Lines Matching full:implementation

83 a "default" implementation suitable for general use, and a "fips" implementation
102 In order to use an algorithm an implementation for it must first be "fetched".
105 the implementation that will be used.
112 implementation from a provider. This fetched object can then be passed to other
115 can be used to explicitly fetch a digest algorithm implementation. The user is
146 implementation. See
149 The algorithm implementation that is fetched can then be used with other diverse
156 associated implementation, such as \fBEVP_sha256\fR\|(3), \fBEVP_aes_128_cbc\fR\|(3),
162 \&\fBEVP_CipherInit_ex\fR\|(3), the actual implementation to be used is
167 is supplied. In this case an algorithm implementation is implicitly fetched
197 Fetch a message digest/hashing algorithm implementation.
200 Fetch a symmetric cipher algorithm implementation.
203 Fetch a Key Derivation Function (KDF) algorithm implementation.
206 Fetch a Message Authentication Code (MAC) algorithm implementation.
209 Fetch a Key Encapsulation Mechanism (KEM) algorithm implementation
212 Fetch an encoder algorithm implementation (e.g. to encode keys to a specified
216 Fetch a decoder algorithm implementation (e.g. to decode keys from a specified
220 Fetch a Pseudo Random Number Generator (PRNG) algorithm implementation.
232 Fetch any available implementation of SHA2\-256 in the default context. Note
241 Fetch any available implementation of AES\-128\-CBC in the default context:
249 Fetch an implementation of SHA2\-256 from the default provider in the default
258 Fetch an implementation of SHA2\-256 that is not from the default provider in the
267 Fetch an implementation of SHA2\-256 that is preferably from the FIPS provider in
276 Fetch an implementation of SHA2\-256 from the default provider in the specified
286 implementation of WHIRLPOOL from it:
298 since, assuming no other providers have been loaded, the only implementation of
360 \& * Fetch the SHA256 algorithm implementation for doing the digest. We\*(Aqre
363 \& * implementation (second NULL parameter). Any SHA256 implementation will
416 any other algorithm implementation in OpenSSL. They are implemented by