System Administration Guide: IP Services

Authentication Algorithms

Authentication algorithms produce an integrity checksum value or digest that is based on the data and a key. The authentication algorithm man pages describe the size of both the digest and key. The following table lists the authentication algorithms that are supported in the Solaris operating environment. The table also lists the format of the algorithms when they are used as security options to the IPsec utilities and their man page names.

Table 19–1 Supported Authentication Algorithms

Algorithm Name 

Security Option Format 

Man Page 

HMAC-MD5 

md5, hmac-md5 

authmd5h(7M)

HMAC-SHA-1 

sha, sha1, hmac-sha, hmac-sha1 

authsha1(7M)