g.mor...@scewo.ch said:
> I only need to know that the system is not too much away from the actual time
> (<= 1 second). I use *iburst* so that it gets quickly synchronized at
> startup. I don't need much precision, that is why I use big sync intervals.
> We are using the GSM network, where
tpie...@gmail.com said:
> It seems like it would not be that hard to get the USB frame sequence phase
> locked to the system clock. One would need a way to measure the phase offset
> of the USB S-o-F vs the system clock, and then it's a standard process to
> phase lock, with the necessary
> Is there any way for a USB device to synchronise with the CPU clock (perhaps
> via the USB framing) so that a special-purpose device could timestamp the PPS
> occurrence with respect to CPU time ?
If you were designing a special purpose device, just add a counter to measure
the time from
gha...@gmail.com said:
> Hal, why wait till just before the release? Switch the code now, so that the
> NTPsec testers can remind each other to rewrite config files (if required).
If other testers are running git head from a week or so ago, it is already
listening to both 123 an
time-n...@welwarsky.de said:
> However, those quantization errors are in a range of 10s of nanoseconds,
> maybe 100ns or so, ...
There is another level of sawtooth/bridge that happens as the 1 ms ticks from
the USB clock shift relative to the PPS.
--
These are my opinions. I hate spam.
stevesommars...@gmail.com said:
> I'd like to reduce the USB polling contribution by polling at 125
> microseconds as the Linux PPS folks suggest (http://linuxpps.org/doku.php/
> technical_information)Would an FTDI-based USB convertor do the trick?
It depends on which FTDI chip you use.
It's still listening on both 123 and 4460
I want to remove listening on 123 right before Mark releases 1.2.0
--
These are my opinions. I hate spam.
___
devel mailing list
devel@ntpsec.org
http://lists.ntpsec.org/mailman/listinfo/devel
stevesommars...@gmail.com said:
> My RPi4 (Raspbian Buster) has a GPS+PPS/USB. Serial->USB uses Prolific
> PL2303, which supports USB 2.0
> which means 1 msec polling of the PPS signal. I've been unable to poll more
> frequently
As far as I know, the PL2303, 067b:2303, is an old/slow chip.
> NTP is using the PPS and my stats look good, but when I run
> ntpq -c kerninfo
> The pps frequency, stability, and jitter are all zero.
> dmesg | grep pps
> and
> ppstest /dev/pps0
> both indicate the kernel pps support is working.
> Why isn't the kerninfo showing any info on the
> the assumption you are suffering from GPS rollover issues
WNRO seems unlikely. That would be off by 20 years. This case if off by 2.
--
These are my opinions. I hate spam.
___
devel mailing list
devel@ntpsec.org
andrew.hanc...@cyrus-consultants.co.uk said:
> So I cannot use HaTs anymore, so I cobbled together a GPS ublox6 (same
> module) but using a FT232RL, and connected all the pins correctly, and DCD so
> I can get PPS.
FT232R is a USB chip. Timing over USB is "interesting". Do you know about
> May 18 10:06:48 boombox ntpd[2055]: CLOCK: time stepped by 59097600.478559
> May 18 10:06:48 boombox ntpd[2055]: CLOCK: time changed from 2020-07-03 to
> 2022-05-18
> We're running a fairly recent git version of ntpsec: ntpsec-1.1.9-0.fc31.x86_6
> 4 on Fedora 31 on kernel.org 5.7.7.
> How
keith.bra...@gmail.com said:
> I pulled my Thunderbolt out of mothballs this week. It initialized and
> started tracking satellites very nicely, but the date is showing '16Nov00'.
> The day has incremented at UTC midnight the past 2 days and the time is
> accurate.
The buzzword is WNRO - Week
jim...@earthlink.net said:
> 1) All those clever handbook designs and data sheets that I grew up with in
> the 70s,80s, and 90s are just the ticket, but you can't actually get the SSI
> MSI parts any more.
Are families like AC OK to your Reliability people? Any projections on how
long they
> Funny, just yesterday I was looking at the design of a laboratory cesium
> beam standard from 1963. Sorry, there's no divide-by-5 example in there. But
> the attached images show the 108x multiplier (8.5 MHz to 9180 MHz). Sure
> enough, spot the 12AX7 and 6J6 tubes in use...
Neat. Thanks.
The International Conference on Machine Learning (ICML2020) is soliciting
proposals for Virtual Rooms & Socials and Mentoring sessions!
Over the last few years ML conferences have expanded their programs to
including daily events which serve a variety of useful roles including:
1.
bought it
from Apple unlocked, and it’s been used on AT in the US, but should work on
any carrier.
Ships in the original box, with the original USB wall charger and lightning
cable, and brand new earpods.
Asking $300 shipped in the USA.
--
Hal Widlansky
Salt Lake City, UT 84108
--
You received
> What logic family might be appropriate for a divide by 5 from 50 to 10MHz,
> low power, running off 3.3 or 5V?
How important is the "low" power? Do you have other logic/CPU around?
Do you need 50/50 duty cycle (or close) or is 20/80 OK?
How about a CPU with a counter/timer block setup to
> You might try the 74AC161, which works to 73MHz at 3.3V or 103 MHz at 5V, -40
> to 85C.
> Set the data inputs to DCBA = 1011 and connect an inverter from the carry
> output (pin 15) to the Load input (pin 9) to divide by 5. See http://
> www.techlib.com/electronics/74161Divider.htm
You
actual shipping
--
Hal Widlansky
Salt Lake City, UT 84108
--
You received this message because you are a member of the LEM Swap group.
To post to this group, send email to lemswap@googlegroups.com
To unsubscribe, send an email *from your subscribed address* to
lemswap+unsubscr
b...@herrin.us said:
> NTP you say? How does iburst work during initial sync up?
How does it work, or how should it work? 1/2 :)
NTP has been around for a long time. It looks very simple, so anybody thinks
they can toss off an implementation without much thought. It will probably
work,
How often do packets magically get duplicated within the network so that the
target receives 2 copies? That seems like something somebody at NANOG might
have studied and given a talk on.
Any suggestions for other places to look?
Context is NTP. If a client gets an answer, should it keep
mlich...@redhat.com said:
> I'd suggest to call hwclock -w on shutdown or periodically as a cron job.
The Linux kernel writes the RTC every 11 minutes. (if configured, and if ntp
is working)
config option is CONFIG_RTC_SYSTOHC
code is in kernel/time/ntp.c
--
These are my opinions. I hate
mlich...@redhat.com said:
> It seems hwclock has a fallback to handle RTCs without interrupts by reading
> the RTC time in a busy loop. I don't think that would be acceptable for
> chronyd to consume 100% of a CPU core just to track an RTC.
The RTC is a clock rather than a source of arbitrary
> I need to divide the output of an OCXO by a factor D=81 for testing purposes.
> So with minimum added phase noise. PICDIV-like approches would not work (D
> needs to be divisible by 8 or at least be even) I went through the archives
> and it seems that an Injection Locked Frequency Divider
Yes, an alternative syntax I can come up with (underscore as a placeholder):
func Foo(type T1 _, T2 Bar)
On Thursday, 18 June 2020 03:28:39 UTC+1, Andrey Tcherepanov wrote:
>
> Wouldn't it be nice to have just
>
> func Foo(type T1, type T2 Bar)
>
> (type as keyword splitting it into 2 type
I think that checking for NULL from EVP_get_ciphername() works in 1.1.1
but that changed for 3.0.0
Is there anything better/cleaner than actually calling EVP_CipherInit() or
such?
I'm curious. What does it mean to have a non-NULL cipher that doesn't work?
I'm using default Engines and
In the context of making things go fast/clean, do I need a reset? If so, why?
My straw man is that setup has 3 stages:
1: get storage and whatever for the cipher
2: setup tables and such for a key
3: init internal data
In the same key case, the basic operation is
Init (does step 3)
> How does it look for large input? As in many kilobytes or megabytes?
16K is all I was willing to wait for. Timing for really long blocks turns
into a memory test. The right unit is ns/byte. If that's an interesting
case, I'll hack some code to do longer blocks.
1.1.1g
AES-128 16 48
This is obvious, but it surprised me so I'll mention it to add to the general
background understanding.
seccomp has to allow not just what our code does directly, but also what the
libraries do. DNS lookup in libc does all sorts of things.
So does libssl.
--
These are my opinions. I
Intel(R) Core(TM) i5-3570 CPU @ 3.40GHz
After Kurt's improvement, with our usage patterns (48 bytes), PKEY mode on
3.0.0 takes 2x as many cycles as 1.1.1
That factor probably depends on how good the hardware AES support is in your
CPU. I think it's significantly faster in newer CPU chips.
Thanks.
> The manpage documents: The call to EVP_DigestSignFinal() internally finalizes
> a copy of the digest context. This means that calls to EVP_DigestSignUpdate()
> and EVP_DigestSignFinal() can be called later to digest and sign additional
> data.
I saw that, but couldn't figure out
There are 3 cases of "structure of NULL" where the "of" should be "or".
The "NULL" is actually "B" in the pod file.
doc/man3/EVP_PKEY_CTX_new.pod
doc/man3/X509_NAME_add_entry_by_txt.pod
doc/man3/X509V3_get_d2i.pod
--
There are several bugs/typos in the example code at the end of
Thanks.
levi...@openssl.org said:
> Quick forst answer, EVP_MAC_CTX is a typedef of struct evp_mac_ctx_st, which
> you find in crypto/evp/evp_local.h. It's quite small (smaller than
> EVP_MD_CTX and EVP_PKEY_CTX):
How much space does the crypto stuff take? The idea is to do all of the setup
"If a constraint is specified for any type parameter, every type parameter
must have a constraint. If some type parameters need a constraint and some
do not, those that do not should have a constraint of interface{}."
"interface{}" equals to "Any Type" in the context of generics. So it seems
levi...@openssl.org said:
> What does surprise me, though, is that direct EVP_MAC calls would be slower
> than going through the PKEY bridge. I would very much like to see your code
> to see what's going on.
Over on an ntpsec list, Kurt Roeckx reported that he was still waiting...
Richard's
k...@roeckx.be said:
> Note that we're still waiting for a reply from you about your test code. I
> would like to see if it's possible to improve the speed in 3.0.0, or at least
> understand where the slowdown comes from.
Sorry.
Richard Levitte's message said "I would very much like to see
They are up to alpha3. I've been trying it.
I added a tweak to wscript to support this, and some notes in HOWTO-OpenSSL
That recipe also works for getting 1.1.1 on old systems so they can use NTS.
-
There are several big changes in 3.0.0
The CMAC_* API that we have been using is
In general, things have slowed down.
The new EVP_MAC code takes 3 times as long as the old CMAC code on 1.1.1.
The new PKEY code takes twice as long as the old CMAC code on 1.1.1
The one ray of hope is that the API for EVP_MAC has split the part of the
setup that uses the key out of the init
Thanks. It's working now. Timings soon.
The first paragraph in the man page for EVP_DigestSign and friends says:
The EVP signature routines are a high level interface to digital signatures.
Input data is digested first before the signing takes place.
Down at the bottom, under CMAC, it says:
I can't get CMAC to work via PKEY. I get the same error on 1.1.1g and 3.0.0
I'm using a cipher that works with the CMAC interface.
Can anybody see what I'm missing?
/* hack to demonstrate pkey troubles */
/* build with:
* cc -Wall -I/usr/local/ssl/include \
* -L/usr/local/ssl/lib
Does my test program do anything interesting on your system?
rs...@akamai.com said:
> I dlon't lnow about Python's freefunc, no idea what it is, but the OpenSSL
> line is defining a function with a local parameter named freefunc. Those
> names shouldn't clash; what compiler and flags?
Python
I get a blizzard of shadow warnings if Pyhton.h is included along with evp.h.
No problems on 1.1.1g from Fedora.
They go away if I include evp.h first.
/usr/local/ssl/include/openssl/safestack.h:124:72: warning: declaration of
âfreefuncâ shadows a global declaration [-Wshadow]
124 |
Thanks.
> and a CMAC key using the function EVP_PKEY_new_CMAC_key():
That's the step I was missing. Right in front of my eyes.
I'm still missing something though.
Does this look reasonable:
cipher = EVP_aes_128_cbc();
pkey = EVP_PKEY_new_CMAC_key(NULL, key, keylength, cipher);
levi...@openssl.org said:
> In 1.1.1 and earlier, there is a different idea, using EVP_PKEY routines to
> "sign" with a MAC. We have a EVP_PKEY to EVP_MAC bridge in 3.0.0 to bridge
> the gap.
Thanks, but...
The EVP_PKEY seems to assume a public/private key environment. The man page
for
CMAC_* have been DEPRECATED for 3.0.0
CHANGES.md suggests using EVP_MAC_xxx. Mostly, that seems reasonable, but
there is one loose end.
CMAC_Init includes a key and cipher. What's the equivalent in EVP_MAC_xxx?
---
I found the params stuff, but that's new in 3.0.0
How do I do it
Don N5CID said:
> Ctrl-R will 'reply' only to the sender.
There are at least two problems with that.
The first is that not all mail software has the same UI and this list has a
wide collection of people running a wide collection of software. (Ctrl-R on
mine doesn't do anything.)
The second
> When I recently installed 3.19 from repo on the new 'raspberry pi os (64
> bit)', I had to change /etc/letsencrypt from ownership ntp:ntp to root:ntp
> in order to get past the 'permission denied' errors.
3.19 sounds more like a GPSD version. Did you update ntpsec too?
I can't figure out
mikie.simp...@gmail.com said:
> I used to have a symlink into /etc/ntp from /etc/letsencrypt/live... which
> worked until the recent changes.
Do you have old log files? Can you find a case with the old setup where your
ntpd reloaded the updated certificate and key?
The recent change was
> But then I lose the automatic rotation :-(
Good catch. I do the update manually after it sends me reminder email.
Is the automatic stuff a cron job? Did you set it up manually, or is there an
option to set it up?
We should make a pass at the documentation collecting these ideas.
--
Abe Books has several copies of the hardcopy.
https://www.abebooks.com/
$30. Check the fine print. At least one says print on demand.
My copy is in near perfect condition. Page 127/8 is a 3 page fold out diagram.
It's 650 pages, way more than I will ever read, but if somebody sends a note
>> Step 1 will be to listen on both old and new port #
>> Step 2 is to switch the client side to default to the new port #.
>> Step 3 is to stop listening on the old port #.
>> Plan B is to merge them all 3 steps and tolerate the brokenness until
>> everybody switches to the new port
I watched the video of an astronomy talk yesterday. (Info below. I thought
it was good.)
During the Q, the speaker discussed the possible options for detecting
different wavelengths of gravity waves.
For very long wavelengths, she mentioned the possibility of watching pulsars.
Has anybody
I just pushed the code so that ntpd now listens on both ports 4460 and 123.
Mark: This is step 1. You get to decide if you want to do another release
now, and another for step 2 in a couple of days. If so, the release
announcement should describe the process.
--
These are my opinions. I
> The port has been assigned: https://www.iana.org/assignments/service-names-por
> t-numbers/service-names-port-numbers.xhtml?search=4460
Thanks. I'd missed that.
--
These are my opinions. I hate spam.
___
devel mailing list
devel@ntpsec.org
gha...@gmail.com said:
> Hal, are we talking of the ntske port, 4460/tcp ?
Yes.
> As I understand it, NTS requires an out-of-band pre-arrangement. It makes no
> sense for me to probe random IP addresses for an NTS server to use, why would
> I trust this? So there would be an exis
> I'm thinking of tagging 1.2.0 for when NTS is officially official.
Seems like a good plan.
I'm expecting there will be a new port number assigned for the KE server.
Step 1 will be to listen on both old and new port #
Step 2 is to switch the client side to default to the new port #.
Step
at BBEdit's factories may have been an easier
approach, but I'm glad to be better AppleScript.
My current search & replace script is below in case anyone has feedback.
Thank you both for your help.
Hal
---
In case anybody is looking for things to work on...
There are several clumps of statistics that ntpq can print that get reset
every hour because foostats prints them out and clears the counters. I think
we should not reset the counters but update a copy when they currently get
reset.
We should do this. It's not trivial. Doing it involves reworking the code is
a good way.
Subject: [Ntp] I-D Action: draft-ietf-ntp-port-randomization-03.txt
From: internet-dra...@ietf.org
Date: Fri, 29 May 2020 00:13:38 -0700
To:
Cc: n...@ietf.org
A New Internet-Draft is available from the
WIBDR == What I've Been Doing Recently
Maybe if we use a tag like that occasionally, it will encourage others to
report on their adventures, or some interesting details of plain old boring
work.
--
I'm not sure how/why I got started on this, but I've been trying to learn more
about
I am learning to use AppleScript for BBEdit to do find/replace editing. I
find that replace does "replace all", and have not discovered how one does
a single find/replace.
Could someone explain that, and could someone tell me where to get good,
detailed information on this topic. I find the
e...@thyrsus.com said:
> Aaarrgghhh. It;s a huge pain in the ass and I wish it weren't interesting.
> But given our mission statememnnt, it has to be.
Just to make sure we are on the same wavelength...
My question/proposal was not to drop seccomp if we didn't do what I sketched
out. It was
e...@thyrsus.com said:
>> If yes, I'll need some help to work out the details.
> Aaarrgghhh. It;s a huge pain in the ass and I wish it weren't interesting.
> But given our mission statememnnt, it has to be.
OK. Let's discuss how to do it.
I was thinking of putting the individual lists in
> Recently I noticed such an error from khronos.mikieboy.net, which is operated
> by Michael Simpson. Mike has been involved in ntpsec and is on this list, so
> I'm taking this opportunity to investigate the issue.
Mike: Do you have log files from then? (May 22)
If so, please save them
I've been experimenting with some code to allow custom scccomp lists.
The idea is to replace the --enable-seccomp configure option with
--enable-seccomp=foo
and ntp_sandbox would include syscomp/foo.c which would be a list of syscalls
used by this system.
I assume we would maintain a list
Fedora is updating from Python 3.7 to 3.8.
That breaks ntpq (and friends) because the installed ntp libraries are over in
3.7 but ntpq is looking in 3.8
Is there a good/clean fix for this? Should the code that chops the ".py? off
the name also fixup the first line of the script to replace
> bottom of docs/ntpsec.adoc
That's under Future directions.
It says:
> * Now that we have full Network Time Security, a near-future
> direction is to remove older insecure authentication methods (MAC
> and MS-SNTP).
I'd be happy to drop MS-SNTP, especially if we don't have any users.
I
> I am trying to track down if MS-SNTP support was added back, and if it is
> supported.
> We have an entry in the news file, about removal, but none on addition.
The code is still there. I don't know if it works or anybody uses it.
I don't see any mention of it in NEWS. Do you have a line
> The NTPsec Project is pleased to announce the tagging of version 1.1.9
Congrats/thanks.
In hindsight, we should have pushed a release when we made the incompatible
change to the new string used to make the c2s and s2c keys. (The draft RFC
changed a string constant There is no reasonable
James Browning said:
> Maybe the feast day of Nicholas Copernicus and Johannes Kepler for the fun
> fact.
John Harrison.
--
These are my opinions. I hate spam.
___
devel mailing list
devel@ntpsec.org
The US is tilted. Florida is about right. Seattle is a meter high.
The U.S. Is Getting Shorter, as Mapmakers Race to Keep Up
https://www.nytimes.com/2020/05/22/science/maps-elevation-geodetic-survey.html
But across the United States, the heights of structures, landmarks, valleys,
hills and
a tempered glass screen protector on it since it was new (still does).
Selling just the iPad (with screen protector), with a new/unused Apple
lightning cable.
Asking $100, shipped (by USPS Priority Mail) in the US.
--
Hal Widlansky
Salt Lake City, UT 84108
--
You received this message because
> Unless someone pulls the stop cord, I will tag NTPsec_1_1_9 on 2020-05-23.
Seems like a good plan to me.
The NTS RFC is still somewhere in the paperwork process. We'll have to do
another release shortly after it comes out. I have now idea when that will be.
--
These are my opinions. I
Are any clocks good enough to detect solid Earth tides?
I remember a story about a CERN experiment that wasn't working until they
corrected for the phase of the moon. It was extremely sensitive to the
diameter of the ring which changed slightly with the tides.
--
These are my opinions. I
kb...@n1k.org said:
> Probably not a big deal for a basement project. It would have stopped things
> dead if we tried to run it at work. We had at least 4 layers of rules
> checking that ran before the board finally went out for fab â¦..
Could you give a few examples of the more obscure
t...@leapsecond.com said:
> Yes, the book about Loomis by Jennet Conant is highly recommended.
I thought it was a great read.
There is a CSPAN author interview on youtube. Not much about time-nuttery but
lots of stories about the people involved. Her grandfather was president of
Harvard
Pulled from my Quicksilver G4 tower, compatible with any AGP G4 PowerMac tower.
Card has ADC and VGA ports.
Works great, and would be an upgrade for anyone still running a Rage128,
Rage128Pro, GeForce 2MX, and Radeon 7500.
Asking $20 shipped in the US, or best offer.
--
Hal Widlansky
Salt Lake
, but that’s
about all of the visible wear.
Asking $55 shipped.
--
Hal Widlansky
Salt Lake City, UT 84108
--
You received this message because you are a member of the LEM Swap group.
To post to this group, send email to lemswap@googlegroups.com
To unsubscribe, send an email *from your subscribed
matthew.sel...@twosigma.com said:
> I don't see these commits on https://gitlab.com/NTPsec/ntpsec/-/commits/
> master or merge request on https://gitlab.com/NTPsec/ntpsec/-/merge_requests
Thanks for the heads-up. I forgot the push. It's there now.
--
These are my opinions. I hate spam.
I just pushed a fix that explains some cases of cloudflare not working.
The case that I fixed is IPv6 and the clock being stepped.
If you encounter a case of git head not working with cloudflare, please let me
know.
--
These are my opinions. I hate spam.
Is there any published data on what happens to the quality of time if the
survey is off by xxx meters?
Do all the GPS receivers use the same coordinate system? If I take a survey
with several GPS receivers will they all get the same answer?
--
These are my opinions. I hate spam.
watsonbl...@gmail.com said:
> There is speculation and some evidence that port 123 might not work very well
> due to ISP interference: I wonder if that might be happening here.
I've tracked down a bug that prevents sending requests. With no requests
going out, there are no answers coming
> Begin forwarded message:
>
> From: Hal Vaughan
> Subject: Re: [GNC] Adding Transactions From Another Program
> Date: May 8, 2020 at 1:42:28 AM EDT
> To: david whiting
>
> I think that’s it!
>
> First, a comment: I went on and installed Homebrew and things see
devel@ntpsec.org said:
> I have upgraded to ntpd ntpsec-1.1.8+ (git rev 36bb89920) and I
> believe I'm seeing this problem.
You aren't connecting to ntp1.glypnod.com either, so that's probably not a
cloudflare problem.
Thanks for the report. I may have seen something similar.
Are the
If I read things correctly, you are signing the server's certificate with your
root certificate. I tested with an intermediate cert in there. I don't know
any reason your case won't work, but it's not how I tested things.
[on server]
2020-05-07T16:24:58 ntpd[27974]: NTS: error:14094418:SSL
created, I could import that
CSV file? Or would I have to run the interest calculating script from outside
GC?
Hal
> On Apr 30, 2020, at 11:51 PM, D. wrote:
>
> Hal,
>
> John Ralls, the person who manages the Mac end of GnuCash, has pointed out
> that Homebrew simply us
watsonbl...@gmail.com said:
> I've gotten reports from some users of a remaining incompatibility with
> time.cloudflare.com and the code currently in git. I'm going to dig into it,
> but let me know if you have other reports.
I haven't seen any solid reports of our git head not working with
> Is it not possible to use self-signed certificates? Or am I missing some
> steps; is there a recipe that works for machines on private networks?
I use self signed certificates for testing so it should be reasonable for you
to get it working.
I used a recipe I found on the web. It sets up
Mike Hammett said:
> IMO, the answer is balance.
> - Handful of SSH connection attempts against a server. Nobody got in,
> security hardening did it's job. I don't think that is worth reporting. -
> Constant brute force SSH attempts from a given source over an extended period
> of time, or a
devel@ntpsec.org said:
> Much our of NTS code uses BSD-4-Clause-UC instead of BSD-2-Clause (our
> preferred license for new code).
> What this license selection intentional?
No. I just copied something from somewhere.
> Is BSD-4-Clause-UC intended for code owned by the University of
Interesting!
Did you consider having GC use XML in your save file instead of SQL?
If I do pursue this, I’ll be glad to make the code available and let people
know what happens.
Hal
> On Apr 28, 2020, at 5:41 PM, Stu Perlman wrote:
>
> Hal,
>
> I'm sort of doing a liter vers
, after getting it working and verifying it works, I’ll look into if
I can do that without exiting GC.
Thanks!
Hal
> On Apr 28, 2020, at 4:51 PM, Adrien Monteleone
> wrote:
>
> My understanding is it isn’t exactly ’safe’ to directly edit the data file
> outside of the app. (th
MacPorts.
Hal
> On Apr 28, 2020, at 5:58 PM, David H wrote:
>
> Have you checked out the GnuCash Python Bindings -
> https://code.gnucash.org/docs/MAINT/python_bindings_page.html - no point in
> re-inventing the wheel :-)
>
> Cheers David H.
>
> What
What's the right fix for this?
gcc (GCC) 10.0.1 20200328 (Red Hat 10.0.1-0.11)
../../libaes_siv/aes_siv.c: In function âAES_SIV_EncryptFinalâ:
../../libaes_siv/aes_siv.c:385:19: warning: inlining failed in call to
âdo_s2v_pâ: --param max-inline-insns-single limit reached [-Winline]
to add transactions to a file (or edit comments in a
transaction) and, when I’m done, for GnuCash to be able to read that file, with
my new transactions, in and to include the amounts in the added transactions in
account totals.
Hal
___
gnucash-user
> After a great deal of refactoring, digging, confusion, and generalized
> wrestling with the surprising number of tentacles that comprise the mrulist
> system I can now make a report of sorts:
Great. Thanks.
Did you fix anything in the process? Are you describing the current code or
l ship by USPS.
--
Hal Widlansky
Salt Lake City, UT 84108
--
You received this message because you are a member of the LEM Swap group.
To post to this group, send email to lemswap@googlegroups.com
To unsubscribe, send an email *from your subscribed address* to
lemswap+unsubscr...@googlegroups.c
> I was basically planning on feeding the OCXO and the PPS from a GPS module
> into a simple microcontroller.
If you feed the PPS from a GPS into a microconroller, you can work out the
clock speed on the microcontroller.
If you feed the serial signal from the GPS into the microcontroller, you
j...@scawbydesign.co.uk said:
> Just to put the record straight, I am a 72-year-old retired electronics
> specialist who uses a 50-year-old Weller soldering iron and a magnified
> (x3.5) bench light to solder 64pin 0.5mm pitch MSP430 microprocessors by
> hand. As I said - "... not impossible to
801 - 900 of 27099 matches
Mail list logo