<method-1> | Primary policy method: • hmac_md5 - Message-Digest algorithm 5 (MD5) is a widely-used cryptographic hash function with a 128-bit hash value. This is the default value. • hmac_sha1 - Secure Hash Algorithm (SHA1) is a set of related cryptographic hash functions. SHA-1 is considered to be the successor to MD5. • hmac_sha256 - HMAC-SHA256 is a type of keyed hash algorithm that is constructed from the SHA-256 hash function and used as a Hash-based Message Authentication Code (HMAC). • hmac_sha384 - HMA-SHA384 is a type of keyed hash algorithm that is constructed from the SHA-256 hash function and used as a HMAC. • hmac_sha512 - HMAC-SHA512 is a type of keyed hash algorithm that is constructed from the SHA-256 hash function and used as a HAMC. |
<method-2> | Secondary policy method: • hmac_md5 - Message-Digest algorithm 5 (MD5) is a widely-used cryptographic hash function with a 128-bit hash value. This is the default value. • hmac_sha1 - Secure Hash Algorithm (SHA1) is a set of related cryptographic hash functions. SHA-1 is considered to be the successor to MD5. • hmac_sha256 - HMAC-SHA256 is a type of keyed hash algorithm that is constructed from the SHA-256 hash function and used as a Hash-based Message Authentication Code (HMAC). • hmac_sha384 - HMA-SHA384 is a type of keyed hash algorithm that is constructed from the SHA-256 hash function and used as a HMAC. • hmac_sha512 - HMAC-SHA512 is a type of keyed hash algorithm that is constructed from the SHA-256 hash function and used as a HAMC. |