dogcow
499ac5cbee
Looks like OpenSSL now uses an int instead of a long for its version
...
number (!?), so explicitly cast to long in case they change it back.
2006-11-14 02:41:40 +00:00
kardel
9a3db19511
track NTP bug 734: setsockopt(..., IP_MULTICAST_IF, ...) fails on 64 bit platforms
2006-11-06 12:19:30 +00:00
kardel
a1291ab337
cope with struct timeval tv_sec being defined as long instead
...
of the SUS mandated time_t.
2006-07-29 19:22:25 +00:00
kardel
55fde488db
using the correct type makes it compile on alpha too - found by Kurt Schreiner
2006-07-29 14:56:57 +00:00
kardel
f2de40854d
merge 4.2.2p2
...
signedness fixes
fd re-allocation for stdio
PPSAPI fixes in refclock_parse.c
while there clean up last signedness problems for gcc4 compilation
2006-07-29 08:15:29 +00:00
mrg
5609a371c9
make MKCRYPTO=no work again.
2006-06-25 03:02:19 +00:00
kardel
d66ddb6f9c
use the version that is now in ntp-stable (4.2.2 release branch)
2006-06-18 22:48:51 +00:00
kardel
7d46a5bb55
NetBSD Coverity CID 3804: avoid file pointer leak
2006-06-18 21:35:57 +00:00
kardel
e1a3a74084
NetBSD Coverity CID 3797: bad return code check for open(2) fixed
...
(!fd replaced with fd < 0)
2006-06-18 21:25:13 +00:00
kardel
b58f2a229e
NetBSD Coverity CID 3796: possible NULL deref
2006-06-18 21:20:35 +00:00
kardel
d58917ea1c
cope with situations where interface are UP and bound to
...
INADDR_ANY - ntpd will ignore those interfaces
(bug 637 @bugs.ntp.isc.org)
2006-06-17 12:11:55 +00:00
kardel
8704ff927b
import and integrate NTP 4.2.2
2006-06-11 19:34:07 +00:00
kardel
9c52afaf31
Import ntp 4.2.2
2006-06-11 14:57:12 +00:00
mrg
995cc7365d
initialise tmp_clock() for GCC4.
2006-05-20 19:22:36 +00:00
christos
386c6259af
Coverity CID 3497: Don't try to set the day/month if we did not get them
...
from the clock.
2006-05-13 23:55:23 +00:00
mrg
084c052803
quell GCC 4.1 uninitialised variable warnings.
...
XXX: we should audit the tree for which old ones are no longer needed
after getting the older compilers out of the tree..
2006-05-10 21:53:14 +00:00
mrg
0c37c63edc
change (mostly) int to socklen_t. GCC 4 doesn't like that int and
...
socklen_t are different signness.
2006-05-09 20:18:05 +00:00
kardel
e01a907378
NetBSD 22 CID 3049,3075: safeguard against (unlikely to impossible) NULL deref
2006-05-04 08:24:05 +00:00
kardel
70ff37328f
handle NULL return from d2i_X509() - NetBSD Run 21 Coverity CID 2979
2006-05-02 09:24:19 +00:00
kardel
d6c06e8308
fix as discussed in NTP Bug 584, Coverity NetBSD CID 1510
2006-03-29 07:19:34 +00:00
kardel
a1cdcab3c8
buffer overrun: backport fix from NTP project (Coverity NetBSD Scan 8: CID 1509)
2006-03-21 11:12:13 +00:00
kardel
15dc7197ee
null deref: fix another case of incomplete list handling (Coverity NetBSD Scan 8: CID 986)
2006-03-21 10:28:25 +00:00
kardel
dbefff2ee4
error handling: check success of open(2) - bail out early (Coverity CID 1282 NetBSD Scan 5)
2006-03-19 07:20:30 +00:00
kardel
24781071d1
null deref: complete linked list handling beginng condition (Coverity CID 986)
2006-03-19 07:02:47 +00:00
kardel
012eaf5162
null deref: avoid 0 deref (Coverity CID 987 NetBSD Scan 5)
2006-03-18 14:33:20 +00:00
kardel
a07906a5a8
buffer bounds: buffer full condition wrong for bounds check (Coverity CID 1508 NetBSD Scan 5)
2006-03-18 14:18:59 +00:00
kardel
630d3f115c
buffer bounds: correct > - >= error for bounds check (Coverity CID 1511 NetBSD Scan 5)
2006-03-18 14:08:29 +00:00
kardel
99c0e2540c
buffer bounds: clamp index for epobuf to buffer bounds (Coverity CID 1512 NetBSD Scan 5)
2006-03-18 14:02:13 +00:00
kardel
80b13f6f4e
mem leakage: free old malloced buffer on errors (Coverity CID 2056 NetBSD Scan 5)
2006-03-18 13:44:15 +00:00
kardel
ee0722e2b9
avoid close(-1): don't attempt to cleanup INVALID_SOCKET ( ==-1 ) fd's - would lead to close(-1) and FD_CLR((u_int)-1(!), ...) (Coverity CID 1281 NetBSD Scan 5)
2006-03-18 13:13:25 +00:00
kardel
58ad32062f
Coverity NetBSD scan CID 2055: fallout fix return/fclose -> fclose/return
2006-03-18 09:28:50 +00:00
kardel
e13d171a8e
resource leak (fd/mem): fclose() streams on error (Coverity NetBSD scan CID 2055)
2006-03-18 09:26:08 +00:00
kardel
589ea6e802
resource leak (fd/mem): close stream when errors occur (Coverity NetBSD Scan CID 2054)
2006-03-18 08:57:25 +00:00
kardel
9bccbf4462
Coverity fixes:
...
CID
687 missing block
988 null pointer deref on shutdown (on open failure - introduced by
change of contract in ntp_refclock.c)
989 null pointer for private data (could not happen - safeguard anyway)
1513 off by one
2410 misplaced null pointer test
2006-03-18 00:30:30 +00:00
christos
5ca310136d
deal with const in the new openssl
2005-11-26 01:10:42 +00:00
christos
19d0f25ed5
PR/31580: Miles Nordin 'ntptime' no longer reports ERROR and UNSYNC when ntpd
...
isn't synchronized (ntpd bug #506 )
2005-10-20 15:41:01 +00:00
elad
a615d99b28
Use group-id from ``gr'' and not ``pw''.
...
Fixes security issue addressed by CAN-2005-2496.
Thanks to Adrian Portelli for notifying me about this.
2005-10-13 14:58:23 +00:00
lukem
f7e488f953
Don't attempt to use an uninitialized variable when there's no interfaces.
...
Detected with gcc -Wuninitialized.
2005-06-03 16:13:33 +00:00
riz
254aabe783
There was a change from usecs to nsecs between ntpd 4.1.1 and 4.2.0 -
...
take this into account correctly. From ntp-current via Brian Buhrow
in PR#29685. Approved by christos.
2005-05-21 01:47:09 +00:00
christos
aba19ee8af
Double the stack space limit. We are running out with ntp.pool.org.
2005-04-05 20:56:58 +00:00
lukem
c6f2cec0b0
include <isc/net.h> so that -UWANT_IPV6 compiles correctly.
2005-01-10 02:14:46 +00:00
dsl
968ad08000
Stop argument to ctype function being char
2004-10-30 15:01:32 +00:00
christos
72f840350f
PR/27210: Paul Shupak: "ntpd"'s NEMA driver has 8 units, but MAX_UNITS
...
is #defined as 4.
2004-10-10 22:13:04 +00:00
christos
766798b654
PR/27137: Martin J. Laubach: core dump when localhost does not support
...
a given address family and a peer only supports the family localhost does
not support. For example: configure a kernel without IPV6, and then
add a line in ntp.conf server <ipv6addr>. We report that the server is
unreachable and we keep going because there might be more servers around?
XXX: What if it is the last server? Should we detect this? It is not nice
to just bail on this error, because a server might lose its ipv4 address
and only advertise ipv6.
2004-10-05 03:34:38 +00:00
christos
6e1b89d727
80K of stack is not enough for a 64 bit machine, and we got crashes on
...
sparc64. change 20 * 4096 to 5 * 4096 * sizeof(void *). This is again
very little, but enough :-). If you see a crash again, don't blame the
nameserver code before you change this constant.
2004-06-29 04:16:37 +00:00
fredb
8f443ee26a
Don't bother complaining about "no IPv6 interfaces" or "no IPv4 interfaces"
...
unless debugging is compiled in and enabled. Adapted from ntp-dev. Closes
PR bin/23703, by Martin Husemann.
2003-12-20 17:38:19 +00:00
drochner
a273546bc0
pull in a set of patches from ntp bk to fix the
...
"Clock stepping messes up frequency." issue
2003-12-04 17:22:31 +00:00
drochner
849e83ebc4
fix some LP64 issues (ntp bug #233 )
2003-12-04 17:10:34 +00:00
drochner
93cc3883d8
use return value of openssl's RAND_file_name(), this makes the
...
fallback to /dev/urandom work as intended by openssl
(ntp bug #234 )
2003-12-04 17:06:12 +00:00
drochner
7b3a4acbea
don't join a multicast group where we just want to send
...
(this might be preliminary, it might be intended to receive other host's
multicast in the future, but until packets are filtered properly this
fixes the "manycastclient answers requests" problem - see ntp bug #241 )
2003-12-04 17:01:32 +00:00