Docs on string-to-key routines?
Henry B. Hotz
hotz at jpl.nasa.gov
Thu Mar 11 19:38:46 EST 2004
Where is the "real" description of the string-to-key functions, V4,
AFS, and V5?
My specific question is whether any of them have hard upper bounds on
password length. Saw a reference that seemed to imply they were
encryption type specific, but I can't find it again (and that doesn't
seem quite right in any case).
--
The opinions expressed in this message are mine,
not those of Caltech, JPL, NASA, or the US Government.
Henry.B.Hotz at jpl.nasa.gov, or hbhotz at oxy.edu
More information about the Kerberos
mailing list