<feed xmlns='http://www.w3.org/2005/Atom'>
<title>fortify-headers, branch 2.3.1</title>
<subtitle>Standalone portable header-based implementation of FORTIFY_SOURCE=3 
</subtitle>
<id>http://git.dustri.org/fortify-headers/atom?h=2.3.1</id>
<link rel='self' href='http://git.dustri.org/fortify-headers/atom?h=2.3.1'/>
<link rel='alternate' type='text/html' href='http://git.dustri.org/fortify-headers/'/>
<updated>2024-07-02T13:40:44Z</updated>
<entry>
<title>Update a bit the readme</title>
<updated>2024-07-02T13:40:44Z</updated>
<author>
<name>jvoisin</name>
</author>
<published>2024-07-02T13:40:44Z</published>
<link rel='alternate' type='text/html' href='http://git.dustri.org/fortify-headers/commit/?id=936d55d4c263264bc21ccdaeed2537ff0d4320f2'/>
<id>urn:sha1:936d55d4c263264bc21ccdaeed2537ff0d4320f2</id>
<content type='text'>
</content>
</entry>
<entry>
<title>Add a test for C++ compilation</title>
<updated>2024-06-21T14:40:26Z</updated>
<author>
<name>jvoisin</name>
</author>
<published>2024-06-21T14:25:40Z</published>
<link rel='alternate' type='text/html' href='http://git.dustri.org/fortify-headers/commit/?id=8f8e5c1a7854f05bfa94fc41033706bc14682223'/>
<id>urn:sha1:8f8e5c1a7854f05bfa94fc41033706bc14682223</id>
<content type='text'>
</content>
</entry>
<entry>
<title>Fix some pointer-arithmetic warnings</title>
<updated>2024-06-15T13:46:35Z</updated>
<author>
<name>jvoisin</name>
</author>
<published>2024-06-14T17:46:14Z</published>
<link rel='alternate' type='text/html' href='http://git.dustri.org/fortify-headers/commit/?id=520e7e4a631cc038b3e867b2255235da35a98ece'/>
<id>urn:sha1:520e7e4a631cc038b3e867b2255235da35a98ece</id>
<content type='text'>
This should fix the second part of #59
</content>
</entry>
<entry>
<title>Remove `restrict` keywords</title>
<updated>2024-06-14T17:37:48Z</updated>
<author>
<name>jvoisin</name>
</author>
<published>2024-06-14T17:37:48Z</published>
<link rel='alternate' type='text/html' href='http://git.dustri.org/fortify-headers/commit/?id=6939e3382a232d20882c1c7e74274132de154bb6'/>
<id>urn:sha1:6939e3382a232d20882c1c7e74274132de154bb6</id>
<content type='text'>
- They're not used anywhere else in fortify-headers
- It's breaking compilation on C++, because compatibility is hard

It was initially reported on https://gitlab.alpinelinux.org/alpine/aports/-/issues/16200
</content>
</entry>
<entry>
<title>Add vasprintf/asprintf</title>
<updated>2024-05-26T20:19:27Z</updated>
<author>
<name>jvoisin</name>
</author>
<published>2024-05-20T12:48:35Z</published>
<link rel='alternate' type='text/html' href='http://git.dustri.org/fortify-headers/commit/?id=1becad43298e74ba73bc66f9d44523e5d121c667'/>
<id>urn:sha1:1becad43298e74ba73bc66f9d44523e5d121c667</id>
<content type='text'>
The only hardening being done here is to set the char** parameter to thos
functions to NULL in case of an error, to prevent it from being used should
people forget to check return values. This is already done on some BSD, as well
as in Rocky Linux.
</content>
</entry>
<entry>
<title>Improve the testsuite reliability wrt. gcc</title>
<updated>2024-05-20T08:22:46Z</updated>
<author>
<name>jvoisin</name>
</author>
<published>2024-05-20T07:38:42Z</published>
<link rel='alternate' type='text/html' href='http://git.dustri.org/fortify-headers/commit/?id=92c611ad8abb146ed548301de8bc011c2b17bccd'/>
<id>urn:sha1:92c611ad8abb146ed548301de8bc011c2b17bccd</id>
<content type='text'>
</content>
</entry>
<entry>
<title>Add a test</title>
<updated>2024-04-24T16:40:13Z</updated>
<author>
<name>jvoisin</name>
</author>
<published>2024-04-24T16:36:10Z</published>
<link rel='alternate' type='text/html' href='http://git.dustri.org/fortify-headers/commit/?id=3375426d8c18f43f58ab83c261735b04562828ae'/>
<id>urn:sha1:3375426d8c18f43f58ab83c261735b04562828ae</id>
<content type='text'>
</content>
</entry>
<entry>
<title>Fix some overlap mismatch</title>
<updated>2024-04-24T15:14:46Z</updated>
<author>
<name>jvoisin</name>
</author>
<published>2024-04-24T15:09:08Z</published>
<link rel='alternate' type='text/html' href='http://git.dustri.org/fortify-headers/commit/?id=a817e1555a755224cacc1cbdeeaefb6a1de606f0'/>
<id>urn:sha1:a817e1555a755224cacc1cbdeeaefb6a1de606f0</id>
<content type='text'>
This was caught by the following test:

```

int main(void) {
    char c[32];
    memcpy(c, c + 16, 16);
}
```

Reported-by: q66
</content>
</entry>
<entry>
<title>Disable pedantic checks by default</title>
<updated>2024-04-24T12:51:19Z</updated>
<author>
<name>jvoisin</name>
</author>
<published>2024-04-24T12:49:52Z</published>
<link rel='alternate' type='text/html' href='http://git.dustri.org/fortify-headers/commit/?id=265fa03fa0c467c9c41d803ebe2a538e758cba20'/>
<id>urn:sha1:265fa03fa0c467c9c41d803ebe2a538e758cba20</id>
<content type='text'>
They can be re-enabled via `PEDANTIC_CHECKS`
</content>
</entry>
<entry>
<title>Relax our checks for memchr on C11 and above</title>
<updated>2024-03-19T17:35:13Z</updated>
<author>
<name>jvoisin</name>
</author>
<published>2024-03-19T17:35:13Z</published>
<link rel='alternate' type='text/html' href='http://git.dustri.org/fortify-headers/commit/?id=8ed72e7c1caa0eb4238e649063c26a11720935de'/>
<id>urn:sha1:8ed72e7c1caa0eb4238e649063c26a11720935de</id>
<content type='text'>
Since C11:

&gt; This function behaves as if it reads the bytes sequentially and stops as soon
as a matching bytes is found: if the array pointed to by ptr is smaller than
count, but the match is found within the array, the behavior is well-defined.

Reported-by: q66
</content>
</entry>
</feed>
