Commit Graph

340 Commits

Author SHA1 Message Date
ff77873ad6 [*] Further reduce win32 link time requirements (advanced api) 2023-10-11 02:13:49 +01:00
48c2175be9 [+] IProtocolStack::AppendInterceptorDynamicBuffer
[+] IProtocolStack::PrependInterceptorDynamicBuffer
[+] IProtocolStack::PrependSingleFrameProcessorDynamicBuffer
[+] IProtocolStack::AppendSingleFrameProcessorDynamicBuffer
[+] IProtocolStack::IsValid
[+] IProtocolPiece::ExchangeMaximumBufferLength
2023-10-07 20:25:43 +01:00
605862094e [*] Fix some old known Win32 loop queue issues under bullshit real world conditions
(recursion, any retries, etc)
2023-10-03 22:02:48 +01:00
ea241d86f3 [*] Resolve ambiguous namespace regression (new conflict between Aurora::IO::Utility and Aurora::Utility) 2023-09-28 15:42:09 +01:00
635f9e39e9 [*] Modernize IOBufferedProcessor (and moved to the io utility namespace)
[+] AuIO::Utility::NewBufferedProcessorEx
[+] AuByteBuffer::calcDifferenceBetweenHeadsUnsigned
[+] AuByteBuffer::calcDifferenceBetweenHeadsSigned
2023-09-28 12:38:01 +01:00
c5ab03cbfc [-] OS specific types derived from AFileHandle 2023-09-28 11:53:42 +01:00
5555e99488 [*] Move NewByteBufferPair, NewByteBufferPairEx, and NewRingByteBuffer to AuIO::Utility 2023-09-28 11:51:46 +01:00
374df4a92b [*] 3c8442d8 regressed DNS based connect
[*] improved an error message
2023-09-23 20:36:28 +01:00
3c8442d8ce [+] Added NetSocketConnectBase
[*] ded60591 cont
2023-09-23 19:33:08 +01:00
ded605910f [*] Refactor AuNet::NetSocketConnect 2023-09-23 17:10:00 +01:00
7e9bfd8215 [*] Move/refactor AuIO adapters to Aurora::IO::Adapters 2023-09-23 16:40:13 +01:00
345cf608b3 [*] Linux connect by hostname regression/first pass? 2023-09-23 09:25:18 +01:00
c05fabc633 [*] Linux fixes 2023-09-23 08:15:50 +01:00
828430889c [+] IIOHandle::SectionLock
[+] IIOHandle::SectionUnlock
[*] FileSteam.NT.cpp clean up
2023-09-23 04:48:48 +01:00
994fcb5010 [*/+] Added/Moved code to AuProtocolStackSpecialWriter[.cpp]
[+] Further mutex guarantees under protocol stacks (hardening)
2023-09-21 21:18:59 +01:00
7da39d2022 [+] Aurora::IO::Protocol::NewProtocolStackFromDescription
[+] Aurora::IO::Protocol::UtilityWrapStreamReaderWithInterceptors
[+] Aurora::IO::Protocol::EProtocolStackCreateType
[+] Aurora::IO::Protocol::ProtocolStackByBufferedAdhoc
[+] Aurora::IO::Protocol::ProtocolStackByBuffered
[+] Aurora::IO::Protocol::ProtocolStackByPipe
[+] Aurora::IO::Protocol::ProtocolStackDescription
2023-09-21 08:02:02 +01:00
7bc533b710 [*] More POSIX bugs 2023-09-20 21:13:43 +01:00
4fa053ce97 [*] Harden POSIX FS Remove 2023-09-20 20:17:42 +01:00
259572724c [+] Fetch non-desktop class NT hostnames 2023-09-20 18:33:27 +01:00
5ef6e0cd23 [*] Fix IO Processor regression, circa WorkerPId_t behaviour change.
[*] Fix minor Linux SOCK_CLOEXEC issue
2023-09-18 19:04:09 +01:00
5d12f1a203 [*] Resolve IO regressions (4. Hello FS) (Mostly UNIX) 2023-09-18 07:11:34 +01:00
11ef18cbf0 [*] moar regressions :( 2023-09-18 06:09:29 +01:00
09b044ab2e [*] amend 9be76adb23 2023-09-17 22:21:24 +01:00
9be76adb23 [*] Further drop required symbols from OLE (COM) and SHELL32 (NT Shell)
[*] Optimize NT file and URI opener
2023-09-17 21:33:14 +01:00
a96788623f [*] Fix linux build warning and not quite complete linux ipc fix a4f6db7ec9 2023-09-17 18:36:20 +01:00
84c0e94282 [*] 523abaf0 cont: not so sure on the UNIX-like variant either 2023-09-17 14:03:03 +01:00
523abaf0bb [*] security: bIsIntranetTrusted not properly respected 2023-09-17 13:57:58 +01:00
0de153dfe3 [*] Aggressively harden win32 loops against out of memory events 2023-09-17 04:08:01 +01:00
ab6f00f094 [*] NT build regression 2023-09-17 00:35:23 +01:00
a4f6db7ec9 [*] Linux IPC reliability: finally got around to closing #48 2023-09-16 23:30:10 +01:00
f2339bb0a9 [+] AuIO::Loop::NewLSIOHandle(const AuSPtr<IIOHandle> &pHandle)
[-] Rip 2021-10-1 LSCondVar
2023-09-16 22:59:26 +01:00
9a294cf955 [*] (Mostly Linux) Harden FS apis 2023-09-16 01:20:28 +01:00
ac86fd481b [*] caught runtime regressions 2023-09-15 18:21:47 +01:00
d0fb19f87e [*] Global build regressions caused by addd4080 2023-09-15 18:09:34 +01:00
a80524d573 [-] AuProcesses::EStandardHandle 2023-09-15 15:55:46 +01:00
d166a00d81 [*] Linux: begin catching up AuProcesses to NT 2023-09-15 00:11:14 +01:00
fe8ef28930 [*] tism 2023-09-13 04:04:45 +01:00
f177b67e1f [*] GetLastError() == ERROR_FILE_EXISTS fast path 2023-09-13 03:48:10 +01:00
b4d5f4c127 [+] AuIO::IO::EStandardStream
[+] AuIO::IOHandle::InitFromStreamEnum(...)
2023-09-13 02:50:59 +01:00
d0538ea4de [*] NT/Win32-like: Use Win32Open as opposed to CreateFileW 2023-09-13 02:27:18 +01:00
a8696c0b7e [*] ...no 2023-09-13 00:02:26 +01:00
6181d97c3c [*] Improve internal path consistency
[*] Removes some unnecessary panics
2023-09-12 20:49:02 +01:00
b46390f83a [*] Remove explicit Windows version check assuming certain file systems and platforms can be stupid 2023-09-12 01:35:54 +01:00
6062a16d9c [*] Prevent overflow into UNC root namespace of hostnames and volumes via path or filename overflow 2023-09-12 00:52:16 +01:00
92593be412 [*] FS path mitigation: begin to handle >= MAX_PATHs by enforcing UNC \\?\ prefixes across every single Win32/NT api we hit (if relevant. im sure some long paths may still break things.) 2023-09-10 23:49:47 +01:00
5107911ba5 [*] Exploit mitigation - file protocols can be valid paths 2023-09-10 16:30:59 +01:00
51dcd190b3 [*] Missing SysPushErrorXXXs 2023-09-07 23:20:26 +01:00
d112179c83 [*] May as well make this in line with the others 2023-09-04 16:45:42 +01:00
bcf3fabd83 [*] FS Resources (GetWritableAppdata): fail over to this path instead of failing 2023-09-04 16:32:28 +01:00
5b9e780fa0 [*] Fix some obvious recent regressions in NT loop queue 2023-09-02 19:36:12 +01:00