> I'll study authinfo and get back to you, probably tomorrow. authinfo is a bad example. ntpq has its own copy of that list.
I thought there was at least one command that didn't need it's own list, but I can't find an example. Beware, you may get sucked in. The swamp is pretty deep, but it's the sort of problem you are good at. The fundamental problem is that there are 3 tables that have to be kept in sync. There is a text "table" of #defines to assign sequential numbers to handles, a table of strings for mapping strings to handles, and a final select on handle to format the result. You will see when you get there if you don't remember. I'm slightly surprised you haven't cleaned it up already. -- These are my opinions. I hate spam. _______________________________________________ devel mailing list devel@ntpsec.org http://lists.ntpsec.org/mailman/listinfo/devel