>         Please refer to Section 3.3 for a discussion of the hash algorithms
>         implemented by Signers and Verifiers. Which algorithms are listed
>         in h= is an operational choice made by the sender.

Mr Nit Picker suggests:

         Refer to Section 3.3 for a discussion of the hash algorithms
         implemented by Signers and Verifiers. The algorithms listed
         in h= in each record is an operational choice made by the sender.

Regards,
John Levine, jo...@iecc.com, Primary Perpetrator of "The Internet for Dummies",
Please consider the environment before reading this e-mail. http://jl.ly
_______________________________________________
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html

Reply via email to