5.1.1 Keyed Hash Function

This protocol uses the HMAC SHA-256<7> and HMAC SHA-1 keyed hash functions for generating tokens.