Re: Interop grill-off2005-09-20 02:35:52On Tue, 20 Sep 2005 10:39:56 +0200, Daniel A Nagy said: I would suggest a completely different approach: try extracting a key from each ESK (be it password-derived, password-encrypted or asymmetcially encrypted), and use the one which inspires most confidence: Makes sense. We have not seen many pubkey/symkey encrypted messages in the wild thus the way we handle them is straightforward. Need to look at it closer. Thanks, Werner
|
|