summaryrefslogtreecommitdiff
path: root/package/source/zipapi/XFileStream.cxx
diff options
context:
space:
mode:
Diffstat (limited to 'package/source/zipapi/XFileStream.cxx')
-rw-r--r--package/source/zipapi/XFileStream.cxx227
1 files changed, 227 insertions, 0 deletions
diff --git a/package/source/zipapi/XFileStream.cxx b/package/source/zipapi/XFileStream.cxx
new file mode 100644
index 000000000000..9e7156ee82b3
--- /dev/null
+++ b/package/source/zipapi/XFileStream.cxx
@@ -0,0 +1,227 @@
+/*************************************************************************
+ *
+ * DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
+ *
+ * Copyright 2000, 2010 Oracle and/or its affiliates.
+ *
+ * OpenOffice.org - a multi-platform office productivity suite
+ *
+ * This file is part of OpenOffice.org.
+ *
+ * OpenOffice.org is free software: you can redistribute it and/or modify
+ * it under the terms of the GNU Lesser General Public License version 3
+ * only, as published by the Free Software Foundation.
+ *
+ * OpenOffice.org is distributed in the hope that it will be useful,
+ * but WITHOUT ANY WARRANTY; without even the implied warranty of
+ * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+ * GNU Lesser General Public License version 3 for more details
+ * (a copy is included in the LICENSE file that accompanied this code).
+ *
+ * You should have received a copy of the GNU Lesser General Public License
+ * version 3 along with OpenOffice.org. If not, see
+ * <http://www.openoffice.org/license.html>
+ * for a copy of the LGPLv3 License.
+ *
+ ************************************************************************/
+
+// MARKER(update_precomp.py): autogen include statement, do not remove
+#include "precompiled_package.hxx"
+#include <XFileStream.hxx>
+#include <EncryptionData.hxx>
+#include <com/sun/star/packages/zip/ZipConstants.hpp>
+#include <PackageConstants.hxx>
+#include <rtl/cipher.h>
+#include <ZipFile.hxx>
+#include <EncryptedDataHeader.hxx>
+#include <com/sun/star/io/XOutputStream.hpp>
+
+using namespace com::sun::star::packages::zip::ZipConstants;
+using namespace com::sun::star::io;
+using namespace com::sun::star::uno;
+using com::sun::star::lang::IllegalArgumentException;
+using ::rtl::OUString;
+
+XFileStream::XFileStream( ZipEntry & rEntry,
+ com::sun::star::uno::Reference < com::sun::star::io::XInputStream > xNewZipStream,
+ com::sun::star::uno::Reference < com::sun::star::io::XInputStream > xNewTempStream,
+ const vos::ORef < EncryptionData > &rData,
+ sal_Bool bNewRawStream,
+ sal_Bool bIsEncrypted )
+: maEntry ( rEntry )
+, mxData ( rData )
+, mbRawStream ( bNewRawStream )
+, mbFinished ( sal_False )
+, mxTempIn ( xNewTempStream )
+, mxTempSeek ( xNewTempStream, UNO_QUERY )
+, mxTempOut ( xNewTempStream, UNO_QUERY )
+, mxZipStream ( xNewZipStream )
+, mxZipSeek ( xNewZipStream, UNO_QUERY )
+, maInflater ( sal_True )
+, maCipher ( NULL )
+{
+ mnZipCurrent = maEntry.nOffset;
+ if (mbRawStream)
+ {
+ mnZipSize = maEntry.nMethod == DEFLATED ? maEntry.nCompressedSize : maEntry.nSize;
+ mnZipEnd = maEntry.nOffset + mnZipSize;
+ }
+ else
+ {
+ mnZipSize = maEntry.nSize;
+ mnZipEnd = maEntry.nMethod == DEFLATED ? maEntry.nOffset + maEntry.nCompressedSize : maEntry.nOffset + maEntry.nSize;
+ }
+
+ if ( bIsEncrypted )
+ {
+ sal_Bool bHaveEncryptData = ( !rData.isEmpty() && rData->aSalt.getLength() && rData->aInitVector.getLength() && rData->nIterationCount != 0 ) ? sal_True : sal_False;
+
+ // if we have all the encrypted data, and want a raw stream, then prepend it to the stream, otherwise
+ // make a cipher so we can decrypt it
+ if ( bHaveEncryptData )
+ {
+ if ( !bNewRawStream )
+ ZipFile::StaticGetCipher ( rData, maCipher, sal_True );
+ else
+ {
+ // Put in the EncryptedDataHeader
+ Sequence < sal_Int8 > aEncryptedDataHeader ( n_ConstHeaderSize +
+ rData->aInitVector.getLength() +
+ rData->aSalt.getLength() +
+ rData->aDigest.getLength() );
+ sal_Int8 * pHeader = aEncryptedDataHeader.getArray();
+ ZipFile::StaticFillHeader ( rData, rEntry.nSize, pHeader );
+ mxTempOut->writeBytes ( aEncryptedDataHeader );
+ mnZipSize += mxTempSeek->getPosition();
+ mxTempSeek->seek ( 0 );
+ }
+ }
+ }
+}
+
+XFileStream::~XFileStream()
+{
+ if ( maCipher )
+ rtl_cipher_destroy ( maCipher );
+}
+
+void XFileStream::fill( sal_Int64 nUntil)
+{
+ sal_Int32 nRead;
+ sal_Int64 nPosition = mxTempSeek->getPosition();
+ mxTempSeek->seek ( mxTempSeek->getLength() );
+ maBuffer.realloc ( n_ConstBufferSize );
+
+ while ( mxTempSeek->getLength() < nUntil )
+ {
+ if ( !mbRawStream )
+ {
+ while ( 0 == ( nRead = maInflater.doInflate( maBuffer ) ) )
+ {
+ if ( maInflater.finished() || maInflater.needsDictionary() )
+ {
+ // some error handling ?
+ return;
+ }
+
+ sal_Int64 nDiff = mnZipEnd - mnZipCurrent;
+ if ( nDiff > 0 )
+ {
+ mxZipSeek->seek ( mnZipCurrent );
+ nRead = mxZipStream->readBytes ( maCompBuffer, static_cast < sal_Int32 > ( nDiff < n_ConstBufferSize ? nDiff : n_ConstBufferSize ) );
+ mnZipCurrent += nRead;
+ // maCompBuffer now has the uncompressed data, check if we need to decrypt
+ // before passing to the Inflater
+ if ( maCipher )
+ {
+ Sequence < sal_Int8 > aCryptBuffer ( nRead );
+ rtlCipherError aResult = rtl_cipher_decode ( maCipher,
+ maCompBuffer.getConstArray(),
+ nRead,
+ reinterpret_cast < sal_uInt8 * > (aCryptBuffer.getArray()),
+ nRead);
+ OSL_ASSERT (aResult == rtl_Cipher_E_None);
+ maCompBuffer = aCryptBuffer; // Now it holds the decrypted data
+
+ }
+ maInflater.setInput ( maCompBuffer );
+ }
+ else
+ {
+ // some error handling ?
+ return;
+ }
+ }
+ }
+ else
+ {
+ sal_Int64 nDiff = mnZipEnd - mnZipCurrent;
+ mxZipSeek->seek ( mnZipCurrent );
+ nRead = mxZipStream->readBytes ( maBuffer, static_cast < sal_Int32 > ( nDiff < n_ConstBufferSize ? nDiff : n_ConstBufferSize ) );
+ mnZipCurrent += nRead;
+ }
+ Sequence < sal_Int8 > aTmpBuffer ( maBuffer.getConstArray(), nRead );
+ mxTempOut->writeBytes ( aTmpBuffer );
+ }
+ mxTempSeek->seek ( nPosition );
+}
+
+sal_Int32 SAL_CALL XFileStream::readBytes( Sequence< sal_Int8 >& aData, sal_Int32 nBytesToRead )
+ throw( NotConnectedException, BufferSizeExceededException, IOException, RuntimeException)
+{
+ sal_Int64 nPosition = mxTempSeek->getPosition();
+ if ( nPosition + nBytesToRead > mnZipSize )
+ nBytesToRead = static_cast < sal_Int32 > ( mnZipSize - nPosition );
+
+ sal_Int64 nUntil = nBytesToRead + nPosition + n_ConstBufferSize;
+ if (nUntil > mnZipSize )
+ nUntil = mnZipSize;
+ if ( nUntil > mxTempSeek->getLength() )
+ fill ( nUntil );
+ sal_Int32 nRead = mxTempIn->readBytes ( aData, nBytesToRead );
+ return nRead;
+}
+
+sal_Int32 SAL_CALL XFileStream::readSomeBytes( Sequence< sal_Int8 >& aData, sal_Int32 nMaxBytesToRead )
+ throw( NotConnectedException, BufferSizeExceededException, IOException, RuntimeException)
+{
+ return readBytes ( aData, nMaxBytesToRead );
+}
+void SAL_CALL XFileStream::skipBytes( sal_Int32 nBytesToSkip )
+ throw( NotConnectedException, BufferSizeExceededException, IOException, RuntimeException)
+{
+ seek ( mxTempSeek->getPosition() + nBytesToSkip );
+}
+
+sal_Int32 SAL_CALL XFileStream::available( )
+ throw( NotConnectedException, IOException, RuntimeException)
+{
+ return static_cast < sal_Int32 > ( mnZipSize - mxTempSeek->getPosition() );
+}
+
+void SAL_CALL XFileStream::closeInput( )
+ throw( NotConnectedException, IOException, RuntimeException)
+{
+}
+void SAL_CALL XFileStream::seek( sal_Int64 location )
+ throw( IllegalArgumentException, IOException, RuntimeException)
+{
+ if ( location > mnZipSize || location < 0 )
+ throw IllegalArgumentException( ::rtl::OUString( RTL_CONSTASCII_USTRINGPARAM( OSL_LOG_PREFIX ) ), uno::Reference< uno::XInterface >(), 1 );
+ if ( location > mxTempSeek->getLength() )
+ {
+ sal_Int64 nUntil = location + n_ConstBufferSize > mnZipSize ? mnZipSize : location + n_ConstBufferSize;
+ fill ( nUntil );
+ }
+ mxTempSeek->seek ( location );
+}
+sal_Int64 SAL_CALL XFileStream::getPosition( )
+ throw(IOException, RuntimeException)
+{
+ return mxTempSeek->getPosition();
+}
+sal_Int64 SAL_CALL XFileStream::getLength( )
+ throw(IOException, RuntimeException)
+{
+ return mnZipSize;
+}