diff --git a/tests/CMakeLists.txt b/tests/CMakeLists.txt index 03588ca..1e515c4 100644 --- a/tests/CMakeLists.txt +++ b/tests/CMakeLists.txt @@ -39,6 +39,7 @@ file(COPY ${CMAKE_CURRENT_SOURCE_DIR}/data/mo540_v1.aif DESTINATION ${CMAKE_CURR file(COPY ${CMAKE_CURRENT_SOURCE_DIR}/data/mo540.aif DESTINATION ${CMAKE_CURRENT_BINARY_DIR}/data/) file(COPY ${CMAKE_CURRENT_SOURCE_DIR}/data/mo640_v1.aif DESTINATION ${CMAKE_CURRENT_BINARY_DIR}/data/) file(COPY ${CMAKE_CURRENT_SOURCE_DIR}/data/mo640.aif DESTINATION ${CMAKE_CURRENT_BINARY_DIR}/data/) +file(COPY ${CMAKE_CURRENT_SOURCE_DIR}/data/cdmode1_v1.aif DESTINATION ${CMAKE_CURRENT_BINARY_DIR}/data/) # Test executable (all unit tests) add_executable(tests_run crc64.cpp spamsum.cpp crc32.c crc32.h flac.cpp lzma.cpp sha256.cpp md5.cpp sha1.cpp open_image.cpp diff --git a/tests/data/cdmode1_v1.aif b/tests/data/cdmode1_v1.aif new file mode 100755 index 0000000..969b54a Binary files /dev/null and b/tests/data/cdmode1_v1.aif differ diff --git a/tests/open_image.cpp b/tests/open_image.cpp index bb5db52..a50a75d 100644 --- a/tests/open_image.cpp +++ b/tests/open_image.cpp @@ -736,6 +736,67 @@ TEST_F(OpenImageFixture, open_mo640_v2) EXPECT_EQ(close_result, AARUF_STATUS_OK) << "Failed to close image"; } +TEST_F(OpenImageFixture, open_cdmode1_v1) +{ + char path[PATH_MAX]; + char filename[PATH_MAX]; + + getcwd(path, PATH_MAX); + snprintf(filename, PATH_MAX, "%s/data/cdmode1_v1.aif", path); + + // Attempt to open the image file + void *context = aaruf_open(filename); + + // Verify that the file was successfully opened + ASSERT_NE(context, nullptr) << "Failed to open cdmode1_v1.aif"; + + // Get image info to verify it's a valid image + ImageInfo image_info; + const int32_t result = aaruf_get_image_info(context, &image_info); + + ASSERT_EQ(result, AARUF_STATUS_OK) << "Failed to get image info"; + + // Basic sanity checks on the image info + ASSERT_EQ(image_info.HasPartitions, true) << "Image should not have partitions"; + ASSERT_EQ(image_info.HasSessions, true) << "Image should not have sessions"; + ASSERT_EQ(image_info.ImageSize, 4406638) << "Unexpected image size"; + ASSERT_EQ(image_info.Sectors, 9120) << "Unexpected number of sectors"; + ASSERT_EQ(image_info.SectorSize, 2048) << "Unexpected sector size"; + ASSERT_STREQ(image_info.Version, "1.0") << "Unexpected image version"; + ASSERT_STREQ(image_info.Application, "Aaru") << "Unexpected application name"; + ASSERT_STREQ(image_info.ApplicationVersion, "5.3") << "Unexpected application version"; + ASSERT_EQ(image_info.CreationTime, 134045761441240199ULL) << "Unexpected creation time"; + ASSERT_EQ(image_info.LastModificationTime, 134045761618355140ULL) << "Unexpected modification time"; + ASSERT_EQ(image_info.MediaType, 15) << "Unexpected media type"; + ASSERT_EQ(image_info.MetadataMediaType, 0) << "Unexpected metadata media type"; + + crc64_ctx *ctx = aaruf_crc64_init(); + uint64_t crc = 0; + void *ecc_context = aaruf_ecc_cd_init(); + + for(int i = 0; i < 9120; i++) + { + uint8_t buffer[2352]; + uint32_t length = sizeof(buffer); + + const int32_t read_result = aaruf_read_sector_long(context, i, false, buffer, &length); + EXPECT_EQ(read_result, AARUF_STATUS_OK) << "Failed to read sector " << i; + EXPECT_EQ(length, 2352U) << "Unexpected length for sector " << i; + aaruf_crc64_update(ctx, buffer, 2352); + EXPECT_EQ(aaruf_ecc_cd_is_suffix_correct(ecc_context, buffer), true) + << "CD sector " << i << " has invalid ECC suffix"; + } + + aaruf_crc64_final(ctx, &crc); + aaruf_crc64_free(ctx); + + ASSERT_EQ(crc, 0xAE1014831CD81711) << "Unexpected CRC64 for image data"; + + // Close the image + const int32_t close_result = aaruf_close(context); + EXPECT_EQ(close_result, AARUF_STATUS_OK) << "Failed to close image"; +} + // Test opening a non-existent file TEST_F(OpenImageFixture, OpenNonExistentFile) {