2010/1/18 Kai Chan :
> Hi,
>
> In cert.h
> (http://mxr.mozilla.org/security/source/security/nss/lib/certdb/cert.h#714),
> there is a line about obsolete functions:
> **OLD OBSOLETE FUNCTIONS with enum SECCertUsage - DO NOT USE FOR NEW
> CODE
>
> And also in certvfy.c
> (http://mxr.mozilla.org/s
2010/1/19 Kai Chan :
> The reason I ask is because a lot of things that would be nice to abstract,
> like CRL generation, is mainly done in their respective nss/cmd/
> directories.
You can use nss/cmd/lib as a static library, as if
you copied the source code into your project.
nss/cmd/lib uses onl
On Fri, Jan 22, 2010 at 2:13 PM, Robert Relyea wrote:
>
>> Also, 2 DES is vulnerable to the meet-in-the-middle attack:
>> http://en.wikipedia.org/wiki/Meet-in-the-middle_attack
>>
> Do you mean 'naive' 2 DES? real 2 des is:
>
> C = Ek1(Dk2(Ek1(P)))
Bob, yes, I mean naive 2 DES. Thanks for the
On 01/22/2010 11:53 AM, Wan-Teh Chang wrote:
> 2010/1/22 Robert Relyea :
>
>> On 01/22/2010 06:37 AM, manish wrote:
>>
>> i wanted to know why not we use 4 DES , or 5 DES ,.why onle triple
>> DES,
>> is there a problem
>>
>>
>> For NSS, the answer is simple:
>>
>> There is no standard fo
2010/1/22 Robert Relyea :
> On 01/22/2010 06:37 AM, manish wrote:
>
> i wanted to know why not we use 4 DES , or 5 DES ,.why onle triple
> DES,
> is there a problem
>
>
> For NSS, the answer is simple:
>
> There is no standard for 4 DES or 5 DES, only des and 3 DES (which a special
> form o
On 01/22/2010 06:37 AM, manish wrote:
> i wanted to know why not we use 4 DES , or 5 DES ,.why onle triple
> DES,
> is there a problem
>
For NSS, the answer is simple:
There is no standard for 4 DES or 5 DES, only des and 3 DES (which a
special form of 3 DES that allows for a '2 DES' st
i wanted to know why not we use 4 DES , or 5 DES ,.why onle triple
DES,
is there a problem
--
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto
7 matches
Mail list logo