<feed xmlns='http://www.w3.org/2005/Atom'>
<title>fortify-headers/tests, branch 2.3.2</title>
<subtitle>Standalone portable header-based implementation of FORTIFY_SOURCE=3 
</subtitle>
<id>http://git.dustri.org/fortify-headers/atom?h=2.3.2</id>
<link rel='self' href='http://git.dustri.org/fortify-headers/atom?h=2.3.2'/>
<link rel='alternate' type='text/html' href='http://git.dustri.org/fortify-headers/'/>
<updated>2024-10-09T23:51:34Z</updated>
<entry>
<title>Disable snprintf/sprintf hardening for now</title>
<updated>2024-10-09T23:51:34Z</updated>
<author>
<name>jvoisin</name>
</author>
<published>2024-10-09T23:20:07Z</published>
<link rel='alternate' type='text/html' href='http://git.dustri.org/fortify-headers/commit/?id=c3b48c6b0bf501802295c85b1cf54275d6b74883'/>
<id>urn:sha1:c3b48c6b0bf501802295c85b1cf54275d6b74883</id>
<content type='text'>
</content>
</entry>
<entry>
<title>Run various C versions in the CI</title>
<updated>2024-10-08T13:21:13Z</updated>
<author>
<name>jvoisin</name>
</author>
<published>2024-10-08T01:51:44Z</published>
<link rel='alternate' type='text/html' href='http://git.dustri.org/fortify-headers/commit/?id=f8155f0b945c5cfb3600d7c146a5d86870ed09d2'/>
<id>urn:sha1:f8155f0b945c5cfb3600d7c146a5d86870ed09d2</id>
<content type='text'>
</content>
</entry>
<entry>
<title>Work around a gcc warning</title>
<updated>2024-09-06T11:38:22Z</updated>
<author>
<name>jvoisin</name>
</author>
<published>2024-09-06T11:36:15Z</published>
<link rel='alternate' type='text/html' href='http://git.dustri.org/fortify-headers/commit/?id=f2e7f24daaa43c0927130b6ed02c3ed17689b3ca'/>
<id>urn:sha1:f2e7f24daaa43c0927130b6ed02c3ed17689b3ca</id>
<content type='text'>
It seems that annotating sprintf with `write` makes gcc unhappy, as its
analyser is unable to understand that we're checking if `__b != -1` before
calling `__orig_snprintf`, so let's comment this annotation for now.
</content>
</entry>
<entry>
<title>prefix special defines with FORTIFY_</title>
<updated>2024-07-10T13:20:23Z</updated>
<author>
<name>psykose</name>
</author>
<published>2024-07-10T04:49:02Z</published>
<link rel='alternate' type='text/html' href='http://git.dustri.org/fortify-headers/commit/?id=459d202b1bbf7abb817a596ce9374edfb7b4da8f'/>
<id>urn:sha1:459d202b1bbf7abb817a596ce9374edfb7b4da8f</id>
<content type='text'>
just in case, and because 'PEDANTIC_CHECKS' is a really generic name
</content>
</entry>
<entry>
<title>Add a test for C++ compilation</title>
<updated>2024-06-21T14:40:26Z</updated>
<author>
<name>jvoisin</name>
</author>
<published>2024-06-21T14:25:40Z</published>
<link rel='alternate' type='text/html' href='http://git.dustri.org/fortify-headers/commit/?id=8f8e5c1a7854f05bfa94fc41033706bc14682223'/>
<id>urn:sha1:8f8e5c1a7854f05bfa94fc41033706bc14682223</id>
<content type='text'>
</content>
</entry>
<entry>
<title>Fix some pointer-arithmetic warnings</title>
<updated>2024-06-15T13:46:35Z</updated>
<author>
<name>jvoisin</name>
</author>
<published>2024-06-14T17:46:14Z</published>
<link rel='alternate' type='text/html' href='http://git.dustri.org/fortify-headers/commit/?id=520e7e4a631cc038b3e867b2255235da35a98ece'/>
<id>urn:sha1:520e7e4a631cc038b3e867b2255235da35a98ece</id>
<content type='text'>
This should fix the second part of #59
</content>
</entry>
<entry>
<title>Add vasprintf/asprintf</title>
<updated>2024-05-26T20:19:27Z</updated>
<author>
<name>jvoisin</name>
</author>
<published>2024-05-20T12:48:35Z</published>
<link rel='alternate' type='text/html' href='http://git.dustri.org/fortify-headers/commit/?id=1becad43298e74ba73bc66f9d44523e5d121c667'/>
<id>urn:sha1:1becad43298e74ba73bc66f9d44523e5d121c667</id>
<content type='text'>
The only hardening being done here is to set the char** parameter to thos
functions to NULL in case of an error, to prevent it from being used should
people forget to check return values. This is already done on some BSD, as well
as in Rocky Linux.
</content>
</entry>
<entry>
<title>Add a test</title>
<updated>2024-04-24T16:40:13Z</updated>
<author>
<name>jvoisin</name>
</author>
<published>2024-04-24T16:36:10Z</published>
<link rel='alternate' type='text/html' href='http://git.dustri.org/fortify-headers/commit/?id=3375426d8c18f43f58ab83c261735b04562828ae'/>
<id>urn:sha1:3375426d8c18f43f58ab83c261735b04562828ae</id>
<content type='text'>
</content>
</entry>
<entry>
<title>Fix some overlap mismatch</title>
<updated>2024-04-24T15:14:46Z</updated>
<author>
<name>jvoisin</name>
</author>
<published>2024-04-24T15:09:08Z</published>
<link rel='alternate' type='text/html' href='http://git.dustri.org/fortify-headers/commit/?id=a817e1555a755224cacc1cbdeeaefb6a1de606f0'/>
<id>urn:sha1:a817e1555a755224cacc1cbdeeaefb6a1de606f0</id>
<content type='text'>
This was caught by the following test:

```

int main(void) {
    char c[32];
    memcpy(c, c + 16, 16);
}
```

Reported-by: q66
</content>
</entry>
<entry>
<title>Disable pedantic checks by default</title>
<updated>2024-04-24T12:51:19Z</updated>
<author>
<name>jvoisin</name>
</author>
<published>2024-04-24T12:49:52Z</published>
<link rel='alternate' type='text/html' href='http://git.dustri.org/fortify-headers/commit/?id=265fa03fa0c467c9c41d803ebe2a538e758cba20'/>
<id>urn:sha1:265fa03fa0c467c9c41d803ebe2a538e758cba20</id>
<content type='text'>
They can be re-enabled via `PEDANTIC_CHECKS`
</content>
</entry>
</feed>
