 
| 
 | 
 [Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] iSCSI: Keys used in security negotiation stageSection 11 iSCSI Security Text Keys and Authentication 
Methods lists a set of keys that can be used in security negotiation 
stage. It also says "NO OTHER keys MAY be used". Is it safe to 
assume that any other key received during security negotiation 
stage is a protocol error? thanks!  -lakshmi 
 Home Last updated: Wed Jun 11 14:19:41 2003 12631 messages in chronological order |