Re: Slicing and dicing

Dave Mason <dmason@tis.com> Mon, 08 September 1997 21:39 UTC

Received: (from majordom@localhost) by portal.ex.tis.com (8.8.2/8.8.2) id RAA21454 for ipsec-outgoing; Mon, 8 Sep 1997 17:39:06 -0400 (EDT)
Date: Mon, 08 Sep 1997 17:47:31 -0400
From: Dave Mason <dmason@tis.com>
Message-Id: <199709082147.RAA07082@rubicon.rv.tis.com>
To: ipsec@tis.com
Subject: Re: Slicing and dicing
Sender: owner-ipsec@ex.tis.com
Precedence: bulk

>It is my understanding that if bytes 1..8 yield a weak key that you toss
>that 'slice' and go on, so it would use bytes 9..16.

My take is to try bytes 2..9 if 1..8 are weak (I inherited some code that
does it that way).  I guess the text needs to be more specific.

-dave