Add test for opening cdmode1_v1 image and verify its properties

This commit is contained in:
2025-10-10 15:36:55 +01:00
parent ffe9311a74
commit 20506c2066
3 changed files with 62 additions and 0 deletions

View File

@@ -39,6 +39,7 @@ file(COPY ${CMAKE_CURRENT_SOURCE_DIR}/data/mo540_v1.aif DESTINATION ${CMAKE_CURR
file(COPY ${CMAKE_CURRENT_SOURCE_DIR}/data/mo540.aif DESTINATION ${CMAKE_CURRENT_BINARY_DIR}/data/)
file(COPY ${CMAKE_CURRENT_SOURCE_DIR}/data/mo640_v1.aif DESTINATION ${CMAKE_CURRENT_BINARY_DIR}/data/)
file(COPY ${CMAKE_CURRENT_SOURCE_DIR}/data/mo640.aif DESTINATION ${CMAKE_CURRENT_BINARY_DIR}/data/)
file(COPY ${CMAKE_CURRENT_SOURCE_DIR}/data/cdmode1_v1.aif DESTINATION ${CMAKE_CURRENT_BINARY_DIR}/data/)
# Test executable (all unit tests)
add_executable(tests_run crc64.cpp spamsum.cpp crc32.c crc32.h flac.cpp lzma.cpp sha256.cpp md5.cpp sha1.cpp open_image.cpp

BIN
tests/data/cdmode1_v1.aif Executable file

Binary file not shown.

View File

@@ -736,6 +736,67 @@ TEST_F(OpenImageFixture, open_mo640_v2)
EXPECT_EQ(close_result, AARUF_STATUS_OK) << "Failed to close image";
}
TEST_F(OpenImageFixture, open_cdmode1_v1)
{
char path[PATH_MAX];
char filename[PATH_MAX];
getcwd(path, PATH_MAX);
snprintf(filename, PATH_MAX, "%s/data/cdmode1_v1.aif", path);
// Attempt to open the image file
void *context = aaruf_open(filename);
// Verify that the file was successfully opened
ASSERT_NE(context, nullptr) << "Failed to open cdmode1_v1.aif";
// Get image info to verify it's a valid image
ImageInfo image_info;
const int32_t result = aaruf_get_image_info(context, &image_info);
ASSERT_EQ(result, AARUF_STATUS_OK) << "Failed to get image info";
// Basic sanity checks on the image info
ASSERT_EQ(image_info.HasPartitions, true) << "Image should not have partitions";
ASSERT_EQ(image_info.HasSessions, true) << "Image should not have sessions";
ASSERT_EQ(image_info.ImageSize, 4406638) << "Unexpected image size";
ASSERT_EQ(image_info.Sectors, 9120) << "Unexpected number of sectors";
ASSERT_EQ(image_info.SectorSize, 2048) << "Unexpected sector size";
ASSERT_STREQ(image_info.Version, "1.0") << "Unexpected image version";
ASSERT_STREQ(image_info.Application, "Aaru") << "Unexpected application name";
ASSERT_STREQ(image_info.ApplicationVersion, "5.3") << "Unexpected application version";
ASSERT_EQ(image_info.CreationTime, 134045761441240199ULL) << "Unexpected creation time";
ASSERT_EQ(image_info.LastModificationTime, 134045761618355140ULL) << "Unexpected modification time";
ASSERT_EQ(image_info.MediaType, 15) << "Unexpected media type";
ASSERT_EQ(image_info.MetadataMediaType, 0) << "Unexpected metadata media type";
crc64_ctx *ctx = aaruf_crc64_init();
uint64_t crc = 0;
void *ecc_context = aaruf_ecc_cd_init();
for(int i = 0; i < 9120; i++)
{
uint8_t buffer[2352];
uint32_t length = sizeof(buffer);
const int32_t read_result = aaruf_read_sector_long(context, i, false, buffer, &length);
EXPECT_EQ(read_result, AARUF_STATUS_OK) << "Failed to read sector " << i;
EXPECT_EQ(length, 2352U) << "Unexpected length for sector " << i;
aaruf_crc64_update(ctx, buffer, 2352);
EXPECT_EQ(aaruf_ecc_cd_is_suffix_correct(ecc_context, buffer), true)
<< "CD sector " << i << " has invalid ECC suffix";
}
aaruf_crc64_final(ctx, &crc);
aaruf_crc64_free(ctx);
ASSERT_EQ(crc, 0xAE1014831CD81711) << "Unexpected CRC64 for image data";
// Close the image
const int32_t close_result = aaruf_close(context);
EXPECT_EQ(close_result, AARUF_STATUS_OK) << "Failed to close image";
}
// Test opening a non-existent file
TEST_F(OpenImageFixture, OpenNonExistentFile)
{