ntpfrob: stepback for RS6000
Sanjeev Gupta
ghane0 at gmail.com
Sat Feb 27 03:33:55 UTC 2016
On Sat, Feb 27, 2016 at 2:51 AM, Eric S. Raymond <esr at thyrsus.com> wrote:
> I'm sorry. I cleaned up the code, but I don't really understand the bug.
:-) Ah, the Knuth defence: Beware of bugs in the above code; I have only
proved it correct, not tried it.
This is my take on the RS600 issue:
According to https://www.eecis.udel.edu/~mills/ntp/html/hints/rs6000 ,
the a hack was added to xntp in v2 for AIX 3.1, and that was before
"93/12/3" , but this version would not work on older AIX.
AIX 3.1 was released in Feb 1990 , so the bug was in something older than
that.
I suggest that ntpfrob drop support for testing for this bug. I will clean
up related docs, and review tests, as well, and submit a PR on Github for
review.
--
Sanjeev Gupta
+65 98551208 http://www.linkedin.com/in/ghane
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.ntpsec.org/pipermail/devel/attachments/20160227/244fdc1a/attachment.html>
More information about the devel
mailing list