> The code in the 'auth' branch uses a pure-C implementation of the SHA-2
> series of algorithms; I believe the actual hash used is SHA-512, but I
> could be mistaken. But if we're going to do authentication only, and not
> encryption, then hash speed isn't very important (we'll only do one hash
> at the beginning of the connection)

In any case: please don't use a custom algorithm, use a wide-known
which is suppported by a wide range of development environments.

------------------------------------------------------------------------------
All the data continuously generated in your IT infrastructure contains a
definitive record of customers, application performance, security
threats, fraudulent activity and more. Splunk takes this data and makes
sense of it. Business sense. IT sense. Common sense.
http://p.sf.net/sfu/splunk-d2dcopy1
_______________________________________________
Nbd-general mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/nbd-general

Reply via email to