2014-10-09 15:22:54 +02:00
|
|
|
/* -*- Mode: C++; tab-width: 4; indent-tabs-mode: nil; c-basic-offset: 4 -*- */
|
|
|
|
/*
|
|
|
|
* This file is part of the LibreOffice project.
|
|
|
|
*
|
|
|
|
* This Source Code Form is subject to the terms of the Mozilla Public
|
|
|
|
* License, v. 2.0. If a copy of the MPL was not distributed with this
|
|
|
|
* file, You can obtain one at http://mozilla.org/MPL/2.0/.
|
|
|
|
*
|
|
|
|
* This file incorporates work covered by the following license notice:
|
|
|
|
*
|
|
|
|
* Licensed to the Apache Software Foundation (ASF) under one or more
|
|
|
|
* contributor license agreements. See the NOTICE file distributed
|
|
|
|
* with this work for additional information regarding copyright
|
|
|
|
* ownership. The ASF licenses this file to you under the Apache
|
|
|
|
* License, Version 2.0 (the "License"); you may not use this file
|
|
|
|
* except in compliance with the License. You may obtain a copy of
|
|
|
|
* the License at http://www.apache.org/licenses/LICENSE-2.0 .
|
|
|
|
*/
|
|
|
|
|
|
|
|
#include <ZipOutputEntry.hxx>
|
|
|
|
|
2014-12-14 00:11:53 +01:00
|
|
|
#include <com/sun/star/io/TempFile.hpp>
|
2014-10-09 15:22:54 +02:00
|
|
|
#include <com/sun/star/packages/zip/ZipConstants.hpp>
|
2015-07-22 12:01:00 +01:00
|
|
|
#include <com/sun/star/ucb/SimpleFileAccess.hpp>
|
|
|
|
#include <com/sun/star/ucb/XSimpleFileAccess3.hpp>
|
2014-10-09 15:22:54 +02:00
|
|
|
#include <comphelper/storagehelper.hxx>
|
|
|
|
|
|
|
|
#include <osl/time.h>
|
2014-11-14 22:52:35 +01:00
|
|
|
#include <osl/diagnose.h>
|
2014-10-09 15:22:54 +02:00
|
|
|
|
|
|
|
#include <PackageConstants.hxx>
|
|
|
|
#include <ZipEntry.hxx>
|
|
|
|
#include <ZipFile.hxx>
|
2014-10-21 09:20:24 +02:00
|
|
|
#include <ZipPackageBuffer.hxx>
|
2014-10-09 15:22:54 +02:00
|
|
|
#include <ZipPackageStream.hxx>
|
|
|
|
|
2015-01-02 17:02:27 +00:00
|
|
|
#include <algorithm>
|
|
|
|
|
2014-10-09 15:22:54 +02:00
|
|
|
using namespace com::sun::star;
|
|
|
|
using namespace com::sun::star::io;
|
|
|
|
using namespace com::sun::star::uno;
|
|
|
|
using namespace com::sun::star::packages::zip::ZipConstants;
|
|
|
|
|
|
|
|
/** This class is used to deflate Zip entries
|
|
|
|
*/
|
2014-12-13 23:09:10 +01:00
|
|
|
ZipOutputEntry::ZipOutputEntry(
|
|
|
|
const css::uno::Reference< css::io::XOutputStream >& rxOutput,
|
|
|
|
const uno::Reference< uno::XComponentContext >& rxContext,
|
|
|
|
ZipEntry& rEntry,
|
|
|
|
ZipPackageStream* pStream,
|
|
|
|
bool bEncrypt)
|
2014-10-09 15:22:54 +02:00
|
|
|
: m_aDeflateBuffer(n_ConstBufferSize)
|
|
|
|
, m_aDeflater(DEFAULT_COMPRESSION, true)
|
2015-07-22 12:01:00 +01:00
|
|
|
, m_xContext(rxContext)
|
|
|
|
, m_xOutStream(rxOutput)
|
2014-10-09 15:22:54 +02:00
|
|
|
, m_pCurrentEntry(&rEntry)
|
|
|
|
, m_nDigested(0)
|
2014-10-20 21:13:50 +02:00
|
|
|
, m_bEncryptCurrentEntry(bEncrypt)
|
2014-10-21 15:17:13 +02:00
|
|
|
, m_pCurrentStream(pStream)
|
2014-10-09 15:22:54 +02:00
|
|
|
{
|
2014-10-20 22:02:48 +02:00
|
|
|
assert(m_pCurrentEntry->nMethod == DEFLATED && "Use ZipPackageStream::rawWrite() for STORED entries");
|
2014-10-20 21:13:50 +02:00
|
|
|
if (m_bEncryptCurrentEntry)
|
2014-10-09 15:22:54 +02:00
|
|
|
{
|
2015-07-22 12:01:00 +01:00
|
|
|
m_xCipherContext = ZipFile::StaticGetCipher( m_xContext, pStream->GetEncryptionData(), true );
|
|
|
|
m_xDigestContext = ZipFile::StaticGetDigestContextForChecksum( m_xContext, pStream->GetEncryptionData() );
|
2014-10-09 15:22:54 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-04-14 12:44:47 +02:00
|
|
|
ZipOutputEntry::~ZipOutputEntry()
|
2014-10-09 15:22:54 +02:00
|
|
|
{
|
2015-07-22 12:01:00 +01:00
|
|
|
if (!m_aTempURL.isEmpty())
|
|
|
|
{
|
|
|
|
uno::Reference < ucb::XSimpleFileAccess3 > xAccess(ucb::SimpleFileAccess::create(m_xContext));
|
|
|
|
xAccess->kill(m_aTempURL);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
void ZipOutputEntry::createBufferFile()
|
|
|
|
{
|
|
|
|
assert(!m_xOutStream.is() && m_aTempURL.isEmpty() &&
|
|
|
|
"should only be called in the threaded mode where there is no existing stream yet");
|
|
|
|
uno::Reference < beans::XPropertySet > xTempFileProps(
|
|
|
|
io::TempFile::create(m_xContext),
|
|
|
|
uno::UNO_QUERY_THROW );
|
|
|
|
xTempFileProps->setPropertyValue("RemoveFile", uno::makeAny(sal_False));
|
|
|
|
uno::Any aUrl = xTempFileProps->getPropertyValue( "Uri" );
|
|
|
|
aUrl >>= m_aTempURL;
|
|
|
|
assert(!m_aTempURL.isEmpty());
|
|
|
|
|
|
|
|
uno::Reference < ucb::XSimpleFileAccess3 > xTempAccess(ucb::SimpleFileAccess::create(m_xContext));
|
|
|
|
m_xOutStream = xTempAccess->openFileWrite(m_aTempURL);
|
2014-10-09 15:22:54 +02:00
|
|
|
}
|
|
|
|
|
2015-07-22 12:01:00 +01:00
|
|
|
void ZipOutputEntry::closeBufferFile()
|
2014-10-21 09:20:24 +02:00
|
|
|
{
|
2014-12-14 00:11:53 +01:00
|
|
|
m_xOutStream->closeOutput();
|
2015-07-22 12:01:00 +01:00
|
|
|
m_xOutStream.clear();
|
|
|
|
}
|
|
|
|
|
|
|
|
uno::Reference< io::XInputStream > ZipOutputEntry::getData() const
|
|
|
|
{
|
|
|
|
uno::Reference < ucb::XSimpleFileAccess3 > xTempAccess(ucb::SimpleFileAccess::create(m_xContext));
|
|
|
|
return xTempAccess->openFileRead(m_aTempURL);
|
2014-10-21 09:20:24 +02:00
|
|
|
}
|
|
|
|
|
2014-10-21 09:29:19 +02:00
|
|
|
void ZipOutputEntry::closeEntry()
|
2014-10-09 15:22:54 +02:00
|
|
|
{
|
2014-10-20 22:54:49 +02:00
|
|
|
m_aDeflater.finish();
|
|
|
|
while (!m_aDeflater.finished())
|
|
|
|
doDeflate();
|
|
|
|
|
|
|
|
if ((m_pCurrentEntry->nFlag & 8) == 0)
|
2014-10-09 15:22:54 +02:00
|
|
|
{
|
2014-10-20 22:54:49 +02:00
|
|
|
if (m_pCurrentEntry->nSize != m_aDeflater.getTotalIn())
|
2014-10-09 15:22:54 +02:00
|
|
|
{
|
2014-10-20 22:54:49 +02:00
|
|
|
OSL_FAIL("Invalid entry size");
|
2014-10-20 22:02:48 +02:00
|
|
|
}
|
2014-10-20 22:54:49 +02:00
|
|
|
if (m_pCurrentEntry->nCompressedSize != m_aDeflater.getTotalOut())
|
2014-10-20 22:02:48 +02:00
|
|
|
{
|
2014-10-20 22:54:49 +02:00
|
|
|
// Different compression strategies make the merit of this
|
|
|
|
// test somewhat dubious
|
|
|
|
m_pCurrentEntry->nCompressedSize = m_aDeflater.getTotalOut();
|
2014-10-09 15:22:54 +02:00
|
|
|
}
|
2014-10-20 22:54:49 +02:00
|
|
|
if (m_pCurrentEntry->nCrc != m_aCRC.getValue())
|
2014-10-09 15:22:54 +02:00
|
|
|
{
|
2014-10-20 22:54:49 +02:00
|
|
|
OSL_FAIL("Invalid entry CRC-32");
|
|
|
|
}
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
if ( !m_bEncryptCurrentEntry )
|
|
|
|
{
|
|
|
|
m_pCurrentEntry->nSize = m_aDeflater.getTotalIn();
|
|
|
|
m_pCurrentEntry->nCompressedSize = m_aDeflater.getTotalOut();
|
|
|
|
}
|
|
|
|
m_pCurrentEntry->nCrc = m_aCRC.getValue();
|
|
|
|
}
|
|
|
|
m_aDeflater.reset();
|
|
|
|
m_aCRC.reset();
|
2014-10-09 15:22:54 +02:00
|
|
|
|
2014-10-20 22:54:49 +02:00
|
|
|
if (m_bEncryptCurrentEntry)
|
|
|
|
{
|
|
|
|
m_xCipherContext.clear();
|
2014-10-09 15:22:54 +02:00
|
|
|
|
2014-10-20 22:54:49 +02:00
|
|
|
uno::Sequence< sal_Int8 > aDigestSeq;
|
|
|
|
if ( m_xDigestContext.is() )
|
|
|
|
{
|
|
|
|
aDigestSeq = m_xDigestContext->finalizeDigestAndDispose();
|
|
|
|
m_xDigestContext.clear();
|
2014-10-09 15:22:54 +02:00
|
|
|
}
|
2014-10-20 22:54:49 +02:00
|
|
|
|
|
|
|
if ( m_pCurrentStream )
|
|
|
|
m_pCurrentStream->setDigest( aDigestSeq );
|
2014-10-09 15:22:54 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2014-10-27 14:26:54 +01:00
|
|
|
void ZipOutputEntry::write( const Sequence< sal_Int8 >& rBuffer )
|
2014-10-09 15:22:54 +02:00
|
|
|
{
|
2014-10-20 22:02:48 +02:00
|
|
|
if (!m_aDeflater.finished())
|
2014-10-09 15:22:54 +02:00
|
|
|
{
|
2014-10-27 14:26:54 +01:00
|
|
|
m_aDeflater.setInputSegment(rBuffer);
|
2014-10-20 22:02:48 +02:00
|
|
|
while (!m_aDeflater.needsInput())
|
|
|
|
doDeflate();
|
|
|
|
if (!m_bEncryptCurrentEntry)
|
2014-10-27 14:26:54 +01:00
|
|
|
m_aCRC.updateSegment(rBuffer, rBuffer.getLength());
|
2014-10-09 15:22:54 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
void ZipOutputEntry::doDeflate()
|
|
|
|
{
|
|
|
|
sal_Int32 nLength = m_aDeflater.doDeflateSegment(m_aDeflateBuffer, 0, m_aDeflateBuffer.getLength());
|
|
|
|
|
|
|
|
if ( nLength > 0 )
|
|
|
|
{
|
|
|
|
uno::Sequence< sal_Int8 > aTmpBuffer( m_aDeflateBuffer.getConstArray(), nLength );
|
|
|
|
if ( m_bEncryptCurrentEntry && m_xDigestContext.is() && m_xCipherContext.is() )
|
|
|
|
{
|
|
|
|
// Need to update our digest before encryption...
|
|
|
|
sal_Int32 nDiff = n_ConstDigestLength - m_nDigested;
|
|
|
|
if ( nDiff )
|
|
|
|
{
|
|
|
|
sal_Int32 nEat = ::std::min( nLength, nDiff );
|
|
|
|
uno::Sequence< sal_Int8 > aTmpSeq( aTmpBuffer.getConstArray(), nEat );
|
|
|
|
m_xDigestContext->updateDigest( aTmpSeq );
|
|
|
|
m_nDigested = m_nDigested + static_cast< sal_Int16 >( nEat );
|
|
|
|
}
|
|
|
|
|
|
|
|
// FIXME64: uno::Sequence not 64bit safe.
|
|
|
|
uno::Sequence< sal_Int8 > aEncryptionBuffer = m_xCipherContext->convertWithCipherContext( aTmpBuffer );
|
|
|
|
|
2014-12-13 23:09:10 +01:00
|
|
|
m_xOutStream->writeBytes( aEncryptionBuffer );
|
2014-10-09 15:22:54 +02:00
|
|
|
|
|
|
|
// the sizes as well as checksum for encrypted streams is calculated here
|
|
|
|
m_pCurrentEntry->nCompressedSize += aEncryptionBuffer.getLength();
|
|
|
|
m_pCurrentEntry->nSize = m_pCurrentEntry->nCompressedSize;
|
|
|
|
m_aCRC.update( aEncryptionBuffer );
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
2014-12-13 23:09:10 +01:00
|
|
|
m_xOutStream->writeBytes ( aTmpBuffer );
|
2014-10-09 15:22:54 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if ( m_aDeflater.finished() && m_bEncryptCurrentEntry && m_xDigestContext.is() && m_xCipherContext.is() )
|
|
|
|
{
|
|
|
|
// FIXME64: sequence not 64bit safe.
|
|
|
|
uno::Sequence< sal_Int8 > aEncryptionBuffer = m_xCipherContext->finalizeCipherContextAndDispose();
|
|
|
|
if ( aEncryptionBuffer.getLength() )
|
|
|
|
{
|
2014-12-13 23:09:10 +01:00
|
|
|
m_xOutStream->writeBytes( aEncryptionBuffer );
|
2014-10-09 15:22:54 +02:00
|
|
|
|
|
|
|
// the sizes as well as checksum for encrypted streams is calculated hier
|
|
|
|
m_pCurrentEntry->nCompressedSize += aEncryptionBuffer.getLength();
|
|
|
|
m_pCurrentEntry->nSize = m_pCurrentEntry->nCompressedSize;
|
|
|
|
m_aCRC.update( aEncryptionBuffer );
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/* vim:set shiftwidth=4 softtabstop=4 expandtab: */
|