On Mon, Sep 26, 2011 at 12:37:40PM +0200, Folkert van Heusden wrote: > >>>> we'll only do one hash > >>>> at the beginning of the connection > >>> > >>> Hopefully you'll do at least 2, and (if authenticating the other way) 4! > >>> But yes. > >> > >> Why 2/4? > > > > 2 because you have to carry out the hash on both ends in order to > > compare them. > > Maybe I'm missing something but isn't obvious that you need to hash at > both sides to be able to verify at all?
Yes, Alex was just being pedantic :-) -- The volume of a pizza of thickness a and radius z can be described by the following formula: pi zz a ------------------------------------------------------------------------------ All the data continuously generated in your IT infrastructure contains a definitive record of customers, application performance, security threats, fraudulent activity and more. Splunk takes this data and makes sense of it. Business sense. IT sense. Common sense. http://p.sf.net/sfu/splunk-d2dcopy1 _______________________________________________ Nbd-general mailing list [email protected] https://lists.sourceforge.net/lists/listinfo/nbd-general
