TNT/include
m1ngsama 36464007e8 fix(security): implement buffer security enhancements
- Replace all strcpy() calls with strncpy() to prevent buffer overflows
- Add buffer overflow checking in client_printf() vsnprintf result
- Implement UTF-8 sequence validation to prevent malformed input
- Add utf8_is_valid_sequence() function with complete validation
- Enhance read_username() with UTF-8 boundary checks
- Add UTF-8 validation for message input handling

These changes address:
- Buffer overflow vulnerabilities (lines 178, 423, 510)
- Insufficient vsnprintf() error checking (line 106)
- Missing UTF-8 sequence validation (lines 156-171)

Fixes prevent:
- Buffer overflow attacks
- Overlong UTF-8 encoding exploits
- Invalid UTF-8 surrogates injection
2026-01-22 13:54:15 +08:00
..
.gitkeep Initial commit 2025-07-01 09:00:00 +08:00
chat_room.h Initial commit 2025-07-01 09:00:00 +08:00
common.h Initial commit 2025-07-01 09:00:00 +08:00
message.h Initial commit 2025-07-01 09:00:00 +08:00
ssh_server.h Fix critical memory and concurrency bugs 2025-11-30 09:00:00 +08:00
tui.h Replace telnet with SSH and fix full-screen display 2025-11-24 16:48:14 +08:00
utf8.h fix(security): implement buffer security enhancements 2026-01-22 13:54:15 +08:00