mirror of
https://github.com/nmap/nmap.git
synced 2025-12-06 04:31:29 +00:00
185 lines
8.9 KiB
C++
185 lines
8.9 KiB
C++
|
|
/***************************************************************************
|
|
* charpool.cc -- Handles Nmap's "character pool" memory allocation *
|
|
* system. *
|
|
* *
|
|
***********************IMPORTANT NMAP LICENSE TERMS************************
|
|
* *
|
|
* The Nmap Security Scanner is (C) 1996-2004 Insecure.Com LLC. Nmap *
|
|
* is also a registered trademark of Insecure.Com LLC. This program is *
|
|
* free software; you may redistribute and/or modify it under the *
|
|
* terms of the GNU General Public License as published by the Free *
|
|
* Software Foundation; Version 2. This guarantees your right to use, *
|
|
* modify, and redistribute this software under certain conditions. If *
|
|
* you wish to embed Nmap technology into proprietary software, we may be *
|
|
* willing to sell alternative licenses (contact sales@insecure.com). *
|
|
* Many security scanner vendors already license Nmap technology such as *
|
|
* our remote OS fingerprinting database and code, service/version *
|
|
* detection system, and port scanning code. *
|
|
* *
|
|
* Note that the GPL places important restrictions on "derived works", yet *
|
|
* it does not provide a detailed definition of that term. To avoid *
|
|
* misunderstandings, we consider an application to constitute a *
|
|
* "derivative work" for the purpose of this license if it does any of the *
|
|
* following: *
|
|
* o Integrates source code from Nmap *
|
|
* o Reads or includes Nmap copyrighted data files, such as *
|
|
* nmap-os-fingerprints or nmap-service-probes. *
|
|
* o Executes Nmap and parses the results (as opposed to typical shell or *
|
|
* execution-menu apps, which simply display raw Nmap output and so are *
|
|
* not derivative works.) *
|
|
* o Integrates/includes/aggregates Nmap into a proprietary executable *
|
|
* installer, such as those produced by InstallShield. *
|
|
* o Links to a library or executes a program that does any of the above *
|
|
* *
|
|
* The term "Nmap" should be taken to also include any portions or derived *
|
|
* works of Nmap. This list is not exclusive, but is just meant to *
|
|
* clarify our interpretation of derived works with some common examples. *
|
|
* These restrictions only apply when you actually redistribute Nmap. For *
|
|
* example, nothing stops you from writing and selling a proprietary *
|
|
* front-end to Nmap. Just distribute it by itself, and point people to *
|
|
* http://www.insecure.org/nmap/ to download Nmap. *
|
|
* *
|
|
* We don't consider these to be added restrictions on top of the GPL, but *
|
|
* just a clarification of how we interpret "derived works" as it applies *
|
|
* to our GPL-licensed Nmap product. This is similar to the way Linus *
|
|
* Torvalds has announced his interpretation of how "derived works" *
|
|
* applies to Linux kernel modules. Our interpretation refers only to *
|
|
* Nmap - we don't speak for any other GPL products. *
|
|
* *
|
|
* If you have any questions about the GPL licensing restrictions on using *
|
|
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
|
* we also offer alternative license to integrate Nmap into proprietary *
|
|
* applications and appliances. These contracts have been sold to many *
|
|
* security vendors, and generally include a perpetual license as well as *
|
|
* providing for priority support and updates as well as helping to fund *
|
|
* the continued development of Nmap technology. Please email *
|
|
* sales@insecure.com for further information. *
|
|
* *
|
|
* As a special exception to the GPL terms, Insecure.Com LLC grants *
|
|
* permission to link the code of this program with any version of the *
|
|
* OpenSSL library which is distributed under a license identical to that *
|
|
* listed in the included Copying.OpenSSL file, and distribute linked *
|
|
* combinations including the two. You must obey the GNU GPL in all *
|
|
* respects for all of the code used other than OpenSSL. If you modify *
|
|
* this file, you may extend this exception to your version of the file, *
|
|
* but you are not obligated to do so. *
|
|
* *
|
|
* If you received these files with a written license agreement or *
|
|
* contract stating terms other than the terms above, then that *
|
|
* alternative license agreement takes precedence over these comments. *
|
|
* *
|
|
* Source is provided to this software because we believe users have a *
|
|
* right to know exactly what a program is going to do before they run it. *
|
|
* This also allows you to audit the software for security holes (none *
|
|
* have been found so far). *
|
|
* *
|
|
* Source code also allows you to port Nmap to new platforms, fix bugs, *
|
|
* and add new features. You are highly encouraged to send your changes *
|
|
* to fyodor@insecure.org for possible incorporation into the main *
|
|
* distribution. By sending these changes to Fyodor or one the *
|
|
* Insecure.Org development mailing lists, it is assumed that you are *
|
|
* offering Fyodor and Insecure.Com LLC the unlimited, non-exclusive right *
|
|
* to reuse, modify, and relicense the code. Nmap will always be *
|
|
* available Open Source, but this is important because the inability to *
|
|
* relicense code has caused devastating problems for other Free Software *
|
|
* projects (such as KDE and NASM). We also occasionally relicense the *
|
|
* code to third parties as discussed above. If you wish to specify *
|
|
* special license conditions of your contributions, just say so when you *
|
|
* send them. *
|
|
* *
|
|
* This program is distributed in the hope that it will be useful, but *
|
|
* WITHOUT ANY WARRANTY; without even the implied warranty of *
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU *
|
|
* General Public License for more details at *
|
|
* http://www.gnu.org/copyleft/gpl.html , or in the COPYING file included *
|
|
* with Nmap. *
|
|
* *
|
|
***************************************************************************/
|
|
|
|
/* $Id$ */
|
|
|
|
|
|
/* Character pool memory allocation */
|
|
#include "charpool.h"
|
|
|
|
static char *charpool[16];
|
|
static int currentcharpool;
|
|
static int currentcharpoolsz;
|
|
static char *nextchar;
|
|
static int charpool_initialized = 0;
|
|
|
|
#define ALIGN_ON sizeof(char *)
|
|
|
|
static int cp_init(void) {
|
|
/* Create our char pool */
|
|
currentcharpool = 0;
|
|
currentcharpoolsz = 16384;
|
|
nextchar = charpool[0] = (char *) safe_malloc(currentcharpoolsz);
|
|
charpool_initialized = 1;
|
|
return 0;
|
|
}
|
|
|
|
static inline void cp_grow(void) {
|
|
/* Doh! We've got to make room */
|
|
if (++currentcharpool > 15) {
|
|
fatal("Character Pool is out of buckets!");
|
|
}
|
|
currentcharpoolsz <<= 1;
|
|
|
|
nextchar = charpool[currentcharpool] = (char *)
|
|
safe_malloc(currentcharpoolsz);
|
|
}
|
|
|
|
void *cp_alloc(int sz) {
|
|
char *p;
|
|
int modulus;
|
|
|
|
if (!charpool_initialized) cp_init();
|
|
|
|
if ((modulus = sz % ALIGN_ON))
|
|
sz += ALIGN_ON - modulus;
|
|
|
|
if ((nextchar - charpool[currentcharpool]) + sz <= currentcharpoolsz) {
|
|
p = nextchar;
|
|
nextchar += sz;
|
|
return p;
|
|
}
|
|
/* Doh! We've got to make room */
|
|
cp_grow();
|
|
|
|
return cp_alloc(sz);
|
|
|
|
}
|
|
|
|
char *cp_strdup(const char *src) {
|
|
const char *p;
|
|
char *q;
|
|
/* end points to the first illegal char */
|
|
char *end;
|
|
int modulus;
|
|
|
|
if (!charpool_initialized)
|
|
cp_init();
|
|
|
|
end = charpool[currentcharpool] + currentcharpoolsz;
|
|
q = nextchar;
|
|
p = src;
|
|
while((nextchar < end) && *p) {
|
|
*nextchar++ = *p++;
|
|
}
|
|
|
|
if (nextchar < end) {
|
|
/* Goody, we have space */
|
|
*nextchar++ = '\0';
|
|
if ((modulus = (nextchar - q) % ALIGN_ON))
|
|
nextchar += ALIGN_ON - modulus;
|
|
return q;
|
|
}
|
|
|
|
/* Doh! We ran out -- need to allocate more */
|
|
cp_grow();
|
|
|
|
return cp_strdup(src);
|
|
}
|