Code:
/ Dotnetfx_Vista_SP2 / Dotnetfx_Vista_SP2 / 8.0.50727.4016 / DEVDIV / depot / DevDiv / releases / Orcas / QFE / wpf / src / Core / CSharp / MS / Internal / Ink / InkSerializedFormat / Compress.cs / 1 / Compress.cs
//#define OLD_ISF using MS.Utility; using System; using System.Runtime.InteropServices; using System.Security; using System.Globalization; using System.Windows; using System.Windows.Input; using System.Windows.Ink; using MS.Internal.Ink.InkSerializedFormat; using SR = MS.Internal.PresentationCore.SR; using SRID = MS.Internal.PresentationCore.SRID; namespace MS.Internal.Ink.InkSerializedFormat { internal class Compressor #if OLD_ISF : IDisposable #endif { #if OLD_ISF ////// Non-static members /// ////// Critical - This is plutonium, marked critical to /// prevent it from being used from transparent code /// [SecurityCritical] private MS.Win32.Penimc.CompressorSafeHandle _compressorHandle; ////// Compressor constructor. This is called by our ISF decompression /// after reading the ISF header that indicates which type of compression /// was performed on the ISF when it was being compressed. /// /// a byte[] specifying the compressor used to compress the ISF being decompressed /// expected initially to be the length of data, it IsfLoadCompressor sets it to the /// length of the header that is read. They should always match, but in cases where they /// don't, we immediately fail ////// Critical - Calls unmanaged code through MS.Win32.Penimc.UnsafeNativeMethods to instance a compressor /// that is used to decompress packet or property data. The compressor instance is wrapped in a /// safehandle. /// /// This ctor is called by StrokeCollectionSerializer.EncodeRawISF, which is marked TreatAsSafe /// [SecurityCritical] internal Compressor(byte[] data, ref uint size) { if (data == null || data.Length != size) { //we don't raise any information that could be used to attack our ISF code //a simple 'ISF Operation Failed' is sufficient since the user can't do //anything to fix bogus ISF throw new InvalidOperationException(StrokeCollectionSerializer.ISFDebugMessage(SR.Get(SRID.InitializingCompressorFailed))); } _compressorHandle = MS.Win32.Penimc.UnsafeNativeMethods.IsfLoadCompressor(data, ref size); if (_compressorHandle.IsInvalid) { //we don't raise any information that could be used to attack our ISF code //a simple 'ISF Operation Failed' is sufficient since the user can't do //anything to fix bogus ISF throw new InvalidOperationException(StrokeCollectionSerializer.ISFDebugMessage(SR.Get(SRID.InitializingCompressorFailed))); } } ////// DecompressPacketData - take a byte[] or a subset of a byte[] and decompresses it into /// an int[] of packet data (for example, x's in a Stroke) /// /// /// The compressor used to decompress this byte[] of packet data (for example, x's in a Stroke) /// Can be null /// /// The byte[] to decompress /// In: the max size of the subset of compressedInput to read, out: size read /// The int[] to write the packet data to ////// Critical - Calls unmanaged code in MS.Win32.Penimc.UnsafeNativeMethods to decompress /// a byte[] into an int[] of packet data (for example, x's or y's in a Stroke) /// /// This is called by StrokeSerializer.LoadPackets directly. The TreatAsSafe boundary of this call /// is StrokeCollectionSerializer.DecodeRawISF /// [SecurityCritical] #else ////// DecompressPacketData - take a byte[] or a subset of a byte[] and decompresses it into /// an int[] of packet data (for example, x's in a Stroke) /// /// The byte[] to decompress /// In: the max size of the subset of compressedInput to read, out: size read /// The int[] to write the packet data to #endif internal static void DecompressPacketData( #if OLD_ISF Compressor compressor, #endif byte[] compressedInput, ref uint size, int[] decompressedPackets) { #if OLD_ISF // // lock to prevent multi-threaded vulnerabilities // lock (_compressSync) { #endif if (compressedInput == null || size > compressedInput.Length || decompressedPackets == null) { //we don't raise any information that could be used to attack our ISF code //a simple 'ISF Operation Failed' is sufficient since the user can't do //anything to fix bogus ISF throw new InvalidOperationException(StrokeCollectionSerializer.ISFDebugMessage(SR.Get(SRID.DecompressPacketDataFailed))); } #if OLD_ISF uint size2 = size; #endif size = AlgoModule.DecompressPacketData(compressedInput, decompressedPackets); #if OLD_ISF MS.Win32.Penimc.CompressorSafeHandle safeCompressorHandle = (compressor == null) ? MS.Win32.Penimc.CompressorSafeHandle.Null : compressor._compressorHandle; int[] decompressedPackets2 = new int[decompressedPackets.Length]; byte algo = AlgoModule.NoCompression; int hr = MS.Win32.Penimc.UnsafeNativeMethods.IsfDecompressPacketData(safeCompressorHandle, compressedInput, ref size2, (uint)decompressedPackets2.Length, decompressedPackets2, ref algo); if (0 != hr) { //we don't raise any information that could be used to attack our ISF code //a simple 'ISF Operation Failed' is sufficient since the user can't do //anything to fix bogus ISF throw new InvalidOperationException(StrokeCollectionSerializer.ISFDebugMessage("IsfDecompressPacketData returned: " + hr.ToString(CultureInfo.InvariantCulture))); } if (size != size2) { throw new InvalidOperationException("MAGIC EXCEPTION: Packet data bytes read didn't match with new uncompression"); } for (int i = 0; i < decompressedPackets.Length; i++) { if (decompressedPackets[i] != decompressedPackets2[i]) { throw new InvalidOperationException("MAGIC EXCEPTION: Packet data didn't match with new uncompression at index " + i.ToString()); } } } #endif } #if OLD_ISF ////// DecompressPropertyData - decompresses a byte[] representing property data (such as DrawingAttributes.Color) /// /// The byte[] to decompress ////// Critical - Calls unmanaged code in MS.Win32.Penimc.UnsafeNativeMethods to decompress /// a byte[] representing property data /// /// This directly called by ExtendedPropertySerializer.DecodeAsISF. /// DrawingAttributesSerializer.DecodeAsISF. /// StrokeSerializer.DecodeISFIntoStroke. /// /// The TreatAsSafe boundary of this call /// is StrokeCollectionSerializer.DecodeRawISF /// [SecurityCritical] #else ////// DecompressPropertyData - decompresses a byte[] representing property data (such as DrawingAttributes.Color) /// /// The byte[] to decompress #endif internal static byte[] DecompressPropertyData(byte[] input) { #if OLD_ISF // // lock to prevent multi-threaded vulnerabilities // lock (_compressSync) { #endif if (input == null) { //we don't raise any information that could be used to attack our ISF code //a simple 'ISF Operation Failed' is sufficient since the user can't do //anything to fix bogus ISF throw new InvalidOperationException(StrokeCollectionSerializer.ISFDebugMessage(SR.Get(SRID.DecompressPropertyFailed))); } byte[] data = AlgoModule.DecompressPropertyData(input); #if OLD_ISF uint size = 0; byte algo = 0; int hr = MS.Win32.Penimc.UnsafeNativeMethods.IsfDecompressPropertyData(input, (uint)input.Length, ref size, null, ref algo); if (0 == hr) { byte[] data2 = new byte[size]; hr = MS.Win32.Penimc.UnsafeNativeMethods.IsfDecompressPropertyData(input, (uint)input.Length, ref size, data2, ref algo); if (0 == hr) { if (data.Length != data2.Length) { throw new InvalidOperationException("MAGIC EXCEPTION: Property bytes length when decompressed didn't match with new uncompression"); } for (int i = 0; i < data.Length; i++) { if (data[i] != data2[i]) { throw new InvalidOperationException("MAGIC EXCEPTION: Property data didn't match with new property uncompression at index " + i.ToString()); } } return data; } } //we don't raise any information that could be used to attack our ISF code //a simple 'ISF Operation Failed' is sufficient since the user can't do //anything to fix bogus ISF throw new InvalidOperationException(StrokeCollectionSerializer.ISFDebugMessage("IsfDecompressPropertyData returned: " + hr.ToString(CultureInfo.InvariantCulture))); #else return data; #endif #if OLD_ISF } #endif } #if OLD_ISF ////// CompressPropertyData - compresses property data /// /// The property data to compress /// In: the desired algorithm to use. Out: the algorithm used /// In: if output is not null, the size of output. Out: the size required if output is null /// The byte[] to writ the compressed data to ////// Critical - Calls unmanaged code in MS.Win32.Penimc.UnsafeNativeMethods to compress /// a byte[] representing property data /// /// This directly called by ExtendedPropertySerializer.EncodeAsISF /// /// TreatAsSafe boundary is StrokeCollectionSerializer.EncodeISF /// /// [SecurityCritical] internal static void CompressPropertyData(byte[] data, ref byte algorithm, ref uint outputSize, byte[] output) { // // lock to prevent multi-threaded vulnerabilities // lock (_compressSync) { // // it is valid to pass is null for output to check to see what the // required buffer size is. We want to guard against when output is not null // and outputSize doesn't match, as this is passed directly to unmanaged code // and could result in bytes being written past the end of output buffer // if (output != null && outputSize != output.Length) { //we don't raise any information that could be used to attack our ISF code //a simple 'ISF Operation Failed' is sufficient since the user can't do //anything to fix bogus ISF throw new InvalidOperationException(SR.Get(SRID.IsfOperationFailed)); } int hr = MS.Win32.Penimc.UnsafeNativeMethods.IsfCompressPropertyData(data, (uint)data.Length, ref algorithm, ref outputSize, output); if (0 != hr) { //we don't raise any information that could be used to attack our ISF code //a simple 'ISF Operation Failed' is sufficient since the user can't do //anything to fix bogus ISF throw new InvalidOperationException(StrokeCollectionSerializer.ISFDebugMessage("IsfCompressPropertyData returned: " + hr.ToString(CultureInfo.InvariantCulture))); } } } #endif ////// CompressPropertyData /// /// /// ///internal static byte[] CompressPropertyData(byte[] data, byte algorithm) { if (data == null) { //we don't raise any information that could be used to attack our ISF code //a simple 'ISF Operation Failed' is sufficient since the user can't do //anything to fix bogus ISF throw new ArgumentNullException("data"); } return AlgoModule.CompressPropertyData(data, algorithm); } #if OLD_ISF /// /// CompressPropertyData - compresses property data using the compression defined by 'compressor' /// /// The compressor to use. This can be null for default compression /// The int[] of packet data to compress /// In: the desired algorithm to use. Out: the algorithm used ///the compressed data in a byte[] ////// Critical - Calls unmanaged code in MS.Win32.Penimc.UnsafeNativeMethods to compress /// an int[] representing packet data /// /// This directly called by StrokeCollectionSerializer.SaveStrokeIds /// StrokeSerializer.SavePacketPropertyData /// /// TreatAsSafe boundary is StrokeCollectionSerializer.EncodeISF /// /// [SecurityCritical] #else ////// CompressPropertyData - compresses property data using the compression defined by 'compressor' /// /// The int[] of packet data to compress /// In: the desired algorithm to use. Out: the algorithm used ///the compressed data in a byte[] #endif internal static byte[] CompressPacketData( #if OLD_ISF Compressor compressor, #endif int[] input, ref byte algorithm) { #if OLD_ISF // // lock to prevent multi-threaded vulnerabilities // lock (_compressSync) { #endif if (input == null) { //we don't raise any information that could be used to attack our ISF code //a simple 'ISF Operation Failed' is sufficient since the user can't do //anything to fix bogus ISF throw new InvalidOperationException(SR.Get(SRID.IsfOperationFailed)); } byte[] data = AlgoModule.CompressPacketData(input, algorithm); #if OLD_ISF uint cbOutSize = 0; MS.Win32.Penimc.CompressorSafeHandle safeCompressorHandle = (compressor == null) ? MS.Win32.Penimc.CompressorSafeHandle.Null : compressor._compressorHandle; int hr = MS.Win32.Penimc.UnsafeNativeMethods.IsfCompressPacketData(safeCompressorHandle, input, (uint)input.Length, ref algorithm, ref cbOutSize, null); if (0 == hr) { byte[] data2 = new byte[cbOutSize]; hr = MS.Win32.Penimc.UnsafeNativeMethods.IsfCompressPacketData(safeCompressorHandle, input, (uint)input.Length, ref algorithm, ref cbOutSize, data2); if (0 == hr) { //see if data matches if (data2.Length != data.Length) { throw new InvalidOperationException("MAGIC EXCEPTION: Packet data length didn't match with new compression"); } for (int i = 0; i < data2.Length; i++) { if (data2[i] != data[i]) { throw new InvalidOperationException("MAGIC EXCEPTION: Packet data didn't match with new compression at index " + i.ToString()); } } return data; } } throw new InvalidOperationException(StrokeCollectionSerializer.ISFDebugMessage("IsfCompressPacketData returned:" + hr.ToString(CultureInfo.InvariantCulture))); } #else return data; #endif } ////// Thread static algo module /// [ThreadStatic] private static AlgoModule _algoModule; ////// Private AlgoModule, one per thread, lazy init'd /// private static AlgoModule AlgoModule { get { if (_algoModule == null) { _algoModule = new AlgoModule(); } return _algoModule; } } #if OLD_ISF private static object _compressSync = new object(); private bool _disposed = false; ////// Dispose. /// ////// Critical - Handles plutonium: _compressorHandle /// /// This is directly called by StrokeCollectionSerializer.DecodeRawISF /// The TreatAsSafe boundary of this call is StrokeCollectionSerializer.DecodeRawISF /// /// [SecurityCritical] public void Dispose() { if (_disposed) { return; } _compressorHandle.Dispose(); _disposed = true; _compressorHandle = null; } #endif } } // File provided for Reference Use Only by Microsoft Corporation (c) 2007. // Copyright (c) Microsoft Corporation. All rights reserved. //#define OLD_ISF using MS.Utility; using System; using System.Runtime.InteropServices; using System.Security; using System.Globalization; using System.Windows; using System.Windows.Input; using System.Windows.Ink; using MS.Internal.Ink.InkSerializedFormat; using SR = MS.Internal.PresentationCore.SR; using SRID = MS.Internal.PresentationCore.SRID; namespace MS.Internal.Ink.InkSerializedFormat { internal class Compressor #if OLD_ISF : IDisposable #endif { #if OLD_ISF ////// Non-static members /// ////// Critical - This is plutonium, marked critical to /// prevent it from being used from transparent code /// [SecurityCritical] private MS.Win32.Penimc.CompressorSafeHandle _compressorHandle; ////// Compressor constructor. This is called by our ISF decompression /// after reading the ISF header that indicates which type of compression /// was performed on the ISF when it was being compressed. /// /// a byte[] specifying the compressor used to compress the ISF being decompressed /// expected initially to be the length of data, it IsfLoadCompressor sets it to the /// length of the header that is read. They should always match, but in cases where they /// don't, we immediately fail ////// Critical - Calls unmanaged code through MS.Win32.Penimc.UnsafeNativeMethods to instance a compressor /// that is used to decompress packet or property data. The compressor instance is wrapped in a /// safehandle. /// /// This ctor is called by StrokeCollectionSerializer.EncodeRawISF, which is marked TreatAsSafe /// [SecurityCritical] internal Compressor(byte[] data, ref uint size) { if (data == null || data.Length != size) { //we don't raise any information that could be used to attack our ISF code //a simple 'ISF Operation Failed' is sufficient since the user can't do //anything to fix bogus ISF throw new InvalidOperationException(StrokeCollectionSerializer.ISFDebugMessage(SR.Get(SRID.InitializingCompressorFailed))); } _compressorHandle = MS.Win32.Penimc.UnsafeNativeMethods.IsfLoadCompressor(data, ref size); if (_compressorHandle.IsInvalid) { //we don't raise any information that could be used to attack our ISF code //a simple 'ISF Operation Failed' is sufficient since the user can't do //anything to fix bogus ISF throw new InvalidOperationException(StrokeCollectionSerializer.ISFDebugMessage(SR.Get(SRID.InitializingCompressorFailed))); } } ////// DecompressPacketData - take a byte[] or a subset of a byte[] and decompresses it into /// an int[] of packet data (for example, x's in a Stroke) /// /// /// The compressor used to decompress this byte[] of packet data (for example, x's in a Stroke) /// Can be null /// /// The byte[] to decompress /// In: the max size of the subset of compressedInput to read, out: size read /// The int[] to write the packet data to ////// Critical - Calls unmanaged code in MS.Win32.Penimc.UnsafeNativeMethods to decompress /// a byte[] into an int[] of packet data (for example, x's or y's in a Stroke) /// /// This is called by StrokeSerializer.LoadPackets directly. The TreatAsSafe boundary of this call /// is StrokeCollectionSerializer.DecodeRawISF /// [SecurityCritical] #else ////// DecompressPacketData - take a byte[] or a subset of a byte[] and decompresses it into /// an int[] of packet data (for example, x's in a Stroke) /// /// The byte[] to decompress /// In: the max size of the subset of compressedInput to read, out: size read /// The int[] to write the packet data to #endif internal static void DecompressPacketData( #if OLD_ISF Compressor compressor, #endif byte[] compressedInput, ref uint size, int[] decompressedPackets) { #if OLD_ISF // // lock to prevent multi-threaded vulnerabilities // lock (_compressSync) { #endif if (compressedInput == null || size > compressedInput.Length || decompressedPackets == null) { //we don't raise any information that could be used to attack our ISF code //a simple 'ISF Operation Failed' is sufficient since the user can't do //anything to fix bogus ISF throw new InvalidOperationException(StrokeCollectionSerializer.ISFDebugMessage(SR.Get(SRID.DecompressPacketDataFailed))); } #if OLD_ISF uint size2 = size; #endif size = AlgoModule.DecompressPacketData(compressedInput, decompressedPackets); #if OLD_ISF MS.Win32.Penimc.CompressorSafeHandle safeCompressorHandle = (compressor == null) ? MS.Win32.Penimc.CompressorSafeHandle.Null : compressor._compressorHandle; int[] decompressedPackets2 = new int[decompressedPackets.Length]; byte algo = AlgoModule.NoCompression; int hr = MS.Win32.Penimc.UnsafeNativeMethods.IsfDecompressPacketData(safeCompressorHandle, compressedInput, ref size2, (uint)decompressedPackets2.Length, decompressedPackets2, ref algo); if (0 != hr) { //we don't raise any information that could be used to attack our ISF code //a simple 'ISF Operation Failed' is sufficient since the user can't do //anything to fix bogus ISF throw new InvalidOperationException(StrokeCollectionSerializer.ISFDebugMessage("IsfDecompressPacketData returned: " + hr.ToString(CultureInfo.InvariantCulture))); } if (size != size2) { throw new InvalidOperationException("MAGIC EXCEPTION: Packet data bytes read didn't match with new uncompression"); } for (int i = 0; i < decompressedPackets.Length; i++) { if (decompressedPackets[i] != decompressedPackets2[i]) { throw new InvalidOperationException("MAGIC EXCEPTION: Packet data didn't match with new uncompression at index " + i.ToString()); } } } #endif } #if OLD_ISF ////// DecompressPropertyData - decompresses a byte[] representing property data (such as DrawingAttributes.Color) /// /// The byte[] to decompress ////// Critical - Calls unmanaged code in MS.Win32.Penimc.UnsafeNativeMethods to decompress /// a byte[] representing property data /// /// This directly called by ExtendedPropertySerializer.DecodeAsISF. /// DrawingAttributesSerializer.DecodeAsISF. /// StrokeSerializer.DecodeISFIntoStroke. /// /// The TreatAsSafe boundary of this call /// is StrokeCollectionSerializer.DecodeRawISF /// [SecurityCritical] #else ////// DecompressPropertyData - decompresses a byte[] representing property data (such as DrawingAttributes.Color) /// /// The byte[] to decompress #endif internal static byte[] DecompressPropertyData(byte[] input) { #if OLD_ISF // // lock to prevent multi-threaded vulnerabilities // lock (_compressSync) { #endif if (input == null) { //we don't raise any information that could be used to attack our ISF code //a simple 'ISF Operation Failed' is sufficient since the user can't do //anything to fix bogus ISF throw new InvalidOperationException(StrokeCollectionSerializer.ISFDebugMessage(SR.Get(SRID.DecompressPropertyFailed))); } byte[] data = AlgoModule.DecompressPropertyData(input); #if OLD_ISF uint size = 0; byte algo = 0; int hr = MS.Win32.Penimc.UnsafeNativeMethods.IsfDecompressPropertyData(input, (uint)input.Length, ref size, null, ref algo); if (0 == hr) { byte[] data2 = new byte[size]; hr = MS.Win32.Penimc.UnsafeNativeMethods.IsfDecompressPropertyData(input, (uint)input.Length, ref size, data2, ref algo); if (0 == hr) { if (data.Length != data2.Length) { throw new InvalidOperationException("MAGIC EXCEPTION: Property bytes length when decompressed didn't match with new uncompression"); } for (int i = 0; i < data.Length; i++) { if (data[i] != data2[i]) { throw new InvalidOperationException("MAGIC EXCEPTION: Property data didn't match with new property uncompression at index " + i.ToString()); } } return data; } } //we don't raise any information that could be used to attack our ISF code //a simple 'ISF Operation Failed' is sufficient since the user can't do //anything to fix bogus ISF throw new InvalidOperationException(StrokeCollectionSerializer.ISFDebugMessage("IsfDecompressPropertyData returned: " + hr.ToString(CultureInfo.InvariantCulture))); #else return data; #endif #if OLD_ISF } #endif } #if OLD_ISF ////// CompressPropertyData - compresses property data /// /// The property data to compress /// In: the desired algorithm to use. Out: the algorithm used /// In: if output is not null, the size of output. Out: the size required if output is null /// The byte[] to writ the compressed data to ////// Critical - Calls unmanaged code in MS.Win32.Penimc.UnsafeNativeMethods to compress /// a byte[] representing property data /// /// This directly called by ExtendedPropertySerializer.EncodeAsISF /// /// TreatAsSafe boundary is StrokeCollectionSerializer.EncodeISF /// /// [SecurityCritical] internal static void CompressPropertyData(byte[] data, ref byte algorithm, ref uint outputSize, byte[] output) { // // lock to prevent multi-threaded vulnerabilities // lock (_compressSync) { // // it is valid to pass is null for output to check to see what the // required buffer size is. We want to guard against when output is not null // and outputSize doesn't match, as this is passed directly to unmanaged code // and could result in bytes being written past the end of output buffer // if (output != null && outputSize != output.Length) { //we don't raise any information that could be used to attack our ISF code //a simple 'ISF Operation Failed' is sufficient since the user can't do //anything to fix bogus ISF throw new InvalidOperationException(SR.Get(SRID.IsfOperationFailed)); } int hr = MS.Win32.Penimc.UnsafeNativeMethods.IsfCompressPropertyData(data, (uint)data.Length, ref algorithm, ref outputSize, output); if (0 != hr) { //we don't raise any information that could be used to attack our ISF code //a simple 'ISF Operation Failed' is sufficient since the user can't do //anything to fix bogus ISF throw new InvalidOperationException(StrokeCollectionSerializer.ISFDebugMessage("IsfCompressPropertyData returned: " + hr.ToString(CultureInfo.InvariantCulture))); } } } #endif ////// CompressPropertyData /// /// /// ///internal static byte[] CompressPropertyData(byte[] data, byte algorithm) { if (data == null) { //we don't raise any information that could be used to attack our ISF code //a simple 'ISF Operation Failed' is sufficient since the user can't do //anything to fix bogus ISF throw new ArgumentNullException("data"); } return AlgoModule.CompressPropertyData(data, algorithm); } #if OLD_ISF /// /// CompressPropertyData - compresses property data using the compression defined by 'compressor' /// /// The compressor to use. This can be null for default compression /// The int[] of packet data to compress /// In: the desired algorithm to use. Out: the algorithm used ///the compressed data in a byte[] ////// Critical - Calls unmanaged code in MS.Win32.Penimc.UnsafeNativeMethods to compress /// an int[] representing packet data /// /// This directly called by StrokeCollectionSerializer.SaveStrokeIds /// StrokeSerializer.SavePacketPropertyData /// /// TreatAsSafe boundary is StrokeCollectionSerializer.EncodeISF /// /// [SecurityCritical] #else ////// CompressPropertyData - compresses property data using the compression defined by 'compressor' /// /// The int[] of packet data to compress /// In: the desired algorithm to use. Out: the algorithm used ///the compressed data in a byte[] #endif internal static byte[] CompressPacketData( #if OLD_ISF Compressor compressor, #endif int[] input, ref byte algorithm) { #if OLD_ISF // // lock to prevent multi-threaded vulnerabilities // lock (_compressSync) { #endif if (input == null) { //we don't raise any information that could be used to attack our ISF code //a simple 'ISF Operation Failed' is sufficient since the user can't do //anything to fix bogus ISF throw new InvalidOperationException(SR.Get(SRID.IsfOperationFailed)); } byte[] data = AlgoModule.CompressPacketData(input, algorithm); #if OLD_ISF uint cbOutSize = 0; MS.Win32.Penimc.CompressorSafeHandle safeCompressorHandle = (compressor == null) ? MS.Win32.Penimc.CompressorSafeHandle.Null : compressor._compressorHandle; int hr = MS.Win32.Penimc.UnsafeNativeMethods.IsfCompressPacketData(safeCompressorHandle, input, (uint)input.Length, ref algorithm, ref cbOutSize, null); if (0 == hr) { byte[] data2 = new byte[cbOutSize]; hr = MS.Win32.Penimc.UnsafeNativeMethods.IsfCompressPacketData(safeCompressorHandle, input, (uint)input.Length, ref algorithm, ref cbOutSize, data2); if (0 == hr) { //see if data matches if (data2.Length != data.Length) { throw new InvalidOperationException("MAGIC EXCEPTION: Packet data length didn't match with new compression"); } for (int i = 0; i < data2.Length; i++) { if (data2[i] != data[i]) { throw new InvalidOperationException("MAGIC EXCEPTION: Packet data didn't match with new compression at index " + i.ToString()); } } return data; } } throw new InvalidOperationException(StrokeCollectionSerializer.ISFDebugMessage("IsfCompressPacketData returned:" + hr.ToString(CultureInfo.InvariantCulture))); } #else return data; #endif } ////// Thread static algo module /// [ThreadStatic] private static AlgoModule _algoModule; ////// Private AlgoModule, one per thread, lazy init'd /// private static AlgoModule AlgoModule { get { if (_algoModule == null) { _algoModule = new AlgoModule(); } return _algoModule; } } #if OLD_ISF private static object _compressSync = new object(); private bool _disposed = false; ////// Dispose. /// ////// Critical - Handles plutonium: _compressorHandle /// /// This is directly called by StrokeCollectionSerializer.DecodeRawISF /// The TreatAsSafe boundary of this call is StrokeCollectionSerializer.DecodeRawISF /// /// [SecurityCritical] public void Dispose() { if (_disposed) { return; } _compressorHandle.Dispose(); _disposed = true; _compressorHandle = null; } #endif } } // File provided for Reference Use Only by Microsoft Corporation (c) 2007. // Copyright (c) Microsoft Corporation. All rights reserved.
Link Menu

This book is available now!
Buy at Amazon US or
Buy at Amazon UK
- WebPartConnection.cs
- ComponentChangedEvent.cs
- EntityDataSourceSelectedEventArgs.cs
- Resources.Designer.cs
- DesignerActionService.cs
- GcSettings.cs
- XsltLoader.cs
- SystemIPGlobalProperties.cs
- DbConnectionOptions.cs
- CodeEventReferenceExpression.cs
- SchemaImporterExtensionsSection.cs
- CoTaskMemSafeHandle.cs
- DataGridViewLinkCell.cs
- Connector.xaml.cs
- X509RawDataKeyIdentifierClause.cs
- SmiConnection.cs
- CornerRadius.cs
- AnimatedTypeHelpers.cs
- AsymmetricKeyExchangeDeformatter.cs
- SqlDataSourceFilteringEventArgs.cs
- DetailsViewAutoFormat.cs
- CatalogPartChrome.cs
- FrugalMap.cs
- XmlILIndex.cs
- ColorTransformHelper.cs
- AdornerDecorator.cs
- JoinCqlBlock.cs
- Rectangle.cs
- BlurEffect.cs
- PolicyLevel.cs
- ProgressBarBrushConverter.cs
- HitTestParameters.cs
- BamlCollectionHolder.cs
- VisualStyleRenderer.cs
- SQLDouble.cs
- X509RecipientCertificateClientElement.cs
- ListBoxItemWrapperAutomationPeer.cs
- Deserializer.cs
- TextElementEnumerator.cs
- GridViewDeleteEventArgs.cs
- ColumnMapVisitor.cs
- DiscoveryProxy.cs
- LinkedResource.cs
- EDesignUtil.cs
- XmlReflectionMember.cs
- SizeConverter.cs
- X509CertificateRecipientClientCredential.cs
- XmlEventCache.cs
- OperationAbortedException.cs
- UriTemplateTable.cs
- ConnectionOrientedTransportBindingElement.cs
- DirectoryNotFoundException.cs
- FreeFormPanel.cs
- ProcessThreadDesigner.cs
- SharedConnectionInfo.cs
- QueryStringConverter.cs
- Assert.cs
- RtfControlWordInfo.cs
- SoapIncludeAttribute.cs
- TemplateLookupAction.cs
- ExcludePathInfo.cs
- PtsCache.cs
- ClientUrlResolverWrapper.cs
- XmlSerializerSection.cs
- SerializableAttribute.cs
- ExpressionCopier.cs
- Constraint.cs
- CodeTypeDeclaration.cs
- PageSetupDialog.cs
- WSFederationHttpBindingElement.cs
- XmlILOptimizerVisitor.cs
- XmlNodeList.cs
- ListenDesigner.cs
- NativeMethods.cs
- ValueUtilsSmi.cs
- Pkcs7Recipient.cs
- GradientBrush.cs
- ItemsControl.cs
- SecurityUniqueId.cs
- ByteStream.cs
- WebResourceUtil.cs
- GridViewRowCollection.cs
- UpdateManifestForBrowserApplication.cs
- RectAnimationBase.cs
- ValidatedControlConverter.cs
- DataKeyCollection.cs
- EventProvider.cs
- LicenseException.cs
- nulltextnavigator.cs
- assemblycache.cs
- AsyncStreamReader.cs
- GridViewPageEventArgs.cs
- XmlDsigSep2000.cs
- SSmlParser.cs
- Schema.cs
- OutputCacheProfileCollection.cs
- WindowsPrincipal.cs
- HtmlMobileTextWriter.cs
- DbParameterHelper.cs
- RequestUriProcessor.cs