> I see no real blockers. We've got a bunch of little nits and documentation > issues. I might try to push a fix for #446.
>From n...@ietf.org > Please note that latest versions of ntp truncate long digests in MACs to 160 > bits, so the authentication should work with any hash function supported by > OpenSSL. If you want to do it, it's 2 places in libntp/macencrypt.c After EVP_DigestFinal_ex, truncate the length. There is a 3rd place that uses EVP_DigestFinal_ex, but that is with MD5 which has an OK length. We should add a warning to the read-keys path. -- These are my opinions. I hate spam. _______________________________________________ devel mailing list devel@ntpsec.org http://lists.ntpsec.org/mailman/listinfo/devel