On Wed, 20 Jan 2016, Kishore Av wrote:
> 1. Could you please list me the functions uses the encryption?
> 2. What Encryption scheme used in the functions?
> 3. Length of the key used in the functions?
Is there anything particular that prevents you from doing this yourself? The
code is equally accessible to all of us!
-- / daniel.haxx.se _______________________________________________ libssh2-devel http://cool.haxx.se/cgi-bin/mailman/listinfo/libssh2-develReceived on 2016-01-20