blob: e63e55c7210d8a498b531726b6650b4bf17372a9 (
plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
|
/*
Copyright (c) 2008 TrueCrypt Developers Association. All rights reserved.
Governed by the TrueCrypt License 3.0 the full text of which is contained in
the file License.txt included in TrueCrypt binary and source code distribution
packages.
*/
#include "File.h"
#ifdef TC_UNIX
#include <sys/types.h>
#include <sys/stat.h>
#include <unistd.h>
#include <utime.h>
#endif
namespace VeraCrypt
{
File::~File ()
{
try
{
if (FileIsOpen)
Close();
}
catch (...) { }
}
void File::Copy (const FilePath &sourcePath, const FilePath &destinationPath, bool preserveTimestamps)
{
File source;
source.Open (sourcePath);
File destination;
destination.Open (destinationPath, CreateWrite);
SecureBuffer buffer (OptimalReadSize);
uint64 len;
while ((len = source.Read (buffer)) > 0)
{
destination.Write (buffer, static_cast <size_t> (len));
}
if (preserveTimestamps)
{
destination.Flush();
#ifndef TC_WINDOWS
struct stat statData;
throw_sys_sub_if (stat (string (sourcePath).c_str(), &statData) == -1, wstring (sourcePath));
struct utimbuf u;
u.actime = statData.st_atime;
u.modtime = statData.st_mtime;
throw_sys_sub_if (utime (string (destinationPath).c_str(), &u) == -1, wstring (destinationPath));
#endif
}
}
FilePath File::GetPath () const
{
if_debug (ValidateState());
return Path;
}
void File::ReadCompleteBuffer (const BufferPtr &buffer) const
{
size_t dataLeft = buffer.Size();
size_t offset = 0;
while (dataLeft > 0)
{
size_t dataRead = static_cast <size_t> (Read (buffer.GetRange (offset, dataLeft)));
if (dataRead == 0)
throw InsufficientData (SRC_POS);
dataLeft -= dataRead;
offset += dataRead;
}
}
void File::ValidateState () const
{
if (!FileIsOpen)
throw NotInitialized (SRC_POS);
}
}
|