> The code in the 'auth' branch uses a pure-C implementation of the SHA-2 > series of algorithms; I believe the actual hash used is SHA-512, but I > could be mistaken. But if we're going to do authentication only, and not > encryption, then hash speed isn't very important (we'll only do one hash > at the beginning of the connection)
In any case: please don't use a custom algorithm, use a wide-known which is suppported by a wide range of development environments. ------------------------------------------------------------------------------ All the data continuously generated in your IT infrastructure contains a definitive record of customers, application performance, security threats, fraudulent activity and more. Splunk takes this data and makes sense of it. Business sense. IT sense. Common sense. http://p.sf.net/sfu/splunk-d2dcopy1 _______________________________________________ Nbd-general mailing list [email protected] https://lists.sourceforge.net/lists/listinfo/nbd-general
