md5 |
See Section 7 of [RFC8315] |
[RFC8315] |
Author of [RFC8315] |
OBSOLETE |
[IESG] |
Do not use this algorithm anymore |
sha1 |
See Section 7 of [RFC8315] |
[RFC8315] |
Author of [RFC8315] |
LIMITED USE |
[IESG] |
This algorithm is intended for backward compatibility |
sha224 |
See Section 7 of [RFC8315] |
[RFC8315] |
Author of [RFC8315] |
LIMITED USE |
[IESG] |
sha256 should be used instead, this is a truncated variant |
sha256 |
See Section 7 of [RFC8315] |
[RFC8315] |
Author of [RFC8315] |
COMMON |
[IESG] |
This algorithm is mandatory to implement |
sha384 |
See Section 7 of [RFC8315] |
[RFC8315] |
Author of [RFC8315] |
LIMITED USE |
[IESG] |
sha512 should be used instead, this is a truncated variant |
sha512 |
See Section 7 of [RFC8315] |
[RFC8315] |
Author of [RFC8315] |
COMMON |
[IESG] |
This algorithm is optional |