Commit Graph

34 Commits

Author SHA1 Message Date
joerg
a00bc98930 Provide explicit prototypes in case HAVE_SSP=no. 2014-09-17 00:39:28 +00:00
christos
b02e0dfacc add __stpncpy_chk 2014-04-06 19:29:37 +00:00
christos
d5aa7d4d63 fix incorrect bounds check 2014-04-06 19:29:25 +00:00
christos
2d04609248 fix the limit check. 2014-04-06 01:13:59 +00:00
christos
18305a4758 fix off by one in stpcpy_chk.
christos
2014-04-06 01:01:49 +00:00
christos
baa7071088 we don't support stpncpy until gcc does 2013-11-07 02:01:42 +00:00
christos
eb33cee45c handle old gcc 2013-11-06 16:58:58 +00:00
christos
c15ffc1416 add stp{,n}cpy 2013-11-06 16:31:08 +00:00
christos
cd2724da71 fix doc for strcpy, strcat
add stp{,n}cpy
2013-11-06 16:30:55 +00:00
christos
1fd1820dad simplify 2013-11-06 16:30:27 +00:00
christos
ca2d95d15f avoid linker warning for compat symbols that are used internally in libc,
by introducing a hidden compat_foo() function, using that internally in
libc, and exposing foo as a strong alias to compat_foo(). I am open for
better ideas.
2013-10-04 20:49:16 +00:00
wiz
dd347cecb9 Minus (one) needs a backslash before the minus. 2012-07-19 06:44:12 +00:00
christos
e24e95d4d8 Explain what's going on with fortify being disabled when the optimizer is off:
http://gcc.gnu.org/ml/gcc-patches/2012-06/msg00174.html
2012-07-18 22:22:26 +00:00
jruoho
e1897fd6ba Fix xref; security(8) -> security(7). 2011-03-21 04:42:50 +00:00
christos
61a5737280 off by one 2010-12-28 16:19:25 +00:00
jruoho
5c9efd7bb1 Xref __builtin_return_address(3). 2010-12-19 09:33:52 +00:00
jruoho
a20c806d96 Small modifications to wording, tidy up SEE ALSO. 2010-12-19 08:28:40 +00:00
jruoho
6f013d76df Fix SYNOPSIS, add CAVEATS. 2010-12-19 08:21:36 +00:00
jruoho
595da22eed Reference __builtin_object_size(3) and attribute(3) with each other. 2010-12-16 17:50:39 +00:00
jruoho
829390ffbf gcc -> GCC, offset indent. 2010-04-22 13:41:40 +00:00
wiz
f9884f518a Free malloc()ed buffer in error case. Found by cppcheck. 2010-01-17 23:13:32 +00:00
drochner
683ac0b2d3 make the "src" strings const as in the unchecked equivalents 2009-11-17 20:44:26 +00:00
lukem
38d40fc9f8 sign-compare fix 2009-02-05 05:39:38 +00:00
yamt
4f6334de3c fix a typo 2008-06-06 05:51:46 +00:00
wiz
8b96d555e0 Remove trailing whitespace. Fix typo. Sort SEE ALSO. 2008-05-25 20:07:14 +00:00
wiz
885b937f63 Prepare for HTML output. Remove dot at end of SEE ALSO. 2008-05-25 20:06:53 +00:00
martin
11a6dbe728 Convert TNF licenses to new 2 clause variant 2008-04-30 13:10:46 +00:00
martin
ce099b4099 Remove clause 3 and 4 from TNF licenses 2008-04-28 20:22:51 +00:00
perry
e34be9798b Never use "utilize". It means exactly the same thing as "use", but it
is longer and more cumbersome. It can always be replaced with "use"
without any change in meaning.
2007-08-20 16:07:05 +00:00
kristerw
d0d36b6101 Update includes so that this builds for USE_FORT=no too. 2007-08-04 19:37:52 +00:00
christos
d9b4f5bb0a #undef the fortified functions we use, otherwise we end up calling ourselves
recursively.
XXX: Do we need namespace.h here?
2007-06-03 17:34:35 +00:00
christos
201eeae43d this is not needed. 2007-05-31 21:46:03 +00:00
tls
dc99372be9 Match usage of FORTIFY_SOURCE on other platforms by not requiring special
include path: the normal header files now include the "SSP" ones (which one
should note are not really named right: SSP and FORTIFY_SOURCE are independent
features).

Disable USE_SSP on targets where the compiler doesn't support it at all
(mips, alpha) or it's known broken (sh3).  But enable FORTIFY_SOURCE,
without SSP, on those platforms -- tested on mipsel.
2007-05-30 21:14:35 +00:00
tls
2368dc663d Move FORTIFY_SOURCE implementation from the somewhat ill-named "libssp"
(what other systems keep in libssp, we already have in libc) into libc
to match what other systems with FORTIFY_SOURCE do.  Goodbye, libssp
dependency in libraries and executables.  Discussed with christos and
mrg; Christos will merge the headers to get us the rest of the way to a
FORTIFY_SOURCE implementation that works as others' code expects.
2007-05-30 01:13:14 +00:00