Where is the "real" description of the string-to-key functions, V4,
AFS, and V5?
My specific question is whether any of them have hard upper bounds on
password length. Saw a reference that seemed to imply they were
encryption type specific, but I can't find it again (and that doesn't
seem quite right in any case).
--
The opinions expressed in this message are mine,
not those of Caltech, JPL, NASA, or the US Government.
[EMAIL PROTECTED], or [EMAIL PROTECTED]
________________________________________________
Kerberos mailing list [EMAIL PROTECTED]
https://mailman.mit.edu/mailman/listinfo/kerberos
- Re: Docs on string-to-key routines? Henry B. Hotz
- Re: Docs on string-to-key routines? Jeffrey Hutzelman
- Re: Docs on string-to-key routines? Henry B. Hotz
- Re: Docs on string-to-key routines? Jeffrey Hutzelman
- Re: Docs on string-to-key routines? Henry B. Hotz