Yaron Sheffer writes: > Tero requested a clarification: I'm proposing to say that the > certificate's hash algorithm does not determine the AUTH hash > function (which is the negotiated PRF). Implementations may use the > certificates received from a given peer as a hint for selecting a > mutually-understood PRF with that peer.
That I can accept. They are not unrelated, but certificate's hash algorithm does not determine AUTH hash algorithm. > And yes, the last sentence refers to this text: > > To promote interoperability, implementations that support this type > SHOULD support signatures that use SHA-1 as the hash function and > SHOULD use SHA-1 as the default hash function when generating > signatures. Do you have new proposed text? -- kivi...@iki.fi _______________________________________________ IPsec mailing list IPsec@ietf.org https://www.ietf.org/mailman/listinfo/ipsec