Next: Error Handling, Previous: Protocols and Engines, Up: Top [Contents][Index]

The crypto backends support a variety of algorithms used in public key
cryptography.^{2} The following sections list the identifiers used to denote such
an algorithm.

• Public Key Algorithms: | A list of all public key algorithms. | |

• Hash Algorithms: | A list of all hash algorithms. |

Some engines also provide symmetric only encryption; see the description of the encryption function on how to use this.