/* -*- Mode: C++; tab-width: 4; indent-tabs-mode: nil; c-basic-offset: 4 -*- */ /* * This file is part of the LibreOffice project. * * This Source Code Form is subject to the terms of the Mozilla Public * License, v. 2.0. If a copy of the MPL was not distributed with this * file, You can obtain one at http://mozilla.org/MPL/2.0/. * * This file incorporates work covered by the following license notice: * * Licensed to the Apache Software Foundation (ASF) under one or more * contributor license agreements. See the NOTICE file distributed * with this work for additional information regarding copyright * ownership. The ASF licenses this file to you under the Apache * License, Version 2.0 (the "License"); you may not use this file * except in compliance with the License. You may obtain a copy of * the License at http://www.apache.org/licenses/LICENSE-2.0 . */ #include "ManifestImport.hxx" #include "ManifestDefines.hxx" #include #include #include #include #include #include #include #include using namespace com::sun::star::uno; using namespace com::sun::star::beans; using namespace com::sun::star; using namespace std; static const OUStringLiteral gsFileEntryElement ( ELEMENT_FILE_ENTRY ); static const OUStringLiteral gsEncryptionDataElement( ELEMENT_ENCRYPTION_DATA ); static const OUStringLiteral gsAlgorithmElement ( ELEMENT_ALGORITHM ); static const OUStringLiteral gsStartKeyAlgElement ( ELEMENT_START_KEY_GENERATION ); static const OUStringLiteral gsKeyDerivationElement( ELEMENT_KEY_DERIVATION ); static const OUStringLiteral gsMediaTypeAttribute ( ATTRIBUTE_MEDIA_TYPE ); static const OUStringLiteral gsVersionAttribute ( ATTRIBUTE_VERSION ); static const OUStringLiteral gsFullPathAttribute ( ATTRIBUTE_FULL_PATH ); static const OUStringLiteral gsSizeAttribute ( ATTRIBUTE_SIZE ); static const OUStringLiteral gsSaltAttribute ( ATTRIBUTE_SALT ); static const OUStringLiteral gsInitialisationVectorAttribute ( ATTRIBUTE_INITIALISATION_VECTOR ); static const OUStringLiteral gsIterationCountAttribute ( ATTRIBUTE_ITERATION_COUNT ); static const OUStringLiteral gsKeySizeAttribute ( ATTRIBUTE_KEY_SIZE ); static const OUStringLiteral gsAlgorithmNameAttribute ( ATTRIBUTE_ALGORITHM_NAME ); static const OUStringLiteral gsStartKeyAlgNameAttribute ( ATTRIBUTE_START_KEY_GENERATION_NAME ); static const OUStringLiteral gsKeyDerivationNameAttribute ( ATTRIBUTE_KEY_DERIVATION_NAME ); static const OUStringLiteral gsChecksumAttribute ( ATTRIBUTE_CHECKSUM ); static const OUStringLiteral gsChecksumTypeAttribute ( ATTRIBUTE_CHECKSUM_TYPE ); static const OUStringLiteral gsKeyInfoElement ( ELEMENT_ENCRYPTED_KEYINFO ); static const OUStringLiteral gsManifestKeyInfoElement ( ELEMENT_MANIFEST_KEYINFO ); static const OUStringLiteral gsEncryptedKeyElement ( ELEMENT_ENCRYPTEDKEY ); static const OUStringLiteral gsEncryptionMethodElement ( ELEMENT_ENCRYPTIONMETHOD ); static const OUStringLiteral gsPgpDataElement ( ELEMENT_PGPDATA ); static const OUStringLiteral gsPgpKeyIDElement ( ELEMENT_PGPKEYID ); static const OUStringLiteral gsPGPKeyPacketElement ( ELEMENT_PGPKEYPACKET ); static const OUStringLiteral gsAlgorithmAttribute ( ATTRIBUTE_ALGORITHM ); static const OUStringLiteral gsCipherDataElement ( ELEMENT_CIPHERDATA ); static const OUStringLiteral gsCipherValueElement ( ELEMENT_CIPHERVALUE ); static const OUStringLiteral gsManifestKeyInfoElement13 ( ELEMENT_MANIFEST13_KEYINFO ); static const OUStringLiteral gsEncryptedKeyElement13 ( ELEMENT_ENCRYPTEDKEY13 ); static const OUStringLiteral gsEncryptionMethodElement13 ( ELEMENT_ENCRYPTIONMETHOD13 ); static const OUStringLiteral gsPgpDataElement13 ( ELEMENT_PGPDATA13 ); static const OUStringLiteral gsPgpKeyIDElement13 ( ELEMENT_PGPKEYID13 ); static const OUStringLiteral gsPGPKeyPacketElement13 ( ELEMENT_PGPKEYPACKET13 ); static const OUStringLiteral gsAlgorithmAttribute13 ( ATTRIBUTE_ALGORITHM13 ); static const OUStringLiteral gsCipherDataElement13 ( ELEMENT_CIPHERDATA13 ); static const OUStringLiteral gsCipherValueElement13 ( ELEMENT_CIPHERVALUE13 ); static const OUStringLiteral gsFullPathProperty ( "FullPath" ); static const OUStringLiteral gsMediaTypeProperty ( "MediaType" ); static const OUStringLiteral gsVersionProperty ( "Version" ); static const OUStringLiteral gsIterationCountProperty ( "IterationCount" ); static const OUStringLiteral gsDerivedKeySizeProperty ( "DerivedKeySize" ); static const OUStringLiteral gsSaltProperty ( "Salt" ); static const OUStringLiteral gsInitialisationVectorProperty ( "InitialisationVector" ); static const OUStringLiteral gsSizeProperty ( "Size" ); static const OUStringLiteral gsDigestProperty ( "Digest" ); static const OUStringLiteral gsEncryptionAlgProperty ( "EncryptionAlgorithm" ); static const OUStringLiteral gsStartKeyAlgProperty ( "StartKeyAlgorithm" ); static const OUStringLiteral gsDigestAlgProperty ( "DigestAlgorithm" ); static const OUStringLiteral gsSHA256_URL_ODF12 ( SHA256_URL_ODF12 ); static const OUStringLiteral gsSHA256_URL ( SHA256_URL ); static const OUStringLiteral gsSHA1_Name ( SHA1_NAME ); static const OUStringLiteral gsSHA1_URL ( SHA1_URL ); static const OUStringLiteral gsSHA256_1k_URL ( SHA256_1K_URL ); static const OUStringLiteral gsSHA1_1k_Name ( SHA1_1K_NAME ); static const OUStringLiteral gsSHA1_1k_URL ( SHA1_1K_URL ); static const OUStringLiteral gsBlowfish_Name ( BLOWFISH_NAME ); static const OUStringLiteral gsBlowfish_URL ( BLOWFISH_URL ); static const OUStringLiteral gsAES128_URL ( AES128_URL ); static const OUStringLiteral gsAES192_URL ( AES192_URL ); static const OUStringLiteral gsAES256_URL ( AES256_URL ); static const OUStringLiteral gsPBKDF2_Name ( PBKDF2_NAME ); static const OUStringLiteral gsPBKDF2_URL ( PBKDF2_URL ); ManifestImport::ManifestImport( vector < Sequence < PropertyValue > > & rNewManVector ) : bIgnoreEncryptData ( false ) , bPgpEncryption ( false ) , nDerivedKeySize( 0 ) , rManVector ( rNewManVector ) { aStack.reserve( 10 ); } ManifestImport::~ManifestImport() { } void SAL_CALL ManifestImport::startDocument( ) { } void SAL_CALL ManifestImport::endDocument( ) { } void ManifestImport::doFileEntry(StringHashMap &rConvertedAttribs) { aSequence.resize(PKG_SIZE_ENCR_MNFST); aSequence[PKG_MNFST_FULLPATH].Name = gsFullPathProperty; aSequence[PKG_MNFST_FULLPATH].Value <<= rConvertedAttribs[gsFullPathAttribute]; aSequence[PKG_MNFST_MEDIATYPE].Name = gsMediaTypeProperty; aSequence[PKG_MNFST_MEDIATYPE].Value <<= rConvertedAttribs[gsMediaTypeAttribute]; OUString sVersion = rConvertedAttribs[gsVersionAttribute]; if ( sVersion.getLength() ) { aSequence[PKG_MNFST_VERSION].Name = gsVersionProperty; aSequence[PKG_MNFST_VERSION].Value <<= sVersion; } OUString sSize = rConvertedAttribs[gsSizeAttribute]; if ( sSize.getLength() ) { sal_Int64 nSize = sSize.toInt64(); aSequence[PKG_MNFST_UCOMPSIZE].Name = gsSizeProperty; aSequence[PKG_MNFST_UCOMPSIZE].Value <<= nSize; } } void ManifestImport::doEncryptedKey(StringHashMap &) { aKeyInfoSequence.clear(); aKeyInfoSequence.resize(3); } void ManifestImport::doEncryptionMethod(StringHashMap &rConvertedAttribs, const OUString& rAlgoAttrName) { OUString aString = rConvertedAttribs[rAlgoAttrName]; if ( aKeyInfoSequence.size() != 3 || aString != "http://www.w3.org/2001/04/xmlenc#rsa-oaep-mgf1p" ) { bIgnoreEncryptData = true; } } void ManifestImport::doEncryptedCipherValue() { if ( aKeyInfoSequence.size() == 3 ) { aKeyInfoSequence[2].Name = "CipherValue"; uno::Sequence < sal_Int8 > aDecodeBuffer; ::comphelper::Base64::decode(aDecodeBuffer, aCurrentCharacters.toString()); aKeyInfoSequence[2].Value <<= aDecodeBuffer; aCurrentCharacters = ""; // consumed } else bIgnoreEncryptData = true; } void ManifestImport::doEncryptedKeyId() { if ( aKeyInfoSequence.size() == 3 ) { aKeyInfoSequence[0].Name = "KeyId"; uno::Sequence < sal_Int8 > aDecodeBuffer; ::comphelper::Base64::decode(aDecodeBuffer, aCurrentCharacters.toString()); aKeyInfoSequence[0].Value <<= aDecodeBuffer; aCurrentCharacters = ""; // consumed } else bIgnoreEncryptData = true; } void ManifestImport::doEncryptedKeyPacket() { if ( aKeyInfoSequence.size() == 3 ) { aKeyInfoSequence[1].Name = "KeyPacket"; uno::Sequence < sal_Int8 > aDecodeBuffer; ::comphelper::Base64::decode(aDecodeBuffer, aCurrentCharacters.toString()); aKeyInfoSequence[1].Value <<= aDecodeBuffer; aCurrentCharacters = ""; // consumed } else bIgnoreEncryptData = true; } void ManifestImport::doEncryptionData(StringHashMap &rConvertedAttribs) { // If this element exists, then this stream is encrypted and we need // to import the initialisation vector, salt and iteration count used nDerivedKeySize = 0; OUString aString = rConvertedAttribs[gsChecksumTypeAttribute]; if ( bIgnoreEncryptData ) return; if ( aString == gsSHA1_1k_Name || aString == gsSHA1_1k_URL ) { aSequence[PKG_MNFST_DIGESTALG].Name = gsDigestAlgProperty; aSequence[PKG_MNFST_DIGESTALG].Value <<= xml::crypto::DigestID::SHA1_1K; } else if ( aString == gsSHA256_1k_URL ) { aSequence[PKG_MNFST_DIGESTALG].Name = gsDigestAlgProperty; aSequence[PKG_MNFST_DIGESTALG].Value <<= xml::crypto::DigestID::SHA256_1K; } else bIgnoreEncryptData = true; if ( !bIgnoreEncryptData ) { aString = rConvertedAttribs[gsChecksumAttribute]; uno::Sequence < sal_Int8 > aDecodeBuffer; ::comphelper::Base64::decode(aDecodeBuffer, aString); aSequence[PKG_MNFST_DIGEST].Name = gsDigestProperty; aSequence[PKG_MNFST_DIGEST].Value <<= aDecodeBuffer; } } void ManifestImport::doAlgorithm(StringHashMap &rConvertedAttribs) { if ( bIgnoreEncryptData ) return; OUString aString = rConvertedAttribs[gsAlgorithmNameAttribute]; if ( aString == gsBlowfish_Name || aString == gsBlowfish_URL ) { aSequence[PKG_MNFST_ENCALG].Name = gsEncryptionAlgProperty; aSequence[PKG_MNFST_ENCALG].Value <<= xml::crypto::CipherID::BLOWFISH_CFB_8; } else if ( aString == gsAES256_URL ) { aSequence[PKG_MNFST_ENCALG].Name = gsEncryptionAlgProperty; aSequence[PKG_MNFST_ENCALG].Value <<= xml::crypto::CipherID::AES_CBC_W3C_PADDING; OSL_ENSURE( !nDerivedKeySize || nDerivedKeySize == 32, "Unexpected derived key length!" ); nDerivedKeySize = 32; } else if ( aString == gsAES192_URL ) { aSequence[PKG_MNFST_ENCALG].Name = gsEncryptionAlgProperty; aSequence[PKG_MNFST_ENCALG].Value <<= xml::crypto::CipherID::AES_CBC_W3C_PADDING; OSL_ENSURE( !nDerivedKeySize || nDerivedKeySize == 24, "Unexpected derived key length!" ); nDerivedKeySize = 24; } else if ( aString == gsAES128_URL ) { aSequence[PKG_MNFST_ENCALG].Name = gsEncryptionAlgProperty; aSequence[PKG_MNFST_ENCALG].Value <<= xml::crypto::CipherID::AES_CBC_W3C_PADDING; OSL_ENSURE( !nDerivedKeySize || nDerivedKeySize == 16, "Unexpected derived key length!" ); nDerivedKeySize = 16; } else bIgnoreEncryptData = true; if ( !bIgnoreEncryptData ) { aString = rConvertedAttribs[gsInitialisationVectorAttribute]; uno::Sequence < sal_Int8 > aDecodeBuffer; ::comphelper::Base64::decode(aDecodeBuffer, aString); aSequence[PKG_MNFST_INIVECTOR].Name = gsInitialisationVectorProperty; aSequence[PKG_MNFST_INIVECTOR].Value <<= aDecodeBuffer; } } void ManifestImport::doKeyDerivation(StringHashMap &rConvertedAttribs) { if ( bIgnoreEncryptData ) return; OUString aString = rConvertedAttribs[gsKeyDerivationNameAttribute]; if ( aString == gsPBKDF2_Name || aString == gsPBKDF2_URL ) { aString = rConvertedAttribs[gsSaltAttribute]; uno::Sequence < sal_Int8 > aDecodeBuffer; ::comphelper::Base64::decode(aDecodeBuffer, aString); aSequence[PKG_MNFST_SALT].Name = gsSaltProperty; aSequence[PKG_MNFST_SALT].Value <<= aDecodeBuffer; aString = rConvertedAttribs[gsIterationCountAttribute]; aSequence[PKG_MNFST_ITERATION].Name = gsIterationCountProperty; aSequence[PKG_MNFST_ITERATION].Value <<= aString.toInt32(); aString = rConvertedAttribs[gsKeySizeAttribute]; if ( aString.getLength() ) { sal_Int32 nKey = aString.toInt32(); OSL_ENSURE( !nDerivedKeySize || nKey == nDerivedKeySize , "Provided derived key length differs from the expected one!" ); nDerivedKeySize = nKey; } else if ( !nDerivedKeySize ) nDerivedKeySize = 16; else if ( nDerivedKeySize != 16 ) OSL_ENSURE( false, "Default derived key length differs from the expected one!" ); aSequence[PKG_MNFST_DERKEYSIZE].Name = gsDerivedKeySizeProperty; aSequence[PKG_MNFST_DERKEYSIZE].Value <<= nDerivedKeySize; } else if ( bPgpEncryption ) { if ( aString != "PGP" ) bIgnoreEncryptData = true; } else bIgnoreEncryptData = true; } void ManifestImport::doStartKeyAlg(StringHashMap &rConvertedAttribs) { OUString aString = rConvertedAttribs[gsStartKeyAlgNameAttribute]; if (aString == gsSHA256_URL || aString == gsSHA256_URL_ODF12) { aSequence[PKG_MNFST_STARTALG].Name = gsStartKeyAlgProperty; aSequence[PKG_MNFST_STARTALG].Value <<= xml::crypto::DigestID::SHA256; } else if ( aString == gsSHA1_Name || aString == gsSHA1_URL ) { aSequence[PKG_MNFST_STARTALG].Name = gsStartKeyAlgProperty; aSequence[PKG_MNFST_STARTALG].Value <<= xml::crypto::DigestID::SHA1; } else bIgnoreEncryptData = true; } void SAL_CALL ManifestImport::startElement( const OUString& aName, const uno::Reference< xml::sax::XAttributeList >& xAttribs ) { StringHashMap aConvertedAttribs; OUString aConvertedName = PushNameAndNamespaces( aName, xAttribs, aConvertedAttribs ); size_t nLevel = aStack.size(); assert(nLevel >= 1); switch (nLevel) { case 1: { if (aConvertedName != ELEMENT_MANIFEST) //manifest:manifest aStack.back().m_bValid = false; break; } case 2: { if (aConvertedName == gsFileEntryElement) //manifest:file-entry doFileEntry(aConvertedAttribs); else if (aConvertedName == gsManifestKeyInfoElement) //loext:keyinfo ; else if (aConvertedName == gsEncryptedKeyElement13) //manifest:encrypted-key doEncryptedKey(aConvertedAttribs); else aStack.back().m_bValid = false; break; } case 3: { ManifestStack::reverse_iterator aIter = aStack.rbegin(); ++aIter; if (!aIter->m_bValid) aStack.back().m_bValid = false; else if (aConvertedName == gsEncryptionDataElement) //manifest:encryption-data doEncryptionData(aConvertedAttribs); else if (aConvertedName == gsEncryptedKeyElement) //loext:encrypted-key doEncryptedKey(aConvertedAttribs); else if (aConvertedName == gsEncryptionMethodElement13) //manifest:encryption-method doEncryptionMethod(aConvertedAttribs, gsAlgorithmAttribute13); else if (aConvertedName == gsManifestKeyInfoElement13) //manifest:keyinfo ; else if (aConvertedName == gsCipherDataElement13) //manifest:CipherData ; else aStack.back().m_bValid = false; break; } case 4: { ManifestStack::reverse_iterator aIter = aStack.rbegin(); ++aIter; if (!aIter->m_bValid) aStack.back().m_bValid = false; else if (aConvertedName == gsAlgorithmElement) //manifest:algorithm, doAlgorithm(aConvertedAttribs); else if (aConvertedName == gsKeyDerivationElement) //manifest:key-derivation, doKeyDerivation(aConvertedAttribs); else if (aConvertedName == gsStartKeyAlgElement) //manifest:start-key-generation doStartKeyAlg(aConvertedAttribs); else if (aConvertedName == gsEncryptionMethodElement) //loext:encryption-method doEncryptionMethod(aConvertedAttribs, gsAlgorithmAttribute); else if (aConvertedName == gsKeyInfoElement) //loext:KeyInfo ; else if (aConvertedName == gsCipherDataElement) //loext:CipherData ; else if (aConvertedName == gsPgpDataElement13) //manifest:PGPData ; else if (aConvertedName == gsCipherValueElement13) //manifest:CipherValue // ciphervalue action happens on endElement aCurrentCharacters = ""; else aStack.back().m_bValid = false; break; } case 5: { ManifestStack::reverse_iterator aIter = aStack.rbegin(); ++aIter; if (!aIter->m_bValid) aStack.back().m_bValid = false; else if (aConvertedName == gsPgpDataElement) //loext:PGPData ; else if (aConvertedName == gsCipherValueElement) //loext:CipherValue // ciphervalue action happens on endElement aCurrentCharacters = ""; else if (aConvertedName == gsPgpKeyIDElement13) //manifest:PGPKeyID // ciphervalue action happens on endElement aCurrentCharacters = ""; else if (aConvertedName == gsPGPKeyPacketElement13) //manifest:PGPKeyPacket // ciphervalue action happens on endElement aCurrentCharacters = ""; else aStack.back().m_bValid = false; break; } case 6: { ManifestStack::reverse_iterator aIter = aStack.rbegin(); ++aIter; if (!aIter->m_bValid) aStack.back().m_bValid = false; else if (aConvertedName == gsPgpKeyIDElement) //loext:PGPKeyID // ciphervalue action happens on endElement aCurrentCharacters = ""; else if (aConvertedName == gsPGPKeyPacketElement) //loext:PGPKeyPacket // ciphervalue action happens on endElement aCurrentCharacters = ""; else aStack.back().m_bValid = false; break; } default: aStack.back().m_bValid = false; break; } } namespace { bool isEmpty(const css::beans::PropertyValue &rProp) { return rProp.Name.isEmpty(); } } void SAL_CALL ManifestImport::endElement( const OUString& aName ) { size_t nLevel = aStack.size(); assert(nLevel >= 1); OUString aConvertedName = ConvertName( aName ); if ( !(!aStack.empty() && aStack.rbegin()->m_aConvertedName == aConvertedName) ) return; if ( aConvertedName == gsFileEntryElement && aStack.back().m_bValid ) { // root folder gets KeyInfo entry if any, for PGP encryption if (!bIgnoreEncryptData && !aKeys.empty() && aSequence[PKG_MNFST_FULLPATH].Value.get() == "/" ) { aSequence[PKG_SIZE_NOENCR_MNFST].Name = "KeyInfo"; aSequence[PKG_SIZE_NOENCR_MNFST].Value <<= comphelper::containerToSequence(aKeys); } aSequence.erase(std::remove_if(aSequence.begin(), aSequence.end(), isEmpty), aSequence.end()); bIgnoreEncryptData = false; rManVector.push_back ( comphelper::containerToSequence(aSequence) ); aSequence.clear(); } else if ( (aConvertedName == gsEncryptedKeyElement || aConvertedName == gsEncryptedKeyElement13) && aStack.back().m_bValid ) { if ( !bIgnoreEncryptData ) { aKeys.push_back( comphelper::containerToSequence(aKeyInfoSequence) ); bPgpEncryption = true; } aKeyInfoSequence.clear(); } // end element handling for elements with cdata switch (nLevel) { case 4: { if (aConvertedName == gsCipherValueElement13) //manifest:CipherValue doEncryptedCipherValue(); else aStack.back().m_bValid = false; break; } case 5: { if (aConvertedName == gsCipherValueElement) //loext:CipherValue doEncryptedCipherValue(); else if (aConvertedName == gsPgpKeyIDElement13) //manifest:PGPKeyID doEncryptedKeyId(); else if (aConvertedName == gsPGPKeyPacketElement13) //manifest:PGPKeyPacket doEncryptedKeyPacket(); else aStack.back().m_bValid = false; break; } case 6: { if (aConvertedName == gsPgpKeyIDElement) //loext:PGPKeyID doEncryptedKeyId(); else if (aConvertedName == gsPGPKeyPacketElement) //loext:PGPKeyPacket doEncryptedKeyPacket(); else aStack.back().m_bValid = false; break; } } aStack.pop_back(); } void SAL_CALL ManifestImport::characters( const OUString& aChars ) { aCurrentCharacters.append(aChars); } void SAL_CALL ManifestImport::ignorableWhitespace( const OUString& /*aWhitespaces*/ ) { } void SAL_CALL ManifestImport::processingInstruction( const OUString& /*aTarget*/, const OUString& /*aData*/ ) { } void SAL_CALL ManifestImport::setDocumentLocator( const uno::Reference< xml::sax::XLocator >& /*xLocator*/ ) { } OUString ManifestImport::PushNameAndNamespaces( const OUString& aName, const uno::Reference< xml::sax::XAttributeList >& xAttribs, StringHashMap& o_aConvertedAttribs ) { StringHashMap aNamespaces; ::std::vector< ::std::pair< OUString, OUString > > aAttribsStrs; if ( xAttribs.is() ) { sal_Int16 nAttrCount = xAttribs.is() ? xAttribs->getLength() : 0; aAttribsStrs.reserve( nAttrCount ); for( sal_Int16 nInd = 0; nInd < nAttrCount; nInd++ ) { OUString aAttrName = xAttribs->getNameByIndex( nInd ); OUString aAttrValue = xAttribs->getValueByIndex( nInd ); if ( aAttrName.getLength() >= 5 && aAttrName.startsWith("xmlns") && ( aAttrName.getLength() == 5 || aAttrName[5] == ':' ) ) { // this is a namespace declaration OUString aNsName( ( aAttrName.getLength() == 5 ) ? OUString() : aAttrName.copy( 6 ) ); aNamespaces[aNsName] = aAttrValue; } else { // this is no namespace declaration aAttribsStrs.emplace_back( aAttrName, aAttrValue ); } } } OUString aConvertedName = ConvertNameWithNamespace( aName, aNamespaces ); if ( !aConvertedName.getLength() ) aConvertedName = ConvertName( aName ); aStack.emplace_back( aConvertedName, aNamespaces ); for (const std::pair & rAttribsStr : aAttribsStrs) { // convert the attribute names on filling o_aConvertedAttribs[ConvertName( rAttribsStr.first )] = rAttribsStr.second; } return aConvertedName; } OUString ManifestImport::ConvertNameWithNamespace( const OUString& aName, const StringHashMap& aNamespaces ) { OUString aNsAlias; OUString aPureName = aName; sal_Int32 nInd = aName.indexOf( ':' ); if ( nInd != -1 && nInd < aName.getLength() ) { aNsAlias = aName.copy( 0, nInd ); aPureName = aName.copy( nInd + 1 ); } OUString aResult; StringHashMap::const_iterator aIter = aNamespaces.find( aNsAlias ); if ( aIter != aNamespaces.end() && ( aIter->second == MANIFEST_NAMESPACE || aIter->second == MANIFEST_OASIS_NAMESPACE ) ) { // no check for manifest.xml consistency currently since the old versions have supported inconsistent documents as well aResult = MANIFEST_NSPREFIX + aPureName; } return aResult; } OUString ManifestImport::ConvertName( const OUString& aName ) { OUString aConvertedName; for ( ManifestStack::reverse_iterator aIter = aStack.rbegin(); !aConvertedName.getLength() && aIter != aStack.rend(); ++aIter ) { if ( !aIter->m_aNamespaces.empty() ) aConvertedName = ConvertNameWithNamespace( aName, aIter->m_aNamespaces ); } if ( !aConvertedName.getLength() ) aConvertedName = aName; return aConvertedName; } /* vim:set shiftwidth=4 softtabstop=4 expandtab: */