|
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] RE: iSCSI: Keys used in security negotiation stageYes, the set
of keys usable during security negotiation is
deliberately
limited. The text in question might have been
better
phrased as "Other keys MUST NOT be used." --David
Home Last updated: Thu Jun 12 15:19:25 2003 12632 messages in chronological order |