blob: 78059b623aef1ee20ec4a1f9a5b9232e96b86edb (
plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
|
// Licensed to the .NET Foundation under one or more agreements.
// The .NET Foundation licenses this file to you under the MIT license.
// See the LICENSE file in the project root for more information.
/*============================================================
**
**
** Purpose: A class to detect incorrect usage of UnSafeBuffer
**
**
===========================================================*/
namespace System {
using System.Security;
using System.Diagnostics;
using System.Diagnostics.Contracts;
unsafe internal struct UnSafeCharBuffer{
[SecurityCritical]
char * m_buffer;
int m_totalSize;
int m_length;
[System.Security.SecurityCritical] // auto-generated
public UnSafeCharBuffer( char *buffer, int bufferSize) {
Contract.Assert( buffer != null, "buffer pointer can't be null." );
Contract.Assert( bufferSize >= 0, "buffer size can't be negative." );
m_buffer = buffer;
m_totalSize = bufferSize;
m_length = 0;
}
[System.Security.SecuritySafeCritical] // auto-generated
public void AppendString(string stringToAppend) {
if( String.IsNullOrEmpty( stringToAppend ) ) {
return;
}
if ( (m_totalSize - m_length) < stringToAppend.Length ) {
throw new IndexOutOfRangeException();
}
fixed( char* pointerToString = stringToAppend ) {
Buffer.Memcpy( (byte*) (m_buffer + m_length), (byte *) pointerToString, stringToAppend.Length * sizeof(char));
}
m_length += stringToAppend.Length;
Contract.Assert(m_length <= m_totalSize, "Buffer has been overflowed!");
}
public int Length {
get {
return m_length;
}
}
}
}
|