This
page
is
part
of
the
FHIR
Specification
(v0.0.82:
(v1.0.2:
DSTU
1).
2).
The
current
version
which
supercedes
this
version
is
5.0.0
.
For
a
full
list
of
available
versions,
see
the
Directory
of
published
versions
.
Page
versions:
R4
R3
R2
?
not
found
****
MISSING
DEFINITIONS
****
{
"resourceType": "ValueSet",
"id": "v3-IntegrityCheckAlgorithm",
"meta": {
"lastUpdated": "2015-07-31T00:00:00.000+10:00",
"profile": [
"http://hl7.org/fhir/StructureDefinition/valueset-shareable-definition"
]
},
"text": {
"status": "generated",
"div": "<div><p>Release Date: 2014-08-07</p>\r\n<table class=\"grid\">\r\n <tr><td><b>Level</b></td><td><b>Code</b></td><td><b>Display</b></td><td><b>Definition</b></td></tr>\r\n <tr><td>1</td><td>SHA-1<a name=\"SHA-1\"> </a></td><td>secure hash algorithm - 1</td><td>\n This algorithm is defined in FIPS PUB 180-1: Secure Hash Standard. As of April 17, 1995.<br/>\r\n\n </td></tr>\r\n <tr><td>1</td><td>SHA-256<a name=\"SHA-256\"> </a></td><td>secure hash algorithm - 256</td><td>\n This algorithm is defined in FIPS PUB 180-2: Secure Hash Standard.<br/>\r\n\n </td></tr>\r\n</table>\r\n</div>"
"div": "<div>!-- Snipped for Brevity --></div>"
},
"identifier": "http://hl7.org/fhir/v3/vs/IntegrityCheckAlgorithm",
"extension": [
{
"url": "http://hl7.org/fhir/StructureDefinition/valueset-oid",
"valueUri": "urn:oid:2.16.840.1.113883.1.11.17385"
}
],
"url": "http://hl7.org/fhir/ValueSet/v3-IntegrityCheckAlgorithm",
"version": "2015-07-31",
"name": "v3 Code System IntegrityCheckAlgorithm",
"status": "active",
"experimental": false,
"publisher": "HL7, Inc",
"telecom": [
"contact": [
{
"system": "url",
"value": "http://hl7.org"
"telecom": [
{
"system": "other",
"value": "http://hl7.org"
}
]
}
],
"description": "? not found",
"status": "active",
"date": "2014-08-07T00:00:00+10:00",
"define": {
"date": "2015-07-31",
"description": "**** MISSING DEFINITIONS ****",
"codeSystem": {
"extension": [
{
"url": "http://hl7.org/fhir/StructureDefinition/valueset-oid",
"valueUri": "urn:oid:2.16.840.1.113883.5.1010"
}
],
"system": "http://hl7.org/fhir/v3/IntegrityCheckAlgorithm",
"caseSensitive": true,
"concept": [
{
"code": "SHA-1",
"abstract": false,
"display": "secure hash algorithm - 1",
"definition": "This algorithm is defined in FIPS PUB 180-1: Secure Hash Standard. As of April 17, 1995."
},
{
"code": "SHA-256",
"abstract": false,
"display": "secure hash algorithm - 256",
"definition": "This algorithm is defined in FIPS PUB 180-2: Secure Hash Standard."
}
]
}
}
Usage note: every effort has been made to ensure that the examples are correct and useful, but they are not a normative part of the specification.