wireshark/wsutil/wmem/wmem_array.c

180 lines
3.9 KiB
C
Raw Normal View History

/* wmem_array.c
* Wireshark Memory Manager Array
* Copyright 2013, Evan Huus <eapache@gmail.com>
*
* Wireshark - Network traffic analyzer
* By Gerald Combs <gerald@wireshark.org>
* Copyright 1998 Gerald Combs
*
* SPDX-License-Identifier: GPL-2.0-or-later
*/
#include "config.h"
#include <string.h>
#include <stdlib.h>
#include <glib.h>
#include "wmem_core.h"
#include "wmem_array.h"
/* Holds a wmem-allocated array.
* elem_len is the size of each element
* elem_count is the number of used elements
* alloc_count is the length (in elems) of the raw buffer pointed to by buf,
* regardless of how many elems are used (the contents)
*/
struct _wmem_array_t {
wmem_allocator_t *allocator;
guint8 *buf;
gsize elem_size;
guint elem_count;
guint alloc_count;
gboolean null_terminated;
};
wmem_array_t *
wmem_array_sized_new(wmem_allocator_t *allocator, gsize elem_size,
guint alloc_count)
{
wmem_array_t *array;
array = wmem_new(allocator, wmem_array_t);
array->allocator = allocator;
array->elem_size = elem_size;
array->elem_count = 0;
array->alloc_count = alloc_count ? alloc_count : 1;
array->null_terminated = FALSE;
array->buf = (guint8 *)wmem_alloc(array->allocator,
array->elem_size * array->alloc_count);
return array;
}
wmem_array_t *
wmem_array_new(wmem_allocator_t *allocator, const gsize elem_size)
{
wmem_array_t *array;
array = wmem_array_sized_new(allocator, elem_size, 1);
return array;
}
void
wmem_array_grow(wmem_array_t *array, const guint to_add)
{
guint new_alloc_count, new_count;
new_alloc_count = array->alloc_count;
new_count = array->elem_count + to_add;
while (new_alloc_count < new_count) {
new_alloc_count *= 2;
}
if (new_alloc_count == array->alloc_count) {
return;
}
array->buf = (guint8 *)wmem_realloc(array->allocator, array->buf,
new_alloc_count * array->elem_size);
array->alloc_count = new_alloc_count;
}
static void
wmem_array_write_null_terminator(wmem_array_t *array)
{
if (array->null_terminated) {
wmem_array_grow(array, 1);
memset(&array->buf[array->elem_count * array->elem_size], 0x0, array->elem_size);
}
}
void
wmem_array_set_null_terminator(wmem_array_t *array)
{
array->null_terminated = TRUE;
wmem_array_write_null_terminator(array);
}
void
wmem_array_bzero(wmem_array_t *array)
{
memset(array->buf, 0x0, array->elem_size * array->elem_count);
}
void
wmem_array_append(wmem_array_t *array, const void *in, guint count)
{
wmem_array_grow(array, count);
memcpy(&array->buf[array->elem_count * array->elem_size], in,
count * array->elem_size);
array->elem_count += count;
wmem_array_write_null_terminator(array);
}
void *
wmem_array_index(wmem_array_t *array, guint array_index)
{
g_assert(array_index < array->elem_count);
return &array->buf[array_index * array->elem_size];
}
smb2: add support for decompression The latest iteration of Microsoft updates to SMB3 added compression to the protocol. This commit implements decompressing and dissecting compressed payloads. The compression algorithms that can be used are "Plain LZ77", "LZ77+Huffman" and "LZNT1" which you can read more about in the [MS-XCA] documentation. This set of algorithm is sometimes referred to as XPRESS. This commit reuses the existing uncompression API scheme already in place with zlib and brotli and adds 3 tvb_uncompress_*() function implemented in: * epan/tvbuff_lz77.c * epan/tvbuff_lz77huff.c * epan/tvbuff_lznt1.c A new function wmem_array_try_index() was added to the wmem_array API to make bound checked reads that fail gracefully. New tests for it have been added as well. Since both reads (tvb) and writes (wmem_array) are bound checked the risk for buffer overruns is drastically reduced. LZ77+Huffman has decoding tables and special care was taken to bound check these. Simplified versions of the implementations were succesfully tested against AFL (American Fuzzy Lop) for ~150 millions executions each. The SMB2/3 dissector was changed to deal with the new transform header for compressed packets (new protocol_id value) and READ request flags (COMPRESSED). Badly compressed or encrypted packets are now reported as such, and the decryption test suite was changed to reflect that. This commit also adds a test capture with 1 packet compressed with each algorithm as returned by Windows Server 2019, along with 3 matching tests in test/suite_dissection.py Change-Id: I2b84f56541f2f4ee7d886152794b993987dd10e7 Reviewed-on: https://code.wireshark.org/review/33855 Petri-Dish: Anders Broman <a.broman58@gmail.com> Tested-by: Petri Dish Buildbot Reviewed-by: Peter Wu <peter@lekensteyn.nl>
2019-07-05 14:08:18 +00:00
int
wmem_array_try_index(wmem_array_t *array, guint array_index, void *val)
{
if (array_index >= array->elem_count)
return -1;
memcpy(val, &array->buf[array_index * array->elem_size], array->elem_size);
return 0;
}
void
wmem_array_sort(wmem_array_t *array, int (*compar)(const void*,const void*))
{
qsort(array->buf, array->elem_count, array->elem_size, compar);
}
void *
wmem_array_get_raw(wmem_array_t *array)
{
return array->buf;
}
guint
wmem_array_get_count(wmem_array_t *array)
{
return array->elem_count;
}
void
wmem_destroy_array(wmem_array_t *array)
{
wmem_free(array->allocator, array->buf);
wmem_free(array->allocator, array);
}
/*
* Editor modelines - https://www.wireshark.org/tools/modelines.html
*
* Local variables:
* c-basic-offset: 4
* tab-width: 8
* indent-tabs-mode: nil
* End:
*
* vi: set shiftwidth=4 tabstop=8 expandtab:
* :indentSize=4:tabSize=8:noTabs=true:
*/