[Date Prev] | [Thread Prev] | [Thread Next] | [Date Next] -- [Date Index] | [Thread Index] | [List Home]
Subject: http://tools.oasis-open.org/issues/browse/OFFICE-3027
Greetings! Working http://tools.oasis-open.org/issues/browse/OFFICE-3027 and the suggested text reads: > The three stages of the encryption process proceed as follows, using > the legacy algorithms to illustrate each stage: 3.4.2 of Part 3. OK, but the first step reads: > 1. The start key is generated: The byte sequence representing the > password in UTF-8 is used to generate a 20-byte SHA1 digest > (see [RFC3174]). Is the only *normative* text: 1. The start key is generated: ??? The rest is just note material? If it is illustration, I can make notes for each of the three steps. Or do we mean to specify any of this in the current standard? Thanks! Patrick -- Patrick Durusau patrick@durusau.net Chair, V1 - US TAG to JTC 1/SC 34 Convener, JTC 1/SC 34/WG 3 (Topic Maps) Editor, OpenDocument Format TC (OASIS), Project Editor ISO/IEC 26300 Co-Editor, ISO/IEC 13250-1, 13250-5 (Topic Maps) Another Word For It (blog): http://tm.durusau.net Homepage: http://www.durusau.net Twitter: patrickDurusau Newcomb Number: 1
[Date Prev] | [Thread Prev] | [Thread Next] | [Date Next] -- [Date Index] | [Thread Index] | [List Home]