19.4. Choice of algorithms

Both authentication and encryption allow a choice of algorithms

Note

This section of the manual not complete