jerome etienne wrote:Question: What do you insert where?3. an attacker gets it, insert chosen data in it and put it back
the attack is described in the paper. it is availble at http://off.net/~jme/loopdev_vul.html
- Linux-crypto: cryptography in and on the Linux system Archive: http://mail.nl.linux.org/linux-crypto/