ietf-dkim
[Top] [All Lists]

Re: [ietf-dkim] [dkim-ops] key validation question

2011-04-11 14:36:57
        Please refer to Section 3.3 for a discussion of the hash algorithms
        implemented by Signers and Verifiers. Which algorithms are listed
        in h= is an operational choice made by the sender.

Mr Nit Picker suggests:

         Refer to Section 3.3 for a discussion of the hash algorithms
         implemented by Signers and Verifiers. The algorithms listed
         in h= in each record is an operational choice made by the sender.

Regards,
John Levine, johnl(_at_)iecc(_dot_)com, Primary Perpetrator of "The Internet 
for Dummies",
Please consider the environment before reading this e-mail. http://jl.ly
_______________________________________________
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html