This page is part of the FHIR Specification (v0.5.0: DSTU 2 Ballot 2). The current version which supercedes this version is 5.0.0. For a full list of available versions, see the Directory of published versions . Page versions: R4 R3 R2
? not found
{ "resourceType": "ValueSet", "id": "v3-IntegrityCheckAlgorithm", "meta": { "lastUpdated": "2015-03-23T00:00:00.000+11:00", "profile": [ "http://hl7.org/fhir/StructureDefinition/valueset-shareable-definition" ] }, "text": { "status": "generated", "div": "<div>!-- Snipped for Brevity --></div>" }, "extension": [ { "url": "http://hl7.org/fhir/StructureDefinition/valueset-oid", "valueUri": "urn:oid:2.16.840.1.113883.1.11.17385" } ], "url": "http://hl7.org/fhir/v3/vs/IntegrityCheckAlgorithm", "version": "2015-03-23", "name": "v3 Code System IntegrityCheckAlgorithm", "publisher": "HL7, Inc", "contact": [ { "telecom": [ { "system": "url", "value": "http://hl7.org" } ] } ], "description": "? not found", "status": "active", "experimental": false, "date": "2015-03-23", "define": { "extension": [ { "url": "http://hl7.org/fhir/StructureDefinition/valueset-oid", "valueUri": "urn:oid:2.16.840.1.113883.5.1010" } ], "system": "http://hl7.org/fhir/v3/IntegrityCheckAlgorithm", "caseSensitive": true, "concept": [ { "code": "SHA-1", "abstract": false, "display": "secure hash algorithm - 1", "definition": "This algorithm is defined in FIPS PUB 180-1: Secure Hash Standard. As of April 17, 1995." }, { "code": "SHA-256", "abstract": false, "display": "secure hash algorithm - 256", "definition": "This algorithm is defined in FIPS PUB 180-2: Secure Hash Standard." } ] } }
Usage note: every effort has been made to ensure that the examples are correct and useful, but they are not a normative part of the specification.