aboutsummaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorChris Luke <chrisy@flirble.org>2016-04-29 08:14:38 -0400
committerDave Barach <openvpp@barachs.net>2016-04-29 12:37:02 +0000
commit1aed76feede0c05cbd2a9b2bc8ef4e1625f0568b (patch)
treea2fcd275831afeaf29cbb95e04d67b2f2edfa603
parentbeceab90520d38aa0b90427d0c829d67ca843161 (diff)
VPP-27 Extend telnet protocol buffer guard
With Telnet protocol overhead, the string "xterm-256color", which is the norm when the terminal is iTerm on a Mac, is longer than the 16 byte lookahead overflow guard in the Telnet protocol processor. This extends it to 24 bytes. This guard is designed to encourage the protocol processor to quit waiting for bytes indefinitely if those already in the buffer do not form a complete message. Whilst this is unlikely, extending the guard length would mean more bytes need to be received before it gives up. Change-Id: Ibaa3d35b78bfd298fe0e4f4c6e508440f122e916 Signed-off-by: Chris Luke <chrisy@flirble.org>
-rw-r--r--vlib/vlib/unix/cli.c2
1 files changed, 1 insertions, 1 deletions
diff --git a/vlib/vlib/unix/cli.c b/vlib/vlib/unix/cli.c
index 91dfd117caa..7fb20560d77 100644
--- a/vlib/vlib/unix/cli.c
+++ b/vlib/vlib/unix/cli.c
@@ -71,7 +71,7 @@
/** Maximum depth into a byte stream from which to compile a Telnet
* protocol message. This is a saftey measure. */
-#define UNIX_CLI_MAX_DEPTH_TELNET 16
+#define UNIX_CLI_MAX_DEPTH_TELNET 24
/** Unix standard in */
#define UNIX_CLI_STDIN_FD 0