| Age | Commit message (Collapse) | Author | |
|---|---|---|---|
| 2015-02-28 | Remove redundant checks | sin | |
| We can never have an array of more than SIZE_MAX/2/sizeof(gid_t) gid_t's. | |||
| 2015-02-28 | Add readlink() and readlinkat() checks | sin | |
| 2015-02-28 | Add ttyname_r() check | sin | |
| 2015-02-28 | Add getgroups() check | sin | |
| Since getgroups() will never write more than NGROUPS_MAX entries we might as well cap len to that value. The following should probably not trap the program: gid_t set[NGROUPS_MAX]; getgroups(NGROUPS_MAX + 1, set); | |||
| 2015-02-28 | Add getdomainname() check | sin | |
| 2015-02-25 | Add getlogin_r() check | sin | |
| 2015-02-24 | Add write() check | sin | |
| 2015-02-24 | Remove compile time checks | sin | |
| These can produce false positives. Given that we support fortify source level 1 we shouldn't break valid code. | |||
| 2015-02-23 | Add gethostname() checks | sin | |
| 2015-02-22 | Remove header license comments | sin | |
| 2015-02-05 | Add getcwd() checks | sin | |
| 2015-02-05 | Add confstr() checks | sin | |
| 2015-02-04 | Remember to #undef __errordecl | sin | |
| Thanks zhasha for spotting this. | |||
| 2015-02-04 | Style fix | sin | |
| 2015-01-30 | Remove pwrite/write | sin | |
| 2015-01-30 | Add pread() and pwrite() checks | sin | |
| 2015-01-29 | Style fix | sin | |
| 2015-01-29 | Add read()/write() checks | sin | |
