mirror of git://git.suckless.org/sbase
93fd817536
It has become a common idiom in sbase to check strlcat() and strlcpy() using if (strl{cat, cpy}(dst, src, siz) >= siz) eprintf("path too long\n"); However, this was not carried out consistently and to this very day, some tools employed unchecked calls to these functions, effectively allowing silent truncations to happen, which in turn may lead to security issues. To finally put an end to this, the e*-functions detect truncation automatically and the caller can lean back and enjoy coding without trouble. :) |
||
---|---|---|
.. | ||
agetcwd.c | ||
apathmax.c | ||
concat.c | ||
cp.c | ||
crypt.c | ||
ealloc.c | ||
enmasse.c | ||
eprintf.c | ||
eregcomp.c | ||
estrtod.c | ||
fnck.c | ||
getlines.c | ||
human.c | ||
md5.c | ||
mode.c | ||
putword.c | ||
reallocarray.c | ||
recurse.c | ||
rm.c | ||
sha1.c | ||
sha256.c | ||
sha512.c | ||
strcasestr.c | ||
strlcat.c | ||
strlcpy.c | ||
strsep.c | ||
strtonum.c | ||
unescape.c |