Code:
/ Dotnetfx_Vista_SP2 / Dotnetfx_Vista_SP2 / 8.0.50727.4016 / DEVDIV / depot / DevDiv / releases / Orcas / QFE / wpf / src / Core / CSharp / MS / Internal / Ink / InkSerializedFormat / Compress.cs / 1 / Compress.cs
//#define OLD_ISF using MS.Utility; using System; using System.Runtime.InteropServices; using System.Security; using System.Globalization; using System.Windows; using System.Windows.Input; using System.Windows.Ink; using MS.Internal.Ink.InkSerializedFormat; using SR = MS.Internal.PresentationCore.SR; using SRID = MS.Internal.PresentationCore.SRID; namespace MS.Internal.Ink.InkSerializedFormat { internal class Compressor #if OLD_ISF : IDisposable #endif { #if OLD_ISF ////// Non-static members /// ////// Critical - This is plutonium, marked critical to /// prevent it from being used from transparent code /// [SecurityCritical] private MS.Win32.Penimc.CompressorSafeHandle _compressorHandle; ////// Compressor constructor. This is called by our ISF decompression /// after reading the ISF header that indicates which type of compression /// was performed on the ISF when it was being compressed. /// /// a byte[] specifying the compressor used to compress the ISF being decompressed /// expected initially to be the length of data, it IsfLoadCompressor sets it to the /// length of the header that is read. They should always match, but in cases where they /// don't, we immediately fail ////// Critical - Calls unmanaged code through MS.Win32.Penimc.UnsafeNativeMethods to instance a compressor /// that is used to decompress packet or property data. The compressor instance is wrapped in a /// safehandle. /// /// This ctor is called by StrokeCollectionSerializer.EncodeRawISF, which is marked TreatAsSafe /// [SecurityCritical] internal Compressor(byte[] data, ref uint size) { if (data == null || data.Length != size) { //we don't raise any information that could be used to attack our ISF code //a simple 'ISF Operation Failed' is sufficient since the user can't do //anything to fix bogus ISF throw new InvalidOperationException(StrokeCollectionSerializer.ISFDebugMessage(SR.Get(SRID.InitializingCompressorFailed))); } _compressorHandle = MS.Win32.Penimc.UnsafeNativeMethods.IsfLoadCompressor(data, ref size); if (_compressorHandle.IsInvalid) { //we don't raise any information that could be used to attack our ISF code //a simple 'ISF Operation Failed' is sufficient since the user can't do //anything to fix bogus ISF throw new InvalidOperationException(StrokeCollectionSerializer.ISFDebugMessage(SR.Get(SRID.InitializingCompressorFailed))); } } ////// DecompressPacketData - take a byte[] or a subset of a byte[] and decompresses it into /// an int[] of packet data (for example, x's in a Stroke) /// /// /// The compressor used to decompress this byte[] of packet data (for example, x's in a Stroke) /// Can be null /// /// The byte[] to decompress /// In: the max size of the subset of compressedInput to read, out: size read /// The int[] to write the packet data to ////// Critical - Calls unmanaged code in MS.Win32.Penimc.UnsafeNativeMethods to decompress /// a byte[] into an int[] of packet data (for example, x's or y's in a Stroke) /// /// This is called by StrokeSerializer.LoadPackets directly. The TreatAsSafe boundary of this call /// is StrokeCollectionSerializer.DecodeRawISF /// [SecurityCritical] #else ////// DecompressPacketData - take a byte[] or a subset of a byte[] and decompresses it into /// an int[] of packet data (for example, x's in a Stroke) /// /// The byte[] to decompress /// In: the max size of the subset of compressedInput to read, out: size read /// The int[] to write the packet data to #endif internal static void DecompressPacketData( #if OLD_ISF Compressor compressor, #endif byte[] compressedInput, ref uint size, int[] decompressedPackets) { #if OLD_ISF // // lock to prevent multi-threaded vulnerabilities // lock (_compressSync) { #endif if (compressedInput == null || size > compressedInput.Length || decompressedPackets == null) { //we don't raise any information that could be used to attack our ISF code //a simple 'ISF Operation Failed' is sufficient since the user can't do //anything to fix bogus ISF throw new InvalidOperationException(StrokeCollectionSerializer.ISFDebugMessage(SR.Get(SRID.DecompressPacketDataFailed))); } #if OLD_ISF uint size2 = size; #endif size = AlgoModule.DecompressPacketData(compressedInput, decompressedPackets); #if OLD_ISF MS.Win32.Penimc.CompressorSafeHandle safeCompressorHandle = (compressor == null) ? MS.Win32.Penimc.CompressorSafeHandle.Null : compressor._compressorHandle; int[] decompressedPackets2 = new int[decompressedPackets.Length]; byte algo = AlgoModule.NoCompression; int hr = MS.Win32.Penimc.UnsafeNativeMethods.IsfDecompressPacketData(safeCompressorHandle, compressedInput, ref size2, (uint)decompressedPackets2.Length, decompressedPackets2, ref algo); if (0 != hr) { //we don't raise any information that could be used to attack our ISF code //a simple 'ISF Operation Failed' is sufficient since the user can't do //anything to fix bogus ISF throw new InvalidOperationException(StrokeCollectionSerializer.ISFDebugMessage("IsfDecompressPacketData returned: " + hr.ToString(CultureInfo.InvariantCulture))); } if (size != size2) { throw new InvalidOperationException("MAGIC EXCEPTION: Packet data bytes read didn't match with new uncompression"); } for (int i = 0; i < decompressedPackets.Length; i++) { if (decompressedPackets[i] != decompressedPackets2[i]) { throw new InvalidOperationException("MAGIC EXCEPTION: Packet data didn't match with new uncompression at index " + i.ToString()); } } } #endif } #if OLD_ISF ////// DecompressPropertyData - decompresses a byte[] representing property data (such as DrawingAttributes.Color) /// /// The byte[] to decompress ////// Critical - Calls unmanaged code in MS.Win32.Penimc.UnsafeNativeMethods to decompress /// a byte[] representing property data /// /// This directly called by ExtendedPropertySerializer.DecodeAsISF. /// DrawingAttributesSerializer.DecodeAsISF. /// StrokeSerializer.DecodeISFIntoStroke. /// /// The TreatAsSafe boundary of this call /// is StrokeCollectionSerializer.DecodeRawISF /// [SecurityCritical] #else ////// DecompressPropertyData - decompresses a byte[] representing property data (such as DrawingAttributes.Color) /// /// The byte[] to decompress #endif internal static byte[] DecompressPropertyData(byte[] input) { #if OLD_ISF // // lock to prevent multi-threaded vulnerabilities // lock (_compressSync) { #endif if (input == null) { //we don't raise any information that could be used to attack our ISF code //a simple 'ISF Operation Failed' is sufficient since the user can't do //anything to fix bogus ISF throw new InvalidOperationException(StrokeCollectionSerializer.ISFDebugMessage(SR.Get(SRID.DecompressPropertyFailed))); } byte[] data = AlgoModule.DecompressPropertyData(input); #if OLD_ISF uint size = 0; byte algo = 0; int hr = MS.Win32.Penimc.UnsafeNativeMethods.IsfDecompressPropertyData(input, (uint)input.Length, ref size, null, ref algo); if (0 == hr) { byte[] data2 = new byte[size]; hr = MS.Win32.Penimc.UnsafeNativeMethods.IsfDecompressPropertyData(input, (uint)input.Length, ref size, data2, ref algo); if (0 == hr) { if (data.Length != data2.Length) { throw new InvalidOperationException("MAGIC EXCEPTION: Property bytes length when decompressed didn't match with new uncompression"); } for (int i = 0; i < data.Length; i++) { if (data[i] != data2[i]) { throw new InvalidOperationException("MAGIC EXCEPTION: Property data didn't match with new property uncompression at index " + i.ToString()); } } return data; } } //we don't raise any information that could be used to attack our ISF code //a simple 'ISF Operation Failed' is sufficient since the user can't do //anything to fix bogus ISF throw new InvalidOperationException(StrokeCollectionSerializer.ISFDebugMessage("IsfDecompressPropertyData returned: " + hr.ToString(CultureInfo.InvariantCulture))); #else return data; #endif #if OLD_ISF } #endif } #if OLD_ISF ////// CompressPropertyData - compresses property data /// /// The property data to compress /// In: the desired algorithm to use. Out: the algorithm used /// In: if output is not null, the size of output. Out: the size required if output is null /// The byte[] to writ the compressed data to ////// Critical - Calls unmanaged code in MS.Win32.Penimc.UnsafeNativeMethods to compress /// a byte[] representing property data /// /// This directly called by ExtendedPropertySerializer.EncodeAsISF /// /// TreatAsSafe boundary is StrokeCollectionSerializer.EncodeISF /// /// [SecurityCritical] internal static void CompressPropertyData(byte[] data, ref byte algorithm, ref uint outputSize, byte[] output) { // // lock to prevent multi-threaded vulnerabilities // lock (_compressSync) { // // it is valid to pass is null for output to check to see what the // required buffer size is. We want to guard against when output is not null // and outputSize doesn't match, as this is passed directly to unmanaged code // and could result in bytes being written past the end of output buffer // if (output != null && outputSize != output.Length) { //we don't raise any information that could be used to attack our ISF code //a simple 'ISF Operation Failed' is sufficient since the user can't do //anything to fix bogus ISF throw new InvalidOperationException(SR.Get(SRID.IsfOperationFailed)); } int hr = MS.Win32.Penimc.UnsafeNativeMethods.IsfCompressPropertyData(data, (uint)data.Length, ref algorithm, ref outputSize, output); if (0 != hr) { //we don't raise any information that could be used to attack our ISF code //a simple 'ISF Operation Failed' is sufficient since the user can't do //anything to fix bogus ISF throw new InvalidOperationException(StrokeCollectionSerializer.ISFDebugMessage("IsfCompressPropertyData returned: " + hr.ToString(CultureInfo.InvariantCulture))); } } } #endif ////// CompressPropertyData /// /// /// ///internal static byte[] CompressPropertyData(byte[] data, byte algorithm) { if (data == null) { //we don't raise any information that could be used to attack our ISF code //a simple 'ISF Operation Failed' is sufficient since the user can't do //anything to fix bogus ISF throw new ArgumentNullException("data"); } return AlgoModule.CompressPropertyData(data, algorithm); } #if OLD_ISF /// /// CompressPropertyData - compresses property data using the compression defined by 'compressor' /// /// The compressor to use. This can be null for default compression /// The int[] of packet data to compress /// In: the desired algorithm to use. Out: the algorithm used ///the compressed data in a byte[] ////// Critical - Calls unmanaged code in MS.Win32.Penimc.UnsafeNativeMethods to compress /// an int[] representing packet data /// /// This directly called by StrokeCollectionSerializer.SaveStrokeIds /// StrokeSerializer.SavePacketPropertyData /// /// TreatAsSafe boundary is StrokeCollectionSerializer.EncodeISF /// /// [SecurityCritical] #else ////// CompressPropertyData - compresses property data using the compression defined by 'compressor' /// /// The int[] of packet data to compress /// In: the desired algorithm to use. Out: the algorithm used ///the compressed data in a byte[] #endif internal static byte[] CompressPacketData( #if OLD_ISF Compressor compressor, #endif int[] input, ref byte algorithm) { #if OLD_ISF // // lock to prevent multi-threaded vulnerabilities // lock (_compressSync) { #endif if (input == null) { //we don't raise any information that could be used to attack our ISF code //a simple 'ISF Operation Failed' is sufficient since the user can't do //anything to fix bogus ISF throw new InvalidOperationException(SR.Get(SRID.IsfOperationFailed)); } byte[] data = AlgoModule.CompressPacketData(input, algorithm); #if OLD_ISF uint cbOutSize = 0; MS.Win32.Penimc.CompressorSafeHandle safeCompressorHandle = (compressor == null) ? MS.Win32.Penimc.CompressorSafeHandle.Null : compressor._compressorHandle; int hr = MS.Win32.Penimc.UnsafeNativeMethods.IsfCompressPacketData(safeCompressorHandle, input, (uint)input.Length, ref algorithm, ref cbOutSize, null); if (0 == hr) { byte[] data2 = new byte[cbOutSize]; hr = MS.Win32.Penimc.UnsafeNativeMethods.IsfCompressPacketData(safeCompressorHandle, input, (uint)input.Length, ref algorithm, ref cbOutSize, data2); if (0 == hr) { //see if data matches if (data2.Length != data.Length) { throw new InvalidOperationException("MAGIC EXCEPTION: Packet data length didn't match with new compression"); } for (int i = 0; i < data2.Length; i++) { if (data2[i] != data[i]) { throw new InvalidOperationException("MAGIC EXCEPTION: Packet data didn't match with new compression at index " + i.ToString()); } } return data; } } throw new InvalidOperationException(StrokeCollectionSerializer.ISFDebugMessage("IsfCompressPacketData returned:" + hr.ToString(CultureInfo.InvariantCulture))); } #else return data; #endif } ////// Thread static algo module /// [ThreadStatic] private static AlgoModule _algoModule; ////// Private AlgoModule, one per thread, lazy init'd /// private static AlgoModule AlgoModule { get { if (_algoModule == null) { _algoModule = new AlgoModule(); } return _algoModule; } } #if OLD_ISF private static object _compressSync = new object(); private bool _disposed = false; ////// Dispose. /// ////// Critical - Handles plutonium: _compressorHandle /// /// This is directly called by StrokeCollectionSerializer.DecodeRawISF /// The TreatAsSafe boundary of this call is StrokeCollectionSerializer.DecodeRawISF /// /// [SecurityCritical] public void Dispose() { if (_disposed) { return; } _compressorHandle.Dispose(); _disposed = true; _compressorHandle = null; } #endif } } // File provided for Reference Use Only by Microsoft Corporation (c) 2007. // Copyright (c) Microsoft Corporation. All rights reserved. //#define OLD_ISF using MS.Utility; using System; using System.Runtime.InteropServices; using System.Security; using System.Globalization; using System.Windows; using System.Windows.Input; using System.Windows.Ink; using MS.Internal.Ink.InkSerializedFormat; using SR = MS.Internal.PresentationCore.SR; using SRID = MS.Internal.PresentationCore.SRID; namespace MS.Internal.Ink.InkSerializedFormat { internal class Compressor #if OLD_ISF : IDisposable #endif { #if OLD_ISF ////// Non-static members /// ////// Critical - This is plutonium, marked critical to /// prevent it from being used from transparent code /// [SecurityCritical] private MS.Win32.Penimc.CompressorSafeHandle _compressorHandle; ////// Compressor constructor. This is called by our ISF decompression /// after reading the ISF header that indicates which type of compression /// was performed on the ISF when it was being compressed. /// /// a byte[] specifying the compressor used to compress the ISF being decompressed /// expected initially to be the length of data, it IsfLoadCompressor sets it to the /// length of the header that is read. They should always match, but in cases where they /// don't, we immediately fail ////// Critical - Calls unmanaged code through MS.Win32.Penimc.UnsafeNativeMethods to instance a compressor /// that is used to decompress packet or property data. The compressor instance is wrapped in a /// safehandle. /// /// This ctor is called by StrokeCollectionSerializer.EncodeRawISF, which is marked TreatAsSafe /// [SecurityCritical] internal Compressor(byte[] data, ref uint size) { if (data == null || data.Length != size) { //we don't raise any information that could be used to attack our ISF code //a simple 'ISF Operation Failed' is sufficient since the user can't do //anything to fix bogus ISF throw new InvalidOperationException(StrokeCollectionSerializer.ISFDebugMessage(SR.Get(SRID.InitializingCompressorFailed))); } _compressorHandle = MS.Win32.Penimc.UnsafeNativeMethods.IsfLoadCompressor(data, ref size); if (_compressorHandle.IsInvalid) { //we don't raise any information that could be used to attack our ISF code //a simple 'ISF Operation Failed' is sufficient since the user can't do //anything to fix bogus ISF throw new InvalidOperationException(StrokeCollectionSerializer.ISFDebugMessage(SR.Get(SRID.InitializingCompressorFailed))); } } ////// DecompressPacketData - take a byte[] or a subset of a byte[] and decompresses it into /// an int[] of packet data (for example, x's in a Stroke) /// /// /// The compressor used to decompress this byte[] of packet data (for example, x's in a Stroke) /// Can be null /// /// The byte[] to decompress /// In: the max size of the subset of compressedInput to read, out: size read /// The int[] to write the packet data to ////// Critical - Calls unmanaged code in MS.Win32.Penimc.UnsafeNativeMethods to decompress /// a byte[] into an int[] of packet data (for example, x's or y's in a Stroke) /// /// This is called by StrokeSerializer.LoadPackets directly. The TreatAsSafe boundary of this call /// is StrokeCollectionSerializer.DecodeRawISF /// [SecurityCritical] #else ////// DecompressPacketData - take a byte[] or a subset of a byte[] and decompresses it into /// an int[] of packet data (for example, x's in a Stroke) /// /// The byte[] to decompress /// In: the max size of the subset of compressedInput to read, out: size read /// The int[] to write the packet data to #endif internal static void DecompressPacketData( #if OLD_ISF Compressor compressor, #endif byte[] compressedInput, ref uint size, int[] decompressedPackets) { #if OLD_ISF // // lock to prevent multi-threaded vulnerabilities // lock (_compressSync) { #endif if (compressedInput == null || size > compressedInput.Length || decompressedPackets == null) { //we don't raise any information that could be used to attack our ISF code //a simple 'ISF Operation Failed' is sufficient since the user can't do //anything to fix bogus ISF throw new InvalidOperationException(StrokeCollectionSerializer.ISFDebugMessage(SR.Get(SRID.DecompressPacketDataFailed))); } #if OLD_ISF uint size2 = size; #endif size = AlgoModule.DecompressPacketData(compressedInput, decompressedPackets); #if OLD_ISF MS.Win32.Penimc.CompressorSafeHandle safeCompressorHandle = (compressor == null) ? MS.Win32.Penimc.CompressorSafeHandle.Null : compressor._compressorHandle; int[] decompressedPackets2 = new int[decompressedPackets.Length]; byte algo = AlgoModule.NoCompression; int hr = MS.Win32.Penimc.UnsafeNativeMethods.IsfDecompressPacketData(safeCompressorHandle, compressedInput, ref size2, (uint)decompressedPackets2.Length, decompressedPackets2, ref algo); if (0 != hr) { //we don't raise any information that could be used to attack our ISF code //a simple 'ISF Operation Failed' is sufficient since the user can't do //anything to fix bogus ISF throw new InvalidOperationException(StrokeCollectionSerializer.ISFDebugMessage("IsfDecompressPacketData returned: " + hr.ToString(CultureInfo.InvariantCulture))); } if (size != size2) { throw new InvalidOperationException("MAGIC EXCEPTION: Packet data bytes read didn't match with new uncompression"); } for (int i = 0; i < decompressedPackets.Length; i++) { if (decompressedPackets[i] != decompressedPackets2[i]) { throw new InvalidOperationException("MAGIC EXCEPTION: Packet data didn't match with new uncompression at index " + i.ToString()); } } } #endif } #if OLD_ISF ////// DecompressPropertyData - decompresses a byte[] representing property data (such as DrawingAttributes.Color) /// /// The byte[] to decompress ////// Critical - Calls unmanaged code in MS.Win32.Penimc.UnsafeNativeMethods to decompress /// a byte[] representing property data /// /// This directly called by ExtendedPropertySerializer.DecodeAsISF. /// DrawingAttributesSerializer.DecodeAsISF. /// StrokeSerializer.DecodeISFIntoStroke. /// /// The TreatAsSafe boundary of this call /// is StrokeCollectionSerializer.DecodeRawISF /// [SecurityCritical] #else ////// DecompressPropertyData - decompresses a byte[] representing property data (such as DrawingAttributes.Color) /// /// The byte[] to decompress #endif internal static byte[] DecompressPropertyData(byte[] input) { #if OLD_ISF // // lock to prevent multi-threaded vulnerabilities // lock (_compressSync) { #endif if (input == null) { //we don't raise any information that could be used to attack our ISF code //a simple 'ISF Operation Failed' is sufficient since the user can't do //anything to fix bogus ISF throw new InvalidOperationException(StrokeCollectionSerializer.ISFDebugMessage(SR.Get(SRID.DecompressPropertyFailed))); } byte[] data = AlgoModule.DecompressPropertyData(input); #if OLD_ISF uint size = 0; byte algo = 0; int hr = MS.Win32.Penimc.UnsafeNativeMethods.IsfDecompressPropertyData(input, (uint)input.Length, ref size, null, ref algo); if (0 == hr) { byte[] data2 = new byte[size]; hr = MS.Win32.Penimc.UnsafeNativeMethods.IsfDecompressPropertyData(input, (uint)input.Length, ref size, data2, ref algo); if (0 == hr) { if (data.Length != data2.Length) { throw new InvalidOperationException("MAGIC EXCEPTION: Property bytes length when decompressed didn't match with new uncompression"); } for (int i = 0; i < data.Length; i++) { if (data[i] != data2[i]) { throw new InvalidOperationException("MAGIC EXCEPTION: Property data didn't match with new property uncompression at index " + i.ToString()); } } return data; } } //we don't raise any information that could be used to attack our ISF code //a simple 'ISF Operation Failed' is sufficient since the user can't do //anything to fix bogus ISF throw new InvalidOperationException(StrokeCollectionSerializer.ISFDebugMessage("IsfDecompressPropertyData returned: " + hr.ToString(CultureInfo.InvariantCulture))); #else return data; #endif #if OLD_ISF } #endif } #if OLD_ISF ////// CompressPropertyData - compresses property data /// /// The property data to compress /// In: the desired algorithm to use. Out: the algorithm used /// In: if output is not null, the size of output. Out: the size required if output is null /// The byte[] to writ the compressed data to ////// Critical - Calls unmanaged code in MS.Win32.Penimc.UnsafeNativeMethods to compress /// a byte[] representing property data /// /// This directly called by ExtendedPropertySerializer.EncodeAsISF /// /// TreatAsSafe boundary is StrokeCollectionSerializer.EncodeISF /// /// [SecurityCritical] internal static void CompressPropertyData(byte[] data, ref byte algorithm, ref uint outputSize, byte[] output) { // // lock to prevent multi-threaded vulnerabilities // lock (_compressSync) { // // it is valid to pass is null for output to check to see what the // required buffer size is. We want to guard against when output is not null // and outputSize doesn't match, as this is passed directly to unmanaged code // and could result in bytes being written past the end of output buffer // if (output != null && outputSize != output.Length) { //we don't raise any information that could be used to attack our ISF code //a simple 'ISF Operation Failed' is sufficient since the user can't do //anything to fix bogus ISF throw new InvalidOperationException(SR.Get(SRID.IsfOperationFailed)); } int hr = MS.Win32.Penimc.UnsafeNativeMethods.IsfCompressPropertyData(data, (uint)data.Length, ref algorithm, ref outputSize, output); if (0 != hr) { //we don't raise any information that could be used to attack our ISF code //a simple 'ISF Operation Failed' is sufficient since the user can't do //anything to fix bogus ISF throw new InvalidOperationException(StrokeCollectionSerializer.ISFDebugMessage("IsfCompressPropertyData returned: " + hr.ToString(CultureInfo.InvariantCulture))); } } } #endif ////// CompressPropertyData /// /// /// ///internal static byte[] CompressPropertyData(byte[] data, byte algorithm) { if (data == null) { //we don't raise any information that could be used to attack our ISF code //a simple 'ISF Operation Failed' is sufficient since the user can't do //anything to fix bogus ISF throw new ArgumentNullException("data"); } return AlgoModule.CompressPropertyData(data, algorithm); } #if OLD_ISF /// /// CompressPropertyData - compresses property data using the compression defined by 'compressor' /// /// The compressor to use. This can be null for default compression /// The int[] of packet data to compress /// In: the desired algorithm to use. Out: the algorithm used ///the compressed data in a byte[] ////// Critical - Calls unmanaged code in MS.Win32.Penimc.UnsafeNativeMethods to compress /// an int[] representing packet data /// /// This directly called by StrokeCollectionSerializer.SaveStrokeIds /// StrokeSerializer.SavePacketPropertyData /// /// TreatAsSafe boundary is StrokeCollectionSerializer.EncodeISF /// /// [SecurityCritical] #else ////// CompressPropertyData - compresses property data using the compression defined by 'compressor' /// /// The int[] of packet data to compress /// In: the desired algorithm to use. Out: the algorithm used ///the compressed data in a byte[] #endif internal static byte[] CompressPacketData( #if OLD_ISF Compressor compressor, #endif int[] input, ref byte algorithm) { #if OLD_ISF // // lock to prevent multi-threaded vulnerabilities // lock (_compressSync) { #endif if (input == null) { //we don't raise any information that could be used to attack our ISF code //a simple 'ISF Operation Failed' is sufficient since the user can't do //anything to fix bogus ISF throw new InvalidOperationException(SR.Get(SRID.IsfOperationFailed)); } byte[] data = AlgoModule.CompressPacketData(input, algorithm); #if OLD_ISF uint cbOutSize = 0; MS.Win32.Penimc.CompressorSafeHandle safeCompressorHandle = (compressor == null) ? MS.Win32.Penimc.CompressorSafeHandle.Null : compressor._compressorHandle; int hr = MS.Win32.Penimc.UnsafeNativeMethods.IsfCompressPacketData(safeCompressorHandle, input, (uint)input.Length, ref algorithm, ref cbOutSize, null); if (0 == hr) { byte[] data2 = new byte[cbOutSize]; hr = MS.Win32.Penimc.UnsafeNativeMethods.IsfCompressPacketData(safeCompressorHandle, input, (uint)input.Length, ref algorithm, ref cbOutSize, data2); if (0 == hr) { //see if data matches if (data2.Length != data.Length) { throw new InvalidOperationException("MAGIC EXCEPTION: Packet data length didn't match with new compression"); } for (int i = 0; i < data2.Length; i++) { if (data2[i] != data[i]) { throw new InvalidOperationException("MAGIC EXCEPTION: Packet data didn't match with new compression at index " + i.ToString()); } } return data; } } throw new InvalidOperationException(StrokeCollectionSerializer.ISFDebugMessage("IsfCompressPacketData returned:" + hr.ToString(CultureInfo.InvariantCulture))); } #else return data; #endif } ////// Thread static algo module /// [ThreadStatic] private static AlgoModule _algoModule; ////// Private AlgoModule, one per thread, lazy init'd /// private static AlgoModule AlgoModule { get { if (_algoModule == null) { _algoModule = new AlgoModule(); } return _algoModule; } } #if OLD_ISF private static object _compressSync = new object(); private bool _disposed = false; ////// Dispose. /// ////// Critical - Handles plutonium: _compressorHandle /// /// This is directly called by StrokeCollectionSerializer.DecodeRawISF /// The TreatAsSafe boundary of this call is StrokeCollectionSerializer.DecodeRawISF /// /// [SecurityCritical] public void Dispose() { if (_disposed) { return; } _compressorHandle.Dispose(); _disposed = true; _compressorHandle = null; } #endif } } // File provided for Reference Use Only by Microsoft Corporation (c) 2007. // Copyright (c) Microsoft Corporation. All rights reserved.
Link Menu

This book is available now!
Buy at Amazon US or
Buy at Amazon UK
- documentsequencetextcontainer.cs
- AudioFileOut.cs
- Pair.cs
- TreeBuilderBamlTranslator.cs
- DataGridViewColumnTypeEditor.cs
- XPathNavigatorReader.cs
- Atom10ItemFormatter.cs
- TypedElement.cs
- ServiceRoute.cs
- WindowsIPAddress.cs
- XmlTypeMapping.cs
- BamlStream.cs
- XmlSchemaSubstitutionGroup.cs
- CopyOfAction.cs
- KeyedHashAlgorithm.cs
- BrowsableAttribute.cs
- BuildResult.cs
- UnsafePeerToPeerMethods.cs
- WinEventHandler.cs
- XmlQueryTypeFactory.cs
- ExtenderProvidedPropertyAttribute.cs
- EntityDataSourceEntitySetNameItem.cs
- ComboBox.cs
- MsmqIntegrationBindingElement.cs
- SafeUserTokenHandle.cs
- PrimitiveXmlSerializers.cs
- FactoryGenerator.cs
- TreeViewAutomationPeer.cs
- Visual3D.cs
- LazyLoadBehavior.cs
- ThumbButtonInfoCollection.cs
- BitmapEffectInputData.cs
- JsonXmlDataContract.cs
- IPAddressCollection.cs
- TypeConverter.cs
- SynchronizationValidator.cs
- HttpModuleAction.cs
- GiveFeedbackEventArgs.cs
- ParsedAttributeCollection.cs
- TextSelection.cs
- PixelFormat.cs
- UnsafeNativeMethodsTablet.cs
- BamlLocalizabilityResolver.cs
- XhtmlBasicLinkAdapter.cs
- HttpStreamXmlDictionaryWriter.cs
- WebSysDisplayNameAttribute.cs
- Parsers.cs
- WebBrowser.cs
- CollectionViewGroupRoot.cs
- SamlAudienceRestrictionCondition.cs
- TreeNodeSelectionProcessor.cs
- ClientViaElement.cs
- mactripleDES.cs
- Preprocessor.cs
- DataKeyArray.cs
- PathGeometry.cs
- BitmapEffectrendercontext.cs
- Point3DCollection.cs
- SecureStringHasher.cs
- Int32.cs
- GlyphTypeface.cs
- ForeignConstraint.cs
- FakeModelPropertyImpl.cs
- NameObjectCollectionBase.cs
- DataGridViewTopLeftHeaderCell.cs
- DesigntimeLicenseContextSerializer.cs
- CacheAxisQuery.cs
- HtmlInputPassword.cs
- KeyNotFoundException.cs
- ConfigPathUtility.cs
- PointHitTestParameters.cs
- XmlSignatureProperties.cs
- LocatorPart.cs
- SystemWebExtensionsSectionGroup.cs
- InstanceCreationEditor.cs
- SqlDependencyUtils.cs
- AlternateView.cs
- KeyPressEvent.cs
- HttpsTransportElement.cs
- WebPartZoneBase.cs
- PointConverter.cs
- CachedFontFamily.cs
- WebReferencesBuildProvider.cs
- FileChangeNotifier.cs
- ApplicationContext.cs
- Vector3D.cs
- ScrollPattern.cs
- TypeAccessException.cs
- OleDbInfoMessageEvent.cs
- FlowDocumentReaderAutomationPeer.cs
- HttpFileCollectionWrapper.cs
- Thickness.cs
- Trigger.cs
- DSASignatureFormatter.cs
- ConfigurationElementCollection.cs
- TypeUsage.cs
- LicenseException.cs
- HwndHostAutomationPeer.cs
- XmlExtensionFunction.cs
- TemplateNameScope.cs