<feed xmlns='http://www.w3.org/2005/Atom'>
<title>src-test2/libexec/bootpd/bootpd.c, branch releng/5.0</title>
<subtitle>FreeBSD source tree</subtitle>
<id>https://cgit-dev.freebsd.org/src-test2/atom?h=releng%2F5.0</id>
<link rel='self' href='https://cgit-dev.freebsd.org/src-test2/atom?h=releng%2F5.0'/>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src-test2/'/>
<updated>2002-05-28T18:36:43Z</updated>
<entry>
<title>This code defined a private __P, nuke it.</title>
<updated>2002-05-28T18:36:43Z</updated>
<author>
<name>Alfred Perlstein</name>
<email>alfred@FreeBSD.org</email>
</author>
<published>2002-05-28T18:36:43Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src-test2/commit/?id=f19d047aec2b1d05cfb00498caff5141094d1124'/>
<id>urn:sha1:f19d047aec2b1d05cfb00498caff5141094d1124</id>
<content type='text'>
</content>
</entry>
<entry>
<title>Assume __STDC__, remove non-__STDC__ code.</title>
<updated>2002-05-28T18:31:41Z</updated>
<author>
<name>Alfred Perlstein</name>
<email>alfred@FreeBSD.org</email>
</author>
<published>2002-05-28T18:31:41Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src-test2/commit/?id=5ed136e814a98e845927fffa6aa7c497dbd8fa5e'/>
<id>urn:sha1:5ed136e814a98e845927fffa6aa7c497dbd8fa5e</id>
<content type='text'>
Reviewed by: md5
</content>
</entry>
<entry>
<title>Mark report() as printflike and fix resulting warnings, including one bug</title>
<updated>2002-02-04T01:28:45Z</updated>
<author>
<name>Kris Kennaway</name>
<email>kris@FreeBSD.org</email>
</author>
<published>2002-02-04T01:28:45Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src-test2/commit/?id=be9efd564109424704e51418a70c2203ca26612b'/>
<id>urn:sha1:be9efd564109424704e51418a70c2203ca26612b</id>
<content type='text'>
(get_errmsg -&gt; get_errmsg())
</content>
</entry>
<entry>
<title>RFC2132 is not clear about whether the "Maximum DHCP Message Size"</title>
<updated>2001-09-25T21:02:10Z</updated>
<author>
<name>Ian Dowse</name>
<email>iedowse@FreeBSD.org</email>
</author>
<published>2001-09-25T21:02:10Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src-test2/commit/?id=3f48bf186fb457559e2f5caf77ad6f68faa0a07f'/>
<id>urn:sha1:3f48bf186fb457559e2f5caf77ad6f68faa0a07f</id>
<content type='text'>
refers to the size of the whole ethernet packet, just the DHCP
message within the UDP payload, or something else. bootpd interpreted
it as a maximum UDP payload size, so it could end up sending
fragmented packets to clients (such as some versions of Etherboot)
that used different interpretations of the maximum message size.

Switch to the most conservative interpretation: ensure that the
ethernet packet containing the response is no larger than the
specified maximum message size. This matches the behaviour of
the ISC dhcpd.

MFC after:	1 week
</content>
</entry>
<entry>
<title>Add `_PATH_DEVZERO'.</title>
<updated>2000-12-09T09:35:55Z</updated>
<author>
<name>David E. O'Brien</name>
<email>obrien@FreeBSD.org</email>
</author>
<published>2000-12-09T09:35:55Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src-test2/commit/?id=1a37aa566b347fbb2d2196786e1e84a79ffea9d5'/>
<id>urn:sha1:1a37aa566b347fbb2d2196786e1e84a79ffea9d5</id>
<content type='text'>
Use _PATH_* where where possible.
</content>
</entry>
<entry>
<title>$Id$ -&gt; $FreeBSD$</title>
<updated>1999-08-28T00:22:10Z</updated>
<author>
<name>Peter Wemm</name>
<email>peter@FreeBSD.org</email>
</author>
<published>1999-08-28T00:22:10Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src-test2/commit/?id=7f3dea244c40159a41ab22da77a434d7c5b5e85a'/>
<id>urn:sha1:7f3dea244c40159a41ab22da77a434d7c5b5e85a</id>
<content type='text'>
</content>
</entry>
<entry>
<title>More egcs warning fixes:</title>
<updated>1999-04-25T22:23:38Z</updated>
<author>
<name>Warner Losh</name>
<email>imp@FreeBSD.org</email>
</author>
<published>1999-04-25T22:23:38Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src-test2/commit/?id=859663719d47f9d552103f222429ecf7530c4240'/>
<id>urn:sha1:859663719d47f9d552103f222429ecf7530c4240</id>
<content type='text'>
	o main returns int not void
	o use return 0 at end of main when needed
	o use braces to avoid potentially ambiguous else
	o don't default to type int (and also remove a useless register
	  modifier).

Reviewed by: obrien and chuckr
</content>
</entry>
<entry>
<title>Ensure that things returned by gethostname() and</title>
<updated>1999-04-07T08:27:45Z</updated>
<author>
<name>Brian Somers</name>
<email>brian@FreeBSD.org</email>
</author>
<published>1999-04-07T08:27:45Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src-test2/commit/?id=9e9a43bdec3ff0ad37e4799b209e0d9513150a6f'/>
<id>urn:sha1:9e9a43bdec3ff0ad37e4799b209e0d9513150a6f</id>
<content type='text'>
friends are terminated and allow for a maximum
host name length of MAXHOSTNAMELEN - 1.
Put parenthesis around sizeof args.
Make some variables static.
Fix telnetd -u (broken by my last commit)

Prompted by: bde
</content>
</entry>
<entry>
<title>Block for buffer overflow.</title>
<updated>1998-12-13T21:02:28Z</updated>
<author>
<name>Eivind Eklund</name>
<email>eivind@FreeBSD.org</email>
</author>
<published>1998-12-13T21:02:28Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src-test2/commit/?id=d284feaa7b8d9e790d7b46d3892e5e7ac9edf4be'/>
<id>urn:sha1:d284feaa7b8d9e790d7b46d3892e5e7ac9edf4be</id>
<content type='text'>
</content>
</entry>
<entry>
<title>PR: bin/9031</title>
<updated>1998-12-12T20:56:53Z</updated>
<author>
<name>Matthew Dillon</name>
<email>dillon@FreeBSD.org</email>
</author>
<published>1998-12-12T20:56:53Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src-test2/commit/?id=3a3c0cf418ef6b926dfb41cc69a49b58078899bb'/>
<id>urn:sha1:3a3c0cf418ef6b926dfb41cc69a49b58078899bb</id>
<content type='text'>
    Changed unbounded strcpy() to snprintf() to fix buffer overrun exploit
</content>
</entry>
</feed>
