kardel
1f18cb938c
resolve ntp 4.2.4p5 import
2008-08-23 09:10:31 +00:00
kardel
835928de57
Import ntp 4.2.4p5
2008-08-23 07:38:09 +00:00
matt
28dacb0e3a
Fix a new bugs that -combine found
2008-02-20 18:16:09 +00:00
kardel
a097fb65eb
pick up upcoming fixes from NTP-Bug 885
2007-08-18 09:56:13 +00:00
kardel
d370a3332c
sync with release
2007-07-06 21:20:25 +00:00
kardel
d7d9fc60cc
sync with release / removes debug NULL deref
2007-07-06 21:19:33 +00:00
kardel
9238104d09
resolve merge conflicts of 4.2.4p2 import
2007-06-24 16:55:11 +00:00
kardel
d3063e9f3c
Import ntp 4.2.4p2
2007-06-24 15:47:02 +00:00
dogcow
f790a123d5
unbork openssl import borkage.
2007-03-07 03:18:53 +00:00
kardel
24e8b498bd
track NTP bug 768: opening of bcast if, misleading error message
2007-01-27 09:02:38 +00:00
kardel
8acf6049c0
Use the portable version to declare the type of the length argument
...
for the recv*() functions. Fix queued with the NTP project.
2007-01-21 07:59:31 +00:00
kardel
9e57eb45fe
track ntp bug #760 - support DYNAMIC flags in async resolver
2007-01-13 11:41:05 +00:00
kardel
dbbbd5d806
import NTP 4.2.4
2007-01-06 19:45:21 +00:00
kardel
d1d4526d02
Import ntp 4.2.4
2007-01-06 16:04:26 +00:00
dogcow
499ac5cbee
Looks like OpenSSL now uses an int instead of a long for its version
...
number (!?), so explicitly cast to long in case they change it back.
2006-11-14 02:41:40 +00:00
kardel
9a3db19511
track NTP bug 734: setsockopt(..., IP_MULTICAST_IF, ...) fails on 64 bit platforms
2006-11-06 12:19:30 +00:00
kardel
a1291ab337
cope with struct timeval tv_sec being defined as long instead
...
of the SUS mandated time_t.
2006-07-29 19:22:25 +00:00
kardel
55fde488db
using the correct type makes it compile on alpha too - found by Kurt Schreiner
2006-07-29 14:56:57 +00:00
kardel
f2de40854d
merge 4.2.2p2
...
signedness fixes
fd re-allocation for stdio
PPSAPI fixes in refclock_parse.c
while there clean up last signedness problems for gcc4 compilation
2006-07-29 08:15:29 +00:00
mrg
5609a371c9
make MKCRYPTO=no work again.
2006-06-25 03:02:19 +00:00
kardel
d66ddb6f9c
use the version that is now in ntp-stable (4.2.2 release branch)
2006-06-18 22:48:51 +00:00
kardel
7d46a5bb55
NetBSD Coverity CID 3804: avoid file pointer leak
2006-06-18 21:35:57 +00:00
kardel
e1a3a74084
NetBSD Coverity CID 3797: bad return code check for open(2) fixed
...
(!fd replaced with fd < 0)
2006-06-18 21:25:13 +00:00
kardel
b58f2a229e
NetBSD Coverity CID 3796: possible NULL deref
2006-06-18 21:20:35 +00:00
kardel
d58917ea1c
cope with situations where interface are UP and bound to
...
INADDR_ANY - ntpd will ignore those interfaces
(bug 637 @bugs.ntp.isc.org)
2006-06-17 12:11:55 +00:00
kardel
8704ff927b
import and integrate NTP 4.2.2
2006-06-11 19:34:07 +00:00
kardel
9c52afaf31
Import ntp 4.2.2
2006-06-11 14:57:12 +00:00
mrg
995cc7365d
initialise tmp_clock() for GCC4.
2006-05-20 19:22:36 +00:00
christos
386c6259af
Coverity CID 3497: Don't try to set the day/month if we did not get them
...
from the clock.
2006-05-13 23:55:23 +00:00
mrg
084c052803
quell GCC 4.1 uninitialised variable warnings.
...
XXX: we should audit the tree for which old ones are no longer needed
after getting the older compilers out of the tree..
2006-05-10 21:53:14 +00:00
mrg
0c37c63edc
change (mostly) int to socklen_t. GCC 4 doesn't like that int and
...
socklen_t are different signness.
2006-05-09 20:18:05 +00:00
kardel
e01a907378
NetBSD 22 CID 3049,3075: safeguard against (unlikely to impossible) NULL deref
2006-05-04 08:24:05 +00:00
kardel
70ff37328f
handle NULL return from d2i_X509() - NetBSD Run 21 Coverity CID 2979
2006-05-02 09:24:19 +00:00
kardel
d6c06e8308
fix as discussed in NTP Bug 584, Coverity NetBSD CID 1510
2006-03-29 07:19:34 +00:00
kardel
a1cdcab3c8
buffer overrun: backport fix from NTP project (Coverity NetBSD Scan 8: CID 1509)
2006-03-21 11:12:13 +00:00
kardel
15dc7197ee
null deref: fix another case of incomplete list handling (Coverity NetBSD Scan 8: CID 986)
2006-03-21 10:28:25 +00:00
kardel
dbefff2ee4
error handling: check success of open(2) - bail out early (Coverity CID 1282 NetBSD Scan 5)
2006-03-19 07:20:30 +00:00
kardel
24781071d1
null deref: complete linked list handling beginng condition (Coverity CID 986)
2006-03-19 07:02:47 +00:00
kardel
012eaf5162
null deref: avoid 0 deref (Coverity CID 987 NetBSD Scan 5)
2006-03-18 14:33:20 +00:00
kardel
a07906a5a8
buffer bounds: buffer full condition wrong for bounds check (Coverity CID 1508 NetBSD Scan 5)
2006-03-18 14:18:59 +00:00
kardel
630d3f115c
buffer bounds: correct > - >= error for bounds check (Coverity CID 1511 NetBSD Scan 5)
2006-03-18 14:08:29 +00:00
kardel
99c0e2540c
buffer bounds: clamp index for epobuf to buffer bounds (Coverity CID 1512 NetBSD Scan 5)
2006-03-18 14:02:13 +00:00
kardel
80b13f6f4e
mem leakage: free old malloced buffer on errors (Coverity CID 2056 NetBSD Scan 5)
2006-03-18 13:44:15 +00:00
kardel
ee0722e2b9
avoid close(-1): don't attempt to cleanup INVALID_SOCKET ( ==-1 ) fd's - would lead to close(-1) and FD_CLR((u_int)-1(!), ...) (Coverity CID 1281 NetBSD Scan 5)
2006-03-18 13:13:25 +00:00
kardel
58ad32062f
Coverity NetBSD scan CID 2055: fallout fix return/fclose -> fclose/return
2006-03-18 09:28:50 +00:00
kardel
e13d171a8e
resource leak (fd/mem): fclose() streams on error (Coverity NetBSD scan CID 2055)
2006-03-18 09:26:08 +00:00
kardel
589ea6e802
resource leak (fd/mem): close stream when errors occur (Coverity NetBSD Scan CID 2054)
2006-03-18 08:57:25 +00:00
kardel
9bccbf4462
Coverity fixes:
...
CID
687 missing block
988 null pointer deref on shutdown (on open failure - introduced by
change of contract in ntp_refclock.c)
989 null pointer for private data (could not happen - safeguard anyway)
1513 off by one
2410 misplaced null pointer test
2006-03-18 00:30:30 +00:00
christos
5ca310136d
deal with const in the new openssl
2005-11-26 01:10:42 +00:00
christos
19d0f25ed5
PR/31580: Miles Nordin 'ntptime' no longer reports ERROR and UNSYNC when ntpd
...
isn't synchronized (ntpd bug #506 )
2005-10-20 15:41:01 +00:00