Key Algorithms?2005-05-19 13:39:23Key algorithms ... these are used in various contexts, and there's a list in 9.1 - some of these are clearly unsuitable in some contexts - for example, one would not expect to see RSA Encrypt-Only (3) in a signature. But I can't find any language saying anything about this. Are there any rules? -- http://www.apache-ssl.org/ben.html http://www.thebunker.net/ "There is no limit to what a man can do or how far he can go if he doesn't mind who gets the credit." - Robert Woodruff
|
|