl_parse_l(archive_entry_acl(entry),
-	    tar->localname.s, ARCHIVE_ENTRY_ACL_TYPE_ACCESS, tar->sconv_acl);
+	err = archive_acl_from_text_l(archive_entry_acl(entry),
+	    tar->localname.s, acl_type, tar->sconv_acl);
 	if (err != ARCHIVE_OK) {
 		if (errno == ENOMEM) {
 			archive_set_error(&a->archive, ENOMEM,
@@ -1128,8 +1183,15 @@ header_common(struct archive_read *a, struct tar *tar,
 	if (tar->entry_bytes_remaining < 0) {
 		tar->entry_bytes_remaining = 0;
 		archive_set_error(&a->archive, ARCHIVE_ERRNO_MISC,
-		    "Tar entry has negative size?");
-		err = ARCHIVE_WARN;
+		    "Tar entry has negative size");
+		return (ARCHIVE_FATAL);
+	}
+	if (tar->entry_bytes_remaining == INT64_MAX) {
+		/* Note: tar_atol returns INT64_MAX on overflow */
+		tar->entry_bytes_remaining = 0;
+		archive_set_error(&a->archive, ARCHIVE_ERRNO_MISC,
+		    "Tar entry size overflow");
+		return (ARCHIVE_FATAL);
 	}
 	tar->realsize = tar->entry_bytes_remaining;
 	archive_entry_set_size(entry, tar->entry_bytes_remaining);
@@ -1264,6 +1326,14 @@ header_common(struct archive_read *a, struct tar *tar,
 		 * sparse information in the extended area.
 		 */
 		/* FALLTHROUGH */
+	case '0':
+		/*
+		 * Enable sparse file "read" support only for regular
+		 * files and explicit GNU sparse files.  However, we
+		 * don't allow non-standard file types to be sparse.
+		 */
+		tar->sparse_allowed = 1;
+		/* FALLTHROUGH */
 	default: /* Regular file  and non-standard types */
 		/*
 		 * Per POSIX: non-recognized types should always be
@@ -1415,7 +1485,7 @@ header_pax_extensions(struct archive_read *a, struct tar *tar,
 	 * and then skip any fields in the standard header that were
 	 * defined in the pax header.
 	 */
-	err2 = pax_header(a, tar, entry, tar->pax_header.s);
+	err2 = pax_header(a, tar, entry, &tar->pax_header);
 	err =  err_combine(err, err2);
 	tar->entry_padding = 0x1ff & (-tar->entry_bytes_remaining);
 	return (err);
@@ -1496,16 +1566,17 @@ header_ustar(struct archive_read *a, struct tar *tar,
  */
 static int
 pax_header(struct archive_read *a, struct tar *tar,
-    struct archive_entry *entry, char *attr)
+    struct archive_entry *entry, struct archive_string *in_as)
 {
-	size_t attr_length, l, line_length;
+	size_t attr_length, l, line_length, value_length;
 	char *p;
 	char *key, *value;
 	struct archive_string *as;
 	struct archive_string_conv *sconv;
 	int err, err2;
+	char *attr = in_as->s;
 
-	attr_length = strlen(attr);
+	attr_length = in_as->length;
 	tar->pax_hdrcharset_binary = 0;
 	archive_string_empty(&(tar->entry_gname));
 	archive_string_empty(&(tar->entry_linkpath));
@@ -1570,11 +1641,13 @@ pax_header(struct archive_read *a, struct tar *tar,
 		}
 		*p = '\0';
 
-		/* Identify null-terminated 'value' portion. */
 		value = p + 1;
 
+		/* Some values may be binary data */
+		value_length = attr + line_length - 1 - value;
+
 		/* Identify this attribute and set it in the entry. */
-		err2 = pax_attribute(a, tar, entry, key, value);
+		err2 = pax_attribute(a, tar, entry, key, value, value_length);
 		if (err2 == ARCHIVE_FATAL)
 			return (err2);
 		err = err_combine(err, err2);
@@ -1695,6 +1768,66 @@ pax_attribute_xattr(struct archive_entry *entry,
 	return 0;
 }
 
+static int
+pax_attribute_schily_xattr(struct archive_entry *entry,
+	const char *name, const char *value, size_t value_length)
+{
+	if (strlen(name) < 14 || (memcmp(name, "SCHILY.xattr.", 13)) != 0)
+		return 1;
+
+	name += 13;
+
+	archive_entry_xattr_add_entry(entry, name, value, value_length);
+
+	return 0;
+}
+
+static int
+pax_attribute_acl(struct archive_read *a, struct tar *tar,
+    struct archive_entry *entry, const char *value, int type)
+{
+	int r;
+	const char* errstr;
+
+	switch (type) {
+	case ARCHIVE_ENTRY_ACL_TYPE_ACCESS:
+		errstr = "SCHILY.acl.access";
+		break;
+	case ARCHIVE_ENTRY_ACL_TYPE_DEFAULT:
+		errstr = "SCHILY.acl.default";
+		break;
+	case ARCHIVE_ENTRY_ACL_TYPE_NFS4:
+		errstr = "SCHILY.acl.ace";
+		break;
+	default:
+		archive_set_error(&a->archive, ARCHIVE_ERRNO_MISC,
+		    "Unknown ACL type: %d", type);
+		return(ARCHIVE_FATAL);
+	}
+
+	if (tar->sconv_acl == NULL) {
+		tar->sconv_acl =
+		    archive_string_conversion_from_charset(
+			&(a->archive), "UTF-8", 1);
+		if (tar->sconv_acl == NULL)
+			return (ARCHIVE_FATAL);
+	}
+
+	r = archive_acl_from_text_l(archive_entry_acl(entry), value, type,
+	    tar->sconv_acl);
+	if (r != ARCHIVE_OK) {
+		if (r == ARCHIVE_FATAL) {
+			archive_set_error(&a->archive, ENOMEM,
+			    "%s %s", "Can't allocate memory for ",
+			    errstr);
+			return (r);
+		}
+		archive_set_error(&a->archive,
+		    ARCHIVE_ERRNO_MISC, "%s %s", "Parse error: ", errstr);
+	}
+	return (r);
+}
+
 /*
  * Parse a single key=value attribute.  key/value pointers are
  * assumed to point into reasonably long-lived storage.
@@ -1710,7 +1843,7 @@ pax_attribute_xattr(struct archive_entry *entry,
  */
 static int
 pax_attribute(struct archive_read *a, struct tar *tar,
-    struct archive_entry *entry, const char *key, const char *value)
+    struct archive_entry *entry, const char *key, const char *value, size_t value_length)
 {
 	int64_t s;
 	long n;
@@ -1721,6 +1854,14 @@ pax_attribute(struct archive_read *a, struct tar *tar,
 				 * NULL pointer to strlen().  */
 	switch (key[0]) {
 	case 'G':
+		/* Reject GNU.sparse.* headers on non-regular files. */
+		if (strncmp(key, "GNU.sparse", 10) == 0 &&
+		    !tar->sparse_allowed) {
+			archive_set_error(&a->archive, ARCHIVE_ERRNO_MISC,
+			    "Non-regular file cannot be sparse");
+			return (ARCHIVE_FATAL);
+		}
+
 		/* GNU "0.0" sparse pax format. */
 		if (strcmp(key, "GNU.sparse.numblocks") == 0) {
 			tar->sparse_offset = -1;
@@ -1803,53 +1944,20 @@ pax_attribute(struct archive_read *a, struct tar *tar,
 	case 'S':
 		/* We support some keys used by the "star" archiver */
 		if (strcmp(key, "SCHILY.acl.access") == 0) {
-			if (tar->sconv_acl == NULL) {
-				tar->sconv_acl =
-				    archive_string_conversion_from_charset(
-					&(a->archive), "UTF-8", 1);
-				if (tar->sconv_acl == NULL)
-					return (ARCHIVE_FATAL);
-			}
-
-			r = archive_acl_parse_l(archive_entry_acl(entry),
-			    value, ARCHIVE_ENTRY_ACL_TYPE_ACCESS,
-			    tar->sconv_acl);
-			if (r != ARCHIVE_OK) {
-				err = r;
-				if (err == ARCHIVE_FATAL) {
-					archive_set_error(&a->archive, ENOMEM,
-					    "Can't allocate memory for "
-					    "SCHILY.acl.access");
-					return (err);
-				}
-				archive_set_error(&a->archive,
-				    ARCHIVE_ERRNO_MISC,
-				    "Parse error: SCHILY.acl.access");
-			}
+			r = pax_attribute_acl(a, tar, entry, value,
+			    ARCHIVE_ENTRY_ACL_TYPE_ACCESS);
+			if (r == ARCHIVE_FATAL)
+				return (r);
 		} else if (strcmp(key, "SCHILY.acl.default") == 0) {
-			if (tar->sconv_acl == NULL) {
-				tar->sconv_acl =
-				    archive_string_conversion_from_charset(
-					&(a->archive), "UTF-8", 1);
-				if (tar->sconv_acl == NULL)
-					return (ARCHIVE_FATAL);
-			}
-
-			r = archive_acl_parse_l(archive_entry_acl(entry),
-			    value, ARCHIVE_ENTRY_ACL_TYPE_DEFAULT,
-			    tar->sconv_acl);
-			if (r != ARCHIVE_OK) {
-				err = r;
-				if (err == ARCHIVE_FATAL) {
-					archive_set_error(&a->archive, ENOMEM,
-					    "Can't allocate memory for "
-					    "SCHILY.acl.default");
-					return (err);
-				}
-				archive_set_error(&a->archive,
-				    ARCHIVE_ERRNO_MISC,
-				    "Parse error: SCHILY.acl.default");
-			}
+			r = pax_attribute_acl(a, tar, entry, value,
+			    ARCHIVE_ENTRY_ACL_TYPE_DEFAULT);
+			if (r == ARCHIVE_FATAL)
+				return (r);
+		} else if (strcmp(key, "SCHILY.acl.ace") == 0) {
+			r = pax_attribute_acl(a, tar, entry, value,
+			    ARCHIVE_ENTRY_ACL_TYPE_NFS4);
+			if (r == ARCHIVE_FATAL)
+				return (r);
 		} else if (strcmp(key, "SCHILY.devmajor") == 0) {
 			archive_entry_set_rdevmajor(entry,
 			    (dev_t)tar_atol10(value, strlen(value)));
@@ -1870,6 +1978,9 @@ pax_attribute(struct archive_read *a, struct tar *tar,
 		} else if (strcmp(key, "SCHILY.realsize") == 0) {
 			tar->realsize = tar_atol10(value, strlen(value));
 			archive_entry_set_size(entry, tar->realsize);
+		} else if (strncmp(key, "SCHILY.xattr.", 13) == 0) {
+			pax_attribute_schily_xattr(entry, key, value,
+			    value_length);
 		} else if (strcmp(key, "SUN.holesdata") == 0) {
 			/* A Solaris extension for sparse. */
 			r = solaris_sparse_parse(a, tar, entry, value);
@@ -2116,12 +2227,11 @@ gnu_add_sparse_entry(struct archive_read *a, struct tar *tar,
 {
 	struct sparse_block *p;
 
-	p = (struct sparse_block *)malloc(sizeof(*p));
+	p = (struct sparse_block *)calloc(1, sizeof(*p));
 	if (p == NULL) {
 		archive_set_error(&a->archive, ENOMEM, "Out of memory");
 		return (ARCHIVE_FATAL);
 	}
-	memset(p, 0, sizeof(*p));
 	if (tar->sparse_last != NULL)
 		tar->sparse_last->next = p;
 	else
@@ -2377,6 +2487,9 @@ gnu_sparse_10_read(struct archive_read *a, struct tar *tar, size_t *unconsumed)
 	tar_flush_unconsumed(a, unconsumed);
 	bytes_read = (ssize_t)(tar->entry_bytes_remaining - remaining);
 	to_skip = 0x1ff & -bytes_read;
+	/* Fail if tar->entry_bytes_remaing would get negative */
+	if (to_skip > remaining)
+		return (ARCHIVE_FATAL);
 	if (to_skip != __archive_read_consume(a, to_skip))
 		return (ARCHIVE_FATAL);
 	return ((ssize_t)(bytes_read + to_skip));
@@ -2472,7 +2585,7 @@ tar_atol_base_n(const char *p, size_t char_cnt, int base)
 	last_digit_limit = INT64_MAX % base;
 
 	/* the pointer will not be dereferenced if char_cnt is zero
-	 * due to the way the && operator is evaulated.
+	 * due to the way the && operator is evaluated.
 	 */
 	while (char_cnt != 0 && (*p == ' ' || *p == '\t')) {
 		p++;
diff --git a/libarchive/archive_read_support_format_warc.c b/libarchive/archive_read_support_format_warc.c
index 46a59ea..5e22438 100644
--- a/libarchive/archive_read_support_format_warc.c
+++ b/libarchive/archive_read_support_format_warc.c
@@ -88,7 +88,7 @@ typedef enum {
 	WT_RVIS,
 	/* conversion, unsupported */
 	WT_CONV,
-	/* continutation, unsupported at the moment */
+	/* continuation, unsupported at the moment */
 	WT_CONT,
 	/* invalid type */
 	LAST_WT
@@ -134,8 +134,8 @@ static ssize_t _warc_rdlen(const char *buf, size_t bsz);
 static time_t _warc_rdrtm(const char *buf, size_t bsz);
 static time_t _warc_rdmtm(const char *buf, size_t bsz);
 static const char *_warc_find_eoh(const char *buf, size_t bsz);
+static const char *_warc_find_eol(const char *buf, size_t bsz);
 
-

 int
 archive_read_support_format_warc(struct archive *_a)
 {
@@ -146,12 +146,11 @@ archive_read_support_format_warc(struct archive *_a)
 	archive_check_magic(_a, ARCHIVE_READ_MAGIC,
 	    ARCHIVE_STATE_NEW, "archive_read_support_format_warc");
 
-	if ((w = malloc(sizeof(*w))) == NULL) {
+	if ((w = calloc(1, sizeof(*w))) == NULL) {
 		archive_set_error(&a->archive, ENOMEM,
 		    "Can't allocate warc data");
 		return (ARCHIVE_FATAL);
 	}
-	memset(w, 0, sizeof(*w));
 
 	r = __archive_read_register_format(
 		a, w, "warc",
@@ -199,8 +198,8 @@ _warc_bid(struct archive_read *a, int best_bid)
 
 	/* otherwise snarf the record's version number */
 	ver = _warc_rdver(hdr, nrd);
-	if (ver == 0U || ver > 10000U) {
-		/* oh oh oh, best not to wager ... */
+	if (ver < 1200U || ver > 10000U) {
+		/* we only support WARC 0.12 to 1.0 */
 		return -1;
 	}
 
@@ -255,23 +254,32 @@ start_over:
 			&a->archive, ARCHIVE_ERRNO_MISC,
 			"Bad record header");
 		return (ARCHIVE_FATAL);
-	} else if ((ver = _warc_rdver(buf, eoh - buf)) > 10000U) {
-		/* nawww, I wish they promised backward compatibility
-		 * anyhoo, in their infinite wisdom the 28500 guys might
-		 * come up with something we can't possibly handle so
-		 * best end things here */
+	}
+	ver = _warc_rdver(buf, eoh - buf);
+	/* we currently support WARC 0.12 to 1.0 */
+	if (ver == 0U) {
 		archive_set_error(
 			&a->archive, ARCHIVE_ERRNO_MISC,
-			"Unsupported record version");
+			"Invalid record version");
 		return (ARCHIVE_FATAL);
-	} else if ((cntlen = _warc_rdlen(buf, eoh - buf)) < 0) {
+	} else if (ver < 1200U || ver > 10000U) {
+		archive_set_error(
+			&a->archive, ARCHIVE_ERRNO_MISC,
+			"Unsupported record version: %u.%u",
+			ver / 10000, (ver % 10000) / 100);
+		return (ARCHIVE_FATAL);
+	}
+	cntlen = _warc_rdlen(buf, eoh - buf);
+	if (cntlen < 0) {
 		/* nightmare!  the specs say content-length is mandatory
 		 * so I don't feel overly bad stopping the reader here */
 		archive_set_error(
 			&a->archive, EINVAL,
 			"Bad content length");
 		return (ARCHIVE_FATAL);
-	} else if ((rtime = _warc_rdrtm(buf, eoh - buf)) == (time_t)-1) {
+	}
+	rtime = _warc_rdrtm(buf, eoh - buf);
+	if (rtime == (time_t)-1) {
 		/* record time is mandatory as per WARC/1.0,
 		 * so just barf here, fast and loud */
 		archive_set_error(
@@ -285,7 +293,7 @@ start_over:
 	if (ver != w->pver) {
 		/* stringify this entry's version */
 		archive_string_sprintf(&w->sver,
-			"WARC/%u.%u", ver / 10000, ver % 10000);
+			"WARC/%u.%u", ver / 10000, (ver % 10000) / 100);
 		/* remember the version */
 		w->pver = ver;
 	}
@@ -318,7 +326,7 @@ start_over:
 		}
 		memcpy(w->pool.str, fnam.str, fnam.len);
 		w->pool.str[fnam.len] = '\0';
-		/* let noone else know about the pool, it's a secret, shhh */
+		/* let no one else know about the pool, it's a secret, shhh */
 		fnam.str = w->pool.str;
 
 		/* snarf mtime or deduce from rtime
@@ -535,7 +543,8 @@ xstrpisotime(const char *s, char **endptr)
 
 	/* as a courtesy to our callers, and since this is a non-standard
 	 * routine, we skip leading whitespace */
-	for (; isspace(*s); s++);
+	while (isblank((unsigned char)*s))
+		++s;
 
 	/* read year */
 	if ((tm.tm_year = strtoi_lim(s, &s, 1583, 4095)) < 0 || *s++ != '-') {
@@ -562,7 +571,7 @@ xstrpisotime(const char *s, char **endptr)
 		goto out;
 	}
 
-	/* massage TM to fulfill some of POSIX' contraints */
+	/* massage TM to fulfill some of POSIX' constraints */
 	tm.tm_year -= 1900;
 	tm.tm_mon--;
 
@@ -577,51 +586,41 @@ out:
 }
 
 static unsigned int
-_warc_rdver(const char buf[10], size_t bsz)
+_warc_rdver(const char *buf, size_t bsz)
 {
 	static const char magic[] = "WARC/";
-	unsigned int ver;
-
-	(void)bsz; /* UNUSED */
+	unsigned int ver = 0U;
+	unsigned int end = 0U;
 
-	if (memcmp(buf, magic, sizeof(magic) - 1U) != 0) {
-		/* nope */
-		return 99999U;
+	if (bsz < 12 || memcmp(buf, magic, sizeof(magic) - 1U) != 0) {
+		/* buffer too small or invalid magic */
+		return ver;
 	}
 	/* looks good so far, read the version number for a laugh */
 	buf += sizeof(magic) - 1U;
-	/* most common case gets a quick-check here */
-	if (memcmp(buf, "1.0\r\n", 5U) == 0) {
-		ver = 10000U;
-	} else {
-		switch (*buf) {
-		case '0':
-		case '1':
-		case '2':
-		case '3':
-		case '4':
-		case '5':
-		case '6':
-		case '7':
-		case '8':
-			if (buf[1U] == '.') {
-				char *on;
-
-				/* set up major version */
-				ver = (buf[0U] - '0') * 10000U;
-				/* minor version, anyone? */
-				ver += (strtol(buf + 2U, &on, 10)) * 100U;
-				/* don't parse anything else */
-				if (on > buf + 2U) {
-					break;
-				}
-			}
-			/* FALLTHROUGH */
-		case '9':
-		default:
-			/* just make the version ridiculously high */
-			ver = 999999U;
-			break;
+
+	if (isdigit(buf[0U]) && (buf[1U] == '.') && isdigit(buf[2U])) {
+		/* we support a maximum of 2 digits in the minor version */
+		if (isdigit(buf[3U]))
+			end = 1U;
+		/* set up major version */
+		ver = (buf[0U] - '0') * 10000U;
+		/* set up minor version */
+		if (end == 1U) {
+			ver += (buf[2U] - '0') * 1000U;
+			ver += (buf[3U] - '0') * 100U;
+		} else
+			ver += (buf[2U] - '0') * 100U;
+		/*
+		 * WARC below version 0.12 has a space-separated header
+		 * WARC 0.12 and above terminates the version with a CRLF
+		 */
+		if (ver >= 1200U) {
+			if (memcmp(buf + 3U + end, "\r\n", 2U) != 0)
+				ver = 0U;
+		} else if (ver < 1200U) {
+			if (!isblank(*(buf + 3U + end)))
+				ver = 0U;
 		}
 	}
 	return ver;
@@ -631,32 +630,27 @@ static unsigned int
 _warc_rdtyp(const char *buf, size_t bsz)
 {
 	static const char _key[] = "\r\nWARC-Type:";
-	const char *const eob = buf + bsz;
-	const char *val;
+	const char *val, *eol;
 
 	if ((val = xmemmem(buf, bsz, _key, sizeof(_key) - 1U)) == NULL) {
 		/* no bother */
 		return WT_NONE;
 	}
+	val += sizeof(_key) - 1U;
+	if ((eol = _warc_find_eol(val, buf + bsz - val)) == NULL) {
+		/* no end of line */
+		return WT_NONE;
+	}
+
 	/* overread whitespace */
-	for (val += sizeof(_key) - 1U; val < eob && isspace(*val); val++);
-
-	if (val + 8U > eob) {
-		;
-	} else if (memcmp(val, "resource", 8U) == 0) {
-		return WT_RSRC;
-	} else if (memcmp(val, "warcinfo", 8U) == 0) {
-		return WT_INFO;
-	} else if (memcmp(val, "metadata", 8U) == 0) {
-		return WT_META;
-	} else if (memcmp(val, "request", 7U) == 0) {
-		return WT_REQ;
-	} else if (memcmp(val, "response", 8U) == 0) {
-		return WT_RSP;
-	} else if (memcmp(val, "conversi", 8U) == 0) {
-		return WT_CONV;
-	} else if (memcmp(val, "continua", 8U) == 0) {
-		return WT_CONT;
+	while (val < eol && isblank((unsigned char)*val))
+		++val;
+
+	if (val + 8U == eol) {
+		if (memcmp(val, "resource", 8U) == 0)
+			return WT_RSRC;
+		else if (memcmp(val, "response", 8U) == 0)
+			return WT_RSP;
 	}
 	return WT_NONE;
 }
@@ -665,10 +659,7 @@ static warc_string_t
 _warc_rduri(const char *buf, size_t bsz)
 {
 	static const char _key[] = "\r\nWARC-Target-URI:";
-	const char *const eob = buf + bsz;
-	const char *val;
-	const char *uri;
-	const char *eol;
+	const char *val, *uri, *eol, *p;
 	warc_string_t res = {0U, NULL};
 
 	if ((val = xmemmem(buf, bsz, _key, sizeof(_key) - 1U)) == NULL) {
@@ -676,23 +667,33 @@ _warc_rduri(const char *buf, size_t bsz)
 		return res;
 	}
 	/* overread whitespace */
-	for (val += sizeof(_key) - 1U; val < eob && isspace(*val); val++);
+	val += sizeof(_key) - 1U;
+	if ((eol = _warc_find_eol(val, buf + bsz - val)) == NULL) {
+		/* no end of line */
+		return res;
+	}
+
+	while (val < eol && isblank((unsigned char)*val))
+		++val;
 
 	/* overread URL designators */
-	if ((uri = xmemmem(val, eob - val, "://", 3U)) == NULL) {
+	if ((uri = xmemmem(val, eol - val, "://", 3U)) == NULL) {
 		/* not touching that! */
 		return res;
-	} else if ((eol = memchr(uri, '\n', eob - uri)) == NULL) {
-		/* no end of line? :O */
-		return res;
 	}
 
-	/* massage uri to point to after :// */
+	/* spaces inside uri are not allowed, CRLF should follow */
+	for (p = val; p < eol; p++) {
+		if (isspace(*p))
+			return res;
+	}
+
+	/* there must be at least space for ftp */
+	if (uri < (val + 3U))
+		return res;
+
+	/* move uri to point to after :// */
 	uri += 3U;
-	/* also massage eol to point to the first whitespace
-	 * after the last non-whitespace character before
-	 * the end of the line */
-	for (; eol > uri && isspace(eol[-1]); eol--);
 
 	/* now then, inspect the URI */
 	if (memcmp(val, "file", 4U) == 0) {
@@ -715,7 +716,7 @@ static ssize_t
 _warc_rdlen(const char *buf, size_t bsz)
 {
 	static const char _key[] = "\r\nContent-Length:";
-	const char *val;
+	const char *val, *eol;
 	char *on = NULL;
 	long int len;
 
@@ -723,14 +724,24 @@ _warc_rdlen(const char *buf, size_t bsz)
 		/* no bother */
 		return -1;
 	}
-
-	/* strtol kindly overreads whitespace for us, so use that */
 	val += sizeof(_key) - 1U;
+	if ((eol = _warc_find_eol(val, buf + bsz - val)) == NULL) {
+		/* no end of line */
+		return -1;
+	}
+
+	/* skip leading whitespace */
+	while (val < eol && isblank(*val))
+		val++;
+	/* there must be at least one digit */
+	if (!isdigit(*val))
+		return -1;
 	len = strtol(val, &on, 10);
-	if (on == NULL || !isspace(*on)) {
-		/* hm, can we trust that number?  Best not. */
+	if (on != eol) {
+		/* line must end here */
 		return -1;
 	}
+
 	return (size_t)len;
 }
 
@@ -738,7 +749,7 @@ static time_t
 _warc_rdrtm(const char *buf, size_t bsz)
 {
 	static const char _key[] = "\r\nWARC-Date:";
-	const char *val;
+	const char *val, *eol;
 	char *on = NULL;
 	time_t res;
 
@@ -746,13 +757,17 @@ _warc_rdrtm(const char *buf, size_t bsz)
 		/* no bother */
 		return (time_t)-1;
 	}
+	val += sizeof(_key) - 1U;
+	if ((eol = _warc_find_eol(val, buf + bsz - val)) == NULL ) {
+		/* no end of line */
+		return -1;
+	}
 
 	/* xstrpisotime() kindly overreads whitespace for us, so use that */
-	val += sizeof(_key) - 1U;
 	res = xstrpisotime(val, &on);
-	if (on == NULL || !isspace(*on)) {
-		/* hm, can we trust that number?  Best not. */
-		return (time_t)-1;
+	if (on != eol) {
+		/* line must end here */
+		return -1;
 	}
 	return res;
 }
@@ -761,7 +776,7 @@ static time_t
 _warc_rdmtm(const char *buf, size_t bsz)
 {
 	static const char _key[] = "\r\nLast-Modified:";
-	const char *val;
+	const char *val, *eol;
 	char *on = NULL;
 	time_t res;
 
@@ -769,13 +784,17 @@ _warc_rdmtm(const char *buf, size_t bsz)
 		/* no bother */
 		return (time_t)-1;
 	}
+	val += sizeof(_key) - 1U;
+	if ((eol = _warc_find_eol(val, buf + bsz - val)) == NULL ) {
+		/* no end of line */
+		return -1;
+	}
 
 	/* xstrpisotime() kindly overreads whitespace for us, so use that */
-	val += sizeof(_key) - 1U;
 	res = xstrpisotime(val, &on);
-	if (on == NULL || !isspace(*on)) {
-		/* hm, can we trust that number?  Best not. */
-		return (time_t)-1;
+	if (on != eol) {
+		/* line must end here */
+		return -1;
 	}
 	return res;
 }
@@ -792,4 +811,12 @@ _warc_find_eoh(const char *buf, size_t bsz)
 	return hit;
 }
 
+static const char*
+_warc_find_eol(const char *buf, size_t bsz)
+{
+	static const char _marker[] = "\r\n";
+	const char *hit = xmemmem(buf, bsz, _marker, sizeof(_marker) - 1U);
+
+	return hit;
+}
 /* archive_read_support_format_warc.c ends here */
diff --git a/libarchive/archive_read_support_format_xar.c b/libarchive/archive_read_support_format_xar.c
index ab88750..7a22beb 100644
--- a/libarchive/archive_read_support_format_xar.c
+++ b/libarchive/archive_read_support_format_xar.c
@@ -43,8 +43,6 @@ __FBSDID("$FreeBSD$");
 #endif
 #if HAVE_LZMA_H
 #include <lzma.h>
-#elif HAVE_LZMADEC_H
-#include <lzmadec.h>
 #endif
 #ifdef HAVE_ZLIB_H
 #include <zlib.h>
@@ -334,9 +332,6 @@ struct xar {
 #if HAVE_LZMA_H && HAVE_LIBLZMA
 	lzma_stream		 lzstream;
 	int			 lzstream_valid;
-#elif HAVE_LZMADEC_H && HAVE_LIBLZMADEC
-	lzmadec_stream		 lzstream;
-	int			 lzstream_valid;
 #endif
 	/*
 	 * For Checksum data.
@@ -399,6 +394,7 @@ static void	checksum_update(struct archive_read *, const void *,
 		    size_t, const void *, size_t);
 static int	checksum_final(struct archive_read *, const void *,
 		    size_t, const void *, size_t);
+static void	checksum_cleanup(struct archive_read *);
 static int	decompression_init(struct archive_read *, enum enctype);
 static int	decompress(struct archive_read *, const void **,
 		    size_t *, const void *, size_t *);
@@ -928,6 +924,7 @@ xar_cleanup(struct archive_read *a)
 	int r;
 
 	xar = (struct xar *)(a->format->data);
+	checksum_cleanup(a);
 	r = decompression_cleanup(a);
 	hdlink = xar->hdlink_list;
 	while (hdlink != NULL) {
@@ -938,6 +935,7 @@ xar_cleanup(struct archive_read *a)
 	}
 	for (i = 0; i < xar->file_queue.used; i++)
 		file_free(xar->file_queue.files[i]);
+	free(xar->file_queue.files);
 	while (xar->unknowntags != NULL) {
 		struct unknown_tag *tag;
 
@@ -1526,34 +1524,6 @@ decompression_init(struct archive_read *a, enum enctype encoding)
 		xar->lzstream.total_in = 0;
 		xar->lzstream.total_out = 0;
 		break;
-#elif defined(HAVE_LZMADEC_H) && defined(HAVE_LIBLZMADEC)
-	case LZMA:
-		if (xar->lzstream_valid)
-			lzmadec_end(&(xar->lzstream));
-		r = lzmadec_init(&(xar->lzstream));
-		if (r != LZMADEC_OK) {
-			switch (r) {
-			case LZMADEC_HEADER_ERROR:
-				archive_set_error(&a->archive,
-				    ARCHIVE_ERRNO_MISC,
-				    "Internal error initializing "
-				    "compression library: "
-				    "invalid header");
-				break;
-			case LZMADEC_MEM_ERROR:
-				archive_set_error(&a->archive,
-				    ENOMEM,
-				    "Internal error initializing "
-				    "compression library: "
-				    "out of memory");
-				break;
-			}
-			return (ARCHIVE_FATAL);
-		}
-		xar->lzstream_valid = 1;
-		xar->lzstream.total_in = 0;
-		xar->lzstream.total_out = 0;
-		break;
 #endif
 	/*
 	 * Unsupported compression.
@@ -1563,9 +1533,7 @@ decompression_init(struct archive_read *a, enum enctype encoding)
 	case BZIP2:
 #endif
 #if !defined(HAVE_LZMA_H) || !defined(HAVE_LIBLZMA)
-#if !defined(HAVE_LZMADEC_H) || !defined(HAVE_LIBLZMADEC)
 	case LZMA:
-#endif
 	case XZ:
 #endif
 		switch (xar->entry_encoding) {
@@ -1685,46 +1653,12 @@ decompress(struct archive_read *a, const void **buff, size_t *outbytes,
 		*used = avail_in - xar->lzstream.avail_in;
 		*outbytes = avail_out - xar->lzstream.avail_out;
 		break;
-#elif defined(HAVE_LZMADEC_H) && defined(HAVE_LIBLZMADEC)
-	case LZMA:
-		xar->lzstream.next_in = (unsigned char *)(uintptr_t)b;
-		xar->lzstream.avail_in = avail_in;
-		xar->lzstream.next_out = (unsigned char *)outbuff;
-		xar->lzstream.avail_out = avail_out;
-		r = lzmadec_decode(&(xar->lzstream), 0);
-		switch (r) {
-		case LZMADEC_STREAM_END: /* Found end of stream. */
-			switch (lzmadec_end(&(xar->lzstream))) {
-			case LZMADEC_OK:
-				break;
-			default:
-				archive_set_error(&(a->archive),
-				    ARCHIVE_ERRNO_MISC,
-				    "Failed to clean up lzmadec decompressor");
-				return (ARCHIVE_FATAL);
-			}
-			xar->lzstream_valid = 0;
-			/* FALLTHROUGH */
-		case LZMADEC_OK: /* Decompressor made some progress. */
-			break;
-		default:
-			archive_set_error(&(a->archive),
-			    ARCHIVE_ERRNO_MISC,
-			    "lzmadec decompression failed(%d)",
-			    r);
-			return (ARCHIVE_FATAL);
-		}
-		*used = avail_in - xar->lzstream.avail_in;
-		*outbytes = avail_out - xar->lzstream.avail_out;
-		break;
 #endif
 #if !defined(HAVE_BZLIB_H) || !defined(BZ_CONFIG_ERROR)
 	case BZIP2:
 #endif
 #if !defined(HAVE_LZMA_H) || !defined(HAVE_LIBLZMA)
-#if !defined(HAVE_LZMADEC_H) || !defined(HAVE_LIBLZMADEC)
 	case LZMA:
-#endif
 	case XZ:
 #endif
 	case NONE:
@@ -1788,6 +1722,16 @@ decompression_cleanup(struct archive_read *a)
 }
 
 static void
+checksum_cleanup(struct archive_read *a) {
+	struct xar *xar;
+
+	xar = (struct xar *)(a->format->data);
+
+	_checksum_final(&(xar->a_sumwrk), NULL, 0);
+	_checksum_final(&(xar->e_sumwrk), NULL, 0);
+}
+
+static void
 xmlattr_cleanup(struct xmlattr_list *list)
 {
 	struct xmlattr *attr, *next;
@@ -3116,7 +3060,7 @@ xml2_read_cb(void *context, char *buffer, int len)
 	struct xar *xar;
 	const void *d;
 	size_t outbytes;
-	size_t used;
+	size_t used = 0;
 	int r;
 
 	a = (struct archive_read *)context;
@@ -3240,6 +3184,9 @@ expat_xmlattr_setup(struct archive_read *a,
 		value = strdup(atts[1]);
 		if (attr == NULL || name == NULL || value == NULL) {
 			archive_set_error(&a->archive, ENOMEM, "Out of memory");
+			free(attr);
+			free(name);
+			free(value);
 			return (ARCHIVE_FATAL);
 		}
 		attr->name = name;
diff --git a/libarchive/archive_read_support_format_zip.c b/libarchive/archive_read_support_format_zip.c
index 34ab04e..08bcf1f 100644
--- a/libarchive/archive_read_support_format_zip.c
+++ b/libarchive/archive_read_support_format_zip.c
@@ -199,7 +199,7 @@ struct zip {
 	struct trad_enc_ctx	tctx;
 	char			tctx_valid;
 
-	/* WinZip AES decyption. */
+	/* WinZip AES decryption. */
 	/* Contexts used for AES decryption. */
 	archive_crypto_ctx	cctx;
 	char			cctx_valid;
@@ -242,7 +242,7 @@ trad_enc_update_keys(struct trad_enc_ctx *ctx, uint8_t c)
 }
 
 static uint8_t
-trad_enc_decypt_byte(struct trad_enc_ctx *ctx)
+trad_enc_decrypt_byte(struct trad_enc_ctx *ctx)
 {
 	unsigned temp = ctx->keys[2] | 2;
 	return (uint8_t)((temp * (temp ^ 1)) >> 8) & 0xff;
@@ -257,7 +257,7 @@ trad_enc_decrypt_update(struct trad_enc_ctx *ctx, const uint8_t *in,
 	max = (unsigned)((in_len < out_len)? in_len: out_len);
 
 	for (i = 0; i < max; i++) {
-		uint8_t t = in[i] ^ trad_enc_decypt_byte(ctx);
+		uint8_t t = in[i] ^ trad_enc_decrypt_byte(ctx);
 		out[i] = t;
 		trad_enc_update_keys(ctx, t);
 	}
@@ -418,18 +418,30 @@ zip_time(const char *p)
  *	id1+size1+data1 + id2+size2+data2 ...
  *  triplets.  id and size are 2 bytes each.
  */
-static void
-process_extra(const char *p, size_t extra_length, struct zip_entry* zip_entry)
+static int
+process_extra(struct archive_read *a, const char *p, size_t extra_length, struct zip_entry* zip_entry)
 {
 	unsigned offset = 0;
 
-	while (offset < extra_length - 4) {
+	if (extra_length == 0) {
+		return ARCHIVE_OK;
+	}
+
+	if (extra_length < 4) {
+		archive_set_error(&a->archive, ARCHIVE_ERRNO_FILE_FORMAT,
+		    "Too-small extra data: Need at least 4 bytes, but only found %d bytes", (int)extra_length);
+		return ARCHIVE_FAILED;
+	}
+	while (offset <= extra_length - 4) {
 		unsigned short headerid = archive_le16dec(p + offset);
 		unsigned short datasize = archive_le16dec(p + offset + 2);
 
 		offset += 4;
 		if (offset + datasize > extra_length) {
-			break;
+			archive_set_error(&a->archive, ARCHIVE_ERRNO_FILE_FORMAT,
+			    "Extra data overflow: Need %d bytes but only found %d bytes",
+			    (int)datasize, (int)(extra_length - offset));
+			return ARCHIVE_FAILED;
 		}
 #ifdef DEBUG
 		fprintf(stderr, "Header id 0x%04x, length %d\n",
@@ -440,26 +452,38 @@ process_extra(const char *p, size_t extra_length, struct zip_entry* zip_entry)
 			/* Zip64 extended information extra field. */
 			zip_entry->flags |= LA_USED_ZIP64;
 			if (zip_entry->uncompressed_size == 0xffffffff) {
-				if (datasize < 8)
-					break;
-				zip_entry->uncompressed_size =
-				    archive_le64dec(p + offset);
+				uint64_t t = 0;
+				if (datasize < 8
+				    || (t = archive_le64dec(p + offset)) > INT64_MAX) {
+					archive_set_error(&a->archive, ARCHIVE_ERRNO_FILE_FORMAT,
+					    "Malformed 64-bit uncompressed size");
+					return ARCHIVE_FAILED;
+				}
+				zip_entry->uncompressed_size = t;
 				offset += 8;
 				datasize -= 8;
 			}
 			if (zip_entry->compressed_size == 0xffffffff) {
-				if (datasize < 8)
-					break;
-				zip_entry->compressed_size =
-				    archive_le64dec(p + offset);
+				uint64_t t = 0;
+				if (datasize < 8
+				    || (t = archive_le64dec(p + offset)) > INT64_MAX) {
+					archive_set_error(&a->archive, ARCHIVE_ERRNO_FILE_FORMAT,
+					    "Malformed 64-bit compressed size");
+					return ARCHIVE_FAILED;
+				}
+				zip_entry->compressed_size = t;
 				offset += 8;
 				datasize -= 8;
 			}
 			if (zip_entry->local_header_offset == 0xffffffff) {
-				if (datasize < 8)
-					break;
-				zip_entry->local_header_offset =
-				    archive_le64dec(p + offset);
+				uint64_t t = 0;
+				if (datasize < 8
+				    || (t = archive_le64dec(p + offset)) > INT64_MAX) {
+					archive_set_error(&a->archive, ARCHIVE_ERRNO_FILE_FORMAT,
+					    "Malformed 64-bit local header offset");
+					return ARCHIVE_FAILED;
+				}
+				zip_entry->local_header_offset = t;
 				offset += 8;
 				datasize -= 8;
 			}
@@ -698,7 +722,7 @@ process_extra(const char *p, size_t extra_length, struct zip_entry* zip_entry)
 			break;
 		}
 		case 0x9901:
-			/* WinZIp AES extra data field. */
+			/* WinZip AES extra data field. */
 			if (p[offset + 2] == 'A' && p[offset + 3] == 'E') {
 				/* Vendor version. */
 				zip_entry->aes_extra.vendor =
@@ -715,13 +739,13 @@ process_extra(const char *p, size_t extra_length, struct zip_entry* zip_entry)
 		}
 		offset += datasize;
 	}
-#ifdef DEBUG
-	if (offset != extra_length)
-	{
-		fprintf(stderr,
-		    "Extra data field contents do not match reported size!\n");
+	if (offset != extra_length) {
+		archive_set_error(&a->archive, ARCHIVE_ERRNO_FILE_FORMAT,
+		    "Malformed extra data: Consumed %d bytes of %d bytes",
+		    (int)offset, (int)extra_length);
+		return ARCHIVE_FAILED;
 	}
-#endif
+	return ARCHIVE_OK;
 }
 
 /*
@@ -840,7 +864,9 @@ zip_read_local_file_header(struct archive_read *a, struct archive_entry *entry,
 		return (ARCHIVE_FATAL);
 	}
 
-	process_extra(h, extra_length, zip_entry);
+	if (ARCHIVE_OK != process_extra(a, h, extra_length, zip_entry)) {
+		return ARCHIVE_FATAL;
+	}
 	__archive_read_consume(a, extra_length);
 
 	/* Work around a bug in Info-Zip: When reading from a pipe, it
@@ -850,29 +876,33 @@ zip_read_local_file_header(struct archive_read *a, struct archive_entry *entry,
 		zip_entry->mode |= AE_IFREG;
 	}
 
-	if ((zip_entry->mode & AE_IFMT) == 0) {
-		/* Especially in streaming mode, we can end up
-		   here without having seen proper mode information.
-		   Guess from the filename. */
+	/* If the mode is totally empty, set some sane default. */
+	if (zip_entry->mode == 0) {
+		zip_entry->mode |= 0664;
+	}
+
+	/* Make sure that entries with a trailing '/' are marked as directories
+	 * even if the External File Attributes contains bogus values.  If this
+	 * is not a directory and there is no type, assume regularfile. */
+	if ((zip_entry->mode & AE_IFMT) != AE_IFDIR) {
+		int has_slash;
+
 		wp = archive_entry_pathname_w(entry);
 		if (wp != NULL) {
 			len = wcslen(wp);
-			if (len > 0 && wp[len - 1] == L'/')
-				zip_entry->mode |= AE_IFDIR;
-			else
-				zip_entry->mode |= AE_IFREG;
+			has_slash = len > 0 && wp[len - 1] == L'/';
 		} else {
 			cp = archive_entry_pathname(entry);
 			len = (cp != NULL)?strlen(cp):0;
-			if (len > 0 && cp[len - 1] == '/')
-				zip_entry->mode |= AE_IFDIR;
-			else
-				zip_entry->mode |= AE_IFREG;
+			has_slash = len > 0 && cp[len - 1] == '/';
 		}
-		if (zip_entry->mode == AE_IFDIR) {
-			zip_entry->mode |= 0775;
-		} else if (zip_entry->mode == AE_IFREG) {
-			zip_entry->mode |= 0664;
+		/* Correct file type as needed. */
+		if (has_slash) {
+			zip_entry->mode &= ~AE_IFMT;
+			zip_entry->mode |= AE_IFDIR;
+			zip_entry->mode |= 0111;
+		} else if ((zip_entry->mode & AE_IFMT) == 0) {
+			zip_entry->mode |= AE_IFREG;
 		}
 	}
 
@@ -887,6 +917,7 @@ zip_read_local_file_header(struct archive_read *a, struct archive_entry *entry,
 				archive_wstrcat(&s, wp);
 				archive_wstrappend_wchar(&s, L'/');
 				archive_entry_copy_pathname_w(entry, s.s);
+				archive_wstring_free(&s);
 			}
 		} else {
 			cp = archive_entry_pathname(entry);
@@ -897,6 +928,7 @@ zip_read_local_file_header(struct archive_read *a, struct archive_entry *entry,
 				archive_strcat(&s, cp);
 				archive_strappend_char(&s, '/');
 				archive_entry_set_pathname(entry, s.s);
+				archive_string_free(&s);
 			}
 		}
 	}
@@ -1136,11 +1168,18 @@ zip_read_data_none(struct archive_read *a, const void **_buff,
 			|| (zip->hctx_valid
 			 && zip->entry->aes_extra.vendor == AES_VENDOR_AE_2))) {
 			if (zip->entry->flags & LA_USED_ZIP64) {
+				uint64_t compressed, uncompressed;
 				zip->entry->crc32 = archive_le32dec(p + 4);
-				zip->entry->compressed_size =
-					archive_le64dec(p + 8);
-				zip->entry->uncompressed_size =
-					archive_le64dec(p + 16);
+				compressed = archive_le64dec(p + 8);
+				uncompressed = archive_le64dec(p + 16);
+				if (compressed > INT64_MAX || uncompressed > INT64_MAX) {
+					archive_set_error(&a->archive,
+					    ARCHIVE_ERRNO_FILE_FORMAT,
+					    "Overflow of 64-bit file sizes");
+					return ARCHIVE_FAILED;
+				}
+				zip->entry->compressed_size = compressed;
+				zip->entry->uncompressed_size = uncompressed;
 				zip->unconsumed = 24;
 			} else {
 				zip->entry->crc32 = archive_le32dec(p + 4);
@@ -1293,7 +1332,7 @@ zip_read_data_deflate(struct archive_read *a, const void **buff,
 	    && bytes_avail > zip->entry_bytes_remaining) {
 		bytes_avail = (ssize_t)zip->entry_bytes_remaining;
 	}
-	if (bytes_avail <= 0) {
+	if (bytes_avail < 0) {
 		archive_set_error(&a->archive, ARCHIVE_ERRNO_FILE_FORMAT,
 		    "Truncated ZIP file body");
 		return (ARCHIVE_FATAL);
@@ -1417,9 +1456,18 @@ zip_read_data_deflate(struct archive_read *a, const void **buff,
 			zip->unconsumed = 4;
 		}
 		if (zip->entry->flags & LA_USED_ZIP64) {
+			uint64_t compressed, uncompressed;
 			zip->entry->crc32 = archive_le32dec(p);
-			zip->entry->compressed_size = archive_le64dec(p + 4);
-			zip->entry->uncompressed_size = archive_le64dec(p + 12);
+			compressed = archive_le64dec(p + 4);
+			uncompressed = archive_le64dec(p + 12);
+			if (compressed > INT64_MAX || uncompressed > INT64_MAX) {
+				archive_set_error(&a->archive,
+				    ARCHIVE_ERRNO_FILE_FORMAT,
+				    "Overflow of 64-bit file sizes");
+				return ARCHIVE_FAILED;
+			}
+			zip->entry->compressed_size = compressed;
+			zip->entry->uncompressed_size = uncompressed;
 			zip->unconsumed += 20;
 		} else {
 			zip->entry->crc32 = archive_le32dec(p);
@@ -1500,7 +1548,7 @@ read_decryption_header(struct archive_read *a)
 	case 0x6720:/* Blowfish */
 	case 0x6721:/* Twofish */
 	case 0x6801:/* RC4 */
-		/* Suuported encryption algorithm. */
+		/* Supported encryption algorithm. */
 		break;
 	default:
 		archive_set_error(&a->archive,
@@ -1609,7 +1657,7 @@ read_decryption_header(struct archive_read *a)
 	__archive_read_consume(a, 4);
 
 	/*return (ARCHIVE_OK);
-	 * This is not fully implemnted yet.*/
+	 * This is not fully implemented yet.*/
 	archive_set_error(&a->archive, ARCHIVE_ERRNO_FILE_FORMAT,
 	    "Encrypted file is unsupported");
 	return (ARCHIVE_FAILED);
@@ -1691,7 +1739,7 @@ init_traditional_PKWARE_decryption(struct archive_read *a)
 		}
 
 		/*
-		 * Initialize ctx for Traditional PKWARE Decyption.
+		 * Initialize ctx for Traditional PKWARE Decryption.
 		 */
 		r = trad_enc_init(&zip->tctx, passphrase, strlen(passphrase),
 			p, ENC_HEADER_SIZE, &crcchk);
@@ -2691,7 +2739,9 @@ slurp_central_directory(struct archive_read *a, struct zip *zip)
 			    "Truncated ZIP file header");
 			return ARCHIVE_FATAL;
 		}
-		process_extra(p + filename_length, extra_length, zip_entry);
+		if (ARCHIVE_OK != process_extra(a, p + filename_length, extra_length, zip_entry)) {
+			return ARCHIVE_FATAL;
+		}
 
 		/*
 		 * Mac resource fork files are stored under the
diff --git a/libarchive/archive_string.c b/libarchive/archive_string.c
index 282c58e..592ead2 100644
--- a/libarchive/archive_string.c
+++ b/libarchive/archive_string.c
@@ -219,6 +219,12 @@ archive_wstring_append(struct archive_wstring *as, const wchar_t *p, size_t s)
 	return (as);
 }
 
+struct archive_string *
+archive_array_append(struct archive_string *as, const char *p, size_t s)
+{
+	return archive_string_append(as, p, s);
+}
+
 void
 archive_string_concat(struct archive_string *dest, struct archive_string *src)
 {
@@ -559,7 +565,8 @@ archive_wstring_append_from_mbs_in_codepage(struct archive_wstring *dest,
 			}
 			if (count == 0 && length != 0)
 				ret = -1;
-		} while (0);
+			break;
+		} while (1);
 	}
 	dest->length += count;
 	dest->s[dest->length] = L'\0';
@@ -596,7 +603,7 @@ archive_wstring_append_from_mbs(struct archive_wstring *dest,
 	wcs = dest->s + dest->length;
 	/*
 	 * We cannot use mbsrtowcs/mbstowcs here because those may convert
-	 * extra MBS when strlen(p) > len and one wide character consis of
+	 * extra MBS when strlen(p) > len and one wide character consists of
 	 * multi bytes.
 	 */
 	while (*mbs && mbs_length > 0) {
@@ -1247,7 +1254,7 @@ create_sconv_object(const char *fc, const char *tc,
 		sc->cd = iconv_open(tc, fc);
 		if (sc->cd == (iconv_t)-1 && (sc->flag & SCONV_BEST_EFFORT)) {
 			/*
-			 * Unfortunaly, all of iconv implements do support 
+			 * Unfortunately, all of iconv implements do support
 			 * "CP932" character-set, so we should use "SJIS"
 			 * instead if iconv_open failed.
 			 */
@@ -1260,7 +1267,7 @@ create_sconv_object(const char *fc, const char *tc,
 		/*
 		 * archive_mstring on Windows directly convert multi-bytes
 		 * into archive_wstring in order not to depend on locale
-		 * so that you can do a I18N programing. This will be
+		 * so that you can do a I18N programming. This will be
 		 * used only in archive_mstring_copy_mbs_len_l so far.
 		 */
 		if (flag & SCONV_FROM_CHARSET) {
@@ -1725,7 +1732,7 @@ archive_string_conversion_from_charset(struct archive *a, const char *charset,
  * in tar or zip files. But mbstowcs/wcstombs(CRT) usually use CP_ACP
  * unless you use setlocale(LC_ALL, ".OCP")(specify CP_OEMCP).
  * So we should make a string conversion between CP_ACP and CP_OEMCP
- * for compatibillty.
+ * for compatibility.
  */
 #if defined(_WIN32) && !defined(__CYGWIN__)
 struct archive_string_conv *
@@ -1826,7 +1833,7 @@ archive_string_conversion_set_opt(struct archive_string_conv *sc, int opt)
 	 * A filename in UTF-8 was made with libarchive 2.x in a wrong
 	 * assumption that wchar_t was Unicode.
 	 * This option enables simulating the assumption in order to read
-	 * that filname correctly.
+	 * that filename correctly.
 	 */
 	case SCONV_SET_OPT_UTF8_LIBARCHIVE2X:
 #if (defined(_WIN32) && !defined(__CYGWIN__)) \
@@ -1938,12 +1945,19 @@ archive_strncat_l(struct archive_string *as, const void *_p, size_t n,
     struct archive_string_conv *sc)
 {
 	const void *s;
-	size_t length;
+	size_t length = 0;
 	int i, r = 0, r2;
 
+	if (_p != NULL && n > 0) {
+		if (sc != NULL && (sc->flag & SCONV_FROM_UTF16))
+			length = utf16nbytes(_p, n);
+		else
+			length = mbsnbytes(_p, n);
+	}
+
 	/* We must allocate memory even if there is no data for conversion
 	 * or copy. This simulates archive_string_append behavior. */
-	if (_p == NULL || n == 0) {
+	if (length == 0) {
 		int tn = 1;
 		if (sc != NULL && (sc->flag & SCONV_TO_UTF16))
 			tn = 2;
@@ -1959,16 +1973,11 @@ archive_strncat_l(struct archive_string *as, const void *_p, size_t n,
 	 * If sc is NULL, we just make a copy.
 	 */
 	if (sc == NULL) {
-		length = mbsnbytes(_p, n);
 		if (archive_string_append(as, _p, length) == NULL)
 			return (-1);/* No memory */
 		return (0);
 	}
 
-	if (sc->flag & SCONV_FROM_UTF16)
-		length = utf16nbytes(_p, n);
-	else
-		length = mbsnbytes(_p, n);
 	s = _p;
 	i = 0;
 	if (sc->nconverter > 1) {
@@ -1991,7 +2000,7 @@ archive_strncat_l(struct archive_string *as, const void *_p, size_t n,
 #if HAVE_ICONV
 
 /*
- * Return -1 if conversion failes.
+ * Return -1 if conversion fails.
  */
 static int
 iconv_strncat_in_locale(struct archive_string *as, const void *_p,
@@ -2093,7 +2102,7 @@ iconv_strncat_in_locale(struct archive_string *as, const void *_p,
 
 /*
  * Translate a string from a some CodePage to an another CodePage by
- * Windows APIs, and copy the result. Return -1 if conversion failes.
+ * Windows APIs, and copy the result. Return -1 if conversion fails.
  */
 static int
 strncat_in_codepage(struct archive_string *as,
@@ -2217,7 +2226,7 @@ best_effort_strncat_in_locale(struct archive_string *as, const void *_p,
 
 	/*
 	 * If a character is ASCII, this just copies it. If not, this
-	 * assigns '?' charater instead but in UTF-8 locale this assigns
+	 * assigns '?' character instead but in UTF-8 locale this assigns
 	 * byte sequence 0xEF 0xBD 0xBD, which are code point U+FFFD,
 	 * a Replacement Character in Unicode.
 	 */
@@ -2297,7 +2306,7 @@ _utf8_to_unicode(uint32_t *pwc, const char *s, size_t n)
 		return (0); /* Standard:  return 0 for end-of-string. */
 	cnt = utf8_count[ch];
 
-	/* Invalide sequence or there are not plenty bytes. */
+	/* Invalid sequence or there are not plenty bytes. */
 	if ((int)n < cnt) {
 		cnt = (int)n;
 		for (i = 1; i < cnt; i++) {
@@ -2378,7 +2387,7 @@ _utf8_to_unicode(uint32_t *pwc, const char *s, size_t n)
 		goto invalid_sequence;
 	}
 
-	/* The code point larger than 0x10FFFF is not leagal
+	/* The code point larger than 0x10FFFF is not legal
 	 * Unicode values. */
 	if (wc > UNICODE_MAX)
 		goto invalid_sequence;
@@ -2396,7 +2405,7 @@ utf8_to_unicode(uint32_t *pwc, const char *s, size_t n)
 	int cnt;
 
 	cnt = _utf8_to_unicode(pwc, s, n);
-	/* Any of Surrogate pair is not leagal Unicode values. */
+	/* Any of Surrogate pair is not legal Unicode values. */
 	if (cnt == 3 && IS_SURROGATE_PAIR_LA(*pwc))
 		return (-3);
 	return (cnt);
@@ -2457,7 +2466,7 @@ invalid_sequence:
 /*
  * Convert a Unicode code point to a single UTF-8 sequence.
  *
- * NOTE:This function does not check if the Unicode is leagal or not.
+ * NOTE:This function does not check if the Unicode is legal or not.
  * Please you definitely check it before calling this.
  */
 static size_t
@@ -2551,9 +2560,9 @@ utf16_to_unicode(uint32_t *pwc, const char *s, size_t n, int be)
 
 	/*
 	 * Surrogate pair values(0xd800 through 0xdfff) are only
-	 * used by UTF-16, so, after above culculation, the code
+	 * used by UTF-16, so, after above calculation, the code
 	 * must not be surrogate values, and Unicode has no codes
-	 * larger than 0x10ffff. Thus, those are not leagal Unicode
+	 * larger than 0x10ffff. Thus, those are not legal Unicode
 	 * values.
 	 */
 	if (IS_SURROGATE_PAIR_LA(uc) || uc > UNICODE_MAX) {
@@ -2900,7 +2909,7 @@ get_nfc(uint32_t uc, uint32_t uc2)
 /*
  * Normalize UTF-8/UTF-16BE characters to Form C and copy the result.
  *
- * TODO: Convert composition exclusions,which are never converted
+ * TODO: Convert composition exclusions, which are never converted
  * from NFC,NFD,NFKC and NFKD, to Form C.
  */
 static int
@@ -3434,7 +3443,7 @@ strncat_from_utf8_libarchive2(struct archive_string *as,
 		}
 
 		/*
-		 * As libarchie 2.x, translates the UTF-8 characters into
+		 * As libarchive 2.x, translates the UTF-8 characters into
 		 * wide-characters in the assumption that WCS is Unicode.
 		 */
 		if (n < 0) {
@@ -3473,7 +3482,7 @@ strncat_from_utf8_libarchive2(struct archive_string *as,
 
 /*
  * Convert a UTF-16BE/LE string to current locale and copy the result.
- * Return -1 if conversion failes.
+ * Return -1 if conversion fails.
  */
 static int
 win_strncat_from_utf16(struct archive_string *as, const void *_p, size_t bytes,
@@ -3552,18 +3561,19 @@ win_strncat_from_utf16(struct archive_string *as, const void *_p, size_t bytes,
 		ll = WideCharToMultiByte(sc->to_cp, 0,
 		    (LPCWSTR)u16, (int)bytes>>1, mbs, (int)mbs_size,
 			NULL, &defchar);
-		if (ll == 0 &&
-		    GetLastError() == ERROR_INSUFFICIENT_BUFFER) {
-			/* Need more buffer for MBS. */
-			ll = WideCharToMultiByte(sc->to_cp, 0,
-			    (LPCWSTR)u16, (int)bytes, NULL, 0, NULL, NULL);
-			if (archive_string_ensure(as, ll +1) == NULL)
-				return (-1);
-			mbs = as->s + as->length;
-			mbs_size = as->buffer_length - as->length -1;
-			continue;
+		/* Exit loop if we succeeded */
+		if (ll != 0 ||
+		    GetLastError() != ERROR_INSUFFICIENT_BUFFER) {
+			break;
 		}
-	} while (0);
+		/* Else expand buffer and loop to try again. */
+		ll = WideCharToMultiByte(sc->to_cp, 0,
+		    (LPCWSTR)u16, (int)bytes, NULL, 0, NULL, NULL);
+		if (archive_string_ensure(as, ll +1) == NULL)
+			return (-1);
+		mbs = as->s + as->length;
+		mbs_size = as->buffer_length - as->length -1;
+	} while (1);
 	archive_string_free(&tmp);
 	as->length += ll;
 	as->s[as->length] = '\0';
@@ -3596,7 +3606,7 @@ is_big_endian(void)
 
 /*
  * Convert a current locale string to UTF-16BE/LE and copy the result.
- * Return -1 if conversion failes.
+ * Return -1 if conversion fails.
  */
 static int
 win_strncat_to_utf16(struct archive_string *as16, const void *_p,
@@ -3634,19 +3644,20 @@ win_strncat_to_utf16(struct archive_string *as16, const void *_p,
 	do {
 		count = MultiByteToWideChar(sc->from_cp,
 		    MB_PRECOMPOSED, s, (int)length, (LPWSTR)u16, (int)avail>>1);
-		if (count == 0 &&
-		    GetLastError() == ERROR_INSUFFICIENT_BUFFER) {
-			/* Need more buffer for UTF-16 string */
-			count = MultiByteToWideChar(sc->from_cp,
-			    MB_PRECOMPOSED, s, (int)length, NULL, 0);
-			if (archive_string_ensure(as16, (count +1) * 2)
-			    == NULL)
-				return (-1);
-			u16 = as16->s + as16->length;
-			avail = as16->buffer_length - 2;
-			continue;
+		/* Exit loop if we succeeded */
+		if (count != 0 ||
+		    GetLastError() != ERROR_INSUFFICIENT_BUFFER) {
+			break;
 		}
-	} while (0);
+		/* Expand buffer and try again */
+		count = MultiByteToWideChar(sc->from_cp,
+		    MB_PRECOMPOSED, s, (int)length, NULL, 0);
+		if (archive_string_ensure(as16, (count +1) * 2)
+		    == NULL)
+			return (-1);
+		u16 = as16->s + as16->length;
+		avail = as16->buffer_length - 2;
+	} while (1);
 	as16->length += count * 2;
 	as16->s[as16->length] = 0;
 	as16->s[as16->length+1] = 0;
@@ -3700,7 +3711,7 @@ win_strncat_to_utf16le(struct archive_string *as16, const void *_p,
 
 /*
  * Convert a UTF-16BE string to current locale and copy the result.
- * Return -1 if conversion failes.
+ * Return -1 if conversion fails.
  */
 static int
 best_effort_strncat_from_utf16(struct archive_string *as, const void *_p,
@@ -3758,7 +3769,7 @@ best_effort_strncat_from_utf16le(struct archive_string *as, const void *_p,
 
 /*
  * Convert a current locale string to UTF-16BE/LE and copy the result.
- * Return -1 if conversion failes.
+ * Return -1 if conversion fails.
  */
 static int
 best_effort_strncat_to_utf16(struct archive_string *as16, const void *_p,
@@ -3942,7 +3953,7 @@ archive_mstring_get_mbs_l(struct archive_mstring *aes,
 
 #if defined(_WIN32) && !defined(__CYGWIN__)
 	/*
-	 * Internationalization programing on Windows must use Wide
+	 * Internationalization programming on Windows must use Wide
 	 * characters because Windows platform cannot make locale UTF-8.
 	 */
 	if (sc != NULL && (aes->aes_set & AES_SET_WCS) != 0) {
@@ -4074,7 +4085,7 @@ archive_mstring_copy_mbs_len_l(struct archive_mstring *aes,
 	archive_string_empty(&(aes->aes_utf8));
 #if defined(_WIN32) && !defined(__CYGWIN__)
 	/*
-	 * Internationalization programing on Windows must use Wide
+	 * Internationalization programming on Windows must use Wide
 	 * characters because Windows platform cannot make locale UTF-8.
 	 */
 	if (sc == NULL) {
diff --git a/libarchive/archive_string.h b/libarchive/archive_string.h
index 23f4916..56dfbb2 100644
--- a/libarchive/archive_string.h
+++ b/libarchive/archive_string.h
@@ -81,6 +81,10 @@ archive_strappend_char(struct archive_string *, char);
 struct archive_wstring *
 archive_wstrappend_wchar(struct archive_wstring *, wchar_t);
 
+/* Append a raw array to an archive_string, resizing as necessary */
+struct archive_string *
+archive_array_append(struct archive_string *, const char *, size_t);
+
 /* Convert a Unicode string to current locale and append the result. */
 /* Returns -1 if conversion fails. */
 int
@@ -115,13 +119,13 @@ archive_string_conversion_set_opt(struct archive_string_conv *, int);
 
 
 /* Copy one archive_string to another in locale conversion.
- * Return -1 if conversion failes. */
+ * Return -1 if conversion fails. */
 int
 archive_strncpy_l(struct archive_string *, const void *, size_t,
     struct archive_string_conv *);
 
 /* Copy one archive_string to another in locale conversion.
- * Return -1 if conversion failes. */
+ * Return -1 if conversion fails. */
 int
 archive_strncat_l(struct archive_string *, const void *, size_t,
     struct archive_string_conv *);
diff --git a/libarchive/archive_string_composition.h b/libarchive/archive_string_composition.h
index be41e33..8902ac1 100644
--- a/libarchive/archive_string_composition.h
+++ b/libarchive/archive_string_composition.h
@@ -1009,7 +1009,7 @@ static const char u_decomposable_blocks[0x1D2+1] = {
 	(((uc) > 0x1D244)?0:\
 	ccc_val[ccc_val_index[ccc_index[(uc)>>8]][((uc)>>4)&0x0F]][(uc)&0x0F])
 
-/* The table of the value of Canonical Cimbining Class */
+/* The table of the value of Canonical Combining Class */
 static const unsigned char ccc_val[][16] = {
  /* idx=0: XXXX0 - XXXXF */
  { 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0 },
diff --git a/libarchive/archive_util.c b/libarchive/archive_util.c
index cc3d1c4..6b3bd61 100644
--- a/libarchive/archive_util.c
+++ b/libarchive/archive_util.c
@@ -580,7 +580,7 @@ void
 __archive_ensure_cloexec_flag(int fd)
 {
 #if defined(_WIN32) && !defined(__CYGWIN__)
-	(void)fd; /* UNSED */
+	(void)fd; /* UNUSED */
 #else
 	int flags;
 
diff --git a/libarchive/archive_windows.c b/libarchive/archive_windows.c
index d4e93fe..6ff8749 100644
--- a/libarchive/archive_windows.c
+++ b/libarchive/archive_windows.c
@@ -766,7 +766,7 @@ __la_win_entry_in_posix_pathseparator(struct archive_entry *entry)
 			has_backslash = 1;
 	}
 	/*
-	 * If there is no backslach chars, return the original.
+	 * If there is no backslash chars, return the original.
 	 */
 	if (!has_backslash)
 		return (entry);
@@ -891,7 +891,7 @@ __la_dosmaperr(unsigned long e)
 		return;
 	}
 
-	for (i = 0; i < (int)sizeof(doserrors); i++)
+	for (i = 0; i < (int)(sizeof(doserrors)/sizeof(doserrors[0])); i++)
 	{
 		if (doserrors[i].winerr == e)
 		{
diff --git a/libarchive/archive_windows.h b/libarchive/archive_windows.h
index 8cf1c56..e77cd08 100644
--- a/libarchive/archive_windows.h
+++ b/libarchive/archive_windows.h
@@ -218,16 +218,20 @@
 #define	S_IWUSR	     _S_IWUSR
 #define	S_IRUSR	     _S_IRUSR
 #endif
+#ifndef S_IRWXG
 #define	S_IRWXG        _S_IRWXG
 #define	S_IXGRP        _S_IXGRP
 #define	S_IWGRP        _S_IWGRP
+#endif
 #ifndef S_IRGRP
 #define	S_IRGRP        _S_IRGRP
 #endif
+#ifndef S_IRWXO
 #define	S_IRWXO        _S_IRWXO
 #define	S_IXOTH        _S_IXOTH
 #define	S_IWOTH        _S_IWOTH
 #define	S_IROTH        _S_IROTH
+#endif
 
 #endif
 
diff --git a/libarchive/archive_write.c b/libarchive/archive_write.c
index e3fa335..0634a22 100644
--- a/libarchive/archive_write.c
+++ b/libarchive/archive_write.c
@@ -109,10 +109,9 @@ archive_write_new(void)
 	struct archive_write *a;
 	unsigned char *nulls;
 
-	a = (struct archive_write *)malloc(sizeof(*a));
+	a = (struct archive_write *)calloc(1, sizeof(*a));
 	if (a == NULL)
 		return (NULL);
-	memset(a, 0, sizeof(*a));
 	a->archive.magic = ARCHIVE_WRITE_MAGIC;
 	a->archive.state = ARCHIVE_STATE_NEW;
 	a->archive.vtable = archive_write_vtable();
@@ -126,12 +125,11 @@ archive_write_new(void)
 
 	/* Initialize a block of nulls for padding purposes. */
 	a->null_length = 1024;
-	nulls = (unsigned char *)malloc(a->null_length);
+	nulls = (unsigned char *)calloc(1, a->null_length);
 	if (nulls == NULL) {
 		free(a);
 		return (NULL);
 	}
-	memset(nulls, 0, a->null_length);
 	a->nulls = nulls;
 	return (&a->archive);
 }
@@ -233,7 +231,7 @@ __archive_write_filter(struct archive_write_filter *f,
 	if (length == 0)
 		return(ARCHIVE_OK);
 	if (f->write == NULL)
-		/* If unset, a fatal error has already ocuured, so this filter
+		/* If unset, a fatal error has already occurred, so this filter
 		 * didn't open. We cannot write anything. */
 		return(ARCHIVE_FATAL);
 	r = (f->write)(f, buff, length);
diff --git a/libarchive/archive_write_add_filter_lz4.c b/libarchive/archive_write_add_filter_lz4.c
index 1d0ab8c..e655185 100644
--- a/libarchive/archive_write_add_filter_lz4.c
+++ b/libarchive/archive_write_add_filter_lz4.c
@@ -523,7 +523,7 @@ drive_compressor_independence(struct archive_write_filter *f, const char *p,
 		archive_le32enc(data->out, outsize);
 		data->out += 4;
 	} else {
-		/* The buffer is not compressed. The commpressed size was
+		/* The buffer is not compressed. The compressed size was
 		 * bigger than its uncompressed size. */
 		archive_le32enc(data->out, length | 0x80000000);
 		data->out += 4;
@@ -608,7 +608,7 @@ drive_compressor_dependence(struct archive_write_filter *f, const char *p,
 		archive_le32enc(data->out, outsize);
 		data->out += 4;
 	} else {
-		/* The buffer is not compressed. The commpressed size was
+		/* The buffer is not compressed. The compressed size was
 		 * bigger than its uncompressed size. */
 		archive_le32enc(data->out, length | 0x80000000);
 		data->out += 4;
diff --git a/libarchive/archive_write_add_filter_program.c b/libarchive/archive_write_add_filter_program.c
index 31a1b6f..55b5e8e 100644
--- a/libarchive/archive_write_add_filter_program.c
+++ b/libarchive/archive_write_add_filter_program.c
@@ -200,6 +200,7 @@ __archive_write_program_free(struct archive_write_program_data *data)
 		if (data->child)
 			CloseHandle(data->child);
 #endif
+		free(data->program_name);
 		free(data->child_buf);
 		free(data);
 	}
diff --git a/libarchive/archive_write_add_filter_xz.c b/libarchive/archive_write_add_filter_xz.c
index 46a6c38..b0f25a6 100644
--- a/libarchive/archive_write_add_filter_xz.c
+++ b/libarchive/archive_write_add_filter_xz.c
@@ -233,7 +233,7 @@ archive_compressor_xz_init_stream(struct archive_write_filter *f,
 	if (f->code == ARCHIVE_FILTER_XZ) {
 #ifdef HAVE_LZMA_STREAM_ENCODER_MT
 		if (data->threads != 1) {
-			bzero(&mt_options, sizeof(mt_options));
+			memset(&mt_options, 0, sizeof(mt_options));
 			mt_options.threads = data->threads;
 			mt_options.timeout = 300;
 			mt_options.filters = data->lzmafilters;
diff --git a/libarchive/archive_write_disk_acl.c b/libarchive/archive_write_disk_acl.c
index 5cbba54..144ab7e 100644
--- a/libarchive/archive_write_disk_acl.c
+++ b/libarchive/archive_write_disk_acl.c
@@ -34,6 +34,9 @@ __FBSDID("$FreeBSD: head/lib/libarchive/archive_write_disk.c 201159 2009-12-29 0
 #define _ACL_PRIVATE /* For debugging */
 #include <sys/acl.h>
 #endif
+#if HAVE_DARWIN_ACL
+#include <membership.h>
+#endif
 #ifdef HAVE_ERRNO_H
 #include <errno.h>
 #endif
@@ -43,7 +46,7 @@ __FBSDID("$FreeBSD: head/lib/libarchive/archive_write_disk.c 201159 2009-12-29 0
 #include "archive_acl_private.h"
 #include "archive_write_disk_private.h"
 
-#ifndef HAVE_POSIX_ACL
+#if !HAVE_POSIX_ACL && !HAVE_NFS4_ACL
 /* Default empty function body to satisfy mainline code. */
 int
 archive_write_disk_set_acls(struct archive *a, int fd, const char *name,
@@ -56,47 +59,111 @@ archive_write_disk_set_acls(struct archive *a, int fd, const char *name,
 	return (ARCHIVE_OK);
 }
 
-#else
+#else /* HAVE_POSIX_ACL || HAVE_NFS4_ACL */
+
+#if HAVE_SUN_ACL
+#define	ARCHIVE_PLATFORM_ACL_TYPE_NFS4	ACE_T
+#elif HAVE_DARWIN_ACL
+#define	ARCHIVE_PLATFORM_ACL_TYPE_NFS4	ACL_TYPE_EXTENDED
+#elif HAVE_ACL_TYPE_NFS4
+#define	ARCHIVE_PLATFORM_ACL_TYPE_NFS4	ACL_TYPE_NFS4
+#endif
 
 static int	set_acl(struct archive *, int fd, const char *,
 			struct archive_acl *,
 			acl_type_t, int archive_entry_acl_type, const char *tn);
 
-/*
- * XXX TODO: What about ACL types other than ACCESS and DEFAULT?
- */
 int
 archive_write_disk_set_acls(struct archive *a, int fd, const char *name,
 	 struct archive_acl *abstract_acl)
 {
-	int		 ret;
+	int		ret = ARCHIVE_OK;
 
-	if (archive_acl_count(abstract_acl, ARCHIVE_ENTRY_ACL_TYPE_POSIX1E) > 0) {
-		ret = set_acl(a, fd, name, abstract_acl, ACL_TYPE_ACCESS,
-		    ARCHIVE_ENTRY_ACL_TYPE_ACCESS, "access");
-		if (ret != ARCHIVE_OK)
-			return (ret);
-		ret = set_acl(a, fd, name, abstract_acl, ACL_TYPE_DEFAULT,
-		    ARCHIVE_ENTRY_ACL_TYPE_DEFAULT, "default");
+#if !HAVE_DARWIN_ACL
+	if ((archive_acl_types(abstract_acl)
+	    & ARCHIVE_ENTRY_ACL_TYPE_POSIX1E) != 0) {
+#if HAVE_SUN_ACL
+		/* Solaris writes POSIX.1e access and default ACLs together */
+		ret = set_acl(a, fd, name, abstract_acl, ACLENT_T,
+		    ARCHIVE_ENTRY_ACL_TYPE_POSIX1E, "posix1e");
+#else	/* HAVE_POSIX_ACL */
+		if ((archive_acl_types(abstract_acl)
+		    & ARCHIVE_ENTRY_ACL_TYPE_ACCESS) != 0) {
+			ret = set_acl(a, fd, name, abstract_acl,
+			    ACL_TYPE_ACCESS, ARCHIVE_ENTRY_ACL_TYPE_ACCESS,
+			    "access");
+			if (ret != ARCHIVE_OK)
+				return (ret);
+		}
+		if ((archive_acl_types(abstract_acl)
+		    & ARCHIVE_ENTRY_ACL_TYPE_DEFAULT) != 0)
+			ret = set_acl(a, fd, name, abstract_acl,
+			    ACL_TYPE_DEFAULT, ARCHIVE_ENTRY_ACL_TYPE_DEFAULT,
+			    "default");
+#endif	/* !HAVE_SUN_ACL */
+		/* Simultaneous POSIX.1e and NFSv4 is not supported */
 		return (ret);
-#ifdef ACL_TYPE_NFS4
-	} else if (archive_acl_count(abstract_acl, ARCHIVE_ENTRY_ACL_TYPE_NFS4) > 0) {
-		ret = set_acl(a, fd, name, abstract_acl, ACL_TYPE_NFS4,
+	}
+#endif	/* !HAVE_DARWIN_ACL */
+#if HAVE_NFS4_ACL
+	if ((archive_acl_types(abstract_acl) &
+	    ARCHIVE_ENTRY_ACL_TYPE_NFS4) != 0) {
+		ret = set_acl(a, fd, name, abstract_acl,
+		    ARCHIVE_PLATFORM_ACL_TYPE_NFS4,
 		    ARCHIVE_ENTRY_ACL_TYPE_NFS4, "nfs4");
-		return (ret);
-#endif
-	} else
-		return ARCHIVE_OK;
+	}
+#endif	/* HAVE_NFS4_ACL */
+	return (ret);
 }
 
-static struct {
-	int archive_perm;
-	int platform_perm;
+/*
+ * Translate system ACL permissions into libarchive internal structure
+ */
+static const struct {
+	const int archive_perm;
+	const int platform_perm;
 } acl_perm_map[] = {
+#if HAVE_SUN_ACL	/* Solaris NFSv4 ACL permissions */
+	{ARCHIVE_ENTRY_ACL_EXECUTE, ACE_EXECUTE},
+	{ARCHIVE_ENTRY_ACL_READ_DATA, ACE_READ_DATA},
+	{ARCHIVE_ENTRY_ACL_LIST_DIRECTORY, ACE_LIST_DIRECTORY},
+	{ARCHIVE_ENTRY_ACL_WRITE_DATA, ACE_WRITE_DATA},
+	{ARCHIVE_ENTRY_ACL_ADD_FILE, ACE_ADD_FILE},
+	{ARCHIVE_ENTRY_ACL_APPEND_DATA, ACE_APPEND_DATA},
+	{ARCHIVE_ENTRY_ACL_ADD_SUBDIRECTORY, ACE_ADD_SUBDIRECTORY},
+	{ARCHIVE_ENTRY_ACL_READ_NAMED_ATTRS, ACE_READ_NAMED_ATTRS},
+	{ARCHIVE_ENTRY_ACL_WRITE_NAMED_ATTRS, ACE_WRITE_NAMED_ATTRS},
+	{ARCHIVE_ENTRY_ACL_DELETE_CHILD, ACE_DELETE_CHILD},
+	{ARCHIVE_ENTRY_ACL_READ_ATTRIBUTES, ACE_READ_ATTRIBUTES},
+	{ARCHIVE_ENTRY_ACL_WRITE_ATTRIBUTES, ACE_WRITE_ATTRIBUTES},
+	{ARCHIVE_ENTRY_ACL_DELETE, ACE_DELETE},
+	{ARCHIVE_ENTRY_ACL_READ_ACL, ACE_READ_ACL},
+	{ARCHIVE_ENTRY_ACL_WRITE_ACL, ACE_WRITE_ACL},
+	{ARCHIVE_ENTRY_ACL_WRITE_OWNER, ACE_WRITE_OWNER},
+	{ARCHIVE_ENTRY_ACL_SYNCHRONIZE, ACE_SYNCHRONIZE}
+#elif HAVE_DARWIN_ACL	/* MacOS ACL permissions */
+	{ARCHIVE_ENTRY_ACL_READ_DATA, ACL_READ_DATA},
+	{ARCHIVE_ENTRY_ACL_LIST_DIRECTORY, ACL_LIST_DIRECTORY},
+	{ARCHIVE_ENTRY_ACL_WRITE_DATA, ACL_WRITE_DATA},
+	{ARCHIVE_ENTRY_ACL_ADD_FILE, ACL_ADD_FILE},
+	{ARCHIVE_ENTRY_ACL_EXECUTE, ACL_EXECUTE},
+	{ARCHIVE_ENTRY_ACL_DELETE, ACL_DELETE},
+	{ARCHIVE_ENTRY_ACL_APPEND_DATA, ACL_APPEND_DATA},
+	{ARCHIVE_ENTRY_ACL_ADD_SUBDIRECTORY, ACL_ADD_SUBDIRECTORY},
+	{ARCHIVE_ENTRY_ACL_DELETE_CHILD, ACL_DELETE_CHILD},
+	{ARCHIVE_ENTRY_ACL_READ_ATTRIBUTES, ACL_READ_ATTRIBUTES},
+	{ARCHIVE_ENTRY_ACL_WRITE_ATTRIBUTES, ACL_WRITE_ATTRIBUTES},
+	{ARCHIVE_ENTRY_ACL_READ_NAMED_ATTRS, ACL_READ_EXTATTRIBUTES},
+	{ARCHIVE_ENTRY_ACL_WRITE_NAMED_ATTRS, ACL_WRITE_EXTATTRIBUTES},
+	{ARCHIVE_ENTRY_ACL_READ_ACL, ACL_READ_SECURITY},
+	{ARCHIVE_ENTRY_ACL_WRITE_ACL, ACL_WRITE_SECURITY},
+	{ARCHIVE_ENTRY_ACL_WRITE_OWNER, ACL_CHANGE_OWNER},
+	{ARCHIVE_ENTRY_ACL_SYNCHRONIZE, ACL_SYNCHRONIZE}
+#else	/* POSIX.1e ACL permissions */
 	{ARCHIVE_ENTRY_ACL_EXECUTE, ACL_EXECUTE},
 	{ARCHIVE_ENTRY_ACL_WRITE, ACL_WRITE},
 	{ARCHIVE_ENTRY_ACL_READ, ACL_READ},
-#ifdef ACL_TYPE_NFS4
+#if HAVE_ACL_TYPE_NFS4	/* FreeBSD NFSv4 ACL permissions */
 	{ARCHIVE_ENTRY_ACL_READ_DATA, ACL_READ_DATA},
 	{ARCHIVE_ENTRY_ACL_LIST_DIRECTORY, ACL_LIST_DIRECTORY},
 	{ARCHIVE_ENTRY_ACL_WRITE_DATA, ACL_WRITE_DATA},
@@ -114,33 +181,69 @@ static struct {
 	{ARCHIVE_ENTRY_ACL_WRITE_OWNER, ACL_WRITE_OWNER},
 	{ARCHIVE_ENTRY_ACL_SYNCHRONIZE, ACL_SYNCHRONIZE}
 #endif
+#endif	/* !HAVE_SUN_ACL && !HAVE_DARWIN_ACL */
 };
 
-#ifdef ACL_TYPE_NFS4
-static struct {
-	int archive_inherit;
-	int platform_inherit;
+#if HAVE_NFS4_ACL
+/*
+ * Translate system NFSv4 inheritance flags into libarchive internal structure
+ */
+static const struct {
+	const int archive_inherit;
+	const int platform_inherit;
 } acl_inherit_map[] = {
+#if HAVE_SUN_ACL	/* Solaris NFSv4 inheritance flags */
+	{ARCHIVE_ENTRY_ACL_ENTRY_FILE_INHERIT, ACE_FILE_INHERIT_ACE},
+	{ARCHIVE_ENTRY_ACL_ENTRY_DIRECTORY_INHERIT, ACE_DIRECTORY_INHERIT_ACE},
+	{ARCHIVE_ENTRY_ACL_ENTRY_NO_PROPAGATE_INHERIT, ACE_NO_PROPAGATE_INHERIT_ACE},
+	{ARCHIVE_ENTRY_ACL_ENTRY_INHERIT_ONLY, ACE_INHERIT_ONLY_ACE},
+	{ARCHIVE_ENTRY_ACL_ENTRY_SUCCESSFUL_ACCESS, ACE_SUCCESSFUL_ACCESS_ACE_FLAG},
+	{ARCHIVE_ENTRY_ACL_ENTRY_FAILED_ACCESS, ACE_FAILED_ACCESS_ACE_FLAG},
+	{ARCHIVE_ENTRY_ACL_ENTRY_INHERITED, ACE_INHERITED_ACE}
+#elif HAVE_DARWIN_ACL	/* MacOS NFSv4 inheritance flags */
+	{ARCHIVE_ENTRY_ACL_ENTRY_INHERITED, ACL_ENTRY_INHERITED},
+	{ARCHIVE_ENTRY_ACL_ENTRY_FILE_INHERIT, ACL_ENTRY_FILE_INHERIT},
+	{ARCHIVE_ENTRY_ACL_ENTRY_DIRECTORY_INHERIT, ACL_ENTRY_DIRECTORY_INHERIT},
+	{ARCHIVE_ENTRY_ACL_ENTRY_NO_PROPAGATE_INHERIT, ACL_ENTRY_LIMIT_INHERIT},
+	{ARCHIVE_ENTRY_ACL_ENTRY_INHERIT_ONLY, ACL_ENTRY_ONLY_INHERIT}
+#else	/* FreeBSD NFSv4 ACL inheritance flags */
 	{ARCHIVE_ENTRY_ACL_ENTRY_FILE_INHERIT, ACL_ENTRY_FILE_INHERIT},
 	{ARCHIVE_ENTRY_ACL_ENTRY_DIRECTORY_INHERIT, ACL_ENTRY_DIRECTORY_INHERIT},
 	{ARCHIVE_ENTRY_ACL_ENTRY_NO_PROPAGATE_INHERIT, ACL_ENTRY_NO_PROPAGATE_INHERIT},
-	{ARCHIVE_ENTRY_ACL_ENTRY_INHERIT_ONLY, ACL_ENTRY_INHERIT_ONLY}
+	{ARCHIVE_ENTRY_ACL_ENTRY_INHERIT_ONLY, ACL_ENTRY_INHERIT_ONLY},
+	{ARCHIVE_ENTRY_ACL_ENTRY_SUCCESSFUL_ACCESS, ACL_ENTRY_SUCCESSFUL_ACCESS},
+	{ARCHIVE_ENTRY_ACL_ENTRY_FAILED_ACCESS, ACL_ENTRY_FAILED_ACCESS},
+	{ARCHIVE_ENTRY_ACL_ENTRY_INHERITED, ACL_ENTRY_INHERITED}
+#endif	/* !HAVE_SUN_ACL && !HAVE_DARWIN_ACL */
 };
-#endif
+#endif	/* HAVE_NFS4_ACL */
 
 static int
 set_acl(struct archive *a, int fd, const char *name,
     struct archive_acl *abstract_acl,
     acl_type_t acl_type, int ae_requested_type, const char *tname)
 {
+#if HAVE_SUN_ACL
+	aclent_t	 *aclent;
+	ace_t		 *ace;
+	int		 e, r;
+	acl_t		 *acl;
+#else
 	acl_t		 acl;
 	acl_entry_t	 acl_entry;
 	acl_permset_t	 acl_permset;
-#ifdef ACL_TYPE_NFS4
+#if HAVE_ACL_TYPE_NFS4 || HAVE_DARWIN_ACL
 	acl_flagset_t	 acl_flagset;
 #endif
+#endif	/* HAVE_SUN_ACL */
+#if HAVE_ACL_TYPE_NFS4
+	int		r;
+#endif
 	int		 ret;
 	int		 ae_type, ae_permset, ae_tag, ae_id;
+#if HAVE_DARWIN_ACL
+	uuid_t		ae_uuid;
+#endif
 	uid_t		 ae_uid;
 	gid_t		 ae_gid;
 	const char	*ae_name;
@@ -151,22 +254,165 @@ set_acl(struct archive *a, int fd, const char *name,
 	entries = archive_acl_reset(abstract_acl, ae_requested_type);
 	if (entries == 0)
 		return (ARCHIVE_OK);
+
+#if HAVE_SUN_ACL
+	acl = NULL;
+	acl = malloc(sizeof(acl_t));
+	if (acl == NULL) {
+		archive_set_error(a, ARCHIVE_ERRNO_MISC,
+			"Invalid ACL type");
+		return (ARCHIVE_FAILED);
+	}
+	if (acl_type == ACE_T)
+		acl->acl_entry_size = sizeof(ace_t);
+	else if (acl_type == ACLENT_T)
+		acl->acl_entry_size = sizeof(aclent_t);
+	else {
+		archive_set_error(a, ARCHIVE_ERRNO_MISC,
+			"Invalid ACL type");
+		acl_free(acl);
+		return (ARCHIVE_FAILED);
+	}
+	acl->acl_type = acl_type;
+	acl->acl_cnt = entries;
+
+	acl->acl_aclp = malloc(entries * acl->acl_entry_size);
+	if (acl->acl_aclp == NULL) {
+		archive_set_error(a, errno,
+		    "Can't allocate memory for acl buffer");
+		acl_free(acl);
+		return (ARCHIVE_FAILED);
+	}
+#else	/* !HAVE_SUN_ACL */
 	acl = acl_init(entries);
+	if (acl == (acl_t)NULL) {
+		archive_set_error(a, errno,
+		    "Failed to initialize ACL working storage");
+		return (ARCHIVE_FAILED);
+	}
+#endif	/* !HAVE_SUN_ACL */
+#if HAVE_SUN_ACL
+	e = 0;
+#endif
 	while (archive_acl_next(a, abstract_acl, ae_requested_type, &ae_type,
 		   &ae_permset, &ae_tag, &ae_id, &ae_name) == ARCHIVE_OK) {
-		acl_create_entry(&acl, &acl_entry);
-
+#if HAVE_SUN_ACL
+		ace = NULL;
+		aclent = NULL;
+		if (acl->acl_type == ACE_T)  {
+			ace = &((ace_t *)acl->acl_aclp)[e];
+			ace->a_who = -1;
+			ace->a_access_mask = 0;
+			ace->a_flags = 0;
+		} else {
+			aclent = &((aclent_t *)acl->acl_aclp)[e];
+			aclent->a_id = -1;
+			aclent->a_type = 0;
+			aclent->a_perm = 0;
+		}
+#else	/* !HAVE_SUN_ACL  */
+#if HAVE_DARWIN_ACL
+		/*
+		 * Mac OS doesn't support NFSv4 ACLs for
+		 * owner@, group@ and everyone at .
+		 * We skip any of these ACLs found.
+		 */
+		if (ae_tag == ARCHIVE_ENTRY_ACL_USER_OBJ ||
+		    ae_tag == ARCHIVE_ENTRY_ACL_GROUP_OBJ ||
+		    ae_tag == ARCHIVE_ENTRY_ACL_EVERYONE)
+			continue;
+#endif
+		if (acl_create_entry(&acl, &acl_entry) != 0) {
+			archive_set_error(a, errno,
+			    "Failed to create a new ACL entry");
+			ret = ARCHIVE_FAILED;
+			goto exit_free;
+		}
+#endif	/* !HAVE_SUN_ACL */
+#if HAVE_DARWIN_ACL
+		switch (ae_type) {
+		case ARCHIVE_ENTRY_ACL_TYPE_ALLOW:
+			acl_set_tag_type(acl_entry, ACL_EXTENDED_ALLOW);
+			break;
+		case ARCHIVE_ENTRY_ACL_TYPE_DENY:
+			acl_set_tag_type(acl_entry, ACL_EXTENDED_DENY);
+			break;
+		default:
+			/* We don't support any other types on MacOS */
+			continue;
+		}
+#endif
 		switch (ae_tag) {
+#if HAVE_SUN_ACL
+		case ARCHIVE_ENTRY_ACL_USER:
+			ae_uid = archive_write_disk_uid(a, ae_name, ae_id);
+			if (acl->acl_type == ACE_T)
+				ace->a_who = ae_uid;
+			else {
+				aclent->a_id = ae_uid;
+				aclent->a_type |= USER;
+			}
+			break;
+		case ARCHIVE_ENTRY_ACL_GROUP:
+			ae_gid = archive_write_disk_gid(a, ae_name, ae_id);
+			if (acl->acl_type == ACE_T) {
+				ace->a_who = ae_gid;
+				ace->a_flags |= ACE_IDENTIFIER_GROUP;
+			} else {
+				aclent->a_id = ae_gid;
+				aclent->a_type |= GROUP;
+			}
+			break;
+		case ARCHIVE_ENTRY_ACL_USER_OBJ:
+			if (acl->acl_type == ACE_T)
+				ace->a_flags |= ACE_OWNER;
+			else
+				aclent->a_type |= USER_OBJ;
+			break;
+		case ARCHIVE_ENTRY_ACL_GROUP_OBJ:
+			if (acl->acl_type == ACE_T) {
+				ace->a_flags |= ACE_GROUP;
+				ace->a_flags |= ACE_IDENTIFIER_GROUP;
+			} else
+				aclent->a_type |= GROUP_OBJ;
+			break;
+		case ARCHIVE_ENTRY_ACL_MASK:
+			aclent->a_type |= CLASS_OBJ;
+			break;
+		case ARCHIVE_ENTRY_ACL_OTHER:
+			aclent->a_type |= OTHER_OBJ;
+			break;
+		case ARCHIVE_ENTRY_ACL_EVERYONE:
+			ace->a_flags |= ACE_EVERYONE;
+			break;
+#else	/* !HAVE_SUN_ACL */
 		case ARCHIVE_ENTRY_ACL_USER:
-			acl_set_tag_type(acl_entry, ACL_USER);
 			ae_uid = archive_write_disk_uid(a, ae_name, ae_id);
+#if !HAVE_DARWIN_ACL	/* FreeBSD, Linux */
+			acl_set_tag_type(acl_entry, ACL_USER);
 			acl_set_qualifier(acl_entry, &ae_uid);
+#else	/* MacOS */
+			if (mbr_identifier_to_uuid(ID_TYPE_UID, &ae_uid,
+			    sizeof(uid_t), ae_uuid) != 0)
+				continue;
+			if (acl_set_qualifier(acl_entry, &ae_uuid) != 0)
+				continue;
+#endif	/* HAVE_DARWIN_ACL */
 			break;
 		case ARCHIVE_ENTRY_ACL_GROUP:
-			acl_set_tag_type(acl_entry, ACL_GROUP);
 			ae_gid = archive_write_disk_gid(a, ae_name, ae_id);
+#if !HAVE_DARWIN_ACL	/* FreeBSD, Linux */
+			acl_set_tag_type(acl_entry, ACL_GROUP);
 			acl_set_qualifier(acl_entry, &ae_gid);
+#else	/* MacOS */
+			if (mbr_identifier_to_uuid(ID_TYPE_GID, &ae_gid,
+			    sizeof(gid_t), ae_uuid) != 0)
+				continue;
+			if (acl_set_qualifier(acl_entry, &ae_uuid) != 0)
+				continue;
+#endif	/* HAVE_DARWIN_ACL */
 			break;
+#if !HAVE_DARWIN_ACL	/* FreeBSD, Linux */
 		case ARCHIVE_ENTRY_ACL_USER_OBJ:
 			acl_set_tag_type(acl_entry, ACL_USER_OBJ);
 			break;
@@ -179,85 +425,230 @@ set_acl(struct archive *a, int fd, const char *name,
 		case ARCHIVE_ENTRY_ACL_OTHER:
 			acl_set_tag_type(acl_entry, ACL_OTHER);
 			break;
-#ifdef ACL_TYPE_NFS4
+#if HAVE_ACL_TYPE_NFS4	/* FreeBSD only */
 		case ARCHIVE_ENTRY_ACL_EVERYONE:
 			acl_set_tag_type(acl_entry, ACL_EVERYONE);
 			break;
 #endif
+#endif	/* !HAVE_DARWIN_ACL */
+#endif	/* !HAVE_SUN_ACL */
 		default:
-			/* XXX */
-			break;
+			archive_set_error(a, ARCHIVE_ERRNO_MISC,
+			    "Unknown ACL tag");
+			ret = ARCHIVE_FAILED;
+			goto exit_free;
 		}
 
-#ifdef ACL_TYPE_NFS4
+#if HAVE_ACL_TYPE_NFS4 || HAVE_SUN_ACL
+		r = 0;
 		switch (ae_type) {
+#if HAVE_SUN_ACL
+		case ARCHIVE_ENTRY_ACL_TYPE_ALLOW:
+			if (ace != NULL)
+				ace->a_type = ACE_ACCESS_ALLOWED_ACE_TYPE;
+			else
+				r = -1;
+			break;
+		case ARCHIVE_ENTRY_ACL_TYPE_DENY:
+			if (ace != NULL)
+				ace->a_type = ACE_ACCESS_DENIED_ACE_TYPE;
+			else
+				r = -1;
+			break;
+		case ARCHIVE_ENTRY_ACL_TYPE_AUDIT:
+			if (ace != NULL)
+				ace->a_type = ACE_SYSTEM_AUDIT_ACE_TYPE;
+			else
+				r = -1;
+			break;
+		case ARCHIVE_ENTRY_ACL_TYPE_ALARM:
+			if (ace != NULL)
+				ace->a_type = ACE_SYSTEM_ALARM_ACE_TYPE;
+			else
+				r = -1;
+			break;
+		case ARCHIVE_ENTRY_ACL_TYPE_ACCESS:
+			if (aclent == NULL)
+				r = -1;
+			break;
+		case ARCHIVE_ENTRY_ACL_TYPE_DEFAULT:
+			if (aclent != NULL)
+				aclent->a_type |= ACL_DEFAULT;
+			else
+				r = -1;
+			break;
+#else	/* !HAVE_SUN_ACL */
 		case ARCHIVE_ENTRY_ACL_TYPE_ALLOW:
-			acl_set_entry_type_np(acl_entry, ACL_ENTRY_TYPE_ALLOW);
+			r = acl_set_entry_type_np(acl_entry, ACL_ENTRY_TYPE_ALLOW);
 			break;
 		case ARCHIVE_ENTRY_ACL_TYPE_DENY:
-			acl_set_entry_type_np(acl_entry, ACL_ENTRY_TYPE_DENY);
+			r = acl_set_entry_type_np(acl_entry, ACL_ENTRY_TYPE_DENY);
 			break;
 		case ARCHIVE_ENTRY_ACL_TYPE_AUDIT:
-			acl_set_entry_type_np(acl_entry, ACL_ENTRY_TYPE_AUDIT);
+			r = acl_set_entry_type_np(acl_entry, ACL_ENTRY_TYPE_AUDIT);
 			break;
 		case ARCHIVE_ENTRY_ACL_TYPE_ALARM:
-			acl_set_entry_type_np(acl_entry, ACL_ENTRY_TYPE_ALARM);
+			r = acl_set_entry_type_np(acl_entry, ACL_ENTRY_TYPE_ALARM);
 			break;
 		case ARCHIVE_ENTRY_ACL_TYPE_ACCESS:
 		case ARCHIVE_ENTRY_ACL_TYPE_DEFAULT:
 			// These don't translate directly into the system ACL.
 			break;
+#endif	/* !HAVE_SUN_ACL */
 		default:
-			// XXX error handling here.
-			break;
+			archive_set_error(a, ARCHIVE_ERRNO_MISC,
+			    "Unknown ACL entry type");
+			ret = ARCHIVE_FAILED;
+			goto exit_free;
 		}
-#endif
 
-		acl_get_permset(acl_entry, &acl_permset);
-		acl_clear_perms(acl_permset);
+		if (r != 0) {
+#if HAVE_SUN_ACL
+			errno = EINVAL;
+#endif
+			archive_set_error(a, errno,
+			    "Failed to set ACL entry type");
+			ret = ARCHIVE_FAILED;
+			goto exit_free;
+		}
+#endif	/* HAVE_ACL_TYPE_NFS4 || HAVE_SUN_ACL */
 
+#if HAVE_SUN_ACL
+		if (acl->acl_type == ACLENT_T) {
+			if (ae_permset & ARCHIVE_ENTRY_ACL_EXECUTE)
+				aclent->a_perm |= 1;
+			if (ae_permset & ARCHIVE_ENTRY_ACL_WRITE)
+				aclent->a_perm |= 2;
+			if (ae_permset & ARCHIVE_ENTRY_ACL_READ)
+				aclent->a_perm |= 4;
+		} else
+#else
+		if (acl_get_permset(acl_entry, &acl_permset) != 0) {
+			archive_set_error(a, errno,
+			    "Failed to get ACL permission set");
+			ret = ARCHIVE_FAILED;
+			goto exit_free;
+		}
+		if (acl_clear_perms(acl_permset) != 0) {
+			archive_set_error(a, errno,
+			    "Failed to clear ACL permissions");
+			ret = ARCHIVE_FAILED;
+			goto exit_free;
+		}
+#endif	/* !HAVE_SUN_ACL */
 		for (i = 0; i < (int)(sizeof(acl_perm_map) / sizeof(acl_perm_map[0])); ++i) {
-			if (ae_permset & acl_perm_map[i].archive_perm)
-				acl_add_perm(acl_permset,
-					     acl_perm_map[i].platform_perm);
+			if (ae_permset & acl_perm_map[i].archive_perm) {
+#if HAVE_SUN_ACL
+				ace->a_access_mask |=
+				    acl_perm_map[i].platform_perm;
+#else
+				if (acl_add_perm(acl_permset,
+				    acl_perm_map[i].platform_perm) != 0) {
+					archive_set_error(a, errno,
+					    "Failed to add ACL permission");
+					ret = ARCHIVE_FAILED;
+					goto exit_free;
+				}
+#endif
+			}
 		}
 
-#ifdef ACL_TYPE_NFS4
-		acl_get_flagset_np(acl_entry, &acl_flagset);
-		acl_clear_flags_np(acl_flagset);
-		for (i = 0; i < (int)(sizeof(acl_inherit_map) / sizeof(acl_inherit_map[0])); ++i) {
-			if (ae_permset & acl_inherit_map[i].archive_inherit)
-				acl_add_flag_np(acl_flagset,
-						acl_inherit_map[i].platform_inherit);
+#if HAVE_NFS4_ACL
+#if HAVE_SUN_ACL
+		if (acl_type == ACE_T)
+#elif HAVE_DARWIN_ACL
+		if (acl_type == ACL_TYPE_EXTENDED)
+#else	/* FreeBSD */
+		if (acl_type == ACL_TYPE_NFS4)
+#endif
+		{
+#if HAVE_POSIX_ACL || HAVE_DARWIN_ACL
+			/*
+			 * acl_get_flagset_np() fails with non-NFSv4 ACLs
+			 */
+			if (acl_get_flagset_np(acl_entry, &acl_flagset) != 0) {
+				archive_set_error(a, errno,
+				    "Failed to get flagset from an NFSv4 ACL entry");
+				ret = ARCHIVE_FAILED;
+				goto exit_free;
+			}
+			if (acl_clear_flags_np(acl_flagset) != 0) {
+				archive_set_error(a, errno,
+				    "Failed to clear flags from an NFSv4 ACL flagset");
+				ret = ARCHIVE_FAILED;
+				goto exit_free;
+			}
+#endif /* HAVE_POSIX_ACL || HAVE_DARWIN_ACL */
+			for (i = 0; i < (int)(sizeof(acl_inherit_map) /sizeof(acl_inherit_map[0])); ++i) {
+				if (ae_permset & acl_inherit_map[i].archive_inherit) {
+#if HAVE_SUN_ACL
+					ace->a_flags |=
+					    acl_inherit_map[i].platform_inherit;
+#else	/* !HAVE_SUN_ACL */
+					if (acl_add_flag_np(acl_flagset,
+							acl_inherit_map[i].platform_inherit) != 0) {
+						archive_set_error(a, errno,
+						    "Failed to add flag to NFSv4 ACL flagset");
+						ret = ARCHIVE_FAILED;
+						goto exit_free;
+					}
+#endif	/* HAVE_SUN_ACL */
+				}
+			}
 		}
+#endif	/* HAVE_NFS4_ACL */
+#if HAVE_SUN_ACL
+	e++;
 #endif
 	}
 
+#if HAVE_ACL_SET_FD_NP || HAVE_ACL_SET_FD || HAVE_SUN_ACL
 	/* Try restoring the ACL through 'fd' if we can. */
-#if HAVE_ACL_SET_FD
-	if (fd >= 0 && acl_type == ACL_TYPE_ACCESS && acl_set_fd(fd, acl) == 0)
-		ret = ARCHIVE_OK;
-	else
-#else
-#if HAVE_ACL_SET_FD_NP
-	if (fd >= 0 && acl_set_fd_np(fd, acl, acl_type) == 0)
-		ret = ARCHIVE_OK;
-	else
+#if HAVE_SUN_ACL || HAVE_ACL_SET_FD_NP
+	if (fd >= 0)
+#else	/* !HAVE_SUN_ACL && !HAVE_ACL_SET_FD_NP */
+	if (fd >= 0 && acl_type == ACL_TYPE_ACCESS)
 #endif
+	{
+#if HAVE_SUN_ACL
+		if (facl_set(fd, acl) == 0)
+#elif HAVE_ACL_SET_FD_NP
+		if (acl_set_fd_np(fd, acl, acl_type) == 0)
+#else	/* !HAVE_SUN_ACL && !HAVE_ACL_SET_FD_NP */
+		if (acl_set_fd(fd, acl) == 0)
 #endif
-#if HAVE_ACL_SET_LINK_NP
-	  if (acl_set_link_np(name, acl_type, acl) != 0) {
-		archive_set_error(a, errno, "Failed to set %s acl", tname);
-		ret = ARCHIVE_WARN;
-	  }
+			ret = ARCHIVE_OK;
+		else {
+			if (errno == EOPNOTSUPP) {
+				/* Filesystem doesn't support ACLs */
+				ret = ARCHIVE_OK;
+			} else {
+				archive_set_error(a, errno,
+				    "Failed to set %s acl on fd", tname);
+			}
+		}
+	} else
+#endif	/* HAVE_ACL_SET_FD_NP || HAVE_ACL_SET_FD || HAVE_SUN_ACL */
+#if HAVE_SUN_ACL
+	if (acl_set(name, acl) != 0)
+#elif HAVE_ACL_SET_LINK_NP
+	if (acl_set_link_np(name, acl_type, acl) != 0)
 #else
 	/* TODO: Skip this if 'name' is a symlink. */
-	if (acl_set_file(name, acl_type, acl) != 0) {
-		archive_set_error(a, errno, "Failed to set %s acl", tname);
-		ret = ARCHIVE_WARN;
-	}
+	if (acl_set_file(name, acl_type, acl) != 0)
 #endif
+	{
+		if (errno == EOPNOTSUPP) {
+			/* Filesystem doesn't support ACLs */
+			ret = ARCHIVE_OK;
+		} else {
+			archive_set_error(a, errno, "Failed to set %s acl",
+			    tname);
+			ret = ARCHIVE_WARN;
+		}
+	}
+exit_free:
 	acl_free(acl);
 	return (ret);
 }
-#endif
+#endif	/* HAVE_POSIX_ACL || HAVE_NFS4_ACL */
diff --git a/libarchive/archive_write_disk_posix.c b/libarchive/archive_write_disk_posix.c
index 6737cd7..20450ba 100644
--- a/libarchive/archive_write_disk_posix.c
+++ b/libarchive/archive_write_disk_posix.c
@@ -110,6 +110,18 @@ __FBSDID("$FreeBSD$");
 #include <sys/fcntl1.h>
 #endif
 
+/*
+ * Macro to cast st_mtime and time_t to an int64 so that 2 numbers can reliably be compared.
+ *
+ * It assumes that the input is an integer type of no more than 64 bits.
+ * If the number is less than zero, t must be a signed type, so it fits in
+ * int64_t. Otherwise, it's a nonnegative value so we can cast it to uint64_t
+ * without loss. But it could be a large unsigned value, so we have to clip it
+ * to INT64_MAX.*
+ */
+#define to_int64_time(t) \
+   ((t) < 0 ? (int64_t)(t) : (uint64_t)(t) > (uint64_t)INT64_MAX ? INT64_MAX : (int64_t)(t))
+
 #if __APPLE__
 #include <TargetConditionals.h>
 #if TARGET_OS_MAC && !TARGET_OS_EMBEDDED && HAVE_QUARANTINE_H
@@ -140,7 +152,17 @@ __FBSDID("$FreeBSD$");
 #define O_BINARY 0
 #endif
 #ifndef O_CLOEXEC
-#define O_CLOEXEC	0
+#define O_CLOEXEC 0
+#endif
+
+/* Ignore non-int O_NOFOLLOW constant. */
+/* gnulib's fcntl.h does this on AIX, but it seems practical everywhere */
+#if defined O_NOFOLLOW && !(INT_MIN <= O_NOFOLLOW && O_NOFOLLOW <= INT_MAX)
+#undef O_NOFOLLOW
+#endif
+
+#ifndef O_NOFOLLOW
+#define O_NOFOLLOW 0
 #endif
 
 struct fixup_entry {
@@ -298,7 +320,7 @@ struct archive_write_disk {
 #define	MAXIMUM_DIR_MODE 0775
 
 /*
- * Maxinum uncompressed size of a decmpfs block.
+ * Maximum uncompressed size of a decmpfs block.
  */
 #define MAX_DECMPFS_BLOCK_SIZE	(64 * 1024)
 /*
@@ -313,7 +335,7 @@ struct archive_write_disk {
 #define RSRC_F_SIZE	50	/* Size of Resource fork footer. */
 /* Size to write compressed data to resource fork. */
 #define COMPRESSED_W_SIZE	(64 * 1024)
-/* decmpfs difinitions. */
+/* decmpfs definitions. */
 #define MAX_DECMPFS_XATTR_SIZE		3802
 #ifndef DECMPFS_XATTR_NAME
 #define DECMPFS_XATTR_NAME		"com.apple.decmpfs"
@@ -326,12 +348,19 @@ struct archive_write_disk {
 
 #define HFS_BLOCKS(s)	((s) >> 12)
 
+static void	fsobj_error(int *, struct archive_string *, int, const char *,
+		    const char *);
+static int	check_symlinks_fsobj(char *, int *, struct archive_string *,
+		    int);
 static int	check_symlinks(struct archive_write_disk *);
 static int	create_filesystem_object(struct archive_write_disk *);
-static struct fixup_entry *current_fixup(struct archive_write_disk *, const char *pathname);
+static struct fixup_entry *current_fixup(struct archive_write_disk *,
+		    const char *pathname);
 #if defined(HAVE_FCHDIR) && defined(PATH_MAX)
 static void	edit_deep_directories(struct archive_write_disk *ad);
 #endif
+static int	cleanup_pathname_fsobj(char *, int *, struct archive_string *,
+		    int);
 static int	cleanup_pathname(struct archive_write_disk *);
 static int	create_dir(struct archive_write_disk *, char *);
 static int	create_parent_dir(struct archive_write_disk *, char *);
@@ -362,11 +391,14 @@ static struct archive_vtable *archive_write_disk_vtable(void);
 
 static int	_archive_write_disk_close(struct archive *);
 static int	_archive_write_disk_free(struct archive *);
-static int	_archive_write_disk_header(struct archive *, struct archive_entry *);
+static int	_archive_write_disk_header(struct archive *,
+		    struct archive_entry *);
 static int64_t	_archive_write_disk_filter_bytes(struct archive *, int);
 static int	_archive_write_disk_finish_entry(struct archive *);
-static ssize_t	_archive_write_disk_data(struct archive *, const void *, size_t);
-static ssize_t	_archive_write_disk_data_block(struct archive *, const void *, size_t, int64_t);
+static ssize_t	_archive_write_disk_data(struct archive *, const void *,
+		    size_t);
+static ssize_t	_archive_write_disk_data_block(struct archive *, const void *,
+		    size_t, int64_t);
 
 static int
 lazy_stat(struct archive_write_disk *a)
@@ -612,9 +644,9 @@ _archive_write_disk_header(struct archive *_a, struct archive_entry *entry)
 		/*
 		 * NOTE: UF_COMPRESSED is ignored even if the filesystem
 		 * supports HFS+ Compression because the file should
-		 * have at least an extended attriute "com.apple.decmpfs"
+		 * have at least an extended attribute "com.apple.decmpfs"
 		 * before the flag is set to indicate that the file have
-		 * been compressed. If hte filesystem does not support
+		 * been compressed. If the filesystem does not support
 		 * HFS+ Compression the system call will fail.
 		 */
 		if (a->fd < 0 || fchflags(a->fd, UF_COMPRESSED) != 0)
@@ -637,7 +669,8 @@ _archive_write_disk_header(struct archive *_a, struct archive_entry *entry)
 	if (a->restore_pwd >= 0) {
 		r = fchdir(a->restore_pwd);
 		if (r != 0) {
-			archive_set_error(&a->archive, errno, "chdir() failure");
+			archive_set_error(&a->archive, errno,
+			    "chdir() failure");
 			ret = ARCHIVE_FATAL;
 		}
 		close(a->restore_pwd);
@@ -685,7 +718,8 @@ _archive_write_disk_header(struct archive *_a, struct archive_entry *entry)
 		}
 		if (archive_entry_birthtime_is_set(entry)) {
 			fe->birthtime = archive_entry_birthtime(entry);
-			fe->birthtime_nanos = archive_entry_birthtime_nsec(entry);
+			fe->birthtime_nanos = archive_entry_birthtime_nsec(
+			    entry);
 		} else {
 			/* If birthtime is unset, use mtime. */
 			fe->birthtime = fe->mtime;
@@ -711,7 +745,8 @@ _archive_write_disk_header(struct archive *_a, struct archive_entry *entry)
 				return (ARCHIVE_FATAL);
 			fe->mac_metadata = malloc(metadata_size);
 			if (fe->mac_metadata != NULL) {
-				memcpy(fe->mac_metadata, metadata, metadata_size);
+				memcpy(fe->mac_metadata, metadata,
+				    metadata_size);
 				fe->mac_metadata_size = metadata_size;
 				fe->fixup |= TODO_MAC_METADATA;
 			}
@@ -1224,7 +1259,7 @@ hfs_drive_compressor(struct archive_write_disk *a, const char *buff,
 		ret = hfs_write_compressed_data(a, bytes_used + rsrc_size);
 		a->compressed_buffer_remaining = a->compressed_buffer_size;
 
-		/* If the compressed size is not enouph smaller than
+		/* If the compressed size is not enough smaller than
 		 * the uncompressed size. cancel HFS+ compression.
 		 * TODO: study a behavior of ditto utility and improve
 		 * the condition to fall back into no HFS+ compression. */
@@ -1329,7 +1364,7 @@ hfs_write_decmpfs_block(struct archive_write_disk *a, const char *buff,
 		    (uint32_t *)(a->resource_fork + RSRC_H_SIZE);
 		/* Set the block count to the resource fork. */
 		archive_le32enc(a->decmpfs_block_info++, block_count);
-		/* Get the position where we are goint to set compressed
+		/* Get the position where we are going to set compressed
 		 * data. */
 		a->compressed_rsrc_position =
 		    RSRC_H_SIZE + 4 + (block_count * 8);
@@ -1402,7 +1437,7 @@ hfs_write_data_block(struct archive_write_disk *a, const char *buff,
 		bytes_to_write = size;
 		/* Seek if necessary to the specified offset. */
 		if (a->offset < a->fd_offset) {
-			/* Can't support backword move. */
+			/* Can't support backward move. */
 			archive_set_error(&a->archive, ARCHIVE_ERRNO_MISC,
 			    "Seek failed");
 			return (ARCHIVE_FATAL);
@@ -1468,7 +1503,8 @@ _archive_write_disk_data_block(struct archive *_a,
 		return (r);
 	if ((size_t)r < size) {
 		archive_set_error(&a->archive, 0,
-		    "Too much data: Truncating file at %ju bytes", (uintmax_t)a->filesize);
+		    "Too much data: Truncating file at %ju bytes",
+		    (uintmax_t)a->filesize);
 		return (ARCHIVE_WARN);
 	}
 #if ARCHIVE_VERSION_NUMBER < 3999000
@@ -1666,10 +1702,25 @@ _archive_write_disk_finish_entry(struct archive *_a)
 	 * ACLs that prevent attribute changes (including time).
 	 */
 	if (a->todo & TODO_ACLS) {
-		int r2 = archive_write_disk_set_acls(&a->archive, a->fd,
-				  archive_entry_pathname(a->entry),
-				  archive_entry_acl(a->entry));
+		int r2;
+#ifdef HAVE_DARWIN_ACL
+		/*
+		 * On Mac OS, platform ACLs are stored also in mac_metadata by
+		 * the operating system. If mac_metadata is present it takes
+		 * precedence and we skip extracting libarchive NFSv4 ACLs
+		 */
+		const void *metadata;
+		size_t metadata_size;
+		metadata = archive_entry_mac_metadata(a->entry, &metadata_size);
+		if (metadata == NULL || metadata_size == 0) {
+#endif
+		r2 = archive_write_disk_set_acls(&a->archive, a->fd,
+		    archive_entry_pathname(a->entry),
+		    archive_entry_acl(a->entry));
 		if (r2 < ret) ret = r2;
+#ifdef HAVE_DARWIN_ACL
+		}
+#endif
 	}
 
 finish_metadata:
@@ -1755,10 +1806,9 @@ archive_write_disk_new(void)
 {
 	struct archive_write_disk *a;
 
-	a = (struct archive_write_disk *)malloc(sizeof(*a));
+	a = (struct archive_write_disk *)calloc(1, sizeof(*a));
 	if (a == NULL)
 		return (NULL);
-	memset(a, 0, sizeof(*a));
 	a->archive.magic = ARCHIVE_WRITE_DISK_MAGIC;
 	/* We're ready to write a header immediately. */
 	a->archive.state = ARCHIVE_STATE_HEADER;
@@ -1796,7 +1846,7 @@ edit_deep_directories(struct archive_write_disk *a)
 	char *tail = a->name;
 
 	/* If path is short, avoid the open() below. */
-	if (strlen(tail) <= PATH_MAX)
+	if (strlen(tail) < PATH_MAX)
 		return;
 
 	/* Try to record our starting dir. */
@@ -1806,7 +1856,7 @@ edit_deep_directories(struct archive_write_disk *a)
 		return;
 
 	/* As long as the path is too long... */
-	while (strlen(tail) > PATH_MAX) {
+	while (strlen(tail) >= PATH_MAX) {
 		/* Locate a dir prefix shorter than PATH_MAX. */
 		tail += PATH_MAX - 8;
 		while (tail > a->name && *tail != '/')
@@ -1993,8 +2043,9 @@ restore_entry(struct archive_write_disk *a)
 
 	if (en) {
 		/* Everything failed; give up here. */
-		archive_set_error(&a->archive, en, "Can't create '%s'",
-		    a->name);
+		if ((&a->archive)->error == NULL)
+			archive_set_error(&a->archive, en, "Can't create '%s'",
+			    a->name);
 		return (ARCHIVE_FAILED);
 	}
 
@@ -2014,6 +2065,11 @@ create_filesystem_object(struct archive_write_disk *a)
 	const char *linkname;
 	mode_t final_mode, mode;
 	int r;
+	/* these for check_symlinks_fsobj */
+	char *linkname_copy;	/* non-const copy of linkname */
+	struct stat st;
+	struct archive_string error_string;
+	int error_number;
 
 	/* We identify hard/symlinks according to the link names. */
 	/* Since link(2) and symlink(2) don't handle modes, we're done here. */
@@ -2022,6 +2078,43 @@ create_filesystem_object(struct archive_write_disk *a)
 #if !HAVE_LINK
 		return (EPERM);
 #else
+		archive_string_init(&error_string);
+		linkname_copy = strdup(linkname);
+		if (linkname_copy == NULL) {
+		    return (EPERM);
+		}
+		/*
+		 * TODO: consider using the cleaned-up path as the link
+		 * target?
+		 */
+		r = cleanup_pathname_fsobj(linkname_copy, &error_number,
+		    &error_string, a->flags);
+		if (r != ARCHIVE_OK) {
+			archive_set_error(&a->archive, error_number, "%s",
+			    error_string.s);
+			free(linkname_copy);
+			archive_string_free(&error_string);
+			/*
+			 * EPERM is more appropriate than error_number for our
+			 * callers
+			 */
+			return (EPERM);
+		}
+		r = check_symlinks_fsobj(linkname_copy, &error_number,
+		    &error_string, a->flags);
+		if (r != ARCHIVE_OK) {
+			archive_set_error(&a->archive, error_number, "%s",
+			    error_string.s);
+			free(linkname_copy);
+			archive_string_free(&error_string);
+			/*
+			 * EPERM is more appropriate than error_number for our
+			 * callers
+			 */
+			return (EPERM);
+		}
+		free(linkname_copy);
+		archive_string_free(&error_string);
 		r = link(linkname, a->name) ? errno : 0;
 		/*
 		 * New cpio and pax formats allow hardlink entries
@@ -2039,11 +2132,20 @@ create_filesystem_object(struct archive_write_disk *a)
 			a->todo = 0;
 			a->deferred = 0;
 		} else if (r == 0 && a->filesize > 0) {
-			a->fd = open(a->name,
-				     O_WRONLY | O_TRUNC | O_BINARY | O_CLOEXEC);
-			__archive_ensure_cloexec_flag(a->fd);
-			if (a->fd < 0)
+#ifdef HAVE_LSTAT
+			r = lstat(a->name, &st);
+#else
+			r = stat(a->name, &st);
+#endif
+			if (r != 0)
 				r = errno;
+			else if ((st.st_mode & AE_IFMT) == AE_IFREG) {
+				a->fd = open(a->name, O_WRONLY | O_TRUNC |
+				    O_BINARY | O_CLOEXEC | O_NOFOLLOW);
+				__archive_ensure_cloexec_flag(a->fd);
+				if (a->fd < 0)
+					r = errno;
+			}
 		}
 		return (r);
 #endif
@@ -2190,8 +2292,12 @@ _archive_write_disk_close(struct archive *_a)
 		if (p->fixup & TODO_MODE_BASE)
 			chmod(p->name, p->mode);
 		if (p->fixup & TODO_ACLS)
-			archive_write_disk_set_acls(&a->archive,
-						    -1, p->name, &p->acl);
+#ifdef HAVE_DARWIN_ACL
+			if (p->mac_metadata == NULL ||
+			    p->mac_metadata_size == 0)
+#endif
+				archive_write_disk_set_acls(&a->archive,
+				    -1, p->name, &p->acl);
 		if (p->fixup & TODO_FFLAGS)
 			set_fflags_platform(a, -1, p->name,
 			    p->mode, p->fflags_set, 0);
@@ -2351,116 +2457,283 @@ current_fixup(struct archive_write_disk *a, const char *pathname)
 	return (a->current_fixup);
 }
 
-/* TODO: Make this work. */
-/*
- * TODO: The deep-directory support bypasses this; disable deep directory
- * support if we're doing symlink checks.
- */
+/* Error helper for new *_fsobj functions */
+static void
+fsobj_error(int *a_eno, struct archive_string *a_estr,
+    int err, const char *errstr, const char *path)
+{
+	if (a_eno)
+		*a_eno = err;
+	if (a_estr)
+		archive_string_sprintf(a_estr, errstr, path);
+}
+
 /*
  * TODO: Someday, integrate this with the deep dir support; they both
  * scan the path and both can be optimized by comparing against other
  * recent paths.
  */
 /* TODO: Extend this to support symlinks on Windows Vista and later. */
+
+/*
+ * Checks the given path to see if any elements along it are symlinks.  Returns
+ * ARCHIVE_OK if there are none, otherwise puts an error in errmsg.
+ */
 static int
-check_symlinks(struct archive_write_disk *a)
+check_symlinks_fsobj(char *path, int *a_eno, struct archive_string *a_estr,
+    int flags)
 {
 #if !defined(HAVE_LSTAT)
 	/* Platform doesn't have lstat, so we can't look for symlinks. */
-	(void)a; /* UNUSED */
+	(void)path; /* UNUSED */
+	(void)error_number; /* UNUSED */
+	(void)error_string; /* UNUSED */
+	(void)flags; /* UNUSED */
 	return (ARCHIVE_OK);
 #else
-	char *pn;
+	int res = ARCHIVE_OK;
+	char *tail;
+	char *head;
+	int last;
 	char c;
 	int r;
 	struct stat st;
+	int restore_pwd;
+
+	/* Nothing to do here if name is empty */
+	if(path[0] == '\0')
+	    return (ARCHIVE_OK);
 
 	/*
 	 * Guard against symlink tricks.  Reject any archive entry whose
 	 * destination would be altered by a symlink.
+	 *
+	 * Walk the filename in chunks separated by '/'.  For each segment:
+	 *  - if it doesn't exist, continue
+	 *  - if it's symlink, abort or remove it
+	 *  - if it's a directory and it's not the last chunk, cd into it
+	 * As we go:
+	 *  head points to the current (relative) path
+	 *  tail points to the temporary \0 terminating the segment we're
+	 *      currently examining
+	 *  c holds what used to be in *tail
+	 *  last is 1 if this is the last tail
 	 */
-	/* Whatever we checked last time doesn't need to be re-checked. */
-	pn = a->name;
-	if (archive_strlen(&(a->path_safe)) > 0) {
-		char *p = a->path_safe.s;
-		while ((*pn != '\0') && (*p == *pn))
-			++p, ++pn;
-	}
+	restore_pwd = open(".", O_RDONLY | O_BINARY | O_CLOEXEC);
+	__archive_ensure_cloexec_flag(restore_pwd);
+	if (restore_pwd < 0)
+		return (ARCHIVE_FATAL);
+	head = path;
+	tail = path;
+	last = 0;
+	/* TODO: reintroduce a safe cache here? */
 	/* Skip the root directory if the path is absolute. */
-	if(pn == a->name && pn[0] == '/')
-		++pn;
-	c = pn[0];
-	/* Keep going until we've checked the entire name. */
-	while (pn[0] != '\0' && (pn[0] != '/' || pn[1] != '\0')) {
+	if(tail == path && tail[0] == '/')
+		++tail;
+	/* Keep going until we've checked the entire name.
+	 * head, tail, path all alias the same string, which is
+	 * temporarily zeroed at tail, so be careful restoring the
+	 * stashed (c=tail[0]) for error messages.
+	 * Exiting the loop with break is okay; continue is not.
+	 */
+	while (!last) {
+		/*
+		 * Skip the separator we just consumed, plus any adjacent ones
+		 */
+		while (*tail == '/')
+		    ++tail;
 		/* Skip the next path element. */
-		while (*pn != '\0' && *pn != '/')
-			++pn;
-		c = pn[0];
-		pn[0] = '\0';
+		while (*tail != '\0' && *tail != '/')
+			++tail;
+		/* is this the last path component? */
+		last = (tail[0] == '\0') || (tail[0] == '/' && tail[1] == '\0');
+		/* temporarily truncate the string here */
+		c = tail[0];
+		tail[0] = '\0';
 		/* Check that we haven't hit a symlink. */
-		r = lstat(a->name, &st);
+		r = lstat(head, &st);
 		if (r != 0) {
+			tail[0] = c;
 			/* We've hit a dir that doesn't exist; stop now. */
-			if (errno == ENOENT)
+			if (errno == ENOENT) {
+				break;
+			} else {
+				/*
+				 * Treat any other error as fatal - best to be
+				 * paranoid here.
+				 * Note: This effectively disables deep
+				 * directory support when security checks are
+				 * enabled. Otherwise, very long pathnames that
+				 * trigger an error here could evade the
+				 * sandbox.
+				 * TODO: We could do better, but it would
+				 * probably require merging the symlink checks
+				 * with the deep-directory editing.
+				 */
+				fsobj_error(a_eno, a_estr, errno,
+				    "Could not stat %s", path);
+				res = ARCHIVE_FAILED;
 				break;
+			}
+		} else if (S_ISDIR(st.st_mode)) {
+			if (!last) {
+				if (chdir(head) != 0) {
+					tail[0] = c;
+					fsobj_error(a_eno, a_estr, errno,
+					    "Could not chdir %s", path);
+					res = (ARCHIVE_FATAL);
+					break;
+				}
+				/* Our view is now from inside this dir: */
+				head = tail + 1;
+			}
 		} else if (S_ISLNK(st.st_mode)) {
-			if (c == '\0') {
+			if (last) {
 				/*
 				 * Last element is symlink; remove it
 				 * so we can overwrite it with the
 				 * item being extracted.
 				 */
-				if (unlink(a->name)) {
-					archive_set_error(&a->archive, errno,
+				if (unlink(head)) {
+					tail[0] = c;
+					fsobj_error(a_eno, a_estr, errno,
 					    "Could not remove symlink %s",
-					    a->name);
-					pn[0] = c;
-					return (ARCHIVE_FAILED);
+					    path);
+					res = ARCHIVE_FAILED;
+					break;
 				}
-				a->pst = NULL;
 				/*
 				 * Even if we did remove it, a warning
 				 * is in order.  The warning is silly,
 				 * though, if we're just replacing one
 				 * symlink with another symlink.
 				 */
-				if (!S_ISLNK(a->mode)) {
-					archive_set_error(&a->archive, 0,
-					    "Removing symlink %s",
-					    a->name);
+				tail[0] = c;
+				/*
+				 * FIXME:  not sure how important this is to
+				 * restore
+				 */
+				/*
+				if (!S_ISLNK(path)) {
+					fsobj_error(a_eno, a_estr, 0,
+					    "Removing symlink %s", path);
 				}
+				*/
 				/* Symlink gone.  No more problem! */
-				pn[0] = c;
-				return (0);
-			} else if (a->flags & ARCHIVE_EXTRACT_UNLINK) {
+				res = ARCHIVE_OK;
+				break;
+			} else if (flags & ARCHIVE_EXTRACT_UNLINK) {
 				/* User asked us to remove problems. */
-				if (unlink(a->name) != 0) {
-					archive_set_error(&a->archive, 0,
-					    "Cannot remove intervening symlink %s",
-					    a->name);
-					pn[0] = c;
-					return (ARCHIVE_FAILED);
+				if (unlink(head) != 0) {
+					tail[0] = c;
+					fsobj_error(a_eno, a_estr, 0,
+					    "Cannot remove intervening "
+					    "symlink %s", path);
+					res = ARCHIVE_FAILED;
+					break;
+				}
+				tail[0] = c;
+			} else if ((flags &
+			    ARCHIVE_EXTRACT_SECURE_SYMLINKS) == 0) {
+				/*
+				 * We are not the last element and we want to
+				 * follow symlinks if they are a directory.
+				 * 
+				 * This is needed to extract hardlinks over
+				 * symlinks.
+				 */
+				r = stat(head, &st);
+				if (r != 0) {
+					tail[0] = c;
+					if (errno == ENOENT) {
+						break;
+					} else {
+						fsobj_error(a_eno, a_estr,
+						    errno,
+						    "Could not stat %s", path);
+						res = (ARCHIVE_FAILED);
+						break;
+					}
+				} else if (S_ISDIR(st.st_mode)) {
+					if (chdir(head) != 0) {
+						tail[0] = c;
+						fsobj_error(a_eno, a_estr,
+						    errno,
+						    "Could not chdir %s", path);
+						res = (ARCHIVE_FATAL);
+						break;
+					}
+					/*
+					 * Our view is now from inside
+					 * this dir:
+					 */
+					head = tail + 1;
+				} else {
+					tail[0] = c;
+					fsobj_error(a_eno, a_estr, 0,
+					    "Cannot extract through "
+					    "symlink %s", path);
+					res = ARCHIVE_FAILED;
+					break;
 				}
-				a->pst = NULL;
 			} else {
-				archive_set_error(&a->archive, 0,
-				    "Cannot extract through symlink %s",
-				    a->name);
-				pn[0] = c;
-				return (ARCHIVE_FAILED);
+				tail[0] = c;
+				fsobj_error(a_eno, a_estr, 0,
+				    "Cannot extract through symlink %s", path);
+				res = ARCHIVE_FAILED;
+				break;
 			}
 		}
-		pn[0] = c;
-		if (pn[0] != '\0')
-			pn++; /* Advance to the next segment. */
+		/* be sure to always maintain this */
+		tail[0] = c;
+		if (tail[0] != '\0')
+			tail++; /* Advance to the next segment. */
+	}
+	/* Catches loop exits via break */
+	tail[0] = c;
+#ifdef HAVE_FCHDIR
+	/* If we changed directory above, restore it here. */
+	if (restore_pwd >= 0) {
+		r = fchdir(restore_pwd);
+		if (r != 0) {
+			fsobj_error(a_eno, a_estr, errno,
+			    "chdir() failure", "");
+		}
+		close(restore_pwd);
+		restore_pwd = -1;
+		if (r != 0) {
+			res = (ARCHIVE_FATAL);
+		}
 	}
-	pn[0] = c;
-	/* We've checked and/or cleaned the whole path, so remember it. */
-	archive_strcpy(&a->path_safe, a->name);
-	return (ARCHIVE_OK);
+#endif
+	/* TODO: reintroduce a safe cache here? */
+	return res;
 #endif
 }
 
+/*
+ * Check a->name for symlinks, returning ARCHIVE_OK if its clean, otherwise
+ * calls archive_set_error and returns ARCHIVE_{FATAL,FAILED}
+ */
+static int
+check_symlinks(struct archive_write_disk *a)
+{
+	struct archive_string error_string;
+	int error_number;
+	int rc;
+	archive_string_init(&error_string);
+	rc = check_symlinks_fsobj(a->name, &error_number, &error_string,
+	    a->flags);
+	if (rc != ARCHIVE_OK) {
+		archive_set_error(&a->archive, error_number, "%s",
+		    error_string.s);
+	}
+	archive_string_free(&error_string);
+	a->pst = NULL;	/* to be safe */
+	return rc;
+}
+
+
 #if defined(__CYGWIN__)
 /*
  * 1. Convert a path separator from '\' to '/' .
@@ -2471,7 +2744,7 @@ check_symlinks(struct archive_write_disk *a)
  * See also : http://msdn.microsoft.com/en-us/library/aa365247.aspx
  */
 static void
-cleanup_pathname_win(struct archive_write_disk *a)
+cleanup_pathname_win(char *path)
 {
 	wchar_t wc;
 	char *p;
@@ -2482,7 +2755,7 @@ cleanup_pathname_win(struct archive_write_disk *a)
 	mb = 0;
 	complete = 1;
 	utf8 = (strcmp(nl_langinfo(CODESET), "UTF-8") == 0)? 1: 0;
-	for (p = a->name; *p != '\0'; p++) {
+	for (p = path; *p != '\0'; p++) {
 		++alen;
 		if (*p == '\\') {
 			/* If previous byte is smaller than 128,
@@ -2507,7 +2780,7 @@ cleanup_pathname_win(struct archive_write_disk *a)
 	/*
 	 * Convert path separator in wide-character.
 	 */
-	p = a->name;
+	p = path;
 	while (*p != '\0' && alen) {
 		l = mbtowc(&wc, p, alen);
 		if (l == (size_t)-1) {
@@ -2534,26 +2807,27 @@ cleanup_pathname_win(struct archive_write_disk *a)
  * is set) if the path is absolute.
  */
 static int
-cleanup_pathname(struct archive_write_disk *a)
+cleanup_pathname_fsobj(char *path, int *a_eno, struct archive_string *a_estr,
+    int flags)
 {
 	char *dest, *src;
 	char separator = '\0';
 
-	dest = src = a->name;
+	dest = src = path;
 	if (*src == '\0') {
-		archive_set_error(&a->archive, ARCHIVE_ERRNO_MISC,
-		    "Invalid empty pathname");
+		fsobj_error(a_eno, a_estr, ARCHIVE_ERRNO_MISC,
+		    "Invalid empty ", "pathname");
 		return (ARCHIVE_FAILED);
 	}
 
 #if defined(__CYGWIN__)
-	cleanup_pathname_win(a);
+	cleanup_pathname_win(path);
 #endif
 	/* Skip leading '/'. */
 	if (*src == '/') {
-		if (a->flags & ARCHIVE_EXTRACT_SECURE_NOABSOLUTEPATHS) {
-			archive_set_error(&a->archive, ARCHIVE_ERRNO_MISC,
-			                  "Path is absolute");
+		if (flags & ARCHIVE_EXTRACT_SECURE_NOABSOLUTEPATHS) {
+			fsobj_error(a_eno, a_estr, ARCHIVE_ERRNO_MISC,
+			    "Path is ", "absolute");
 			return (ARCHIVE_FAILED);
 		}
 
@@ -2580,10 +2854,11 @@ cleanup_pathname(struct archive_write_disk *a)
 			} else if (src[1] == '.') {
 				if (src[2] == '/' || src[2] == '\0') {
 					/* Conditionally warn about '..' */
-					if (a->flags & ARCHIVE_EXTRACT_SECURE_NODOTDOT) {
-						archive_set_error(&a->archive,
+					if (flags
+					    & ARCHIVE_EXTRACT_SECURE_NODOTDOT) {
+						fsobj_error(a_eno, a_estr,
 						    ARCHIVE_ERRNO_MISC,
-						    "Path contains '..'");
+						    "Path contains ", "'..'");
 						return (ARCHIVE_FAILED);
 					}
 				}
@@ -2614,7 +2889,7 @@ cleanup_pathname(struct archive_write_disk *a)
 	 * We've just copied zero or more path elements, not including the
 	 * final '/'.
 	 */
-	if (dest == a->name) {
+	if (dest == path) {
 		/*
 		 * Nothing got copied.  The path must have been something
 		 * like '.' or '/' or './' or '/././././/./'.
@@ -2629,6 +2904,23 @@ cleanup_pathname(struct archive_write_disk *a)
 	return (ARCHIVE_OK);
 }
 
+static int
+cleanup_pathname(struct archive_write_disk *a)
+{
+	struct archive_string error_string;
+	int error_number;
+	int rc;
+	archive_string_init(&error_string);
+	rc = cleanup_pathname_fsobj(a->name, &error_number, &error_string,
+	    a->flags);
+	if (rc != ARCHIVE_OK) {
+		archive_set_error(&a->archive, error_number, "%s",
+		    error_string.s);
+	}
+	archive_string_free(&error_string);
+	return rc;
+}
+
 /*
  * Create the parent directory of the specified path, assuming path
  * is already in mutable storage.
@@ -2707,7 +2999,8 @@ create_dir(struct archive_write_disk *a, char *path)
 		}
 	} else if (errno != ENOENT && errno != ENOTDIR) {
 		/* Stat failed? */
-		archive_set_error(&a->archive, errno, "Can't test directory '%s'", path);
+		archive_set_error(&a->archive, errno,
+		    "Can't test directory '%s'", path);
 		return (ARCHIVE_FAILED);
 	} else if (slash != NULL) {
 		*slash = '\0';
@@ -3232,7 +3525,8 @@ clear_nochange_fflags(struct archive_write_disk *a)
 	nochange_flags |= EXT2_IMMUTABLE_FL;
 #endif
 
-	return (set_fflags_platform(a, a->fd, a->name, mode, 0, nochange_flags));
+	return (set_fflags_platform(a, a->fd, a->name, mode, 0,
+	    nochange_flags));
 }
 
 
@@ -3487,6 +3781,9 @@ exit_xattr:
 static int
 copy_acls(struct archive_write_disk *a, int tmpfd, int dffd)
 {
+#ifndef HAVE_SYS_ACL_H
+	return 0;
+#else
 	acl_t acl, dfacl = NULL;
 	int acl_r, ret = ARCHIVE_OK;
 
@@ -3514,6 +3811,7 @@ exit_acl:
 	if (dfacl)
 		acl_free(dfacl);
 	return (ret);
+#endif
 }
 
 static int
@@ -3753,7 +4051,8 @@ set_xattrs(struct archive_write_disk *a)
 				if (errno == ENOTSUP || errno == ENOSYS) {
 					if (!warning_done) {
 						warning_done = 1;
-						archive_set_error(&a->archive, errno,
+						archive_set_error(&a->archive,
+						    errno,
 						    "Cannot restore extended "
 						    "attributes on this file "
 						    "system");
@@ -3764,7 +4063,8 @@ set_xattrs(struct archive_write_disk *a)
 				ret = ARCHIVE_WARN;
 			}
 		} else {
-			archive_set_error(&a->archive, ARCHIVE_ERRNO_FILE_FORMAT,
+			archive_set_error(&a->archive,
+			    ARCHIVE_ERRNO_FILE_FORMAT,
 			    "Invalid extended attribute encountered");
 			ret = ARCHIVE_WARN;
 		}
@@ -3808,19 +4108,22 @@ set_xattrs(struct archive_write_disk *a)
 			errno = 0;
 #if HAVE_EXTATTR_SET_FD
 			if (a->fd >= 0)
-				e = extattr_set_fd(a->fd, namespace, name, value, size);
+				e = extattr_set_fd(a->fd, namespace, name,
+				    value, size);
 			else
 #endif
 			/* TODO: should we use extattr_set_link() instead? */
 			{
-				e = extattr_set_file(archive_entry_pathname(entry),
-				    namespace, name, value, size);
+				e = extattr_set_file(
+				    archive_entry_pathname(entry), namespace,
+				    name, value, size);
 			}
 			if (e != (int)size) {
 				if (errno == ENOTSUP || errno == ENOSYS) {
 					if (!warning_done) {
 						warning_done = 1;
-						archive_set_error(&a->archive, errno,
+						archive_set_error(&a->archive,
+						    errno,
 						    "Cannot restore extended "
 						    "attributes on this file "
 						    "system");
@@ -3866,10 +4169,10 @@ older(struct stat *st, struct archive_entry *entry)
 {
 	/* First, test the seconds and return if we have a definite answer. */
 	/* Definitely older. */
-	if (st->st_mtime < archive_entry_mtime(entry))
+	if (to_int64_time(st->st_mtime) < to_int64_time(archive_entry_mtime(entry)))
 		return (1);
 	/* Definitely younger. */
-	if (st->st_mtime > archive_entry_mtime(entry))
+	if (to_int64_time(st->st_mtime) > to_int64_time(archive_entry_mtime(entry)))
 		return (0);
 	/* If this platform supports fractional seconds, try those. */
 #if HAVE_STRUCT_STAT_ST_MTIMESPEC_TV_NSEC
diff --git a/libarchive/archive_write_disk_set_standard_lookup.c b/libarchive/archive_write_disk_set_standard_lookup.c
index 3b868fb..5c766d7 100644
--- a/libarchive/archive_write_disk_set_standard_lookup.c
+++ b/libarchive/archive_write_disk_set_standard_lookup.c
@@ -84,15 +84,13 @@ static void	cleanup(void *);
 int
 archive_write_disk_set_standard_lookup(struct archive *a)
 {
-	struct bucket *ucache = malloc(cache_size * sizeof(struct bucket));
-	struct bucket *gcache = malloc(cache_size * sizeof(struct bucket));
+	struct bucket *ucache = calloc(cache_size, sizeof(struct bucket));
+	struct bucket *gcache = calloc(cache_size, sizeof(struct bucket));
 	if (ucache == NULL || gcache == NULL) {
 		free(ucache);
 		free(gcache);
 		return (ARCHIVE_FATAL);
 	}
-	memset(ucache, 0, cache_size * sizeof(struct bucket));
-	memset(gcache, 0, cache_size * sizeof(struct bucket));
 	archive_write_disk_set_group_lookup(a, gcache, lookup_gid, cleanup);
 	archive_write_disk_set_user_lookup(a, ucache, lookup_uid, cleanup);
 	return (ARCHIVE_OK);
diff --git a/libarchive/archive_write_disk_windows.c b/libarchive/archive_write_disk_windows.c
index da76c54..94b016e 100644
--- a/libarchive/archive_write_disk_windows.c
+++ b/libarchive/archive_write_disk_windows.c
@@ -192,7 +192,7 @@ struct archive_write_disk {
 
 /*
  * Default mode for dirs created automatically (will be modified by umask).
- * Note that POSIX specifies 0777 for implicity-created dirs, "modified
+ * Note that POSIX specifies 0777 for implicitly-created dirs, "modified
  * by the process' file creation mask."
  */
 #define	DEFAULT_DIR_MODE 0777
@@ -396,7 +396,7 @@ permissive_name_w(struct archive_write_disk *a)
 	}
 
 	/*
-	 * A full-pathname pointig a network drive
+	 * A full-pathname pointing to a network drive
 	 * like "\\<server-name>\<share-name>\file". 
 	 */
 	if (wnp[0] == L'\\' && wnp[1] == L'\\' && wnp[2] != L'\\') {
@@ -1221,10 +1221,9 @@ archive_write_disk_new(void)
 {
 	struct archive_write_disk *a;
 
-	a = (struct archive_write_disk *)malloc(sizeof(*a));
+	a = (struct archive_write_disk *)calloc(1, sizeof(*a));
 	if (a == NULL)
 		return (NULL);
-	memset(a, 0, sizeof(*a));
 	a->archive.magic = ARCHIVE_WRITE_DISK_MAGIC;
 	/* We're ready to write a header immediately. */
 	a->archive.state = ARCHIVE_STATE_HEADER;
diff --git a/libarchive/archive_write_open.3 b/libarchive/archive_write_open.3
index a52959b..457873e 100644
--- a/libarchive/archive_write_open.3
+++ b/libarchive/archive_write_open.3
@@ -66,6 +66,7 @@ Freeze the settings, open the archive, and prepare for writing entries.
 This is the most generic form of this function, which accepts
 pointers to three callback functions which will be invoked by
 the compression layer to write the constructed archive.
+This does not alter the default archive padding.
 .It Fn archive_write_open_fd
 A convenience form of
 .Fn archive_write_open
@@ -123,12 +124,21 @@ is currently in use.
 You should be careful to ensure that this variable
 remains allocated until after the archive is
 closed.
+This function will disable padding unless you
+have specifically set the block size.
 .El
 More information about the
 .Va struct archive
 object and the overall design of the library can be found in the
 .Xr libarchive 3
 overview.
+.Pp
+Note that the convenience forms above vary in how
+they block the output.
+See
+.Xr archive_write_blocksize 3
+if you need to control the block size used for writes
+or the end-of-file padding behavior.
 .\"
 .Sh CLIENT CALLBACKS
 To use this library, you will need to define and register
@@ -226,6 +236,7 @@ functions.
 .Xr tar 1 ,
 .Xr libarchive 3 ,
 .Xr archive_write 3 ,
+.Xr archive_write_blocksize 3 ,
 .Xr archive_write_filter 3 ,
 .Xr archive_write_format 3 ,
 .Xr archive_write_new 3 ,
diff --git a/libarchive/archive_write_open_memory.c b/libarchive/archive_write_open_memory.c
index 4f8d679..ea6ae0a 100644
--- a/libarchive/archive_write_open_memory.c
+++ b/libarchive/archive_write_open_memory.c
@@ -53,12 +53,11 @@ archive_write_open_memory(struct archive *a, void *buff, size_t buffSize, size_t
 {
 	struct write_memory_data *mine;
 
-	mine = (struct write_memory_data *)malloc(sizeof(*mine));
+	mine = (struct write_memory_data *)calloc(1, sizeof(*mine));
 	if (mine == NULL) {
 		archive_set_error(a, ENOMEM, "No memory");
 		return (ARCHIVE_FATAL);
 	}
-	memset(mine, 0, sizeof(*mine));
 	mine->buff = buff;
 	mine->size = buffSize;
 	mine->client_size = used;
diff --git a/libarchive/archive_write_set_format_7zip.c b/libarchive/archive_write_set_format_7zip.c
index fc6ccfe..41ed74d 100644
--- a/libarchive/archive_write_set_format_7zip.c
+++ b/libarchive/archive_write_set_format_7zip.c
@@ -205,7 +205,7 @@ struct _7zip {
 	/*
 	 * The list of the file entries which has its contents is used to
 	 * manage struct file objects.
-	 * We use 'next' a menber of struct file to chain.
+	 * We use 'next' (a member of struct file) to chain.
 	 */
 	struct {
 		struct file	*first;
@@ -1358,7 +1358,7 @@ make_header(struct archive_write *a, uint64_t offset, uint64_t pack_size,
 	if (r < 0)
 		return (r);
 
-	/* Write Nume size. */
+	/* Write Name size. */
 	r = enc_uint64(a, zip->total_bytes_entry_name+1);
 	if (r < 0)
 		return (r);
diff --git a/libarchive/archive_write_set_format_ar.c b/libarchive/archive_write_set_format_ar.c
index 9f17564..c9771d8 100644
--- a/libarchive/archive_write_set_format_ar.c
+++ b/libarchive/archive_write_set_format_ar.c
@@ -126,12 +126,11 @@ archive_write_set_format_ar(struct archive_write *a)
 	if (a->format_free != NULL)
 		(a->format_free)(a);
 
-	ar = (struct ar_w *)malloc(sizeof(*ar));
+	ar = (struct ar_w *)calloc(1, sizeof(*ar));
 	if (ar == NULL) {
 		archive_set_error(&a->archive, ENOMEM, "Can't allocate ar data");
 		return (ARCHIVE_FATAL);
 	}
-	memset(ar, 0, sizeof(*ar));
 	a->format_data = ar;
 
 	a->format_name = "ar";
diff --git a/libarchive/archive_write_set_format_cpio.c b/libarchive/archive_write_set_format_cpio.c
index 3526493..a4c9d1e 100644
--- a/libarchive/archive_write_set_format_cpio.c
+++ b/libarchive/archive_write_set_format_cpio.c
@@ -289,7 +289,7 @@ write_header(struct archive_write *a, struct archive_entry *entry)
 	sconv = get_sconv(a);
 
 #if defined(_WIN32) && !defined(__CYGWIN__)
-	/* Make sure the path separators in pahtname, hardlink and symlink
+	/* Make sure the path separators in pathname, hardlink and symlink
 	 * are all slash '/', not the Windows path separator '\'. */
 	entry_main = __la_win_entry_in_posix_pathseparator(entry);
 	if (entry_main == NULL) {
diff --git a/libarchive/archive_write_set_format_cpio_newc.c b/libarchive/archive_write_set_format_cpio_newc.c
index a9bfa80..957f1a3 100644
--- a/libarchive/archive_write_set_format_cpio_newc.c
+++ b/libarchive/archive_write_set_format_cpio_newc.c
@@ -116,12 +116,11 @@ archive_write_set_format_cpio_newc(struct archive *_a)
 	if (a->format_free != NULL)
 		(a->format_free)(a);
 
-	cpio = (struct cpio *)malloc(sizeof(*cpio));
+	cpio = (struct cpio *)calloc(1, sizeof(*cpio));
 	if (cpio == NULL) {
 		archive_set_error(&a->archive, ENOMEM, "Can't allocate cpio data");
 		return (ARCHIVE_FATAL);
 	}
-	memset(cpio, 0, sizeof(*cpio));
 	a->format_data = cpio;
 	a->format_name = "cpio";
 	a->format_options = archive_write_newc_options;
@@ -232,7 +231,7 @@ write_header(struct archive_write *a, struct archive_entry *entry)
 	sconv = get_sconv(a);
 
 #if defined(_WIN32) && !defined(__CYGWIN__)
-	/* Make sure the path separators in pahtname, hardlink and symlink
+	/* Make sure the path separators in pathname, hardlink and symlink
 	 * are all slash '/', not the Windows path separator '\'. */
 	entry_main = __la_win_entry_in_posix_pathseparator(entry);
 	if (entry_main == NULL) {
diff --git a/libarchive/archive_write_set_format_gnutar.c b/libarchive/archive_write_set_format_gnutar.c
index 1d635d2..2d858c9 100644
--- a/libarchive/archive_write_set_format_gnutar.c
+++ b/libarchive/archive_write_set_format_gnutar.c
@@ -119,9 +119,9 @@ static const char template_header[] = {
 	'0','0','0','0','0','0', '0','\0',
 	/* gid, null termination: 8 bytes */
 	'0','0','0','0','0','0', '0','\0',
-	/* size, space termation: 12 bytes */
+	/* size, space termination: 12 bytes */
 	'0','0','0','0','0','0','0','0','0','0','0', '\0',
-	/* mtime, space termation: 12 bytes */
+	/* mtime, space termination: 12 bytes */
 	'0','0','0','0','0','0','0','0','0','0','0', '\0',
 	/* Initial checksum value: 8 spaces */
 	' ',' ',' ',' ',' ',' ',' ',' ',
@@ -368,7 +368,7 @@ archive_write_gnutar_header(struct archive_write *a,
 	}
 
 #if defined(_WIN32) && !defined(__CYGWIN__)
-	/* Make sure the path separators in pahtname, hardlink and symlink
+	/* Make sure the path separators in pathname, hardlink and symlink
 	 * are all slash '/', not the Windows path separator '\'. */
 	entry_main = __la_win_entry_in_posix_pathseparator(entry);
 	if (entry_main == NULL) {
@@ -478,15 +478,15 @@ archive_write_gnutar_header(struct archive_write *a,
 		archive_entry_set_pathname(temp, "././@LongLink");
 		archive_entry_set_size(temp, length);
 		ret = archive_format_gnutar_header(a, buff, temp, 'K');
+		archive_entry_free(temp);
 		if (ret < ARCHIVE_WARN)
 			goto exit_write_header;
 		ret = __archive_write_output(a, buff, 512);
-		if(ret < ARCHIVE_WARN)
+		if (ret < ARCHIVE_WARN)
 			goto exit_write_header;
-		archive_entry_free(temp);
 		/* Write name and trailing null byte. */
 		ret = __archive_write_output(a, gnutar->linkname, length);
-		if(ret < ARCHIVE_WARN)
+		if (ret < ARCHIVE_WARN)
 			goto exit_write_header;
 		/* Pad to 512 bytes */
 		ret = __archive_write_nulls(a, 0x1ff & (-(ssize_t)length));
@@ -508,12 +508,12 @@ archive_write_gnutar_header(struct archive_write *a,
 		archive_entry_set_pathname(temp, "././@LongLink");
 		archive_entry_set_size(temp, length);
 		ret = archive_format_gnutar_header(a, buff, temp, 'L');
+		archive_entry_free(temp);
 		if (ret < ARCHIVE_WARN)
 			goto exit_write_header;
 		ret = __archive_write_output(a, buff, 512);
 		if(ret < ARCHIVE_WARN)
 			goto exit_write_header;
-		archive_entry_free(temp);
 		/* Write pathname + trailing null byte. */
 		ret = __archive_write_output(a, pathname, length);
 		if(ret < ARCHIVE_WARN)
diff --git a/libarchive/archive_write_set_format_iso9660.c b/libarchive/archive_write_set_format_iso9660.c
index cb3e54e..4e91097 100644
--- a/libarchive/archive_write_set_format_iso9660.c
+++ b/libarchive/archive_write_set_format_iso9660.c
@@ -161,7 +161,7 @@ struct isofile {
 	/* Used for managing struct isofile list. */
 	struct isofile		*allnext;
 	struct isofile		*datanext;
-	/* Used for managing a hardlined struct isofile list. */
+	/* Used for managing a hardlinked struct isofile list. */
 	struct isofile		*hlnext;
 	struct isofile		*hardlink_target;
 
@@ -436,7 +436,7 @@ struct iso_option {
 	 * Type   : string
 	 * Default: Auto detect
 	 *        : We check a size of boot image;
-	 *        : If ths size is just 1.22M/1.44M/2.88M,
+	 *        : If the size is just 1.22M/1.44M/2.88M,
 	 *        : we assume boot_type is 'fd';
 	 *        : otherwise boot_type is 'no-emulation'.
 	 * COMPAT :
@@ -528,7 +528,7 @@ struct iso_option {
 	 *   - allow more then 8 depths of directory trees;
 	 *   - disable a version number to a File Name;
 	 *   - disable a forced period to the tail of a File Name;
-	 *   - the maxinum length of files and directories is raised to 193.
+	 *   - the maximum length of files and directories is raised to 193.
 	 *     if rockridge option is disabled, raised to 207.
 	 */
 	unsigned int	 iso_level:3;
@@ -626,7 +626,7 @@ struct iso_option {
 	 *        :    NOTE  Our rockridge=useful option does not set a zero
 	 *        :          to uid and gid, you should use application
 	 *        :          option such as --gid,--gname,--uid and --uname
-	 *        :          badtar options instead.
+	 *        :          bsdtar options instead.
 	 * Type   : boolean/string
 	 * Default: Enabled as rockridge=useful
 	 * COMPAT : mkisofs -r / -R
@@ -660,7 +660,7 @@ struct iso_option {
 	 *        :    for making zisofs.
 	 *        :    When the file size is less than one Logical Block
 	 *        :    size, that file will not zisofs'ed since it does
-	 *        :    reduece an ISO-image size.
+	 *        :    reduce an ISO-image size.
 	 *        :
 	 *        :    When you specify option 'boot=<boot-image>', that
 	 *        :    'boot-image' file won't be converted to zisofs file.
@@ -680,7 +680,7 @@ struct iso9660 {
 	/* The creation time of ISO image. */
 	time_t			 birth_time;
 	/* A file stream of a temporary file, which file contents
-	 * save to until ISO iamge can be created. */
+	 * save to until ISO image can be created. */
 	int			 temp_fd;
 
 	struct isofile		*cur_file;
@@ -703,7 +703,7 @@ struct iso9660 {
 	}			 all_file_list;
 
 	/* A list of struct isofile entries which have its
-	 * contents and are not a directory, a hardlined file
+	 * contents and are not a directory, a hardlinked file
 	 * and a symlink file. */
 	struct {
 		struct isofile	*first;
@@ -1907,9 +1907,9 @@ iso9660_close(struct archive_write *a)
 		    iso9660->primary.rootent);
 		if (ret < 0)
 			return (ret);
-		/* Make sure we have UTF-16BE convertors.
-		 * if there is no file entry, convertors are still
-		 * uninitilized. */
+		/* Make sure we have UTF-16BE converters.
+		 * if there is no file entry, converters are still
+		 * uninitialized. */
 		if (iso9660->sconv_to_utf16be == NULL) {
 			iso9660->sconv_to_utf16be =
 			    archive_string_conversion_to_charset(
@@ -1995,7 +1995,7 @@ iso9660_close(struct archive_write *a)
 	 * Write an ISO 9660 image.
 	 */
 
-	/* Switc to start using wbuff as file buffer. */
+	/* Switch to start using wbuff as file buffer. */
 	iso9660->wbuff_remaining = wb_buffmax();
 	iso9660->wbuff_type = WB_TO_STREAM;
 	iso9660->wbuff_offset = 0;
@@ -2524,7 +2524,8 @@ get_tmfromtime(struct tm *tm, time_t *t)
 	tzset();
 	localtime_r(t, tm);
 #elif HAVE__LOCALTIME64_S
-	_localtime64_s(tm, t);
+	__time64_t tmp_t = (__time64_t) *t; //time_t may be shorter than 64 bits
+	_localtime64_s(tm, &tmp_t);
 #else
 	memcpy(tm, localtime(t), sizeof(*tm));
 #endif
@@ -2553,7 +2554,7 @@ set_date_time(unsigned char *p, time_t t)
 static void
 set_date_time_null(unsigned char *p)
 {
-	memset(p, '0', 16);
+	memset(p, (int)'0', 16);
 	p[16] = 0;
 }
 
@@ -2959,7 +2960,7 @@ set_directory_record_rr(unsigned char *bp, int dr_len,
 			gid = archive_entry_gid(file->entry);
 			if (iso9660->opt.rr == OPT_RR_USEFUL) {
 				/*
-				 * This action is simular mkisofs -r option
+				 * This action is similar to mkisofs -r option
 				 * but our rockridge=useful option does not
 				 * set a zero to uid and gid.
 				 */
@@ -3024,8 +3025,8 @@ set_directory_record_rr(unsigned char *bp, int dr_len,
 		 *    +----+----+----+----+----+
 		 *   10   11   12   13   14   15
 		 *
-	 	 *    - cflg : flag of componet
-		 *    - clen : length of componet
+		 *    - cflg : flag of component
+		 *    - clen : length of component
 		 */
 		const char *sl;
 		char sl_last;
@@ -3108,7 +3109,7 @@ set_directory_record_rr(unsigned char *bp, int dr_len,
 					/*
 					 *     flg  len
 					 *    +----+----+
-					 *    | 02 | 00 | CURREENT component.
+					 *    | 02 | 00 | CURRENT component.
 					 *    +----+----+ (".")
 					 */
 					if (nc != NULL) {
@@ -3947,7 +3948,7 @@ write_VD(struct archive_write *a, struct vdd *vdd)
 	    "Abstract File", 0, D_CHAR);
 	if (r != ARCHIVE_OK)
 		return (r);
-	/* Bibliongraphic File Identifier */
+	/* Bibliographic File Identifier */
 	r = set_file_identifier(bp, 777, 813, vdc, a, vdd,
 	    &(iso9660->bibliographic_file_identifier),
 	    "Bibliongraphic File", 0, D_CHAR);
@@ -4073,7 +4074,8 @@ write_information_block(struct archive_write *a)
 	memset(info.s, 0, info_size);
 	opt = 0;
 #if defined(HAVE__CTIME64_S)
-	_ctime64_s(buf, sizeof(buf), &(iso9660->birth_time));
+	__time64_t iso9660_birth_time_tmp = (__time64_t) iso9660->birth_time; //time_t may be shorter than 64 bits
+	_ctime64_s(buf, sizeof(buf), &(iso9660_birth_time_tmp));
 #elif defined(HAVE_CTIME_R)
 	ctime_r(&(iso9660->birth_time), buf);
 #else
@@ -4558,7 +4560,7 @@ write_file_descriptors(struct archive_write *a)
 		file->cur_content = &(file->content);
 		do {
 			blocks += file->cur_content->blocks;
-			/* Next fragument */
+			/* Next fragment */
 			file->cur_content = file->cur_content->next;
 		} while (file->cur_content != NULL);
 	}
@@ -4748,7 +4750,7 @@ isofile_gen_utility_names(struct archive_write *a, struct isofile *file)
 		}
 
 		/*
-		 * Converte a filename to UTF-16BE.
+		 * Convert a filename to UTF-16BE.
 		 */
 		if (0 > archive_entry_pathname_l(file->entry, &u16, &u16len,
 		    iso9660->sconv_to_utf16be)) {
@@ -5512,7 +5514,7 @@ isoent_setup_file_location(struct iso9660 *iso9660, int location)
 			file->cur_content->location = location;
 			location += file->cur_content->blocks;
 			total_block += file->cur_content->blocks;
-			/* Next fragument */
+			/* Next fragment */
 			file->cur_content = file->cur_content->next;
 		} while (file->cur_content != NULL);
 	}
@@ -6135,7 +6137,7 @@ isoent_gen_iso9660_identifier(struct archive_write *a, struct isoent *isoent,
 					off = ffmax - extlen;
 					if (off == 0) {
 						/* A dot('.')  character
-						 * does't place to the first
+						 * doesn't place to the first
 						 * byte of identifier. */
 						off ++;
 						extlen --;
@@ -6164,7 +6166,7 @@ isoent_gen_iso9660_identifier(struct archive_write *a, struct isoent *isoent,
 		np->id_len = l = ext_off + np->ext_len;
 
 		/* Make an offset of the number which is used to be set
-		 * hexadecimal number to avoid duplicate identififier. */
+		 * hexadecimal number to avoid duplicate identifier. */
 		if (iso9660->opt.iso_level == 1) {
 			if (ext_off >= 5)
 				noff = 5;
@@ -6742,7 +6744,7 @@ isoent_rr_move(struct archive_write *a)
 	int r;
 
 	pt = &(iso9660->primary.pathtbl[MAX_DEPTH-1]);
-	/* Theare aren't level 8 directories reaching a deepr level. */
+	/* There aren't level 8 directories reaching a deeper level. */
 	if (pt->cnt == 0)
 		return (ARCHIVE_OK);
 
@@ -6813,7 +6815,7 @@ _compare_path_table(const void *v1, const void *v2)
 	if (cmp != 0)
 		return (cmp);
 
-	/* Compare indetifier */
+	/* Compare identifier */
 	s1 = p1->identifier;
 	s2 = p2->identifier;
 	l = p1->ext_off;
@@ -6855,7 +6857,7 @@ _compare_path_table_joliet(const void *v1, const void *v2)
 	if (cmp != 0)
 		return (cmp);
 
-	/* Compare indetifier */
+	/* Compare identifier */
 	s1 = (const unsigned char *)p1->identifier;
 	s2 = (const unsigned char *)p2->identifier;
 	l = p1->ext_off;
@@ -7149,7 +7151,7 @@ isoent_create_boot_catalog(struct archive_write *a, struct isoent *rootent)
 
 	iso9660->el_torito.catalog = isoent;
 	/*
-	 * Get a boot medai type.
+	 * Get a boot media type.
 	 */
 	switch (iso9660->opt.boot_type) {
 	default:
diff --git a/libarchive/archive_write_set_format_mtree.c b/libarchive/archive_write_set_format_mtree.c
index b686303..493d473 100644
--- a/libarchive/archive_write_set_format_mtree.c
+++ b/libarchive/archive_write_set_format_mtree.c
@@ -1840,9 +1840,9 @@ mtree_entry_setup_filenames(struct archive_write *a, struct mtree_entry *file,
 	len = strlen(p);
 
 	/*
-	 * Add "./" prefiex.
+	 * Add "./" prefix.
 	 * NOTE: If the pathname does not have a path separator, we have
-	 * to add "./" to the head of the pathename because mtree reader
+	 * to add "./" to the head of the pathname because mtree reader
 	 * will suppose that it is v1(a.k.a classic) mtree format and
 	 * change the directory unexpectedly and so it will make a wrong
 	 * path.
diff --git a/libarchive/archive_write_set_format_pax.c b/libarchive/archive_write_set_format_pax.c
index 6f7fe78..6a301ac 100644
--- a/libarchive/archive_write_set_format_pax.c
+++ b/libarchive/archive_write_set_format_pax.c
@@ -1,6 +1,7 @@
 /*-
  * Copyright (c) 2003-2007 Tim Kientzle
  * Copyright (c) 2010-2012 Michihiro NAKAJIMA
+ * Copyright (c) 2016 Martin Matuska
  * All rights reserved.
  *
  * Redistribution and use in source and binary forms, with or without
@@ -61,15 +62,24 @@ struct pax {
 	struct sparse_block	*sparse_tail;
 	struct archive_string_conv *sconv_utf8;
 	int			 opt_binary;
+
+	unsigned flags;
+#define WRITE_SCHILY_XATTR       (1 << 0)
+#define WRITE_LIBARCHIVE_XATTR   (1 << 1)
 };
 
 static void		 add_pax_attr(struct archive_string *, const char *key,
 			     const char *value);
+static void		 add_pax_attr_binary(struct archive_string *,
+			     const char *key,
+			     const char *value, size_t value_len);
 static void		 add_pax_attr_int(struct archive_string *,
 			     const char *key, int64_t value);
 static void		 add_pax_attr_time(struct archive_string *,
 			     const char *key, int64_t sec,
 			     unsigned long nanos);
+static int		 add_pax_acl(struct archive_write *,
+			    struct archive_entry *, struct pax *, int);
 static ssize_t		 archive_write_pax_data(struct archive_write *,
 			     const void *, size_t);
 static int		 archive_write_pax_close(struct archive_write *);
@@ -127,13 +137,14 @@ archive_write_set_format_pax(struct archive *_a)
 	if (a->format_free != NULL)
 		(a->format_free)(a);
 
-	pax = (struct pax *)malloc(sizeof(*pax));
+	pax = (struct pax *)calloc(1, sizeof(*pax));
 	if (pax == NULL) {
 		archive_set_error(&a->archive, ENOMEM,
 		    "Can't allocate pax data");
 		return (ARCHIVE_FATAL);
 	}
-	memset(pax, 0, sizeof(*pax));
+	pax->flags = WRITE_LIBARCHIVE_XATTR | WRITE_SCHILY_XATTR;
+
 	a->format_data = pax;
 	a->format_name = "pax";
 	a->format_options = archive_write_pax_options;
@@ -273,6 +284,17 @@ add_pax_attr_int(struct archive_string *as, const char *key, int64_t value)
 static void
 add_pax_attr(struct archive_string *as, const char *key, const char *value)
 {
+	add_pax_attr_binary(as, key, value, strlen(value));
+}
+
+/*
+ * Add a key/value attribute to the pax header.  This function handles
+ * binary values.
+ */
+static void
+add_pax_attr_binary(struct archive_string *as, const char *key,
+		    const char *value, size_t value_len)
+{
 	int digits, i, len, next_ten;
 	char tmp[1 + 3 * sizeof(int)];	/* < 3 base-10 digits per byte */
 
@@ -280,7 +302,7 @@ add_pax_attr(struct archive_string *as, const char *key, const char *value)
 	 * PAX attributes have the following layout:
 	 *     <len> <space> <key> <=> <value> <nl>
 	 */
-	len = 1 + (int)strlen(key) + 1 + (int)strlen(value) + 1;
+	len = 1 + (int)strlen(key) + 1 + (int)value_len + 1;
 
 	/*
 	 * The <len> field includes the length of the <len> field, so
@@ -311,21 +333,47 @@ add_pax_attr(struct archive_string *as, const char *key, const char *value)
 	archive_strappend_char(as, ' ');
 	archive_strcat(as, key);
 	archive_strappend_char(as, '=');
-	archive_strcat(as, value);
+	archive_array_append(as, value, value_len);
 	archive_strappend_char(as, '\n');
 }
 
+static void
+archive_write_pax_header_xattr(struct pax *pax, const char *encoded_name,
+    const void *value, size_t value_len)
+{
+	struct archive_string s;
+	char *encoded_value;
+
+	if (pax->flags & WRITE_LIBARCHIVE_XATTR) {
+		encoded_value = base64_encode((const char *)value, value_len);
+
+		if (encoded_name != NULL && encoded_value != NULL) {
+			archive_string_init(&s);
+			archive_strcpy(&s, "LIBARCHIVE.xattr.");
+			archive_strcat(&s, encoded_name);
+			add_pax_attr(&(pax->pax_header), s.s, encoded_value);
+			archive_string_free(&s);
+		}
+		free(encoded_value);
+	}
+	if (pax->flags & WRITE_SCHILY_XATTR) {
+		archive_string_init(&s);
+		archive_strcpy(&s, "SCHILY.xattr.");
+		archive_strcat(&s, encoded_name);
+		add_pax_attr_binary(&(pax->pax_header), s.s, value, value_len);
+		archive_string_free(&s);
+	}
+}
+
 static int
 archive_write_pax_header_xattrs(struct archive_write *a,
     struct pax *pax, struct archive_entry *entry)
 {
-	struct archive_string s;
 	int i = archive_entry_xattr_reset(entry);
 
 	while (i--) {
 		const char *name;
 		const void *value;
-		char *encoded_value;
 		char *url_encoded_name = NULL, *encoded_name = NULL;
 		size_t size;
 		int r;
@@ -346,16 +394,9 @@ archive_write_pax_header_xattrs(struct archive_write *a,
 			}
 		}
 
-		encoded_value = base64_encode((const char *)value, size);
+		archive_write_pax_header_xattr(pax, encoded_name,
+		    value, size);
 
-		if (encoded_name != NULL && encoded_value != NULL) {
-			archive_string_init(&s);
-			archive_strcpy(&s, "LIBARCHIVE.xattr.");
-			archive_strcat(&s, encoded_name);
-			add_pax_attr(&(pax->pax_header), s.s, encoded_value);
-			archive_string_free(&s);
-		}
-		free(encoded_value);
 	}
 	return (ARCHIVE_OK);
 }
@@ -450,6 +491,45 @@ get_entry_symlink(struct archive_write *a, struct archive_entry *entry,
 	return (ARCHIVE_OK);
 }
 
+/* Add ACL to pax header */
+static int
+add_pax_acl(struct archive_write *a,
+    struct archive_entry *entry, struct pax *pax, int flags)
+{
+	char *p;
+	const char *attr;
+	int acl_types;
+
+	acl_types = archive_entry_acl_types(entry);
+
+	if ((acl_types & ARCHIVE_ENTRY_ACL_TYPE_NFS4) != 0)
+		attr = "SCHILY.acl.ace";
+	else if ((flags & ARCHIVE_ENTRY_ACL_TYPE_ACCESS) != 0)
+		attr = "SCHILY.acl.access";
+	else if ((flags & ARCHIVE_ENTRY_ACL_TYPE_DEFAULT) != 0)
+		attr = "SCHILY.acl.default";
+	else
+		return (ARCHIVE_FATAL);
+
+	p = archive_entry_acl_to_text_l(entry, NULL, flags, pax->sconv_utf8);
+	if (p == NULL) {
+		if (errno == ENOMEM) {
+			archive_set_error(&a->archive, ENOMEM, "%s %s",
+			    "Can't allocate memory for ", attr);
+			return (ARCHIVE_FATAL);
+		}
+		archive_set_error(&a->archive,
+		    ARCHIVE_ERRNO_FILE_FORMAT, "%s %s %s",
+		    "Can't translate ", attr, " to UTF-8");
+		return(ARCHIVE_WARN);
+	} else if (*p != '\0') {
+		add_pax_attr(&(pax->pax_header),
+		    attr, p);
+		free(p);
+	}
+	return(ARCHIVE_OK);
+}
+
 /*
  * TODO: Consider adding 'comment' and 'charset' fields to
  * archive_entry so that clients can specify them.  Also, consider
@@ -466,6 +546,7 @@ archive_write_pax_header(struct archive_write *a,
 	const char *p;
 	const char *suffix;
 	int need_extension, r, ret;
+	int acl_types;
 	int sparse_count;
 	uint64_t sparse_total, real_size;
 	struct pax *pax;
@@ -709,7 +790,7 @@ archive_write_pax_header(struct archive_write *a,
 
 	/* Copy entry so we can modify it as needed. */
 #if defined(_WIN32) && !defined(__CYGWIN__)
-	/* Make sure the path separators in pahtname, hardlink and symlink
+	/* Make sure the path separators in pathname, hardlink and symlink
 	 * are all slash '/', not the Windows path separator '\'. */
 	entry_main = __la_win_entry_in_posix_pathseparator(entry_original);
 	if (entry_main == entry_original)
@@ -1017,16 +1098,6 @@ archive_write_pax_header(struct archive_write *a,
 	if (!need_extension && p != NULL  &&  *p != '\0')
 		need_extension = 1;
 
-	/* If there are non-trivial ACL entries, we need an extension. */
-	if (!need_extension && archive_entry_acl_count(entry_original,
-		ARCHIVE_ENTRY_ACL_TYPE_ACCESS) > 0)
-		need_extension = 1;
-
-	/* If there are non-trivial ACL entries, we need an extension. */
-	if (!need_extension && archive_entry_acl_count(entry_original,
-		ARCHIVE_ENTRY_ACL_TYPE_DEFAULT) > 0)
-		need_extension = 1;
-
 	/* If there are extended attributes, we need an extension */
 	if (!need_extension && archive_entry_xattr_count(entry_original) > 0)
 		need_extension = 1;
@@ -1035,6 +1106,12 @@ archive_write_pax_header(struct archive_write *a,
 	if (!need_extension && sparse_count > 0)
 		need_extension = 1;
 
+	acl_types = archive_entry_acl_types(entry_original);
+
+	/* If there are any ACL entries, we need an extension */
+	if (!need_extension && acl_types != 0)
+		need_extension = 1;
+
 	/*
 	 * Libarchive used to include these in extended headers for
 	 * restricted pax format, but that confused people who
@@ -1086,43 +1163,29 @@ archive_write_pax_header(struct archive_write *a,
 			add_pax_attr(&(pax->pax_header), "SCHILY.fflags", p);
 
 		/* I use star-compatible ACL attributes. */
-		r = archive_entry_acl_text_l(entry_original,
-		    ARCHIVE_ENTRY_ACL_TYPE_ACCESS |
-		    ARCHIVE_ENTRY_ACL_STYLE_EXTRA_ID,
-		    &p, NULL, pax->sconv_utf8);
-		if (r != 0) {
-			if (errno == ENOMEM) {
-				archive_set_error(&a->archive, ENOMEM,
-				    "Can't allocate memory for "
-				    "ACL.access");
+		if ((acl_types & ARCHIVE_ENTRY_ACL_TYPE_NFS4) != 0) {
+			ret = add_pax_acl(a, entry_original, pax,
+			    ARCHIVE_ENTRY_ACL_STYLE_EXTRA_ID |
+			    ARCHIVE_ENTRY_ACL_STYLE_SEPARATOR_COMMA |
+			    ARCHIVE_ENTRY_ACL_STYLE_COMPACT);
+			if (ret == ARCHIVE_FATAL)
 				return (ARCHIVE_FATAL);
-			}
-			archive_set_error(&a->archive,
-			    ARCHIVE_ERRNO_FILE_FORMAT,
-			    "Can't translate ACL.access to UTF-8");
-			ret = ARCHIVE_WARN;
-		} else if (p != NULL && *p != '\0') {
-			add_pax_attr(&(pax->pax_header),
-			    "SCHILY.acl.access", p);
 		}
-		r = archive_entry_acl_text_l(entry_original,
-		    ARCHIVE_ENTRY_ACL_TYPE_DEFAULT |
-		    ARCHIVE_ENTRY_ACL_STYLE_EXTRA_ID,
-		    &p, NULL, pax->sconv_utf8);
-		if (r != 0) {
-			if (errno == ENOMEM) {
-				archive_set_error(&a->archive, ENOMEM,
-				    "Can't allocate memory for "
-				    "ACL.default");
+		if (acl_types & ARCHIVE_ENTRY_ACL_TYPE_ACCESS) {
+			ret = add_pax_acl(a, entry_original, pax,
+			    ARCHIVE_ENTRY_ACL_TYPE_ACCESS |
+			    ARCHIVE_ENTRY_ACL_STYLE_EXTRA_ID |
+			    ARCHIVE_ENTRY_ACL_STYLE_SEPARATOR_COMMA);
+			if (ret == ARCHIVE_FATAL)
+				return (ARCHIVE_FATAL);
+		}
+		if (acl_types & ARCHIVE_ENTRY_ACL_TYPE_DEFAULT) {
+			ret = add_pax_acl(a, entry_original, pax,
+			    ARCHIVE_ENTRY_ACL_TYPE_DEFAULT |
+			    ARCHIVE_ENTRY_ACL_STYLE_EXTRA_ID |
+			    ARCHIVE_ENTRY_ACL_STYLE_SEPARATOR_COMMA);
+			if (ret == ARCHIVE_FATAL)
 				return (ARCHIVE_FATAL);
-			}
-			archive_set_error(&a->archive,
-			    ARCHIVE_ERRNO_FILE_FORMAT,
-			    "Can't translate ACL.default to UTF-8");
-			ret = ARCHIVE_WARN;
-		} else if (p != NULL && *p != '\0') {
-			add_pax_attr(&(pax->pax_header),
-			    "SCHILY.acl.default", p);
 		}
 
 		/* We use GNU-tar-compatible sparse attributes. */
diff --git a/libarchive/archive_write_set_format_shar.c b/libarchive/archive_write_set_format_shar.c
index c033fb3..5be310a 100644
--- a/libarchive/archive_write_set_format_shar.c
+++ b/libarchive/archive_write_set_format_shar.c
@@ -113,12 +113,11 @@ archive_write_set_format_shar(struct archive *_a)
 	if (a->format_free != NULL)
 		(a->format_free)(a);
 
-	shar = (struct shar *)malloc(sizeof(*shar));
+	shar = (struct shar *)calloc(1, sizeof(*shar));
 	if (shar == NULL) {
 		archive_set_error(&a->archive, ENOMEM, "Can't allocate shar data");
 		return (ARCHIVE_FATAL);
 	}
-	memset(shar, 0, sizeof(*shar));
 	archive_string_init(&shar->work);
 	archive_string_init(&shar->quoted_name);
 	a->format_data = shar;
diff --git a/libarchive/archive_write_set_format_ustar.c b/libarchive/archive_write_set_format_ustar.c
index 484ab34..c54aeab 100644
--- a/libarchive/archive_write_set_format_ustar.c
+++ b/libarchive/archive_write_set_format_ustar.c
@@ -114,9 +114,9 @@ static const char template_header[] = {
 	'0','0','0','0','0','0', ' ','\0',
 	/* gid, space-null termination: 8 bytes */
 	'0','0','0','0','0','0', ' ','\0',
-	/* size, space termation: 12 bytes */
+	/* size, space termination: 12 bytes */
 	'0','0','0','0','0','0','0','0','0','0','0', ' ',
-	/* mtime, space termation: 12 bytes */
+	/* mtime, space termination: 12 bytes */
 	'0','0','0','0','0','0','0','0','0','0','0', ' ',
 	/* Initial checksum value: 8 spaces */
 	' ',' ',' ',' ',' ',' ',' ',' ',
@@ -184,13 +184,12 @@ archive_write_set_format_ustar(struct archive *_a)
 		return (ARCHIVE_FATAL);
 	}
 
-	ustar = (struct ustar *)malloc(sizeof(*ustar));
+	ustar = (struct ustar *)calloc(1, sizeof(*ustar));
 	if (ustar == NULL) {
 		archive_set_error(&a->archive, ENOMEM,
 		    "Can't allocate ustar data");
 		return (ARCHIVE_FATAL);
 	}
-	memset(ustar, 0, sizeof(*ustar));
 	a->format_data = ustar;
 	a->format_name = "ustar";
 	a->format_options = archive_write_ustar_options;
@@ -307,7 +306,7 @@ archive_write_ustar_header(struct archive_write *a, struct archive_entry *entry)
 		 * case getting WCS failed. On POSIX, this is a
 		 * normal operation.
 		 */
-		if (p != NULL && p[strlen(p) - 1] != '/') {
+		if (p != NULL && p[0] != '\0' && p[strlen(p) - 1] != '/') {
 			struct archive_string as;
 
 			archive_string_init(&as);
@@ -336,7 +335,7 @@ archive_write_ustar_header(struct archive_write *a, struct archive_entry *entry)
 	}
 
 #if defined(_WIN32) && !defined(__CYGWIN__)
-	/* Make sure the path separators in pahtname, hardlink and symlink
+	/* Make sure the path separators in pathname, hardlink and symlink
 	 * are all slash '/', not the Windows path separator '\'. */
 	entry_main = __la_win_entry_in_posix_pathseparator(entry);
 	if (entry_main == NULL) {
diff --git a/libarchive/archive_write_set_format_v7tar.c b/libarchive/archive_write_set_format_v7tar.c
index 17efbaf..62b1522 100644
--- a/libarchive/archive_write_set_format_v7tar.c
+++ b/libarchive/archive_write_set_format_v7tar.c
@@ -98,9 +98,9 @@ static const char template_header[] = {
 	'0','0','0','0','0','0', ' ','\0',
 	/* gid, space-null termination: 8 bytes */
 	'0','0','0','0','0','0', ' ','\0',
-	/* size, space termation: 12 bytes */
+	/* size, space termination: 12 bytes */
 	'0','0','0','0','0','0','0','0','0','0','0', ' ',
-	/* mtime, space termation: 12 bytes */
+	/* mtime, space termination: 12 bytes */
 	'0','0','0','0','0','0','0','0','0','0','0', ' ',
 	/* Initial checksum value: 8 spaces */
 	' ',' ',' ',' ',' ',' ',' ',' ',
@@ -161,13 +161,12 @@ archive_write_set_format_v7tar(struct archive *_a)
 		return (ARCHIVE_FATAL);
 	}
 
-	v7tar = (struct v7tar *)malloc(sizeof(*v7tar));
+	v7tar = (struct v7tar *)calloc(1, sizeof(*v7tar));
 	if (v7tar == NULL) {
 		archive_set_error(&a->archive, ENOMEM,
 		    "Can't allocate v7tar data");
 		return (ARCHIVE_FATAL);
 	}
-	memset(v7tar, 0, sizeof(*v7tar));
 	a->format_data = v7tar;
 	a->format_name = "tar (non-POSIX)";
 	a->format_options = archive_write_v7tar_options;
@@ -314,7 +313,7 @@ archive_write_v7tar_header(struct archive_write *a, struct archive_entry *entry)
 	}
 
 #if defined(_WIN32) && !defined(__CYGWIN__)
-	/* Make sure the path separators in pahtname, hardlink and symlink
+	/* Make sure the path separators in pathname, hardlink and symlink
 	 * are all slash '/', not the Windows path separator '\'. */
 	entry_main = __la_win_entry_in_posix_pathseparator(entry);
 	if (entry_main == NULL) {
diff --git a/libarchive/archive_write_set_format_warc.c b/libarchive/archive_write_set_format_warc.c
index ea66929..8b6daf9 100644
--- a/libarchive/archive_write_set_format_warc.c
+++ b/libarchive/archive_write_set_format_warc.c
@@ -79,7 +79,7 @@ typedef enum {
 	WT_RVIS,
 	/* conversion, unsupported */
 	WT_CONV,
-	/* continutation, unsupported at the moment */
+	/* continuation, unsupported at the moment */
 	WT_CONT,
 	/* invalid type */
 	LAST_WT
diff --git a/libarchive/archive_write_set_format_xar.c b/libarchive/archive_write_set_format_xar.c
index a2dbc03..495f0d4 100644
--- a/libarchive/archive_write_set_format_xar.c
+++ b/libarchive/archive_write_set_format_xar.c
@@ -63,7 +63,7 @@ __FBSDID("$FreeBSD$");
  * - When writing an XML element <link type="<file-type>">, <file-type>
  *   which is a file type a symbolic link is referencing is always marked
  *   as "broken". Xar utility uses stat(2) to get the file type, but, in
- *   libarcive format writer, we should not use it; if it is needed, we
+ *   libarchive format writer, we should not use it; if it is needed, we
  *   should get about it at archive_read_disk.c.
  * - It is possible to appear both <flags> and <ext2> elements.
  *   Xar utility generates <flags> on BSD platform and <ext2> on Linux
@@ -192,7 +192,7 @@ struct file {
 	struct file		*parent;	/* parent directory entry */
 	/*
 	 * To manage sub directory files.
-	 * We use 'chnext' a menber of struct file to chain.
+	 * We use 'chnext' (a member of struct file) to chain.
 	 */
 	struct {
 		struct file	*first;
@@ -258,7 +258,7 @@ struct xar {
 	/*
 	 * The list of all file entries is used to manage struct file
 	 * objects.
-	 * We use 'next' a menber of struct file to chain.
+	 * We use 'next' (a member of struct file) to chain.
 	 */
 	struct {
 		struct file	*first;
@@ -266,7 +266,7 @@ struct xar {
 	}			 file_list;
 	/*
 	 * The list of hard-linked file entries.
-	 * We use 'hlnext' a menber of struct file to chain.
+	 * We use 'hlnext' (a member of struct file) to chain.
 	 */
 	struct archive_rb_tree	 hardlink_rbtree;
 };
@@ -1227,7 +1227,7 @@ make_file_entry(struct archive_write *a, xmlTextWriterPtr writer,
 	case AE_IFLNK:
 		/*
 		 * xar utility has checked a file type, which
-		 * a symblic-link file has referenced.
+		 * a symbolic-link file has referenced.
 		 * For example:
 		 *   <link type="directory">../ref/</link>
 		 *   The symlink target file is "../ref/" and its
@@ -1237,8 +1237,8 @@ make_file_entry(struct archive_write *a, xmlTextWriterPtr writer,
 		 *   The symlink target file is "../f" and its
 		 *   file type is a regular file.
 		 *
-		 * But our implemention cannot do it, and then we
-		 * always record that a attribute "type" is "borken",
+		 * But our implementation cannot do it, and then we
+		 * always record that a attribute "type" is "broken",
 		 * for example:
 		 *   <link type="broken">foo/bar</link>
 		 *   It means "foo/bar" is not reachable.
@@ -1544,7 +1544,7 @@ make_toc(struct archive_write *a)
 	}
 
 	/*
-	 * Start recoding TOC
+	 * Start recording TOC
 	 */
 	r = xmlTextWriterStartElement(writer, BAD_CAST("xar"));
 	if (r < 0) {
@@ -1961,6 +1961,7 @@ file_free(struct file *file)
 	archive_string_free(&(file->basename));
 	archive_string_free(&(file->symlink));
 	archive_string_free(&(file->script));
+	archive_entry_free(file->entry);
 	free(file);
 }
 
@@ -2484,7 +2485,7 @@ file_connect_hardlink_files(struct xar *xar)
 		archive_entry_set_nlink(target->entry, hl->nlink);
 		if (hl->nlink > 1)
 			/* It means this file is a hardlink
-			 * targe itself. */
+			 * target itself. */
 			target->hardlink_target = target;
 		for (nf = target->hlnext;
 		    nf != NULL; nf = nf->hlnext) {
@@ -2913,7 +2914,7 @@ compression_init_encoder_xz(struct archive *a,
 	*strm = lzma_init_data;
 #ifdef HAVE_LZMA_STREAM_ENCODER_MT
 	if (threads > 1) {
-		bzero(&mt_options, sizeof(mt_options));
+		memset(&mt_options, 0, sizeof(mt_options));
 		mt_options.threads = threads;
 		mt_options.timeout = 300;
 		mt_options.filters = lzmafilters;
diff --git a/libarchive/archive_write_set_format_zip.c b/libarchive/archive_write_set_format_zip.c
index e4edb81..f69b846 100644
--- a/libarchive/archive_write_set_format_zip.c
+++ b/libarchive/archive_write_set_format_zip.c
@@ -592,7 +592,7 @@ archive_write_zip_header(struct archive_write *a, struct archive_entry *entry)
 
 
 #if defined(_WIN32) && !defined(__CYGWIN__)
-	/* Make sure the path separators in pahtname, hardlink and symlink
+	/* Make sure the path separators in pathname, hardlink and symlink
 	 * are all slash '/', not the Windows path separator '\'. */
 	zip->entry = __la_win_entry_in_posix_pathseparator(entry);
 	if (zip->entry == entry)
@@ -878,7 +878,7 @@ archive_write_zip_header(struct archive_write *a, struct archive_entry *entry)
 	        || zip->entry_encryption == ENCRYPTION_WINZIP_AES256)) {
 
 		memcpy(e, "\001\231\007\000\001\000AE", 8);
-		/* AES vendoer version AE-2 does not store a CRC.
+		/* AES vendor version AE-2 does not store a CRC.
 		 * WinZip 11 uses AE-1, which does store the CRC,
 		 * but it does not store the CRC when the file size
 		 * is less than 20 bytes. So we simulate what
@@ -1013,7 +1013,7 @@ archive_write_zip_data(struct archive_write *a, const void *buff, size_t s)
 	if (zip->entry_flags & ZIP_ENTRY_FLAG_ENCRYPTED) {
 		switch (zip->entry_encryption) {
 		case ENCRYPTION_TRADITIONAL:
-			/* Initialize traditoinal PKWARE encryption context. */
+			/* Initialize traditional PKWARE encryption context. */
 			if (!zip->tctx_valid) {
 				ret = init_traditional_pkware_encryption(a);
 				if (ret != ARCHIVE_OK)
@@ -1499,7 +1499,7 @@ trad_enc_update_keys(struct trad_enc_ctx *ctx, uint8_t c)
 }
 
 static uint8_t
-trad_enc_decypt_byte(struct trad_enc_ctx *ctx)
+trad_enc_decrypt_byte(struct trad_enc_ctx *ctx)
 {
 	unsigned temp = ctx->keys[2] | 2;
 	return (uint8_t)((temp * (temp ^ 1)) >> 8) & 0xff;
@@ -1515,7 +1515,7 @@ trad_enc_encrypt_update(struct trad_enc_ctx *ctx, const uint8_t *in,
 
 	for (i = 0; i < max; i++) {
 		uint8_t t = in[i];
-		out[i] = t ^ trad_enc_decypt_byte(ctx);
+		out[i] = t ^ trad_enc_decrypt_byte(ctx);
 		trad_enc_update_keys(ctx, t);
 	}
 	return i;
@@ -1626,7 +1626,7 @@ init_winzip_aes_encryption(struct archive_write *a)
 		return (ARCHIVE_FAILED);
         }
 
-	/* Set a passowrd verification value after the 'salt'. */
+	/* Set a password verification value after the 'salt'. */
 	salt[salt_len] = derived_key[key_len * 2];
 	salt[salt_len + 1] = derived_key[key_len * 2 + 1];
 
diff --git a/libarchive/config_freebsd.h b/libarchive/config_freebsd.h
index 2073431..215e886 100644
--- a/libarchive/config_freebsd.h
+++ b/libarchive/config_freebsd.h
@@ -28,6 +28,7 @@
 /* FreeBSD 5.0 and later have ACL and extattr support. */
 #if __FreeBSD__ > 4
 #define	HAVE_ACL_CREATE_ENTRY 1
+#define	HAVE_ACL_GET_FD_NP 1
 #define	HAVE_ACL_GET_LINK_NP 1
 #define	HAVE_ACL_GET_PERM_NP 1
 #define	HAVE_ACL_INIT 1
@@ -39,6 +40,7 @@
 #define	HAVE_EXTATTR_LIST_FILE 1
 #define	HAVE_EXTATTR_SET_FD 1
 #define	HAVE_EXTATTR_SET_FILE 1
+#define	HAVE_STRUCT_XVFSCONF 1
 #define	HAVE_SYS_ACL_H 1
 #define	HAVE_SYS_EXTATTR_H 1
 #endif
diff --git a/libarchive/libarchive-formats.5 b/libarchive/libarchive-formats.5
index 9cec760..62359dd 100644
--- a/libarchive/libarchive-formats.5
+++ b/libarchive/libarchive-formats.5
@@ -24,7 +24,7 @@
 .\"
 .\" $FreeBSD$
 .\"
-.Dd March 18, 2012
+.Dd December 27, 2016
 .Dt LIBARCHIVE-FORMATS 5
 .Os
 .Sh NAME
@@ -191,8 +191,6 @@ and device numbers.
 .It Solaris extensions
 Libarchive recognizes ACL and extended attribute records written
 by Solaris tar.
-Currently, libarchive only has support for old-style ACLs; the
-newer NFSv4 ACLs are recognized but discarded.
 .El
 .Pp
 The first tar program appeared in Seventh Edition Unix in 1979.
diff --git a/libarchive/tar.5 b/libarchive/tar.5
index 6e6f0c0..30b837d 100644
--- a/libarchive/tar.5
+++ b/libarchive/tar.5
@@ -1,4 +1,5 @@
 .\" Copyright (c) 2003-2009 Tim Kientzle
+.\" Copyright (c) 2016 Martin Matuska
 .\" All rights reserved.
 .\"
 .\" Redistribution and use in source and binary forms, with or without
@@ -24,7 +25,7 @@
 .\"
 .\" $FreeBSD$
 .\"
-.Dd December 23, 2011
+.Dd December 27, 2016
 .Dt TAR 5
 .Os
 .Sh NAME
@@ -440,11 +441,11 @@ archives to store files much larger than the historic 8GB limit.
 Vendor-specific attributes used by Joerg Schilling's
 .Nm star
 implementation.
-.It Cm SCHILY.acl.access , Cm SCHILY.acl.default
-Stores the access and default ACLs as textual strings in a format
+.It Cm SCHILY.acl.access , Cm SCHILY.acl.default, Cm SCHILY.acl.ace
+Stores the access, default and NFSv4 ACLs as textual strings in a format
 that is an extension of the format specified by POSIX.1e draft 17.
-In particular, each user or group access specification can include a fourth
-colon-separated field with the numeric UID or GID.
+In particular, each user or group access specification can include
+an additional colon-separated field with the numeric UID or GID.
 This allows ACLs to be restored on systems that may not have complete
 user or group information available (such as when NIS/YP or LDAP services
 are temporarily unavailable).
diff --git a/libarchive/xxhash.c b/libarchive/xxhash.c
index d7f8e96..6f5ba52 100644
--- a/libarchive/xxhash.c
+++ b/libarchive/xxhash.c
@@ -29,10 +29,11 @@ OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
 You can contact the author at :
 - xxHash source repository : http://code.google.com/p/xxhash/
 */
+#include "archive_platform.h"
+
 #include <stdlib.h>
 #include <string.h>
 
-#include "archive_platform.h"
 #include "archive_xxhash.h"
 
 #ifdef HAVE_LIBLZ4
@@ -60,7 +61,7 @@ You can contact the author at :
 ** By default, xxHash library provides endian-independent Hash values, based on little-endian convention.
 ** Results are therefore identical for little-endian and big-endian CPU.
 ** This comes at a performance cost for big-endian CPU, since some swapping is required to emulate little-endian format.
-** Should endian-independance be of no importance for your application, you may set the #define below to 1.
+** Should endian-independence be of no importance for your application, you may set the #define below to 1.
 ** It will improve speed for Big-endian CPU.
 ** This option has no impact on Little_Endian CPU.
 */

https://cmake.org/gitweb?p=cmake.git;a=commitdiff;h=cdce7c619c58ec0947c036b93013445bb93e4be8
commit cdce7c619c58ec0947c036b93013445bb93e4be8
Author:     Brad King <brad.king at kitware.com>
AuthorDate: Mon Feb 20 07:49:59 2017 -0500
Commit:     Brad King <brad.king at kitware.com>
CommitDate: Mon Feb 20 07:50:23 2017 -0500

    libarchive: Update script to get 3.3.0

diff --git a/Utilities/Scripts/update-libarchive.bash b/Utilities/Scripts/update-libarchive.bash
index 3b42269..6c4eeb0 100755
--- a/Utilities/Scripts/update-libarchive.bash
+++ b/Utilities/Scripts/update-libarchive.bash
@@ -8,7 +8,7 @@ readonly name="LibArchive"
 readonly ownership="LibArchive Upstream <libarchive-discuss at googlegroups.com>"
 readonly subtree="Utilities/cmlibarchive"
 readonly repo="https://github.com/libarchive/libarchive.git"
-readonly tag="master"
+readonly tag="v3.3.0"
 readonly shortlog=false
 readonly paths="
   CMakeLists.txt

-----------------------------------------------------------------------

Summary of changes:
 CMakeLists.txt                                     |   24 +-
 Utilities/Scripts/update-libarchive.bash           |    2 +-
 Utilities/cmlibarchive/CMakeLists.txt              |  132 +-
 .../build/cmake/CheckStructMember.cmake            |   43 -
 Utilities/cmlibarchive/build/cmake/FindLZMA.cmake  |   48 -
 Utilities/cmlibarchive/build/cmake/config.h.in     |   18 +
 Utilities/cmlibarchive/build/version               |    2 +-
 Utilities/cmlibarchive/libarchive/CMakeLists.txt   |   18 +
 Utilities/cmlibarchive/libarchive/archive.h        |   16 +-
 Utilities/cmlibarchive/libarchive/archive_acl.c    | 1639 +++++++++++++++-----
 .../cmlibarchive/libarchive/archive_acl_private.h  |   22 +-
 .../cmlibarchive/libarchive/archive_cryptor.c      |    3 +-
 Utilities/cmlibarchive/libarchive/archive_entry.c  |  124 +-
 Utilities/cmlibarchive/libarchive/archive_entry.h  |   91 +-
 .../cmlibarchive/libarchive/archive_entry_acl.3    |  335 +++-
 .../cmlibarchive/libarchive/archive_entry_locale.h |   10 +-
 .../libarchive/archive_entry_strmode.c             |    2 +-
 Utilities/cmlibarchive/libarchive/archive_match.c  |   14 +-
 .../libarchive/archive_openssl_evp_private.h       |    5 +-
 .../libarchive/archive_openssl_hmac_private.h      |    6 +-
 .../cmlibarchive/libarchive/archive_options.c      |   11 +-
 .../cmlibarchive/libarchive/archive_platform.h     |   28 +-
 .../libarchive/archive_ppmd7_private.h             |    2 +-
 Utilities/cmlibarchive/libarchive/archive_random.c |    2 +-
 Utilities/cmlibarchive/libarchive/archive_rb.c     |    2 +-
 Utilities/cmlibarchive/libarchive/archive_read.c   |   16 +-
 .../libarchive/archive_read_add_passphrase.c       |   22 +-
 .../libarchive/archive_read_append_filter.c        |    2 -
 .../cmlibarchive/libarchive/archive_read_disk.3    |    6 +-
 .../libarchive/archive_read_disk_entry_from_file.c | 1066 +++++++++++--
 .../libarchive/archive_read_disk_posix.c           |   71 +-
 .../archive_read_disk_set_standard_lookup.c        |    2 +
 .../libarchive/archive_read_disk_windows.c         |   29 +-
 .../libarchive/archive_read_extract2.c             |    3 +-
 .../libarchive/archive_read_open_filename.c        |   20 +-
 .../libarchive/archive_read_open_memory.c          |    3 +-
 .../cmlibarchive/libarchive/archive_read_private.h |    3 +-
 .../libarchive/archive_read_support_filter_lz4.c   |   13 +-
 .../libarchive/archive_read_support_filter_lzop.c  |    2 +-
 .../archive_read_support_filter_program.c          |    2 +
 .../libarchive/archive_read_support_filter_uu.c    |   44 +-
 .../libarchive/archive_read_support_filter_xz.c    |  194 +--
 .../libarchive/archive_read_support_format_7zip.c  |   39 +-
 .../libarchive/archive_read_support_format_ar.c    |   22 +-
 .../libarchive/archive_read_support_format_cab.c   |   15 +-
 .../libarchive/archive_read_support_format_cpio.c  |   17 +-
 .../archive_read_support_format_iso9660.c          |   40 +-
 .../libarchive/archive_read_support_format_lha.c   |   13 +-
 .../libarchive/archive_read_support_format_mtree.c |   71 +-
 .../libarchive/archive_read_support_format_rar.c   |    5 +-
 .../libarchive/archive_read_support_format_tar.c   |  281 +++-
 .../libarchive/archive_read_support_format_warc.c  |  239 +--
 .../libarchive/archive_read_support_format_xar.c   |   87 +-
 .../libarchive/archive_read_support_format_zip.c   |  158 +-
 Utilities/cmlibarchive/libarchive/archive_string.c |  117 +-
 Utilities/cmlibarchive/libarchive/archive_string.h |    8 +-
 .../libarchive/archive_string_composition.h        |    2 +-
 Utilities/cmlibarchive/libarchive/archive_util.c   |    2 +-
 .../cmlibarchive/libarchive/archive_windows.c      |    4 +-
 .../cmlibarchive/libarchive/archive_windows.h      |    4 +
 Utilities/cmlibarchive/libarchive/archive_write.c  |    8 +-
 .../libarchive/archive_write_add_filter_lz4.c      |    4 +-
 .../libarchive/archive_write_add_filter_program.c  |    1 +
 .../libarchive/archive_write_add_filter_xz.c       |    2 +-
 .../libarchive/archive_write_disk_acl.c            |  545 ++++++-
 .../libarchive/archive_write_disk_posix.c          |  533 +++++--
 .../archive_write_disk_set_standard_lookup.c       |    6 +-
 .../libarchive/archive_write_disk_windows.c        |    7 +-
 .../cmlibarchive/libarchive/archive_write_open.3   |   11 +
 .../libarchive/archive_write_open_memory.c         |    3 +-
 .../libarchive/archive_write_set_format_7zip.c     |    4 +-
 .../libarchive/archive_write_set_format_ar.c       |    3 +-
 .../libarchive/archive_write_set_format_cpio.c     |    2 +-
 .../archive_write_set_format_cpio_newc.c           |    5 +-
 .../libarchive/archive_write_set_format_gnutar.c   |   14 +-
 .../libarchive/archive_write_set_format_iso9660.c  |   58 +-
 .../libarchive/archive_write_set_format_mtree.c    |    4 +-
 .../libarchive/archive_write_set_format_pax.c      |  183 ++-
 .../libarchive/archive_write_set_format_shar.c     |    3 +-
 .../libarchive/archive_write_set_format_ustar.c    |   11 +-
 .../libarchive/archive_write_set_format_v7tar.c    |    9 +-
 .../libarchive/archive_write_set_format_warc.c     |    2 +-
 .../libarchive/archive_write_set_format_xar.c      |   21 +-
 .../libarchive/archive_write_set_format_zip.c      |   12 +-
 Utilities/cmlibarchive/libarchive/config_freebsd.h |    2 +
 .../cmlibarchive/libarchive/libarchive-formats.5   |    4 +-
 Utilities/cmlibarchive/libarchive/tar.5            |   11 +-
 Utilities/cmlibarchive/libarchive/xxhash.c         |    6 +-
 88 files changed, 4714 insertions(+), 1981 deletions(-)
 delete mode 100644 Utilities/cmlibarchive/build/cmake/CheckStructMember.cmake
 delete mode 100644 Utilities/cmlibarchive/build/cmake/FindLZMA.cmake


hooks/post-receive
-- 
CMake


More information about the Cmake-commits mailing list