[ietf-dkim] [dkim-ops] key validation question
John R. Levine
johnl at iecc.com
Mon Apr 11 12:34:25 PDT 2011
> Please refer to Section 3.3 for a discussion of the hash algorithms
> implemented by Signers and Verifiers. Which algorithms are listed
> in h= is an operational choice made by the sender.
Mr Nit Picker suggests:
Refer to Section 3.3 for a discussion of the hash algorithms
implemented by Signers and Verifiers. The algorithms listed
in h= in each record is an operational choice made by the sender.
John Levine, johnl at iecc.com, Primary Perpetrator of "The Internet for Dummies",
Please consider the environment before reading this e-mail. http://jl.ly
More information about the ietf-dkim