Docs on string-to-key routines?

Henry B. Hotz hotz at jpl.nasa.gov
Thu Mar 11 19:38:46 EST 2004


Where is the "real" description of the string-to-key functions, V4, 
AFS, and V5?

My specific question is whether any of them have hard upper bounds on 
password length.  Saw a reference that seemed to imply they were 
encryption type specific, but I can't find it again (and that doesn't 
seem quite right in any case).
-- 
The opinions expressed in this message are mine,
not those of Caltech, JPL, NASA, or the US Government.
Henry.B.Hotz at jpl.nasa.gov, or hbhotz at oxy.edu


More information about the Kerberos mailing list