TSG-23705 Fix array_size error in last_hit_objects causing coredump TSG-23454 Supports streaming scanning of HTTP request/response headers
This commit is contained in:
@@ -85,7 +85,7 @@ int tfe_scan_internal_exteral_by_last_group(const struct tfe_stream *stream, uui
|
||||
{
|
||||
size_t array_size=256, n_hit_result = 0;
|
||||
int hit_cnt_group = 0, scan_ret = 0;
|
||||
struct maat_hit_object last_hit_objects[128] = {0};
|
||||
struct maat_hit_object last_hit_objects[256] = {0};
|
||||
|
||||
const char *table_name = get_table_name(stream, table_type);
|
||||
if(table_name == NULL)
|
||||
@@ -465,8 +465,8 @@ int tfe_scan_ipv4_addr(const struct tfe_stream *stream, uuid_t *result, struct m
|
||||
|
||||
const char *protocol_uuid =PROTOCOL_TCP_UUID_ID;
|
||||
memset(&objects, 0, sizeof(objects));
|
||||
uuid_parse(protocol_uuid, objects_uuid);
|
||||
uuid_copy(objects.object_uuid, objects_uuid);
|
||||
uuid_parse(protocol_uuid, objects_uuid);
|
||||
uuid_copy(objects.object_uuid, objects_uuid);
|
||||
scan_ret = maat_scan_object(tfe_get_maat_handle(), "TSG_OBJ_IP_PROTOCOL", "ATTR_IP_PROTOCOL", &objects, 1, result+hit_cnt+hit_cnt_ip,
|
||||
MAX_SCAN_RESULT-hit_cnt-hit_cnt_ip, &n_hit_result, scan_mid);
|
||||
if(scan_ret==MAAT_SCAN_HIT)
|
||||
@@ -529,8 +529,8 @@ int tfe_scan_ipv6_addr(const struct tfe_stream *stream, uuid_t *result, struct m
|
||||
|
||||
const char *protocol_uuid =PROTOCOL_TCP_UUID_ID;
|
||||
memset(&objects, 0, sizeof(objects));
|
||||
uuid_parse(protocol_uuid, objects_uuid);
|
||||
uuid_copy(objects.object_uuid, objects_uuid);
|
||||
uuid_parse(protocol_uuid, objects_uuid);
|
||||
uuid_copy(objects.object_uuid, objects_uuid);
|
||||
scan_ret = maat_scan_object(tfe_get_maat_handle(), "TSG_OBJ_IP_PROTOCOL", "ATTR_IP_PROTOCOL", &objects, 1, result+hit_cnt+hit_cnt_ip,
|
||||
MAX_SCAN_RESULT-hit_cnt-hit_cnt_ip, &n_hit_result, scan_mid);
|
||||
if(scan_ret==MAAT_SCAN_HIT)
|
||||
|
||||
Reference in New Issue
Block a user