commit 3b0e3008e41c967e459f87b6ca8658ef26f49bc9
Author: Paul Jakma <
[email protected]>
Date: Mon Jan 23 15:14:08 2017 +0000
configure: Bump version to 1.1.1
commit f0705d523420ece274410c3df9f4b8fb043094c0
Author: Paul Jakma <
[email protected]>
Date: Wed Jan 11 10:02:32 2017 +0000
HACKING: Update useful URLs
commit a66b46208f10f4453dd63cec8a99a2218c7b4764
Author: Paul Jakma <
[email protected]>
Date: Mon Jan 9 13:06:56 2017 +0000
HACKING: Add 'Objectives', 'Governance', and an initial 'Code of Conduct'
commit e992eb98d1ec8da84c7d0dffb1388bfbe935f16b
Author: Paul Jakma <
[email protected]>
Date: Thu Jan 5 12:46:17 2017 +0000
HACKING: set a4paper by default
commit 126b0e7c2915fb7ec3e5f72e625433a83568c7d6
Author: Paul Jakma <
[email protected]>
Date: Fri Nov 18 14:40:41 2016 +0000
vty: Add ctrl-v <literal> to allow, e.g., '?' to be input for regex
* Support the standard ctrl-v <literal> control sequence. Otherwise there
is no way to do this from the venerable telnet vty. vtysh supports this
(configurably) via readline.
* lib/vty.c: (VTY_ESC_LITERAL) New mode, for ctrl-v.
(vty_read) Additional mode to go ctrl-v -> VTY_ESC_LITERAL, and
always insert next char.
Acked-by:
[email protected]
commit f5a4488a0dda521f19e96f2615f4a8b134c5878b
Author: Jafar Al-Gharaibeh <
[email protected]>
Date: Mon Aug 1 18:14:38 2016 -0500
vtysh: Fix, guard against NULL pointer dereference
getpwuid() may fail returning a null value leaving subsequent
code vulnerable to a null pointer dereference.
Tested-by: NetDEF CI System <
[email protected]>
commit 71e0ba780bd7ba1a6fdc71ff673e3ef5aee61e08
Author: Nick Hilliard <
[email protected]>
Date: Tue Dec 27 22:51:51 2016 +0000
vtysh: make warnings about node installs a non-default compile-time option
* lib/command.c: (install_element) Suppress duplicate command install warnings
for vtysh
commit a64c66b105929b0f0fc19743f34dc29c760df967
Author: Renato Westphal <
[email protected]>
Date: Fri Jan 6 16:30:03 2017 +0700
zebra: fix build on OpenBSD >= 5.9
RTF_XRESOLVE was removed from the OpenBSD tree recently.
commit 99e00a19bb8afcf081d1551b886c6d85188e6c60
Author: Paul Jakma <
[email protected]>
Date: Mon Jan 23 14:47:32 2017 +0000
lib: Bump library version-info
commit 7d66284a5817a1613b1e4d64a0775ec04fdf8c01
Author: Paul Jakma <
[email protected]>
Date: Thu Jan 19 10:39:23 2017 +0000
lib: ensure vty buf is nul terminated and wrap puts to it with checks
* vty.c: Fix str* overruns in previous commit, which I reported to the
author. Add bit more checking of updates to vty buffer.
Swap VTY_BUFSIZ over to vty->max, as that should be the external API.
* vty.c: (vty_buf_assert) conditions that should always be assertable for
vty buffer.
(vty_buf_put) little wrapper to check char puts to vty input buffer,
and unconditionally write nul at very end of buffer as guard.
Won't always work, as some places use mem* to manipulate.
(vty_self_insert{,_overwrite}) Length check needs to leave room for nul.
Use vty_buf_put.
(vty_insert_word_overwrite) Length check needs to leave room for nul.
(*) Add vty_buf_assert calls.
Merging in fixes from Quentin Young <
[email protected]>
commit b7ceefea77a246fe5c1dcd1b91bf6079d1b97c02
Author: Quentin Young <
[email protected]>
Date: Tue Jan 10 23:33:50 2017 +0000
lib: limit size of vty buffer to 4096 bytes
This removes the automatic resizing of the vty input buffer and places a
hard size cap of 4096 bytes. It also fixes a potentially unsafe strcpy.
[Edits by Paul Jakma,
[email protected]]
commit 5477ee7b9d8d24d2bb61335c62f3d6c5e99fc901
Author: Paul Jakma <
[email protected]>
Date: Wed Jan 11 11:18:22 2017 +0000
Revert "opsf6d: Update router-LSA when nbr's interface-ID changes"
This reverts commit e509af86e3579944b7cde942ca3ee3427db1936a.
See Bug #885