All done

Stewart

On 27/04/2013 00:07, Stewart Bryant wrote:
On 26/04/2013 19:45, Martin Thomson wrote:
On 26 April 2013 10:44, Stewart Bryant <[email protected]> wrote:
Section 6.3 now says

The HMAC proceedure described in [RFC2104] is used to compute the hash.
s/proceedure/procedure/

The hash is computed over the entire GAP message as shown in Fig1.
What value does the Authentication TLV have when it is input to the HMAC?
Sorry missed that - zero - will address in the inevitable next version.

Stewart

The length of the Authentication Data field is always less than or equal
to the message digest size of the specific hash function that is being
used, however the implementer needs to consider that although this
decreases the size of the message, it results in a corresponding
reduction in the strength of the assurance provided.
Hash truncation is not RECOMMENDED.
This last part could probably be a new paragraph.
.





--
For corporate legal information go to:

http://www.cisco.com/web/about/doing_business/legal/cri/index.html

_______________________________________________
Gen-art mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/gen-art

Reply via email to