Authentication algorithms produce an integrity checksum value or digest that is based on the data and a key. The man pages for authentication algorithms describe the size of both the digest and key. The following table lists the authentication algorithms that are supported in the Solaris operating environment. The table also lists the format of the algorithms when the algorithms are used as security options to the IPsec utilities and their man page names.
Table 1–1 Supported Authentication Algorithms
Algorithm Name |
Security Option Format |
Man Page |
---|---|---|
HMAC-SHA-1 |