Dell Latitude E6420 Administration Guide - Page 56
The supported hash algorithms are
View all Dell Latitude E6420 manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 56 highlights
When the Insert key is pressed in the Manage Certificate Hash screen, the following screen is displayed. To add a customized certificate hash: Type the hash name (up to 32 characters). When you press , you are prompted to select the algorithm of hash being used for PKI provisioning. Type Y if SHA1 is being used, otherwise enter N. The supported hash algorithms are: 1. SHA1 2. SHA2-256
When the Insert key is pressed in the Manage Certificate Hash screen, the following screen is displayed.
To add a customized certificate hash
: Type the hash name (up to 32 characters). When you press <Enter>, you are
prompted to select the algorithm of hash being used for PKI provisioning. Type
Y
if SHA1 is being used, otherwise enter
N
.
The supported hash algorithms are:
1. SHA1
2. SHA2-256