halleluia: m$ dumps Vulnerable Encryption Algorithms

Cristian Ionescu-Idbohrn cristian.ionescu-idbohrn at axis.com
Mon Sep 19 17:06:30 EDT 2005


vulnerable cryptographic algorithms; reservations for second hand info:

  http://www.ebcvg.com/articles.php?id=886

I think ths is relevant, as I noticed somee/all these algorithms are used
when building when building wpa_supplicant under certain conditions.


Cheers,
Cristian



More information about the HostAP mailing list