Home | History | Annotate | Line # | Download | only in pax
options.h revision 1.8
      1  1.8    agc /*	$NetBSD: options.h,v 1.8 2003/08/07 09:05:21 agc Exp $	*/
      2  1.3    cgd 
      3  1.1    jtc /*-
      4  1.1    jtc  * Copyright (c) 1992, 1993
      5  1.1    jtc  *	The Regents of the University of California.  All rights reserved.
      6  1.8    agc  *
      7  1.8    agc  * This code is derived from software contributed to Berkeley by
      8  1.8    agc  * Keith Muller of the University of California, San Diego.
      9  1.8    agc  *
     10  1.8    agc  * Redistribution and use in source and binary forms, with or without
     11  1.8    agc  * modification, are permitted provided that the following conditions
     12  1.8    agc  * are met:
     13  1.8    agc  * 1. Redistributions of source code must retain the above copyright
     14  1.8    agc  *    notice, this list of conditions and the following disclaimer.
     15  1.8    agc  * 2. Redistributions in binary form must reproduce the above copyright
     16  1.8    agc  *    notice, this list of conditions and the following disclaimer in the
     17  1.8    agc  *    documentation and/or other materials provided with the distribution.
     18  1.8    agc  * 3. Neither the name of the University nor the names of its contributors
     19  1.8    agc  *    may be used to endorse or promote products derived from this software
     20  1.8    agc  *    without specific prior written permission.
     21  1.8    agc  *
     22  1.8    agc  * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
     23  1.8    agc  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
     24  1.8    agc  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
     25  1.8    agc  * ARE DISCLAIMED.  IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
     26  1.8    agc  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
     27  1.8    agc  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
     28  1.8    agc  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
     29  1.8    agc  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
     30  1.8    agc  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
     31  1.8    agc  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
     32  1.8    agc  * SUCH DAMAGE.
     33  1.8    agc  *
     34  1.8    agc  *	@(#)options.h	8.2 (Berkeley) 4/18/94
     35  1.8    agc  */
     36  1.8    agc 
     37  1.8    agc /*-
     38  1.8    agc  * Copyright (c) 1992 Keith Muller.
     39  1.1    jtc  *
     40  1.1    jtc  * This code is derived from software contributed to Berkeley by
     41  1.1    jtc  * Keith Muller of the University of California, San Diego.
     42  1.1    jtc  *
     43  1.1    jtc  * Redistribution and use in source and binary forms, with or without
     44  1.1    jtc  * modification, are permitted provided that the following conditions
     45  1.1    jtc  * are met:
     46  1.1    jtc  * 1. Redistributions of source code must retain the above copyright
     47  1.1    jtc  *    notice, this list of conditions and the following disclaimer.
     48  1.1    jtc  * 2. Redistributions in binary form must reproduce the above copyright
     49  1.1    jtc  *    notice, this list of conditions and the following disclaimer in the
     50  1.1    jtc  *    documentation and/or other materials provided with the distribution.
     51  1.1    jtc  * 3. All advertising materials mentioning features or use of this software
     52  1.1    jtc  *    must display the following acknowledgement:
     53  1.1    jtc  *	This product includes software developed by the University of
     54  1.1    jtc  *	California, Berkeley and its contributors.
     55  1.1    jtc  * 4. Neither the name of the University nor the names of its contributors
     56  1.1    jtc  *    may be used to endorse or promote products derived from this software
     57  1.1    jtc  *    without specific prior written permission.
     58  1.1    jtc  *
     59  1.1    jtc  * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
     60  1.1    jtc  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
     61  1.1    jtc  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
     62  1.1    jtc  * ARE DISCLAIMED.  IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
     63  1.1    jtc  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
     64  1.1    jtc  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
     65  1.1    jtc  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
     66  1.1    jtc  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
     67  1.1    jtc  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
     68  1.1    jtc  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
     69  1.1    jtc  * SUCH DAMAGE.
     70  1.1    jtc  *
     71  1.3    cgd  *	@(#)options.h	8.2 (Berkeley) 4/18/94
     72  1.1    jtc  */
     73  1.1    jtc 
     74  1.1    jtc /*
     75  1.1    jtc  * argv[0] names. Used for tar and cpio emulation
     76  1.1    jtc  */
     77  1.1    jtc 
     78  1.1    jtc #define NM_TAR  "tar"
     79  1.1    jtc #define NM_CPIO "cpio"
     80  1.1    jtc #define NM_PAX  "pax"
     81  1.1    jtc 
     82  1.1    jtc /*
     83  1.1    jtc  * Constants used to specify the legal sets of flags in pax. For each major
     84  1.1    jtc  * operation mode of pax, a set of illegal flags is defined. If any one of
     85  1.1    jtc  * those illegal flags are found set, we scream and exit
     86  1.1    jtc  */
     87  1.1    jtc #define NONE	"none"
     88  1.1    jtc 
     89  1.1    jtc /*
     90  1.1    jtc  * flags (one for each option).
     91  1.1    jtc  */
     92  1.1    jtc #define	AF	0x00000001
     93  1.1    jtc #define	BF	0x00000002
     94  1.1    jtc #define	CF	0x00000004
     95  1.1    jtc #define	DF	0x00000008
     96  1.1    jtc #define	FF	0x00000010
     97  1.1    jtc #define	IF	0x00000020
     98  1.1    jtc #define	KF	0x00000040
     99  1.1    jtc #define	LF	0x00000080
    100  1.1    jtc #define	NF	0x00000100
    101  1.1    jtc #define	OF	0x00000200
    102  1.1    jtc #define	PF	0x00000400
    103  1.1    jtc #define	RF	0x00000800
    104  1.1    jtc #define	SF	0x00001000
    105  1.1    jtc #define	TF	0x00002000
    106  1.1    jtc #define	UF	0x00004000
    107  1.1    jtc #define	VF	0x00008000
    108  1.1    jtc #define	WF	0x00010000
    109  1.1    jtc #define	XF	0x00020000
    110  1.4   tron #define	CAF	0x00040000	/* nonstandard extension */
    111  1.4   tron #define	CBF	0x00080000	/* nonstandard extension */
    112  1.4   tron #define	CDF	0x00100000	/* nonstandard extension */
    113  1.4   tron #define	CEF	0x00200000	/* nonstandard extension */
    114  1.4   tron #define	CGF	0x00400000	/* nonstandard extension */
    115  1.4   tron #define	CHF	0x00800000	/* nonstandard extension */
    116  1.4   tron #define	CLF	0x01000000	/* nonstandard extension */
    117  1.7  lukem #define	CMF	0x02000000	/* nonstandard extension */
    118  1.7  lukem #define	CPF	0x04000000	/* nonstandard extension */
    119  1.7  lukem #define	CTF	0x08000000	/* nonstandard extension */
    120  1.7  lukem #define	CUF	0x10000000	/* nonstandard extension */
    121  1.7  lukem #define	CXF	0x20000000
    122  1.7  lukem #define	CYF	0x40000000	/* nonstandard extension */
    123  1.7  lukem #define	CZF	0x80000000	/* nonstandard extension */
    124  1.1    jtc 
    125  1.1    jtc /*
    126  1.1    jtc  * ascii string indexed by bit position above (alter the above and you must
    127  1.1    jtc  * alter this string) used to tell the user what flags caused us to complain
    128  1.1    jtc  */
    129  1.7  lukem #define FLGCH	"abcdfiklnoprstuvwxABDEGHLMPTUXYZ"
    130  1.1    jtc 
    131  1.1    jtc /*
    132  1.1    jtc  * legal pax operation bit patterns
    133  1.1    jtc  */
    134  1.1    jtc 
    135  1.1    jtc #define ISLIST(x)	(((x) & (RF|WF)) == 0)
    136  1.1    jtc #define	ISEXTRACT(x)	(((x) & (RF|WF)) == RF)
    137  1.1    jtc #define ISARCHIVE(x)	(((x) & (AF|RF|WF)) == WF)
    138  1.1    jtc #define ISAPPND(x)	(((x) & (AF|RF|WF)) == (AF|WF))
    139  1.1    jtc #define	ISCOPY(x)	(((x) & (RF|WF)) == (RF|WF))
    140  1.1    jtc #define	ISWRITE(x)	(((x) & (RF|WF)) == WF)
    141  1.1    jtc 
    142  1.1    jtc /*
    143  1.1    jtc  * Illegal option flag subsets based on pax operation
    144  1.1    jtc  */
    145  1.1    jtc 
    146  1.7  lukem #define	BDEXTR	(AF|BF|LF|TF|WF|XF|CBF|CHF|CLF|CMF|CPF|CXF)
    147  1.6    mrg #define	BDARCH	(CF|KF|LF|NF|PF|RF|CDF|CEF|CYF|CZF)
    148  1.6    mrg #define	BDCOPY	(AF|BF|FF|OF|XF|CAF|CBF|CEF)
    149  1.7  lukem #define	BDLIST (AF|BF|IF|KF|LF|OF|PF|RF|TF|UF|WF|XF|CBF|CDF|CHF|CLF|CMF|CPF|CXF|CYF|CZF)
    150