=========================================================== .___ __ __ _________________ __ __ __| _/|__|/ |_ / ___\_` __ \__ \ | | \/ __ | | \\_ __\ / /_/ > | \// __ \| | / /_/ | | || | \___ /|__| (____ /____/\____ | |__||__| /_____/ \/ \/ grep rough audit - static analysis tool v2.8 written by @Wireghoul =================================[justanotherhacker.com]=== ntpsec-1.2.0+dfsg1/pylib/statfiles.py-102- try: ntpsec-1.2.0+dfsg1/pylib/statfiles.py:103: (hostname, _, _) = socket.gethostbyaddr(key) ntpsec-1.2.0+dfsg1/pylib/statfiles.py-104- return hostname ############################################## ntpsec-1.2.0+dfsg1/pylib/agentx_packet.py-1027- ntpsec-1.2.0+dfsg1/pylib/agentx_packet.py:1028:def encode_ipaddr(bigEndian, octets): ntpsec-1.2.0+dfsg1/pylib/agentx_packet.py:1029: sanity_ipaddr(octets) ntpsec-1.2.0+dfsg1/pylib/agentx_packet.py-1030- return encode_octetstr(bigEndian, octets) ############################################## ntpsec-1.2.0+dfsg1/pylib/agentx_packet.py-1032- ntpsec-1.2.0+dfsg1/pylib/agentx_packet.py:1033:def decode_ipaddr(data, header): ntpsec-1.2.0+dfsg1/pylib/agentx_packet.py-1034- addr, data = decode_octetstr(data, header) ############################################## ntpsec-1.2.0+dfsg1/pylib/agentx_packet.py-1038- ntpsec-1.2.0+dfsg1/pylib/agentx_packet.py:1039:def sanity_ipaddr(data): ntpsec-1.2.0+dfsg1/pylib/agentx_packet.py-1040- if len(data) not in (4, 16): ############################################## ntpsec-1.2.0+dfsg1/pylib/packet.py-658- ntpsec-1.2.0+dfsg1/pylib/packet.py:659: def sortaddr(self): ntpsec-1.2.0+dfsg1/pylib/packet.py-660- addr = self.addr ############################################## ntpsec-1.2.0+dfsg1/pylib/packet.py-1577- # IPv4 asc. then IPv6 asc. ntpsec-1.2.0+dfsg1/pylib/packet.py:1578: "addr": lambda e: e.sortaddr(), ntpsec-1.2.0+dfsg1/pylib/packet.py-1579- # IPv6 desc. then IPv4 desc. ntpsec-1.2.0+dfsg1/pylib/packet.py:1580: "-addr": lambda e: e.sortaddr(), ntpsec-1.2.0+dfsg1/pylib/packet.py-1581- # hit count ascending ############################################## ntpsec-1.2.0+dfsg1/tests/pylib/test_agentx_packet.py-1559- ntpsec-1.2.0+dfsg1/tests/pylib/test_agentx_packet.py:1560: def test_ipaddr(self): ntpsec-1.2.0+dfsg1/tests/pylib/test_agentx_packet.py-1561- enc = AX.encode_ipaddr ############################################## ntpsec-1.2.0+dfsg1/tests/pylib/jigs.py-171- ntpsec-1.2.0+dfsg1/tests/pylib/jigs.py:172: def gethostbyaddr(self, addr): ntpsec-1.2.0+dfsg1/tests/pylib/jigs.py-173- self.ghba_calls.append(addr) ############################################## ntpsec-1.2.0+dfsg1/tests/pylib/test_packet.py-190- span.entries = [entry1, entry2, entry3, entry4] ntpsec-1.2.0+dfsg1/tests/pylib/test_packet.py:191: sorter = (lambda e: e.sortaddr()) # Extracted from parse_mru_variables ntpsec-1.2.0+dfsg1/tests/pylib/test_packet.py-192- sortkey = "addr" ############################################## ntpsec-1.2.0+dfsg1/tests/pylib/test_packet.py-606- cls.addr = "[11:22:33::44:55]:42" ntpsec-1.2.0+dfsg1/tests/pylib/test_packet.py:607: self.assertEqual(cls.sortaddr(), ntpsec-1.2.0+dfsg1/tests/pylib/test_packet.py-608- ntp.poly.polybytes("\x00\x11\x00\x22\x00\x33\x00\x00" ############################################## ntpsec-1.2.0+dfsg1/tests/pylib/test_packet.py-611- cls.addr = "[11:22:33::44:55%8]:42" ntpsec-1.2.0+dfsg1/tests/pylib/test_packet.py:612: self.assertEqual(cls.sortaddr(), ntpsec-1.2.0+dfsg1/tests/pylib/test_packet.py-613- ntp.poly.polybytes("\x00\x11\x00\x22\x00\x33\x00\x00" ############################################## ntpsec-1.2.0+dfsg1/tests/pylib/test_packet.py-617- cls.addr = "11.22.33.44:23" ntpsec-1.2.0+dfsg1/tests/pylib/test_packet.py:618: self.assertEqual(cls.sortaddr(), ntpsec-1.2.0+dfsg1/tests/pylib/test_packet.py-619- ntp.poly.polybytes((("\0" * 16) + "\x0b\x16\x21\x2c"))) ############################################## ntpsec-1.2.0+dfsg1/tests/common/sockaddrtest.c-71- SET_AF(&s, AF_INET); ntpsec-1.2.0+dfsg1/tests/common/sockaddrtest.c:72: PSOCK_ADDR4(&s)->s_addr = inet_addr(address); ntpsec-1.2.0+dfsg1/tests/common/sockaddrtest.c-73- SET_PORT(&s, port); ############################################## ntpsec-1.2.0+dfsg1/tests/ntpd/restrict.c-18- NSRCPORT(&sockaddr) = htons(sin_port); ntpsec-1.2.0+dfsg1/tests/ntpd/restrict.c:19: PSOCK_ADDR4(&sockaddr)->s_addr = inet_addr(ip_addr); ntpsec-1.2.0+dfsg1/tests/ntpd/restrict.c-20- ############################################## ntpsec-1.2.0+dfsg1/tests/libntp/decodenetnum.c-36- SET_AF(&expected, AF_INET); ntpsec-1.2.0+dfsg1/tests/libntp/decodenetnum.c:37: PSOCK_ADDR4(&expected)->s_addr = inet_addr("192.0.2.1"); ntpsec-1.2.0+dfsg1/tests/libntp/decodenetnum.c-38- SET_PORT(&expected, NTP_PORT); ############################################## ntpsec-1.2.0+dfsg1/tests/libntp/decodenetnum.c-52- SET_AF(&expected, AF_INET); ntpsec-1.2.0+dfsg1/tests/libntp/decodenetnum.c:53: PSOCK_ADDR4(&expected)->s_addr = inet_addr("192.0.2.2"); ntpsec-1.2.0+dfsg1/tests/libntp/decodenetnum.c-54- SET_PORT(&expected, 2000); ############################################## ntpsec-1.2.0+dfsg1/tests/libntp/decodenetnum.c-68- SET_AF(&expected, AF_INET); ntpsec-1.2.0+dfsg1/tests/libntp/decodenetnum.c:69: PSOCK_ADDR4(&expected)->s_addr = inet_addr("192.168.2.2"); ntpsec-1.2.0+dfsg1/tests/libntp/decodenetnum.c-70- SET_PORT(&expected, 123); ############################################## ntpsec-1.2.0+dfsg1/tests/libntp/decodenetnum.c-139- SET_AF(&expected, AF_INET); ntpsec-1.2.0+dfsg1/tests/libntp/decodenetnum.c:140: PSOCK_ADDR4(&expected)->s_addr = inet_addr("192.0.2.1"); ntpsec-1.2.0+dfsg1/tests/libntp/decodenetnum.c-141- SET_PORT(&expected, NTP_PORT); ############################################## ntpsec-1.2.0+dfsg1/tests/libntp/macencrypt.c-139- SET_NSRCPORT(&addr, htons(80)); ntpsec-1.2.0+dfsg1/tests/libntp/macencrypt.c:140: uint32_t address = inet_addr("192.0.2.1"); ntpsec-1.2.0+dfsg1/tests/libntp/macencrypt.c-141- PSOCK_ADDR4(&addr)->s_addr = address; ############################################## ntpsec-1.2.0+dfsg1/docs/refclock.adoc-67-Commands] page. The +prefer+ option can be useful to persuade the ntpsec-1.2.0+dfsg1/docs/refclock.adoc:68:server to cherish a reference clock with somewhat more enthusiasm than ntpsec-1.2.0+dfsg1/docs/refclock.adoc-69-other reference clocks or peers. It is further discussed on the ############################################## ntpsec-1.2.0+dfsg1/ntpd/ntp_restrict.c-43- */ ntpsec-1.2.0+dfsg1/ntpd/ntp_restrict.c:44:#define MASK_IPV6_ADDR(dst, src, msk) \ ntpsec-1.2.0+dfsg1/ntpd/ntp_restrict.c-45- do { \ ############################################## ntpsec-1.2.0+dfsg1/ntpd/ntp_restrict.c-114-static void dec_res_limited(void); ntpsec-1.2.0+dfsg1/ntpd/ntp_restrict.c:115:static restrict_u * match_restrict4_addr(uint32_t, unsigned short); ntpsec-1.2.0+dfsg1/ntpd/ntp_restrict.c:116:static restrict_u * match_restrict6_addr(const struct in6_addr *, ntpsec-1.2.0+dfsg1/ntpd/ntp_restrict.c-117- unsigned short); ############################################## ntpsec-1.2.0+dfsg1/ntpd/ntp_restrict.c-269-static restrict_u * ntpsec-1.2.0+dfsg1/ntpd/ntp_restrict.c:270:match_restrict4_addr( ntpsec-1.2.0+dfsg1/ntpd/ntp_restrict.c-271- uint32_t addr, ############################################## ntpsec-1.2.0+dfsg1/ntpd/ntp_restrict.c-289-static restrict_u * ntpsec-1.2.0+dfsg1/ntpd/ntp_restrict.c:290:match_restrict6_addr( ntpsec-1.2.0+dfsg1/ntpd/ntp_restrict.c-291- const struct in6_addr * addr, ############################################## ntpsec-1.2.0+dfsg1/ntpd/ntp_restrict.c-301- INSIST(next != res); ntpsec-1.2.0+dfsg1/ntpd/ntp_restrict.c:302: MASK_IPV6_ADDR(&masked, addr, &res->u.v6.mask); ntpsec-1.2.0+dfsg1/ntpd/ntp_restrict.c-303- if (ADDR6_EQ(&masked, &res->u.v6.addr) ############################################## ntpsec-1.2.0+dfsg1/ntpd/ntp_restrict.c-439- ntpsec-1.2.0+dfsg1/ntpd/ntp_restrict.c:440: match = match_restrict4_addr(SRCADR(srcadr), ntpsec-1.2.0+dfsg1/ntpd/ntp_restrict.c-441- SRCPORT(srcadr)); ############################################## ntpsec-1.2.0+dfsg1/ntpd/ntp_restrict.c-466- ntpsec-1.2.0+dfsg1/ntpd/ntp_restrict.c:467: match = match_restrict6_addr(pin6, SRCPORT(srcadr)); ntpsec-1.2.0+dfsg1/ntpd/ntp_restrict.c-468- match->hitcount++; ############################################## ntpsec-1.2.0+dfsg1/ntpd/ntp_restrict.c-530- match.u.v6.mask = SOCK_ADDR6(resmask); ntpsec-1.2.0+dfsg1/ntpd/ntp_restrict.c:531: MASK_IPV6_ADDR(&match.u.v6.addr, PSOCK_ADDR6(resaddr), ntpsec-1.2.0+dfsg1/ntpd/ntp_restrict.c-532- &match.u.v6.mask); ############################################## ntpsec-1.2.0+dfsg1/ntpd/ntp_restrict.c-644- if (IS_IPV4(addr)) { ntpsec-1.2.0+dfsg1/ntpd/ntp_restrict.c:645: res = match_restrict4_addr(SRCADR(addr), SRCPORT(addr)); ntpsec-1.2.0+dfsg1/ntpd/ntp_restrict.c-646- found_specific = (SRCADR(&onesmask) == res->u.v4.mask); ntpsec-1.2.0+dfsg1/ntpd/ntp_restrict.c-647- } else { ntpsec-1.2.0+dfsg1/ntpd/ntp_restrict.c:648: res = match_restrict6_addr(&SOCK_ADDR6(addr), ntpsec-1.2.0+dfsg1/ntpd/ntp_restrict.c-649- SRCPORT(addr)); ############################################## ntpsec-1.2.0+dfsg1/ntpd/ntp_restrict.c-696- if (IS_IPV4(addr)) { ntpsec-1.2.0+dfsg1/ntpd/ntp_restrict.c:697: res = match_restrict4_addr(SRCADR(addr), SRCPORT(addr)); ntpsec-1.2.0+dfsg1/ntpd/ntp_restrict.c-698- } else { ntpsec-1.2.0+dfsg1/ntpd/ntp_restrict.c:699: res = match_restrict6_addr(&SOCK_ADDR6(addr), ntpsec-1.2.0+dfsg1/ntpd/ntp_restrict.c-700- SRCPORT(addr)); ############################################## ntpsec-1.2.0+dfsg1/ntpd/nts_client.c-38-int open_TCP_socket(struct peer *peer, const char *hostname); ntpsec-1.2.0+dfsg1/ntpd/nts_client.c:39:struct addrinfo * find_best_addr(struct addrinfo *answer); ntpsec-1.2.0+dfsg1/ntpd/nts_client.c-40-bool connect_TCP_socket(int sockfd, struct addrinfo *addr); ############################################## ntpsec-1.2.0+dfsg1/ntpd/nts_client.c-289- */ ntpsec-1.2.0+dfsg1/ntpd/nts_client.c:290: worker = find_best_addr(answer); ntpsec-1.2.0+dfsg1/ntpd/nts_client.c-291- memcpy(&sockaddr, worker->ai_addr, worker->ai_addrlen); ############################################## ntpsec-1.2.0+dfsg1/ntpd/nts_client.c-316- ntpsec-1.2.0+dfsg1/ntpd/nts_client.c:317:struct addrinfo *find_best_addr(struct addrinfo *answer) { ntpsec-1.2.0+dfsg1/ntpd/nts_client.c-318- /* default to first one */ ############################################## ntpsec-1.2.0+dfsg1/ntpd/ntp_peer.c-69- struct peer *, int); ntpsec-1.2.0+dfsg1/ntpd/ntp_peer.c:70:static struct peer * findexistingpeer_addr(sockaddr_u *, ntpsec-1.2.0+dfsg1/ntpd/ntp_peer.c-71- struct peer *, int); ############################################## ntpsec-1.2.0+dfsg1/ntpd/ntp_peer.c-155-struct peer * ntpsec-1.2.0+dfsg1/ntpd/ntp_peer.c:156:findexistingpeer_addr( ntpsec-1.2.0+dfsg1/ntpd/ntp_peer.c-157- sockaddr_u * addr, ############################################## ntpsec-1.2.0+dfsg1/ntpd/ntp_peer.c-163- ntpsec-1.2.0+dfsg1/ntpd/ntp_peer.c:164: DPRINT(2, ("findexistingpeer_addr(%s, %s, %d)\n", ntpsec-1.2.0+dfsg1/ntpd/ntp_peer.c-165- sockporttoa(addr), ############################################## ntpsec-1.2.0+dfsg1/ntpd/ntp_peer.c-177- if (NULL == start_peer) ntpsec-1.2.0+dfsg1/ntpd/ntp_peer.c:178: peer = peer_hash[NTP_HASH_ADDR(addr)]; ntpsec-1.2.0+dfsg1/ntpd/ntp_peer.c-179- else ############################################## ntpsec-1.2.0+dfsg1/ntpd/ntp_peer.c-213- else ntpsec-1.2.0+dfsg1/ntpd/ntp_peer.c:214: return findexistingpeer_addr(addr, start_peer, mode); ntpsec-1.2.0+dfsg1/ntpd/ntp_peer.c-215-} ############################################## ntpsec-1.2.0+dfsg1/ntpd/ntp_peer.c-232- srcadr = &rbufp->recv_srcadr; ntpsec-1.2.0+dfsg1/ntpd/ntp_peer.c:233: hash = NTP_HASH_ADDR(srcadr); ntpsec-1.2.0+dfsg1/ntpd/ntp_peer.c-234- for (p = peer_hash[hash]; p != NULL; p = p->adr_link) { ############################################## ntpsec-1.2.0+dfsg1/ntpd/ntp_peer.c-371- if ((MDF_UCAST & p->cast_flags) && !(FLAG_LOOKUP & p->cfg.flags)) { ntpsec-1.2.0+dfsg1/ntpd/ntp_peer.c:372: hash = NTP_HASH_ADDR(&p->srcadr); ntpsec-1.2.0+dfsg1/ntpd/ntp_peer.c-373- peer_hash_count[hash]--; ############################################## ntpsec-1.2.0+dfsg1/ntpd/ntp_peer.c-712- ntpsec-1.2.0+dfsg1/ntpd/ntp_peer.c:713: hash = NTP_HASH_ADDR(&peer->srcadr); ntpsec-1.2.0+dfsg1/ntpd/ntp_peer.c-714- peer_hash_count[hash]--; ############################################## ntpsec-1.2.0+dfsg1/ntpd/ntp_peer.c-727- ntpsec-1.2.0+dfsg1/ntpd/ntp_peer.c:728: hash = NTP_HASH_ADDR(&peer->srcadr); ntpsec-1.2.0+dfsg1/ntpd/ntp_peer.c-729- LINK_SLIST(peer_hash[hash], peer, adr_link); ############################################## ntpsec-1.2.0+dfsg1/ntpd/ntp_parser.y-1421- : '(' T_Integer T_Ellipsis T_Integer ')' ntpsec-1.2.0+dfsg1/ntpd/ntp_parser.y:1422: { $$ = create_attr_rangeval('-', $2, $4); } ntpsec-1.2.0+dfsg1/ntpd/ntp_parser.y-1423- ; ############################################## ntpsec-1.2.0+dfsg1/ntpd/ntp_io.c-126-static void ntpsec-1.2.0+dfsg1/ntpd/ntp_io.c:127:netaddr_fromsockaddr(isc_netaddr_t *netaddr, const isc_sockaddr_t *source); ntpsec-1.2.0+dfsg1/ntpd/ntp_io.c-128- ############################################## ntpsec-1.2.0+dfsg1/ntpd/ntp_io.c-155- ntpsec-1.2.0+dfsg1/ntpd/ntp_io.c:156:static bool is_wildcard_addr (const sockaddr_u *); ntpsec-1.2.0+dfsg1/ntpd/ntp_io.c-157- ############################################## ntpsec-1.2.0+dfsg1/ntpd/ntp_io.c-212-static int create_sockets (unsigned short); ntpsec-1.2.0+dfsg1/ntpd/ntp_io.c:213:static void set_reuseaddr (int); ntpsec-1.2.0+dfsg1/ntpd/ntp_io.c-214- ############################################## ntpsec-1.2.0+dfsg1/ntpd/ntp_io.c-519-static void ntpsec-1.2.0+dfsg1/ntpd/ntp_io.c:520:netaddr_fromsockaddr(isc_netaddr_t *t, const isc_sockaddr_t *s) { ntpsec-1.2.0+dfsg1/ntpd/ntp_io.c-521- int family = s->type.sa.sa_family; ############################################## ntpsec-1.2.0+dfsg1/ntpd/ntp_io.c-610- memcpy(&isc_sa.type, a, min(sizeof(isc_sa.type), sizeof(*a))); ntpsec-1.2.0+dfsg1/ntpd/ntp_io.c:611: netaddr_fromsockaddr(&isc_a, &isc_sa); ntpsec-1.2.0+dfsg1/ntpd/ntp_io.c-612- ############################################## ntpsec-1.2.0+dfsg1/ntpd/ntp_io.c-614- memcpy(&isc_sa.type, b, min(sizeof(isc_sa.type), sizeof(*b))); ntpsec-1.2.0+dfsg1/ntpd/ntp_io.c:615: netaddr_fromsockaddr(&isc_b, &isc_sa); ntpsec-1.2.0+dfsg1/ntpd/ntp_io.c-616- ############################################## ntpsec-1.2.0+dfsg1/ntpd/ntp_io.c-1013- ntpsec-1.2.0+dfsg1/ntpd/ntp_io.c:1014: iswildcard = is_wildcard_addr(if_addr); ntpsec-1.2.0+dfsg1/ntpd/ntp_io.c-1015- isloopback = !!(INT_LOOPBACK & if_flags); ############################################## ntpsec-1.2.0+dfsg1/ntpd/ntp_io.c-1270-static bool ntpsec-1.2.0+dfsg1/ntpd/ntp_io.c:1271:is_wildcard_addr( ntpsec-1.2.0+dfsg1/ntpd/ntp_io.c-1272- const sockaddr_u *psau ############################################## ntpsec-1.2.0+dfsg1/ntpd/ntp_io.c-1511- */ ntpsec-1.2.0+dfsg1/ntpd/ntp_io.c:1512: if (is_wildcard_addr(&enumep.sin)) ntpsec-1.2.0+dfsg1/ntpd/ntp_io.c-1513- continue; ############################################## ntpsec-1.2.0+dfsg1/ntpd/ntp_io.c-1704- */ ntpsec-1.2.0+dfsg1/ntpd/ntp_io.c:1705: set_reuseaddr(0); ntpsec-1.2.0+dfsg1/ntpd/ntp_io.c-1706- ############################################## ntpsec-1.2.0+dfsg1/ntpd/ntp_io.c-1796-/* ntpsec-1.2.0+dfsg1/ntpd/ntp_io.c:1797: * set_reuseaddr() - set/clear REUSEADDR on all sockets ntpsec-1.2.0+dfsg1/ntpd/ntp_io.c-1798- * NB possible hole - should we be doing this on broadcast ############################################## ntpsec-1.2.0+dfsg1/ntpd/ntp_io.c-1801-static void ntpsec-1.2.0+dfsg1/ntpd/ntp_io.c:1802:set_reuseaddr( ntpsec-1.2.0+dfsg1/ntpd/ntp_io.c-1803- int flag ############################################## ntpsec-1.2.0+dfsg1/ntpd/ntp_io.c-1947- */ ntpsec-1.2.0+dfsg1/ntpd/ntp_io.c:1948: if (!is_wildcard_addr(addr)) ntpsec-1.2.0+dfsg1/ntpd/ntp_io.c-1949- set_wildcard_reuse(AF(addr), 1); ############################################## ntpsec-1.2.0+dfsg1/ntpd/ntp_io.c-1957-#ifdef NEED_REUSEADDR_FOR_IFADDRBIND ntpsec-1.2.0+dfsg1/ntpd/ntp_io.c:1958: if (!is_wildcard_addr(addr)) ntpsec-1.2.0+dfsg1/ntpd/ntp_io.c-1959- set_wildcard_reuse(AF(addr), 0); ############################################## ntpsec-1.2.0+dfsg1/ntpd/ntp_config.c-2067- addrbits = 8 * ntpsec-1.2.0+dfsg1/ntpd/ntp_config.c:2068: SIZEOF_INADDR(AF(&addr)); ntpsec-1.2.0+dfsg1/ntpd/ntp_config.c-2069- prefixlen = max(-1, prefixlen); ############################################## ntpsec-1.2.0+dfsg1/ntpd/ntp_config.c-3357-# ifdef ISC_PLATFORM_HAVESALEN ntpsec-1.2.0+dfsg1/ntpd/ntp_config.c:3358: addr->sa.sa_len = SIZEOF_SOCKADDR(AF(addr)); ntpsec-1.2.0+dfsg1/ntpd/ntp_config.c-3359-# endif ############################################## ntpsec-1.2.0+dfsg1/wafhelpers/check_sockaddr.py-10- ntpsec-1.2.0+dfsg1/wafhelpers/check_sockaddr.py:11:def check_sockaddr(ctx): ntpsec-1.2.0+dfsg1/wafhelpers/check_sockaddr.py-12- ctx.check_cc( ############################################## ntpsec-1.2.0+dfsg1/include/ntp_net.h-98- ntpsec-1.2.0+dfsg1/include/ntp_net.h:99:#define SIZEOF_INADDR(fam) \ ntpsec-1.2.0+dfsg1/include/ntp_net.h-100- ((AF_INET == (fam)) \ ############################################## ntpsec-1.2.0+dfsg1/include/ntp_net.h-103- ntpsec-1.2.0+dfsg1/include/ntp_net.h:104:#define SIZEOF_SOCKADDR(fam) \ ntpsec-1.2.0+dfsg1/include/ntp_net.h-105- ((AF_INET == (fam)) \ ############################################## ntpsec-1.2.0+dfsg1/include/ntp.h-538-#define NTP_HASH_MASK (NTP_HASH_SIZE-1) ntpsec-1.2.0+dfsg1/include/ntp.h:539:#define NTP_HASH_ADDR(src) (sock_hash(src) & NTP_HASH_MASK) ntpsec-1.2.0+dfsg1/include/ntp.h-540- ############################################## ntpsec-1.2.0+dfsg1/include/ntp.h-655-typedef struct res_addr4_tag { ntpsec-1.2.0+dfsg1/include/ntp.h:656: uint32_t addr; /* IPv4 addr (host order) */ ntpsec-1.2.0+dfsg1/include/ntp.h-657- uint32_t mask; /* IPv4 mask (host order) */ ############################################## ntpsec-1.2.0+dfsg1/include/ntp.h-660-typedef struct res_addr6_tag { ntpsec-1.2.0+dfsg1/include/ntp.h:661: struct in6_addr addr; /* IPv6 addr (net order) */ ntpsec-1.2.0+dfsg1/include/ntp.h-662- struct in6_addr mask; /* IPv6 mask (net order) */ ############################################## ntpsec-1.2.0+dfsg1/packaging/SUSE/ntpsec.changes-133- * ntp.h: remove unused INADDR_NTP ntpsec-1.2.0+dfsg1/packaging/SUSE/ntpsec.changes:134: * ntp_io: remove unused sau_from_netaddr() ntpsec-1.2.0+dfsg1/packaging/SUSE/ntpsec.changes-135- * ntp_refclock: make refclock_setup() local. ############################################## ntpsec-1.2.0+dfsg1/libntp/isc_interfaceiter.c-79-static void ntpsec-1.2.0+dfsg1/libntp/isc_interfaceiter.c:80:get_addr(unsigned int family, isc_netaddr_t *dst, struct sockaddr *src, ntpsec-1.2.0+dfsg1/libntp/isc_interfaceiter.c-81- char *ifname) ############################################## ntpsec-1.2.0+dfsg1/libntp/isc_interfaceiter.c-394- ntpsec-1.2.0+dfsg1/libntp/isc_interfaceiter.c:395: get_addr((unsigned int)family, &iter->current.address, ntpsec-1.2.0+dfsg1/libntp/isc_interfaceiter.c-396- ifa->ifa_addr, ifa->ifa_name); ############################################## ntpsec-1.2.0+dfsg1/libntp/isc_interfaceiter.c-398- if (ifa->ifa_netmask != NULL) ntpsec-1.2.0+dfsg1/libntp/isc_interfaceiter.c:399: get_addr((unsigned int)family, &iter->current.netmask, ifa->ifa_netmask, ntpsec-1.2.0+dfsg1/libntp/isc_interfaceiter.c-400- ifa->ifa_name); ############################################## ntpsec-1.2.0+dfsg1/libntp/isc_interfaceiter.c-403- (iter->current.flags & INTERFACE_F_POINTTOPOINT) != 0) ntpsec-1.2.0+dfsg1/libntp/isc_interfaceiter.c:404: get_addr((unsigned int)family, &iter->current.dstaddress, ntpsec-1.2.0+dfsg1/libntp/isc_interfaceiter.c-405- ifa->ifa_dstaddr, ############################################## ntpsec-1.2.0+dfsg1/libntp/isc_interfaceiter.c-409- (iter->current.flags & INTERFACE_F_BROADCAST) != 0) ntpsec-1.2.0+dfsg1/libntp/isc_interfaceiter.c:410: get_addr((unsigned int)family, &iter->current.broadcast, ntpsec-1.2.0+dfsg1/libntp/isc_interfaceiter.c-411- ifa->ifa_broadaddr, ############################################## ntpsec-1.2.0+dfsg1/libntp/isc_interfaceiter.c-678- ntpsec-1.2.0+dfsg1/libntp/isc_interfaceiter.c:679: get_addr(family, &iter->current.address, addr_sa, ntpsec-1.2.0+dfsg1/libntp/isc_interfaceiter.c-680- iter->current.name); ############################################## ntpsec-1.2.0+dfsg1/libntp/isc_interfaceiter.c-682- if (mask_sa != NULL) ntpsec-1.2.0+dfsg1/libntp/isc_interfaceiter.c:683: get_addr(family, &iter->current.netmask, mask_sa, ntpsec-1.2.0+dfsg1/libntp/isc_interfaceiter.c-684- iter->current.name); ############################################## ntpsec-1.2.0+dfsg1/libntp/isc_interfaceiter.c-687- (iter->current.flags & INTERFACE_F_POINTTOPOINT) != 0) ntpsec-1.2.0+dfsg1/libntp/isc_interfaceiter.c:688: get_addr(family, &iter->current.dstaddress, dst_sa, ntpsec-1.2.0+dfsg1/libntp/isc_interfaceiter.c-689- iter->current.name); ############################################## ntpsec-1.2.0+dfsg1/libntp/isc_interfaceiter.c-692- (iter->current.flags & INTERFACE_F_BROADCAST) != 0) ntpsec-1.2.0+dfsg1/libntp/isc_interfaceiter.c:693: get_addr(family, &iter->current.broadcast, dst_sa, ntpsec-1.2.0+dfsg1/libntp/isc_interfaceiter.c-694- iter->current.name); ############################################## ntpsec-1.2.0+dfsg1/libntp/isc_interfaceiter.c-1111- ntpsec-1.2.0+dfsg1/libntp/isc_interfaceiter.c:1112: get_addr(family, &iter->current.address, ntpsec-1.2.0+dfsg1/libntp/isc_interfaceiter.c-1113- (struct sockaddr *)&ifrp->ifr_addr, ifreq.ifr_name); ############################################## ntpsec-1.2.0+dfsg1/libntp/isc_interfaceiter.c-1220- } ntpsec-1.2.0+dfsg1/libntp/isc_interfaceiter.c:1221: get_addr(family, &iter->current.dstaddress, ntpsec-1.2.0+dfsg1/libntp/isc_interfaceiter.c-1222- (struct sockaddr *)&ifreq.ifr_dstaddr, ifreq.ifr_name); ############################################## ntpsec-1.2.0+dfsg1/libntp/isc_interfaceiter.c-1238- } ntpsec-1.2.0+dfsg1/libntp/isc_interfaceiter.c:1239: get_addr(family, &iter->current.broadcast, ntpsec-1.2.0+dfsg1/libntp/isc_interfaceiter.c-1240- (struct sockaddr *)&ifreq.ifr_broadaddr, ifreq.ifr_name); ############################################## ntpsec-1.2.0+dfsg1/libntp/isc_interfaceiter.c-1258- } ntpsec-1.2.0+dfsg1/libntp/isc_interfaceiter.c:1259: get_addr(family, &iter->current.netmask, ntpsec-1.2.0+dfsg1/libntp/isc_interfaceiter.c-1260- (struct sockaddr *)&ifreq.ifr_addr, ifreq.ifr_name); ############################################## ntpsec-1.2.0+dfsg1/libntp/isc_interfaceiter.c-1294- ntpsec-1.2.0+dfsg1/libntp/isc_interfaceiter.c:1295: get_addr(family, &iter->current.address, ntpsec-1.2.0+dfsg1/libntp/isc_interfaceiter.c-1296- (struct sockaddr *)&lifreq.lifr_addr, lifreq.lifr_name); ############################################## ntpsec-1.2.0+dfsg1/libntp/isc_interfaceiter.c-1377- } ntpsec-1.2.0+dfsg1/libntp/isc_interfaceiter.c:1378: get_addr(family, &iter->current.dstaddress, ntpsec-1.2.0+dfsg1/libntp/isc_interfaceiter.c-1379- (struct sockaddr *)&lifreq.lifr_dstaddr, ############################################## ntpsec-1.2.0+dfsg1/libntp/isc_interfaceiter.c-1397- } ntpsec-1.2.0+dfsg1/libntp/isc_interfaceiter.c:1398: get_addr(family, &iter->current.broadcast, ntpsec-1.2.0+dfsg1/libntp/isc_interfaceiter.c-1399- (struct sockaddr *)&lifreq.lifr_broadaddr, ############################################## ntpsec-1.2.0+dfsg1/libntp/isc_interfaceiter.c-1441- } ntpsec-1.2.0+dfsg1/libntp/isc_interfaceiter.c:1442: get_addr(family, &iter->current.netmask, ntpsec-1.2.0+dfsg1/libntp/isc_interfaceiter.c-1443- (struct sockaddr *)&lifreq.lifr_addr, lifreq.lifr_name); ############################################## ntpsec-1.2.0+dfsg1/devel/make-tarball-13- ntpsec-1.2.0+dfsg1/devel/make-tarball:14:if [ `basename $PWD` != devel ] ntpsec-1.2.0+dfsg1/devel/make-tarball-15-then ############################################## ntpsec-1.2.0+dfsg1/etc/rc/ntpd-19- if [ -r $PIDFILE ]; then ntpsec-1.2.0+dfsg1/etc/rc/ntpd:20: echo "ntpd seems to be already running under pid `cat $PIDFILE`." ntpsec-1.2.0+dfsg1/etc/rc/ntpd-21- echo "Delete $PIDFILE if this is not the case."; ############################################## ntpsec-1.2.0+dfsg1/etc/rc/ntpd-53- echo -n "Stopping NTP daemon..."; ntpsec-1.2.0+dfsg1/etc/rc/ntpd:54: PID=`cat $PIDFILE` ntpsec-1.2.0+dfsg1/etc/rc/ntpd-55- ############################################## ntpsec-1.2.0+dfsg1/etc/rc/ntpd-58- for i in `seq 1 15`; do ntpsec-1.2.0+dfsg1/etc/rc/ntpd:59: if [ -n "`ps -p $PID|grep -v PID`" ]; then ntpsec-1.2.0+dfsg1/etc/rc/ntpd-60- echo -n . ############################################## ntpsec-1.2.0+dfsg1/etc/rc/ntpd-75- if [ -r $PIDFILE ]; then ntpsec-1.2.0+dfsg1/etc/rc/ntpd:76: echo "NTP daemon is running as `cat $PIDFILE`" ntpsec-1.2.0+dfsg1/etc/rc/ntpd-77- else ############################################## ntpsec-1.2.0+dfsg1/ntpclients/ntpsnmpd.py-528- ntpsec-1.2.0+dfsg1/ntpclients/ntpsnmpd.py:529: def sub_assocAddr(self): ntpsec-1.2.0+dfsg1/ntpclients/ntpsnmpd.py-530- def handler(oid, associd): ############################################## ntpsec-1.2.0+dfsg1/ntpclients/ntpleapfetch-53- ntpsec-1.2.0+dfsg1/ntpclients/ntpleapfetch:54:SELF="`basename $0`" ntpsec-1.2.0+dfsg1/ntpclients/ntpleapfetch-55- ############################################## ntpsec-1.2.0+dfsg1/ntpclients/ntpleapfetch-259- fi ntpsec-1.2.0+dfsg1/ntpclients/ntpleapfetch:260: echo "`echo \"$1\" | tr a-z A-Z`: $2" ntpsec-1.2.0+dfsg1/ntpclients/ntpleapfetch-261- return 0 ############################################## ntpsec-1.2.0+dfsg1/ntpclients/ntpleapfetch-292- ntpsec-1.2.0+dfsg1/ntpclients/ntpleapfetch:293: local RAW="`sed -ne'/^#[\$@h]/p;/^[^#]/s/.#.*$//p' $1 `" ntpsec-1.2.0+dfsg1/ntpclients/ntpleapfetch-294- ############################################## ntpsec-1.2.0+dfsg1/ntpclients/ntpleapfetch-296- ntpsec-1.2.0+dfsg1/ntpclients/ntpleapfetch:297: local DATA="`echo \"$RAW\" | sed -e'/^#h/d' -e's/^#[\$@]//g' | tr -d '[:space:]'`" ntpsec-1.2.0+dfsg1/ntpclients/ntpleapfetch-298- ############################################## ntpsec-1.2.0+dfsg1/ntpclients/ntpleapfetch-304- ntpsec-1.2.0+dfsg1/ntpclients/ntpleapfetch:305: local DSHA1="`printf \"$DATA\" | $SHASUM | sed -e's/[? *].*$//'`" ntpsec-1.2.0+dfsg1/ntpclients/ntpleapfetch-306- ############################################## ntpsec-1.2.0+dfsg1/ntpclients/ntpleapfetch-312- # ntpsec-1.2.0+dfsg1/ntpclients/ntpleapfetch:313: local FSHA1="`grep '^#h' $1 | tr -d '[:cntrl:]' | sed -e's/^#h/0x/' -e's/ / 0x/g'`" ntpsec-1.2.0+dfsg1/ntpclients/ntpleapfetch:314: FSHA1=`printf '%08x%08x%08x%08x%08x' $FSHA1` ntpsec-1.2.0+dfsg1/ntpclients/ntpleapfetch-315- ############################################## ntpsec-1.2.0+dfsg1/ntpclients/ntpleapfetch-329- ntpsec-1.2.0+dfsg1/ntpclients/ntpleapfetch:330: EXPIRES="`echo \"$RAW\" | sed -e'/^#@/!d' -e's/^#@//' | tr -d '[:space:]'`" ntpsec-1.2.0+dfsg1/ntpclients/ntpleapfetch-331- EXPIRES="$(($EXPIRES - 2208988800 ))" ############################################## ntpsec-1.2.0+dfsg1/ntpclients/ntpleapfetch-333- if [ $EXPIRES -lt `date -u +%s` ]; then ntpsec-1.2.0+dfsg1/ntpclients/ntpleapfetch:334: log "notice" "File expired on `date -u -d \"Jan 1, 1970 00:00:00 +0000 + $EXPIRES seconds\"`" ntpsec-1.2.0+dfsg1/ntpclients/ntpleapfetch-335- return 2 ############################################## ntpsec-1.2.0+dfsg1/ntpclients/ntpleapfetch-347-# Parse ntp.conf for leapfile directive ntpsec-1.2.0+dfsg1/ntpclients/ntpleapfetch:348:LEAPFILE="`grep -x 'leapfile *.*' $NTPCONF | grep -o ' [^ ]*.*'`" ntpsec-1.2.0+dfsg1/ntpclients/ntpleapfetch-349-if [ -z "$LEAPFILE" ]; then ############################################## ntpsec-1.2.0+dfsg1/ntpclients/ntpleapfetch-370- ntpsec-1.2.0+dfsg1/ntpclients/ntpleapfetch:371:if [ -n "$FORCE" ] || ! verifySHA1 $LEAPFILE "$VERBOSE" || [ $EXPIRES -lt `date -d "NOW + $PREFETCH" +%s` ] ; then ntpsec-1.2.0+dfsg1/ntpclients/ntpleapfetch-372- TRY=0 ############################################## ntpsec-1.2.0+dfsg1/waflib/Tools/asm.py-25- elif self.env.ASM_NAME=='nasm': ntpsec-1.2.0+dfsg1/waflib/Tools/asm.py:26: Logs.warn('The Nasm dependency scanner is incomplete!') ntpsec-1.2.0+dfsg1/waflib/Tools/asm.py-27- try: ############################################## ntpsec-1.2.0+dfsg1/.pc/update-refclock-docs.patch/docs/refclock.adoc-67-Commands] page. The +prefer+ option can be useful to persuade the ntpsec-1.2.0+dfsg1/.pc/update-refclock-docs.patch/docs/refclock.adoc:68:server to cherish a reference clock with somewhat more enthusiasm than ntpsec-1.2.0+dfsg1/.pc/update-refclock-docs.patch/docs/refclock.adoc-69-other reference clocks or peers. It is further discussed on the ############################################## ntpsec-1.2.0+dfsg1/.pc/use-etc-ntpsec.patch/ntpclients/ntpleapfetch-53- ntpsec-1.2.0+dfsg1/.pc/use-etc-ntpsec.patch/ntpclients/ntpleapfetch:54:SELF="`basename $0`" ntpsec-1.2.0+dfsg1/.pc/use-etc-ntpsec.patch/ntpclients/ntpleapfetch-55- ############################################## ntpsec-1.2.0+dfsg1/.pc/use-etc-ntpsec.patch/ntpclients/ntpleapfetch-259- fi ntpsec-1.2.0+dfsg1/.pc/use-etc-ntpsec.patch/ntpclients/ntpleapfetch:260: echo "`echo \"$1\" | tr a-z A-Z`: $2" ntpsec-1.2.0+dfsg1/.pc/use-etc-ntpsec.patch/ntpclients/ntpleapfetch-261- return 0 ############################################## ntpsec-1.2.0+dfsg1/.pc/use-etc-ntpsec.patch/ntpclients/ntpleapfetch-292- ntpsec-1.2.0+dfsg1/.pc/use-etc-ntpsec.patch/ntpclients/ntpleapfetch:293: local RAW="`sed -ne'/^#[\$@h]/p;/^[^#]/s/.#.*$//p' $1 `" ntpsec-1.2.0+dfsg1/.pc/use-etc-ntpsec.patch/ntpclients/ntpleapfetch-294- ############################################## ntpsec-1.2.0+dfsg1/.pc/use-etc-ntpsec.patch/ntpclients/ntpleapfetch-296- ntpsec-1.2.0+dfsg1/.pc/use-etc-ntpsec.patch/ntpclients/ntpleapfetch:297: local DATA="`echo \"$RAW\" | sed -e'/^#h/d' -e's/^#[\$@]//g' | tr -d '[:space:]'`" ntpsec-1.2.0+dfsg1/.pc/use-etc-ntpsec.patch/ntpclients/ntpleapfetch-298- ############################################## ntpsec-1.2.0+dfsg1/.pc/use-etc-ntpsec.patch/ntpclients/ntpleapfetch-304- ntpsec-1.2.0+dfsg1/.pc/use-etc-ntpsec.patch/ntpclients/ntpleapfetch:305: local DSHA1="`printf \"$DATA\" | $SHASUM | sed -e's/[? *].*$//'`" ntpsec-1.2.0+dfsg1/.pc/use-etc-ntpsec.patch/ntpclients/ntpleapfetch-306- ############################################## ntpsec-1.2.0+dfsg1/.pc/use-etc-ntpsec.patch/ntpclients/ntpleapfetch-312- # ntpsec-1.2.0+dfsg1/.pc/use-etc-ntpsec.patch/ntpclients/ntpleapfetch:313: local FSHA1="`grep '^#h' $1 | tr -d '[:cntrl:]' | sed -e's/^#h/0x/' -e's/ / 0x/g'`" ntpsec-1.2.0+dfsg1/.pc/use-etc-ntpsec.patch/ntpclients/ntpleapfetch:314: FSHA1=`printf '%08x%08x%08x%08x%08x' $FSHA1` ntpsec-1.2.0+dfsg1/.pc/use-etc-ntpsec.patch/ntpclients/ntpleapfetch-315- ############################################## ntpsec-1.2.0+dfsg1/.pc/use-etc-ntpsec.patch/ntpclients/ntpleapfetch-329- ntpsec-1.2.0+dfsg1/.pc/use-etc-ntpsec.patch/ntpclients/ntpleapfetch:330: EXPIRES="`echo \"$RAW\" | sed -e'/^#@/!d' -e's/^#@//' | tr -d '[:space:]'`" ntpsec-1.2.0+dfsg1/.pc/use-etc-ntpsec.patch/ntpclients/ntpleapfetch-331- EXPIRES="$(($EXPIRES - 2208988800 ))" ############################################## ntpsec-1.2.0+dfsg1/.pc/use-etc-ntpsec.patch/ntpclients/ntpleapfetch-333- if [ $EXPIRES -lt `date -u +%s` ]; then ntpsec-1.2.0+dfsg1/.pc/use-etc-ntpsec.patch/ntpclients/ntpleapfetch:334: log "notice" "File expired on `date -u -d \"Jan 1, 1970 00:00:00 +0000 + $EXPIRES seconds\"`" ntpsec-1.2.0+dfsg1/.pc/use-etc-ntpsec.patch/ntpclients/ntpleapfetch-335- return 2 ############################################## ntpsec-1.2.0+dfsg1/.pc/use-etc-ntpsec.patch/ntpclients/ntpleapfetch-347-# Parse ntp.conf for leapfile directive ntpsec-1.2.0+dfsg1/.pc/use-etc-ntpsec.patch/ntpclients/ntpleapfetch:348:LEAPFILE="`grep -x 'leapfile *.*' $NTPCONF | grep -o ' [^ ]*.*'`" ntpsec-1.2.0+dfsg1/.pc/use-etc-ntpsec.patch/ntpclients/ntpleapfetch-349-if [ -z "$LEAPFILE" ]; then ############################################## ntpsec-1.2.0+dfsg1/.pc/use-etc-ntpsec.patch/ntpclients/ntpleapfetch-370- ntpsec-1.2.0+dfsg1/.pc/use-etc-ntpsec.patch/ntpclients/ntpleapfetch:371:if [ -n "$FORCE" ] || ! verifySHA1 $LEAPFILE "$VERBOSE" || [ $EXPIRES -lt `date -d "NOW + $PREFETCH" +%s` ] ; then ntpsec-1.2.0+dfsg1/.pc/use-etc-ntpsec.patch/ntpclients/ntpleapfetch-372- TRY=0 ############################################## ntpsec-1.2.0+dfsg1/.pc/use-etc-ntpsec.patch/ntpd/ntp_config.c-2067- addrbits = 8 * ntpsec-1.2.0+dfsg1/.pc/use-etc-ntpsec.patch/ntpd/ntp_config.c:2068: SIZEOF_INADDR(AF(&addr)); ntpsec-1.2.0+dfsg1/.pc/use-etc-ntpsec.patch/ntpd/ntp_config.c-2069- prefixlen = max(-1, prefixlen); ############################################## ntpsec-1.2.0+dfsg1/.pc/use-etc-ntpsec.patch/ntpd/ntp_config.c-3357-# ifdef ISC_PLATFORM_HAVESALEN ntpsec-1.2.0+dfsg1/.pc/use-etc-ntpsec.patch/ntpd/ntp_config.c:3358: addr->sa.sa_len = SIZEOF_SOCKADDR(AF(addr)); ntpsec-1.2.0+dfsg1/.pc/use-etc-ntpsec.patch/ntpd/ntp_config.c-3359-# endif ############################################## ntpsec-1.2.0+dfsg1/.pc/use-etc-ntpsec.patch/pylib/packet.py-658- ntpsec-1.2.0+dfsg1/.pc/use-etc-ntpsec.patch/pylib/packet.py:659: def sortaddr(self): ntpsec-1.2.0+dfsg1/.pc/use-etc-ntpsec.patch/pylib/packet.py-660- addr = self.addr ############################################## ntpsec-1.2.0+dfsg1/.pc/use-etc-ntpsec.patch/pylib/packet.py-1577- # IPv4 asc. then IPv6 asc. ntpsec-1.2.0+dfsg1/.pc/use-etc-ntpsec.patch/pylib/packet.py:1578: "addr": lambda e: e.sortaddr(), ntpsec-1.2.0+dfsg1/.pc/use-etc-ntpsec.patch/pylib/packet.py-1579- # IPv6 desc. then IPv4 desc. ntpsec-1.2.0+dfsg1/.pc/use-etc-ntpsec.patch/pylib/packet.py:1580: "-addr": lambda e: e.sortaddr(), ntpsec-1.2.0+dfsg1/.pc/use-etc-ntpsec.patch/pylib/packet.py-1581- # hit count ascending ############################################## ntpsec-1.2.0+dfsg1/.pc/use-etc-ntpsec.patch/tests/pylib/test_packet.py-190- span.entries = [entry1, entry2, entry3, entry4] ntpsec-1.2.0+dfsg1/.pc/use-etc-ntpsec.patch/tests/pylib/test_packet.py:191: sorter = (lambda e: e.sortaddr()) # Extracted from parse_mru_variables ntpsec-1.2.0+dfsg1/.pc/use-etc-ntpsec.patch/tests/pylib/test_packet.py-192- sortkey = "addr" ############################################## ntpsec-1.2.0+dfsg1/.pc/use-etc-ntpsec.patch/tests/pylib/test_packet.py-606- cls.addr = "[11:22:33::44:55]:42" ntpsec-1.2.0+dfsg1/.pc/use-etc-ntpsec.patch/tests/pylib/test_packet.py:607: self.assertEqual(cls.sortaddr(), ntpsec-1.2.0+dfsg1/.pc/use-etc-ntpsec.patch/tests/pylib/test_packet.py-608- ntp.poly.polybytes("\x00\x11\x00\x22\x00\x33\x00\x00" ############################################## ntpsec-1.2.0+dfsg1/.pc/use-etc-ntpsec.patch/tests/pylib/test_packet.py-611- cls.addr = "[11:22:33::44:55%8]:42" ntpsec-1.2.0+dfsg1/.pc/use-etc-ntpsec.patch/tests/pylib/test_packet.py:612: self.assertEqual(cls.sortaddr(), ntpsec-1.2.0+dfsg1/.pc/use-etc-ntpsec.patch/tests/pylib/test_packet.py-613- ntp.poly.polybytes("\x00\x11\x00\x22\x00\x33\x00\x00" ############################################## ntpsec-1.2.0+dfsg1/.pc/use-etc-ntpsec.patch/tests/pylib/test_packet.py-617- cls.addr = "11.22.33.44:23" ntpsec-1.2.0+dfsg1/.pc/use-etc-ntpsec.patch/tests/pylib/test_packet.py:618: self.assertEqual(cls.sortaddr(), ntpsec-1.2.0+dfsg1/.pc/use-etc-ntpsec.patch/tests/pylib/test_packet.py-619- ntp.poly.polybytes((("\0" * 16) + "\x0b\x16\x21\x2c"))) ############################################## ntpsec-1.2.0+dfsg1/.pc/use-sbin-for-ntploggps-and-ntplogtemp.patch/wscript-729- from wafhelpers.check_sockaddr import check_sockaddr ntpsec-1.2.0+dfsg1/.pc/use-sbin-for-ntploggps-and-ntplogtemp.patch/wscript:730: check_sockaddr(ctx) ntpsec-1.2.0+dfsg1/.pc/use-sbin-for-ntploggps-and-ntplogtemp.patch/wscript-731- ############################################## ntpsec-1.2.0+dfsg1/wscript-729- from wafhelpers.check_sockaddr import check_sockaddr ntpsec-1.2.0+dfsg1/wscript:730: check_sockaddr(ctx) ntpsec-1.2.0+dfsg1/wscript-731-