e0f6367446
most tests use debian-devscripts' hardening-check, so only work on ELF systems and can only detect a limited subset of flags. some extra tests actually execute fortify-protected programs and should be slightly more universally applicable.
16 lines
329 B
C
16 lines
329 B
C
/* an example that should be protected by FORTIFY_SOURCE=2 but
|
|
* not FORTIFY_SOURCE=1 */
|
|
#include <stdio.h>
|
|
#include <string.h>
|
|
|
|
struct buffer_with_pad {
|
|
char buffer[7];
|
|
char pad[25];
|
|
};
|
|
|
|
int main(int argc, char *argv[]) {
|
|
struct buffer_with_pad b;
|
|
strcpy(b.buffer, argv[1]);
|
|
puts(b.buffer);
|
|
return 0;
|
|
}
|