Authentication algorithms produce an integrity checksum value or digest that is based on the data and a key. The authentication algorithm man pages describe the size of both the digest and key. The following table lists the authentication algorithms that are supported in the Solaris operating environment. The table also lists the format of the algorithms when they are used as security options to the IPsec utilities and their man page names.
Table 19–1 Supported Authentication Algorithms
Algorithm Name |
Security Option Format |
Man Page |
---|---|---|
HMAC-MD5 |
md5, hmac-md5 | |
HMAC-SHA-1 |
sha, sha1, hmac-sha, hmac-sha1 |