AIX {ssha256} and {ssha512} hash algo ?

I'm trying to learn how the AIX implementation for ssha256 / ssha512 differs from the standard algo described in (my goal is to be able to generate valid hash from a java app).

I saw that you discussed the subject a lot 3 years ago ( So I was wondering if you would help about the details of the algo.

Any help or pointer to resources on the subject would be much appreciated.


Messages In This Thread
AIX {ssha256} and {ssha512} hash algo ? - by fanf - 06-29-2016, 09:41 AM