summaryrefslogtreecommitdiffstats
path: root/ospfd/ospf_interface.c
Commit message (Collapse)AuthorAgeFilesLines
* From: kamatchi soundaram <kamatchi@tdd.sj.nec.com>merge.zprivs.head.4paul2003-06-041-0/+1
| | | | | | | | | | | | | | Subject: [zebra 19263] Another memory leak!! is zebra OSPF This memory leak gets into picture whenever any interface goes down. Problem found and desctription: Whenever the interface goes down, the "def_params" (member of ospf_if_info) structure memory is not freed. Fix made: added the following line to free the "def_params" memory of ospf_if_info before calling the "XFREE(MTYPE_OSPF_IF_INFO, ifp->info);" The added line is: ospf_del_if_params ((struct ospf_if_params *) IF_DEF_PARAMS (ifp));
* From: kamatchi soundaram <kamatchi@tdd.sj.nec.com>paul2003-06-041-3/+2
| | | | | | | Subject: [zebra 19262] Re: Memory leak in OSPF Fix applied for Kamatchi's original report was to remove the auth_crypt initialisation from the wrong function. This should fix that.
* From: kamatchi soundaram <kamatchi@tdd.sj.nec.com>paul2003-06-031-2/+0
| | | | | | | | | | | | | | | Subject: [zebra 19259] Memory leak in OSPF The detail of the memory leak follows: File name: ospf_interface.c Function name: ospf_if_new_hook(). Type of leak: Overwriting the already allocated memory. Problem found and description: The ospf_new_if_params() fn allocates a memory for "auth_crypt" which is overwritten, down in the fn (ospf_if_new_hook) by explicitely allocating a memory for the same "auth_crypt". Fix: remove allocation from ospf_new_if_params()
* Fix missing bracket from previous commit.paul2003-05-241-2/+3
|
* 2003-05-24 Kenji Yabuuchipaul2003-05-241-1/+5
| | | | | * ospf_interface.c(ospf_if_lookup_recv_if): Use the most specific match for interface lookup.
* Denis Ovsienko <zebra@pilot.org.ua>paul2003-04-171-1/+2
| | | | | | Subject: [zebra 18767] possible SIGSEGV Fix incorrect memset
* 2003-04-04 Paul Jakma <paul@dishone.st>paul2003-04-041-0/+1
| | | | | | | | | * Sync to Zebra CVS * Fix lib/thread.h leak * Fix small Opaque LSA leak * Do not configure OSPF interfaces for secondary addresses * vtysh fixes from Hasso * Dave Watson's missing ntohs fix
* Remove redundant memsetpaul2003-03-281-2/+0
|
* 2003-03-25 Paul Jakma <paul@dishone.st>paul2003-03-251-48/+56
| | | | | | | | * sync to latest zebra CVS * spec file: updated and added define for ospf-api/client NB: OSPF-API has been broken by the zebra.org changes, which has added struct ospf * as a new arg to many functions
* fixes an assert which doesnt seem to take into account that route_node_getpaul2003-02-181-1/+4
| | | | | | | | may return an existing node. (if the code wants a /new/ node why not use route_node_set? if it doesnt mind - then the assert is wrong). this bug is in zebra.org CVS. (must be an extremely rare/unlikely bug though).
* Kevin C Miller <kevinm@andrew.cmu.edu>patch.z16681.ospfd.nssapaul2002-12-131-1/+16
| | | | [zebra 16681] OSPF NSSA Patches
* Initial revisionpaul2002-12-131-0/+1045