On Thu, 18 Apr 2024, Valery Smyslov wrote:

OK, then how about (Section 3):

CURRENT:
  The receiving party may take this
  information into consideration when selecting an algorithm for its
  authentication if several alternatives are available.

NEW:
  The receiving party may take this
  information into consideration when selecting an algorithm for its
  authentication (i.e., the algorithm used for calculation of the AUTH
  payload) if several alternatives are available.

Does this help?

That's great, thanks!

Paul

_______________________________________________
IPsec mailing list
IPsec@ietf.org
https://www.ietf.org/mailman/listinfo/ipsec

Reply via email to