org.tukaani.xz.rangecoder.RangeDecoderFromBuffer Maven / Gradle / Ivy
Go to download
Show more of this group Show more artifacts with this name
Show all versions of commons-compress Show documentation
Show all versions of commons-compress Show documentation
This artifact contains the same classes as
${modularized.groupId}%${modularized.artifactId}%${modularized.version}
but also a module-info.class
/*
* RangeDecoderFromBuffer
*
* Authors: Lasse Collin
* Igor Pavlov
*
* This file has been put into the public domain.
* You can do whatever you want with this file.
*/
package org.tukaani.xz.rangecoder;
import java.io.DataInputStream;
import java.io.IOException;
import org.tukaani.xz.ArrayCache;
import org.tukaani.xz.CorruptedInputException;
public final class RangeDecoderFromBuffer extends RangeDecoder {
private static final int INIT_SIZE = 5;
private final byte[] buf;
private int pos;
public RangeDecoderFromBuffer(int inputSizeMax, ArrayCache arrayCache) {
// We will use the *end* of the array so if the cache gives us
// a bigger-than-requested array, we still want to use buf.length.
buf = arrayCache.getByteArray(inputSizeMax - INIT_SIZE, false);
pos = buf.length;
}
public void putArraysToCache(ArrayCache arrayCache) {
arrayCache.putArray(buf);
}
public void prepareInputBuffer(DataInputStream in, int len)
throws IOException {
if (len < INIT_SIZE)
throw new CorruptedInputException();
if (in.readUnsignedByte() != 0x00)
throw new CorruptedInputException();
code = in.readInt();
range = 0xFFFFFFFF;
// Read the data to the end of the buffer. If the data is corrupt
// and the decoder, reading from buf, tries to read past the end of
// the data, ArrayIndexOutOfBoundsException will be thrown and
// the problem is detected immediately.
len -= INIT_SIZE;
pos = buf.length - len;
in.readFully(buf, pos, len);
}
public boolean isFinished() {
return pos == buf.length && code == 0;
}
public void normalize() throws IOException {
if ((range & TOP_MASK) == 0) {
try {
// If the input is corrupt, this might throw
// ArrayIndexOutOfBoundsException.
code = (code << SHIFT_BITS) | (buf[pos++] & 0xFF);
range <<= SHIFT_BITS;
} catch (ArrayIndexOutOfBoundsException e) {
throw new CorruptedInputException();
}
}
}
}
© 2015 - 2025 Weber Informatics LLC | Privacy Policy