Commit Graph

135 Commits

Author SHA1 Message Date
kardel 55fde488db using the correct type makes it compile on alpha too - found by Kurt Schreiner 2006-07-29 14:56:57 +00:00
kardel af2ffb8cb1 backout change from import.
was introduced within ntp and causing
grief there too (partly reason for p3).
this change is not necessary for NetBSD.
2006-07-29 10:21:37 +00:00
kardel f2de40854d merge 4.2.2p2
signedness fixes
	fd re-allocation for stdio
	PPSAPI fixes in refclock_parse.c
while there clean up last signedness problems for gcc4 compilation
2006-07-29 08:15:29 +00:00
kardel 36f7d8cda6 Import ntp 4.2.2p2 2006-07-29 07:10:38 +00:00
mrg 5609a371c9 make MKCRYPTO=no work again. 2006-06-25 03:02:19 +00:00
kardel d66ddb6f9c use the version that is now in ntp-stable (4.2.2 release branch) 2006-06-18 22:48:51 +00:00
kardel 7d46a5bb55 NetBSD Coverity CID 3804: avoid file pointer leak 2006-06-18 21:35:57 +00:00
kardel 50fd338dac NetBSD Coverity CID 3799: overrun static array (off by one) fixed 2006-06-18 21:30:19 +00:00
kardel e1a3a74084 NetBSD Coverity CID 3797: bad return code check for open(2) fixed
(!fd replaced with fd < 0)
2006-06-18 21:25:13 +00:00
kardel b58f2a229e NetBSD Coverity CID 3796: possible NULL deref 2006-06-18 21:20:35 +00:00
kardel d58917ea1c cope with situations where interface are UP and bound to
INADDR_ANY - ntpd will ignore those interfaces
(bug 637 @bugs.ntp.isc.org)
2006-06-17 12:11:55 +00:00
christos 2e91d940da PR/33724: Scott Ellis: Building a release with MKINET6=no stops in libisc due
to compiler warnings. Fixed misplaced and miscommented #endif
2006-06-13 22:36:36 +00:00
kardel d5b727f28d correct pointer advances broken by previous fix 2006-06-13 21:03:53 +00:00
kardel 3dfb395215 sort out pointer types - found & fix by jmmv 2006-06-12 10:46:19 +00:00
kardel b51cdf6b08 fix pointer deref - found by jmmv 2006-06-12 10:45:27 +00:00
kardel 8704ff927b import and integrate NTP 4.2.2 2006-06-11 19:34:07 +00:00
kardel 9c52afaf31 Import ntp 4.2.2 2006-06-11 14:57:12 +00:00
mrg 995cc7365d initialise tmp_clock() for GCC4. 2006-05-20 19:22:36 +00:00
christos e4162ca0f8 XXX: GCC uninitialized. 2006-05-14 23:36:01 +00:00
christos e75e0ea2a7 another XXX: GCC uninitialized variable. 2006-05-14 01:31:14 +00:00
christos 9da0166ffa Another uninitialized variables XXX: GCC 2006-05-14 01:30:00 +00:00
christos 386c6259af Coverity CID 3497: Don't try to set the day/month if we did not get them
from the clock.
2006-05-13 23:55:23 +00:00
mrg 0fa82c2792 move the extern for clktypes[]'s somewhere it's type is defined. 2006-05-11 00:11:25 +00:00
mrg ebd6722e04 ctl_trap[] is not public so don't extern it. 2006-05-11 00:10:54 +00:00
mrg 084c052803 quell GCC 4.1 uninitialised variable warnings.
XXX: we should audit the tree for which old ones are no longer needed
after getting the older compilers out of the tree..
2006-05-10 21:53:14 +00:00
mrg 0c37c63edc change (mostly) int to socklen_t. GCC 4 doesn't like that int and
socklen_t are different signness.
2006-05-09 20:18:05 +00:00
kardel e01a907378 NetBSD 22 CID 3049,3075: safeguard against (unlikely to impossible) NULL deref 2006-05-04 08:24:05 +00:00
kardel 70ff37328f handle NULL return from d2i_X509() - NetBSD Run 21 Coverity CID 2979 2006-05-02 09:24:19 +00:00
kardel 610b4c0dee dead code: removed (Coverity NetBSD CID 611) 2006-03-29 07:30:30 +00:00
kardel d6c06e8308 fix as discussed in NTP Bug 584, Coverity NetBSD CID 1510 2006-03-29 07:19:34 +00:00
kardel a1cdcab3c8 buffer overrun: backport fix from NTP project (Coverity NetBSD Scan 8: CID 1509) 2006-03-21 11:12:13 +00:00
kardel 15dc7197ee null deref: fix another case of incomplete list handling (Coverity NetBSD Scan 8: CID 986) 2006-03-21 10:28:25 +00:00
kardel dbefff2ee4 error handling: check success of open(2) - bail out early (Coverity CID 1282 NetBSD Scan 5) 2006-03-19 07:20:30 +00:00
kardel 24781071d1 null deref: complete linked list handling beginng condition (Coverity CID 986) 2006-03-19 07:02:47 +00:00
kardel 063cb750db mem leak: unreachable code prevented freeing of allocated memory
(Coverity CID 612 NetBSD Scan 5)
2006-03-18 15:22:34 +00:00
kardel 012eaf5162 null deref: avoid 0 deref (Coverity CID 987 NetBSD Scan 5) 2006-03-18 14:33:20 +00:00
kardel 36ab9cfe6b buffer bounds: one beyond buffer (Coverity CID 1490 NetBSD Scan 5) 2006-03-18 14:25:17 +00:00
kardel a07906a5a8 buffer bounds: buffer full condition wrong for bounds check (Coverity CID 1508 NetBSD Scan 5) 2006-03-18 14:18:59 +00:00
kardel 630d3f115c buffer bounds: correct > - >= error for bounds check (Coverity CID 1511 NetBSD Scan 5) 2006-03-18 14:08:29 +00:00
kardel 99c0e2540c buffer bounds: clamp index for epobuf to buffer bounds (Coverity CID 1512 NetBSD Scan 5) 2006-03-18 14:02:13 +00:00
kardel 80b13f6f4e mem leakage: free old malloced buffer on errors (Coverity CID 2056 NetBSD Scan 5) 2006-03-18 13:44:15 +00:00
kardel ee0722e2b9 avoid close(-1): don't attempt to cleanup INVALID_SOCKET ( ==-1 ) fd's - would lead to close(-1) and FD_CLR((u_int)-1(!), ...) (Coverity CID 1281 NetBSD Scan 5) 2006-03-18 13:13:25 +00:00
kardel 9429ea9653 null deref: backport current ntp code to fix (Coverity CID 759) 2006-03-18 12:40:48 +00:00
kardel 58ad32062f Coverity NetBSD scan CID 2055: fallout fix return/fclose -> fclose/return 2006-03-18 09:28:50 +00:00
kardel e13d171a8e resource leak (fd/mem): fclose() streams on error (Coverity NetBSD scan CID 2055) 2006-03-18 09:26:08 +00:00
kardel 589ea6e802 resource leak (fd/mem): close stream when errors occur (Coverity NetBSD Scan CID 2054) 2006-03-18 08:57:25 +00:00
kardel 862343544d resolve CID 808 for the general case (code didn't trigger it - constant strings were supplied ) 2006-03-18 08:09:03 +00:00
elad 77e1c3c1fc Fix off-by-one, found by Coverity. CID 1466. 2006-03-18 02:35:47 +00:00
kardel 9bccbf4462 Coverity fixes:
CID
687	missing block
988	null pointer deref on shutdown (on open failure - introduced by
	change of contract in ntp_refclock.c)
989	null pointer for private data (could not happen - safeguard anyway)
1513	off by one
2410	misplaced null pointer test
2006-03-18 00:30:30 +00:00
christos 5ca310136d deal with const in the new openssl 2005-11-26 01:10:42 +00:00