prep for 1.0.1

Hal Murray hmurray at megapathdsl.net
Thu Mar 1 09:20:52 UTC 2018


> I see no real blockers.  We've got a bunch of little nits and documentation
> issues.  I might try to push a fix for #446. 

>From ntp at ietf.org
> Please note that latest versions of ntp truncate long digests in MACs to 160
> bits, so the authentication should work with any hash function supported by
> OpenSSL. 

If you want to do it, it's 2 places in libntp/macencrypt.c
After EVP_DigestFinal_ex, truncate the length.

There is a 3rd place that uses EVP_DigestFinal_ex, but that is with MD5 which 
has an OK length.

We should add a warning to the read-keys path.


-- 
These are my opinions.  I hate spam.





More information about the devel mailing list