X-Git-Url: https://wimlib.net/git/?p=wimlib;a=blobdiff_plain;f=src%2Fcapture_common.c;fp=src%2Fcapture_common.c;h=ee051aea8c52c87a3333644482de3163b24b22a0;hp=0fa71adcbd898c5980a85ff42138cc3bef06f3ae;hb=b87b3beaacd32c045ab77dc56c6b90677d882830;hpb=f03f71aeaedbe90772338635cc221bf065f356c6 diff --git a/src/capture_common.c b/src/capture_common.c index 0fa71adc..ee051aea 100644 --- a/src/capture_common.c +++ b/src/capture_common.c @@ -307,3 +307,36 @@ try_exclude(const tchar *full_path, const struct capture_params *params) return 0; } + +/* + * Determine whether a directory entry of the specified name should be ignored. + * This is a lower level function which runs prior to try_exclude(). It handles + * the standard '.' and '..' entries, which show up in directory listings but + * should not be archived. It also checks for odd filenames that usually should + * not exist but could cause problems if archiving them were to be attempted. + */ +bool +should_ignore_filename(const tchar *name, const int name_nchars) +{ + if (name_nchars <= 0) { + WARNING("Ignoring empty filename"); + return true; + } + + if (name[0] == T('.') && + (name_nchars == 1 || (name_nchars == 2 && name[1] == T('.')))) + return true; + + for (int i = 0; i < name_nchars; i++) { + if (name[i] == T('\0')) { + WARNING("Ignoring filename containing embedded null character"); + return true; + } + if (name[i] == OS_PREFERRED_PATH_SEPARATOR) { + WARNING("Ignoring filename containing embedded path separator"); + return true; + } + } + + return false; +}