Age | Commit message (Collapse) | Author | |
---|---|---|---|
2019-08-23 | Size accounting + alloc() overflow checking, round #2 | David Oberhollenzer | |
Signed-off-by: David Oberhollenzer <david.oberhollenzer@sigma-star.at> | |||
2019-08-23 | Do bounds checking in metadata reader | David Oberhollenzer | |
In all cases where metadata blocks are read, we can roughly (in some cases even preciesly) say in what range those metadata blocks will be, so it makes sense to throw an error if an attempt is made to wander outside this range. Furthermore, when reading from an uncompressed block, it is more reasonable to check against the actual block bounds than to padd it with 0 bytes. Signed-off-by: David Oberhollenzer <david.oberhollenzer@sigma-star.at> | |||
2019-07-30 | Add propper copyright headers to all source files | David Oberhollenzer | |
Signed-off-by: David Oberhollenzer <david.oberhollenzer@sigma-star.at> | |||
2019-07-25 | Add generic read_table function similar to write_table | David Oberhollenzer | |
Signed-off-by: David Oberhollenzer <david.oberhollenzer@sigma-star.at> |