halleluia: m$ dumps Vulnerable Encryption Algorithms

Cristian Ionescu-Idbohrn cristian.ionescu-idbohrn
Mon Sep 19 14:06:30 PDT 2005


vulnerable cryptographic algorithms; reservations for second hand info:

  http://www.ebcvg.com/articles.php?id=886

I think ths is relevant, as I noticed somee/all these algorithms are used
when building when building wpa_supplicant under certain conditions.


Cheers,
Cristian




More information about the Hostap mailing list