ntpfrob: stepback for RS6000

Sanjeev Gupta ghane0 at gmail.com
Sat Feb 27 03:33:55 UTC 2016


On Sat, Feb 27, 2016 at 2:51 AM, Eric S. Raymond <esr at thyrsus.com> wrote:

> I'm sorry.  I cleaned up the code, but I don't really understand the bug.


:-)  Ah, the Knuth defence: Beware of bugs in the above code; I have only
proved it correct, not tried it.

This is my take on the RS600 issue:

According to https://www.eecis.udel.edu/~mills/ntp/html/hints/rs6000 ,
the a hack was added to xntp in v2 for AIX 3.1, and that was before
"93/12/3" , but this version would not work on older AIX.

AIX 3.1 was released in Feb 1990 , so the bug was in something older than
that.

I suggest that ntpfrob drop support for testing for this bug.  I will clean
up related docs, and review tests, as well, and submit a PR on Github for
review.


-- 
Sanjeev Gupta
+65 98551208     http://www.linkedin.com/in/ghane
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.ntpsec.org/pipermail/devel/attachments/20160227/244fdc1a/attachment.html>


More information about the devel mailing list