Lines Matching +full:no +full:- +full:whirlpool

5 crypto - OpenSSL cryptographic library
21 pseudo-random number generators, message authentication codes (MACs), key
52 OpenSSL built-in "default" provider will be automatically loaded.
72 1.1.0) no explicit initialisation steps need to be taken.
75 automatically destroyed. No explicit de-initialisation steps need to be taken.
80 =head2 Multi-threaded applications
83 on most platforms) then most OpenSSL I<functions> are thread-safe in the sense
85 time. However most OpenSSL I<data structures> are not thread-safe. For example
97 See L<openssl-threads(7)> for a more detailed discussion on OpenSSL threading
107 Two types of fetching are supported by OpenSSL - explicit fetching and implicit
136 using C<APINAME_free> when it is no longer needed.
149 no provider has been loaded in this library context then the default provider
150 will be loaded as a fallback (see L<OSSL_PROVIDER-default(7)>).
170 OpenSSL has a number of functions that return an algorithm object with no
273 See L<OSSL_PROVIDER-default(7)>, <OSSL_PROVIDER-fips(7)> and
274 <OSSL_PROVIDER-legacy(7)>for a list of algorithm names that
282 Fetch any available implementation of SHA2-256 in the default context. Note
283 that some algorithms have aliases. So "SHA256" and "SHA2-256" are synonymous:
285 EVP_MD *md = EVP_MD_fetch(NULL, "SHA2-256", NULL);
289 Fetch any available implementation of AES-128-CBC in the default context:
291 EVP_CIPHER *cipher = EVP_CIPHER_fetch(NULL, "AES-128-CBC", NULL);
295 Fetch an implementation of SHA2-256 from the default provider in the default
298 EVP_MD *md = EVP_MD_fetch(NULL, "SHA2-256", "provider=default");
302 Fetch an implementation of SHA2-256 that is not from the default provider in the
305 EVP_MD *md = EVP_MD_fetch(NULL, "SHA2-256", "provider!=default");
309 Fetch an implementation of SHA2-256 from the default provider in the specified
312 EVP_MD *md = EVP_MD_fetch(ctx, "SHA2-256", "provider=default");
317 implementation of WHIRLPOOL from it:
319 /* This only needs to be done once - usually at application start up */
322 EVP_MD *md = EVP_MD_fetch(NULL, "WHIRLPOOL", "provider=legacy");
327 since, assuming no other providers have been loaded, the only implementation of
328 the "whirlpool" algorithm is in the "legacy" provider. Also note that the
332 /* This only needs to be done once - usually at application start up */
336 EVP_MD *md_whirlpool = EVP_MD_fetch(NULL, "whirlpool", NULL);
337 EVP_MD *md_sha256 = EVP_MD_fetch(NULL, "SHA2-256", NULL);
347 configuration options. The L<openssl-list(1)> command can be used to list the
350 The names of the algorithms shown from L<openssl-list(1)> can be used as an
371 See L<OSSL_PROVIDER-default(7)>.
385 See L<OSSL_PROVIDER-base(7)>.
392 validated according to the FIPS 140-2 standard. Should it be needed (if other
397 may also contain non-approved algorithm implementations and these can be
398 selected with the property "fips=no".
400 See L<OSSL_PROVIDER-FIPS(7)> and L<fips_module(7)>.
407 insecure, or are no longer in common use such as MD2 or RC4. Should it be needed
412 See L<OSSL_PROVIDER-legacy(7)>.
417 no algorithms in it at all. When fetching algorithms the default provider will
418 be automatically loaded if no other provider has been explicitly loaded. To
421 See L<OSSL_PROVIDER-null(7)>.
433 operation is then initialised ready for use via an "init" function - optionally
530 external format such as PEM or DER (see L<openssl-glossary(7)>). OpenSSL uses
566 L<openssl(1)>, L<ssl(7)>, L<evp(7)>, L<OSSL_LIB_CTX(3)>, L<openssl-threads(7)>,
567 L<property(7)>, L<OSSL_PROVIDER-default(7)>, L<OSSL_PROVIDER-base(7)>,
568 L<OSSL_PROVIDER-FIPS(7)>, L<OSSL_PROVIDER-legacy(7)>, L<OSSL_PROVIDER-null(7)>,
569 L<openssl-glossary(7)>, L<provider(7)>
573 Copyright 2000-2023 The OpenSSL Project Authors. All Rights Reserved.