On Thu, 18 Apr 2024, Valery Smyslov wrote:
OK, then how about (Section 3):
CURRENT:
The receiving party may take this
information into consideration when selecting an algorithm for its
authentication if several alternatives are available.
NEW:
The receiving party may take this
information into consideration when selecting an algorithm for its
authentication (i.e., the algorithm used for calculation of the AUTH
payload) if several alternatives are available.
Does this help?
That's great, thanks!
Paul
_______________________________________________
IPsec mailing list
IPsec@ietf.org
https://www.ietf.org/mailman/listinfo/ipsec