OASIS Mailing List ArchivesView the OASIS mailing list archive below
or browse/search using MarkMail.


Help: OASIS Mailing Lists Help | MarkMail Help

office message

[Date Prev] | [Thread Prev] | [Thread Next] | [Date Next] -- [Date Index] | [Thread Index] | [List Home]

Subject: http://tools.oasis-open.org/issues/browse/OFFICE-3027


Working http://tools.oasis-open.org/issues/browse/OFFICE-3027 and the
suggested text reads:

> The three stages of the encryption process proceed as follows, using
> the legacy algorithms to illustrate each stage: 

3.4.2 of Part 3.

OK, but the first step reads:

>      1. The start key is generated: The byte sequence representing the
>         password in UTF-8 is used to generate a 20-byte SHA1 digest
>         (see [RFC3174]).

Is the only *normative* text:

1. The start key is generated:


The rest is just note material? 

If it is illustration, I can make notes for each of the three steps. 

Or do we mean to specify any of this in the current standard? 



Patrick Durusau
Chair, V1 - US TAG to JTC 1/SC 34
Convener, JTC 1/SC 34/WG 3 (Topic Maps)
Editor, OpenDocument Format TC (OASIS), Project Editor ISO/IEC 26300
Co-Editor, ISO/IEC 13250-1, 13250-5 (Topic Maps)

Another Word For It (blog): http://tm.durusau.net
Homepage: http://www.durusau.net
Twitter: patrickDurusau
Newcomb Number: 1

[Date Prev] | [Thread Prev] | [Thread Next] | [Date Next] -- [Date Index] | [Thread Index] | [List Home]