From: Rich Salz <rsalz@osf.org>
To: warlord@MIT.EDU
Message Hash: da6dd16a6c1a8e9f2c711a35ab5e1a543d8200cff69396cabd20debc3881fd1e
Message ID: <9601250008.AA12407@sulphur.osf.org>
Reply To: N/A
UTC Datetime: 1996-01-25 03:27:36 UTC
Raw Date: Thu, 25 Jan 1996 11:27:36 +0800
From: Rich Salz <rsalz@osf.org>
Date: Thu, 25 Jan 1996 11:27:36 +0800
To: warlord@MIT.EDU
Subject: Re: Crippled Notes export encryption
Message-ID: <9601250008.AA12407@sulphur.osf.org>
MIME-Version: 1.0
Content-Type: text/plain
>So where exactly do they draw the line? You can still construct your
>software in such a way that there is a clean boundary between the
>crypto stuff and the rest.
Right. However, if you call things like "keysize" as oposed to "state"
then they will look askance.
>How exactly are crypto-hooks defined?
On a case-by-case basis.
/r$
Return to January 1996
Return to “Rich Salz <rsalz@osf.org>”
1996-01-25 (Thu, 25 Jan 1996 11:27:36 +0800) - Re: Crippled Notes export encryption - Rich Salz <rsalz@osf.org>