MalwareSourceCode/MSIL/Virus/Win32/E/Virus.Win32.Expiro.w-1f15ee7e9f7da02b6bfb4c5a5e6484eb9fa71b82d3699c54bcc7a31794b4a66d/Microsoft/InfoCards/InfocardExtendedInformationEntry.cs
2022-08-18 06:28:56 -05:00

44 lines
1.6 KiB
C#

// Decompiled with JetBrains decompiler
// Type: Microsoft.InfoCards.InfocardExtendedInformationEntry
// Assembly: infocard, Version=3.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089
// MVID: ADE0A079-11DB-4A46-8BDE-D2A592CA8DEA
// Assembly location: C:\Users\Administrateur\Downloads\Virusshare-00001-msil\Virus.Win32.Expiro.w-1f15ee7e9f7da02b6bfb4c5a5e6484eb9fa71b82d3699c54bcc7a31794b4a66d.exe
using Microsoft.InfoCards.Diagnostics;
using System;
using System.IO;
using System.Xml;
using System.Xml.Serialization;
namespace Microsoft.InfoCards
{
internal class InfocardExtendedInformationEntry : IXmlSerializable
{
private string m_xmlElement;
public void Serialize(BinaryWriter writer) => Utility.SerializeString(writer, this.m_xmlElement);
public void Deserialize(BinaryReader reader) => this.m_xmlElement = Utility.DeserializeString(reader);
public string GetXml() => this.m_xmlElement;
public System.Xml.Schema.XmlSchema GetSchema() => (System.Xml.Schema.XmlSchema) null;
public void WriteXml(XmlWriter writer)
{
if (writer == null)
throw InfoCardTrace.ThrowHelperArgumentNull(nameof (writer));
XmlReader reader = InfoCardSchemas.CreateReader(this.m_xmlElement);
writer.WriteNode(reader, false);
}
public void ReadXml(XmlReader reader)
{
XmlReader xmlReader = reader.IsStartElement() ? reader.ReadSubtree() : throw InfoCardTrace.ThrowHelperError((Exception) new InvalidCardException(SR.GetString("UnexpectedElement")));
xmlReader.Read();
this.m_xmlElement = xmlReader.ReadOuterXml();
xmlReader.Close();
}
}
}