summaryrefslogtreecommitdiffstats
path: root/usr.sbin/ntpd/constraint.c (follow)
Commit message (Expand)AuthorAgeFilesLines
* Remove duplicate prototype.bluhm2021-03-181-2/+1
* Typo in log messageotto2020-02-201-2/+2
* If constraints are configured but do not work for whatever reason ntpdotto2020-02-121-3/+13
* 1) Re-resolve and re-get constraints once the clock is synced. Constraintsotto2019-07-161-4/+30
* When system calls indicate an error they return -1, not some arbitraryderaadt2019-06-281-3/+3
* Be more aggressive retrying dns while in settime mode. The constraintotto2019-06-161-2/+4
* Introducing autmatic settime mode: if some preconditions are metotto2019-06-091-3/+6
* Use proper algorithm for median computation; use fabs() for computingotto2019-05-301-13/+15
* A step in solving the bootstrap problem in a dnssec environement.otto2019-05-281-2/+5
* Improve logging for TLS certificate validity checking.jsing2019-01-211-7/+34
* Explicitly check timegm() return value.jsing2019-01-211-2/+3
* Perform manual validity checking of the X.509 certificate for constraints.jsing2019-01-211-1/+22
* Don't use *a - *b as compare idiom, it does not work as expected forotto2019-01-201-2/+4
* update for libtls default cert changes.tedu2018-11-291-2/+2
* Use TLS_CA_CERT_FILE instead of a separate define.jsing2018-11-061-2/+2
* Be stricter with TLS configuration for ntpd constraints.jsing2018-11-051-8/+2
* Use the stack to hold the constraint child process variables instead ofrzalamena2016-12-051-22/+18
* Check for EAGAIN on imsg_flush() return otherwise we might be failingrzalamena2016-10-181-5/+11
* Save the constraint process pid by getting the start_child() return value,rzalamena2016-10-181-2/+2
* Teach ntpd(8) constraint process to use exec*() instead of just forking,rzalamena2016-09-261-37/+76
* Add clarifications ("comments") to three places where it wasn'treyk2016-09-141-2/+19
* Adjust existing tls_config_set_cipher() callers for TLS cipher groupjsing2016-07-131-2/+2
* ntpd is too aggressive about retrying constraint connections. Thisderaadt2016-06-011-2/+2
* Harden TLS for ntpd constraints - stop disabling server name verification,jsing2016-05-211-11/+13
* Unconfuse things by renaming variables to match their contents.jsing2016-05-061-20/+20
* According to RFC7231, section 7.1.1.1, the HTTP date header supportsnaddy2016-03-051-2/+2
* Don't attempt to kill() the constraint in the wrong process. Thereyk2016-01-271-6/+30
* Switch and sync to the log.c variant from httpd/relayd/iked/snmpd/vmd.reyk2015-12-191-2/+3
* EAGAIN handling for imsg_read. OK henning@ benno@claudio2015-12-051-2/+3
* Cache values from getpwnam() done at initialization, which need to bederaadt2015-11-241-14/+11
* Simplify all instances of get_string() and get_data() using malloc() andmmcc2015-11-191-7/+2
* fix memory leak; from David CARLIERderaadt2015-11-171-1/+2
* Move execution of the constraints from the ntp to the parent process.reyk2015-10-121-123/+328
* Once the constraint engine process is running, it only needsderaadt2015-10-091-1/+5
* fix type and return check for tls_read/write.beck2015-09-101-4/+4
* fix after libtls api changesbeck2015-09-101-8/+8
* Fix memory leak in error path when max length exceeded.millert2015-09-091-1/+2
* Handle short writes and TLS_{READ,WRITE}_AGAIN around tls_write().bluhm2015-07-181-7/+15
* prevent the tls constraint state machine from getting hung on STATE_INVALIDbcook2015-07-181-3/+3
* detect crashes from constraint sub-processes, instead of ignoring them.deraadt2015-05-281-4/+8
* No need to call tzset() and log_init() in the forked constraintreyk2015-05-211-4/+1
* Currently, after 4 failed constraint checks, we suspect the constraintreyk2015-05-181-2/+4
* When resolving the "constraint" (singular), store all returned IPreyk2015-05-171-24/+35
* fix a memory leak if tls_read() fails. ok henning@jsg2015-04-211-1/+2
* remove unused 'cause' string when checking child statusbcook2015-03-141-10/+3
* Rename tls_config_insecure_noverifyhost() tojsing2015-02-221-2/+2
* Set the TLS ciphers to "compat" mode, restoring the previous behaviour.jsing2015-02-221-1/+4
* Use ntpd's deferred DNS resolving for constraints as well. Thisreyk2015-02-121-24/+118
* Be less chatty on constraint errors.reyk2015-02-101-3/+3
* After successfully getting a constraint from an HTTPS server, there isreyk2015-02-101-11/+21