Lines Matching full:implementation

27 a "default" implementation suitable for general use, and a "fips" implementation
48 In order to use an algorithm an implementation for it must first be "fetched".
51 the implementation that will be used.
59 implementation from a provider. This fetched object can then be passed to other
62 can be used to explicitly fetch a digest algorithm implementation. The user is
98 implementation. See
103 The algorithm implementation that is fetched can then be used with other diverse
111 associated implementation, such as L<EVP_sha256(3)>, L<EVP_aes_128_cbc(3)>,
117 L<EVP_CipherInit_ex(3)>, the actual implementation to be used is
122 is supplied. In this case an algorithm implementation is implicitly fetched
156 Fetch a message digest/hashing algorithm implementation.
160 Fetch a symmetric cipher algorithm implementation.
164 Fetch a Key Derivation Function (KDF) algorithm implementation.
168 Fetch a Message Authentication Code (MAC) algorithm implementation.
172 Fetch a Key Encapsulation Mechanism (KEM) algorithm implementation
176 Fetch an encoder algorithm implementation (e.g. to encode keys to a specified
181 Fetch a decoder algorithm implementation (e.g. to decode keys from a specified
186 Fetch a Pseudo Random Number Generator (PRNG) algorithm implementation.
201 Fetch any available implementation of SHA2-256 in the default context. Note
208 Fetch any available implementation of AES-128-CBC in the default context:
214 Fetch an implementation of SHA2-256 from the default provider in the default
221 Fetch an implementation of SHA2-256 that is not from the default provider in the
228 Fetch an implementation of SHA2-256 that is preferably from the FIPS provider in
235 Fetch an implementation of SHA2-256 from the default provider in the specified
243 implementation of WHIRLPOOL from it:
253 since, assuming no other providers have been loaded, the only implementation of
314 * Fetch the SHA256 algorithm implementation for doing the digest. We're
317 * implementation (second NULL parameter). Any SHA256 implementation will
370 any other algorithm implementation in OpenSSL. They are implemented by