|
@@ -301,7 +301,7 @@ int ntp_request(const char *host, double *offset, int *offset_result, double *ji
|
|
|
DBG(print_ntp_control_message(&req));
|
|
DBG(print_ntp_control_message(&req));
|
|
|
/* discard obviously invalid packets */
|
|
/* discard obviously invalid packets */
|
|
|
if (ntohs(req.count) > MAX_CM_SIZE)
|
|
if (ntohs(req.count) > MAX_CM_SIZE)
|
|
|
- die(STATE_CRITICAL, "NTP CRITICAL: Invalid paclet received from NTP server\n");
|
|
|
|
|
|
|
+ die(STATE_CRITICAL, "NTP CRITICAL: Invalid packet received from NTP server\n");
|
|
|
if (LI(req.flags) == LI_ALARM) li_alarm = 1;
|
|
if (LI(req.flags) == LI_ALARM) li_alarm = 1;
|
|
|
/* Each peer identifier is 4 bytes in the data section, which
|
|
/* Each peer identifier is 4 bytes in the data section, which
|
|
|
* we represent as a ntp_assoc_status_pair datatype.
|
|
* we represent as a ntp_assoc_status_pair datatype.
|