summaryrefslogtreecommitdiffstats
path: root/src/util/util.h
Commit message (Collapse)AuthorAgeFilesLines
* Add overflow check to SAFEALIGN_COPY_*_CHECK macrosSumit Bose2011-01-111-3/+6
|
* Validate user supplied size of data itemsSumit Bose2011-01-111-0/+5
| | | | | | Specially crafted packages might lead to an integer overflow and the parsing of the input buffer might not continue as expected. This issue was identified by Sebastian Krahmer <krahmer@suse.de>.
* Introduce sss_hash_create_ex()Sumit Bose2010-12-201-0/+10
|
* krb5_child returns TGT lifetimeSumit Bose2010-12-031-0/+6
|
* Add a special filter type to handle enumerationsSumit Bose2010-12-021-0/+2
|
* Add utility function to sanitize LDAP/LDB filtersStephen Gallagher2010-11-151-0/+11
| | | | Also adds a unit test.
* Add a missing include fileSumit Bose2010-10-131-0/+1
| | | | | strcasecmp() is defined in strings.h which might not be included under certain conditions.
* Add common hash table setupStephen Gallagher2010-10-081-0/+5
| | | | | sss_hash_create() produces a dhash table living in the talloc hierarchy.
* Add safe copy/move macros for uint16_tJakub Hrozek2010-09-081-1/+11
|
* Add dup_string_list() utility functionStephen Gallagher2010-08-031-0/+6
|
* Add diff_string_lists utility functionStephen Gallagher2010-08-031-0/+13
| | | | Includes a unit test
* Add sss_log() functionStephen Gallagher2010-07-091-0/+12
| | | | | Right now, this log function writes to the syslog. In the future, it could be modified to work with ELAPI or another logging API.
* Move parse_args() to utilSumit Bose2010-05-271-0/+2
|
* Add ldap_krb5_ticket_lifetime optionSumit Bose2010-05-161-0/+5
|
* Clean up kdcinfo and kpasswdinfo files when exitingStephen Gallagher2010-05-071-0/+1
|
* Avoid accessing half-deallocated memory when using talloc_zfree macro.eindenbom2010-04-161-1/+5
| | | | | | The correct memory deallocation sequence is: - clear pointer to memory first - then deallocate memory
* Protect against check-and-open race conditionsStephen Gallagher2010-04-061-0/+29
| | | | | | | | | | | | | | | | | There is a small window between running lstat() on a filename and opening it where it's possible for the file to have been modified. We were protecting against this by saving the stat data from the original file and verifying that it was the same file (by device and inode) when we opened it again, but this is an imperfect solution, as it is still possible for an attacker to modify the permissions during this window. It is much better to simply open the file and test on the active file descriptor. Resolves https://fedorahosted.org/sssd/ticket/425 incidentally, as without the initial lstat, we are implicitly accepting symlinks and only verifying the target file.
* Reopen logs when SIGHUP is caughtJakub Hrozek2010-03-081-0/+1
| | | | | | | | Upon receiving SIGHUP, the monitor signals all services to reopen their debug logs. It is also possible to signal individual services to reopen their particular files. Fixes: #332
* Improve safe alignment buffer handling macrosSimo Sorce2010-03-031-15/+24
| | | | | | | | | Make the counter optional so that alignment safe macros can be used also where there is no counter to update. Change arguments names so that they are not deceiving (ptr normlly identify a pointer) Turn the memcpy substitute into an inline function so that passing a pointer to rp and checking for it doesn't make the compiler spit lots of warnings.
* Check and set permissions on SBUS socketsSumit Bose2010-02-231-1/+16
|
* Rename server/ directory to src/Stephen Gallagher2010-02-181-0/+256
Also update BUILD.txt