+* [Bug 1343] sntp illegal C does not compile on Solaris 7.
(4.2.5p244-RC) 2009/11/12 Released by Harlan Stenn <stenn@ntp.org>
* keygen.html updates from Dave Mills.
* [Bug 1003] ntpdc unconfig command doesn't prompt for keyid.
/>
<Tool
Name="VCLinkerTool"
- AdditionalDependencies="ws2_32.lib $(OPENSSL_LIB)\vc\libeay32MDd.lib"
+ AdditionalDependencies="ws2_32.lib $(OPENSSL_LIB)\libeay32.lib"
OutputFile="..\bin\Debug\ntp-keygen.exe"
Version="0x0400"
LinkIncremental="1"
/>
<Tool
Name="VCLinkerTool"
- AdditionalDependencies="ws2_32.lib $(OPENSSL_LIB)\vc\libeay32MD.lib"
+ AdditionalDependencies="ws2_32.lib $(OPENSSL_LIB)\libeay32.lib"
OutputFile="..\bin\Release\ntp-keygen.exe"
Version="0x0400"
LinkIncremental="1"
/>
<Tool
Name="VCLinkerTool"
- AdditionalDependencies="ws2_32.lib winmm.lib $(OPENSSL_LIB)\vc\libeay32MD.lib"
+ AdditionalDependencies="ws2_32.lib winmm.lib $(OPENSSL_LIB)\libeay32.lib"
OutputFile="..\bin\Release\ntpd.exe"
Version="0x0400"
LinkIncremental="1"
/>
<Tool
Name="VCLinkerTool"
- AdditionalDependencies="ws2_32.lib winmm.lib $(OPENSSL_LIB)\vc\libeay32MDd.lib"
+ AdditionalDependencies="ws2_32.lib winmm.lib $(OPENSSL_LIB)\libeay32.lib"
OutputFile="..\bin\Debug\ntpd.exe"
Version="0x0400"
LinkIncremental="1"
/>
<Tool
Name="VCLinkerTool"
- AdditionalDependencies="ws2_32.lib $(OPENSSL_LIB)\vc\libeay32MDd.lib"
+ AdditionalDependencies="ws2_32.lib $(OPENSSL_LIB)\libeay32.lib"
OutputFile="..\bin\Debug\ntpdate.exe"
Version="0x0400"
LinkIncremental="1"
/>
<Tool
Name="VCLinkerTool"
- AdditionalDependencies="ws2_32.lib $(OPENSSL_LIB)\vc\libeay32MD.lib"
+ AdditionalDependencies="ws2_32.lib $(OPENSSL_LIB)\libeay32.lib"
OutputFile="..\bin\Release\ntpdate.exe"
Version="0x0400"
LinkIncremental="1"
/>
<Tool
Name="VCLinkerTool"
- AdditionalDependencies="ws2_32.lib $(OPENSSL_LIB)\vc\libeay32MDd.lib"
+ AdditionalDependencies="ws2_32.lib $(OPENSSL_LIB)\libeay32.lib"
OutputFile="..\bin\Debug\ntpdc.exe"
Version="0x0400"
LinkIncremental="1"
/>
<Tool
Name="VCLinkerTool"
- AdditionalDependencies="ws2_32.lib $(OPENSSL_LIB)\vc\libeay32MD.lib"
+ AdditionalDependencies="ws2_32.lib $(OPENSSL_LIB)\libeay32.lib"
OutputFile="..\bin\Release\ntpdc.exe"
Version="0x0400"
LinkIncremental="1"
/>
<Tool
Name="VCLinkerTool"
- AdditionalDependencies="ws2_32.lib $(OPENSSL_LIB)\vc\libeay32MD.lib"
+ AdditionalDependencies="ws2_32.lib $(OPENSSL_LIB)\libeay32.lib"
OutputFile="..\bin\Release\ntpq.exe"
Version="0x0400"
LinkIncremental="1"
/>
<Tool
Name="VCLinkerTool"
- AdditionalDependencies="ws2_32.lib $(OPENSSL_LIB)\vc\libeay32MDd.lib"
+ AdditionalDependencies="ws2_32.lib $(OPENSSL_LIB)\libeay32.lib"
OutputFile="..\bin\Debug\ntpq.exe"
Version="0x0400"
LinkIncremental="1"
}
}
-void init_log(const char *logfile) {
- log_file = fopen(logfile, "a");
-
- if(log_file == NULL) {
- filelog = 0;
+void init_log(
+ const char *logfile
+ )
+{
+ char error_msg[80];
- char error_msg[80];
+ log_file = fopen(logfile, "a");
+ if (log_file == NULL) {
+ filelog = 0;
snprintf(error_msg, 80, "init_log(): Cannot open logfile %s", logfile);
-
debug_msg(error_msg);
return;
- }
- else {
+ } else {
filelog = 1;
init = 1;
atexit(cleanup_log);
struct addrinfo *host
)
{
+ char logmsg[32 + INET6_ADDRSTRLEN];
char addr_buf[INET6_ADDRSTRLEN];
register int try;
SOCKET sock;
double t21, t34, delta, offset;
int error, rpktl, sw_case;
char *hostname = NULL, *ts_str = NULL;
+ char *log_str;
l_fp p_rec, p_xmt, p_ref, p_org, xmt, tmp, dst;
memset(&r_pkt, 0, sizeof(r_pkt));
ref = (char *)&r_pkt.refid;
add_entry(hostname, ref);
- if(ENABLED_OPT(NORMALVERBOSE))
+ if (ENABLED_OPT(NORMALVERBOSE))
printf("sntp on_wire: Received KOD packet with code: %c%c%c%c from %s, demobilizing all connections\n",
ref[0], ref[1], ref[2], ref[3],
hostname);
- char *log_str = (char *) emalloc(sizeof(char) * (INET6_ADDRSTRLEN + 72));
+ log_str = emalloc(INET6_ADDRSTRLEN + 72);
snprintf(log_str, INET6_ADDRSTRLEN + 72,
"Received a KOD packet with code %c%c%c%c from %s, demobilizing all connections",
ref[0], ref[1], ref[2], ref[3],
hostname);
-
log_msg(log_str, 2);
-
free(log_str);
break;
}
}
- char logmsg[32 + INET6_ADDRSTRLEN];
getnameinfo(host->ai_addr, host->ai_addrlen, addr_buf, sizeof(addr_buf), NULL, 0, NI_NUMERICHOST);
snprintf(logmsg, sizeof(logmsg), "Received no useable packet from %s!", addr_buf);
+ log_msg(logmsg, 1);
if (ENABLED_OPT(NORMALVERBOSE))
printf("sntp on_wire: Received no useable packet from %s!\n", addr_buf);
-
- log_msg(logmsg, 1);
-
return -1;
}
int len
)
{
+ int cc;
+
#ifdef DEBUG
printf("sntp sendpkt: Packet data:\n");
pkt_output(pkt, len, stdout);
#endif
- if(ENABLED_OPT(NORMALVERBOSE)) {
+ if (ENABLED_OPT(NORMALVERBOSE)) {
getnameinfo(&dest->sa, SOCKLEN(dest), adr_buf, sizeof(adr_buf), NULL, 0, NI_NUMERICHOST);
printf("sntp sendpkt: Sending packet to %s... ", adr_buf);
}
- int cc = sendto(rsock, (char *)pkt, len, 0, &dest->sa, SOCKLEN(dest));
+ cc = sendto(rsock, (void *)pkt, len, 0, &dest->sa, SOCKLEN(dest));
if (cc == SOCKET_ERROR) {
#ifdef DEBUG
if (errno != EWOULDBLOCK && errno != ENOBUFS) {
}
- }
- else {
- if(ENABLED_OPT(NORMALVERBOSE))
- printf("Packet sent.\n");
- }
+ } else if (ENABLED_OPT(NORMALVERBOSE))
+ printf("Packet sent.\n");
}
/* Receive raw data */
}
if (STRATUM_PKT_UNSPEC == rpkt->stratum) {
+ char *ref_char;
+
if (ENABLED_OPT(NORMALVERBOSE))
printf("sntp recv_bcst_pkt: Stratum unspecified, going to check for KOD (stratum: %i)\n", rpkt->stratum);
- char *ref_char = (char *) &rpkt->refid;
+ ref_char = (char *) &rpkt->refid;
/* If it's a KOD packet we'll just use the KOD information */
if (ref_char[0] != 'X') {
char *rdata /* , done */;
register int a;
- int has_mac, is_authentic, orig_pkt_len;
+ int has_mac, is_authentic, pkt_len, orig_pkt_len;
/* Much space, just to be sure */
rdata = emalloc(sizeof(char) * 256);
- int pkt_len = recvdata(rsock, &sender, rdata, 256);
+ pkt_len = recvdata(rsock, &sender, rdata, 256);
#if 0 /* done uninitialized */
if (!done) {
/* Stratum is unspecified (0) check what's going on */
if (STRATUM_PKT_UNSPEC == rpkt->stratum) {
+ char *ref_char;
+
if (ENABLED_OPT(NORMALVERBOSE))
printf("sntp recvpkt: Stratum unspecified, going to check for KOD (stratum: %i)\n", rpkt->stratum);
- char *ref_char = (char *) &rpkt->refid;
+ ref_char = (char *) &rpkt->refid;
if (ENABLED_OPT(NORMALVERBOSE))
printf("sntp recvpkt: Packet refid: %c%c%c%c\n", ref_char[0], ref_char[1], ref_char[2], ref_char[3]);