tool_metalink.c: Fixed validation of binary files containing EOF

Since Windows/MinGW threat 0x1A as the EOF character, reading binary
files which contain that byte does not work using text mode.
The read function will only read until the first 0x1A byte. This
means that the hash is not computed from the whole file and the
final validation check using hash comparision fails.
This commit is contained in:
Marc Hoersken 2012-09-11 01:42:58 +02:00
parent 8a57b3c972
commit a6df3550cf

View File

@ -339,7 +339,8 @@ static int check_hash(const char *filename,
digest_context *dctx;
int check_ok;
int fd;
fd = open(filename, O_RDONLY);
/* O_BINARY is required in order to avoid binary EOF in text mode */
fd = open(filename, O_RDONLY | O_BINARY);
if(fd == -1) {
fprintf(error, "Metalink: validating (%s) FAILED (%s)\n", filename,
strerror(errno));