nfv/guest-client/guest-client-3.0.1/guest_client_api
Luis Botello be468f45a7 Improve security by avoiding buffer overflows
This patch adds compiler flags to improve the security of STX code.
Flags added:
Format string vulnerabilities:           CFLAGS="-Wformat -Wformat-security"
Compiler will treat string format warnings as errors,
so at compiling level, buffer overflow is avoided.

Story: 2004380
Task: 28808

Signed-off-by: Luis Botello  <luis.botello.ortega@intel.com>
Reviewed-by: Erich Cordoba <erich.cordoba.malibran@intel.com>
             Victor Rodriguez <vm.rod25@gmail.com>
Suggested-by: Victor Rodriguez <vm.rod25@gmail.com>
              Erich Cordoba <erich.cordoba.malibran@intel.com>

Change-Id: I7e844718e14b35893f9eeb725e32d9d7477f0d57
2019-01-09 05:46:04 -06:00
..
guest_api_debug.c Turn on Guest-Client logs on centos guest image 2018-06-18 11:43:57 -05:00
guest_api_debug.h StarlingX open source release updates 2018-05-31 07:36:51 -07:00
guest_api_stream.c StarlingX open source release updates 2018-05-31 07:36:51 -07:00
guest_api_stream.h StarlingX open source release updates 2018-05-31 07:36:51 -07:00
guest_api_types.c StarlingX open source release updates 2018-05-31 07:36:51 -07:00
guest_api_types.h StarlingX open source release updates 2018-05-31 07:36:51 -07:00
guest_api_unix.c StarlingX open source release updates 2018-05-31 07:36:51 -07:00
guest_api_unix.h StarlingX open source release updates 2018-05-31 07:36:51 -07:00
guest_heartbeat_api.c StarlingX open source release updates 2018-05-31 07:36:51 -07:00
guest_heartbeat_api.h StarlingX open source release updates 2018-05-31 07:36:51 -07:00
Makefile Improve security by avoiding buffer overflows 2019-01-09 05:46:04 -06:00
sample_guest_app.c StarlingX open source release updates 2018-05-31 07:36:51 -07:00