/************************************************************************* * * $RCSfile: ZipPackageStream.cxx,v $ * * $Revision: 1.37 $ * * last change: $Author: hr $ $Date: 2004-02-03 18:27:20 $ * * The Contents of this file are made available subject to the terms of * either of the following licenses * * - GNU Lesser General Public License Version 2.1 * - Sun Industry Standards Source License Version 1.1 * * Sun Microsystems Inc., October, 2000 * * GNU Lesser General Public License Version 2.1 * ============================================= * Copyright 2000 by Sun Microsystems, Inc. * 901 San Antonio Road, Palo Alto, CA 94303, USA * * This library is free software; you can redistribute it and/or * modify it under the terms of the GNU Lesser General Public * License version 2.1, as published by the Free Software Foundation. * * This library is distributed in the hope that it will be useful, * but WITHOUT ANY WARRANTY; without even the implied warranty of * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU * Lesser General Public License for more details. * * You should have received a copy of the GNU Lesser General Public * License along with this library; if not, write to the Free Software * Foundation, Inc., 59 Temple Place, Suite 330, Boston, * MA 02111-1307 USA * * * Sun Industry Standards Source License Version 1.1 * ================================================= * The contents of this file are subject to the Sun Industry Standards * Source License Version 1.1 (the "License"); You may not use this file * except in compliance with the License. You may obtain a copy of the * License at http://www.openoffice.org/license.html. * * Software provided under this License is provided on an "AS IS" basis, * WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, * WITHOUT LIMITATION, WARRANTIES THAT THE SOFTWARE IS FREE OF DEFECTS, * MERCHANTABLE, FIT FOR A PARTICULAR PURPOSE, OR NON-INFRINGING. * See the License for the specific provisions governing your rights and * obligations concerning the Software. * * The Initial Developer of the Original Code is: Sun Microsystems, Inc. * * Copyright: 2000 by Sun Microsystems, Inc. * * All Rights Reserved. * * Contributor(s): Martin Gallwey (gallwey@sun.com) * * ************************************************************************/ #ifndef _COM_SUN_STAR_PACKAGES_ZIP_ZIPCONSTANTS_HPP_ #include #endif #ifndef _COM_SUN_STAR_PACKAGES_ZIP_ZIPIOEXCEPTION_HPP_ #include #endif #ifndef _COM_SUN_STAR_IO_XINPUTSTREAM_HPP_ #include #endif #ifndef _COM_SUN_STAR_IO_XOUTPUTSTREAM_HPP_ #include #endif #ifndef _COM_SUN_STAR_IO_XSTREAM_HPP_ #include #endif #ifndef _COM_SUN_STAR_IO_XSEEKABLE_HPP_ #include #endif #ifndef _ZIP_PACKAGE_STREAM_HXX #include #endif #ifndef _ZIP_PACKAGE_HXX #include #endif #ifndef _ZIP_FILE_HXX #include #endif #ifndef _ENCRYPTED_DATA_HEADER_HXX_ #include #endif #ifndef _VOS_DIAGNOSE_H_ #include #endif #ifndef _WRAPSTREAMFORSHARE_HXX_ #include "wrapstreamforshare.hxx" #endif using namespace com::sun::star::packages::zip::ZipConstants; using namespace com::sun::star::packages::zip; using namespace com::sun::star::uno; using namespace com::sun::star::lang; using namespace com::sun::star; using namespace cppu; using namespace rtl; Sequence < sal_Int8 > ZipPackageStream::aImplementationId = Sequence < sal_Int8 > (); void copyInputToOutput_Impl( Reference< io::XInputStream >& aIn, Reference< io::XOutputStream >& aOut ); ZipPackageStream::ZipPackageStream ( ZipPackage & rNewPackage, const Reference< XMultiServiceFactory >& xFactory ) : rZipPackage(rNewPackage) , m_xFactory( xFactory ) , bToBeCompressed ( sal_True ) , bToBeEncrypted ( sal_False ) , bIsEncrypted ( sal_False ) , bHaveOwnKey ( sal_False ) , xEncryptionData ( ) , m_nStreamMode( PACKAGE_STREAM_NOTSET ) , m_nMagicalHackSize( 0 ) , m_nMagicalHackPos( 0 ) { OSL_ENSURE( m_xFactory.is(), "No factory is provided to ZipPackageStream!\n" ); SetFolder ( sal_False ); aEntry.nVersion = -1; aEntry.nFlag = 0; aEntry.nMethod = -1; aEntry.nTime = -1; aEntry.nCrc = -1; aEntry.nCompressedSize = -1; aEntry.nSize = -1; aEntry.nOffset = -1; aEntry.nNameLen = -1; aEntry.nExtraLen = -1; if ( !aImplementationId.getLength() ) { aImplementationId = getImplementationId(); } } ZipPackageStream::~ZipPackageStream( void ) { } void ZipPackageStream::setZipEntry( const ZipEntry &rInEntry) { aEntry.nVersion = rInEntry.nVersion; aEntry.nFlag = rInEntry.nFlag; aEntry.nMethod = rInEntry.nMethod; aEntry.nTime = rInEntry.nTime; aEntry.nCrc = rInEntry.nCrc; aEntry.nCompressedSize = rInEntry.nCompressedSize; aEntry.nSize = rInEntry.nSize; aEntry.nOffset = rInEntry.nOffset; aEntry.sName = rInEntry.sName; aEntry.nNameLen = rInEntry.nNameLen; aEntry.nExtraLen = rInEntry.nExtraLen; } //-------------------------------------------------------------------------- Reference< io::XInputStream > ZipPackageStream::TryToGetRawFromDataStream() { if ( m_nStreamMode != PACKAGE_STREAM_DATA || !bToBeEncrypted || !xStream.is() ) throw packages::NoEncryptionException(); // TODO Sequence< sal_Int8 > aKey = ( xEncryptionData.isEmpty() || !bHaveOwnKey ) ? rZipPackage.getEncryptionKey() : xEncryptionData->aKey; if ( !aKey.getLength() ) throw packages::NoEncryptionException(); // TODO try { // create temporary file uno::Reference < io::XStream > xTempStream( m_xFactory->createInstance ( ::rtl::OUString::createFromAscii( "com.sun.star.io.TempFile" ) ), uno::UNO_QUERY ); if ( !xTempStream.is() ) throw io::IOException(); // TODO: // create a package based on it ZipPackage* pPackage = new ZipPackage( m_xFactory ); Reference< XSingleServiceFactory > xPackageAsFactory( static_cast< XSingleServiceFactory* >( pPackage ) ); if ( !xPackageAsFactory.is() ) throw RuntimeException(); // TODO Sequence< Any > aArgs( 1 ); aArgs[0] <<= xTempStream; pPackage->initialize( aArgs ); // create a new package stream Reference< XDataSinkEncrSupport > xNewPackStream( xPackageAsFactory->createInstance(), UNO_QUERY ); if ( !xNewPackStream.is() ) throw RuntimeException(); // TODO if ( !m_aSharedMutexRef.Is() ) m_aSharedMutexRef = new SotMutexHolder(); xNewPackStream->setDataStream( static_cast< io::XInputStream* >( new WrapStreamForShare( xStream, m_aSharedMutexRef ) ) ); Reference< XPropertySet > xNewPSProps( xNewPackStream, UNO_QUERY ); if ( !xNewPSProps.is() ) throw RuntimeException(); // TODO // copy all the properties of this stream to the new stream xNewPSProps->setPropertyValue( ::rtl::OUString::createFromAscii( "MediaType" ), makeAny( sMediaType ) ); xNewPSProps->setPropertyValue( ::rtl::OUString::createFromAscii( "Compressed" ), makeAny( bToBeCompressed ) ); xNewPSProps->setPropertyValue( ::rtl::OUString::createFromAscii( "EncryptionKey" ), makeAny( aKey ) ); xNewPSProps->setPropertyValue( ::rtl::OUString::createFromAscii( "Encrypted" ), makeAny( sal_True ) ); // insert a new stream in the package Reference< XUnoTunnel > xTunnel; Any aRoot = pPackage->getByHierarchicalName( ::rtl::OUString::createFromAscii( "/" ) ); aRoot >>= xTunnel; Reference< container::XNameContainer > xRootNameContainer( xTunnel, UNO_QUERY ); if ( !xRootNameContainer.is() ) throw RuntimeException(); // TODO Reference< XUnoTunnel > xNPSTunnel( xNewPackStream, UNO_QUERY ); xRootNameContainer->insertByName( ::rtl::OUString::createFromAscii( "dummy" ), makeAny( xNPSTunnel ) ); // commit the temporary package pPackage->commitChanges(); // get raw stream from the temporary package Reference< io::XInputStream > xInRaw = xNewPackStream->getRawStream(); // create another temporary file uno::Reference < io::XOutputStream > xTempOut( m_xFactory->createInstance ( ::rtl::OUString::createFromAscii( "com.sun.star.io.TempFile" ) ), uno::UNO_QUERY ); uno::Reference < io::XInputStream > xTempIn( xTempOut, UNO_QUERY ); uno::Reference < io::XSeekable > xTempSeek( xTempOut, UNO_QUERY ); if ( !xTempOut.is() || !xTempIn.is() || !xTempSeek.is() ) throw io::IOException(); // TODO: // copy the raw stream to the temporary file copyInputToOutput_Impl( xInRaw, xTempOut ); xTempOut->closeOutput(); xTempSeek->seek( 0 ); // close raw stream, package stream and folder xInRaw = Reference< io::XInputStream >(); xNewPSProps = Reference< XPropertySet >(); xNPSTunnel = Reference< XUnoTunnel >(); xNewPackStream = Reference< XDataSinkEncrSupport >(); xTunnel = Reference< XUnoTunnel >(); xRootNameContainer = Reference< container::XNameContainer >(); // return the stream representing the first temporary file return xTempIn; } catch ( RuntimeException& ) { throw; } catch ( Exception& ) { } throw io::IOException(); // TODO return Reference< io::XInputStream >(); } //-------------------------------------------------------------------------- sal_Bool ZipPackageStream::ParsePackageRawStream() { OSL_ENSURE( xStream.is(), "A stream must be provided!\n" ); if ( !xStream.is() ) return sal_False; sal_Bool bOk = sal_False; vos::ORef < EncryptionData > xTempEncrData; sal_Int32 nMagHackSize = 0; Sequence < sal_Int8 > aHeader ( 4 ); if ( xStream->readBytes ( aHeader, 4 ) == 4 ) { const sal_Int8 *pHeader = aHeader.getConstArray(); sal_uInt32 nHeader = ( pHeader [0] & 0xFF ) | ( pHeader [1] & 0xFF ) << 8 | ( pHeader [2] & 0xFF ) << 16 | ( pHeader [3] & 0xFF ) << 24; if ( nHeader == n_ConstHeader ) { // this is one of our god-awful, but extremely devious hacks, everyone cheer xTempEncrData = new EncryptionData; ::rtl::OUString aMediaType; if ( ZipFile::StaticFillData ( xTempEncrData, nMagHackSize, aMediaType, xStream ) ) { // We'll want to skip the data we've just read, so calculate how much we just read // and remember it m_nMagicalHackPos = n_ConstHeaderSize + xTempEncrData->aSalt.getLength() + xTempEncrData->aInitVector.getLength() + xTempEncrData->aDigest.getLength() + aMediaType.getLength() * sizeof( sal_Unicode ); m_nMagicalHackSize = nMagHackSize; sMediaType = aMediaType; bOk = sal_True; } } } if ( !bOk ) { // the provided stream is not a raw stream return sal_False; } xEncryptionData = xTempEncrData; SetIsEncrypted ( sal_True ); // it's already compressed and encrypted bToBeEncrypted = bToBeCompressed = sal_False; return sal_True; } void ZipPackageStream::SetPackageMember( sal_Bool bNewValue ) { if ( bNewValue ) { m_nStreamMode = PACKAGE_STREAM_PACKAGEMEMBER; m_nMagicalHackPos = 0; m_nMagicalHackSize = 0; } else if ( m_nStreamMode == PACKAGE_STREAM_PACKAGEMEMBER ) m_nStreamMode = PACKAGE_STREAM_NOTSET; // must be reset } // XActiveDataSink //-------------------------------------------------------------------------- void SAL_CALL ZipPackageStream::setInputStream( const Reference< io::XInputStream >& aStream ) throw(RuntimeException) { // TODO: wrap the stream in case it is not seekable // The package component requires that every stream either be FROM a package or it must support XSeekable! Reference< io::XSeekable > xSeek( aStream, UNO_QUERY ); if ( !xSeek.is() ) throw RuntimeException( OUString::createFromAscii( "The stream must support XSeekable!" ), Reference< XInterface >() ); m_aSharedMutexRef = new SotMutexHolder(); xStream = aStream; SetPackageMember ( sal_False ); aEntry.nTime = -1; m_nStreamMode = PACKAGE_STREAM_DETECT; } //-------------------------------------------------------------------------- Reference< io::XInputStream > SAL_CALL ZipPackageStream::getRawData() throw(RuntimeException) { try { if (IsPackageMember()) { if ( !xEncryptionData.isEmpty() && !bHaveOwnKey ) xEncryptionData->aKey = rZipPackage.getEncryptionKey(); return rZipPackage.getZipFile().getRawData( aEntry, xEncryptionData, bIsEncrypted ); } else if ( xStream.is() ) { if ( !m_aSharedMutexRef.Is() ) m_aSharedMutexRef = new SotMutexHolder(); return new WrapStreamForShare( xStream, m_aSharedMutexRef ); } else return Reference < io::XInputStream > (); } catch (ZipException &)//rException) { VOS_ENSURE( 0, "ZipException thrown");//rException.Message); return Reference < io::XInputStream > (); } catch (Exception &) { VOS_ENSURE( 0, "Exception is thrown during stream wrapping!\n"); return Reference < io::XInputStream > (); } } //-------------------------------------------------------------------------- Reference< io::XInputStream > SAL_CALL ZipPackageStream::getInputStream( ) throw(RuntimeException) { try { if (IsPackageMember()) { if ( !xEncryptionData.isEmpty() && !bHaveOwnKey ) xEncryptionData->aKey = rZipPackage.getEncryptionKey(); return rZipPackage.getZipFile().getInputStream( aEntry, xEncryptionData, bIsEncrypted ); } else if ( xStream.is() ) { if ( !m_aSharedMutexRef.Is() ) m_aSharedMutexRef = new SotMutexHolder(); return new WrapStreamForShare( xStream, m_aSharedMutexRef ); } else return Reference < io::XInputStream > (); } catch (ZipException &)//rException) { VOS_ENSURE( 0,"ZipException thrown");//rException.Message); return Reference < io::XInputStream > (); } catch (Exception &) { VOS_ENSURE( 0, "Exception is thrown during stream wrapping!\n"); return Reference < io::XInputStream > (); } } // XDataSinkEncrSupport //-------------------------------------------------------------------------- Reference< io::XInputStream > SAL_CALL ZipPackageStream::getDataStream() throw ( packages::WrongPasswordException, io::IOException, RuntimeException ) { // There is no stream attached to this object if ( m_nStreamMode == PACKAGE_STREAM_NOTSET ) return Reference< io::XInputStream >(); // this method can not be used together with old approach if ( m_nStreamMode == PACKAGE_STREAM_DETECT ) throw packages::zip::ZipIOException(); // TODO if ( !xEncryptionData.isEmpty() && !bHaveOwnKey ) xEncryptionData->aKey = rZipPackage.getEncryptionKey(); if (IsPackageMember()) return rZipPackage.getZipFile().getDataStream( aEntry, xEncryptionData, bIsEncrypted ); else if ( m_nStreamMode == PACKAGE_STREAM_RAW ) return ZipFile::StaticGetDataFromRawStream( xStream, xEncryptionData ); else if ( xStream.is() ) { if ( !m_aSharedMutexRef.Is() ) m_aSharedMutexRef = new SotMutexHolder(); return new WrapStreamForShare( xStream, m_aSharedMutexRef ); } else return uno::Reference< io::XInputStream >(); } //-------------------------------------------------------------------------- Reference< io::XInputStream > SAL_CALL ZipPackageStream::getRawStream() throw ( packages::NoEncryptionException, io::IOException, uno::RuntimeException ) { // There is no stream attached to this object if ( m_nStreamMode == PACKAGE_STREAM_NOTSET ) return Reference< io::XInputStream >(); // this method can not be used together with old approach if ( m_nStreamMode == PACKAGE_STREAM_DETECT ) throw packages::zip::ZipIOException(); // TODO if (IsPackageMember()) { if ( !bIsEncrypted || xEncryptionData.isEmpty() ) throw packages::NoEncryptionException(); // TODO return rZipPackage.getZipFile().getWrappedRawStream( aEntry, xEncryptionData, sMediaType ); } else if ( xStream.is() ) { if ( m_nStreamMode == PACKAGE_STREAM_RAW ) { if ( !m_aSharedMutexRef.Is() ) m_aSharedMutexRef = new SotMutexHolder(); return new WrapStreamForShare( xStream, m_aSharedMutexRef ); } else if ( m_nStreamMode == PACKAGE_STREAM_DATA && bToBeEncrypted ) return TryToGetRawFromDataStream(); } throw packages::NoEncryptionException(); // TODO } //-------------------------------------------------------------------------- void SAL_CALL ZipPackageStream::setDataStream( const Reference< io::XInputStream >& aStream ) throw ( io::IOException, RuntimeException ) { setInputStream( aStream ); m_nStreamMode = PACKAGE_STREAM_DATA; } //-------------------------------------------------------------------------- void SAL_CALL ZipPackageStream::setRawStream( const Reference< io::XInputStream >& aStream ) throw ( packages::EncryptionNotAllowedException, packages::NoRawFormatException, io::IOException, RuntimeException) { // TODO: wrap the stream in case it is not seekable // The package component requires that every stream either be FROM a package or it must support XSeekable! Reference< io::XSeekable > xSeek( aStream, UNO_QUERY ); if ( !xSeek.is() ) throw RuntimeException( OUString::createFromAscii( "The stream must support XSeekable!" ), Reference< XInterface >() ); xSeek->seek( 0 ); Reference< io::XInputStream > xOldStream = xStream; xStream = aStream; if ( !ParsePackageRawStream() ) { xStream = xOldStream; throw packages::NoRawFormatException(); } m_aSharedMutexRef = new SotMutexHolder(); SetPackageMember ( sal_False ); aEntry.nTime = -1; m_nStreamMode = PACKAGE_STREAM_RAW; } // XUnoTunnel //-------------------------------------------------------------------------- sal_Int64 SAL_CALL ZipPackageStream::getSomething( const Sequence< sal_Int8 >& aIdentifier ) throw(RuntimeException) { sal_Int64 nMe = 0; if ( aIdentifier.getLength() == 16 && 0 == rtl_compareMemory( static_getImplementationId().getConstArray(), aIdentifier.getConstArray(), 16 ) ) nMe = reinterpret_cast < sal_Int64 > ( this ); return nMe; } // XPropertySet //-------------------------------------------------------------------------- void SAL_CALL ZipPackageStream::setPropertyValue( const OUString& aPropertyName, const Any& aValue ) throw(beans::UnknownPropertyException, beans::PropertyVetoException, IllegalArgumentException, WrappedTargetException, RuntimeException) { if (aPropertyName.equalsAsciiL(RTL_CONSTASCII_STRINGPARAM("MediaType"))) { if ( aValue >>= sMediaType ) { if (sMediaType.getLength() > 0) { if ( sMediaType.indexOf (OUString( RTL_CONSTASCII_USTRINGPARAM ( "text" ) ) ) != -1 || sMediaType.equals( OUString( RTL_CONSTASCII_USTRINGPARAM ( "application/vnd.sun.star.oleobject" ) ) ) ) bToBeCompressed = sal_True; else bToBeCompressed = sal_False; } } else throw IllegalArgumentException( OUString::createFromAscii( "MediaType must be a string!\n" ), Reference< XInterface >(), 2 ); } else if (aPropertyName.equalsAsciiL(RTL_CONSTASCII_STRINGPARAM("Size") ) ) { if ( !( aValue >>= aEntry.nSize ) ) throw IllegalArgumentException( OUString::createFromAscii( "Wrong type for Size property!\n" ), Reference< XInterface >(), 2 ); } else if (aPropertyName.equalsAsciiL(RTL_CONSTASCII_STRINGPARAM("Encrypted") ) ) { sal_Bool bEnc = sal_False; if ( aValue >>= bEnc ) { // In case of new raw stream, the stream must not be encrypted on storing if ( bEnc && m_nStreamMode == PACKAGE_STREAM_RAW ) throw IllegalArgumentException( OUString::createFromAscii( "Raw stream can not be encrypted on storing" ), Reference< XInterface >(), 2 ); bToBeEncrypted = bEnc; if ( bToBeEncrypted && xEncryptionData.isEmpty()) xEncryptionData = new EncryptionData; } else throw IllegalArgumentException( OUString::createFromAscii( "Wrong type for Encrypted property!\n" ), Reference< XInterface >(), 2 ); } else if (aPropertyName.equalsAsciiL(RTL_CONSTASCII_STRINGPARAM("EncryptionKey") ) ) { Sequence < sal_Int8 > aNewKey; if ( !( aValue >>= aNewKey ) ) { OUString sTempString; if ( ( aValue >>= sTempString ) ) { sal_Int32 nNameLength = sTempString.getLength(); Sequence < sal_Int8 > aSequence ( nNameLength ); sal_Int8 *pArray = aSequence.getArray(); const sal_Unicode *pChar = sTempString.getStr(); for ( sal_Int16 i = 0; i < nNameLength; i++) pArray[i] = static_cast < const sal_Int8 > (pChar[i]); aNewKey = aSequence; } else throw IllegalArgumentException( OUString::createFromAscii( "Wrong type for EncryptionKey property!\n" ), Reference< XInterface >(), 2 ); } if ( aNewKey.getLength() ) { if ( xEncryptionData.isEmpty()) xEncryptionData = new EncryptionData; xEncryptionData->aKey = aNewKey; // In case of new raw stream, the stream must not be encrypted on storing bHaveOwnKey = sal_True; if ( m_nStreamMode != PACKAGE_STREAM_RAW ) bToBeEncrypted = sal_True; } else bHaveOwnKey = sal_False; } #if SUPD>617 else if (aPropertyName.equalsAsciiL ( RTL_CONSTASCII_STRINGPARAM ( "Compressed" ) ) ) #else else if (aPropertyName.equalsAsciiL ( RTL_CONSTASCII_STRINGPARAM ( "Compress" ) ) ) #endif { sal_Bool bCompr = sal_False; if ( aValue >>= bCompr ) { // In case of new raw stream, the stream must not be encrypted on storing if ( bCompr && m_nStreamMode == PACKAGE_STREAM_RAW ) throw IllegalArgumentException( OUString::createFromAscii( "Raw stream can not be encrypted on storing" ), Reference< XInterface >(), 2 ); bToBeCompressed = bCompr; } else throw IllegalArgumentException( OUString::createFromAscii( "Wrong type for Compressed property!\n" ), Reference< XInterface >(), 2 ); } else throw beans::UnknownPropertyException(); } //-------------------------------------------------------------------------- Any SAL_CALL ZipPackageStream::getPropertyValue( const OUString& PropertyName ) throw(beans::UnknownPropertyException, WrappedTargetException, RuntimeException) { Any aAny; if (PropertyName.equalsAsciiL( RTL_CONSTASCII_STRINGPARAM( "MediaType" ) ) ) { aAny <<= sMediaType; return aAny; } else if (PropertyName.equalsAsciiL( RTL_CONSTASCII_STRINGPARAM ( "Size" ) ) ) { aAny <<= aEntry.nSize; return aAny; } else if (PropertyName.equalsAsciiL( RTL_CONSTASCII_STRINGPARAM ( "Encrypted" ) ) ) { aAny <<= ( m_nStreamMode == PACKAGE_STREAM_RAW ) ? sal_True : bToBeEncrypted; return aAny; } else if (PropertyName.equalsAsciiL( RTL_CONSTASCII_STRINGPARAM ( "Compressed" ) ) ) { aAny <<= bToBeCompressed; return aAny; } else if (PropertyName.equalsAsciiL( RTL_CONSTASCII_STRINGPARAM( "EncryptionKey" ) ) ) { aAny <<= xEncryptionData.isEmpty () ? Sequence < sal_Int8 > () : xEncryptionData->aKey; return aAny; } else throw beans::UnknownPropertyException(); } //-------------------------------------------------------------------------- void ZipPackageStream::setSize (const sal_Int32 nNewSize) { if (aEntry.nCompressedSize != nNewSize ) aEntry.nMethod = DEFLATED; aEntry.nSize = nNewSize; } //-------------------------------------------------------------------------- OUString ZipPackageStream::getImplementationName() throw (RuntimeException) { return OUString ( RTL_CONSTASCII_USTRINGPARAM ( "ZipPackageStream" ) ); } //-------------------------------------------------------------------------- Sequence< OUString > ZipPackageStream::getSupportedServiceNames() throw (RuntimeException) { Sequence< OUString > aNames(1); aNames[0] = OUString( RTL_CONSTASCII_USTRINGPARAM ( "com.sun.star.packages.PackageStream" ) ); return aNames; } //-------------------------------------------------------------------------- sal_Bool SAL_CALL ZipPackageStream::supportsService( OUString const & rServiceName ) throw (RuntimeException) { return rServiceName == getSupportedServiceNames()[0]; }