Initial Commit
This commit is contained in:
134
iTechSharp/srcbc/util/Arrays.cs
Normal file
134
iTechSharp/srcbc/util/Arrays.cs
Normal file
@@ -0,0 +1,134 @@
|
||||
using System;
|
||||
using System.Text;
|
||||
|
||||
namespace Org.BouncyCastle.Utilities
|
||||
{
|
||||
|
||||
/// <summary> General array utilities.</summary>
|
||||
public sealed class Arrays
|
||||
{
|
||||
private Arrays()
|
||||
{
|
||||
}
|
||||
|
||||
/// <summary>
|
||||
/// Are two arrays equal.
|
||||
/// </summary>
|
||||
/// <param name="a">Left side.</param>
|
||||
/// <param name="b">Right side.</param>
|
||||
/// <returns>True if equal.</returns>
|
||||
public static bool AreEqual(
|
||||
byte[] a,
|
||||
byte[] b)
|
||||
{
|
||||
if (a == b)
|
||||
return true;
|
||||
|
||||
if (a == null || b == null)
|
||||
return false;
|
||||
|
||||
return HaveSameContents(a, b);
|
||||
}
|
||||
|
||||
[Obsolete("Use 'AreEqual' method instead")]
|
||||
public static bool AreSame(
|
||||
byte[] a,
|
||||
byte[] b)
|
||||
{
|
||||
return AreEqual(a, b);
|
||||
}
|
||||
|
||||
public static bool AreEqual(
|
||||
int[] a,
|
||||
int[] b)
|
||||
{
|
||||
if (a == b)
|
||||
return true;
|
||||
|
||||
if (a == null || b == null)
|
||||
return false;
|
||||
|
||||
return HaveSameContents(a, b);
|
||||
}
|
||||
|
||||
private static bool HaveSameContents(
|
||||
byte[] a,
|
||||
byte[] b)
|
||||
{
|
||||
if (a.Length != b.Length)
|
||||
return false;
|
||||
|
||||
for (int i = 0; i < a.Length; i++)
|
||||
{
|
||||
if (a[i] != b[i])
|
||||
return false;
|
||||
}
|
||||
|
||||
return true;
|
||||
}
|
||||
|
||||
private static bool HaveSameContents(
|
||||
int[] a,
|
||||
int[] b)
|
||||
{
|
||||
if (a.Length != b.Length)
|
||||
return false;
|
||||
|
||||
for (int i = 0; i < a.Length; i++)
|
||||
{
|
||||
if (a[i] != b[i])
|
||||
return false;
|
||||
}
|
||||
|
||||
return true;
|
||||
}
|
||||
|
||||
public static string ToString(
|
||||
object[] a)
|
||||
{
|
||||
StringBuilder sb = new StringBuilder('[');
|
||||
if (a.Length > 0)
|
||||
{
|
||||
sb.Append(a[0]);
|
||||
for (int index = 1; index < a.Length; ++index)
|
||||
{
|
||||
sb.Append(", ").Append(a[index]);
|
||||
}
|
||||
}
|
||||
sb.Append(']');
|
||||
return sb.ToString();
|
||||
}
|
||||
|
||||
public static int GetHashCode(
|
||||
byte[] data)
|
||||
{
|
||||
if (data == null)
|
||||
{
|
||||
return 0;
|
||||
}
|
||||
|
||||
int i = data.Length;
|
||||
int hc = i + 1;
|
||||
|
||||
while (--i >= 0)
|
||||
{
|
||||
hc *= 257;
|
||||
hc ^= data[i];
|
||||
}
|
||||
|
||||
return hc;
|
||||
}
|
||||
|
||||
public static byte[] Clone(
|
||||
byte[] data)
|
||||
{
|
||||
return data == null ? null : (byte[]) data.Clone();
|
||||
}
|
||||
|
||||
public static int[] Clone(
|
||||
int[] data)
|
||||
{
|
||||
return data == null ? null : (int[]) data.Clone();
|
||||
}
|
||||
}
|
||||
}
|
28
iTechSharp/srcbc/util/BigIntegers.cs
Normal file
28
iTechSharp/srcbc/util/BigIntegers.cs
Normal file
@@ -0,0 +1,28 @@
|
||||
using System;
|
||||
|
||||
using Org.BouncyCastle.Math;
|
||||
|
||||
namespace Org.BouncyCastle.Utilities
|
||||
{
|
||||
/**
|
||||
* BigInteger utilities.
|
||||
*/
|
||||
public sealed class BigIntegers
|
||||
{
|
||||
private BigIntegers()
|
||||
{
|
||||
}
|
||||
|
||||
/**
|
||||
* Return the passed in value as an unsigned byte array.
|
||||
*
|
||||
* @param value value to be converted.
|
||||
* @return a byte array without a leading zero byte if present in the signed encoding.
|
||||
*/
|
||||
public static byte[] AsUnsignedByteArray(
|
||||
BigInteger n)
|
||||
{
|
||||
return n.ToByteArrayUnsigned();
|
||||
}
|
||||
}
|
||||
}
|
72
iTechSharp/srcbc/util/Platform.cs
Normal file
72
iTechSharp/srcbc/util/Platform.cs
Normal file
@@ -0,0 +1,72 @@
|
||||
using System;
|
||||
using System.IO;
|
||||
using System.Text;
|
||||
|
||||
namespace Org.BouncyCastle.Utilities
|
||||
{
|
||||
internal sealed class Platform
|
||||
{
|
||||
private Platform()
|
||||
{
|
||||
}
|
||||
|
||||
#if NETCF_1_0
|
||||
internal static Exception CreateNotImplementedException(
|
||||
string message)
|
||||
{
|
||||
return new Exception("Not implemented: " + message);
|
||||
}
|
||||
|
||||
internal static bool Equals(
|
||||
object a,
|
||||
object b)
|
||||
{
|
||||
return a == b || (a != null && b != null && a.Equals(b));
|
||||
}
|
||||
|
||||
internal static string GetEnvironmentVariable(
|
||||
string variable)
|
||||
{
|
||||
return null;
|
||||
}
|
||||
|
||||
private static string GetNewLine()
|
||||
{
|
||||
MemoryStream buf = new MemoryStream();
|
||||
StreamWriter w = new StreamWriter(buf, Encoding.ASCII);
|
||||
w.WriteLine();
|
||||
w.Close();
|
||||
byte[] bs = buf.ToArray();
|
||||
return Encoding.ASCII.GetString(bs, 0, bs.Length);
|
||||
}
|
||||
#else
|
||||
internal static Exception CreateNotImplementedException(
|
||||
string message)
|
||||
{
|
||||
return new NotImplementedException(message);
|
||||
}
|
||||
|
||||
internal static string GetEnvironmentVariable(
|
||||
string variable)
|
||||
{
|
||||
try
|
||||
{
|
||||
return Environment.GetEnvironmentVariable(variable);
|
||||
}
|
||||
catch (System.Security.SecurityException)
|
||||
{
|
||||
// We don't have the required permission to read this environment variable,
|
||||
// which is fine, just act as if it's not set
|
||||
return null;
|
||||
}
|
||||
}
|
||||
|
||||
private static string GetNewLine()
|
||||
{
|
||||
return Environment.NewLine;
|
||||
}
|
||||
#endif
|
||||
|
||||
internal static readonly string NewLine = GetNewLine();
|
||||
}
|
||||
}
|
34
iTechSharp/srcbc/util/Strings.cs
Normal file
34
iTechSharp/srcbc/util/Strings.cs
Normal file
@@ -0,0 +1,34 @@
|
||||
using System;
|
||||
|
||||
namespace Org.BouncyCastle.Utilities
|
||||
{
|
||||
/// <summary> General string utilities.</summary>
|
||||
public sealed class Strings
|
||||
{
|
||||
private Strings()
|
||||
{
|
||||
}
|
||||
|
||||
public static string FromByteArray(
|
||||
byte[] bs)
|
||||
{
|
||||
char[] cs = new char[bs.Length];
|
||||
for (int i = 0; i < cs.Length; ++i)
|
||||
{
|
||||
cs[i] = Convert.ToChar(bs[i]);
|
||||
}
|
||||
return new string(cs);
|
||||
}
|
||||
|
||||
public static byte[] ToByteArray(
|
||||
string s)
|
||||
{
|
||||
byte[] bs = new byte[s.Length];
|
||||
for (int i = 0; i < bs.Length; ++i)
|
||||
{
|
||||
bs[i] = Convert.ToByte(s[i]);
|
||||
}
|
||||
return bs;
|
||||
}
|
||||
}
|
||||
}
|
139
iTechSharp/srcbc/util/bzip2/BZip2Constants.cs
Normal file
139
iTechSharp/srcbc/util/bzip2/BZip2Constants.cs
Normal file
@@ -0,0 +1,139 @@
|
||||
using System;
|
||||
|
||||
/*
|
||||
* The Apache Software License, Version 1.1
|
||||
*
|
||||
* Copyright (c) 2001 The Apache Software Foundation. All rights
|
||||
* reserved.
|
||||
*
|
||||
* Redistribution and use in source and binary forms, with or without
|
||||
* modification, are permitted provided that the following conditions
|
||||
* are met:
|
||||
*
|
||||
* 1. Redistributions of source code must retain the above copyright
|
||||
* notice, this list of conditions and the following disclaimer.
|
||||
*
|
||||
* 2. Redistributions in binary form must reproduce the above copyright
|
||||
* notice, this list of conditions and the following disclaimer in
|
||||
* the documentation and/or other materials provided with the
|
||||
* distribution.
|
||||
*
|
||||
* 3. The end-user documentation included with the redistribution, if
|
||||
* any, must include the following acknowlegement:
|
||||
* "This product includes software developed by the
|
||||
* Apache Software Foundation (http://www.apache.org/)."
|
||||
* Alternately, this acknowlegement may appear in the software itself,
|
||||
* if and wherever such third-party acknowlegements normally appear.
|
||||
*
|
||||
* 4. The names "Ant" and "Apache Software
|
||||
* Foundation" must not be used to endorse or promote products derived
|
||||
* from this software without prior written permission. For written
|
||||
* permission, please contact apache@apache.org.
|
||||
*
|
||||
* 5. Products derived from this software may not be called "Apache"
|
||||
* nor may "Apache" appear in their names without prior written
|
||||
* permission of the Apache Group.
|
||||
*
|
||||
* THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESSED OR IMPLIED
|
||||
* WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
|
||||
* OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
|
||||
* DISCLAIMED. IN NO EVENT SHALL THE APACHE SOFTWARE FOUNDATION OR
|
||||
* ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
|
||||
* SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
|
||||
* LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF
|
||||
* USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND
|
||||
* ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY,
|
||||
* OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT
|
||||
* OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
||||
* SUCH DAMAGE.
|
||||
* ====================================================================
|
||||
*
|
||||
* This software consists of voluntary contributions made by many
|
||||
* individuals on behalf of the Apache Software Foundation. For more
|
||||
* information on the Apache Software Foundation, please see
|
||||
* <http://www.apache.org/>.
|
||||
*/
|
||||
|
||||
/*
|
||||
* This package is based on the work done by Keiron Liddle, Aftex Software
|
||||
* <keiron@aftexsw.com> to whom the Ant project is very grateful for his
|
||||
* great code.
|
||||
*/
|
||||
|
||||
namespace Org.BouncyCastle.Apache.Bzip2
|
||||
{
|
||||
/**
|
||||
* Base class for both the compress and decompress classes.
|
||||
* Holds common arrays, and static data.
|
||||
*
|
||||
* @author <a href="mailto:keiron@aftexsw.com">Keiron Liddle</a>
|
||||
*/
|
||||
public class BZip2Constants {
|
||||
|
||||
public const int baseBlockSize = 100000;
|
||||
public const int MAX_ALPHA_SIZE = 258;
|
||||
public const int MAX_CODE_LEN = 23;
|
||||
public const int RUNA = 0;
|
||||
public const int RUNB = 1;
|
||||
public const int N_GROUPS = 6;
|
||||
public const int G_SIZE = 50;
|
||||
public const int N_ITERS = 4;
|
||||
public const int MAX_SELECTORS = (2 + (900000 / G_SIZE));
|
||||
public const int NUM_OVERSHOOT_BYTES = 20;
|
||||
|
||||
public static int[] rNums = {
|
||||
619, 720, 127, 481, 931, 816, 813, 233, 566, 247,
|
||||
985, 724, 205, 454, 863, 491, 741, 242, 949, 214,
|
||||
733, 859, 335, 708, 621, 574, 73, 654, 730, 472,
|
||||
419, 436, 278, 496, 867, 210, 399, 680, 480, 51,
|
||||
878, 465, 811, 169, 869, 675, 611, 697, 867, 561,
|
||||
862, 687, 507, 283, 482, 129, 807, 591, 733, 623,
|
||||
150, 238, 59, 379, 684, 877, 625, 169, 643, 105,
|
||||
170, 607, 520, 932, 727, 476, 693, 425, 174, 647,
|
||||
73, 122, 335, 530, 442, 853, 695, 249, 445, 515,
|
||||
909, 545, 703, 919, 874, 474, 882, 500, 594, 612,
|
||||
641, 801, 220, 162, 819, 984, 589, 513, 495, 799,
|
||||
161, 604, 958, 533, 221, 400, 386, 867, 600, 782,
|
||||
382, 596, 414, 171, 516, 375, 682, 485, 911, 276,
|
||||
98, 553, 163, 354, 666, 933, 424, 341, 533, 870,
|
||||
227, 730, 475, 186, 263, 647, 537, 686, 600, 224,
|
||||
469, 68, 770, 919, 190, 373, 294, 822, 808, 206,
|
||||
184, 943, 795, 384, 383, 461, 404, 758, 839, 887,
|
||||
715, 67, 618, 276, 204, 918, 873, 777, 604, 560,
|
||||
951, 160, 578, 722, 79, 804, 96, 409, 713, 940,
|
||||
652, 934, 970, 447, 318, 353, 859, 672, 112, 785,
|
||||
645, 863, 803, 350, 139, 93, 354, 99, 820, 908,
|
||||
609, 772, 154, 274, 580, 184, 79, 626, 630, 742,
|
||||
653, 282, 762, 623, 680, 81, 927, 626, 789, 125,
|
||||
411, 521, 938, 300, 821, 78, 343, 175, 128, 250,
|
||||
170, 774, 972, 275, 999, 639, 495, 78, 352, 126,
|
||||
857, 956, 358, 619, 580, 124, 737, 594, 701, 612,
|
||||
669, 112, 134, 694, 363, 992, 809, 743, 168, 974,
|
||||
944, 375, 748, 52, 600, 747, 642, 182, 862, 81,
|
||||
344, 805, 988, 739, 511, 655, 814, 334, 249, 515,
|
||||
897, 955, 664, 981, 649, 113, 974, 459, 893, 228,
|
||||
433, 837, 553, 268, 926, 240, 102, 654, 459, 51,
|
||||
686, 754, 806, 760, 493, 403, 415, 394, 687, 700,
|
||||
946, 670, 656, 610, 738, 392, 760, 799, 887, 653,
|
||||
978, 321, 576, 617, 626, 502, 894, 679, 243, 440,
|
||||
680, 879, 194, 572, 640, 724, 926, 56, 204, 700,
|
||||
707, 151, 457, 449, 797, 195, 791, 558, 945, 679,
|
||||
297, 59, 87, 824, 713, 663, 412, 693, 342, 606,
|
||||
134, 108, 571, 364, 631, 212, 174, 643, 304, 329,
|
||||
343, 97, 430, 751, 497, 314, 983, 374, 822, 928,
|
||||
140, 206, 73, 263, 980, 736, 876, 478, 430, 305,
|
||||
170, 514, 364, 692, 829, 82, 855, 953, 676, 246,
|
||||
369, 970, 294, 750, 807, 827, 150, 790, 288, 923,
|
||||
804, 378, 215, 828, 592, 281, 565, 555, 710, 82,
|
||||
896, 831, 547, 261, 524, 462, 293, 465, 502, 56,
|
||||
661, 821, 976, 991, 658, 869, 905, 758, 745, 193,
|
||||
768, 550, 608, 933, 378, 286, 215, 979, 792, 961,
|
||||
61, 688, 793, 644, 986, 403, 106, 366, 905, 644,
|
||||
372, 567, 466, 434, 645, 210, 389, 550, 919, 135,
|
||||
780, 773, 635, 389, 707, 100, 626, 958, 165, 504,
|
||||
920, 176, 193, 713, 857, 265, 203, 50, 668, 108,
|
||||
645, 990, 626, 197, 510, 357, 358, 850, 858, 364,
|
||||
936, 638
|
||||
};
|
||||
}
|
||||
}
|
954
iTechSharp/srcbc/util/bzip2/CBZip2InputStream.cs
Normal file
954
iTechSharp/srcbc/util/bzip2/CBZip2InputStream.cs
Normal file
@@ -0,0 +1,954 @@
|
||||
using System;
|
||||
using System.IO;
|
||||
/*
|
||||
* The Apache Software License, Version 1.1
|
||||
*
|
||||
* Copyright (c) 2001-2003 The Apache Software Foundation. All rights
|
||||
* reserved.
|
||||
*
|
||||
* Redistribution and use in source and binary forms, with or without
|
||||
* modification, are permitted provided that the following conditions
|
||||
* are met:
|
||||
*
|
||||
* 1. Redistributions of source code must retain the above copyright
|
||||
* notice, this list of conditions and the following disclaimer.
|
||||
*
|
||||
* 2. Redistributions in binary form must reproduce the above copyright
|
||||
* notice, this list of conditions and the following disclaimer in
|
||||
* the documentation and/or other materials provided with the
|
||||
* distribution.
|
||||
*
|
||||
* 3. The end-user documentation included with the redistribution, if
|
||||
* any, must include the following acknowlegement:
|
||||
* "This product includes software developed by the
|
||||
* Apache Software Foundation (http://www.apache.org/)."
|
||||
* Alternately, this acknowlegement may appear in the software itself,
|
||||
* if and wherever such third-party acknowlegements normally appear.
|
||||
*
|
||||
* 4. The names "Ant" and "Apache Software
|
||||
* Foundation" must not be used to endorse or promote products derived
|
||||
* from this software without prior written permission. For written
|
||||
* permission, please contact apache@apache.org.
|
||||
*
|
||||
* 5. Products derived from this software may not be called "Apache"
|
||||
* nor may "Apache" appear in their names without prior written
|
||||
* permission of the Apache Group.
|
||||
*
|
||||
* THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESSED OR IMPLIED
|
||||
* WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
|
||||
* OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
|
||||
* DISCLAIMED. IN NO EVENT SHALL THE APACHE SOFTWARE FOUNDATION OR
|
||||
* ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
|
||||
* SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
|
||||
* LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF
|
||||
* USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND
|
||||
* ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY,
|
||||
* OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT
|
||||
* OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
||||
* SUCH DAMAGE.
|
||||
* ====================================================================
|
||||
*
|
||||
* This software consists of voluntary contributions made by many
|
||||
* individuals on behalf of the Apache Software Foundation. For more
|
||||
* information on the Apache Software Foundation, please see
|
||||
* <http://www.apache.org/>.
|
||||
*/
|
||||
|
||||
/*
|
||||
* This package is based on the work done by Keiron Liddle, Aftex Software
|
||||
* <keiron@aftexsw.com> to whom the Ant project is very grateful for his
|
||||
* great code.
|
||||
*/
|
||||
|
||||
namespace Org.BouncyCastle.Apache.Bzip2
|
||||
{
|
||||
/**
|
||||
* An input stream that decompresses from the BZip2 format (with the file
|
||||
* header chars) to be read as any other stream.
|
||||
*
|
||||
* @author <a href="mailto:keiron@aftexsw.com">Keiron Liddle</a>
|
||||
*
|
||||
* <b>NB:</b> note this class has been modified to read the leading BZ from the
|
||||
* start of the BZIP2 stream to make it compatible with other PGP programs.
|
||||
*/
|
||||
public class CBZip2InputStream : Stream
|
||||
{
|
||||
private static void Cadvise() {
|
||||
//System.out.Println("CRC Error");
|
||||
//throw new CCoruptionError();
|
||||
}
|
||||
|
||||
private static void BadBGLengths() {
|
||||
Cadvise();
|
||||
}
|
||||
|
||||
private static void BitStreamEOF() {
|
||||
Cadvise();
|
||||
}
|
||||
|
||||
private static void CompressedStreamEOF() {
|
||||
Cadvise();
|
||||
}
|
||||
|
||||
private void MakeMaps() {
|
||||
int i;
|
||||
nInUse = 0;
|
||||
for (i = 0; i < 256; i++) {
|
||||
if (inUse[i]) {
|
||||
seqToUnseq[nInUse] = (char) i;
|
||||
unseqToSeq[i] = (char) nInUse;
|
||||
nInUse++;
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
/*
|
||||
index of the last char in the block, so
|
||||
the block size == last + 1.
|
||||
*/
|
||||
private int last;
|
||||
|
||||
/*
|
||||
index in zptr[] of original string after sorting.
|
||||
*/
|
||||
private int origPtr;
|
||||
|
||||
/*
|
||||
always: in the range 0 .. 9.
|
||||
The current block size is 100000 * this number.
|
||||
*/
|
||||
private int blockSize100k;
|
||||
|
||||
private bool blockRandomised;
|
||||
|
||||
private int bsBuff;
|
||||
private int bsLive;
|
||||
private CRC mCrc = new CRC();
|
||||
|
||||
private bool[] inUse = new bool[256];
|
||||
private int nInUse;
|
||||
|
||||
private char[] seqToUnseq = new char[256];
|
||||
private char[] unseqToSeq = new char[256];
|
||||
|
||||
private char[] selector = new char[BZip2Constants.MAX_SELECTORS];
|
||||
private char[] selectorMtf = new char[BZip2Constants.MAX_SELECTORS];
|
||||
|
||||
private int[] tt;
|
||||
private char[] ll8;
|
||||
|
||||
/*
|
||||
freq table collected to save a pass over the data
|
||||
during decompression.
|
||||
*/
|
||||
private int[] unzftab = new int[256];
|
||||
|
||||
private int[][] limit = InitIntArray(BZip2Constants.N_GROUPS, BZip2Constants.MAX_ALPHA_SIZE);
|
||||
private int[][] basev = InitIntArray(BZip2Constants.N_GROUPS, BZip2Constants.MAX_ALPHA_SIZE);
|
||||
private int[][] perm = InitIntArray(BZip2Constants.N_GROUPS, BZip2Constants.MAX_ALPHA_SIZE);
|
||||
private int[] minLens = new int[BZip2Constants.N_GROUPS];
|
||||
|
||||
private Stream bsStream;
|
||||
|
||||
private bool streamEnd = false;
|
||||
|
||||
private int currentChar = -1;
|
||||
|
||||
private const int START_BLOCK_STATE = 1;
|
||||
private const int RAND_PART_A_STATE = 2;
|
||||
private const int RAND_PART_B_STATE = 3;
|
||||
private const int RAND_PART_C_STATE = 4;
|
||||
private const int NO_RAND_PART_A_STATE = 5;
|
||||
private const int NO_RAND_PART_B_STATE = 6;
|
||||
private const int NO_RAND_PART_C_STATE = 7;
|
||||
|
||||
private int currentState = START_BLOCK_STATE;
|
||||
|
||||
private int storedBlockCRC, storedCombinedCRC;
|
||||
private int computedBlockCRC, computedCombinedCRC;
|
||||
|
||||
int i2, count, chPrev, ch2;
|
||||
int i, tPos;
|
||||
int rNToGo = 0;
|
||||
int rTPos = 0;
|
||||
int j2;
|
||||
char z;
|
||||
|
||||
public CBZip2InputStream(Stream zStream) {
|
||||
ll8 = null;
|
||||
tt = null;
|
||||
BsSetStream(zStream);
|
||||
Initialize();
|
||||
InitBlock();
|
||||
SetupBlock();
|
||||
}
|
||||
|
||||
internal static int[][] InitIntArray(int n1, int n2) {
|
||||
int[][] a = new int[n1][];
|
||||
for (int k = 0; k < n1; ++k) {
|
||||
a[k] = new int[n2];
|
||||
}
|
||||
return a;
|
||||
}
|
||||
|
||||
internal static char[][] InitCharArray(int n1, int n2) {
|
||||
char[][] a = new char[n1][];
|
||||
for (int k = 0; k < n1; ++k) {
|
||||
a[k] = new char[n2];
|
||||
}
|
||||
return a;
|
||||
}
|
||||
|
||||
public override int ReadByte() {
|
||||
if (streamEnd) {
|
||||
return -1;
|
||||
} else {
|
||||
int retChar = currentChar;
|
||||
switch (currentState) {
|
||||
case START_BLOCK_STATE:
|
||||
break;
|
||||
case RAND_PART_A_STATE:
|
||||
break;
|
||||
case RAND_PART_B_STATE:
|
||||
SetupRandPartB();
|
||||
break;
|
||||
case RAND_PART_C_STATE:
|
||||
SetupRandPartC();
|
||||
break;
|
||||
case NO_RAND_PART_A_STATE:
|
||||
break;
|
||||
case NO_RAND_PART_B_STATE:
|
||||
SetupNoRandPartB();
|
||||
break;
|
||||
case NO_RAND_PART_C_STATE:
|
||||
SetupNoRandPartC();
|
||||
break;
|
||||
default:
|
||||
break;
|
||||
}
|
||||
return retChar;
|
||||
}
|
||||
}
|
||||
|
||||
private void Initialize() {
|
||||
char magic3, magic4;
|
||||
magic3 = BsGetUChar();
|
||||
magic4 = BsGetUChar();
|
||||
if (magic3 != 'B' && magic4 != 'Z')
|
||||
{
|
||||
throw new IOException("Not a BZIP2 marked stream");
|
||||
}
|
||||
magic3 = BsGetUChar();
|
||||
magic4 = BsGetUChar();
|
||||
if (magic3 != 'h' || magic4 < '1' || magic4 > '9') {
|
||||
BsFinishedWithStream();
|
||||
streamEnd = true;
|
||||
return;
|
||||
}
|
||||
|
||||
SetDecompressStructureSizes(magic4 - '0');
|
||||
computedCombinedCRC = 0;
|
||||
}
|
||||
|
||||
private void InitBlock() {
|
||||
char magic1, magic2, magic3, magic4;
|
||||
char magic5, magic6;
|
||||
magic1 = BsGetUChar();
|
||||
magic2 = BsGetUChar();
|
||||
magic3 = BsGetUChar();
|
||||
magic4 = BsGetUChar();
|
||||
magic5 = BsGetUChar();
|
||||
magic6 = BsGetUChar();
|
||||
if (magic1 == 0x17 && magic2 == 0x72 && magic3 == 0x45
|
||||
&& magic4 == 0x38 && magic5 == 0x50 && magic6 == 0x90) {
|
||||
Complete();
|
||||
return;
|
||||
}
|
||||
|
||||
if (magic1 != 0x31 || magic2 != 0x41 || magic3 != 0x59
|
||||
|| magic4 != 0x26 || magic5 != 0x53 || magic6 != 0x59) {
|
||||
BadBlockHeader();
|
||||
streamEnd = true;
|
||||
return;
|
||||
}
|
||||
|
||||
storedBlockCRC = BsGetInt32();
|
||||
|
||||
if (BsR(1) == 1) {
|
||||
blockRandomised = true;
|
||||
} else {
|
||||
blockRandomised = false;
|
||||
}
|
||||
|
||||
// currBlockNo++;
|
||||
GetAndMoveToFrontDecode();
|
||||
|
||||
mCrc.InitialiseCRC();
|
||||
currentState = START_BLOCK_STATE;
|
||||
}
|
||||
|
||||
private void EndBlock() {
|
||||
computedBlockCRC = mCrc.GetFinalCRC();
|
||||
/* A bad CRC is considered a fatal error. */
|
||||
if (storedBlockCRC != computedBlockCRC) {
|
||||
CrcError();
|
||||
}
|
||||
|
||||
computedCombinedCRC = (computedCombinedCRC << 1)
|
||||
| (int)(((uint)computedCombinedCRC) >> 31);
|
||||
computedCombinedCRC ^= computedBlockCRC;
|
||||
}
|
||||
|
||||
private void Complete() {
|
||||
storedCombinedCRC = BsGetInt32();
|
||||
if (storedCombinedCRC != computedCombinedCRC) {
|
||||
CrcError();
|
||||
}
|
||||
|
||||
BsFinishedWithStream();
|
||||
streamEnd = true;
|
||||
}
|
||||
|
||||
private static void BlockOverrun() {
|
||||
Cadvise();
|
||||
}
|
||||
|
||||
private static void BadBlockHeader() {
|
||||
Cadvise();
|
||||
}
|
||||
|
||||
private static void CrcError() {
|
||||
Cadvise();
|
||||
}
|
||||
|
||||
private void BsFinishedWithStream() {
|
||||
try {
|
||||
if (this.bsStream != null) {
|
||||
this.bsStream.Close();
|
||||
this.bsStream = null;
|
||||
}
|
||||
} catch {
|
||||
//ignore
|
||||
}
|
||||
}
|
||||
|
||||
private void BsSetStream(Stream f) {
|
||||
bsStream = f;
|
||||
bsLive = 0;
|
||||
bsBuff = 0;
|
||||
}
|
||||
|
||||
private int BsR(int n) {
|
||||
int v;
|
||||
while (bsLive < n) {
|
||||
int zzi;
|
||||
char thech = '\0';
|
||||
try {
|
||||
thech = (char) bsStream.ReadByte();
|
||||
} catch (IOException) {
|
||||
CompressedStreamEOF();
|
||||
}
|
||||
if (thech == '\uffff') {
|
||||
CompressedStreamEOF();
|
||||
}
|
||||
zzi = thech;
|
||||
bsBuff = (bsBuff << 8) | (zzi & 0xff);
|
||||
bsLive += 8;
|
||||
}
|
||||
|
||||
v = (bsBuff >> (bsLive - n)) & ((1 << n) - 1);
|
||||
bsLive -= n;
|
||||
return v;
|
||||
}
|
||||
|
||||
private char BsGetUChar() {
|
||||
return (char) BsR(8);
|
||||
}
|
||||
|
||||
private int BsGetint() {
|
||||
int u = 0;
|
||||
u = (u << 8) | BsR(8);
|
||||
u = (u << 8) | BsR(8);
|
||||
u = (u << 8) | BsR(8);
|
||||
u = (u << 8) | BsR(8);
|
||||
return u;
|
||||
}
|
||||
|
||||
private int BsGetIntVS(int numBits) {
|
||||
return (int) BsR(numBits);
|
||||
}
|
||||
|
||||
private int BsGetInt32() {
|
||||
return (int) BsGetint();
|
||||
}
|
||||
|
||||
private void HbCreateDecodeTables(int[] limit, int[] basev,
|
||||
int[] perm, char[] length,
|
||||
int minLen, int maxLen, int alphaSize) {
|
||||
int pp, i, j, vec;
|
||||
|
||||
pp = 0;
|
||||
for (i = minLen; i <= maxLen; i++) {
|
||||
for (j = 0; j < alphaSize; j++) {
|
||||
if (length[j] == i) {
|
||||
perm[pp] = j;
|
||||
pp++;
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
for (i = 0; i < BZip2Constants.MAX_CODE_LEN; i++) {
|
||||
basev[i] = 0;
|
||||
}
|
||||
for (i = 0; i < alphaSize; i++) {
|
||||
basev[length[i] + 1]++;
|
||||
}
|
||||
|
||||
for (i = 1; i < BZip2Constants.MAX_CODE_LEN; i++) {
|
||||
basev[i] += basev[i - 1];
|
||||
}
|
||||
|
||||
for (i = 0; i < BZip2Constants.MAX_CODE_LEN; i++) {
|
||||
limit[i] = 0;
|
||||
}
|
||||
vec = 0;
|
||||
|
||||
for (i = minLen; i <= maxLen; i++) {
|
||||
vec += (basev[i + 1] - basev[i]);
|
||||
limit[i] = vec - 1;
|
||||
vec <<= 1;
|
||||
}
|
||||
for (i = minLen + 1; i <= maxLen; i++) {
|
||||
basev[i] = ((limit[i - 1] + 1) << 1) - basev[i];
|
||||
}
|
||||
}
|
||||
|
||||
private void RecvDecodingTables() {
|
||||
char[][] len = InitCharArray(BZip2Constants.N_GROUPS, BZip2Constants.MAX_ALPHA_SIZE);
|
||||
int i, j, t, nGroups, nSelectors, alphaSize;
|
||||
int minLen, maxLen;
|
||||
bool[] inUse16 = new bool[16];
|
||||
|
||||
/* Receive the mapping table */
|
||||
for (i = 0; i < 16; i++) {
|
||||
if (BsR(1) == 1) {
|
||||
inUse16[i] = true;
|
||||
} else {
|
||||
inUse16[i] = false;
|
||||
}
|
||||
}
|
||||
|
||||
for (i = 0; i < 256; i++) {
|
||||
inUse[i] = false;
|
||||
}
|
||||
|
||||
for (i = 0; i < 16; i++) {
|
||||
if (inUse16[i]) {
|
||||
for (j = 0; j < 16; j++) {
|
||||
if (BsR(1) == 1) {
|
||||
inUse[i * 16 + j] = true;
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
MakeMaps();
|
||||
alphaSize = nInUse + 2;
|
||||
|
||||
/* Now the selectors */
|
||||
nGroups = BsR(3);
|
||||
nSelectors = BsR(15);
|
||||
for (i = 0; i < nSelectors; i++) {
|
||||
j = 0;
|
||||
while (BsR(1) == 1) {
|
||||
j++;
|
||||
}
|
||||
selectorMtf[i] = (char) j;
|
||||
}
|
||||
|
||||
/* Undo the MTF values for the selectors. */
|
||||
{
|
||||
char[] pos = new char[BZip2Constants.N_GROUPS];
|
||||
char tmp, v;
|
||||
for (v = '\0'; v < nGroups; v++) {
|
||||
pos[v] = v;
|
||||
}
|
||||
|
||||
for (i = 0; i < nSelectors; i++) {
|
||||
v = selectorMtf[i];
|
||||
tmp = pos[v];
|
||||
while (v > 0) {
|
||||
pos[v] = pos[v - 1];
|
||||
v--;
|
||||
}
|
||||
pos[0] = tmp;
|
||||
selector[i] = tmp;
|
||||
}
|
||||
}
|
||||
|
||||
/* Now the coding tables */
|
||||
for (t = 0; t < nGroups; t++) {
|
||||
int curr = BsR(5);
|
||||
for (i = 0; i < alphaSize; i++) {
|
||||
while (BsR(1) == 1) {
|
||||
if (BsR(1) == 0) {
|
||||
curr++;
|
||||
} else {
|
||||
curr--;
|
||||
}
|
||||
}
|
||||
len[t][i] = (char) curr;
|
||||
}
|
||||
}
|
||||
|
||||
/* Create the Huffman decoding tables */
|
||||
for (t = 0; t < nGroups; t++) {
|
||||
minLen = 32;
|
||||
maxLen = 0;
|
||||
for (i = 0; i < alphaSize; i++) {
|
||||
if (len[t][i] > maxLen) {
|
||||
maxLen = len[t][i];
|
||||
}
|
||||
if (len[t][i] < minLen) {
|
||||
minLen = len[t][i];
|
||||
}
|
||||
}
|
||||
HbCreateDecodeTables(limit[t], basev[t], perm[t], len[t], minLen,
|
||||
maxLen, alphaSize);
|
||||
minLens[t] = minLen;
|
||||
}
|
||||
}
|
||||
|
||||
private void GetAndMoveToFrontDecode() {
|
||||
char[] yy = new char[256];
|
||||
int i, j, nextSym, limitLast;
|
||||
int EOB, groupNo, groupPos;
|
||||
|
||||
limitLast = BZip2Constants.baseBlockSize * blockSize100k;
|
||||
origPtr = BsGetIntVS(24);
|
||||
|
||||
RecvDecodingTables();
|
||||
EOB = nInUse + 1;
|
||||
groupNo = -1;
|
||||
groupPos = 0;
|
||||
|
||||
/*
|
||||
Setting up the unzftab entries here is not strictly
|
||||
necessary, but it does save having to do it later
|
||||
in a separate pass, and so saves a block's worth of
|
||||
cache misses.
|
||||
*/
|
||||
for (i = 0; i <= 255; i++) {
|
||||
unzftab[i] = 0;
|
||||
}
|
||||
|
||||
for (i = 0; i <= 255; i++) {
|
||||
yy[i] = (char) i;
|
||||
}
|
||||
|
||||
last = -1;
|
||||
|
||||
{
|
||||
int zt, zn, zvec, zj;
|
||||
if (groupPos == 0) {
|
||||
groupNo++;
|
||||
groupPos = BZip2Constants.G_SIZE;
|
||||
}
|
||||
groupPos--;
|
||||
zt = selector[groupNo];
|
||||
zn = minLens[zt];
|
||||
zvec = BsR(zn);
|
||||
while (zvec > limit[zt][zn]) {
|
||||
zn++;
|
||||
{
|
||||
{
|
||||
while (bsLive < 1) {
|
||||
int zzi;
|
||||
char thech = '\0';
|
||||
try {
|
||||
thech = (char) bsStream.ReadByte();
|
||||
} catch (IOException) {
|
||||
CompressedStreamEOF();
|
||||
}
|
||||
if (thech == '\uffff') {
|
||||
CompressedStreamEOF();
|
||||
}
|
||||
zzi = thech;
|
||||
bsBuff = (bsBuff << 8) | (zzi & 0xff);
|
||||
bsLive += 8;
|
||||
}
|
||||
}
|
||||
zj = (bsBuff >> (bsLive - 1)) & 1;
|
||||
bsLive--;
|
||||
}
|
||||
zvec = (zvec << 1) | zj;
|
||||
}
|
||||
nextSym = perm[zt][zvec - basev[zt][zn]];
|
||||
}
|
||||
|
||||
while (true) {
|
||||
|
||||
if (nextSym == EOB) {
|
||||
break;
|
||||
}
|
||||
|
||||
if (nextSym == BZip2Constants.RUNA || nextSym == BZip2Constants.RUNB) {
|
||||
char ch;
|
||||
int s = -1;
|
||||
int N = 1;
|
||||
do {
|
||||
if (nextSym == BZip2Constants.RUNA) {
|
||||
s = s + (0 + 1) * N;
|
||||
} else if (nextSym == BZip2Constants.RUNB) {
|
||||
s = s + (1 + 1) * N;
|
||||
}
|
||||
N = N * 2;
|
||||
{
|
||||
int zt, zn, zvec, zj;
|
||||
if (groupPos == 0) {
|
||||
groupNo++;
|
||||
groupPos = BZip2Constants.G_SIZE;
|
||||
}
|
||||
groupPos--;
|
||||
zt = selector[groupNo];
|
||||
zn = minLens[zt];
|
||||
zvec = BsR(zn);
|
||||
while (zvec > limit[zt][zn]) {
|
||||
zn++;
|
||||
{
|
||||
{
|
||||
while (bsLive < 1) {
|
||||
int zzi;
|
||||
char thech = '\0';
|
||||
try {
|
||||
thech = (char) bsStream.ReadByte();
|
||||
} catch (IOException) {
|
||||
CompressedStreamEOF();
|
||||
}
|
||||
if (thech == '\uffff') {
|
||||
CompressedStreamEOF();
|
||||
}
|
||||
zzi = thech;
|
||||
bsBuff = (bsBuff << 8) | (zzi & 0xff);
|
||||
bsLive += 8;
|
||||
}
|
||||
}
|
||||
zj = (bsBuff >> (bsLive - 1)) & 1;
|
||||
bsLive--;
|
||||
}
|
||||
zvec = (zvec << 1) | zj;
|
||||
}
|
||||
nextSym = perm[zt][zvec - basev[zt][zn]];
|
||||
}
|
||||
} while (nextSym == BZip2Constants.RUNA || nextSym == BZip2Constants.RUNB);
|
||||
|
||||
s++;
|
||||
ch = seqToUnseq[yy[0]];
|
||||
unzftab[ch] += s;
|
||||
|
||||
while (s > 0) {
|
||||
last++;
|
||||
ll8[last] = ch;
|
||||
s--;
|
||||
}
|
||||
|
||||
if (last >= limitLast) {
|
||||
BlockOverrun();
|
||||
}
|
||||
continue;
|
||||
} else {
|
||||
char tmp;
|
||||
last++;
|
||||
if (last >= limitLast) {
|
||||
BlockOverrun();
|
||||
}
|
||||
|
||||
tmp = yy[nextSym - 1];
|
||||
unzftab[seqToUnseq[tmp]]++;
|
||||
ll8[last] = seqToUnseq[tmp];
|
||||
|
||||
/*
|
||||
This loop is hammered during decompression,
|
||||
hence the unrolling.
|
||||
|
||||
for (j = nextSym-1; j > 0; j--) yy[j] = yy[j-1];
|
||||
*/
|
||||
|
||||
j = nextSym - 1;
|
||||
for (; j > 3; j -= 4) {
|
||||
yy[j] = yy[j - 1];
|
||||
yy[j - 1] = yy[j - 2];
|
||||
yy[j - 2] = yy[j - 3];
|
||||
yy[j - 3] = yy[j - 4];
|
||||
}
|
||||
for (; j > 0; j--) {
|
||||
yy[j] = yy[j - 1];
|
||||
}
|
||||
|
||||
yy[0] = tmp;
|
||||
{
|
||||
int zt, zn, zvec, zj;
|
||||
if (groupPos == 0) {
|
||||
groupNo++;
|
||||
groupPos = BZip2Constants.G_SIZE;
|
||||
}
|
||||
groupPos--;
|
||||
zt = selector[groupNo];
|
||||
zn = minLens[zt];
|
||||
zvec = BsR(zn);
|
||||
while (zvec > limit[zt][zn]) {
|
||||
zn++;
|
||||
{
|
||||
{
|
||||
while (bsLive < 1) {
|
||||
int zzi;
|
||||
char thech = '\0';
|
||||
try {
|
||||
thech = (char) bsStream.ReadByte();
|
||||
} catch (IOException) {
|
||||
CompressedStreamEOF();
|
||||
}
|
||||
zzi = thech;
|
||||
bsBuff = (bsBuff << 8) | (zzi & 0xff);
|
||||
bsLive += 8;
|
||||
}
|
||||
}
|
||||
zj = (bsBuff >> (bsLive - 1)) & 1;
|
||||
bsLive--;
|
||||
}
|
||||
zvec = (zvec << 1) | zj;
|
||||
}
|
||||
nextSym = perm[zt][zvec - basev[zt][zn]];
|
||||
}
|
||||
continue;
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
private void SetupBlock() {
|
||||
int[] cftab = new int[257];
|
||||
char ch;
|
||||
|
||||
cftab[0] = 0;
|
||||
for (i = 1; i <= 256; i++) {
|
||||
cftab[i] = unzftab[i - 1];
|
||||
}
|
||||
for (i = 1; i <= 256; i++) {
|
||||
cftab[i] += cftab[i - 1];
|
||||
}
|
||||
|
||||
for (i = 0; i <= last; i++) {
|
||||
ch = (char) ll8[i];
|
||||
tt[cftab[ch]] = i;
|
||||
cftab[ch]++;
|
||||
}
|
||||
cftab = null;
|
||||
|
||||
tPos = tt[origPtr];
|
||||
|
||||
count = 0;
|
||||
i2 = 0;
|
||||
ch2 = 256; /* not a char and not EOF */
|
||||
|
||||
if (blockRandomised) {
|
||||
rNToGo = 0;
|
||||
rTPos = 0;
|
||||
SetupRandPartA();
|
||||
} else {
|
||||
SetupNoRandPartA();
|
||||
}
|
||||
}
|
||||
|
||||
private void SetupRandPartA() {
|
||||
if (i2 <= last) {
|
||||
chPrev = ch2;
|
||||
ch2 = ll8[tPos];
|
||||
tPos = tt[tPos];
|
||||
if (rNToGo == 0) {
|
||||
rNToGo = BZip2Constants.rNums[rTPos];
|
||||
rTPos++;
|
||||
if (rTPos == 512) {
|
||||
rTPos = 0;
|
||||
}
|
||||
}
|
||||
rNToGo--;
|
||||
ch2 ^= (int) ((rNToGo == 1) ? 1 : 0);
|
||||
i2++;
|
||||
|
||||
currentChar = ch2;
|
||||
currentState = RAND_PART_B_STATE;
|
||||
mCrc.UpdateCRC(ch2);
|
||||
} else {
|
||||
EndBlock();
|
||||
InitBlock();
|
||||
SetupBlock();
|
||||
}
|
||||
}
|
||||
|
||||
private void SetupNoRandPartA() {
|
||||
if (i2 <= last) {
|
||||
chPrev = ch2;
|
||||
ch2 = ll8[tPos];
|
||||
tPos = tt[tPos];
|
||||
i2++;
|
||||
|
||||
currentChar = ch2;
|
||||
currentState = NO_RAND_PART_B_STATE;
|
||||
mCrc.UpdateCRC(ch2);
|
||||
} else {
|
||||
EndBlock();
|
||||
InitBlock();
|
||||
SetupBlock();
|
||||
}
|
||||
}
|
||||
|
||||
private void SetupRandPartB() {
|
||||
if (ch2 != chPrev) {
|
||||
currentState = RAND_PART_A_STATE;
|
||||
count = 1;
|
||||
SetupRandPartA();
|
||||
} else {
|
||||
count++;
|
||||
if (count >= 4) {
|
||||
z = ll8[tPos];
|
||||
tPos = tt[tPos];
|
||||
if (rNToGo == 0) {
|
||||
rNToGo = BZip2Constants.rNums[rTPos];
|
||||
rTPos++;
|
||||
if (rTPos == 512) {
|
||||
rTPos = 0;
|
||||
}
|
||||
}
|
||||
rNToGo--;
|
||||
z ^= (char)((rNToGo == 1) ? 1 : 0);
|
||||
j2 = 0;
|
||||
currentState = RAND_PART_C_STATE;
|
||||
SetupRandPartC();
|
||||
} else {
|
||||
currentState = RAND_PART_A_STATE;
|
||||
SetupRandPartA();
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
private void SetupRandPartC() {
|
||||
if (j2 < (int) z) {
|
||||
currentChar = ch2;
|
||||
mCrc.UpdateCRC(ch2);
|
||||
j2++;
|
||||
} else {
|
||||
currentState = RAND_PART_A_STATE;
|
||||
i2++;
|
||||
count = 0;
|
||||
SetupRandPartA();
|
||||
}
|
||||
}
|
||||
|
||||
private void SetupNoRandPartB() {
|
||||
if (ch2 != chPrev) {
|
||||
currentState = NO_RAND_PART_A_STATE;
|
||||
count = 1;
|
||||
SetupNoRandPartA();
|
||||
} else {
|
||||
count++;
|
||||
if (count >= 4) {
|
||||
z = ll8[tPos];
|
||||
tPos = tt[tPos];
|
||||
currentState = NO_RAND_PART_C_STATE;
|
||||
j2 = 0;
|
||||
SetupNoRandPartC();
|
||||
} else {
|
||||
currentState = NO_RAND_PART_A_STATE;
|
||||
SetupNoRandPartA();
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
private void SetupNoRandPartC() {
|
||||
if (j2 < (int) z) {
|
||||
currentChar = ch2;
|
||||
mCrc.UpdateCRC(ch2);
|
||||
j2++;
|
||||
} else {
|
||||
currentState = NO_RAND_PART_A_STATE;
|
||||
i2++;
|
||||
count = 0;
|
||||
SetupNoRandPartA();
|
||||
}
|
||||
}
|
||||
|
||||
private void SetDecompressStructureSizes(int newSize100k) {
|
||||
if (!(0 <= newSize100k && newSize100k <= 9 && 0 <= blockSize100k
|
||||
&& blockSize100k <= 9)) {
|
||||
// throw new IOException("Invalid block size");
|
||||
}
|
||||
|
||||
blockSize100k = newSize100k;
|
||||
|
||||
if (newSize100k == 0) {
|
||||
return;
|
||||
}
|
||||
|
||||
int n = BZip2Constants.baseBlockSize * newSize100k;
|
||||
ll8 = new char[n];
|
||||
tt = new int[n];
|
||||
}
|
||||
|
||||
public override void Flush() {
|
||||
}
|
||||
|
||||
public override int Read(byte[] buffer, int offset, int count) {
|
||||
int c = -1;
|
||||
int k;
|
||||
for (k = 0; k < count; ++k) {
|
||||
c = ReadByte();
|
||||
if (c == -1)
|
||||
break;
|
||||
buffer[k + offset] = (byte)c;
|
||||
}
|
||||
return k;
|
||||
}
|
||||
|
||||
public override long Seek(long offset, SeekOrigin origin) {
|
||||
return 0;
|
||||
}
|
||||
|
||||
public override void SetLength(long value) {
|
||||
}
|
||||
|
||||
public override void Write(byte[] buffer, int offset, int count) {
|
||||
}
|
||||
|
||||
public override bool CanRead {
|
||||
get {
|
||||
return true;
|
||||
}
|
||||
}
|
||||
|
||||
public override bool CanSeek {
|
||||
get {
|
||||
return false;
|
||||
}
|
||||
}
|
||||
|
||||
public override bool CanWrite {
|
||||
get {
|
||||
return false;
|
||||
}
|
||||
}
|
||||
|
||||
public override long Length {
|
||||
get {
|
||||
return 0;
|
||||
}
|
||||
}
|
||||
|
||||
public override long Position {
|
||||
get {
|
||||
return 0;
|
||||
}
|
||||
set {
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
1731
iTechSharp/srcbc/util/bzip2/CBZip2OutputStream.cs
Normal file
1731
iTechSharp/srcbc/util/bzip2/CBZip2OutputStream.cs
Normal file
File diff suppressed because it is too large
Load Diff
170
iTechSharp/srcbc/util/bzip2/CRC.cs
Normal file
170
iTechSharp/srcbc/util/bzip2/CRC.cs
Normal file
@@ -0,0 +1,170 @@
|
||||
using System;
|
||||
|
||||
/*
|
||||
* The Apache Software License), Version 1.1
|
||||
*
|
||||
* Copyright (c) 2001-2002 The Apache Software Foundation. All rights
|
||||
* reserved.
|
||||
*
|
||||
* Redistribution and use in source and binary forms), with or without
|
||||
* modification), are permitted provided that the following conditions
|
||||
* are met:
|
||||
*
|
||||
* 1. Redistributions of source code must retain the above copyright
|
||||
* notice), this list of conditions and the following disclaimer.
|
||||
*
|
||||
* 2. Redistributions in binary form must reproduce the above copyright
|
||||
* notice), this list of conditions and the following disclaimer in
|
||||
* the documentation and/or other materials provided with the
|
||||
* distribution.
|
||||
*
|
||||
* 3. The end-user documentation included with the redistribution), if
|
||||
* any), must include the following acknowlegement:
|
||||
* "This product includes software developed by the
|
||||
* Apache Software Foundation (http://www.apache.org/)."
|
||||
* Alternately), this acknowlegement may appear in the software itself),
|
||||
* if and wherever such third-party acknowlegements normally appear.
|
||||
*
|
||||
* 4. The names "Ant" and "Apache Software
|
||||
* Foundation" must not be used to endorse or promote products derived
|
||||
* from this software without prior written permission. For written
|
||||
* permission), please contact apache@apache.org.
|
||||
*
|
||||
* 5. Products derived from this software may not be called "Apache"
|
||||
* nor may "Apache" appear in their names without prior written
|
||||
* permission of the Apache Group.
|
||||
*
|
||||
* THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESSED OR IMPLIED
|
||||
* WARRANTIES), INCLUDING), BUT NOT LIMITED TO), THE IMPLIED WARRANTIES
|
||||
* OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
|
||||
* DISCLAIMED. IN NO EVENT SHALL THE APACHE SOFTWARE FOUNDATION OR
|
||||
* ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT), INDIRECT), INCIDENTAL),
|
||||
* SPECIAL), EXEMPLARY), OR CONSEQUENTIAL DAMAGES (INCLUDING), BUT NOT
|
||||
* LIMITED TO), PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF
|
||||
* USE), DATA), OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND
|
||||
* ON ANY THEORY OF LIABILITY), WHETHER IN CONTRACT), STRICT LIABILITY),
|
||||
* OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT
|
||||
* OF THE USE OF THIS SOFTWARE), EVEN IF ADVISED OF THE POSSIBILITY OF
|
||||
* SUCH DAMAGE.
|
||||
* ====================================================================
|
||||
*
|
||||
* This software consists of voluntary contributions made by many
|
||||
* individuals on behalf of the Apache Software Foundation. For more
|
||||
* information on the Apache Software Foundation), please see
|
||||
* <http://www.apache.org/>.
|
||||
*/
|
||||
|
||||
/*
|
||||
* This package is based on the work done by Keiron Liddle), Aftex Software
|
||||
* <keiron@aftexsw.com> to whom the Ant project is very grateful for his
|
||||
* great code.
|
||||
*/
|
||||
|
||||
namespace Org.BouncyCastle.Apache.Bzip2
|
||||
{
|
||||
/**
|
||||
* A simple class the hold and calculate the CRC for sanity checking
|
||||
* of the data.
|
||||
*
|
||||
* @author <a href="mailto:keiron@aftexsw.com">Keiron Liddle</a>
|
||||
*/
|
||||
internal class CRC
|
||||
{
|
||||
public static int[] crc32Table = {
|
||||
unchecked((int)0x00000000), unchecked((int)0x04c11db7), unchecked((int)0x09823b6e), unchecked((int)0x0d4326d9),
|
||||
unchecked((int)0x130476dc), unchecked((int)0x17c56b6b), unchecked((int)0x1a864db2), unchecked((int)0x1e475005),
|
||||
unchecked((int)0x2608edb8), unchecked((int)0x22c9f00f), unchecked((int)0x2f8ad6d6), unchecked((int)0x2b4bcb61),
|
||||
unchecked((int)0x350c9b64), unchecked((int)0x31cd86d3), unchecked((int)0x3c8ea00a), unchecked((int)0x384fbdbd),
|
||||
unchecked((int)0x4c11db70), unchecked((int)0x48d0c6c7), unchecked((int)0x4593e01e), unchecked((int)0x4152fda9),
|
||||
unchecked((int)0x5f15adac), unchecked((int)0x5bd4b01b), unchecked((int)0x569796c2), unchecked((int)0x52568b75),
|
||||
unchecked((int)0x6a1936c8), unchecked((int)0x6ed82b7f), unchecked((int)0x639b0da6), unchecked((int)0x675a1011),
|
||||
unchecked((int)0x791d4014), unchecked((int)0x7ddc5da3), unchecked((int)0x709f7b7a), unchecked((int)0x745e66cd),
|
||||
unchecked((int)0x9823b6e0), unchecked((int)0x9ce2ab57), unchecked((int)0x91a18d8e), unchecked((int)0x95609039),
|
||||
unchecked((int)0x8b27c03c), unchecked((int)0x8fe6dd8b), unchecked((int)0x82a5fb52), unchecked((int)0x8664e6e5),
|
||||
unchecked((int)0xbe2b5b58), unchecked((int)0xbaea46ef), unchecked((int)0xb7a96036), unchecked((int)0xb3687d81),
|
||||
unchecked((int)0xad2f2d84), unchecked((int)0xa9ee3033), unchecked((int)0xa4ad16ea), unchecked((int)0xa06c0b5d),
|
||||
unchecked((int)0xd4326d90), unchecked((int)0xd0f37027), unchecked((int)0xddb056fe), unchecked((int)0xd9714b49),
|
||||
unchecked((int)0xc7361b4c), unchecked((int)0xc3f706fb), unchecked((int)0xceb42022), unchecked((int)0xca753d95),
|
||||
unchecked((int)0xf23a8028), unchecked((int)0xf6fb9d9f), unchecked((int)0xfbb8bb46), unchecked((int)0xff79a6f1),
|
||||
unchecked((int)0xe13ef6f4), unchecked((int)0xe5ffeb43), unchecked((int)0xe8bccd9a), unchecked((int)0xec7dd02d),
|
||||
unchecked((int)0x34867077), unchecked((int)0x30476dc0), unchecked((int)0x3d044b19), unchecked((int)0x39c556ae),
|
||||
unchecked((int)0x278206ab), unchecked((int)0x23431b1c), unchecked((int)0x2e003dc5), unchecked((int)0x2ac12072),
|
||||
unchecked((int)0x128e9dcf), unchecked((int)0x164f8078), unchecked((int)0x1b0ca6a1), unchecked((int)0x1fcdbb16),
|
||||
unchecked((int)0x018aeb13), unchecked((int)0x054bf6a4), unchecked((int)0x0808d07d), unchecked((int)0x0cc9cdca),
|
||||
unchecked((int)0x7897ab07), unchecked((int)0x7c56b6b0), unchecked((int)0x71159069), unchecked((int)0x75d48dde),
|
||||
unchecked((int)0x6b93dddb), unchecked((int)0x6f52c06c), unchecked((int)0x6211e6b5), unchecked((int)0x66d0fb02),
|
||||
unchecked((int)0x5e9f46bf), unchecked((int)0x5a5e5b08), unchecked((int)0x571d7dd1), unchecked((int)0x53dc6066),
|
||||
unchecked((int)0x4d9b3063), unchecked((int)0x495a2dd4), unchecked((int)0x44190b0d), unchecked((int)0x40d816ba),
|
||||
unchecked((int)0xaca5c697), unchecked((int)0xa864db20), unchecked((int)0xa527fdf9), unchecked((int)0xa1e6e04e),
|
||||
unchecked((int)0xbfa1b04b), unchecked((int)0xbb60adfc), unchecked((int)0xb6238b25), unchecked((int)0xb2e29692),
|
||||
unchecked((int)0x8aad2b2f), unchecked((int)0x8e6c3698), unchecked((int)0x832f1041), unchecked((int)0x87ee0df6),
|
||||
unchecked((int)0x99a95df3), unchecked((int)0x9d684044), unchecked((int)0x902b669d), unchecked((int)0x94ea7b2a),
|
||||
unchecked((int)0xe0b41de7), unchecked((int)0xe4750050), unchecked((int)0xe9362689), unchecked((int)0xedf73b3e),
|
||||
unchecked((int)0xf3b06b3b), unchecked((int)0xf771768c), unchecked((int)0xfa325055), unchecked((int)0xfef34de2),
|
||||
unchecked((int)0xc6bcf05f), unchecked((int)0xc27dede8), unchecked((int)0xcf3ecb31), unchecked((int)0xcbffd686),
|
||||
unchecked((int)0xd5b88683), unchecked((int)0xd1799b34), unchecked((int)0xdc3abded), unchecked((int)0xd8fba05a),
|
||||
unchecked((int)0x690ce0ee), unchecked((int)0x6dcdfd59), unchecked((int)0x608edb80), unchecked((int)0x644fc637),
|
||||
unchecked((int)0x7a089632), unchecked((int)0x7ec98b85), unchecked((int)0x738aad5c), unchecked((int)0x774bb0eb),
|
||||
unchecked((int)0x4f040d56), unchecked((int)0x4bc510e1), unchecked((int)0x46863638), unchecked((int)0x42472b8f),
|
||||
unchecked((int)0x5c007b8a), unchecked((int)0x58c1663d), unchecked((int)0x558240e4), unchecked((int)0x51435d53),
|
||||
unchecked((int)0x251d3b9e), unchecked((int)0x21dc2629), unchecked((int)0x2c9f00f0), unchecked((int)0x285e1d47),
|
||||
unchecked((int)0x36194d42), unchecked((int)0x32d850f5), unchecked((int)0x3f9b762c), unchecked((int)0x3b5a6b9b),
|
||||
unchecked((int)0x0315d626), unchecked((int)0x07d4cb91), unchecked((int)0x0a97ed48), unchecked((int)0x0e56f0ff),
|
||||
unchecked((int)0x1011a0fa), unchecked((int)0x14d0bd4d), unchecked((int)0x19939b94), unchecked((int)0x1d528623),
|
||||
unchecked((int)0xf12f560e), unchecked((int)0xf5ee4bb9), unchecked((int)0xf8ad6d60), unchecked((int)0xfc6c70d7),
|
||||
unchecked((int)0xe22b20d2), unchecked((int)0xe6ea3d65), unchecked((int)0xeba91bbc), unchecked((int)0xef68060b),
|
||||
unchecked((int)0xd727bbb6), unchecked((int)0xd3e6a601), unchecked((int)0xdea580d8), unchecked((int)0xda649d6f),
|
||||
unchecked((int)0xc423cd6a), unchecked((int)0xc0e2d0dd), unchecked((int)0xcda1f604), unchecked((int)0xc960ebb3),
|
||||
unchecked((int)0xbd3e8d7e), unchecked((int)0xb9ff90c9), unchecked((int)0xb4bcb610), unchecked((int)0xb07daba7),
|
||||
unchecked((int)0xae3afba2), unchecked((int)0xaafbe615), unchecked((int)0xa7b8c0cc), unchecked((int)0xa379dd7b),
|
||||
unchecked((int)0x9b3660c6), unchecked((int)0x9ff77d71), unchecked((int)0x92b45ba8), unchecked((int)0x9675461f),
|
||||
unchecked((int)0x8832161a), unchecked((int)0x8cf30bad), unchecked((int)0x81b02d74), unchecked((int)0x857130c3),
|
||||
unchecked((int)0x5d8a9099), unchecked((int)0x594b8d2e), unchecked((int)0x5408abf7), unchecked((int)0x50c9b640),
|
||||
unchecked((int)0x4e8ee645), unchecked((int)0x4a4ffbf2), unchecked((int)0x470cdd2b), unchecked((int)0x43cdc09c),
|
||||
unchecked((int)0x7b827d21), unchecked((int)0x7f436096), unchecked((int)0x7200464f), unchecked((int)0x76c15bf8),
|
||||
unchecked((int)0x68860bfd), unchecked((int)0x6c47164a), unchecked((int)0x61043093), unchecked((int)0x65c52d24),
|
||||
unchecked((int)0x119b4be9), unchecked((int)0x155a565e), unchecked((int)0x18197087), unchecked((int)0x1cd86d30),
|
||||
unchecked((int)0x029f3d35), unchecked((int)0x065e2082), unchecked((int)0x0b1d065b), unchecked((int)0x0fdc1bec),
|
||||
unchecked((int)0x3793a651), unchecked((int)0x3352bbe6), unchecked((int)0x3e119d3f), unchecked((int)0x3ad08088),
|
||||
unchecked((int)0x2497d08d), unchecked((int)0x2056cd3a), unchecked((int)0x2d15ebe3), unchecked((int)0x29d4f654),
|
||||
unchecked((int)0xc5a92679), unchecked((int)0xc1683bce), unchecked((int)0xcc2b1d17), unchecked((int)0xc8ea00a0),
|
||||
unchecked((int)0xd6ad50a5), unchecked((int)0xd26c4d12), unchecked((int)0xdf2f6bcb), unchecked((int)0xdbee767c),
|
||||
unchecked((int)0xe3a1cbc1), unchecked((int)0xe760d676), unchecked((int)0xea23f0af), unchecked((int)0xeee2ed18),
|
||||
unchecked((int)0xf0a5bd1d), unchecked((int)0xf464a0aa), unchecked((int)0xf9278673), unchecked((int)0xfde69bc4),
|
||||
unchecked((int)0x89b8fd09), unchecked((int)0x8d79e0be), unchecked((int)0x803ac667), unchecked((int)0x84fbdbd0),
|
||||
unchecked((int)0x9abc8bd5), unchecked((int)0x9e7d9662), unchecked((int)0x933eb0bb), unchecked((int)0x97ffad0c),
|
||||
unchecked((int)0xafb010b1), unchecked((int)0xab710d06), unchecked((int)0xa6322bdf), unchecked((int)0xa2f33668),
|
||||
unchecked((int)0xbcb4666d), unchecked((int)0xb8757bda), unchecked((int)0xb5365d03), unchecked((int)0xb1f740b4)
|
||||
};
|
||||
|
||||
public CRC() {
|
||||
InitialiseCRC();
|
||||
}
|
||||
|
||||
internal void InitialiseCRC() {
|
||||
globalCrc = unchecked((int)0xffffffff);
|
||||
}
|
||||
|
||||
internal int GetFinalCRC() {
|
||||
return ~globalCrc;
|
||||
}
|
||||
|
||||
internal int GetGlobalCRC() {
|
||||
return globalCrc;
|
||||
}
|
||||
|
||||
internal void SetGlobalCRC(int newCrc) {
|
||||
globalCrc = newCrc;
|
||||
}
|
||||
|
||||
internal void UpdateCRC(int inCh) {
|
||||
int temp = (globalCrc >> 24) ^ inCh;
|
||||
if (temp < 0) {
|
||||
temp = 256 + temp;
|
||||
}
|
||||
globalCrc = (globalCrc << 8) ^ CRC.crc32Table[temp];
|
||||
}
|
||||
|
||||
internal int globalCrc;
|
||||
}
|
||||
}
|
48
iTechSharp/srcbc/util/collections/CollectionUtilities.cs
Normal file
48
iTechSharp/srcbc/util/collections/CollectionUtilities.cs
Normal file
@@ -0,0 +1,48 @@
|
||||
using System;
|
||||
using System.Collections;
|
||||
using System.Text;
|
||||
|
||||
namespace Org.BouncyCastle.Utilities.Collections
|
||||
{
|
||||
public sealed class CollectionUtilities
|
||||
{
|
||||
private CollectionUtilities()
|
||||
{
|
||||
}
|
||||
|
||||
public static bool CheckElementsAreOfType(
|
||||
IEnumerable e,
|
||||
Type t)
|
||||
{
|
||||
foreach (object o in e)
|
||||
{
|
||||
if (!t.IsInstanceOfType(o))
|
||||
return false;
|
||||
}
|
||||
return true;
|
||||
}
|
||||
|
||||
public static string ToString(
|
||||
IEnumerable c)
|
||||
{
|
||||
StringBuilder sb = new StringBuilder("[");
|
||||
|
||||
IEnumerator e = c.GetEnumerator();
|
||||
|
||||
if (e.MoveNext())
|
||||
{
|
||||
sb.Append(e.Current.ToString());
|
||||
|
||||
while (e.MoveNext())
|
||||
{
|
||||
sb.Append(", ");
|
||||
sb.Append(e.Current.ToString());
|
||||
}
|
||||
}
|
||||
|
||||
sb.Append(']');
|
||||
|
||||
return sb.ToString();
|
||||
}
|
||||
}
|
||||
}
|
44
iTechSharp/srcbc/util/collections/EmptyEnumerable.cs
Normal file
44
iTechSharp/srcbc/util/collections/EmptyEnumerable.cs
Normal file
@@ -0,0 +1,44 @@
|
||||
using System;
|
||||
using System.Collections;
|
||||
|
||||
namespace Org.BouncyCastle.Utilities.Collections
|
||||
{
|
||||
public sealed class EmptyEnumerable
|
||||
: IEnumerable
|
||||
{
|
||||
public static readonly IEnumerable Instance = new EmptyEnumerable();
|
||||
|
||||
private EmptyEnumerable()
|
||||
{
|
||||
}
|
||||
|
||||
public IEnumerator GetEnumerator()
|
||||
{
|
||||
return EmptyEnumerator.Instance;
|
||||
}
|
||||
}
|
||||
|
||||
public sealed class EmptyEnumerator
|
||||
: IEnumerator
|
||||
{
|
||||
public static readonly IEnumerator Instance = new EmptyEnumerator();
|
||||
|
||||
private EmptyEnumerator()
|
||||
{
|
||||
}
|
||||
|
||||
public bool MoveNext()
|
||||
{
|
||||
return false;
|
||||
}
|
||||
|
||||
public void Reset()
|
||||
{
|
||||
}
|
||||
|
||||
public object Current
|
||||
{
|
||||
get { throw new InvalidOperationException("No elements"); }
|
||||
}
|
||||
}
|
||||
}
|
25
iTechSharp/srcbc/util/collections/EnumerableProxy.cs
Normal file
25
iTechSharp/srcbc/util/collections/EnumerableProxy.cs
Normal file
@@ -0,0 +1,25 @@
|
||||
using System;
|
||||
using System.Collections;
|
||||
|
||||
namespace Org.BouncyCastle.Utilities.Collections
|
||||
{
|
||||
public sealed class EnumerableProxy
|
||||
: IEnumerable
|
||||
{
|
||||
private readonly IEnumerable inner;
|
||||
|
||||
public EnumerableProxy(
|
||||
IEnumerable inner)
|
||||
{
|
||||
if (inner == null)
|
||||
throw new ArgumentNullException("inner");
|
||||
|
||||
this.inner = inner;
|
||||
}
|
||||
|
||||
public IEnumerator GetEnumerator()
|
||||
{
|
||||
return inner.GetEnumerator();
|
||||
}
|
||||
}
|
||||
}
|
63
iTechSharp/srcbc/util/collections/HashSet.cs
Normal file
63
iTechSharp/srcbc/util/collections/HashSet.cs
Normal file
@@ -0,0 +1,63 @@
|
||||
using System;
|
||||
using System.Collections;
|
||||
|
||||
namespace Org.BouncyCastle.Utilities.Collections
|
||||
{
|
||||
public class HashSet
|
||||
: ISet
|
||||
{
|
||||
private readonly Hashtable impl = new Hashtable();
|
||||
|
||||
public HashSet()
|
||||
{
|
||||
}
|
||||
|
||||
public HashSet(ISet s)
|
||||
{
|
||||
foreach (object o in s)
|
||||
{
|
||||
Add(o);
|
||||
}
|
||||
}
|
||||
|
||||
public void Add(object o)
|
||||
{
|
||||
impl[o] = null;
|
||||
}
|
||||
|
||||
public bool Contains(object o)
|
||||
{
|
||||
return impl.ContainsKey(o);
|
||||
}
|
||||
|
||||
public void CopyTo(Array array, int index)
|
||||
{
|
||||
impl.Keys.CopyTo(array, index);
|
||||
}
|
||||
|
||||
public int Count
|
||||
{
|
||||
get { return impl.Count; }
|
||||
}
|
||||
|
||||
public IEnumerator GetEnumerator()
|
||||
{
|
||||
return impl.Keys.GetEnumerator();
|
||||
}
|
||||
|
||||
public bool IsSynchronized
|
||||
{
|
||||
get { return impl.IsSynchronized; }
|
||||
}
|
||||
|
||||
public void Remove(object o)
|
||||
{
|
||||
impl.Remove(o);
|
||||
}
|
||||
|
||||
public object SyncRoot
|
||||
{
|
||||
get { return impl.SyncRoot; }
|
||||
}
|
||||
}
|
||||
}
|
13
iTechSharp/srcbc/util/collections/ISet.cs
Normal file
13
iTechSharp/srcbc/util/collections/ISet.cs
Normal file
@@ -0,0 +1,13 @@
|
||||
using System;
|
||||
using System.Collections;
|
||||
|
||||
namespace Org.BouncyCastle.Utilities.Collections
|
||||
{
|
||||
public interface ISet
|
||||
: ICollection
|
||||
{
|
||||
void Add(object o);
|
||||
bool Contains(object o);
|
||||
void Remove(object o);
|
||||
}
|
||||
}
|
25
iTechSharp/srcbc/util/date/DateTimeObject.cs
Normal file
25
iTechSharp/srcbc/util/date/DateTimeObject.cs
Normal file
@@ -0,0 +1,25 @@
|
||||
using System;
|
||||
|
||||
namespace Org.BouncyCastle.Utilities.Date
|
||||
{
|
||||
public sealed class DateTimeObject
|
||||
{
|
||||
private readonly DateTime dt;
|
||||
|
||||
public DateTimeObject(
|
||||
DateTime dt)
|
||||
{
|
||||
this.dt = dt;
|
||||
}
|
||||
|
||||
public DateTime Value
|
||||
{
|
||||
get { return dt; }
|
||||
}
|
||||
|
||||
public override string ToString()
|
||||
{
|
||||
return dt.ToString();
|
||||
}
|
||||
}
|
||||
}
|
47
iTechSharp/srcbc/util/date/DateTimeUtilities.cs
Normal file
47
iTechSharp/srcbc/util/date/DateTimeUtilities.cs
Normal file
@@ -0,0 +1,47 @@
|
||||
using System;
|
||||
|
||||
namespace Org.BouncyCastle.Utilities.Date
|
||||
{
|
||||
public class DateTimeUtilities
|
||||
{
|
||||
public static readonly DateTime UnixEpoch = new DateTime(1970, 1, 1);
|
||||
|
||||
private DateTimeUtilities()
|
||||
{
|
||||
}
|
||||
|
||||
/// <summary>
|
||||
/// Return the number of milliseconds since the Unix epoch (1 Jan., 1970 UTC) for a given DateTime value.
|
||||
/// </summary>
|
||||
/// <param name="dateTime">A UTC DateTime value not before epoch.</param>
|
||||
/// <returns>Number of whole milliseconds after epoch.</returns>
|
||||
/// <exception cref="ArgumentException">'dateTime' is before epoch.</exception>
|
||||
public static long DateTimeToUnixMs(
|
||||
DateTime dateTime)
|
||||
{
|
||||
if (dateTime.CompareTo(UnixEpoch) < 0)
|
||||
throw new ArgumentException("DateTime value may not be before the epoch", "dateTime");
|
||||
|
||||
return (dateTime.Ticks - UnixEpoch.Ticks) / TimeSpan.TicksPerMillisecond;
|
||||
}
|
||||
|
||||
/// <summary>
|
||||
/// Create a DateTime value from the number of milliseconds since the Unix epoch (1 Jan., 1970 UTC).
|
||||
/// </summary>
|
||||
/// <param name="unixMs">Number of milliseconds since the epoch.</param>
|
||||
/// <returns>A UTC DateTime value</returns>
|
||||
public static DateTime UnixMsToDateTime(
|
||||
long unixMs)
|
||||
{
|
||||
return new DateTime(unixMs * TimeSpan.TicksPerMillisecond + UnixEpoch.Ticks);
|
||||
}
|
||||
|
||||
/// <summary>
|
||||
/// Return the current number of milliseconds since the Unix epoch (1 Jan., 1970 UTC).
|
||||
/// </summary>
|
||||
public static long CurrentUnixMs()
|
||||
{
|
||||
return DateTimeToUnixMs(DateTime.UtcNow);
|
||||
}
|
||||
}
|
||||
}
|
115
iTechSharp/srcbc/util/encoders/Base64.cs
Normal file
115
iTechSharp/srcbc/util/encoders/Base64.cs
Normal file
@@ -0,0 +1,115 @@
|
||||
using System;
|
||||
using System.IO;
|
||||
using System.Text;
|
||||
|
||||
namespace Org.BouncyCastle.Utilities.Encoders
|
||||
{
|
||||
public sealed class Base64
|
||||
{
|
||||
// private static readonly IEncoder encoder = new Base64Encoder();
|
||||
|
||||
private Base64()
|
||||
{
|
||||
}
|
||||
|
||||
/**
|
||||
* encode the input data producing a base 64 encoded byte array.
|
||||
*
|
||||
* @return a byte array containing the base 64 encoded data.
|
||||
*/
|
||||
public static byte[] Encode(
|
||||
byte[] data)
|
||||
{
|
||||
string s = Convert.ToBase64String(data, 0, data.Length);
|
||||
return Encoding.ASCII.GetBytes(s);
|
||||
|
||||
// MemoryStream bOut = new MemoryStream();
|
||||
// encoder.Encode(data, 0, data.Length, bOut);
|
||||
// return bOut.ToArray();
|
||||
}
|
||||
|
||||
/**
|
||||
* Encode the byte data to base 64 writing it to the given output stream.
|
||||
*
|
||||
* @return the number of bytes produced.
|
||||
*/
|
||||
public static int Encode(
|
||||
byte[] data,
|
||||
Stream outStream)
|
||||
{
|
||||
string s = Convert.ToBase64String(data, 0, data.Length);
|
||||
byte[] encoded = Encoding.ASCII.GetBytes(s);
|
||||
outStream.Write(encoded, 0, encoded.Length);
|
||||
return encoded.Length;
|
||||
|
||||
// return encoder.Encode(data, 0, data.Length, outStream);
|
||||
}
|
||||
|
||||
/**
|
||||
* Encode the byte data to base 64 writing it to the given output stream.
|
||||
*
|
||||
* @return the number of bytes produced.
|
||||
*/
|
||||
public static int Encode(
|
||||
byte[] data,
|
||||
int off,
|
||||
int length,
|
||||
Stream outStream)
|
||||
{
|
||||
string s = Convert.ToBase64String(data, off, length);
|
||||
byte[] encoded = Encoding.ASCII.GetBytes(s);
|
||||
outStream.Write(encoded, 0, encoded.Length);
|
||||
return encoded.Length;
|
||||
|
||||
// return encoder.Encode(data, off, length, outStream);
|
||||
}
|
||||
|
||||
/**
|
||||
* decode the base 64 encoded input data. It is assumed the input data is valid.
|
||||
*
|
||||
* @return a byte array representing the decoded data.
|
||||
*/
|
||||
public static byte[] Decode(
|
||||
byte[] data)
|
||||
{
|
||||
string s = Encoding.ASCII.GetString(data, 0, data.Length);
|
||||
return Convert.FromBase64String(s);
|
||||
|
||||
// MemoryStream bOut = new MemoryStream();
|
||||
// encoder.Decode(data, 0, data.Length, bOut);
|
||||
// return bOut.ToArray();
|
||||
}
|
||||
|
||||
/**
|
||||
* decode the base 64 encoded string data - whitespace will be ignored.
|
||||
*
|
||||
* @return a byte array representing the decoded data.
|
||||
*/
|
||||
public static byte[] Decode(
|
||||
string data)
|
||||
{
|
||||
return Convert.FromBase64String(data);
|
||||
|
||||
// MemoryStream bOut = new MemoryStream();
|
||||
// encoder.DecodeString(data, bOut);
|
||||
// return bOut.ToArray();
|
||||
}
|
||||
|
||||
/**
|
||||
* decode the base 64 encoded string data writing it to the given output stream,
|
||||
* whitespace characters will be ignored.
|
||||
*
|
||||
* @return the number of bytes produced.
|
||||
*/
|
||||
public static int Decode(
|
||||
string data,
|
||||
Stream outStream)
|
||||
{
|
||||
byte[] decoded = Decode(data);
|
||||
outStream.Write(decoded, 0, decoded.Length);
|
||||
return decoded.Length;
|
||||
|
||||
// return encoder.DecodeString(data, outStream);
|
||||
}
|
||||
}
|
||||
}
|
307
iTechSharp/srcbc/util/encoders/Base64Encoder.cs
Normal file
307
iTechSharp/srcbc/util/encoders/Base64Encoder.cs
Normal file
@@ -0,0 +1,307 @@
|
||||
using System;
|
||||
using System.IO;
|
||||
|
||||
namespace Org.BouncyCastle.Utilities.Encoders
|
||||
{
|
||||
public class Base64Encoder
|
||||
: IEncoder
|
||||
{
|
||||
protected readonly byte[] encodingTable =
|
||||
{
|
||||
(byte)'A', (byte)'B', (byte)'C', (byte)'D', (byte)'E', (byte)'F', (byte)'G',
|
||||
(byte)'H', (byte)'I', (byte)'J', (byte)'K', (byte)'L', (byte)'M', (byte)'N',
|
||||
(byte)'O', (byte)'P', (byte)'Q', (byte)'R', (byte)'S', (byte)'T', (byte)'U',
|
||||
(byte)'V', (byte)'W', (byte)'X', (byte)'Y', (byte)'Z',
|
||||
(byte)'a', (byte)'b', (byte)'c', (byte)'d', (byte)'e', (byte)'f', (byte)'g',
|
||||
(byte)'h', (byte)'i', (byte)'j', (byte)'k', (byte)'l', (byte)'m', (byte)'n',
|
||||
(byte)'o', (byte)'p', (byte)'q', (byte)'r', (byte)'s', (byte)'t', (byte)'u',
|
||||
(byte)'v',
|
||||
(byte)'w', (byte)'x', (byte)'y', (byte)'z',
|
||||
(byte)'0', (byte)'1', (byte)'2', (byte)'3', (byte)'4', (byte)'5', (byte)'6',
|
||||
(byte)'7', (byte)'8', (byte)'9',
|
||||
(byte)'+', (byte)'/'
|
||||
};
|
||||
|
||||
protected byte padding = (byte)'=';
|
||||
|
||||
/*
|
||||
* set up the decoding table.
|
||||
*/
|
||||
protected readonly byte[] decodingTable = new byte[128];
|
||||
|
||||
protected void InitialiseDecodingTable()
|
||||
{
|
||||
for (int i = 0; i < encodingTable.Length; i++)
|
||||
{
|
||||
decodingTable[encodingTable[i]] = (byte)i;
|
||||
}
|
||||
}
|
||||
|
||||
public Base64Encoder()
|
||||
{
|
||||
InitialiseDecodingTable();
|
||||
}
|
||||
|
||||
/**
|
||||
* encode the input data producing a base 64 output stream.
|
||||
*
|
||||
* @return the number of bytes produced.
|
||||
*/
|
||||
public int Encode(
|
||||
byte[] data,
|
||||
int off,
|
||||
int length,
|
||||
Stream outStream)
|
||||
{
|
||||
int modulus = length % 3;
|
||||
int dataLength = (length - modulus);
|
||||
int a1, a2, a3;
|
||||
|
||||
for (int i = off; i < off + dataLength; i += 3)
|
||||
{
|
||||
a1 = data[i] & 0xff;
|
||||
a2 = data[i + 1] & 0xff;
|
||||
a3 = data[i + 2] & 0xff;
|
||||
|
||||
outStream.WriteByte(encodingTable[(int) ((uint) a1 >> 2) & 0x3f]);
|
||||
outStream.WriteByte(encodingTable[((a1 << 4) | (int) ((uint) a2 >> 4)) & 0x3f]);
|
||||
outStream.WriteByte(encodingTable[((a2 << 2) | (int) ((uint) a3 >> 6)) & 0x3f]);
|
||||
outStream.WriteByte(encodingTable[a3 & 0x3f]);
|
||||
}
|
||||
|
||||
/*
|
||||
* process the tail end.
|
||||
*/
|
||||
int b1, b2, b3;
|
||||
int d1, d2;
|
||||
|
||||
switch (modulus)
|
||||
{
|
||||
case 0: /* nothing left to do */
|
||||
break;
|
||||
case 1:
|
||||
d1 = data[off + dataLength] & 0xff;
|
||||
b1 = (d1 >> 2) & 0x3f;
|
||||
b2 = (d1 << 4) & 0x3f;
|
||||
|
||||
outStream.WriteByte(encodingTable[b1]);
|
||||
outStream.WriteByte(encodingTable[b2]);
|
||||
outStream.WriteByte(padding);
|
||||
outStream.WriteByte(padding);
|
||||
break;
|
||||
case 2:
|
||||
d1 = data[off + dataLength] & 0xff;
|
||||
d2 = data[off + dataLength + 1] & 0xff;
|
||||
|
||||
b1 = (d1 >> 2) & 0x3f;
|
||||
b2 = ((d1 << 4) | (d2 >> 4)) & 0x3f;
|
||||
b3 = (d2 << 2) & 0x3f;
|
||||
|
||||
outStream.WriteByte(encodingTable[b1]);
|
||||
outStream.WriteByte(encodingTable[b2]);
|
||||
outStream.WriteByte(encodingTable[b3]);
|
||||
outStream.WriteByte(padding);
|
||||
break;
|
||||
}
|
||||
|
||||
return (dataLength / 3) * 4 + ((modulus == 0) ? 0 : 4);
|
||||
}
|
||||
|
||||
private bool ignore(
|
||||
char c)
|
||||
{
|
||||
return (c == '\n' || c =='\r' || c == '\t' || c == ' ');
|
||||
}
|
||||
|
||||
/**
|
||||
* decode the base 64 encoded byte data writing it to the given output stream,
|
||||
* whitespace characters will be ignored.
|
||||
*
|
||||
* @return the number of bytes produced.
|
||||
*/
|
||||
public int Decode(
|
||||
byte[] data,
|
||||
int off,
|
||||
int length,
|
||||
Stream outStream)
|
||||
{
|
||||
byte b1, b2, b3, b4;
|
||||
int outLen = 0;
|
||||
|
||||
int end = off + length;
|
||||
|
||||
while (end > off)
|
||||
{
|
||||
if (!ignore((char)data[end - 1]))
|
||||
{
|
||||
break;
|
||||
}
|
||||
|
||||
end--;
|
||||
}
|
||||
|
||||
int i = off;
|
||||
int finish = end - 4;
|
||||
|
||||
i = nextI(data, i, finish);
|
||||
|
||||
while (i < finish)
|
||||
{
|
||||
b1 = decodingTable[data[i++]];
|
||||
|
||||
i = nextI(data, i, finish);
|
||||
|
||||
b2 = decodingTable[data[i++]];
|
||||
|
||||
i = nextI(data, i, finish);
|
||||
|
||||
b3 = decodingTable[data[i++]];
|
||||
|
||||
i = nextI(data, i, finish);
|
||||
|
||||
b4 = decodingTable[data[i++]];
|
||||
|
||||
outStream.WriteByte((byte)((b1 << 2) | (b2 >> 4)));
|
||||
outStream.WriteByte((byte)((b2 << 4) | (b3 >> 2)));
|
||||
outStream.WriteByte((byte)((b3 << 6) | b4));
|
||||
|
||||
outLen += 3;
|
||||
|
||||
i = nextI(data, i, finish);
|
||||
}
|
||||
|
||||
outLen += decodeLastBlock(outStream, (char)data[end - 4], (char)data[end - 3], (char)data[end - 2], (char)data[end - 1]);
|
||||
|
||||
return outLen;
|
||||
}
|
||||
|
||||
private int nextI(
|
||||
byte[] data,
|
||||
int i,
|
||||
int finish)
|
||||
{
|
||||
while ((i < finish) && ignore((char)data[i]))
|
||||
{
|
||||
i++;
|
||||
}
|
||||
return i;
|
||||
}
|
||||
|
||||
/**
|
||||
* decode the base 64 encoded string data writing it to the given output stream,
|
||||
* whitespace characters will be ignored.
|
||||
*
|
||||
* @return the number of bytes produced.
|
||||
*/
|
||||
public int DecodeString(
|
||||
string data,
|
||||
Stream outStream)
|
||||
{
|
||||
// Platform Implementation
|
||||
// byte[] bytes = Convert.FromBase64String(data);
|
||||
// outStream.Write(bytes, 0, bytes.Length);
|
||||
// return bytes.Length;
|
||||
|
||||
byte b1, b2, b3, b4;
|
||||
int length = 0;
|
||||
|
||||
int end = data.Length;
|
||||
|
||||
while (end > 0)
|
||||
{
|
||||
if (!ignore(data[end - 1]))
|
||||
{
|
||||
break;
|
||||
}
|
||||
|
||||
end--;
|
||||
}
|
||||
|
||||
int i = 0;
|
||||
int finish = end - 4;
|
||||
|
||||
i = nextI(data, i, finish);
|
||||
|
||||
while (i < finish)
|
||||
{
|
||||
b1 = decodingTable[data[i++]];
|
||||
|
||||
i = nextI(data, i, finish);
|
||||
|
||||
b2 = decodingTable[data[i++]];
|
||||
|
||||
i = nextI(data, i, finish);
|
||||
|
||||
b3 = decodingTable[data[i++]];
|
||||
|
||||
i = nextI(data, i, finish);
|
||||
|
||||
b4 = decodingTable[data[i++]];
|
||||
|
||||
outStream.WriteByte((byte)((b1 << 2) | (b2 >> 4)));
|
||||
outStream.WriteByte((byte)((b2 << 4) | (b3 >> 2)));
|
||||
outStream.WriteByte((byte)((b3 << 6) | b4));
|
||||
|
||||
length += 3;
|
||||
|
||||
i = nextI(data, i, finish);
|
||||
}
|
||||
|
||||
length += decodeLastBlock(outStream, data[end - 4], data[end - 3], data[end - 2], data[end - 1]);
|
||||
|
||||
return length;
|
||||
}
|
||||
|
||||
private int decodeLastBlock(
|
||||
Stream outStream,
|
||||
char c1,
|
||||
char c2,
|
||||
char c3,
|
||||
char c4)
|
||||
{
|
||||
if (c3 == padding)
|
||||
{
|
||||
byte b1 = decodingTable[c1];
|
||||
byte b2 = decodingTable[c2];
|
||||
|
||||
outStream.WriteByte((byte)((b1 << 2) | (b2 >> 4)));
|
||||
|
||||
return 1;
|
||||
}
|
||||
|
||||
if (c4 == padding)
|
||||
{
|
||||
byte b1 = decodingTable[c1];
|
||||
byte b2 = decodingTable[c2];
|
||||
byte b3 = decodingTable[c3];
|
||||
|
||||
outStream.WriteByte((byte)((b1 << 2) | (b2 >> 4)));
|
||||
outStream.WriteByte((byte)((b2 << 4) | (b3 >> 2)));
|
||||
|
||||
return 2;
|
||||
}
|
||||
|
||||
{
|
||||
byte b1 = decodingTable[c1];
|
||||
byte b2 = decodingTable[c2];
|
||||
byte b3 = decodingTable[c3];
|
||||
byte b4 = decodingTable[c4];
|
||||
|
||||
outStream.WriteByte((byte)((b1 << 2) | (b2 >> 4)));
|
||||
outStream.WriteByte((byte)((b2 << 4) | (b3 >> 2)));
|
||||
outStream.WriteByte((byte)((b3 << 6) | b4));
|
||||
|
||||
return 3;
|
||||
}
|
||||
}
|
||||
|
||||
private int nextI(string data, int i, int finish)
|
||||
{
|
||||
while ((i < finish) && ignore(data[i]))
|
||||
{
|
||||
i++;
|
||||
}
|
||||
return i;
|
||||
}
|
||||
}
|
||||
}
|
117
iTechSharp/srcbc/util/encoders/BufferedDecoder.cs
Normal file
117
iTechSharp/srcbc/util/encoders/BufferedDecoder.cs
Normal file
@@ -0,0 +1,117 @@
|
||||
using System;
|
||||
|
||||
namespace Org.BouncyCastle.Utilities.Encoders
|
||||
{
|
||||
/// <summary>
|
||||
/// A buffering class to allow translation from one format to another to
|
||||
/// be done in discrete chunks.
|
||||
/// </summary>
|
||||
public class BufferedDecoder
|
||||
{
|
||||
internal byte[] buffer;
|
||||
internal int bufOff;
|
||||
|
||||
internal ITranslator translator;
|
||||
|
||||
/// <summary>
|
||||
/// Create a buffered Decoder.
|
||||
/// </summary>
|
||||
/// <param name="translator">The translater to use.</param>
|
||||
/// <param name="bufferSize">The size of the buffer.</param>
|
||||
public BufferedDecoder(
|
||||
ITranslator translator,
|
||||
int bufferSize)
|
||||
{
|
||||
this.translator = translator;
|
||||
|
||||
if ((bufferSize % translator.GetEncodedBlockSize()) != 0)
|
||||
{
|
||||
throw new ArgumentException("buffer size not multiple of input block size");
|
||||
}
|
||||
|
||||
buffer = new byte[bufferSize];
|
||||
// bufOff = 0;
|
||||
}
|
||||
|
||||
/// <summary>
|
||||
/// Process one byte of data.
|
||||
/// </summary>
|
||||
/// <param name="input">Data in.</param>
|
||||
/// <param name="output">Byte array for the output.</param>
|
||||
/// <param name="outOff">The offset in the output byte array to start writing from.</param>
|
||||
/// <returns>The amount of output bytes.</returns>
|
||||
public int ProcessByte(
|
||||
byte input,
|
||||
byte[] output,
|
||||
int outOff)
|
||||
{
|
||||
int resultLen = 0;
|
||||
|
||||
buffer[bufOff++] = input;
|
||||
|
||||
if (bufOff == buffer.Length)
|
||||
{
|
||||
resultLen = translator.Decode(buffer, 0, buffer.Length, output, outOff);
|
||||
bufOff = 0;
|
||||
}
|
||||
|
||||
return resultLen;
|
||||
}
|
||||
|
||||
|
||||
/// <summary>
|
||||
/// Process data from a byte array.
|
||||
/// </summary>
|
||||
/// <param name="input">The input data.</param>
|
||||
/// <param name="inOff">Start position within input data array.</param>
|
||||
/// <param name="len">Amount of data to process from input data array.</param>
|
||||
/// <param name="outBytes">Array to store output.</param>
|
||||
/// <param name="outOff">Position in output array to start writing from.</param>
|
||||
/// <returns>The amount of output bytes.</returns>
|
||||
public int ProcessBytes(
|
||||
byte[] input,
|
||||
int inOff,
|
||||
int len,
|
||||
byte[] outBytes,
|
||||
int outOff)
|
||||
{
|
||||
if (len < 0)
|
||||
{
|
||||
throw new ArgumentException("Can't have a negative input length!");
|
||||
}
|
||||
|
||||
int resultLen = 0;
|
||||
int gapLen = buffer.Length - bufOff;
|
||||
|
||||
if (len > gapLen)
|
||||
{
|
||||
Array.Copy(input, inOff, buffer, bufOff, gapLen);
|
||||
|
||||
resultLen += translator.Decode(buffer, 0, buffer.Length, outBytes, outOff);
|
||||
|
||||
bufOff = 0;
|
||||
|
||||
len -= gapLen;
|
||||
inOff += gapLen;
|
||||
outOff += resultLen;
|
||||
|
||||
int chunkSize = len - (len % buffer.Length);
|
||||
|
||||
resultLen += translator.Decode(input, inOff, chunkSize, outBytes, outOff);
|
||||
|
||||
len -= chunkSize;
|
||||
inOff += chunkSize;
|
||||
}
|
||||
|
||||
if (len != 0)
|
||||
{
|
||||
Array.Copy(input, inOff, buffer, bufOff, len);
|
||||
|
||||
bufOff += len;
|
||||
}
|
||||
|
||||
return resultLen;
|
||||
}
|
||||
}
|
||||
|
||||
}
|
117
iTechSharp/srcbc/util/encoders/BufferedEncoder.cs
Normal file
117
iTechSharp/srcbc/util/encoders/BufferedEncoder.cs
Normal file
@@ -0,0 +1,117 @@
|
||||
using System;
|
||||
|
||||
namespace Org.BouncyCastle.Utilities.Encoders
|
||||
{
|
||||
/// <summary>
|
||||
/// A class that allows encoding of data using a specific encoder to be processed in chunks.
|
||||
/// </summary>
|
||||
public class BufferedEncoder
|
||||
{
|
||||
internal byte[] Buffer;
|
||||
internal int bufOff;
|
||||
|
||||
internal ITranslator translator;
|
||||
|
||||
|
||||
/// <summary>
|
||||
/// Create.
|
||||
/// </summary>
|
||||
/// <param name="translator">The translator to use.</param>
|
||||
/// <param name="bufferSize">Size of the chunks.</param>
|
||||
public BufferedEncoder(
|
||||
ITranslator translator,
|
||||
int bufferSize)
|
||||
{
|
||||
this.translator = translator;
|
||||
|
||||
if ((bufferSize % translator.GetEncodedBlockSize()) != 0)
|
||||
{
|
||||
throw new ArgumentException("buffer size not multiple of input block size");
|
||||
}
|
||||
|
||||
Buffer = new byte[bufferSize];
|
||||
// bufOff = 0;
|
||||
}
|
||||
|
||||
|
||||
/// <summary>
|
||||
/// Process one byte of data.
|
||||
/// </summary>
|
||||
/// <param name="input">The byte.</param>
|
||||
/// <param name="outBytes">An array to store output in.</param>
|
||||
/// <param name="outOff">Offset within output array to start writing from.</param>
|
||||
/// <returns></returns>
|
||||
public int ProcessByte(
|
||||
byte input,
|
||||
byte[] outBytes,
|
||||
int outOff)
|
||||
{
|
||||
int resultLen = 0;
|
||||
|
||||
Buffer[bufOff++] = input;
|
||||
|
||||
if (bufOff == Buffer.Length)
|
||||
{
|
||||
resultLen = translator.Encode(Buffer, 0, Buffer.Length, outBytes, outOff);
|
||||
bufOff = 0;
|
||||
}
|
||||
|
||||
return resultLen;
|
||||
}
|
||||
|
||||
/// <summary>
|
||||
/// Process data from a byte array.
|
||||
/// </summary>
|
||||
/// <param name="input">Input data Byte array containing data to be processed.</param>
|
||||
/// <param name="inOff">Start position within input data array.</param>
|
||||
/// <param name="len">Amount of input data to be processed.</param>
|
||||
/// <param name="outBytes">Output data array.</param>
|
||||
/// <param name="outOff">Offset within output data array to start writing to.</param>
|
||||
/// <returns>The amount of data written.</returns>
|
||||
public int ProcessBytes(
|
||||
byte[] input,
|
||||
int inOff,
|
||||
int len,
|
||||
byte[] outBytes,
|
||||
int outOff)
|
||||
{
|
||||
if (len < 0)
|
||||
{
|
||||
throw new ArgumentException("Can't have a negative input length!");
|
||||
}
|
||||
|
||||
int resultLen = 0;
|
||||
int gapLen = Buffer.Length - bufOff;
|
||||
|
||||
if (len > gapLen)
|
||||
{
|
||||
Array.Copy(input, inOff, Buffer, bufOff, gapLen);
|
||||
|
||||
resultLen += translator.Encode(Buffer, 0, Buffer.Length, outBytes, outOff);
|
||||
|
||||
bufOff = 0;
|
||||
|
||||
len -= gapLen;
|
||||
inOff += gapLen;
|
||||
outOff += resultLen;
|
||||
|
||||
int chunkSize = len - (len % Buffer.Length);
|
||||
|
||||
resultLen += translator.Encode(input, inOff, chunkSize, outBytes, outOff);
|
||||
|
||||
len -= chunkSize;
|
||||
inOff += chunkSize;
|
||||
}
|
||||
|
||||
if (len != 0)
|
||||
{
|
||||
Array.Copy(input, inOff, Buffer, bufOff, len);
|
||||
|
||||
bufOff += len;
|
||||
}
|
||||
|
||||
return resultLen;
|
||||
}
|
||||
}
|
||||
|
||||
}
|
114
iTechSharp/srcbc/util/encoders/Hex.cs
Normal file
114
iTechSharp/srcbc/util/encoders/Hex.cs
Normal file
@@ -0,0 +1,114 @@
|
||||
using System;
|
||||
using System.IO;
|
||||
|
||||
namespace Org.BouncyCastle.Utilities.Encoders
|
||||
{
|
||||
/// <summary>
|
||||
/// Class to decode and encode Hex.
|
||||
/// </summary>
|
||||
public sealed class Hex
|
||||
{
|
||||
private static readonly IEncoder encoder = new HexEncoder();
|
||||
|
||||
private Hex()
|
||||
{
|
||||
}
|
||||
|
||||
/**
|
||||
* encode the input data producing a Hex encoded byte array.
|
||||
*
|
||||
* @return a byte array containing the Hex encoded data.
|
||||
*/
|
||||
public static byte[] Encode(
|
||||
byte[] data)
|
||||
{
|
||||
return Encode(data, 0, data.Length);
|
||||
}
|
||||
|
||||
/**
|
||||
* encode the input data producing a Hex encoded byte array.
|
||||
*
|
||||
* @return a byte array containing the Hex encoded data.
|
||||
*/
|
||||
public static byte[] Encode(
|
||||
byte[] data,
|
||||
int off,
|
||||
int length)
|
||||
{
|
||||
MemoryStream bOut = new MemoryStream(length * 2);
|
||||
|
||||
encoder.Encode(data, off, length, bOut);
|
||||
|
||||
return bOut.ToArray();
|
||||
}
|
||||
|
||||
/**
|
||||
* Hex encode the byte data writing it to the given output stream.
|
||||
*
|
||||
* @return the number of bytes produced.
|
||||
*/
|
||||
public static int Encode(
|
||||
byte[] data,
|
||||
Stream outStream)
|
||||
{
|
||||
return encoder.Encode(data, 0, data.Length, outStream);
|
||||
}
|
||||
|
||||
/**
|
||||
* Hex encode the byte data writing it to the given output stream.
|
||||
*
|
||||
* @return the number of bytes produced.
|
||||
*/
|
||||
public static int Encode(
|
||||
byte[] data,
|
||||
int off,
|
||||
int length,
|
||||
Stream outStream)
|
||||
{
|
||||
return encoder.Encode(data, off, length, outStream);
|
||||
}
|
||||
|
||||
/**
|
||||
* decode the Hex encoded input data. It is assumed the input data is valid.
|
||||
*
|
||||
* @return a byte array representing the decoded data.
|
||||
*/
|
||||
public static byte[] Decode(
|
||||
byte[] data)
|
||||
{
|
||||
MemoryStream bOut = new MemoryStream((data.Length + 1) / 2);
|
||||
|
||||
encoder.Decode(data, 0, data.Length, bOut);
|
||||
|
||||
return bOut.ToArray();
|
||||
}
|
||||
|
||||
/**
|
||||
* decode the Hex encoded string data - whitespace will be ignored.
|
||||
*
|
||||
* @return a byte array representing the decoded data.
|
||||
*/
|
||||
public static byte[] Decode(
|
||||
string data)
|
||||
{
|
||||
MemoryStream bOut = new MemoryStream((data.Length + 1) / 2);
|
||||
|
||||
encoder.DecodeString(data, bOut);
|
||||
|
||||
return bOut.ToArray();
|
||||
}
|
||||
|
||||
/**
|
||||
* decode the Hex encoded string data writing it to the given output stream,
|
||||
* whitespace characters will be ignored.
|
||||
*
|
||||
* @return the number of bytes produced.
|
||||
*/
|
||||
public static int Decode(
|
||||
string data,
|
||||
Stream outStream)
|
||||
{
|
||||
return encoder.DecodeString(data, outStream);
|
||||
}
|
||||
}
|
||||
}
|
164
iTechSharp/srcbc/util/encoders/HexEncoder.cs
Normal file
164
iTechSharp/srcbc/util/encoders/HexEncoder.cs
Normal file
@@ -0,0 +1,164 @@
|
||||
using System;
|
||||
using System.IO;
|
||||
|
||||
namespace Org.BouncyCastle.Utilities.Encoders
|
||||
{
|
||||
public class HexEncoder
|
||||
: IEncoder
|
||||
{
|
||||
private static readonly byte[] encodingTable =
|
||||
{
|
||||
(byte)'0', (byte)'1', (byte)'2', (byte)'3', (byte)'4', (byte)'5', (byte)'6', (byte)'7',
|
||||
(byte)'8', (byte)'9', (byte)'a', (byte)'b', (byte)'c', (byte)'d', (byte)'e', (byte)'f'
|
||||
};
|
||||
|
||||
/*
|
||||
* set up the decoding table.
|
||||
*/
|
||||
internal static readonly byte[] decodingTable = new byte[128];
|
||||
|
||||
static HexEncoder()
|
||||
{
|
||||
for (int i = 0; i < encodingTable.Length; i++)
|
||||
{
|
||||
decodingTable[encodingTable[i]] = (byte)i;
|
||||
}
|
||||
|
||||
decodingTable['A'] = decodingTable['a'];
|
||||
decodingTable['B'] = decodingTable['b'];
|
||||
decodingTable['C'] = decodingTable['c'];
|
||||
decodingTable['D'] = decodingTable['d'];
|
||||
decodingTable['E'] = decodingTable['e'];
|
||||
decodingTable['F'] = decodingTable['f'];
|
||||
}
|
||||
|
||||
/**
|
||||
* encode the input data producing a Hex output stream.
|
||||
*
|
||||
* @return the number of bytes produced.
|
||||
*/
|
||||
public int Encode(
|
||||
byte[] data,
|
||||
int off,
|
||||
int length,
|
||||
Stream outStream)
|
||||
{
|
||||
for (int i = off; i < (off + length); i++)
|
||||
{
|
||||
int v = data[i];
|
||||
|
||||
outStream.WriteByte(encodingTable[v >> 4]);
|
||||
outStream.WriteByte(encodingTable[v & 0xf]);
|
||||
}
|
||||
|
||||
return length * 2;
|
||||
}
|
||||
|
||||
private bool ignore(
|
||||
char c)
|
||||
{
|
||||
return (c == '\n' || c =='\r' || c == '\t' || c == ' ');
|
||||
}
|
||||
|
||||
/**
|
||||
* decode the Hex encoded byte data writing it to the given output stream,
|
||||
* whitespace characters will be ignored.
|
||||
*
|
||||
* @return the number of bytes produced.
|
||||
*/
|
||||
public int Decode(
|
||||
byte[] data,
|
||||
int off,
|
||||
int length,
|
||||
Stream outStream)
|
||||
{
|
||||
byte b1, b2;
|
||||
int outLen = 0;
|
||||
int end = off + length;
|
||||
|
||||
while (end > off)
|
||||
{
|
||||
if (!ignore((char)data[end - 1]))
|
||||
{
|
||||
break;
|
||||
}
|
||||
|
||||
end--;
|
||||
}
|
||||
|
||||
int i = off;
|
||||
while (i < end)
|
||||
{
|
||||
while (i < end && ignore((char)data[i]))
|
||||
{
|
||||
i++;
|
||||
}
|
||||
|
||||
b1 = decodingTable[data[i++]];
|
||||
|
||||
while (i < end && ignore((char)data[i]))
|
||||
{
|
||||
i++;
|
||||
}
|
||||
|
||||
b2 = decodingTable[data[i++]];
|
||||
|
||||
outStream.WriteByte((byte)((b1 << 4) | b2));
|
||||
|
||||
outLen++;
|
||||
}
|
||||
|
||||
return outLen;
|
||||
}
|
||||
|
||||
/**
|
||||
* decode the Hex encoded string data writing it to the given output stream,
|
||||
* whitespace characters will be ignored.
|
||||
*
|
||||
* @return the number of bytes produced.
|
||||
*/
|
||||
public int DecodeString(
|
||||
string data,
|
||||
Stream outStream)
|
||||
{
|
||||
byte b1, b2;
|
||||
int length = 0;
|
||||
|
||||
int end = data.Length;
|
||||
|
||||
while (end > 0)
|
||||
{
|
||||
if (!ignore(data[end - 1]))
|
||||
{
|
||||
break;
|
||||
}
|
||||
|
||||
end--;
|
||||
}
|
||||
|
||||
int i = 0;
|
||||
while (i < end)
|
||||
{
|
||||
while (i < end && ignore(data[i]))
|
||||
{
|
||||
i++;
|
||||
}
|
||||
|
||||
b1 = decodingTable[data[i++]];
|
||||
|
||||
while (i < end && ignore(data[i]))
|
||||
{
|
||||
i++;
|
||||
}
|
||||
|
||||
b2 = decodingTable[data[i++]];
|
||||
|
||||
outStream.WriteByte((byte)((b1 << 4) | b2));
|
||||
|
||||
length++;
|
||||
}
|
||||
|
||||
return length;
|
||||
}
|
||||
}
|
||||
}
|
108
iTechSharp/srcbc/util/encoders/HexTranslator.cs
Normal file
108
iTechSharp/srcbc/util/encoders/HexTranslator.cs
Normal file
@@ -0,0 +1,108 @@
|
||||
using System;
|
||||
|
||||
namespace Org.BouncyCastle.Utilities.Encoders
|
||||
{
|
||||
/// <summary>
|
||||
/// A hex translator.
|
||||
/// </summary>
|
||||
public class HexTranslator : ITranslator
|
||||
{
|
||||
private static readonly byte[] hexTable =
|
||||
{
|
||||
(byte)'0', (byte)'1', (byte)'2', (byte)'3', (byte)'4', (byte)'5', (byte)'6', (byte)'7',
|
||||
(byte)'8', (byte)'9', (byte)'a', (byte)'b', (byte)'c', (byte)'d', (byte)'e', (byte)'f'
|
||||
};
|
||||
|
||||
/// <summary>
|
||||
/// Return encoded block size.
|
||||
/// </summary>
|
||||
/// <returns>2</returns>
|
||||
public int GetEncodedBlockSize()
|
||||
{
|
||||
return 2;
|
||||
}
|
||||
|
||||
/// <summary>
|
||||
/// Encode some data.
|
||||
/// </summary>
|
||||
/// <param name="input">Input data array.</param>
|
||||
/// <param name="inOff">Start position within input data array.</param>
|
||||
/// <param name="length">The amount of data to process.</param>
|
||||
/// <param name="outBytes">The output data array.</param>
|
||||
/// <param name="outOff">The offset within the output data array to start writing from.</param>
|
||||
/// <returns>Amount of data encoded.</returns>
|
||||
public int Encode(
|
||||
byte[] input,
|
||||
int inOff,
|
||||
int length,
|
||||
byte[] outBytes,
|
||||
int outOff)
|
||||
{
|
||||
for (int i = 0, j = 0; i < length; i++, j += 2)
|
||||
{
|
||||
outBytes[outOff + j] = hexTable[(input[inOff] >> 4) & 0x0f];
|
||||
outBytes[outOff + j + 1] = hexTable[input[inOff] & 0x0f];
|
||||
|
||||
inOff++;
|
||||
}
|
||||
|
||||
return length * 2;
|
||||
}
|
||||
|
||||
/// <summary>
|
||||
/// Returns the decoded block size.
|
||||
/// </summary>
|
||||
/// <returns>1</returns>
|
||||
public int GetDecodedBlockSize()
|
||||
{
|
||||
return 1;
|
||||
}
|
||||
|
||||
/// <summary>
|
||||
/// Decode data from a byte array.
|
||||
/// </summary>
|
||||
/// <param name="input">The input data array.</param>
|
||||
/// <param name="inOff">Start position within input data array.</param>
|
||||
/// <param name="length">The amounty of data to process.</param>
|
||||
/// <param name="outBytes">The output data array.</param>
|
||||
/// <param name="outOff">The position within the output data array to start writing from.</param>
|
||||
/// <returns>The amount of data written.</returns>
|
||||
public int Decode(
|
||||
byte[] input,
|
||||
int inOff,
|
||||
int length,
|
||||
byte[] outBytes,
|
||||
int outOff)
|
||||
{
|
||||
int halfLength = length / 2;
|
||||
byte left, right;
|
||||
for (int i = 0; i < halfLength; i++)
|
||||
{
|
||||
left = input[inOff + i * 2];
|
||||
right = input[inOff + i * 2 + 1];
|
||||
|
||||
if (left < (byte)'a')
|
||||
{
|
||||
outBytes[outOff] = (byte)((left - '0') << 4);
|
||||
}
|
||||
else
|
||||
{
|
||||
outBytes[outOff] = (byte)((left - 'a' + 10) << 4);
|
||||
}
|
||||
if (right < (byte)'a')
|
||||
{
|
||||
outBytes[outOff] += (byte)(right - '0');
|
||||
}
|
||||
else
|
||||
{
|
||||
outBytes[outOff] += (byte)(right - 'a' + 10);
|
||||
}
|
||||
|
||||
outOff++;
|
||||
}
|
||||
|
||||
return halfLength;
|
||||
}
|
||||
}
|
||||
|
||||
}
|
18
iTechSharp/srcbc/util/encoders/IEncoder.cs
Normal file
18
iTechSharp/srcbc/util/encoders/IEncoder.cs
Normal file
@@ -0,0 +1,18 @@
|
||||
using System;
|
||||
using System.IO;
|
||||
|
||||
namespace Org.BouncyCastle.Utilities.Encoders
|
||||
{
|
||||
/**
|
||||
* Encode and decode byte arrays (typically from binary to 7-bit ASCII
|
||||
* encodings).
|
||||
*/
|
||||
public interface IEncoder
|
||||
{
|
||||
int Encode(byte[] data, int off, int length, Stream outStream);
|
||||
|
||||
int Decode(byte[] data, int off, int length, Stream outStream);
|
||||
|
||||
int DecodeString(string data, Stream outStream);
|
||||
}
|
||||
}
|
19
iTechSharp/srcbc/util/encoders/Translator.cs
Normal file
19
iTechSharp/srcbc/util/encoders/Translator.cs
Normal file
@@ -0,0 +1,19 @@
|
||||
using System;
|
||||
|
||||
namespace Org.BouncyCastle.Utilities.Encoders
|
||||
{
|
||||
/// <summary>
|
||||
/// Translator interface.
|
||||
/// </summary>
|
||||
public interface ITranslator
|
||||
{
|
||||
int GetEncodedBlockSize();
|
||||
|
||||
int Encode(byte[] input, int inOff, int length, byte[] outBytes, int outOff);
|
||||
|
||||
int GetDecodedBlockSize();
|
||||
|
||||
int Decode(byte[] input, int inOff, int length, byte[] outBytes, int outOff);
|
||||
}
|
||||
|
||||
}
|
127
iTechSharp/srcbc/util/encoders/UrlBase64.cs
Normal file
127
iTechSharp/srcbc/util/encoders/UrlBase64.cs
Normal file
@@ -0,0 +1,127 @@
|
||||
using System;
|
||||
using System.IO;
|
||||
|
||||
namespace Org.BouncyCastle.Utilities.Encoders
|
||||
{
|
||||
/**
|
||||
* Convert binary data to and from UrlBase64 encoding. This is identical to
|
||||
* Base64 encoding, except that the padding character is "." and the other
|
||||
* non-alphanumeric characters are "-" and "_" instead of "+" and "/".
|
||||
* <p>
|
||||
* The purpose of UrlBase64 encoding is to provide a compact encoding of binary
|
||||
* data that is safe for use as an URL parameter. Base64 encoding does not
|
||||
* produce encoded values that are safe for use in URLs, since "/" can be
|
||||
* interpreted as a path delimiter; "+" is the encoded form of a space; and
|
||||
* "=" is used to separate a name from the corresponding value in an URL
|
||||
* parameter.
|
||||
* </p>
|
||||
*/
|
||||
public class UrlBase64
|
||||
{
|
||||
private static readonly IEncoder encoder = new UrlBase64Encoder();
|
||||
|
||||
/**
|
||||
* Encode the input data producing a URL safe base 64 encoded byte array.
|
||||
*
|
||||
* @return a byte array containing the URL safe base 64 encoded data.
|
||||
*/
|
||||
public static byte[] Encode(
|
||||
byte[] data)
|
||||
{
|
||||
MemoryStream bOut = new MemoryStream();
|
||||
|
||||
try
|
||||
{
|
||||
encoder.Encode(data, 0, data.Length, bOut);
|
||||
}
|
||||
catch (IOException e)
|
||||
{
|
||||
throw new Exception("exception encoding URL safe base64 string: " + e.Message, e);
|
||||
}
|
||||
|
||||
return bOut.ToArray();
|
||||
}
|
||||
|
||||
/**
|
||||
* Encode the byte data writing it to the given output stream.
|
||||
*
|
||||
* @return the number of bytes produced.
|
||||
*/
|
||||
public static int Encode(
|
||||
byte[] data,
|
||||
Stream outStr)
|
||||
{
|
||||
return encoder.Encode(data, 0, data.Length, outStr);
|
||||
}
|
||||
|
||||
/**
|
||||
* Decode the URL safe base 64 encoded input data - white space will be ignored.
|
||||
*
|
||||
* @return a byte array representing the decoded data.
|
||||
*/
|
||||
public static byte[] Decode(
|
||||
byte[] data)
|
||||
{
|
||||
MemoryStream bOut = new MemoryStream();
|
||||
|
||||
try
|
||||
{
|
||||
encoder.Decode(data, 0, data.Length, bOut);
|
||||
}
|
||||
catch (IOException e)
|
||||
{
|
||||
throw new Exception("exception decoding URL safe base64 string: " + e.Message, e);
|
||||
}
|
||||
|
||||
return bOut.ToArray();
|
||||
}
|
||||
|
||||
/**
|
||||
* decode the URL safe base 64 encoded byte data writing it to the given output stream,
|
||||
* whitespace characters will be ignored.
|
||||
*
|
||||
* @return the number of bytes produced.
|
||||
*/
|
||||
public static int Decode(
|
||||
byte[] data,
|
||||
Stream outStr)
|
||||
{
|
||||
return encoder.Decode(data, 0, data.Length, outStr);
|
||||
}
|
||||
|
||||
/**
|
||||
* decode the URL safe base 64 encoded string data - whitespace will be ignored.
|
||||
*
|
||||
* @return a byte array representing the decoded data.
|
||||
*/
|
||||
public static byte[] Decode(
|
||||
string data)
|
||||
{
|
||||
MemoryStream bOut = new MemoryStream();
|
||||
|
||||
try
|
||||
{
|
||||
encoder.DecodeString(data, bOut);
|
||||
}
|
||||
catch (IOException e)
|
||||
{
|
||||
throw new Exception("exception decoding URL safe base64 string: " + e.Message, e);
|
||||
}
|
||||
|
||||
return bOut.ToArray();
|
||||
}
|
||||
|
||||
/**
|
||||
* Decode the URL safe base 64 encoded string data writing it to the given output stream,
|
||||
* whitespace characters will be ignored.
|
||||
*
|
||||
* @return the number of bytes produced.
|
||||
*/
|
||||
public static int Decode(
|
||||
string data,
|
||||
Stream outStr)
|
||||
{
|
||||
return encoder.DecodeString(data, outStr);
|
||||
}
|
||||
}
|
||||
}
|
31
iTechSharp/srcbc/util/encoders/UrlBase64Encoder.cs
Normal file
31
iTechSharp/srcbc/util/encoders/UrlBase64Encoder.cs
Normal file
@@ -0,0 +1,31 @@
|
||||
using System;
|
||||
using System.IO;
|
||||
|
||||
namespace Org.BouncyCastle.Utilities.Encoders
|
||||
{
|
||||
/**
|
||||
* Convert binary data to and from UrlBase64 encoding. This is identical to
|
||||
* Base64 encoding, except that the padding character is "." and the other
|
||||
* non-alphanumeric characters are "-" and "_" instead of "+" and "/".
|
||||
* <p>
|
||||
* The purpose of UrlBase64 encoding is to provide a compact encoding of binary
|
||||
* data that is safe for use as an URL parameter. Base64 encoding does not
|
||||
* produce encoded values that are safe for use in URLs, since "/" can be
|
||||
* interpreted as a path delimiter; "+" is the encoded form of a space; and
|
||||
* "=" is used to separate a name from the corresponding value in an URL
|
||||
* parameter.
|
||||
* </p>
|
||||
*/
|
||||
public class UrlBase64Encoder
|
||||
: Base64Encoder
|
||||
{
|
||||
public UrlBase64Encoder()
|
||||
{
|
||||
encodingTable[encodingTable.Length - 2] = (byte) '-';
|
||||
encodingTable[encodingTable.Length - 1] = (byte) '_';
|
||||
padding = (byte) '.';
|
||||
// we must re-create the decoding table with the new encoded values.
|
||||
InitialiseDecodingTable();
|
||||
}
|
||||
}
|
||||
}
|
47
iTechSharp/srcbc/util/io/BaseInputStream.cs
Normal file
47
iTechSharp/srcbc/util/io/BaseInputStream.cs
Normal file
@@ -0,0 +1,47 @@
|
||||
using System;
|
||||
using System.Diagnostics;
|
||||
using System.IO;
|
||||
|
||||
namespace Org.BouncyCastle.Utilities.IO
|
||||
{
|
||||
public abstract class BaseInputStream : Stream
|
||||
{
|
||||
private bool closed;
|
||||
|
||||
public sealed override bool CanRead { get { return !closed; } }
|
||||
public sealed override bool CanSeek { get { return false; } }
|
||||
public sealed override bool CanWrite { get { return false; } }
|
||||
public override void Close() { closed = true; }
|
||||
public sealed override void Flush() {}
|
||||
public sealed override long Length { get { throw new NotSupportedException(); } }
|
||||
public sealed override long Position
|
||||
{
|
||||
get { throw new NotSupportedException(); }
|
||||
set { throw new NotSupportedException(); }
|
||||
}
|
||||
|
||||
public override int Read(byte[] buffer, int offset, int count)
|
||||
{
|
||||
int pos = offset;
|
||||
try
|
||||
{
|
||||
int end = offset + count;
|
||||
while (pos < end)
|
||||
{
|
||||
int b = ReadByte();
|
||||
if (b == -1) break;
|
||||
buffer[pos++] = (byte) b;
|
||||
}
|
||||
}
|
||||
catch (IOException)
|
||||
{
|
||||
if (pos == offset) throw;
|
||||
}
|
||||
return pos - offset;
|
||||
}
|
||||
|
||||
public sealed override long Seek(long offset, SeekOrigin origin) { throw new NotSupportedException(); }
|
||||
public sealed override void SetLength(long value) { throw new NotSupportedException(); }
|
||||
public sealed override void Write(byte[] buffer, int offset, int count) { throw new NotSupportedException(); }
|
||||
}
|
||||
}
|
47
iTechSharp/srcbc/util/io/BaseOutputStream.cs
Normal file
47
iTechSharp/srcbc/util/io/BaseOutputStream.cs
Normal file
@@ -0,0 +1,47 @@
|
||||
using System;
|
||||
using System.Diagnostics;
|
||||
using System.IO;
|
||||
|
||||
namespace Org.BouncyCastle.Utilities.IO
|
||||
{
|
||||
public abstract class BaseOutputStream : Stream
|
||||
{
|
||||
private bool closed;
|
||||
|
||||
public sealed override bool CanRead { get { return false; } }
|
||||
public sealed override bool CanSeek { get { return false; } }
|
||||
public sealed override bool CanWrite { get { return !closed; } }
|
||||
public override void Close() { closed = true; }
|
||||
public override void Flush() {}
|
||||
public sealed override long Length { get { throw new NotSupportedException(); } }
|
||||
public sealed override long Position
|
||||
{
|
||||
get { throw new NotSupportedException(); }
|
||||
set { throw new NotSupportedException(); }
|
||||
}
|
||||
public sealed override int Read(byte[] buffer, int offset, int count) { throw new NotSupportedException(); }
|
||||
public sealed override long Seek(long offset, SeekOrigin origin) { throw new NotSupportedException(); }
|
||||
public sealed override void SetLength(long value) { throw new NotSupportedException(); }
|
||||
|
||||
public override void Write(byte[] buffer, int offset, int count)
|
||||
{
|
||||
Debug.Assert(buffer != null);
|
||||
Debug.Assert(0 <= offset && offset <= buffer.Length);
|
||||
Debug.Assert(count >= 0);
|
||||
|
||||
int end = offset + count;
|
||||
|
||||
Debug.Assert(0 <= end && end <= buffer.Length);
|
||||
|
||||
for (int i = offset; i < end; ++i)
|
||||
{
|
||||
this.WriteByte(buffer[i]);
|
||||
}
|
||||
}
|
||||
|
||||
public virtual void Write(params byte[] buffer)
|
||||
{
|
||||
Write(buffer, 0, buffer.Length);
|
||||
}
|
||||
}
|
||||
}
|
52
iTechSharp/srcbc/util/io/PushbackStream.cs
Normal file
52
iTechSharp/srcbc/util/io/PushbackStream.cs
Normal file
@@ -0,0 +1,52 @@
|
||||
using System;
|
||||
using System.IO;
|
||||
|
||||
using Org.BouncyCastle.Asn1.Utilities;
|
||||
|
||||
namespace Org.BouncyCastle.Utilities.IO
|
||||
{
|
||||
public class PushbackStream
|
||||
: FilterStream
|
||||
{
|
||||
private int buf = -1;
|
||||
|
||||
public PushbackStream(
|
||||
Stream s)
|
||||
: base(s)
|
||||
{
|
||||
}
|
||||
|
||||
public override int ReadByte()
|
||||
{
|
||||
if (buf != -1)
|
||||
{
|
||||
int tmp = buf;
|
||||
buf = -1;
|
||||
return tmp;
|
||||
}
|
||||
|
||||
return base.ReadByte();
|
||||
}
|
||||
|
||||
public override int Read(byte[] buffer, int offset, int count)
|
||||
{
|
||||
if (buf != -1 && count > 0)
|
||||
{
|
||||
// TODO Can this case be made more efficient?
|
||||
buffer[offset] = (byte) buf;
|
||||
buf = -1;
|
||||
return 1;
|
||||
}
|
||||
|
||||
return base.Read(buffer, offset, count);
|
||||
}
|
||||
|
||||
public virtual void Unread(int b)
|
||||
{
|
||||
if (buf != -1)
|
||||
throw new InvalidOperationException("Can only push back one byte");
|
||||
|
||||
buf = b & 0xFF;
|
||||
}
|
||||
}
|
||||
}
|
57
iTechSharp/srcbc/util/io/Streams.cs
Normal file
57
iTechSharp/srcbc/util/io/Streams.cs
Normal file
@@ -0,0 +1,57 @@
|
||||
using System;
|
||||
using System.IO;
|
||||
|
||||
namespace Org.BouncyCastle.Utilities.IO
|
||||
{
|
||||
public sealed class Streams
|
||||
{
|
||||
private const int BufferSize = 512;
|
||||
|
||||
private Streams()
|
||||
{
|
||||
}
|
||||
|
||||
public static void Drain(Stream inStr)
|
||||
{
|
||||
byte[] bs = new byte[BufferSize];
|
||||
while (inStr.Read(bs, 0, bs.Length) > 0)
|
||||
{
|
||||
}
|
||||
}
|
||||
|
||||
public static byte[] ReadAll(Stream inStr)
|
||||
{
|
||||
MemoryStream buf = new MemoryStream();
|
||||
PipeAll(inStr, buf);
|
||||
return buf.ToArray();
|
||||
}
|
||||
|
||||
public static int ReadFully(Stream inStr, byte[] buf)
|
||||
{
|
||||
return ReadFully(inStr, buf, 0, buf.Length);
|
||||
}
|
||||
|
||||
public static int ReadFully(Stream inStr, byte[] buf, int off, int len)
|
||||
{
|
||||
int totalRead = 0;
|
||||
while (totalRead < len)
|
||||
{
|
||||
int numRead = inStr.Read(buf, off + totalRead, len - totalRead);
|
||||
if (numRead < 1)
|
||||
break;
|
||||
totalRead += numRead;
|
||||
}
|
||||
return totalRead;
|
||||
}
|
||||
|
||||
public static void PipeAll(Stream inStr, Stream outStr)
|
||||
{
|
||||
byte[] bs = new byte[BufferSize];
|
||||
int numRead;
|
||||
while ((numRead = inStr.Read(bs, 0, bs.Length)) > 0)
|
||||
{
|
||||
outStr.Write(bs, 0, numRead);
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
112
iTechSharp/srcbc/util/net/IPAddress.cs
Normal file
112
iTechSharp/srcbc/util/net/IPAddress.cs
Normal file
@@ -0,0 +1,112 @@
|
||||
using System;
|
||||
|
||||
using Org.BouncyCastle.Math;
|
||||
|
||||
namespace Org.BouncyCastle.Utilities.Net
|
||||
{
|
||||
public class IPAddress
|
||||
{
|
||||
/**
|
||||
* Validate the given IPv4 or IPv6 address.
|
||||
*
|
||||
* @param address the IP address as a string.
|
||||
*
|
||||
* @return true if a valid address, false otherwise
|
||||
*/
|
||||
public static bool IsValid(
|
||||
string address)
|
||||
{
|
||||
return IsValidIPv4(address) || IsValidIPv6(address);
|
||||
}
|
||||
|
||||
/**
|
||||
* Validate the given IPv4 address.
|
||||
*
|
||||
* @param address the IP address as a string.
|
||||
*
|
||||
* @return true if a valid IPv4 address, false otherwise
|
||||
*/
|
||||
private static bool IsValidIPv4(
|
||||
string address)
|
||||
{
|
||||
if (address.Length == 0)
|
||||
return false;
|
||||
|
||||
BigInteger octet;
|
||||
int octets = 0;
|
||||
|
||||
string temp = address + ".";
|
||||
|
||||
int pos;
|
||||
int start = 0;
|
||||
while (start < temp.Length
|
||||
&& (pos = temp.IndexOf('.', start)) > start)
|
||||
{
|
||||
if (octets == 4)
|
||||
return false;
|
||||
|
||||
try
|
||||
{
|
||||
octet = new BigInteger(temp.Substring(start, pos - start));
|
||||
}
|
||||
catch (FormatException)
|
||||
{
|
||||
return false;
|
||||
}
|
||||
|
||||
if (octet.SignValue < 0 || octet.BitLength > 8)
|
||||
return false;
|
||||
|
||||
start = pos + 1;
|
||||
++octets;
|
||||
}
|
||||
|
||||
return octets == 4;
|
||||
}
|
||||
|
||||
/**
|
||||
* Validate the given IPv6 address.
|
||||
*
|
||||
* @param address the IP address as a string.
|
||||
*
|
||||
* @return true if a valid IPv4 address, false otherwise
|
||||
*/
|
||||
private static bool IsValidIPv6(
|
||||
string address)
|
||||
{
|
||||
if (address.Length == 0)
|
||||
return false;
|
||||
|
||||
BigInteger octet;
|
||||
int octets = 0;
|
||||
|
||||
string temp = address + ":";
|
||||
|
||||
int pos;
|
||||
int start = 0;
|
||||
while (start < temp.Length
|
||||
&& (pos = temp.IndexOf(':', start)) > start)
|
||||
{
|
||||
if (octets == 8)
|
||||
return false;
|
||||
|
||||
try
|
||||
{
|
||||
octet = new BigInteger(temp.Substring(start, pos - start), 16);
|
||||
}
|
||||
catch (FormatException)
|
||||
{
|
||||
return false;
|
||||
}
|
||||
|
||||
if (octet.SignValue < 0 || octet.BitLength > 16)
|
||||
return false;
|
||||
|
||||
start = pos + 1;
|
||||
octets++;
|
||||
}
|
||||
|
||||
return octets == 8;
|
||||
}
|
||||
}
|
||||
}
|
88
iTechSharp/srcbc/util/zlib/Adler32.cs
Normal file
88
iTechSharp/srcbc/util/zlib/Adler32.cs
Normal file
@@ -0,0 +1,88 @@
|
||||
using System;
|
||||
/*
|
||||
* $Id: Adler32.cs,v 1.1.1.1 2007/01/24 16:41:26 psoares33 Exp $
|
||||
*
|
||||
Copyright (c) 2000,2001,2002,2003 ymnk, JCraft,Inc. All rights reserved.
|
||||
|
||||
Redistribution and use in source and binary forms, with or without
|
||||
modification, are permitted provided that the following conditions are met:
|
||||
|
||||
1. Redistributions of source code must retain the above copyright notice,
|
||||
this list of conditions and the following disclaimer.
|
||||
|
||||
2. Redistributions in binary form must reproduce the above copyright
|
||||
notice, this list of conditions and the following disclaimer in
|
||||
the documentation and/or other materials provided with the distribution.
|
||||
|
||||
3. The names of the authors may not be used to endorse or promote products
|
||||
derived from this software without specific prior written permission.
|
||||
|
||||
THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESSED OR IMPLIED WARRANTIES,
|
||||
INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND
|
||||
FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL JCRAFT,
|
||||
INC. OR ANY CONTRIBUTORS TO THIS SOFTWARE BE LIABLE FOR ANY DIRECT, INDIRECT,
|
||||
INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
|
||||
LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA,
|
||||
OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF
|
||||
LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
|
||||
NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,
|
||||
EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
||||
*/
|
||||
/*
|
||||
* This program is based on zlib-1.1.3, so all credit should go authors
|
||||
* Jean-loup Gailly(jloup@gzip.org) and Mark Adler(madler@alumni.caltech.edu)
|
||||
* and contributors of zlib.
|
||||
*/
|
||||
|
||||
namespace Org.BouncyCastle.Utilities.Zlib {
|
||||
|
||||
internal sealed class Adler32{
|
||||
|
||||
// largest prime smaller than 65536
|
||||
private const int BASE=65521;
|
||||
// NMAX is the largest n such that 255n(n+1)/2 + (n+1)(BASE-1) <= 2^32-1
|
||||
private const int NMAX=5552;
|
||||
|
||||
internal long adler32(long adler, byte[] buf, int index, int len){
|
||||
if(buf == null){ return 1L; }
|
||||
|
||||
long s1=adler&0xffff;
|
||||
long s2=(adler>>16)&0xffff;
|
||||
int k;
|
||||
|
||||
while(len > 0) {
|
||||
k=len<NMAX?len:NMAX;
|
||||
len-=k;
|
||||
while(k>=16){
|
||||
s1+=buf[index++]&0xff; s2+=s1;
|
||||
s1+=buf[index++]&0xff; s2+=s1;
|
||||
s1+=buf[index++]&0xff; s2+=s1;
|
||||
s1+=buf[index++]&0xff; s2+=s1;
|
||||
s1+=buf[index++]&0xff; s2+=s1;
|
||||
s1+=buf[index++]&0xff; s2+=s1;
|
||||
s1+=buf[index++]&0xff; s2+=s1;
|
||||
s1+=buf[index++]&0xff; s2+=s1;
|
||||
s1+=buf[index++]&0xff; s2+=s1;
|
||||
s1+=buf[index++]&0xff; s2+=s1;
|
||||
s1+=buf[index++]&0xff; s2+=s1;
|
||||
s1+=buf[index++]&0xff; s2+=s1;
|
||||
s1+=buf[index++]&0xff; s2+=s1;
|
||||
s1+=buf[index++]&0xff; s2+=s1;
|
||||
s1+=buf[index++]&0xff; s2+=s1;
|
||||
s1+=buf[index++]&0xff; s2+=s1;
|
||||
k-=16;
|
||||
}
|
||||
if(k!=0){
|
||||
do{
|
||||
s1+=buf[index++]&0xff; s2+=s1;
|
||||
}
|
||||
while(--k!=0);
|
||||
}
|
||||
s1%=BASE;
|
||||
s2%=BASE;
|
||||
}
|
||||
return (s2<<16)|s1;
|
||||
}
|
||||
|
||||
}
|
||||
}
|
1640
iTechSharp/srcbc/util/zlib/Deflate.cs
Normal file
1640
iTechSharp/srcbc/util/zlib/Deflate.cs
Normal file
File diff suppressed because it is too large
Load Diff
618
iTechSharp/srcbc/util/zlib/InfBlocks.cs
Normal file
618
iTechSharp/srcbc/util/zlib/InfBlocks.cs
Normal file
@@ -0,0 +1,618 @@
|
||||
using System;
|
||||
/*
|
||||
* $Id: InfBlocks.cs,v 1.2 2008/05/12 15:24:47 psoares33 Exp $
|
||||
*
|
||||
Copyright (c) 2000,2001,2002,2003 ymnk, JCraft,Inc. All rights reserved.
|
||||
|
||||
Redistribution and use in source and binary forms, with or without
|
||||
modification, are permitted provided that the following conditions are met:
|
||||
|
||||
1. Redistributions of source code must retain the above copyright notice,
|
||||
this list of conditions and the following disclaimer.
|
||||
|
||||
2. Redistributions in binary form must reproduce the above copyright
|
||||
notice, this list of conditions and the following disclaimer in
|
||||
the documentation and/or other materials provided with the distribution.
|
||||
|
||||
3. The names of the authors may not be used to endorse or promote products
|
||||
derived from this software without specific prior written permission.
|
||||
|
||||
THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESSED OR IMPLIED WARRANTIES,
|
||||
INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND
|
||||
FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL JCRAFT,
|
||||
INC. OR ANY CONTRIBUTORS TO THIS SOFTWARE BE LIABLE FOR ANY DIRECT, INDIRECT,
|
||||
INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
|
||||
LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA,
|
||||
OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF
|
||||
LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
|
||||
NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,
|
||||
EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
||||
*/
|
||||
/*
|
||||
* This program is based on zlib-1.1.3, so all credit should go authors
|
||||
* Jean-loup Gailly(jloup@gzip.org) and Mark Adler(madler@alumni.caltech.edu)
|
||||
* and contributors of zlib.
|
||||
*/
|
||||
|
||||
namespace Org.BouncyCastle.Utilities.Zlib {
|
||||
|
||||
internal sealed class InfBlocks{
|
||||
private const int MANY=1440;
|
||||
|
||||
// And'ing with mask[n] masks the lower n bits
|
||||
private static readonly int[] inflate_mask = {
|
||||
0x00000000, 0x00000001, 0x00000003, 0x00000007, 0x0000000f,
|
||||
0x0000001f, 0x0000003f, 0x0000007f, 0x000000ff, 0x000001ff,
|
||||
0x000003ff, 0x000007ff, 0x00000fff, 0x00001fff, 0x00003fff,
|
||||
0x00007fff, 0x0000ffff
|
||||
};
|
||||
|
||||
// Table for deflate from PKZIP's appnote.txt.
|
||||
static readonly int[] border = { // Order of the bit length code lengths
|
||||
16, 17, 18, 0, 8, 7, 9, 6, 10, 5, 11, 4, 12, 3, 13, 2, 14, 1, 15
|
||||
};
|
||||
|
||||
private const int Z_OK=0;
|
||||
private const int Z_STREAM_END=1;
|
||||
private const int Z_NEED_DICT=2;
|
||||
private const int Z_ERRNO=-1;
|
||||
private const int Z_STREAM_ERROR=-2;
|
||||
private const int Z_DATA_ERROR=-3;
|
||||
private const int Z_MEM_ERROR=-4;
|
||||
private const int Z_BUF_ERROR=-5;
|
||||
private const int Z_VERSION_ERROR=-6;
|
||||
|
||||
private const int TYPE=0; // get type bits (3, including end bit)
|
||||
private const int LENS=1; // get lengths for stored
|
||||
private const int STORED=2;// processing stored block
|
||||
private const int TABLE=3; // get table lengths
|
||||
private const int BTREE=4; // get bit lengths tree for a dynamic block
|
||||
private const int DTREE=5; // get length, distance trees for a dynamic block
|
||||
private const int CODES=6; // processing fixed or dynamic block
|
||||
private const int DRY=7; // output remaining window bytes
|
||||
private const int DONE=8; // finished last block, done
|
||||
private const int BAD=9; // ot a data error--stuck here
|
||||
|
||||
internal int mode; // current inflate_block mode
|
||||
|
||||
internal int left; // if STORED, bytes left to copy
|
||||
|
||||
internal int table; // table lengths (14 bits)
|
||||
internal int index; // index into blens (or border)
|
||||
internal int[] blens; // bit lengths of codes
|
||||
internal int[] bb=new int[1]; // bit length tree depth
|
||||
internal int[] tb=new int[1]; // bit length decoding tree
|
||||
|
||||
internal InfCodes codes=new InfCodes(); // if CODES, current state
|
||||
|
||||
int last; // true if this block is the last block
|
||||
|
||||
// mode independent information
|
||||
internal int bitk; // bits in bit buffer
|
||||
internal int bitb; // bit buffer
|
||||
internal int[] hufts; // single malloc for tree space
|
||||
internal byte[] window; // sliding window
|
||||
internal int end; // one byte after sliding window
|
||||
internal int read; // window read pointer
|
||||
internal int write; // window write pointer
|
||||
internal Object checkfn; // check function
|
||||
internal long check; // check on output
|
||||
|
||||
internal InfTree inftree=new InfTree();
|
||||
|
||||
internal InfBlocks(ZStream z, Object checkfn, int w){
|
||||
hufts=new int[MANY*3];
|
||||
window=new byte[w];
|
||||
end=w;
|
||||
this.checkfn = checkfn;
|
||||
mode = TYPE;
|
||||
reset(z, null);
|
||||
}
|
||||
|
||||
internal void reset(ZStream z, long[] c){
|
||||
if(c!=null) c[0]=check;
|
||||
if(mode==BTREE || mode==DTREE){
|
||||
}
|
||||
if(mode==CODES){
|
||||
codes.free(z);
|
||||
}
|
||||
mode=TYPE;
|
||||
bitk=0;
|
||||
bitb=0;
|
||||
read=write=0;
|
||||
|
||||
if(checkfn != null)
|
||||
z.adler=check=z._adler.adler32(0L, null, 0, 0);
|
||||
}
|
||||
|
||||
internal int proc(ZStream z, int r){
|
||||
int t; // temporary storage
|
||||
int b; // bit buffer
|
||||
int k; // bits in bit buffer
|
||||
int p; // input data pointer
|
||||
int n; // bytes available there
|
||||
int q; // output window write pointer
|
||||
int m; { // bytes to end of window or read pointer
|
||||
|
||||
// copy input/output information to locals (UPDATE macro restores)
|
||||
p=z.next_in_index;n=z.avail_in;b=bitb;k=bitk;} {
|
||||
q=write;m=(int)(q<read?read-q-1:end-q);}
|
||||
|
||||
// process input based on current state
|
||||
while(true){
|
||||
switch (mode){
|
||||
case TYPE:
|
||||
|
||||
while(k<(3)){
|
||||
if(n!=0){
|
||||
r=Z_OK;
|
||||
}
|
||||
else{
|
||||
bitb=b; bitk=k;
|
||||
z.avail_in=n;
|
||||
z.total_in+=p-z.next_in_index;z.next_in_index=p;
|
||||
write=q;
|
||||
return inflate_flush(z,r);
|
||||
};
|
||||
n--;
|
||||
b|=(z.next_in[p++]&0xff)<<k;
|
||||
k+=8;
|
||||
}
|
||||
t = (int)(b & 7);
|
||||
last = t & 1;
|
||||
|
||||
switch (t >> 1){
|
||||
case 0: { // stored
|
||||
b>>=(3);k-=(3);}
|
||||
t = k & 7; { // go to byte boundary
|
||||
|
||||
b>>=(t);k-=(t);}
|
||||
mode = LENS; // get length of stored block
|
||||
break;
|
||||
case 1: { // fixed
|
||||
int[] bl=new int[1];
|
||||
int[] bd=new int[1];
|
||||
int[][] tl=new int[1][];
|
||||
int[][] td=new int[1][];
|
||||
|
||||
InfTree.inflate_trees_fixed(bl, bd, tl, td, z);
|
||||
codes.init(bl[0], bd[0], tl[0], 0, td[0], 0, z);
|
||||
} {
|
||||
|
||||
b>>=(3);k-=(3);}
|
||||
|
||||
mode = CODES;
|
||||
break;
|
||||
case 2: { // dynamic
|
||||
|
||||
b>>=(3);k-=(3);}
|
||||
|
||||
mode = TABLE;
|
||||
break;
|
||||
case 3: { // illegal
|
||||
|
||||
b>>=(3);k-=(3);}
|
||||
mode = BAD;
|
||||
z.msg = "invalid block type";
|
||||
r = Z_DATA_ERROR;
|
||||
|
||||
bitb=b; bitk=k;
|
||||
z.avail_in=n;z.total_in+=p-z.next_in_index;z.next_in_index=p;
|
||||
write=q;
|
||||
return inflate_flush(z,r);
|
||||
}
|
||||
break;
|
||||
case LENS:
|
||||
|
||||
while(k<(32)){
|
||||
if(n!=0){
|
||||
r=Z_OK;
|
||||
}
|
||||
else{
|
||||
bitb=b; bitk=k;
|
||||
z.avail_in=n;
|
||||
z.total_in+=p-z.next_in_index;z.next_in_index=p;
|
||||
write=q;
|
||||
return inflate_flush(z,r);
|
||||
};
|
||||
n--;
|
||||
b|=(z.next_in[p++]&0xff)<<k;
|
||||
k+=8;
|
||||
}
|
||||
|
||||
if ((((~b) >> 16) & 0xffff) != (b & 0xffff)){
|
||||
mode = BAD;
|
||||
z.msg = "invalid stored block lengths";
|
||||
r = Z_DATA_ERROR;
|
||||
|
||||
bitb=b; bitk=k;
|
||||
z.avail_in=n;z.total_in+=p-z.next_in_index;z.next_in_index=p;
|
||||
write=q;
|
||||
return inflate_flush(z,r);
|
||||
}
|
||||
left = (b & 0xffff);
|
||||
b = k = 0; // dump bits
|
||||
mode = left!=0 ? STORED : (last!=0 ? DRY : TYPE);
|
||||
break;
|
||||
case STORED:
|
||||
if (n == 0){
|
||||
bitb=b; bitk=k;
|
||||
z.avail_in=n;z.total_in+=p-z.next_in_index;z.next_in_index=p;
|
||||
write=q;
|
||||
return inflate_flush(z,r);
|
||||
}
|
||||
|
||||
if(m==0){
|
||||
if(q==end&&read!=0){
|
||||
q=0; m=(int)(q<read?read-q-1:end-q);
|
||||
}
|
||||
if(m==0){
|
||||
write=q;
|
||||
r=inflate_flush(z,r);
|
||||
q=write;m=(int)(q<read?read-q-1:end-q);
|
||||
if(q==end&&read!=0){
|
||||
q=0; m=(int)(q<read?read-q-1:end-q);
|
||||
}
|
||||
if(m==0){
|
||||
bitb=b; bitk=k;
|
||||
z.avail_in=n;z.total_in+=p-z.next_in_index;z.next_in_index=p;
|
||||
write=q;
|
||||
return inflate_flush(z,r);
|
||||
}
|
||||
}
|
||||
}
|
||||
r=Z_OK;
|
||||
|
||||
t = left;
|
||||
if(t>n) t = n;
|
||||
if(t>m) t = m;
|
||||
System.Array.Copy(z.next_in, p, window, q, t);
|
||||
p += t; n -= t;
|
||||
q += t; m -= t;
|
||||
if ((left -= t) != 0)
|
||||
break;
|
||||
mode = last!=0 ? DRY : TYPE;
|
||||
break;
|
||||
case TABLE:
|
||||
|
||||
while(k<(14)){
|
||||
if(n!=0){
|
||||
r=Z_OK;
|
||||
}
|
||||
else{
|
||||
bitb=b; bitk=k;
|
||||
z.avail_in=n;
|
||||
z.total_in+=p-z.next_in_index;z.next_in_index=p;
|
||||
write=q;
|
||||
return inflate_flush(z,r);
|
||||
};
|
||||
n--;
|
||||
b|=(z.next_in[p++]&0xff)<<k;
|
||||
k+=8;
|
||||
}
|
||||
|
||||
table = t = (b & 0x3fff);
|
||||
if ((t & 0x1f) > 29 || ((t >> 5) & 0x1f) > 29) {
|
||||
mode = BAD;
|
||||
z.msg = "too many length or distance symbols";
|
||||
r = Z_DATA_ERROR;
|
||||
|
||||
bitb=b; bitk=k;
|
||||
z.avail_in=n;z.total_in+=p-z.next_in_index;z.next_in_index=p;
|
||||
write=q;
|
||||
return inflate_flush(z,r);
|
||||
}
|
||||
t = 258 + (t & 0x1f) + ((t >> 5) & 0x1f);
|
||||
if(blens==null || blens.Length<t){
|
||||
blens=new int[t];
|
||||
}
|
||||
else{
|
||||
for(int i=0; i<t; i++){blens[i]=0;}
|
||||
} {
|
||||
|
||||
b>>=(14);k-=(14);}
|
||||
|
||||
index = 0;
|
||||
mode = BTREE;
|
||||
goto case BTREE;
|
||||
case BTREE:
|
||||
while (index < 4 + (table >> 10)){
|
||||
while(k<(3)){
|
||||
if(n!=0){
|
||||
r=Z_OK;
|
||||
}
|
||||
else{
|
||||
bitb=b; bitk=k;
|
||||
z.avail_in=n;
|
||||
z.total_in+=p-z.next_in_index;z.next_in_index=p;
|
||||
write=q;
|
||||
return inflate_flush(z,r);
|
||||
};
|
||||
n--;
|
||||
b|=(z.next_in[p++]&0xff)<<k;
|
||||
k+=8;
|
||||
}
|
||||
|
||||
blens[border[index++]] = b&7; {
|
||||
|
||||
b>>=(3);k-=(3);}
|
||||
}
|
||||
|
||||
while(index < 19){
|
||||
blens[border[index++]] = 0;
|
||||
}
|
||||
|
||||
bb[0] = 7;
|
||||
t = inftree.inflate_trees_bits(blens, bb, tb, hufts, z);
|
||||
if (t != Z_OK){
|
||||
r = t;
|
||||
if (r == Z_DATA_ERROR){
|
||||
blens=null;
|
||||
mode = BAD;
|
||||
}
|
||||
|
||||
bitb=b; bitk=k;
|
||||
z.avail_in=n;z.total_in+=p-z.next_in_index;z.next_in_index=p;
|
||||
write=q;
|
||||
return inflate_flush(z,r);
|
||||
}
|
||||
|
||||
index = 0;
|
||||
mode = DTREE;
|
||||
goto case DTREE;
|
||||
case DTREE:
|
||||
while (true){
|
||||
t = table;
|
||||
if(!(index < 258 + (t & 0x1f) + ((t >> 5) & 0x1f))){
|
||||
break;
|
||||
}
|
||||
|
||||
int i, j, c;
|
||||
|
||||
t = bb[0];
|
||||
|
||||
while(k<(t)){
|
||||
if(n!=0){
|
||||
r=Z_OK;
|
||||
}
|
||||
else{
|
||||
bitb=b; bitk=k;
|
||||
z.avail_in=n;
|
||||
z.total_in+=p-z.next_in_index;z.next_in_index=p;
|
||||
write=q;
|
||||
return inflate_flush(z,r);
|
||||
};
|
||||
n--;
|
||||
b|=(z.next_in[p++]&0xff)<<k;
|
||||
k+=8;
|
||||
}
|
||||
|
||||
if(tb[0]==-1){
|
||||
//System.err.println("null...");
|
||||
}
|
||||
|
||||
t=hufts[(tb[0]+(b&inflate_mask[t]))*3+1];
|
||||
c=hufts[(tb[0]+(b&inflate_mask[t]))*3+2];
|
||||
|
||||
if (c < 16){
|
||||
b>>=(t);k-=(t);
|
||||
blens[index++] = c;
|
||||
}
|
||||
else { // c == 16..18
|
||||
i = c == 18 ? 7 : c - 14;
|
||||
j = c == 18 ? 11 : 3;
|
||||
|
||||
while(k<(t+i)){
|
||||
if(n!=0){
|
||||
r=Z_OK;
|
||||
}
|
||||
else{
|
||||
bitb=b; bitk=k;
|
||||
z.avail_in=n;
|
||||
z.total_in+=p-z.next_in_index;z.next_in_index=p;
|
||||
write=q;
|
||||
return inflate_flush(z,r);
|
||||
};
|
||||
n--;
|
||||
b|=(z.next_in[p++]&0xff)<<k;
|
||||
k+=8;
|
||||
}
|
||||
|
||||
b>>=(t);k-=(t);
|
||||
|
||||
j += (b & inflate_mask[i]);
|
||||
|
||||
b>>=(i);k-=(i);
|
||||
|
||||
i = index;
|
||||
t = table;
|
||||
if (i + j > 258 + (t & 0x1f) + ((t >> 5) & 0x1f) ||
|
||||
(c == 16 && i < 1)){
|
||||
blens=null;
|
||||
mode = BAD;
|
||||
z.msg = "invalid bit length repeat";
|
||||
r = Z_DATA_ERROR;
|
||||
|
||||
bitb=b; bitk=k;
|
||||
z.avail_in=n;z.total_in+=p-z.next_in_index;z.next_in_index=p;
|
||||
write=q;
|
||||
return inflate_flush(z,r);
|
||||
}
|
||||
|
||||
c = c == 16 ? blens[i-1] : 0;
|
||||
do{
|
||||
blens[i++] = c;
|
||||
}
|
||||
while (--j!=0);
|
||||
index = i;
|
||||
}
|
||||
}
|
||||
|
||||
tb[0]=-1; {
|
||||
int[] bl=new int[1];
|
||||
int[] bd=new int[1];
|
||||
int[] tl=new int[1];
|
||||
int[] td=new int[1];
|
||||
bl[0] = 9; // must be <= 9 for lookahead assumptions
|
||||
bd[0] = 6; // must be <= 9 for lookahead assumptions
|
||||
|
||||
t = table;
|
||||
t = inftree.inflate_trees_dynamic(257 + (t & 0x1f),
|
||||
1 + ((t >> 5) & 0x1f),
|
||||
blens, bl, bd, tl, td, hufts, z);
|
||||
|
||||
if (t != Z_OK){
|
||||
if (t == Z_DATA_ERROR){
|
||||
blens=null;
|
||||
mode = BAD;
|
||||
}
|
||||
r = t;
|
||||
|
||||
bitb=b; bitk=k;
|
||||
z.avail_in=n;z.total_in+=p-z.next_in_index;z.next_in_index=p;
|
||||
write=q;
|
||||
return inflate_flush(z,r);
|
||||
}
|
||||
codes.init(bl[0], bd[0], hufts, tl[0], hufts, td[0], z);
|
||||
}
|
||||
mode = CODES;
|
||||
goto case CODES;
|
||||
case CODES:
|
||||
bitb=b; bitk=k;
|
||||
z.avail_in=n; z.total_in+=p-z.next_in_index;z.next_in_index=p;
|
||||
write=q;
|
||||
|
||||
if ((r = codes.proc(this, z, r)) != Z_STREAM_END){
|
||||
return inflate_flush(z, r);
|
||||
}
|
||||
r = Z_OK;
|
||||
codes.free(z);
|
||||
|
||||
p=z.next_in_index; n=z.avail_in;b=bitb;k=bitk;
|
||||
q=write;m=(int)(q<read?read-q-1:end-q);
|
||||
|
||||
if (last==0){
|
||||
mode = TYPE;
|
||||
break;
|
||||
}
|
||||
mode = DRY;
|
||||
goto case DRY;
|
||||
case DRY:
|
||||
write=q;
|
||||
r=inflate_flush(z, r);
|
||||
q=write; m=(int)(q<read?read-q-1:end-q);
|
||||
if (read != write){
|
||||
bitb=b; bitk=k;
|
||||
z.avail_in=n;z.total_in+=p-z.next_in_index;z.next_in_index=p;
|
||||
write=q;
|
||||
return inflate_flush(z, r);
|
||||
}
|
||||
mode = DONE;
|
||||
goto case DONE;
|
||||
case DONE:
|
||||
r = Z_STREAM_END;
|
||||
|
||||
bitb=b; bitk=k;
|
||||
z.avail_in=n;z.total_in+=p-z.next_in_index;z.next_in_index=p;
|
||||
write=q;
|
||||
return inflate_flush(z, r);
|
||||
case BAD:
|
||||
r = Z_DATA_ERROR;
|
||||
|
||||
bitb=b; bitk=k;
|
||||
z.avail_in=n;z.total_in+=p-z.next_in_index;z.next_in_index=p;
|
||||
write=q;
|
||||
return inflate_flush(z, r);
|
||||
|
||||
default:
|
||||
r = Z_STREAM_ERROR;
|
||||
|
||||
bitb=b; bitk=k;
|
||||
z.avail_in=n;z.total_in+=p-z.next_in_index;z.next_in_index=p;
|
||||
write=q;
|
||||
return inflate_flush(z, r);
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
internal void free(ZStream z){
|
||||
reset(z, null);
|
||||
window=null;
|
||||
hufts=null;
|
||||
//ZFREE(z, s);
|
||||
}
|
||||
|
||||
internal void set_dictionary(byte[] d, int start, int n){
|
||||
System.Array.Copy(d, start, window, 0, n);
|
||||
read = write = n;
|
||||
}
|
||||
|
||||
// Returns true if inflate is currently at the end of a block generated
|
||||
// by Z_SYNC_FLUSH or Z_FULL_FLUSH.
|
||||
internal int sync_point(){
|
||||
return mode == LENS ? 1 : 0;
|
||||
}
|
||||
|
||||
// copy as much as possible from the sliding window to the output area
|
||||
internal int inflate_flush(ZStream z, int r){
|
||||
int n;
|
||||
int p;
|
||||
int q;
|
||||
|
||||
// local copies of source and destination pointers
|
||||
p = z.next_out_index;
|
||||
q = read;
|
||||
|
||||
// compute number of bytes to copy as far as end of window
|
||||
n = (int)((q <= write ? write : end) - q);
|
||||
if (n > z.avail_out) n = z.avail_out;
|
||||
if (n!=0 && r == Z_BUF_ERROR) r = Z_OK;
|
||||
|
||||
// update counters
|
||||
z.avail_out -= n;
|
||||
z.total_out += n;
|
||||
|
||||
// update check information
|
||||
if(checkfn != null)
|
||||
z.adler=check=z._adler.adler32(check, window, q, n);
|
||||
|
||||
// copy as far as end of window
|
||||
System.Array.Copy(window, q, z.next_out, p, n);
|
||||
p += n;
|
||||
q += n;
|
||||
|
||||
// see if more to copy at beginning of window
|
||||
if (q == end){
|
||||
// wrap pointers
|
||||
q = 0;
|
||||
if (write == end)
|
||||
write = 0;
|
||||
|
||||
// compute bytes to copy
|
||||
n = write - q;
|
||||
if (n > z.avail_out) n = z.avail_out;
|
||||
if (n!=0 && r == Z_BUF_ERROR) r = Z_OK;
|
||||
|
||||
// update counters
|
||||
z.avail_out -= n;
|
||||
z.total_out += n;
|
||||
|
||||
// update check information
|
||||
if(checkfn != null)
|
||||
z.adler=check=z._adler.adler32(check, window, q, n);
|
||||
|
||||
// copy
|
||||
System.Array.Copy(window, q, z.next_out, p, n);
|
||||
p += n;
|
||||
q += n;
|
||||
}
|
||||
|
||||
// update pointers
|
||||
z.next_out_index = p;
|
||||
read = q;
|
||||
|
||||
// done
|
||||
return r;
|
||||
}
|
||||
}
|
||||
}
|
611
iTechSharp/srcbc/util/zlib/InfCodes.cs
Normal file
611
iTechSharp/srcbc/util/zlib/InfCodes.cs
Normal file
@@ -0,0 +1,611 @@
|
||||
using System;
|
||||
/*
|
||||
* $Id: InfCodes.cs,v 1.2 2008/05/12 15:24:47 psoares33 Exp $
|
||||
*
|
||||
Copyright (c) 2000,2001,2002,2003 ymnk, JCraft,Inc. All rights reserved.
|
||||
|
||||
Redistribution and use in source and binary forms, with or without
|
||||
modification, are permitted provided that the following conditions are met:
|
||||
|
||||
1. Redistributions of source code must retain the above copyright notice,
|
||||
this list of conditions and the following disclaimer.
|
||||
|
||||
2. Redistributions in binary form must reproduce the above copyright
|
||||
notice, this list of conditions and the following disclaimer in
|
||||
the documentation and/or other materials provided with the distribution.
|
||||
|
||||
3. The names of the authors may not be used to endorse or promote products
|
||||
derived from this software without specific prior written permission.
|
||||
|
||||
THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESSED OR IMPLIED WARRANTIES,
|
||||
INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND
|
||||
FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL JCRAFT,
|
||||
INC. OR ANY CONTRIBUTORS TO THIS SOFTWARE BE LIABLE FOR ANY DIRECT, INDIRECT,
|
||||
INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
|
||||
LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA,
|
||||
OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF
|
||||
LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
|
||||
NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,
|
||||
EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
||||
*/
|
||||
/*
|
||||
* This program is based on zlib-1.1.3, so all credit should go authors
|
||||
* Jean-loup Gailly(jloup@gzip.org) and Mark Adler(madler@alumni.caltech.edu)
|
||||
* and contributors of zlib.
|
||||
*/
|
||||
|
||||
namespace Org.BouncyCastle.Utilities.Zlib {
|
||||
|
||||
internal sealed class InfCodes{
|
||||
|
||||
private static readonly int[] inflate_mask = {
|
||||
0x00000000, 0x00000001, 0x00000003, 0x00000007, 0x0000000f,
|
||||
0x0000001f, 0x0000003f, 0x0000007f, 0x000000ff, 0x000001ff,
|
||||
0x000003ff, 0x000007ff, 0x00000fff, 0x00001fff, 0x00003fff,
|
||||
0x00007fff, 0x0000ffff
|
||||
};
|
||||
|
||||
private const int Z_OK=0;
|
||||
private const int Z_STREAM_END=1;
|
||||
private const int Z_NEED_DICT=2;
|
||||
private const int Z_ERRNO=-1;
|
||||
private const int Z_STREAM_ERROR=-2;
|
||||
private const int Z_DATA_ERROR=-3;
|
||||
private const int Z_MEM_ERROR=-4;
|
||||
private const int Z_BUF_ERROR=-5;
|
||||
private const int Z_VERSION_ERROR=-6;
|
||||
|
||||
// waiting for "i:"=input,
|
||||
// "o:"=output,
|
||||
// "x:"=nothing
|
||||
private const int START=0; // x: set up for LEN
|
||||
private const int LEN=1; // i: get length/literal/eob next
|
||||
private const int LENEXT=2; // i: getting length extra (have base)
|
||||
private const int DIST=3; // i: get distance next
|
||||
private const int DISTEXT=4;// i: getting distance extra
|
||||
private const int COPY=5; // o: copying bytes in window, waiting for space
|
||||
private const int LIT=6; // o: got literal, waiting for output space
|
||||
private const int WASH=7; // o: got eob, possibly still output waiting
|
||||
private const int END=8; // x: got eob and all data flushed
|
||||
private const int BADCODE=9;// x: got error
|
||||
|
||||
int mode; // current inflate_codes mode
|
||||
|
||||
// mode dependent information
|
||||
int len;
|
||||
|
||||
int[] tree; // pointer into tree
|
||||
int tree_index=0;
|
||||
int need; // bits needed
|
||||
|
||||
int lit;
|
||||
|
||||
// if EXT or COPY, where and how much
|
||||
int get; // bits to get for extra
|
||||
int dist; // distance back to copy from
|
||||
|
||||
byte lbits; // ltree bits decoded per branch
|
||||
byte dbits; // dtree bits decoder per branch
|
||||
int[] ltree; // literal/length/eob tree
|
||||
int ltree_index; // literal/length/eob tree
|
||||
int[] dtree; // distance tree
|
||||
int dtree_index; // distance tree
|
||||
|
||||
internal InfCodes(){
|
||||
}
|
||||
internal void init(int bl, int bd,
|
||||
int[] tl, int tl_index,
|
||||
int[] td, int td_index, ZStream z){
|
||||
mode=START;
|
||||
lbits=(byte)bl;
|
||||
dbits=(byte)bd;
|
||||
ltree=tl;
|
||||
ltree_index=tl_index;
|
||||
dtree = td;
|
||||
dtree_index=td_index;
|
||||
tree=null;
|
||||
}
|
||||
|
||||
internal int proc(InfBlocks s, ZStream z, int r){
|
||||
int j; // temporary storage
|
||||
int tindex; // temporary pointer
|
||||
int e; // extra bits or operation
|
||||
int b=0; // bit buffer
|
||||
int k=0; // bits in bit buffer
|
||||
int p=0; // input data pointer
|
||||
int n; // bytes available there
|
||||
int q; // output window write pointer
|
||||
int m; // bytes to end of window or read pointer
|
||||
int f; // pointer to copy strings from
|
||||
|
||||
// copy input/output information to locals (UPDATE macro restores)
|
||||
p=z.next_in_index;n=z.avail_in;b=s.bitb;k=s.bitk;
|
||||
q=s.write;m=q<s.read?s.read-q-1:s.end-q;
|
||||
|
||||
// process input and output based on current state
|
||||
while (true){
|
||||
switch (mode){
|
||||
// waiting for "i:"=input, "o:"=output, "x:"=nothing
|
||||
case START: // x: set up for LEN
|
||||
if (m >= 258 && n >= 10){
|
||||
|
||||
s.bitb=b;s.bitk=k;
|
||||
z.avail_in=n;z.total_in+=p-z.next_in_index;z.next_in_index=p;
|
||||
s.write=q;
|
||||
r = inflate_fast(lbits, dbits,
|
||||
ltree, ltree_index,
|
||||
dtree, dtree_index,
|
||||
s, z);
|
||||
|
||||
p=z.next_in_index;n=z.avail_in;b=s.bitb;k=s.bitk;
|
||||
q=s.write;m=q<s.read?s.read-q-1:s.end-q;
|
||||
|
||||
if (r != Z_OK){
|
||||
mode = r == Z_STREAM_END ? WASH : BADCODE;
|
||||
break;
|
||||
}
|
||||
}
|
||||
need = lbits;
|
||||
tree = ltree;
|
||||
tree_index=ltree_index;
|
||||
|
||||
mode = LEN;
|
||||
goto case LEN;
|
||||
case LEN: // i: get length/literal/eob next
|
||||
j = need;
|
||||
|
||||
while(k<(j)){
|
||||
if(n!=0)r=Z_OK;
|
||||
else{
|
||||
|
||||
s.bitb=b;s.bitk=k;
|
||||
z.avail_in=n;z.total_in+=p-z.next_in_index;z.next_in_index=p;
|
||||
s.write=q;
|
||||
return s.inflate_flush(z,r);
|
||||
}
|
||||
n--;
|
||||
b|=(z.next_in[p++]&0xff)<<k;
|
||||
k+=8;
|
||||
}
|
||||
|
||||
tindex=(tree_index+(b&inflate_mask[j]))*3;
|
||||
|
||||
b>>=(tree[tindex+1]);
|
||||
k-=(tree[tindex+1]);
|
||||
|
||||
e=tree[tindex];
|
||||
|
||||
if(e == 0){ // literal
|
||||
lit = tree[tindex+2];
|
||||
mode = LIT;
|
||||
break;
|
||||
}
|
||||
if((e & 16)!=0 ){ // length
|
||||
get = e & 15;
|
||||
len = tree[tindex+2];
|
||||
mode = LENEXT;
|
||||
break;
|
||||
}
|
||||
if ((e & 64) == 0){ // next table
|
||||
need = e;
|
||||
tree_index = tindex/3+tree[tindex+2];
|
||||
break;
|
||||
}
|
||||
if ((e & 32)!=0){ // end of block
|
||||
mode = WASH;
|
||||
break;
|
||||
}
|
||||
mode = BADCODE; // invalid code
|
||||
z.msg = "invalid literal/length code";
|
||||
r = Z_DATA_ERROR;
|
||||
|
||||
s.bitb=b;s.bitk=k;
|
||||
z.avail_in=n;z.total_in+=p-z.next_in_index;z.next_in_index=p;
|
||||
s.write=q;
|
||||
return s.inflate_flush(z,r);
|
||||
|
||||
case LENEXT: // i: getting length extra (have base)
|
||||
j = get;
|
||||
|
||||
while(k<(j)){
|
||||
if(n!=0)r=Z_OK;
|
||||
else{
|
||||
|
||||
s.bitb=b;s.bitk=k;
|
||||
z.avail_in=n;z.total_in+=p-z.next_in_index;z.next_in_index=p;
|
||||
s.write=q;
|
||||
return s.inflate_flush(z,r);
|
||||
}
|
||||
n--; b|=(z.next_in[p++]&0xff)<<k;
|
||||
k+=8;
|
||||
}
|
||||
|
||||
len += (b & inflate_mask[j]);
|
||||
|
||||
b>>=j;
|
||||
k-=j;
|
||||
|
||||
need = dbits;
|
||||
tree = dtree;
|
||||
tree_index=dtree_index;
|
||||
mode = DIST;
|
||||
goto case DIST;
|
||||
case DIST: // i: get distance next
|
||||
j = need;
|
||||
|
||||
while(k<(j)){
|
||||
if(n!=0)r=Z_OK;
|
||||
else{
|
||||
|
||||
s.bitb=b;s.bitk=k;
|
||||
z.avail_in=n;z.total_in+=p-z.next_in_index;z.next_in_index=p;
|
||||
s.write=q;
|
||||
return s.inflate_flush(z,r);
|
||||
}
|
||||
n--; b|=(z.next_in[p++]&0xff)<<k;
|
||||
k+=8;
|
||||
}
|
||||
|
||||
tindex=(tree_index+(b & inflate_mask[j]))*3;
|
||||
|
||||
b>>=tree[tindex+1];
|
||||
k-=tree[tindex+1];
|
||||
|
||||
e = (tree[tindex]);
|
||||
if((e & 16)!=0){ // distance
|
||||
get = e & 15;
|
||||
dist = tree[tindex+2];
|
||||
mode = DISTEXT;
|
||||
break;
|
||||
}
|
||||
if ((e & 64) == 0){ // next table
|
||||
need = e;
|
||||
tree_index = tindex/3 + tree[tindex+2];
|
||||
break;
|
||||
}
|
||||
mode = BADCODE; // invalid code
|
||||
z.msg = "invalid distance code";
|
||||
r = Z_DATA_ERROR;
|
||||
|
||||
s.bitb=b;s.bitk=k;
|
||||
z.avail_in=n;z.total_in+=p-z.next_in_index;z.next_in_index=p;
|
||||
s.write=q;
|
||||
return s.inflate_flush(z,r);
|
||||
|
||||
case DISTEXT: // i: getting distance extra
|
||||
j = get;
|
||||
|
||||
while(k<(j)){
|
||||
if(n!=0)r=Z_OK;
|
||||
else{
|
||||
|
||||
s.bitb=b;s.bitk=k;
|
||||
z.avail_in=n;z.total_in+=p-z.next_in_index;z.next_in_index=p;
|
||||
s.write=q;
|
||||
return s.inflate_flush(z,r);
|
||||
}
|
||||
n--; b|=(z.next_in[p++]&0xff)<<k;
|
||||
k+=8;
|
||||
}
|
||||
|
||||
dist += (b & inflate_mask[j]);
|
||||
|
||||
b>>=j;
|
||||
k-=j;
|
||||
|
||||
mode = COPY;
|
||||
goto case COPY;
|
||||
case COPY: // o: copying bytes in window, waiting for space
|
||||
f = q - dist;
|
||||
while(f < 0){ // modulo window size-"while" instead
|
||||
f += s.end; // of "if" handles invalid distances
|
||||
}
|
||||
while (len!=0){
|
||||
|
||||
if(m==0){
|
||||
if(q==s.end&&s.read!=0){q=0;m=q<s.read?s.read-q-1:s.end-q;}
|
||||
if(m==0){
|
||||
s.write=q; r=s.inflate_flush(z,r);
|
||||
q=s.write;m=q<s.read?s.read-q-1:s.end-q;
|
||||
|
||||
if(q==s.end&&s.read!=0){q=0;m=q<s.read?s.read-q-1:s.end-q;}
|
||||
|
||||
if(m==0){
|
||||
s.bitb=b;s.bitk=k;
|
||||
z.avail_in=n;z.total_in+=p-z.next_in_index;z.next_in_index=p;
|
||||
s.write=q;
|
||||
return s.inflate_flush(z,r);
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
s.window[q++]=s.window[f++]; m--;
|
||||
|
||||
if (f == s.end)
|
||||
f = 0;
|
||||
len--;
|
||||
}
|
||||
mode = START;
|
||||
break;
|
||||
case LIT: // o: got literal, waiting for output space
|
||||
if(m==0){
|
||||
if(q==s.end&&s.read!=0){q=0;m=q<s.read?s.read-q-1:s.end-q;}
|
||||
if(m==0){
|
||||
s.write=q; r=s.inflate_flush(z,r);
|
||||
q=s.write;m=q<s.read?s.read-q-1:s.end-q;
|
||||
|
||||
if(q==s.end&&s.read!=0){q=0;m=q<s.read?s.read-q-1:s.end-q;}
|
||||
if(m==0){
|
||||
s.bitb=b;s.bitk=k;
|
||||
z.avail_in=n;z.total_in+=p-z.next_in_index;z.next_in_index=p;
|
||||
s.write=q;
|
||||
return s.inflate_flush(z,r);
|
||||
}
|
||||
}
|
||||
}
|
||||
r=Z_OK;
|
||||
|
||||
s.window[q++]=(byte)lit; m--;
|
||||
|
||||
mode = START;
|
||||
break;
|
||||
case WASH: // o: got eob, possibly more output
|
||||
if (k > 7){ // return unused byte, if any
|
||||
k -= 8;
|
||||
n++;
|
||||
p--; // can always return one
|
||||
}
|
||||
|
||||
s.write=q; r=s.inflate_flush(z,r);
|
||||
q=s.write;m=q<s.read?s.read-q-1:s.end-q;
|
||||
|
||||
if (s.read != s.write){
|
||||
s.bitb=b;s.bitk=k;
|
||||
z.avail_in=n;z.total_in+=p-z.next_in_index;z.next_in_index=p;
|
||||
s.write=q;
|
||||
return s.inflate_flush(z,r);
|
||||
}
|
||||
mode = END;
|
||||
goto case END;
|
||||
case END:
|
||||
r = Z_STREAM_END;
|
||||
s.bitb=b;s.bitk=k;
|
||||
z.avail_in=n;z.total_in+=p-z.next_in_index;z.next_in_index=p;
|
||||
s.write=q;
|
||||
return s.inflate_flush(z,r);
|
||||
|
||||
case BADCODE: // x: got error
|
||||
|
||||
r = Z_DATA_ERROR;
|
||||
|
||||
s.bitb=b;s.bitk=k;
|
||||
z.avail_in=n;z.total_in+=p-z.next_in_index;z.next_in_index=p;
|
||||
s.write=q;
|
||||
return s.inflate_flush(z,r);
|
||||
|
||||
default:
|
||||
r = Z_STREAM_ERROR;
|
||||
|
||||
s.bitb=b;s.bitk=k;
|
||||
z.avail_in=n;z.total_in+=p-z.next_in_index;z.next_in_index=p;
|
||||
s.write=q;
|
||||
return s.inflate_flush(z,r);
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
internal void free(ZStream z){
|
||||
// ZFREE(z, c);
|
||||
}
|
||||
|
||||
// Called with number of bytes left to write in window at least 258
|
||||
// (the maximum string length) and number of input bytes available
|
||||
// at least ten. The ten bytes are six bytes for the longest length/
|
||||
// distance pair plus four bytes for overloading the bit buffer.
|
||||
|
||||
internal int inflate_fast(int bl, int bd,
|
||||
int[] tl, int tl_index,
|
||||
int[] td, int td_index,
|
||||
InfBlocks s, ZStream z){
|
||||
int t; // temporary pointer
|
||||
int[] tp; // temporary pointer
|
||||
int tp_index; // temporary pointer
|
||||
int e; // extra bits or operation
|
||||
int b; // bit buffer
|
||||
int k; // bits in bit buffer
|
||||
int p; // input data pointer
|
||||
int n; // bytes available there
|
||||
int q; // output window write pointer
|
||||
int m; // bytes to end of window or read pointer
|
||||
int ml; // mask for literal/length tree
|
||||
int md; // mask for distance tree
|
||||
int c; // bytes to copy
|
||||
int d; // distance back to copy from
|
||||
int r; // copy source pointer
|
||||
|
||||
int tp_index_t_3; // (tp_index+t)*3
|
||||
|
||||
// load input, output, bit values
|
||||
p=z.next_in_index;n=z.avail_in;b=s.bitb;k=s.bitk;
|
||||
q=s.write;m=q<s.read?s.read-q-1:s.end-q;
|
||||
|
||||
// initialize masks
|
||||
ml = inflate_mask[bl];
|
||||
md = inflate_mask[bd];
|
||||
|
||||
// do until not enough input or output space for fast loop
|
||||
do { // assume called with m >= 258 && n >= 10
|
||||
// get literal/length code
|
||||
while(k<(20)){ // max bits for literal/length code
|
||||
n--;
|
||||
b|=(z.next_in[p++]&0xff)<<k;k+=8;
|
||||
}
|
||||
|
||||
t= b&ml;
|
||||
tp=tl;
|
||||
tp_index=tl_index;
|
||||
tp_index_t_3=(tp_index+t)*3;
|
||||
if ((e = tp[tp_index_t_3]) == 0){
|
||||
b>>=(tp[tp_index_t_3+1]); k-=(tp[tp_index_t_3+1]);
|
||||
|
||||
s.window[q++] = (byte)tp[tp_index_t_3+2];
|
||||
m--;
|
||||
continue;
|
||||
}
|
||||
do {
|
||||
|
||||
b>>=(tp[tp_index_t_3+1]); k-=(tp[tp_index_t_3+1]);
|
||||
|
||||
if((e&16)!=0){
|
||||
e &= 15;
|
||||
c = tp[tp_index_t_3+2] + ((int)b & inflate_mask[e]);
|
||||
|
||||
b>>=e; k-=e;
|
||||
|
||||
// decode distance base of block to copy
|
||||
while(k<(15)){ // max bits for distance code
|
||||
n--;
|
||||
b|=(z.next_in[p++]&0xff)<<k;k+=8;
|
||||
}
|
||||
|
||||
t= b&md;
|
||||
tp=td;
|
||||
tp_index=td_index;
|
||||
tp_index_t_3=(tp_index+t)*3;
|
||||
e = tp[tp_index_t_3];
|
||||
|
||||
do {
|
||||
|
||||
b>>=(tp[tp_index_t_3+1]); k-=(tp[tp_index_t_3+1]);
|
||||
|
||||
if((e&16)!=0){
|
||||
// get extra bits to add to distance base
|
||||
e &= 15;
|
||||
while(k<(e)){ // get extra bits (up to 13)
|
||||
n--;
|
||||
b|=(z.next_in[p++]&0xff)<<k;k+=8;
|
||||
}
|
||||
|
||||
d = tp[tp_index_t_3+2] + (b&inflate_mask[e]);
|
||||
|
||||
b>>=(e); k-=(e);
|
||||
|
||||
// do the copy
|
||||
m -= c;
|
||||
if (q >= d){ // offset before dest
|
||||
// just copy
|
||||
r=q-d;
|
||||
if(q-r>0 && 2>(q-r)){
|
||||
s.window[q++]=s.window[r++]; // minimum count is three,
|
||||
s.window[q++]=s.window[r++]; // so unroll loop a little
|
||||
c-=2;
|
||||
}
|
||||
else{
|
||||
System.Array.Copy(s.window, r, s.window, q, 2);
|
||||
q+=2; r+=2; c-=2;
|
||||
}
|
||||
}
|
||||
else{ // else offset after destination
|
||||
r=q-d;
|
||||
do{
|
||||
r+=s.end; // force pointer in window
|
||||
}while(r<0); // covers invalid distances
|
||||
e=s.end-r;
|
||||
if(c>e){ // if source crosses,
|
||||
c-=e; // wrapped copy
|
||||
if(q-r>0 && e>(q-r)){
|
||||
do{s.window[q++] = s.window[r++];}
|
||||
while(--e!=0);
|
||||
}
|
||||
else{
|
||||
System.Array.Copy(s.window, r, s.window, q, e);
|
||||
q+=e; r+=e; e=0;
|
||||
}
|
||||
r = 0; // copy rest from start of window
|
||||
}
|
||||
|
||||
}
|
||||
|
||||
// copy all or what's left
|
||||
if(q-r>0 && c>(q-r)){
|
||||
do{s.window[q++] = s.window[r++];}
|
||||
while(--c!=0);
|
||||
}
|
||||
else{
|
||||
System.Array.Copy(s.window, r, s.window, q, c);
|
||||
q+=c; r+=c; c=0;
|
||||
}
|
||||
break;
|
||||
}
|
||||
else if((e&64)==0){
|
||||
t+=tp[tp_index_t_3+2];
|
||||
t+=(b&inflate_mask[e]);
|
||||
tp_index_t_3=(tp_index+t)*3;
|
||||
e=tp[tp_index_t_3];
|
||||
}
|
||||
else{
|
||||
z.msg = "invalid distance code";
|
||||
|
||||
c=z.avail_in-n;c=(k>>3)<c?k>>3:c;n+=c;p-=c;k-=c<<3;
|
||||
|
||||
s.bitb=b;s.bitk=k;
|
||||
z.avail_in=n;z.total_in+=p-z.next_in_index;z.next_in_index=p;
|
||||
s.write=q;
|
||||
|
||||
return Z_DATA_ERROR;
|
||||
}
|
||||
}
|
||||
while(true);
|
||||
break;
|
||||
}
|
||||
|
||||
if((e&64)==0){
|
||||
t+=tp[tp_index_t_3+2];
|
||||
t+=(b&inflate_mask[e]);
|
||||
tp_index_t_3=(tp_index+t)*3;
|
||||
if((e=tp[tp_index_t_3])==0){
|
||||
|
||||
b>>=(tp[tp_index_t_3+1]); k-=(tp[tp_index_t_3+1]);
|
||||
|
||||
s.window[q++]=(byte)tp[tp_index_t_3+2];
|
||||
m--;
|
||||
break;
|
||||
}
|
||||
}
|
||||
else if((e&32)!=0){
|
||||
|
||||
c=z.avail_in-n;c=(k>>3)<c?k>>3:c;n+=c;p-=c;k-=c<<3;
|
||||
|
||||
s.bitb=b;s.bitk=k;
|
||||
z.avail_in=n;z.total_in+=p-z.next_in_index;z.next_in_index=p;
|
||||
s.write=q;
|
||||
|
||||
return Z_STREAM_END;
|
||||
}
|
||||
else{
|
||||
z.msg="invalid literal/length code";
|
||||
|
||||
c=z.avail_in-n;c=(k>>3)<c?k>>3:c;n+=c;p-=c;k-=c<<3;
|
||||
|
||||
s.bitb=b;s.bitk=k;
|
||||
z.avail_in=n;z.total_in+=p-z.next_in_index;z.next_in_index=p;
|
||||
s.write=q;
|
||||
|
||||
return Z_DATA_ERROR;
|
||||
}
|
||||
}
|
||||
while(true);
|
||||
}
|
||||
while(m>=258 && n>= 10);
|
||||
|
||||
// not enough input or output--restore pointers and return
|
||||
c=z.avail_in-n;c=(k>>3)<c?k>>3:c;n+=c;p-=c;k-=c<<3;
|
||||
|
||||
s.bitb=b;s.bitk=k;
|
||||
z.avail_in=n;z.total_in+=p-z.next_in_index;z.next_in_index=p;
|
||||
s.write=q;
|
||||
|
||||
return Z_OK;
|
||||
}
|
||||
}
|
||||
}
|
523
iTechSharp/srcbc/util/zlib/InfTree.cs
Normal file
523
iTechSharp/srcbc/util/zlib/InfTree.cs
Normal file
@@ -0,0 +1,523 @@
|
||||
using System;
|
||||
/*
|
||||
* $Id: InfTree.cs,v 1.2 2008/05/12 15:24:47 psoares33 Exp $
|
||||
*
|
||||
Copyright (c) 2000,2001,2002,2003 ymnk, JCraft,Inc. All rights reserved.
|
||||
|
||||
Redistribution and use in source and binary forms, with or without
|
||||
modification, are permitted provided that the following conditions are met:
|
||||
|
||||
1. Redistributions of source code must retain the above copyright notice,
|
||||
this list of conditions and the following disclaimer.
|
||||
|
||||
2. Redistributions in binary form must reproduce the above copyright
|
||||
notice, this list of conditions and the following disclaimer in
|
||||
the documentation and/or other materials provided with the distribution.
|
||||
|
||||
3. The names of the authors may not be used to endorse or promote products
|
||||
derived from this software without specific prior written permission.
|
||||
|
||||
THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESSED OR IMPLIED WARRANTIES,
|
||||
INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND
|
||||
FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL JCRAFT,
|
||||
INC. OR ANY CONTRIBUTORS TO THIS SOFTWARE BE LIABLE FOR ANY DIRECT, INDIRECT,
|
||||
INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
|
||||
LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA,
|
||||
OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF
|
||||
LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
|
||||
NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,
|
||||
EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
||||
*/
|
||||
/*
|
||||
* This program is based on zlib-1.1.3, so all credit should go authors
|
||||
* Jean-loup Gailly(jloup@gzip.org) and Mark Adler(madler@alumni.caltech.edu)
|
||||
* and contributors of zlib.
|
||||
*/
|
||||
|
||||
namespace Org.BouncyCastle.Utilities.Zlib {
|
||||
|
||||
internal sealed class InfTree{
|
||||
|
||||
private const int MANY=1440;
|
||||
|
||||
private const int Z_OK=0;
|
||||
private const int Z_STREAM_END=1;
|
||||
private const int Z_NEED_DICT=2;
|
||||
private const int Z_ERRNO=-1;
|
||||
private const int Z_STREAM_ERROR=-2;
|
||||
private const int Z_DATA_ERROR=-3;
|
||||
private const int Z_MEM_ERROR=-4;
|
||||
private const int Z_BUF_ERROR=-5;
|
||||
private const int Z_VERSION_ERROR=-6;
|
||||
|
||||
private const int fixed_bl = 9;
|
||||
private const int fixed_bd = 5;
|
||||
|
||||
static readonly int[] fixed_tl = {
|
||||
96,7,256, 0,8,80, 0,8,16, 84,8,115,
|
||||
82,7,31, 0,8,112, 0,8,48, 0,9,192,
|
||||
80,7,10, 0,8,96, 0,8,32, 0,9,160,
|
||||
0,8,0, 0,8,128, 0,8,64, 0,9,224,
|
||||
80,7,6, 0,8,88, 0,8,24, 0,9,144,
|
||||
83,7,59, 0,8,120, 0,8,56, 0,9,208,
|
||||
81,7,17, 0,8,104, 0,8,40, 0,9,176,
|
||||
0,8,8, 0,8,136, 0,8,72, 0,9,240,
|
||||
80,7,4, 0,8,84, 0,8,20, 85,8,227,
|
||||
83,7,43, 0,8,116, 0,8,52, 0,9,200,
|
||||
81,7,13, 0,8,100, 0,8,36, 0,9,168,
|
||||
0,8,4, 0,8,132, 0,8,68, 0,9,232,
|
||||
80,7,8, 0,8,92, 0,8,28, 0,9,152,
|
||||
84,7,83, 0,8,124, 0,8,60, 0,9,216,
|
||||
82,7,23, 0,8,108, 0,8,44, 0,9,184,
|
||||
0,8,12, 0,8,140, 0,8,76, 0,9,248,
|
||||
80,7,3, 0,8,82, 0,8,18, 85,8,163,
|
||||
83,7,35, 0,8,114, 0,8,50, 0,9,196,
|
||||
81,7,11, 0,8,98, 0,8,34, 0,9,164,
|
||||
0,8,2, 0,8,130, 0,8,66, 0,9,228,
|
||||
80,7,7, 0,8,90, 0,8,26, 0,9,148,
|
||||
84,7,67, 0,8,122, 0,8,58, 0,9,212,
|
||||
82,7,19, 0,8,106, 0,8,42, 0,9,180,
|
||||
0,8,10, 0,8,138, 0,8,74, 0,9,244,
|
||||
80,7,5, 0,8,86, 0,8,22, 192,8,0,
|
||||
83,7,51, 0,8,118, 0,8,54, 0,9,204,
|
||||
81,7,15, 0,8,102, 0,8,38, 0,9,172,
|
||||
0,8,6, 0,8,134, 0,8,70, 0,9,236,
|
||||
80,7,9, 0,8,94, 0,8,30, 0,9,156,
|
||||
84,7,99, 0,8,126, 0,8,62, 0,9,220,
|
||||
82,7,27, 0,8,110, 0,8,46, 0,9,188,
|
||||
0,8,14, 0,8,142, 0,8,78, 0,9,252,
|
||||
96,7,256, 0,8,81, 0,8,17, 85,8,131,
|
||||
82,7,31, 0,8,113, 0,8,49, 0,9,194,
|
||||
80,7,10, 0,8,97, 0,8,33, 0,9,162,
|
||||
0,8,1, 0,8,129, 0,8,65, 0,9,226,
|
||||
80,7,6, 0,8,89, 0,8,25, 0,9,146,
|
||||
83,7,59, 0,8,121, 0,8,57, 0,9,210,
|
||||
81,7,17, 0,8,105, 0,8,41, 0,9,178,
|
||||
0,8,9, 0,8,137, 0,8,73, 0,9,242,
|
||||
80,7,4, 0,8,85, 0,8,21, 80,8,258,
|
||||
83,7,43, 0,8,117, 0,8,53, 0,9,202,
|
||||
81,7,13, 0,8,101, 0,8,37, 0,9,170,
|
||||
0,8,5, 0,8,133, 0,8,69, 0,9,234,
|
||||
80,7,8, 0,8,93, 0,8,29, 0,9,154,
|
||||
84,7,83, 0,8,125, 0,8,61, 0,9,218,
|
||||
82,7,23, 0,8,109, 0,8,45, 0,9,186,
|
||||
0,8,13, 0,8,141, 0,8,77, 0,9,250,
|
||||
80,7,3, 0,8,83, 0,8,19, 85,8,195,
|
||||
83,7,35, 0,8,115, 0,8,51, 0,9,198,
|
||||
81,7,11, 0,8,99, 0,8,35, 0,9,166,
|
||||
0,8,3, 0,8,131, 0,8,67, 0,9,230,
|
||||
80,7,7, 0,8,91, 0,8,27, 0,9,150,
|
||||
84,7,67, 0,8,123, 0,8,59, 0,9,214,
|
||||
82,7,19, 0,8,107, 0,8,43, 0,9,182,
|
||||
0,8,11, 0,8,139, 0,8,75, 0,9,246,
|
||||
80,7,5, 0,8,87, 0,8,23, 192,8,0,
|
||||
83,7,51, 0,8,119, 0,8,55, 0,9,206,
|
||||
81,7,15, 0,8,103, 0,8,39, 0,9,174,
|
||||
0,8,7, 0,8,135, 0,8,71, 0,9,238,
|
||||
80,7,9, 0,8,95, 0,8,31, 0,9,158,
|
||||
84,7,99, 0,8,127, 0,8,63, 0,9,222,
|
||||
82,7,27, 0,8,111, 0,8,47, 0,9,190,
|
||||
0,8,15, 0,8,143, 0,8,79, 0,9,254,
|
||||
96,7,256, 0,8,80, 0,8,16, 84,8,115,
|
||||
82,7,31, 0,8,112, 0,8,48, 0,9,193,
|
||||
|
||||
80,7,10, 0,8,96, 0,8,32, 0,9,161,
|
||||
0,8,0, 0,8,128, 0,8,64, 0,9,225,
|
||||
80,7,6, 0,8,88, 0,8,24, 0,9,145,
|
||||
83,7,59, 0,8,120, 0,8,56, 0,9,209,
|
||||
81,7,17, 0,8,104, 0,8,40, 0,9,177,
|
||||
0,8,8, 0,8,136, 0,8,72, 0,9,241,
|
||||
80,7,4, 0,8,84, 0,8,20, 85,8,227,
|
||||
83,7,43, 0,8,116, 0,8,52, 0,9,201,
|
||||
81,7,13, 0,8,100, 0,8,36, 0,9,169,
|
||||
0,8,4, 0,8,132, 0,8,68, 0,9,233,
|
||||
80,7,8, 0,8,92, 0,8,28, 0,9,153,
|
||||
84,7,83, 0,8,124, 0,8,60, 0,9,217,
|
||||
82,7,23, 0,8,108, 0,8,44, 0,9,185,
|
||||
0,8,12, 0,8,140, 0,8,76, 0,9,249,
|
||||
80,7,3, 0,8,82, 0,8,18, 85,8,163,
|
||||
83,7,35, 0,8,114, 0,8,50, 0,9,197,
|
||||
81,7,11, 0,8,98, 0,8,34, 0,9,165,
|
||||
0,8,2, 0,8,130, 0,8,66, 0,9,229,
|
||||
80,7,7, 0,8,90, 0,8,26, 0,9,149,
|
||||
84,7,67, 0,8,122, 0,8,58, 0,9,213,
|
||||
82,7,19, 0,8,106, 0,8,42, 0,9,181,
|
||||
0,8,10, 0,8,138, 0,8,74, 0,9,245,
|
||||
80,7,5, 0,8,86, 0,8,22, 192,8,0,
|
||||
83,7,51, 0,8,118, 0,8,54, 0,9,205,
|
||||
81,7,15, 0,8,102, 0,8,38, 0,9,173,
|
||||
0,8,6, 0,8,134, 0,8,70, 0,9,237,
|
||||
80,7,9, 0,8,94, 0,8,30, 0,9,157,
|
||||
84,7,99, 0,8,126, 0,8,62, 0,9,221,
|
||||
82,7,27, 0,8,110, 0,8,46, 0,9,189,
|
||||
0,8,14, 0,8,142, 0,8,78, 0,9,253,
|
||||
96,7,256, 0,8,81, 0,8,17, 85,8,131,
|
||||
82,7,31, 0,8,113, 0,8,49, 0,9,195,
|
||||
80,7,10, 0,8,97, 0,8,33, 0,9,163,
|
||||
0,8,1, 0,8,129, 0,8,65, 0,9,227,
|
||||
80,7,6, 0,8,89, 0,8,25, 0,9,147,
|
||||
83,7,59, 0,8,121, 0,8,57, 0,9,211,
|
||||
81,7,17, 0,8,105, 0,8,41, 0,9,179,
|
||||
0,8,9, 0,8,137, 0,8,73, 0,9,243,
|
||||
80,7,4, 0,8,85, 0,8,21, 80,8,258,
|
||||
83,7,43, 0,8,117, 0,8,53, 0,9,203,
|
||||
81,7,13, 0,8,101, 0,8,37, 0,9,171,
|
||||
0,8,5, 0,8,133, 0,8,69, 0,9,235,
|
||||
80,7,8, 0,8,93, 0,8,29, 0,9,155,
|
||||
84,7,83, 0,8,125, 0,8,61, 0,9,219,
|
||||
82,7,23, 0,8,109, 0,8,45, 0,9,187,
|
||||
0,8,13, 0,8,141, 0,8,77, 0,9,251,
|
||||
80,7,3, 0,8,83, 0,8,19, 85,8,195,
|
||||
83,7,35, 0,8,115, 0,8,51, 0,9,199,
|
||||
81,7,11, 0,8,99, 0,8,35, 0,9,167,
|
||||
0,8,3, 0,8,131, 0,8,67, 0,9,231,
|
||||
80,7,7, 0,8,91, 0,8,27, 0,9,151,
|
||||
84,7,67, 0,8,123, 0,8,59, 0,9,215,
|
||||
82,7,19, 0,8,107, 0,8,43, 0,9,183,
|
||||
0,8,11, 0,8,139, 0,8,75, 0,9,247,
|
||||
80,7,5, 0,8,87, 0,8,23, 192,8,0,
|
||||
83,7,51, 0,8,119, 0,8,55, 0,9,207,
|
||||
81,7,15, 0,8,103, 0,8,39, 0,9,175,
|
||||
0,8,7, 0,8,135, 0,8,71, 0,9,239,
|
||||
80,7,9, 0,8,95, 0,8,31, 0,9,159,
|
||||
84,7,99, 0,8,127, 0,8,63, 0,9,223,
|
||||
82,7,27, 0,8,111, 0,8,47, 0,9,191,
|
||||
0,8,15, 0,8,143, 0,8,79, 0,9,255
|
||||
};
|
||||
static readonly int[] fixed_td = {
|
||||
80,5,1, 87,5,257, 83,5,17, 91,5,4097,
|
||||
81,5,5, 89,5,1025, 85,5,65, 93,5,16385,
|
||||
80,5,3, 88,5,513, 84,5,33, 92,5,8193,
|
||||
82,5,9, 90,5,2049, 86,5,129, 192,5,24577,
|
||||
80,5,2, 87,5,385, 83,5,25, 91,5,6145,
|
||||
81,5,7, 89,5,1537, 85,5,97, 93,5,24577,
|
||||
80,5,4, 88,5,769, 84,5,49, 92,5,12289,
|
||||
82,5,13, 90,5,3073, 86,5,193, 192,5,24577
|
||||
};
|
||||
|
||||
// Tables for deflate from PKZIP's appnote.txt.
|
||||
static readonly int[] cplens = { // Copy lengths for literal codes 257..285
|
||||
3, 4, 5, 6, 7, 8, 9, 10, 11, 13, 15, 17, 19, 23, 27, 31,
|
||||
35, 43, 51, 59, 67, 83, 99, 115, 131, 163, 195, 227, 258, 0, 0
|
||||
};
|
||||
|
||||
// see note #13 above about 258
|
||||
static readonly int[] cplext = { // Extra bits for literal codes 257..285
|
||||
0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 2, 2, 2, 2,
|
||||
3, 3, 3, 3, 4, 4, 4, 4, 5, 5, 5, 5, 0, 112, 112 // 112==invalid
|
||||
};
|
||||
|
||||
static readonly int[] cpdist = { // Copy offsets for distance codes 0..29
|
||||
1, 2, 3, 4, 5, 7, 9, 13, 17, 25, 33, 49, 65, 97, 129, 193,
|
||||
257, 385, 513, 769, 1025, 1537, 2049, 3073, 4097, 6145,
|
||||
8193, 12289, 16385, 24577
|
||||
};
|
||||
|
||||
static readonly int[] cpdext = { // Extra bits for distance codes
|
||||
0, 0, 0, 0, 1, 1, 2, 2, 3, 3, 4, 4, 5, 5, 6, 6,
|
||||
7, 7, 8, 8, 9, 9, 10, 10, 11, 11,
|
||||
12, 12, 13, 13};
|
||||
|
||||
// If BMAX needs to be larger than 16, then h and x[] should be uLong.
|
||||
const int BMAX=15; // maximum bit length of any code
|
||||
|
||||
int[] hn = null; // hufts used in space
|
||||
int[] v = null; // work area for huft_build
|
||||
int[] c = null; // bit length count table
|
||||
int[] r = null; // table entry for structure assignment
|
||||
int[] u = null; // table stack
|
||||
int[] x = null; // bit offsets, then code stack
|
||||
|
||||
private int huft_build(int[] b, // code lengths in bits (all assumed <= BMAX)
|
||||
int bindex,
|
||||
int n, // number of codes (assumed <= 288)
|
||||
int s, // number of simple-valued codes (0..s-1)
|
||||
int[] d, // list of base values for non-simple codes
|
||||
int[] e, // list of extra bits for non-simple codes
|
||||
int[] t, // result: starting table
|
||||
int[] m, // maximum lookup bits, returns actual
|
||||
int[] hp,// space for trees
|
||||
int[] hn,// hufts used in space
|
||||
int[] v // working area: values in order of bit length
|
||||
){
|
||||
// Given a list of code lengths and a maximum table size, make a set of
|
||||
// tables to decode that set of codes. Return Z_OK on success, Z_BUF_ERROR
|
||||
// if the given code set is incomplete (the tables are still built in this
|
||||
// case), Z_DATA_ERROR if the input is invalid (an over-subscribed set of
|
||||
// lengths), or Z_MEM_ERROR if not enough memory.
|
||||
|
||||
int a; // counter for codes of length k
|
||||
int f; // i repeats in table every f entries
|
||||
int g; // maximum code length
|
||||
int h; // table level
|
||||
int i; // counter, current code
|
||||
int j; // counter
|
||||
int k; // number of bits in current code
|
||||
int l; // bits per table (returned in m)
|
||||
int mask; // (1 << w) - 1, to avoid cc -O bug on HP
|
||||
int p; // pointer into c[], b[], or v[]
|
||||
int q; // points to current table
|
||||
int w; // bits before this table == (l * h)
|
||||
int xp; // pointer into x
|
||||
int y; // number of dummy codes added
|
||||
int z; // number of entries in current table
|
||||
|
||||
// Generate counts for each bit length
|
||||
|
||||
p = 0; i = n;
|
||||
do {
|
||||
c[b[bindex+p]]++; p++; i--; // assume all entries <= BMAX
|
||||
}while(i!=0);
|
||||
|
||||
if(c[0] == n){ // null input--all zero length codes
|
||||
t[0] = -1;
|
||||
m[0] = 0;
|
||||
return Z_OK;
|
||||
}
|
||||
|
||||
// Find minimum and maximum length, bound *m by those
|
||||
l = m[0];
|
||||
for (j = 1; j <= BMAX; j++)
|
||||
if(c[j]!=0) break;
|
||||
k = j; // minimum code length
|
||||
if(l < j){
|
||||
l = j;
|
||||
}
|
||||
for (i = BMAX; i!=0; i--){
|
||||
if(c[i]!=0) break;
|
||||
}
|
||||
g = i; // maximum code length
|
||||
if(l > i){
|
||||
l = i;
|
||||
}
|
||||
m[0] = l;
|
||||
|
||||
// Adjust last length count to fill out codes, if needed
|
||||
for (y = 1 << j; j < i; j++, y <<= 1){
|
||||
if ((y -= c[j]) < 0){
|
||||
return Z_DATA_ERROR;
|
||||
}
|
||||
}
|
||||
if ((y -= c[i]) < 0){
|
||||
return Z_DATA_ERROR;
|
||||
}
|
||||
c[i] += y;
|
||||
|
||||
// Generate starting offsets into the value table for each length
|
||||
x[1] = j = 0;
|
||||
p = 1; xp = 2;
|
||||
while (--i!=0) { // note that i == g from above
|
||||
x[xp] = (j += c[p]);
|
||||
xp++;
|
||||
p++;
|
||||
}
|
||||
|
||||
// Make a table of values in order of bit lengths
|
||||
i = 0; p = 0;
|
||||
do {
|
||||
if ((j = b[bindex+p]) != 0){
|
||||
v[x[j]++] = i;
|
||||
}
|
||||
p++;
|
||||
}
|
||||
while (++i < n);
|
||||
n = x[g]; // set n to length of v
|
||||
|
||||
// Generate the Huffman codes and for each, make the table entries
|
||||
x[0] = i = 0; // first Huffman code is zero
|
||||
p = 0; // grab values in bit order
|
||||
h = -1; // no tables yet--level -1
|
||||
w = -l; // bits decoded == (l * h)
|
||||
u[0] = 0; // just to keep compilers happy
|
||||
q = 0; // ditto
|
||||
z = 0; // ditto
|
||||
|
||||
// go through the bit lengths (k already is bits in shortest code)
|
||||
for (; k <= g; k++){
|
||||
a = c[k];
|
||||
while (a--!=0){
|
||||
// here i is the Huffman code of length k bits for value *p
|
||||
// make tables up to required level
|
||||
while (k > w + l){
|
||||
h++;
|
||||
w += l; // previous table always l bits
|
||||
// compute minimum size table less than or equal to l bits
|
||||
z = g - w;
|
||||
z = (z > l) ? l : z; // table size upper limit
|
||||
if((f=1<<(j=k-w))>a+1){ // try a k-w bit table
|
||||
// too few codes for k-w bit table
|
||||
f -= a + 1; // deduct codes from patterns left
|
||||
xp = k;
|
||||
if(j < z){
|
||||
while (++j < z){ // try smaller tables up to z bits
|
||||
if((f <<= 1) <= c[++xp])
|
||||
break; // enough codes to use up j bits
|
||||
f -= c[xp]; // else deduct codes from patterns
|
||||
}
|
||||
}
|
||||
}
|
||||
z = 1 << j; // table entries for j-bit table
|
||||
|
||||
// allocate new table
|
||||
if (hn[0] + z > MANY){ // (note: doesn't matter for fixed)
|
||||
return Z_DATA_ERROR; // overflow of MANY
|
||||
}
|
||||
u[h] = q = /*hp+*/ hn[0]; // DEBUG
|
||||
hn[0] += z;
|
||||
|
||||
// connect to last table, if there is one
|
||||
if(h!=0){
|
||||
x[h]=i; // save pattern for backing up
|
||||
r[0]=(byte)j; // bits in this table
|
||||
r[1]=(byte)l; // bits to dump before this table
|
||||
j=i>>(w - l);
|
||||
r[2] = (int)(q - u[h-1] - j); // offset to this table
|
||||
System.Array.Copy(r, 0, hp, (u[h-1]+j)*3, 3); // connect to last table
|
||||
}
|
||||
else{
|
||||
t[0] = q; // first table is returned result
|
||||
}
|
||||
}
|
||||
|
||||
// set up table entry in r
|
||||
r[1] = (byte)(k - w);
|
||||
if (p >= n){
|
||||
r[0] = 128 + 64; // out of values--invalid code
|
||||
}
|
||||
else if (v[p] < s){
|
||||
r[0] = (byte)(v[p] < 256 ? 0 : 32 + 64); // 256 is end-of-block
|
||||
r[2] = v[p++]; // simple code is just the value
|
||||
}
|
||||
else{
|
||||
r[0]=(byte)(e[v[p]-s]+16+64); // non-simple--look up in lists
|
||||
r[2]=d[v[p++] - s];
|
||||
}
|
||||
|
||||
// fill code-like entries with r
|
||||
f=1<<(k-w);
|
||||
for (j=i>>w;j<z;j+=f){
|
||||
System.Array.Copy(r, 0, hp, (q+j)*3, 3);
|
||||
}
|
||||
|
||||
// backwards increment the k-bit code i
|
||||
for (j = 1 << (k - 1); (i & j)!=0; j >>= 1){
|
||||
i ^= j;
|
||||
}
|
||||
i ^= j;
|
||||
|
||||
// backup over finished tables
|
||||
mask = (1 << w) - 1; // needed on HP, cc -O bug
|
||||
while ((i & mask) != x[h]){
|
||||
h--; // don't need to update q
|
||||
w -= l;
|
||||
mask = (1 << w) - 1;
|
||||
}
|
||||
}
|
||||
}
|
||||
// Return Z_BUF_ERROR if we were given an incomplete table
|
||||
return y != 0 && g != 1 ? Z_BUF_ERROR : Z_OK;
|
||||
}
|
||||
|
||||
internal int inflate_trees_bits(int[] c, // 19 code lengths
|
||||
int[] bb, // bits tree desired/actual depth
|
||||
int[] tb, // bits tree result
|
||||
int[] hp, // space for trees
|
||||
ZStream z // for messages
|
||||
){
|
||||
int result;
|
||||
initWorkArea(19);
|
||||
hn[0]=0;
|
||||
result = huft_build(c, 0, 19, 19, null, null, tb, bb, hp, hn, v);
|
||||
|
||||
if(result == Z_DATA_ERROR){
|
||||
z.msg = "oversubscribed dynamic bit lengths tree";
|
||||
}
|
||||
else if(result == Z_BUF_ERROR || bb[0] == 0){
|
||||
z.msg = "incomplete dynamic bit lengths tree";
|
||||
result = Z_DATA_ERROR;
|
||||
}
|
||||
return result;
|
||||
}
|
||||
|
||||
internal int inflate_trees_dynamic(int nl, // number of literal/length codes
|
||||
int nd, // number of distance codes
|
||||
int[] c, // that many (total) code lengths
|
||||
int[] bl, // literal desired/actual bit depth
|
||||
int[] bd, // distance desired/actual bit depth
|
||||
int[] tl, // literal/length tree result
|
||||
int[] td, // distance tree result
|
||||
int[] hp, // space for trees
|
||||
ZStream z // for messages
|
||||
){
|
||||
int result;
|
||||
|
||||
// build literal/length tree
|
||||
initWorkArea(288);
|
||||
hn[0]=0;
|
||||
result = huft_build(c, 0, nl, 257, cplens, cplext, tl, bl, hp, hn, v);
|
||||
if (result != Z_OK || bl[0] == 0){
|
||||
if(result == Z_DATA_ERROR){
|
||||
z.msg = "oversubscribed literal/length tree";
|
||||
}
|
||||
else if (result != Z_MEM_ERROR){
|
||||
z.msg = "incomplete literal/length tree";
|
||||
result = Z_DATA_ERROR;
|
||||
}
|
||||
return result;
|
||||
}
|
||||
|
||||
// build distance tree
|
||||
initWorkArea(288);
|
||||
result = huft_build(c, nl, nd, 0, cpdist, cpdext, td, bd, hp, hn, v);
|
||||
|
||||
if (result != Z_OK || (bd[0] == 0 && nl > 257)){
|
||||
if (result == Z_DATA_ERROR){
|
||||
z.msg = "oversubscribed distance tree";
|
||||
}
|
||||
else if (result == Z_BUF_ERROR) {
|
||||
z.msg = "incomplete distance tree";
|
||||
result = Z_DATA_ERROR;
|
||||
}
|
||||
else if (result != Z_MEM_ERROR){
|
||||
z.msg = "empty distance tree with lengths";
|
||||
result = Z_DATA_ERROR;
|
||||
}
|
||||
return result;
|
||||
}
|
||||
|
||||
return Z_OK;
|
||||
}
|
||||
|
||||
internal static int inflate_trees_fixed(int[] bl, //literal desired/actual bit depth
|
||||
int[] bd, //distance desired/actual bit depth
|
||||
int[][] tl,//literal/length tree result
|
||||
int[][] td,//distance tree result
|
||||
ZStream z //for memory allocation
|
||||
){
|
||||
bl[0]=fixed_bl;
|
||||
bd[0]=fixed_bd;
|
||||
tl[0]=fixed_tl;
|
||||
td[0]=fixed_td;
|
||||
return Z_OK;
|
||||
}
|
||||
|
||||
private void initWorkArea(int vsize){
|
||||
if(hn==null){
|
||||
hn=new int[1];
|
||||
v=new int[vsize];
|
||||
c=new int[BMAX+1];
|
||||
r=new int[3];
|
||||
u=new int[BMAX];
|
||||
x=new int[BMAX+1];
|
||||
}
|
||||
if(v.Length<vsize){ v=new int[vsize]; }
|
||||
for(int i=0; i<vsize; i++){v[i]=0;}
|
||||
for(int i=0; i<BMAX+1; i++){c[i]=0;}
|
||||
for(int i=0; i<3; i++){r[i]=0;}
|
||||
// for(int i=0; i<BMAX; i++){u[i]=0;}
|
||||
System.Array.Copy(c, 0, u, 0, BMAX);
|
||||
// for(int i=0; i<BMAX+1; i++){x[i]=0;}
|
||||
System.Array.Copy(c, 0, x, 0, BMAX+1);
|
||||
}
|
||||
}
|
||||
}
|
387
iTechSharp/srcbc/util/zlib/Inflate.cs
Normal file
387
iTechSharp/srcbc/util/zlib/Inflate.cs
Normal file
@@ -0,0 +1,387 @@
|
||||
using System;
|
||||
/*
|
||||
* $Id: Inflate.cs,v 1.2 2008/05/12 15:24:47 psoares33 Exp $
|
||||
*
|
||||
Copyright (c) 2000,2001,2002,2003 ymnk, JCraft,Inc. All rights reserved.
|
||||
|
||||
Redistribution and use in source and binary forms, with or without
|
||||
modification, are permitted provided that the following conditions are met:
|
||||
|
||||
1. Redistributions of source code must retain the above copyright notice,
|
||||
this list of conditions and the following disclaimer.
|
||||
|
||||
2. Redistributions in binary form must reproduce the above copyright
|
||||
notice, this list of conditions and the following disclaimer in
|
||||
the documentation and/or other materials provided with the distribution.
|
||||
|
||||
3. The names of the authors may not be used to endorse or promote products
|
||||
derived from this software without specific prior written permission.
|
||||
|
||||
THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESSED OR IMPLIED WARRANTIES,
|
||||
INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND
|
||||
FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL JCRAFT,
|
||||
INC. OR ANY CONTRIBUTORS TO THIS SOFTWARE BE LIABLE FOR ANY DIRECT, INDIRECT,
|
||||
INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
|
||||
LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA,
|
||||
OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF
|
||||
LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
|
||||
NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,
|
||||
EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
||||
*/
|
||||
/*
|
||||
* This program is based on zlib-1.1.3, so all credit should go authors
|
||||
* Jean-loup Gailly(jloup@gzip.org) and Mark Adler(madler@alumni.caltech.edu)
|
||||
* and contributors of zlib.
|
||||
*/
|
||||
|
||||
namespace Org.BouncyCastle.Utilities.Zlib {
|
||||
|
||||
internal sealed class Inflate{
|
||||
|
||||
private const int MAX_WBITS=15; // 32K LZ77 window
|
||||
|
||||
// preset dictionary flag in zlib header
|
||||
private const int PRESET_DICT=0x20;
|
||||
|
||||
internal const int Z_NO_FLUSH=0;
|
||||
internal const int Z_PARTIAL_FLUSH=1;
|
||||
internal const int Z_SYNC_FLUSH=2;
|
||||
internal const int Z_FULL_FLUSH=3;
|
||||
internal const int Z_FINISH=4;
|
||||
|
||||
private const int Z_DEFLATED=8;
|
||||
|
||||
private const int Z_OK=0;
|
||||
private const int Z_STREAM_END=1;
|
||||
private const int Z_NEED_DICT=2;
|
||||
private const int Z_ERRNO=-1;
|
||||
private const int Z_STREAM_ERROR=-2;
|
||||
private const int Z_DATA_ERROR=-3;
|
||||
private const int Z_MEM_ERROR=-4;
|
||||
private const int Z_BUF_ERROR=-5;
|
||||
private const int Z_VERSION_ERROR=-6;
|
||||
|
||||
private const int METHOD=0; // waiting for method byte
|
||||
private const int FLAG=1; // waiting for flag byte
|
||||
private const int DICT4=2; // four dictionary check bytes to go
|
||||
private const int DICT3=3; // three dictionary check bytes to go
|
||||
private const int DICT2=4; // two dictionary check bytes to go
|
||||
private const int DICT1=5; // one dictionary check byte to go
|
||||
private const int DICT0=6; // waiting for inflateSetDictionary
|
||||
private const int BLOCKS=7; // decompressing blocks
|
||||
private const int CHECK4=8; // four check bytes to go
|
||||
private const int CHECK3=9; // three check bytes to go
|
||||
private const int CHECK2=10; // two check bytes to go
|
||||
private const int CHECK1=11; // one check byte to go
|
||||
private const int DONE=12; // finished check, done
|
||||
private const int BAD=13; // got an error--stay here
|
||||
|
||||
internal int mode; // current inflate mode
|
||||
|
||||
// mode dependent information
|
||||
internal int method; // if FLAGS, method byte
|
||||
|
||||
// if CHECK, check values to compare
|
||||
internal long[] was=new long[1] ; // computed check value
|
||||
internal long need; // stream check value
|
||||
|
||||
// if BAD, inflateSync's marker bytes count
|
||||
internal int marker;
|
||||
|
||||
// mode independent information
|
||||
internal int nowrap; // flag for no wrapper
|
||||
internal int wbits; // log2(window size) (8..15, defaults to 15)
|
||||
|
||||
internal InfBlocks blocks; // current inflate_blocks state
|
||||
|
||||
internal int inflateReset(ZStream z){
|
||||
if(z == null || z.istate == null) return Z_STREAM_ERROR;
|
||||
|
||||
z.total_in = z.total_out = 0;
|
||||
z.msg = null;
|
||||
z.istate.mode = z.istate.nowrap!=0 ? BLOCKS : METHOD;
|
||||
z.istate.blocks.reset(z, null);
|
||||
return Z_OK;
|
||||
}
|
||||
|
||||
internal int inflateEnd(ZStream z){
|
||||
if(blocks != null)
|
||||
blocks.free(z);
|
||||
blocks=null;
|
||||
// ZFREE(z, z->state);
|
||||
return Z_OK;
|
||||
}
|
||||
|
||||
internal int inflateInit(ZStream z, int w){
|
||||
z.msg = null;
|
||||
blocks = null;
|
||||
|
||||
// handle undocumented nowrap option (no zlib header or check)
|
||||
nowrap = 0;
|
||||
if(w < 0){
|
||||
w = - w;
|
||||
nowrap = 1;
|
||||
}
|
||||
|
||||
// set window size
|
||||
if(w<8 ||w>15){
|
||||
inflateEnd(z);
|
||||
return Z_STREAM_ERROR;
|
||||
}
|
||||
wbits=w;
|
||||
|
||||
z.istate.blocks=new InfBlocks(z,
|
||||
z.istate.nowrap!=0 ? null : this,
|
||||
1<<w);
|
||||
|
||||
// reset state
|
||||
inflateReset(z);
|
||||
return Z_OK;
|
||||
}
|
||||
|
||||
internal int inflate(ZStream z, int f){
|
||||
int r;
|
||||
int b;
|
||||
|
||||
if(z == null || z.istate == null || z.next_in == null)
|
||||
return Z_STREAM_ERROR;
|
||||
f = f == Z_FINISH ? Z_BUF_ERROR : Z_OK;
|
||||
r = Z_BUF_ERROR;
|
||||
while (true){
|
||||
//System.out.println("mode: "+z.istate.mode);
|
||||
switch (z.istate.mode){
|
||||
case METHOD:
|
||||
|
||||
if(z.avail_in==0)return r;r=f;
|
||||
|
||||
z.avail_in--; z.total_in++;
|
||||
if(((z.istate.method = z.next_in[z.next_in_index++])&0xf)!=Z_DEFLATED){
|
||||
z.istate.mode = BAD;
|
||||
z.msg="unknown compression method";
|
||||
z.istate.marker = 5; // can't try inflateSync
|
||||
break;
|
||||
}
|
||||
if((z.istate.method>>4)+8>z.istate.wbits){
|
||||
z.istate.mode = BAD;
|
||||
z.msg="invalid window size";
|
||||
z.istate.marker = 5; // can't try inflateSync
|
||||
break;
|
||||
}
|
||||
z.istate.mode=FLAG;
|
||||
goto case FLAG;
|
||||
case FLAG:
|
||||
|
||||
if(z.avail_in==0)return r;r=f;
|
||||
|
||||
z.avail_in--; z.total_in++;
|
||||
b = (z.next_in[z.next_in_index++])&0xff;
|
||||
|
||||
if((((z.istate.method << 8)+b) % 31)!=0){
|
||||
z.istate.mode = BAD;
|
||||
z.msg = "incorrect header check";
|
||||
z.istate.marker = 5; // can't try inflateSync
|
||||
break;
|
||||
}
|
||||
|
||||
if((b&PRESET_DICT)==0){
|
||||
z.istate.mode = BLOCKS;
|
||||
break;
|
||||
}
|
||||
z.istate.mode = DICT4;
|
||||
goto case DICT4;
|
||||
case DICT4:
|
||||
|
||||
if(z.avail_in==0)return r;r=f;
|
||||
|
||||
z.avail_in--; z.total_in++;
|
||||
z.istate.need=((z.next_in[z.next_in_index++]&0xff)<<24)&0xff000000L;
|
||||
z.istate.mode=DICT3;
|
||||
goto case DICT3;
|
||||
case DICT3:
|
||||
|
||||
if(z.avail_in==0)return r;r=f;
|
||||
|
||||
z.avail_in--; z.total_in++;
|
||||
z.istate.need+=((z.next_in[z.next_in_index++]&0xff)<<16)&0xff0000L;
|
||||
z.istate.mode=DICT2;
|
||||
goto case DICT2;
|
||||
case DICT2:
|
||||
|
||||
if(z.avail_in==0)return r;r=f;
|
||||
|
||||
z.avail_in--; z.total_in++;
|
||||
z.istate.need+=((z.next_in[z.next_in_index++]&0xff)<<8)&0xff00L;
|
||||
z.istate.mode=DICT1;
|
||||
goto case DICT1;
|
||||
case DICT1:
|
||||
|
||||
if(z.avail_in==0)return r;r=f;
|
||||
|
||||
z.avail_in--; z.total_in++;
|
||||
z.istate.need += (z.next_in[z.next_in_index++]&0xffL);
|
||||
z.adler = z.istate.need;
|
||||
z.istate.mode = DICT0;
|
||||
return Z_NEED_DICT;
|
||||
case DICT0:
|
||||
z.istate.mode = BAD;
|
||||
z.msg = "need dictionary";
|
||||
z.istate.marker = 0; // can try inflateSync
|
||||
return Z_STREAM_ERROR;
|
||||
case BLOCKS:
|
||||
|
||||
r = z.istate.blocks.proc(z, r);
|
||||
if(r == Z_DATA_ERROR){
|
||||
z.istate.mode = BAD;
|
||||
z.istate.marker = 0; // can try inflateSync
|
||||
break;
|
||||
}
|
||||
if(r == Z_OK){
|
||||
r = f;
|
||||
}
|
||||
if(r != Z_STREAM_END){
|
||||
return r;
|
||||
}
|
||||
r = f;
|
||||
z.istate.blocks.reset(z, z.istate.was);
|
||||
if(z.istate.nowrap!=0){
|
||||
z.istate.mode=DONE;
|
||||
break;
|
||||
}
|
||||
z.istate.mode=CHECK4;
|
||||
goto case CHECK4;
|
||||
case CHECK4:
|
||||
|
||||
if(z.avail_in==0)return r;r=f;
|
||||
|
||||
z.avail_in--; z.total_in++;
|
||||
z.istate.need=((z.next_in[z.next_in_index++]&0xff)<<24)&0xff000000L;
|
||||
z.istate.mode=CHECK3;
|
||||
goto case CHECK3;
|
||||
case CHECK3:
|
||||
|
||||
if(z.avail_in==0)return r;r=f;
|
||||
|
||||
z.avail_in--; z.total_in++;
|
||||
z.istate.need+=((z.next_in[z.next_in_index++]&0xff)<<16)&0xff0000L;
|
||||
z.istate.mode = CHECK2;
|
||||
goto case CHECK2;
|
||||
case CHECK2:
|
||||
|
||||
if(z.avail_in==0)return r;r=f;
|
||||
|
||||
z.avail_in--; z.total_in++;
|
||||
z.istate.need+=((z.next_in[z.next_in_index++]&0xff)<<8)&0xff00L;
|
||||
z.istate.mode = CHECK1;
|
||||
goto case CHECK1;
|
||||
case CHECK1:
|
||||
|
||||
if(z.avail_in==0)return r;r=f;
|
||||
|
||||
z.avail_in--; z.total_in++;
|
||||
z.istate.need+=(z.next_in[z.next_in_index++]&0xffL);
|
||||
|
||||
if(((int)(z.istate.was[0])) != ((int)(z.istate.need))){
|
||||
z.istate.mode = BAD;
|
||||
z.msg = "incorrect data check";
|
||||
z.istate.marker = 5; // can't try inflateSync
|
||||
break;
|
||||
}
|
||||
|
||||
z.istate.mode = DONE;
|
||||
goto case DONE;
|
||||
case DONE:
|
||||
return Z_STREAM_END;
|
||||
case BAD:
|
||||
return Z_DATA_ERROR;
|
||||
default:
|
||||
return Z_STREAM_ERROR;
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
|
||||
internal int inflateSetDictionary(ZStream z, byte[] dictionary, int dictLength){
|
||||
int index=0;
|
||||
int length = dictLength;
|
||||
if(z==null || z.istate == null|| z.istate.mode != DICT0)
|
||||
return Z_STREAM_ERROR;
|
||||
|
||||
if(z._adler.adler32(1L, dictionary, 0, dictLength)!=z.adler){
|
||||
return Z_DATA_ERROR;
|
||||
}
|
||||
|
||||
z.adler = z._adler.adler32(0, null, 0, 0);
|
||||
|
||||
if(length >= (1<<z.istate.wbits)){
|
||||
length = (1<<z.istate.wbits)-1;
|
||||
index=dictLength - length;
|
||||
}
|
||||
z.istate.blocks.set_dictionary(dictionary, index, length);
|
||||
z.istate.mode = BLOCKS;
|
||||
return Z_OK;
|
||||
}
|
||||
|
||||
private static readonly byte[] mark = {(byte)0, (byte)0, (byte)0xff, (byte)0xff};
|
||||
|
||||
internal int inflateSync(ZStream z){
|
||||
int n; // number of bytes to look at
|
||||
int p; // pointer to bytes
|
||||
int m; // number of marker bytes found in a row
|
||||
long r, w; // temporaries to save total_in and total_out
|
||||
|
||||
// set up
|
||||
if(z == null || z.istate == null)
|
||||
return Z_STREAM_ERROR;
|
||||
if(z.istate.mode != BAD){
|
||||
z.istate.mode = BAD;
|
||||
z.istate.marker = 0;
|
||||
}
|
||||
if((n=z.avail_in)==0)
|
||||
return Z_BUF_ERROR;
|
||||
p=z.next_in_index;
|
||||
m=z.istate.marker;
|
||||
|
||||
// search
|
||||
while (n!=0 && m < 4){
|
||||
if(z.next_in[p] == mark[m]){
|
||||
m++;
|
||||
}
|
||||
else if(z.next_in[p]!=0){
|
||||
m = 0;
|
||||
}
|
||||
else{
|
||||
m = 4 - m;
|
||||
}
|
||||
p++; n--;
|
||||
}
|
||||
|
||||
// restore
|
||||
z.total_in += p-z.next_in_index;
|
||||
z.next_in_index = p;
|
||||
z.avail_in = n;
|
||||
z.istate.marker = m;
|
||||
|
||||
// return no joy or set up to restart on a new block
|
||||
if(m != 4){
|
||||
return Z_DATA_ERROR;
|
||||
}
|
||||
r=z.total_in; w=z.total_out;
|
||||
inflateReset(z);
|
||||
z.total_in=r; z.total_out = w;
|
||||
z.istate.mode = BLOCKS;
|
||||
return Z_OK;
|
||||
}
|
||||
|
||||
// Returns true if inflate is currently at the end of a block generated
|
||||
// by Z_SYNC_FLUSH or Z_FULL_FLUSH. This function is used by one PPP
|
||||
// implementation to provide an additional safety check. PPP uses Z_SYNC_FLUSH
|
||||
// but removes the length bytes of the resulting empty stored block. When
|
||||
// decompressing, PPP checks that at the end of input packet, inflate is
|
||||
// waiting for these length bytes.
|
||||
internal int inflateSyncPoint(ZStream z){
|
||||
if(z == null || z.istate == null || z.istate.blocks == null)
|
||||
return Z_STREAM_ERROR;
|
||||
return z.istate.blocks.sync_point();
|
||||
}
|
||||
}
|
||||
}
|
70
iTechSharp/srcbc/util/zlib/JZlib.cs
Normal file
70
iTechSharp/srcbc/util/zlib/JZlib.cs
Normal file
@@ -0,0 +1,70 @@
|
||||
using System;
|
||||
/*
|
||||
* $Id: JZlib.cs,v 1.1.1.1 2007/01/24 16:41:36 psoares33 Exp $
|
||||
*
|
||||
Copyright (c) 2000,2001,2002,2003 ymnk, JCraft,Inc. All rights reserved.
|
||||
|
||||
Redistribution and use in source and binary forms, with or without
|
||||
modification, are permitted provided that the following conditions are met:
|
||||
|
||||
1. Redistributions of source code must retain the above copyright notice,
|
||||
this list of conditions and the following disclaimer.
|
||||
|
||||
2. Redistributions in binary form must reproduce the above copyright
|
||||
notice, this list of conditions and the following disclaimer in
|
||||
the documentation and/or other materials provided with the distribution.
|
||||
|
||||
3. The names of the authors may not be used to endorse or promote products
|
||||
derived from this software without specific prior written permission.
|
||||
|
||||
THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESSED OR IMPLIED WARRANTIES,
|
||||
INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND
|
||||
FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL JCRAFT,
|
||||
INC. OR ANY CONTRIBUTORS TO THIS SOFTWARE BE LIABLE FOR ANY DIRECT, INDIRECT,
|
||||
INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
|
||||
LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA,
|
||||
OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF
|
||||
LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
|
||||
NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,
|
||||
EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
||||
*/
|
||||
/*
|
||||
* This program is based on zlib-1.1.3, so all credit should go authors
|
||||
* Jean-loup Gailly(jloup@gzip.org) and Mark Adler(madler@alumni.caltech.edu)
|
||||
* and contributors of zlib.
|
||||
*/
|
||||
|
||||
namespace Org.BouncyCastle.Utilities.Zlib {
|
||||
|
||||
public sealed class JZlib{
|
||||
private const String version_="1.0.2";
|
||||
public static String version(){return version_;}
|
||||
|
||||
// compression levels
|
||||
public const int Z_NO_COMPRESSION=0;
|
||||
public const int Z_BEST_SPEED=1;
|
||||
public const int Z_BEST_COMPRESSION=9;
|
||||
public const int Z_DEFAULT_COMPRESSION=(-1);
|
||||
|
||||
// compression strategy
|
||||
public const int Z_FILTERED=1;
|
||||
public const int Z_HUFFMAN_ONLY=2;
|
||||
public const int Z_DEFAULT_STRATEGY=0;
|
||||
|
||||
public const int Z_NO_FLUSH=0;
|
||||
public const int Z_PARTIAL_FLUSH=1;
|
||||
public const int Z_SYNC_FLUSH=2;
|
||||
public const int Z_FULL_FLUSH=3;
|
||||
public const int Z_FINISH=4;
|
||||
|
||||
public const int Z_OK=0;
|
||||
public const int Z_STREAM_END=1;
|
||||
public const int Z_NEED_DICT=2;
|
||||
public const int Z_ERRNO=-1;
|
||||
public const int Z_STREAM_ERROR=-2;
|
||||
public const int Z_DATA_ERROR=-3;
|
||||
public const int Z_MEM_ERROR=-4;
|
||||
public const int Z_BUF_ERROR=-5;
|
||||
public const int Z_VERSION_ERROR=-6;
|
||||
}
|
||||
}
|
152
iTechSharp/srcbc/util/zlib/StaticTree.cs
Normal file
152
iTechSharp/srcbc/util/zlib/StaticTree.cs
Normal file
@@ -0,0 +1,152 @@
|
||||
using System;
|
||||
/*
|
||||
* $Id: StaticTree.cs,v 1.2 2008/05/12 15:24:47 psoares33 Exp $
|
||||
*
|
||||
Copyright (c) 2000,2001,2002,2003 ymnk, JCraft,Inc. All rights reserved.
|
||||
|
||||
Redistribution and use in source and binary forms, with or without
|
||||
modification, are permitted provided that the following conditions are met:
|
||||
|
||||
1. Redistributions of source code must retain the above copyright notice,
|
||||
this list of conditions and the following disclaimer.
|
||||
|
||||
2. Redistributions in binary form must reproduce the above copyright
|
||||
notice, this list of conditions and the following disclaimer in
|
||||
the documentation and/or other materials provided with the distribution.
|
||||
|
||||
3. The names of the authors may not be used to endorse or promote products
|
||||
derived from this software without specific prior written permission.
|
||||
|
||||
THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESSED OR IMPLIED WARRANTIES,
|
||||
INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND
|
||||
FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL JCRAFT,
|
||||
INC. OR ANY CONTRIBUTORS TO THIS SOFTWARE BE LIABLE FOR ANY DIRECT, INDIRECT,
|
||||
INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
|
||||
LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA,
|
||||
OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF
|
||||
LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
|
||||
NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,
|
||||
EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
||||
*/
|
||||
/*
|
||||
* This program is based on zlib-1.1.3, so all credit should go authors
|
||||
* Jean-loup Gailly(jloup@gzip.org) and Mark Adler(madler@alumni.caltech.edu)
|
||||
* and contributors of zlib.
|
||||
*/
|
||||
|
||||
namespace Org.BouncyCastle.Utilities.Zlib {
|
||||
|
||||
internal sealed class StaticTree{
|
||||
private const int MAX_BITS=15;
|
||||
|
||||
private const int BL_CODES=19;
|
||||
private const int D_CODES=30;
|
||||
private const int LITERALS=256;
|
||||
private const int LENGTH_CODES=29;
|
||||
private const int L_CODES=(LITERALS+1+LENGTH_CODES);
|
||||
|
||||
// Bit length codes must not exceed MAX_BL_BITS bits
|
||||
internal const int MAX_BL_BITS=7;
|
||||
|
||||
internal static readonly short[] static_ltree = {
|
||||
12, 8, 140, 8, 76, 8, 204, 8, 44, 8,
|
||||
172, 8, 108, 8, 236, 8, 28, 8, 156, 8,
|
||||
92, 8, 220, 8, 60, 8, 188, 8, 124, 8,
|
||||
252, 8, 2, 8, 130, 8, 66, 8, 194, 8,
|
||||
34, 8, 162, 8, 98, 8, 226, 8, 18, 8,
|
||||
146, 8, 82, 8, 210, 8, 50, 8, 178, 8,
|
||||
114, 8, 242, 8, 10, 8, 138, 8, 74, 8,
|
||||
202, 8, 42, 8, 170, 8, 106, 8, 234, 8,
|
||||
26, 8, 154, 8, 90, 8, 218, 8, 58, 8,
|
||||
186, 8, 122, 8, 250, 8, 6, 8, 134, 8,
|
||||
70, 8, 198, 8, 38, 8, 166, 8, 102, 8,
|
||||
230, 8, 22, 8, 150, 8, 86, 8, 214, 8,
|
||||
54, 8, 182, 8, 118, 8, 246, 8, 14, 8,
|
||||
142, 8, 78, 8, 206, 8, 46, 8, 174, 8,
|
||||
110, 8, 238, 8, 30, 8, 158, 8, 94, 8,
|
||||
222, 8, 62, 8, 190, 8, 126, 8, 254, 8,
|
||||
1, 8, 129, 8, 65, 8, 193, 8, 33, 8,
|
||||
161, 8, 97, 8, 225, 8, 17, 8, 145, 8,
|
||||
81, 8, 209, 8, 49, 8, 177, 8, 113, 8,
|
||||
241, 8, 9, 8, 137, 8, 73, 8, 201, 8,
|
||||
41, 8, 169, 8, 105, 8, 233, 8, 25, 8,
|
||||
153, 8, 89, 8, 217, 8, 57, 8, 185, 8,
|
||||
121, 8, 249, 8, 5, 8, 133, 8, 69, 8,
|
||||
197, 8, 37, 8, 165, 8, 101, 8, 229, 8,
|
||||
21, 8, 149, 8, 85, 8, 213, 8, 53, 8,
|
||||
181, 8, 117, 8, 245, 8, 13, 8, 141, 8,
|
||||
77, 8, 205, 8, 45, 8, 173, 8, 109, 8,
|
||||
237, 8, 29, 8, 157, 8, 93, 8, 221, 8,
|
||||
61, 8, 189, 8, 125, 8, 253, 8, 19, 9,
|
||||
275, 9, 147, 9, 403, 9, 83, 9, 339, 9,
|
||||
211, 9, 467, 9, 51, 9, 307, 9, 179, 9,
|
||||
435, 9, 115, 9, 371, 9, 243, 9, 499, 9,
|
||||
11, 9, 267, 9, 139, 9, 395, 9, 75, 9,
|
||||
331, 9, 203, 9, 459, 9, 43, 9, 299, 9,
|
||||
171, 9, 427, 9, 107, 9, 363, 9, 235, 9,
|
||||
491, 9, 27, 9, 283, 9, 155, 9, 411, 9,
|
||||
91, 9, 347, 9, 219, 9, 475, 9, 59, 9,
|
||||
315, 9, 187, 9, 443, 9, 123, 9, 379, 9,
|
||||
251, 9, 507, 9, 7, 9, 263, 9, 135, 9,
|
||||
391, 9, 71, 9, 327, 9, 199, 9, 455, 9,
|
||||
39, 9, 295, 9, 167, 9, 423, 9, 103, 9,
|
||||
359, 9, 231, 9, 487, 9, 23, 9, 279, 9,
|
||||
151, 9, 407, 9, 87, 9, 343, 9, 215, 9,
|
||||
471, 9, 55, 9, 311, 9, 183, 9, 439, 9,
|
||||
119, 9, 375, 9, 247, 9, 503, 9, 15, 9,
|
||||
271, 9, 143, 9, 399, 9, 79, 9, 335, 9,
|
||||
207, 9, 463, 9, 47, 9, 303, 9, 175, 9,
|
||||
431, 9, 111, 9, 367, 9, 239, 9, 495, 9,
|
||||
31, 9, 287, 9, 159, 9, 415, 9, 95, 9,
|
||||
351, 9, 223, 9, 479, 9, 63, 9, 319, 9,
|
||||
191, 9, 447, 9, 127, 9, 383, 9, 255, 9,
|
||||
511, 9, 0, 7, 64, 7, 32, 7, 96, 7,
|
||||
16, 7, 80, 7, 48, 7, 112, 7, 8, 7,
|
||||
72, 7, 40, 7, 104, 7, 24, 7, 88, 7,
|
||||
56, 7, 120, 7, 4, 7, 68, 7, 36, 7,
|
||||
100, 7, 20, 7, 84, 7, 52, 7, 116, 7,
|
||||
3, 8, 131, 8, 67, 8, 195, 8, 35, 8,
|
||||
163, 8, 99, 8, 227, 8
|
||||
};
|
||||
|
||||
internal static readonly short[] static_dtree = {
|
||||
0, 5, 16, 5, 8, 5, 24, 5, 4, 5,
|
||||
20, 5, 12, 5, 28, 5, 2, 5, 18, 5,
|
||||
10, 5, 26, 5, 6, 5, 22, 5, 14, 5,
|
||||
30, 5, 1, 5, 17, 5, 9, 5, 25, 5,
|
||||
5, 5, 21, 5, 13, 5, 29, 5, 3, 5,
|
||||
19, 5, 11, 5, 27, 5, 7, 5, 23, 5
|
||||
};
|
||||
|
||||
internal static readonly StaticTree static_l_desc =
|
||||
new StaticTree(static_ltree, Tree.extra_lbits,
|
||||
LITERALS+1, L_CODES, MAX_BITS);
|
||||
|
||||
internal static readonly StaticTree static_d_desc =
|
||||
new StaticTree(static_dtree, Tree.extra_dbits,
|
||||
0, D_CODES, MAX_BITS);
|
||||
|
||||
internal static readonly StaticTree static_bl_desc =
|
||||
new StaticTree(null, Tree.extra_blbits,
|
||||
0, BL_CODES, MAX_BL_BITS);
|
||||
|
||||
internal short[] static_tree; // static tree or null
|
||||
internal int[] extra_bits; // extra bits for each code or null
|
||||
internal int extra_base; // base index for extra_bits
|
||||
internal int elems; // max number of elements in the tree
|
||||
internal int max_length; // max bit length for the codes
|
||||
|
||||
internal StaticTree(short[] static_tree,
|
||||
int[] extra_bits,
|
||||
int extra_base,
|
||||
int elems,
|
||||
int max_length
|
||||
){
|
||||
this.static_tree=static_tree;
|
||||
this.extra_bits=extra_bits;
|
||||
this.extra_base=extra_base;
|
||||
this.elems=elems;
|
||||
this.max_length=max_length;
|
||||
}
|
||||
}
|
||||
}
|
367
iTechSharp/srcbc/util/zlib/Tree.cs
Normal file
367
iTechSharp/srcbc/util/zlib/Tree.cs
Normal file
@@ -0,0 +1,367 @@
|
||||
using System;
|
||||
/*
|
||||
* $Id: Tree.cs,v 1.2 2008/05/12 15:24:47 psoares33 Exp $
|
||||
*
|
||||
Copyright (c) 2000,2001,2002,2003 ymnk, JCraft,Inc. All rights reserved.
|
||||
|
||||
Redistribution and use in source and binary forms, with or without
|
||||
modification, are permitted provided that the following conditions are met:
|
||||
|
||||
1. Redistributions of source code must retain the above copyright notice,
|
||||
this list of conditions and the following disclaimer.
|
||||
|
||||
2. Redistributions in binary form must reproduce the above copyright
|
||||
notice, this list of conditions and the following disclaimer in
|
||||
the documentation and/or other materials provided with the distribution.
|
||||
|
||||
3. The names of the authors may not be used to endorse or promote products
|
||||
derived from this software without specific prior written permission.
|
||||
|
||||
THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESSED OR IMPLIED WARRANTIES,
|
||||
INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND
|
||||
FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL JCRAFT,
|
||||
INC. OR ANY CONTRIBUTORS TO THIS SOFTWARE BE LIABLE FOR ANY DIRECT, INDIRECT,
|
||||
INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
|
||||
LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA,
|
||||
OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF
|
||||
LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
|
||||
NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,
|
||||
EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
||||
*/
|
||||
/*
|
||||
* This program is based on zlib-1.1.3, so all credit should go authors
|
||||
* Jean-loup Gailly(jloup@gzip.org) and Mark Adler(madler@alumni.caltech.edu)
|
||||
* and contributors of zlib.
|
||||
*/
|
||||
|
||||
namespace Org.BouncyCastle.Utilities.Zlib {
|
||||
|
||||
internal sealed class Tree{
|
||||
private const int MAX_BITS=15;
|
||||
private const int BL_CODES=19;
|
||||
private const int D_CODES=30;
|
||||
private const int LITERALS=256;
|
||||
private const int LENGTH_CODES=29;
|
||||
private const int L_CODES=(LITERALS+1+LENGTH_CODES);
|
||||
private const int HEAP_SIZE=(2*L_CODES+1);
|
||||
|
||||
// Bit length codes must not exceed MAX_BL_BITS bits
|
||||
internal const int MAX_BL_BITS=7;
|
||||
|
||||
// end of block literal code
|
||||
internal const int END_BLOCK=256;
|
||||
|
||||
// repeat previous bit length 3-6 times (2 bits of repeat count)
|
||||
internal const int REP_3_6=16;
|
||||
|
||||
// repeat a zero length 3-10 times (3 bits of repeat count)
|
||||
internal const int REPZ_3_10=17;
|
||||
|
||||
// repeat a zero length 11-138 times (7 bits of repeat count)
|
||||
internal const int REPZ_11_138=18;
|
||||
|
||||
// extra bits for each length code
|
||||
internal static readonly int[] extra_lbits={
|
||||
0,0,0,0,0,0,0,0,1,1,1,1,2,2,2,2,3,3,3,3,4,4,4,4,5,5,5,5,0
|
||||
};
|
||||
|
||||
// extra bits for each distance code
|
||||
internal static readonly int[] extra_dbits={
|
||||
0,0,0,0,1,1,2,2,3,3,4,4,5,5,6,6,7,7,8,8,9,9,10,10,11,11,12,12,13,13
|
||||
};
|
||||
|
||||
// extra bits for each bit length code
|
||||
internal static readonly int[] extra_blbits={
|
||||
0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,2,3,7
|
||||
};
|
||||
|
||||
internal static readonly byte[] bl_order={
|
||||
16,17,18,0,8,7,9,6,10,5,11,4,12,3,13,2,14,1,15};
|
||||
|
||||
|
||||
// The lengths of the bit length codes are sent in order of decreasing
|
||||
// probability, to avoid transmitting the lengths for unused bit
|
||||
// length codes.
|
||||
|
||||
internal const int Buf_size=8*2;
|
||||
|
||||
// see definition of array dist_code below
|
||||
internal const int DIST_CODE_LEN=512;
|
||||
|
||||
internal static readonly byte[] _dist_code = {
|
||||
0, 1, 2, 3, 4, 4, 5, 5, 6, 6, 6, 6, 7, 7, 7, 7, 8, 8, 8, 8,
|
||||
8, 8, 8, 8, 9, 9, 9, 9, 9, 9, 9, 9, 10, 10, 10, 10, 10, 10, 10, 10,
|
||||
10, 10, 10, 10, 10, 10, 10, 10, 11, 11, 11, 11, 11, 11, 11, 11, 11, 11, 11, 11,
|
||||
11, 11, 11, 11, 12, 12, 12, 12, 12, 12, 12, 12, 12, 12, 12, 12, 12, 12, 12, 12,
|
||||
12, 12, 12, 12, 12, 12, 12, 12, 12, 12, 12, 12, 12, 12, 12, 12, 13, 13, 13, 13,
|
||||
13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13,
|
||||
13, 13, 13, 13, 13, 13, 13, 13, 14, 14, 14, 14, 14, 14, 14, 14, 14, 14, 14, 14,
|
||||
14, 14, 14, 14, 14, 14, 14, 14, 14, 14, 14, 14, 14, 14, 14, 14, 14, 14, 14, 14,
|
||||
14, 14, 14, 14, 14, 14, 14, 14, 14, 14, 14, 14, 14, 14, 14, 14, 14, 14, 14, 14,
|
||||
14, 14, 14, 14, 14, 14, 14, 14, 14, 14, 14, 14, 15, 15, 15, 15, 15, 15, 15, 15,
|
||||
15, 15, 15, 15, 15, 15, 15, 15, 15, 15, 15, 15, 15, 15, 15, 15, 15, 15, 15, 15,
|
||||
15, 15, 15, 15, 15, 15, 15, 15, 15, 15, 15, 15, 15, 15, 15, 15, 15, 15, 15, 15,
|
||||
15, 15, 15, 15, 15, 15, 15, 15, 15, 15, 15, 15, 15, 15, 15, 15, 0, 0, 16, 17,
|
||||
18, 18, 19, 19, 20, 20, 20, 20, 21, 21, 21, 21, 22, 22, 22, 22, 22, 22, 22, 22,
|
||||
23, 23, 23, 23, 23, 23, 23, 23, 24, 24, 24, 24, 24, 24, 24, 24, 24, 24, 24, 24,
|
||||
24, 24, 24, 24, 25, 25, 25, 25, 25, 25, 25, 25, 25, 25, 25, 25, 25, 25, 25, 25,
|
||||
26, 26, 26, 26, 26, 26, 26, 26, 26, 26, 26, 26, 26, 26, 26, 26, 26, 26, 26, 26,
|
||||
26, 26, 26, 26, 26, 26, 26, 26, 26, 26, 26, 26, 27, 27, 27, 27, 27, 27, 27, 27,
|
||||
27, 27, 27, 27, 27, 27, 27, 27, 27, 27, 27, 27, 27, 27, 27, 27, 27, 27, 27, 27,
|
||||
27, 27, 27, 27, 28, 28, 28, 28, 28, 28, 28, 28, 28, 28, 28, 28, 28, 28, 28, 28,
|
||||
28, 28, 28, 28, 28, 28, 28, 28, 28, 28, 28, 28, 28, 28, 28, 28, 28, 28, 28, 28,
|
||||
28, 28, 28, 28, 28, 28, 28, 28, 28, 28, 28, 28, 28, 28, 28, 28, 28, 28, 28, 28,
|
||||
28, 28, 28, 28, 28, 28, 28, 28, 29, 29, 29, 29, 29, 29, 29, 29, 29, 29, 29, 29,
|
||||
29, 29, 29, 29, 29, 29, 29, 29, 29, 29, 29, 29, 29, 29, 29, 29, 29, 29, 29, 29,
|
||||
29, 29, 29, 29, 29, 29, 29, 29, 29, 29, 29, 29, 29, 29, 29, 29, 29, 29, 29, 29,
|
||||
29, 29, 29, 29, 29, 29, 29, 29, 29, 29, 29, 29
|
||||
};
|
||||
|
||||
internal static readonly byte[] _length_code={
|
||||
0, 1, 2, 3, 4, 5, 6, 7, 8, 8, 9, 9, 10, 10, 11, 11, 12, 12, 12, 12,
|
||||
13, 13, 13, 13, 14, 14, 14, 14, 15, 15, 15, 15, 16, 16, 16, 16, 16, 16, 16, 16,
|
||||
17, 17, 17, 17, 17, 17, 17, 17, 18, 18, 18, 18, 18, 18, 18, 18, 19, 19, 19, 19,
|
||||
19, 19, 19, 19, 20, 20, 20, 20, 20, 20, 20, 20, 20, 20, 20, 20, 20, 20, 20, 20,
|
||||
21, 21, 21, 21, 21, 21, 21, 21, 21, 21, 21, 21, 21, 21, 21, 21, 22, 22, 22, 22,
|
||||
22, 22, 22, 22, 22, 22, 22, 22, 22, 22, 22, 22, 23, 23, 23, 23, 23, 23, 23, 23,
|
||||
23, 23, 23, 23, 23, 23, 23, 23, 24, 24, 24, 24, 24, 24, 24, 24, 24, 24, 24, 24,
|
||||
24, 24, 24, 24, 24, 24, 24, 24, 24, 24, 24, 24, 24, 24, 24, 24, 24, 24, 24, 24,
|
||||
25, 25, 25, 25, 25, 25, 25, 25, 25, 25, 25, 25, 25, 25, 25, 25, 25, 25, 25, 25,
|
||||
25, 25, 25, 25, 25, 25, 25, 25, 25, 25, 25, 25, 26, 26, 26, 26, 26, 26, 26, 26,
|
||||
26, 26, 26, 26, 26, 26, 26, 26, 26, 26, 26, 26, 26, 26, 26, 26, 26, 26, 26, 26,
|
||||
26, 26, 26, 26, 27, 27, 27, 27, 27, 27, 27, 27, 27, 27, 27, 27, 27, 27, 27, 27,
|
||||
27, 27, 27, 27, 27, 27, 27, 27, 27, 27, 27, 27, 27, 27, 27, 28
|
||||
};
|
||||
|
||||
internal static readonly int[] base_length = {
|
||||
0, 1, 2, 3, 4, 5, 6, 7, 8, 10, 12, 14, 16, 20, 24, 28, 32, 40, 48, 56,
|
||||
64, 80, 96, 112, 128, 160, 192, 224, 0
|
||||
};
|
||||
|
||||
internal static readonly int[] base_dist = {
|
||||
0, 1, 2, 3, 4, 6, 8, 12, 16, 24,
|
||||
32, 48, 64, 96, 128, 192, 256, 384, 512, 768,
|
||||
1024, 1536, 2048, 3072, 4096, 6144, 8192, 12288, 16384, 24576
|
||||
};
|
||||
|
||||
// Mapping from a distance to a distance code. dist is the distance - 1 and
|
||||
// must not have side effects. _dist_code[256] and _dist_code[257] are never
|
||||
// used.
|
||||
internal static int d_code(int dist){
|
||||
return ((dist) < 256 ? _dist_code[dist] : _dist_code[256+((dist)>>7)]);
|
||||
}
|
||||
|
||||
internal short[] dyn_tree; // the dynamic tree
|
||||
internal int max_code; // largest code with non zero frequency
|
||||
internal StaticTree stat_desc; // the corresponding static tree
|
||||
|
||||
// Compute the optimal bit lengths for a tree and update the total bit length
|
||||
// for the current block.
|
||||
// IN assertion: the fields freq and dad are set, heap[heap_max] and
|
||||
// above are the tree nodes sorted by increasing frequency.
|
||||
// OUT assertions: the field len is set to the optimal bit length, the
|
||||
// array bl_count contains the frequencies for each bit length.
|
||||
// The length opt_len is updated; static_len is also updated if stree is
|
||||
// not null.
|
||||
internal void gen_bitlen(Deflate s){
|
||||
short[] tree = dyn_tree;
|
||||
short[] stree = stat_desc.static_tree;
|
||||
int[] extra = stat_desc.extra_bits;
|
||||
int based = stat_desc.extra_base;
|
||||
int max_length = stat_desc.max_length;
|
||||
int h; // heap index
|
||||
int n, m; // iterate over the tree elements
|
||||
int bits; // bit length
|
||||
int xbits; // extra bits
|
||||
short f; // frequency
|
||||
int overflow = 0; // number of elements with bit length too large
|
||||
|
||||
for (bits = 0; bits <= MAX_BITS; bits++) s.bl_count[bits] = 0;
|
||||
|
||||
// In a first pass, compute the optimal bit lengths (which may
|
||||
// overflow in the case of the bit length tree).
|
||||
tree[s.heap[s.heap_max]*2+1] = 0; // root of the heap
|
||||
|
||||
for(h=s.heap_max+1; h<HEAP_SIZE; h++){
|
||||
n = s.heap[h];
|
||||
bits = tree[tree[n*2+1]*2+1] + 1;
|
||||
if (bits > max_length){ bits = max_length; overflow++; }
|
||||
tree[n*2+1] = (short)bits;
|
||||
// We overwrite tree[n*2+1] which is no longer needed
|
||||
|
||||
if (n > max_code) continue; // not a leaf node
|
||||
|
||||
s.bl_count[bits]++;
|
||||
xbits = 0;
|
||||
if (n >= based) xbits = extra[n-based];
|
||||
f = tree[n*2];
|
||||
s.opt_len += f * (bits + xbits);
|
||||
if (stree!=null) s.static_len += f * (stree[n*2+1] + xbits);
|
||||
}
|
||||
if (overflow == 0) return;
|
||||
|
||||
// This happens for example on obj2 and pic of the Calgary corpus
|
||||
// Find the first bit length which could increase:
|
||||
do {
|
||||
bits = max_length-1;
|
||||
while(s.bl_count[bits]==0) bits--;
|
||||
s.bl_count[bits]--; // move one leaf down the tree
|
||||
s.bl_count[bits+1]+=2; // move one overflow item as its brother
|
||||
s.bl_count[max_length]--;
|
||||
// The brother of the overflow item also moves one step up,
|
||||
// but this does not affect bl_count[max_length]
|
||||
overflow -= 2;
|
||||
}
|
||||
while (overflow > 0);
|
||||
|
||||
for (bits = max_length; bits != 0; bits--) {
|
||||
n = s.bl_count[bits];
|
||||
while (n != 0) {
|
||||
m = s.heap[--h];
|
||||
if (m > max_code) continue;
|
||||
if (tree[m*2+1] != bits) {
|
||||
s.opt_len += (int)(((long)bits - (long)tree[m*2+1])*(long)tree[m*2]);
|
||||
tree[m*2+1] = (short)bits;
|
||||
}
|
||||
n--;
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
// Construct one Huffman tree and assigns the code bit strings and lengths.
|
||||
// Update the total bit length for the current block.
|
||||
// IN assertion: the field freq is set for all tree elements.
|
||||
// OUT assertions: the fields len and code are set to the optimal bit length
|
||||
// and corresponding code. The length opt_len is updated; static_len is
|
||||
// also updated if stree is not null. The field max_code is set.
|
||||
internal void build_tree(Deflate s){
|
||||
short[] tree=dyn_tree;
|
||||
short[] stree=stat_desc.static_tree;
|
||||
int elems=stat_desc.elems;
|
||||
int n, m; // iterate over heap elements
|
||||
int max_code=-1; // largest code with non zero frequency
|
||||
int node; // new node being created
|
||||
|
||||
// Construct the initial heap, with least frequent element in
|
||||
// heap[1]. The sons of heap[n] are heap[2*n] and heap[2*n+1].
|
||||
// heap[0] is not used.
|
||||
s.heap_len = 0;
|
||||
s.heap_max = HEAP_SIZE;
|
||||
|
||||
for(n=0; n<elems; n++) {
|
||||
if(tree[n*2] != 0) {
|
||||
s.heap[++s.heap_len] = max_code = n;
|
||||
s.depth[n] = 0;
|
||||
}
|
||||
else{
|
||||
tree[n*2+1] = 0;
|
||||
}
|
||||
}
|
||||
|
||||
// The pkzip format requires that at least one distance code exists,
|
||||
// and that at least one bit should be sent even if there is only one
|
||||
// possible code. So to avoid special checks later on we force at least
|
||||
// two codes of non zero frequency.
|
||||
while (s.heap_len < 2) {
|
||||
node = s.heap[++s.heap_len] = (max_code < 2 ? ++max_code : 0);
|
||||
tree[node*2] = 1;
|
||||
s.depth[node] = 0;
|
||||
s.opt_len--; if (stree!=null) s.static_len -= stree[node*2+1];
|
||||
// node is 0 or 1 so it does not have extra bits
|
||||
}
|
||||
this.max_code = max_code;
|
||||
|
||||
// The elements heap[heap_len/2+1 .. heap_len] are leaves of the tree,
|
||||
// establish sub-heaps of increasing lengths:
|
||||
|
||||
for(n=s.heap_len/2;n>=1; n--)
|
||||
s.pqdownheap(tree, n);
|
||||
|
||||
// Construct the Huffman tree by repeatedly combining the least two
|
||||
// frequent nodes.
|
||||
|
||||
node=elems; // next internal node of the tree
|
||||
do{
|
||||
// n = node of least frequency
|
||||
n=s.heap[1];
|
||||
s.heap[1]=s.heap[s.heap_len--];
|
||||
s.pqdownheap(tree, 1);
|
||||
m=s.heap[1]; // m = node of next least frequency
|
||||
|
||||
s.heap[--s.heap_max] = n; // keep the nodes sorted by frequency
|
||||
s.heap[--s.heap_max] = m;
|
||||
|
||||
// Create a new node father of n and m
|
||||
tree[node*2] = (short)(tree[n*2] + tree[m*2]);
|
||||
s.depth[node] = (byte)(System.Math.Max(s.depth[n],s.depth[m])+1);
|
||||
tree[n*2+1] = tree[m*2+1] = (short)node;
|
||||
|
||||
// and insert the new node in the heap
|
||||
s.heap[1] = node++;
|
||||
s.pqdownheap(tree, 1);
|
||||
}
|
||||
while(s.heap_len>=2);
|
||||
|
||||
s.heap[--s.heap_max] = s.heap[1];
|
||||
|
||||
// At this point, the fields freq and dad are set. We can now
|
||||
// generate the bit lengths.
|
||||
|
||||
gen_bitlen(s);
|
||||
|
||||
// The field len is now set, we can generate the bit codes
|
||||
gen_codes(tree, max_code, s.bl_count);
|
||||
}
|
||||
|
||||
// Generate the codes for a given tree and bit counts (which need not be
|
||||
// optimal).
|
||||
// IN assertion: the array bl_count contains the bit length statistics for
|
||||
// the given tree and the field len is set for all tree elements.
|
||||
// OUT assertion: the field code is set for all tree elements of non
|
||||
// zero code length.
|
||||
internal static void gen_codes(short[] tree, // the tree to decorate
|
||||
int max_code, // largest code with non zero frequency
|
||||
short[] bl_count // number of codes at each bit length
|
||||
){
|
||||
short[] next_code=new short[MAX_BITS+1]; // next code value for each bit length
|
||||
short code = 0; // running code value
|
||||
int bits; // bit index
|
||||
int n; // code index
|
||||
|
||||
// The distribution counts are first used to generate the code values
|
||||
// without bit reversal.
|
||||
for (bits = 1; bits <= MAX_BITS; bits++) {
|
||||
next_code[bits] = code = (short)((code + bl_count[bits-1]) << 1);
|
||||
}
|
||||
|
||||
// Check that the bit counts in bl_count are consistent. The last code
|
||||
// must be all ones.
|
||||
//Assert (code + bl_count[MAX_BITS]-1 == (1<<MAX_BITS)-1,
|
||||
// "inconsistent bit counts");
|
||||
//Tracev((stderr,"\ngen_codes: max_code %d ", max_code));
|
||||
|
||||
for (n = 0; n <= max_code; n++) {
|
||||
int len = tree[n*2+1];
|
||||
if (len == 0) continue;
|
||||
// Now reverse the bits
|
||||
tree[n*2] = (short)(bi_reverse(next_code[len]++, len));
|
||||
}
|
||||
}
|
||||
|
||||
// Reverse the first len bits of a code, using straightforward code (a faster
|
||||
// method would use a table)
|
||||
// IN assertion: 1 <= len <= 15
|
||||
internal static int bi_reverse(int code, // the value to invert
|
||||
int len // its bit length
|
||||
){
|
||||
int res = 0;
|
||||
do{
|
||||
res|=code&1;
|
||||
code>>=1;
|
||||
res<<=1;
|
||||
}
|
||||
while(--len>0);
|
||||
return res>>1;
|
||||
}
|
||||
}
|
||||
}
|
150
iTechSharp/srcbc/util/zlib/ZDeflaterOutputStream.cs
Normal file
150
iTechSharp/srcbc/util/zlib/ZDeflaterOutputStream.cs
Normal file
@@ -0,0 +1,150 @@
|
||||
using System;
|
||||
using System.IO;
|
||||
|
||||
namespace Org.BouncyCastle.Utilities.Zlib {
|
||||
/// <summary>
|
||||
/// Summary description for DeflaterOutputStream.
|
||||
/// </summary>
|
||||
public class ZDeflaterOutputStream : Stream {
|
||||
protected ZStream z=new ZStream();
|
||||
protected int flushLevel=JZlib.Z_NO_FLUSH;
|
||||
private const int BUFSIZE = 4192;
|
||||
protected byte[] buf=new byte[BUFSIZE];
|
||||
private byte[] buf1=new byte[1];
|
||||
|
||||
protected Stream outp;
|
||||
|
||||
public ZDeflaterOutputStream(Stream outp) : this(outp, 6, false) {
|
||||
}
|
||||
|
||||
public ZDeflaterOutputStream(Stream outp, int level) : this(outp, level, false) {
|
||||
}
|
||||
|
||||
public ZDeflaterOutputStream(Stream outp, int level, bool nowrap) {
|
||||
this.outp=outp;
|
||||
z.deflateInit(level, nowrap);
|
||||
}
|
||||
|
||||
|
||||
public override bool CanRead {
|
||||
get {
|
||||
// TODO: Add DeflaterOutputStream.CanRead getter implementation
|
||||
return false;
|
||||
}
|
||||
}
|
||||
|
||||
public override bool CanSeek {
|
||||
get {
|
||||
// TODO: Add DeflaterOutputStream.CanSeek getter implementation
|
||||
return false;
|
||||
}
|
||||
}
|
||||
|
||||
public override bool CanWrite {
|
||||
get {
|
||||
// TODO: Add DeflaterOutputStream.CanWrite getter implementation
|
||||
return true;
|
||||
}
|
||||
}
|
||||
|
||||
public override long Length {
|
||||
get {
|
||||
// TODO: Add DeflaterOutputStream.Length getter implementation
|
||||
return 0;
|
||||
}
|
||||
}
|
||||
|
||||
public override long Position {
|
||||
get {
|
||||
// TODO: Add DeflaterOutputStream.Position getter implementation
|
||||
return 0;
|
||||
}
|
||||
set {
|
||||
// TODO: Add DeflaterOutputStream.Position setter implementation
|
||||
}
|
||||
}
|
||||
|
||||
public override void Write(byte[] b, int off, int len) {
|
||||
if(len==0)
|
||||
return;
|
||||
int err;
|
||||
z.next_in=b;
|
||||
z.next_in_index=off;
|
||||
z.avail_in=len;
|
||||
do{
|
||||
z.next_out=buf;
|
||||
z.next_out_index=0;
|
||||
z.avail_out=BUFSIZE;
|
||||
err=z.deflate(flushLevel);
|
||||
if(err!=JZlib.Z_OK)
|
||||
throw new IOException("deflating: "+z.msg);
|
||||
if (z.avail_out < BUFSIZE)
|
||||
{
|
||||
outp.Write(buf, 0, BUFSIZE-z.avail_out);
|
||||
}
|
||||
}
|
||||
while(z.avail_in>0 || z.avail_out==0);
|
||||
}
|
||||
|
||||
public override long Seek(long offset, SeekOrigin origin) {
|
||||
// TODO: Add DeflaterOutputStream.Seek implementation
|
||||
return 0;
|
||||
}
|
||||
|
||||
public override void SetLength(long value) {
|
||||
// TODO: Add DeflaterOutputStream.SetLength implementation
|
||||
|
||||
}
|
||||
|
||||
public override int Read(byte[] buffer, int offset, int count) {
|
||||
// TODO: Add DeflaterOutputStream.Read implementation
|
||||
return 0;
|
||||
}
|
||||
|
||||
public override void Flush() {
|
||||
outp.Flush();
|
||||
}
|
||||
|
||||
public override void WriteByte(byte b) {
|
||||
buf1[0]=(byte)b;
|
||||
Write(buf1, 0, 1);
|
||||
}
|
||||
|
||||
public void Finish() {
|
||||
int err;
|
||||
do{
|
||||
z.next_out=buf;
|
||||
z.next_out_index=0;
|
||||
z.avail_out=BUFSIZE;
|
||||
err=z.deflate(JZlib.Z_FINISH);
|
||||
if(err!=JZlib.Z_STREAM_END && err != JZlib.Z_OK)
|
||||
throw new IOException("deflating: "+z.msg);
|
||||
if(BUFSIZE-z.avail_out>0){
|
||||
outp.Write(buf, 0, BUFSIZE-z.avail_out);
|
||||
}
|
||||
}
|
||||
while(z.avail_in>0 || z.avail_out==0);
|
||||
Flush();
|
||||
}
|
||||
|
||||
public void End() {
|
||||
if(z==null)
|
||||
return;
|
||||
z.deflateEnd();
|
||||
z.free();
|
||||
z=null;
|
||||
}
|
||||
|
||||
public override void Close() {
|
||||
try{
|
||||
try{Finish();}
|
||||
catch (IOException) {}
|
||||
}
|
||||
finally{
|
||||
End();
|
||||
outp.Close();
|
||||
outp=null;
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
126
iTechSharp/srcbc/util/zlib/ZInflaterInputStream.cs
Normal file
126
iTechSharp/srcbc/util/zlib/ZInflaterInputStream.cs
Normal file
@@ -0,0 +1,126 @@
|
||||
using System;
|
||||
using System.IO;
|
||||
|
||||
namespace Org.BouncyCastle.Utilities.Zlib {
|
||||
/// <summary>
|
||||
/// Summary description for DeflaterOutputStream.
|
||||
/// </summary>
|
||||
public class ZInflaterInputStream : Stream {
|
||||
protected ZStream z=new ZStream();
|
||||
protected int flushLevel=JZlib.Z_NO_FLUSH;
|
||||
private const int BUFSIZE = 4192;
|
||||
protected byte[] buf=new byte[BUFSIZE];
|
||||
private byte[] buf1=new byte[1];
|
||||
|
||||
protected Stream inp=null;
|
||||
private bool nomoreinput=false;
|
||||
|
||||
public ZInflaterInputStream(Stream inp) : this(inp, false) {
|
||||
}
|
||||
|
||||
public ZInflaterInputStream(Stream inp, bool nowrap) {
|
||||
this.inp=inp;
|
||||
z.inflateInit(nowrap);
|
||||
z.next_in=buf;
|
||||
z.next_in_index=0;
|
||||
z.avail_in=0;
|
||||
}
|
||||
|
||||
public override bool CanRead {
|
||||
get {
|
||||
// TODO: Add DeflaterOutputStream.CanRead getter implementation
|
||||
return true;
|
||||
}
|
||||
}
|
||||
|
||||
public override bool CanSeek {
|
||||
get {
|
||||
// TODO: Add DeflaterOutputStream.CanSeek getter implementation
|
||||
return false;
|
||||
}
|
||||
}
|
||||
|
||||
public override bool CanWrite {
|
||||
get {
|
||||
// TODO: Add DeflaterOutputStream.CanWrite getter implementation
|
||||
return false;
|
||||
}
|
||||
}
|
||||
|
||||
public override long Length {
|
||||
get {
|
||||
// TODO: Add DeflaterOutputStream.Length getter implementation
|
||||
return 0;
|
||||
}
|
||||
}
|
||||
|
||||
public override long Position {
|
||||
get {
|
||||
// TODO: Add DeflaterOutputStream.Position getter implementation
|
||||
return 0;
|
||||
}
|
||||
set {
|
||||
// TODO: Add DeflaterOutputStream.Position setter implementation
|
||||
}
|
||||
}
|
||||
|
||||
public override void Write(byte[] b, int off, int len) {
|
||||
}
|
||||
|
||||
public override long Seek(long offset, SeekOrigin origin) {
|
||||
// TODO: Add DeflaterOutputStream.Seek implementation
|
||||
return 0;
|
||||
}
|
||||
|
||||
public override void SetLength(long value) {
|
||||
// TODO: Add DeflaterOutputStream.SetLength implementation
|
||||
|
||||
}
|
||||
|
||||
public override int Read(byte[] b, int off, int len) {
|
||||
if(len==0)
|
||||
return(0);
|
||||
int err;
|
||||
z.next_out=b;
|
||||
z.next_out_index=off;
|
||||
z.avail_out=len;
|
||||
do {
|
||||
if((z.avail_in==0)&&(!nomoreinput)) { // if buffer is empty and more input is avaiable, refill it
|
||||
z.next_in_index=0;
|
||||
z.avail_in=inp.Read(buf, 0, BUFSIZE);//(BUFSIZE<z.avail_out ? BUFSIZE : z.avail_out));
|
||||
if(z.avail_in==0) {
|
||||
z.avail_in=0;
|
||||
nomoreinput=true;
|
||||
}
|
||||
}
|
||||
err=z.inflate(flushLevel);
|
||||
if(nomoreinput&&(err==JZlib.Z_BUF_ERROR))
|
||||
return(-1);
|
||||
if(err!=JZlib.Z_OK && err!=JZlib.Z_STREAM_END)
|
||||
throw new IOException("inflating: "+z.msg);
|
||||
if((nomoreinput||err==JZlib.Z_STREAM_END)&&(z.avail_out==len))
|
||||
return(0);
|
||||
}
|
||||
while(z.avail_out==len&&err==JZlib.Z_OK);
|
||||
//System.err.print("("+(len-z.avail_out)+")");
|
||||
return(len-z.avail_out);
|
||||
}
|
||||
|
||||
public override void Flush() {
|
||||
inp.Flush();
|
||||
}
|
||||
|
||||
public override void WriteByte(byte b) {
|
||||
}
|
||||
|
||||
public override void Close() {
|
||||
inp.Close();
|
||||
}
|
||||
|
||||
public override int ReadByte() {
|
||||
if(Read(buf1, 0, 1)<=0)
|
||||
return -1;
|
||||
return(buf1[0]&0xFF);
|
||||
}
|
||||
}
|
||||
}
|
214
iTechSharp/srcbc/util/zlib/ZStream.cs
Normal file
214
iTechSharp/srcbc/util/zlib/ZStream.cs
Normal file
@@ -0,0 +1,214 @@
|
||||
using System;
|
||||
/*
|
||||
* $Id: ZStream.cs,v 1.1.1.1 2007/01/24 16:41:40 psoares33 Exp $
|
||||
*
|
||||
Copyright (c) 2000,2001,2002,2003 ymnk, JCraft,Inc. All rights reserved.
|
||||
|
||||
Redistribution and use in source and binary forms, with or without
|
||||
modification, are permitted provided that the following conditions are met:
|
||||
|
||||
1. Redistributions of source code must retain the above copyright notice,
|
||||
this list of conditions and the following disclaimer.
|
||||
|
||||
2. Redistributions in binary form must reproduce the above copyright
|
||||
notice, this list of conditions and the following disclaimer in
|
||||
the documentation and/or other materials provided with the distribution.
|
||||
|
||||
3. The names of the authors may not be used to endorse or promote products
|
||||
derived from this software without specific prior written permission.
|
||||
|
||||
THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESSED OR IMPLIED WARRANTIES,
|
||||
INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND
|
||||
FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL JCRAFT,
|
||||
INC. OR ANY CONTRIBUTORS TO THIS SOFTWARE BE LIABLE FOR ANY DIRECT, INDIRECT,
|
||||
INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
|
||||
LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA,
|
||||
OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF
|
||||
LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
|
||||
NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,
|
||||
EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
||||
*/
|
||||
/*
|
||||
* This program is based on zlib-1.1.3, so all credit should go authors
|
||||
* Jean-loup Gailly(jloup@gzip.org) and Mark Adler(madler@alumni.caltech.edu)
|
||||
* and contributors of zlib.
|
||||
*/
|
||||
|
||||
namespace Org.BouncyCastle.Utilities.Zlib {
|
||||
|
||||
public sealed class ZStream{
|
||||
|
||||
private const int MAX_WBITS=15; // 32K LZ77 window
|
||||
private const int DEF_WBITS=MAX_WBITS;
|
||||
|
||||
private const int Z_NO_FLUSH=0;
|
||||
private const int Z_PARTIAL_FLUSH=1;
|
||||
private const int Z_SYNC_FLUSH=2;
|
||||
private const int Z_FULL_FLUSH=3;
|
||||
private const int Z_FINISH=4;
|
||||
|
||||
private const int MAX_MEM_LEVEL=9;
|
||||
|
||||
private const int Z_OK=0;
|
||||
private const int Z_STREAM_END=1;
|
||||
private const int Z_NEED_DICT=2;
|
||||
private const int Z_ERRNO=-1;
|
||||
private const int Z_STREAM_ERROR=-2;
|
||||
private const int Z_DATA_ERROR=-3;
|
||||
private const int Z_MEM_ERROR=-4;
|
||||
private const int Z_BUF_ERROR=-5;
|
||||
private const int Z_VERSION_ERROR=-6;
|
||||
|
||||
public byte[] next_in; // next input byte
|
||||
public int next_in_index;
|
||||
public int avail_in; // number of bytes available at next_in
|
||||
public long total_in; // total nb of input bytes read so far
|
||||
|
||||
public byte[] next_out; // next output byte should be put there
|
||||
public int next_out_index;
|
||||
public int avail_out; // remaining free space at next_out
|
||||
public long total_out; // total nb of bytes output so far
|
||||
|
||||
public String msg;
|
||||
|
||||
internal Deflate dstate;
|
||||
internal Inflate istate;
|
||||
|
||||
internal int data_type; // best guess about the data type: ascii or binary
|
||||
|
||||
public long adler;
|
||||
internal Adler32 _adler=new Adler32();
|
||||
|
||||
public int inflateInit(){
|
||||
return inflateInit(DEF_WBITS);
|
||||
}
|
||||
public int inflateInit(bool nowrap){
|
||||
return inflateInit(DEF_WBITS, nowrap);
|
||||
}
|
||||
public int inflateInit(int w){
|
||||
return inflateInit(w, false);
|
||||
}
|
||||
|
||||
public int inflateInit(int w, bool nowrap){
|
||||
istate=new Inflate();
|
||||
return istate.inflateInit(this, nowrap?-w:w);
|
||||
}
|
||||
|
||||
public int inflate(int f){
|
||||
if(istate==null) return Z_STREAM_ERROR;
|
||||
return istate.inflate(this, f);
|
||||
}
|
||||
public int inflateEnd(){
|
||||
if(istate==null) return Z_STREAM_ERROR;
|
||||
int ret=istate.inflateEnd(this);
|
||||
istate = null;
|
||||
return ret;
|
||||
}
|
||||
public int inflateSync(){
|
||||
if(istate == null)
|
||||
return Z_STREAM_ERROR;
|
||||
return istate.inflateSync(this);
|
||||
}
|
||||
public int inflateSetDictionary(byte[] dictionary, int dictLength){
|
||||
if(istate == null)
|
||||
return Z_STREAM_ERROR;
|
||||
return istate.inflateSetDictionary(this, dictionary, dictLength);
|
||||
}
|
||||
|
||||
public int deflateInit(int level){
|
||||
return deflateInit(level, MAX_WBITS);
|
||||
}
|
||||
public int deflateInit(int level, bool nowrap){
|
||||
return deflateInit(level, MAX_WBITS, nowrap);
|
||||
}
|
||||
public int deflateInit(int level, int bits){
|
||||
return deflateInit(level, bits, false);
|
||||
}
|
||||
public int deflateInit(int level, int bits, bool nowrap){
|
||||
dstate=new Deflate();
|
||||
return dstate.deflateInit(this, level, nowrap?-bits:bits);
|
||||
}
|
||||
public int deflate(int flush){
|
||||
if(dstate==null){
|
||||
return Z_STREAM_ERROR;
|
||||
}
|
||||
return dstate.deflate(this, flush);
|
||||
}
|
||||
public int deflateEnd(){
|
||||
if(dstate==null) return Z_STREAM_ERROR;
|
||||
int ret=dstate.deflateEnd();
|
||||
dstate=null;
|
||||
return ret;
|
||||
}
|
||||
public int deflateParams(int level, int strategy){
|
||||
if(dstate==null) return Z_STREAM_ERROR;
|
||||
return dstate.deflateParams(this, level, strategy);
|
||||
}
|
||||
public int deflateSetDictionary (byte[] dictionary, int dictLength){
|
||||
if(dstate == null)
|
||||
return Z_STREAM_ERROR;
|
||||
return dstate.deflateSetDictionary(this, dictionary, dictLength);
|
||||
}
|
||||
|
||||
// Flush as much pending output as possible. All deflate() output goes
|
||||
// through this function so some applications may wish to modify it
|
||||
// to avoid allocating a large strm->next_out buffer and copying into it.
|
||||
// (See also read_buf()).
|
||||
internal void flush_pending(){
|
||||
int len=dstate.pending;
|
||||
|
||||
if(len>avail_out) len=avail_out;
|
||||
if(len==0) return;
|
||||
|
||||
if(dstate.pending_buf.Length<=dstate.pending_out ||
|
||||
next_out.Length<=next_out_index ||
|
||||
dstate.pending_buf.Length<(dstate.pending_out+len) ||
|
||||
next_out.Length<(next_out_index+len)){
|
||||
// System.out.println(dstate.pending_buf.length+", "+dstate.pending_out+
|
||||
// ", "+next_out.length+", "+next_out_index+", "+len);
|
||||
// System.out.println("avail_out="+avail_out);
|
||||
}
|
||||
|
||||
System.Array.Copy(dstate.pending_buf, dstate.pending_out,
|
||||
next_out, next_out_index, len);
|
||||
|
||||
next_out_index+=len;
|
||||
dstate.pending_out+=len;
|
||||
total_out+=len;
|
||||
avail_out-=len;
|
||||
dstate.pending-=len;
|
||||
if(dstate.pending==0){
|
||||
dstate.pending_out=0;
|
||||
}
|
||||
}
|
||||
|
||||
// Read a new buffer from the current input stream, update the adler32
|
||||
// and total number of bytes read. All deflate() input goes through
|
||||
// this function so some applications may wish to modify it to avoid
|
||||
// allocating a large strm->next_in buffer and copying from it.
|
||||
// (See also flush_pending()).
|
||||
internal int read_buf(byte[] buf, int start, int size) {
|
||||
int len=avail_in;
|
||||
|
||||
if(len>size) len=size;
|
||||
if(len==0) return 0;
|
||||
|
||||
avail_in-=len;
|
||||
|
||||
if(dstate.noheader==0) {
|
||||
adler=_adler.adler32(adler, next_in, next_in_index, len);
|
||||
}
|
||||
System.Array.Copy(next_in, next_in_index, buf, start, len);
|
||||
next_in_index += len;
|
||||
total_in += len;
|
||||
return len;
|
||||
}
|
||||
|
||||
public void free(){
|
||||
next_in=null;
|
||||
next_out=null;
|
||||
msg=null;
|
||||
_adler=null;
|
||||
}
|
||||
}
|
||||
}
|
Reference in New Issue
Block a user