vulnerable cryptographic algorithms; reservations for second hand info: http://www.ebcvg.com/articles.php?id=886 I think ths is relevant, as I noticed somee/all these algorithms are used when building when building wpa_supplicant under certain conditions. Cheers, Cristian