[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: NSA, ITAR, NCSA and plug-in hooks.
-----BEGIN PGP SIGNED MESSAGE-----
Hello Rich Salz <[email protected]>
and [email protected], [email protected]
and [email protected], [email protected],
and [email protected]
> >are specifically designed for the insertion of cryptographic materials,
> >or is it the fact that they could be used to support cryptographic
> Basically, generic buffer-manipulation is okay. "Keyed compression"
> where you explicitly passed something called a key to a DLL routine
> would be looked on suspiciously.
Why would you call it a key?
How about compression "options"? The compression algorithm could
have a "speed" mode and a "size" mode. It could also have options
for file type etc...
Recipient id could be passed along to check which compression
method the recipient knows.
> An abstract set of open/modify/close
> routines (where open returned a pointer to opaque state, say a session
> key :) would be fine.
So what's the difference... apart from what it's called?
If you want an answer, please mail to <[email protected]>.
On sweeney, I may delete without reading!
PGP 463A14D5 (but it's at home so it'll take a day or two)
PGP EF0607F9 (but it's at uni so don't rely on it too much)
-----BEGIN PGP SIGNATURE-----
-----END PGP SIGNATURE-----