Lines Matching full:algorithms
12 of cryptographic algorithms used in various Internet standards. The services
22 =head2 Algorithms section in INTRODUCTION
25 referred to in OpenSSL as "algorithms". Each algorithm may have multiple
32 Algorithms are implemented in providers. See
37 Different algorithms can be grouped together by their purpose. For example there
38 are algorithms for encryption, and different algorithms for digesting data.
86 L<OSSL_PROVIDER-default(7)/OPERATIONS AND ALGORITHMS>,
87 L<OSSL_PROVIDER-FIPS(7)/OPERATIONS AND ALGORITHMS>,
88 L<OSSL_PROVIDER-legacy(7)/OPERATIONS AND ALGORITHMS> and
89 L<OSSL_PROVIDER-base(7)/OPERATIONS AND ALGORITHMS>.
91 Note, while providers may register algorithms against a list of names using a
92 string with a colon separated list of names, fetching algorithms using that
137 example of Explicit fetching in L</USING ALGORITHMS IN APPLICATIONS>.
190 See L<OSSL_PROVIDER-default(7)/OPERATIONS AND ALGORITHMS>,
191 L<OSSL_PROVIDER-FIPS(7)/OPERATIONS AND ALGORITHMS>,
192 L<OSSL_PROVIDER-legacy(7)/OPERATIONS AND ALGORITHMS> and
193 L<OSSL_PROVIDER-base(7)/OPERATIONS AND ALGORITHMS> for a list of algorithm names
202 that some algorithms have aliases. So "SHA256" and "SHA2-256" are synonymous:
269 =head1 USING ALGORITHMS IN APPLICATIONS
271 Cryptographic algorithms are made available to applications through use of the
363 Many algorithms require the use of a key. Keys can be generated dynamically