> I'll study authinfo and get back to you, probably tomorrow.

authinfo is a bad example.  ntpq has its own copy of that list.

I thought there was at least one command that didn't need it's own list, but I 
can't find an example.

Beware, you may get sucked in.  The swamp is pretty deep, but it's the sort of 
problem you are good at.  The fundamental problem is that there are 3 tables 
that have to be kept in sync.
  There is a text "table" of #defines to assign sequential numbers to handles,
  a table of strings for mapping strings to handles,
  and a final select on handle to format the result.

You will see when you get there if you don't remember.  I'm slightly surprised 
you haven't cleaned it up already.


-- 
These are my opinions.  I hate spam.



_______________________________________________
devel mailing list
devel@ntpsec.org
http://lists.ntpsec.org/mailman/listinfo/devel

Reply via email to