- Nov 11, 2021
-
-
Timo Teräs authored
The adb object for apk_pkg_from_adb() was changed in commit 7d6de220 "database: support loading v3 indexes" which also addressed the broken site in question but omitted updating the argument. fixes #10783
-
Timo Teräs authored
Always return the original length; not the one with trailing '/' amended. fixes c60b7424 "optimize apk_pathbuilder_pop to get the old length" ref #10784
-
Timo Teräs authored
The apk_istream is null for zero length files, and needs special handling. fixes #10784
-
- Nov 09, 2021
-
-
Timo Teräs authored
avoids memrchr
-
Timo Teräs authored
give a fake trust root allowing anything. adbdump code will verify and dump each signature individually.
-
Timo Teräs authored
-
Timo Teräs authored
by adding an abstraction layer to the file system
-
- Nov 03, 2021
-
-
Timo Teräs authored
When extraction failed, the user has had no opportunity to edit any files. Just clean up.
-
Timo Teräs authored
fix also the progress callback on uvol extraction
-
Timo Teräs authored
-
Timo Teräs authored
-
- Oct 27, 2021
-
-
Timo Teräs authored
-
- Oct 25, 2021
-
-
Timo Teräs authored
-
Timo Teräs authored
Report also version numbers as invalid if there's more than 18 digits. fixes #10774
-
- Oct 04, 2021
-
-
Timo Teräs authored
-
- Sep 13, 2021
-
-
Timo Teräs authored
and fix the error code if untrusted adb is seen
-
- Sep 03, 2021
-
-
-
Timo Teräs authored
apk_extract_file() already calls unlink if the error is fatal.
-
Timo Teräs authored
-
see aports#11736 [TT: minor stylistic change]
-
- Aug 24, 2021
-
-
Paul Spooren authored
Without this header the build fails when used as a OpenWrt build dependency. Signed-off-by:
Paul Spooren <mail@aparcar.org>
-
- Aug 23, 2021
-
-
Timo Teräs authored
-
Timo Teräs authored
Make sure we always have valid struct apk_trust * for code using it. Load the signing keys directly when being specified to produce sane error message if loading them fails.
-
Timo Teräs authored
In most places where pointer can be an 'error' it cannot be null pointer. Further, in those cases just calling PTR_ERR() is not enough to handle the null case. Simplify code by removing this case. If NULL case needs to be handled, it's better to add separate check and return fixed error code in that case.
-
Timo Teräs authored
-
Timo Teräs authored
- check magic field for 'ustar' on read - harden get_octal to report errors on non-octal characters (e.g. GNU base256 encoding), fixes #10757 - fix mtime and size octal fields to not have zero terminator
-
Timo Teräs authored
fixes #10762
-
Timo Teräs authored
fixes #10759
-
- Aug 17, 2021
-
-
Timo Teräs authored
'is' is null for directories
-
- Aug 03, 2021
-
-
Timo Teräs authored
Directories are handled specially in package installation code, but extract applet uses also apk_extract_file() to create directories. These should not be unlinked as that fails with unexpected error code terminating the extraction.
-
Timo Teräs authored
Unbreak handling of base 16 in fetch_parseuint(). It is used only in http chunked mode handling. Fixes: "libfetch: fix range checking for http/ftp protocol parsing"
-
Timo Teräs authored
-
- Jul 30, 2021
-
-
Timo Teräs authored
-
Timo Teräs authored
-
Timo Teräs authored
-
Timo Teräs authored
The extract applet now works with both v2 and v3 packages.
-
- Jul 27, 2021
-
-
Timo Teräs authored
This splits the callbacks by type, and further prepares the API to be usable for v3 files too.
-
Timo Teräs authored
This moves and isolates the tar code to tar.c. And the actual file extraction to disk is moved to extract.c. A new API is introduced and used for v2 file extraction. This essentially moves and isolates the apk_sign_ctx_* beast into extract_v2.c and offers a saner interface to handling packages. A place holder is added for v3 extraction.
-
- Jul 26, 2021
-
-
Timo Teräs authored
fix the error checking, allow --force-overwrite to work and do not delete existing file in case of error
-
Timo Teräs authored
Various parsing of numeric strings were not having adequate range checking causing information leak or potential crash. CVE-2021-36159 fixes #10749 Co-authored-by:
Ariadne Conill <ariadne@dereferenced.org> Reported-by:
Samanta Navarro <ferivoz@riseup.net>
-