aes
serpent
threefish
chacha
sha2_32
sha2_64
blake2
skein
keccak
gcm
ocb
chacha20poly1305
kdf2
hkdf
cmac
hmac
poly1305
siphash
pbkdf2
bcrypt
compression
# required for private key encryption
pbes2
curve25519
ecdh
ecdsa
rsa
rfc6979
eme_oaep
emsa_pssr
emsa1
auto_rng
hmac_drbg
ffi
tls
prf_tls
clmul
locking_allocator
aes_ni
aes_ssse3
serpent_simd
threefish_avx2
simd_scalar
simd_sse2
simd_altivec
rdrand_rng
system_rng
# entropy sources
beos_stats
cryptoapi_rng
darwin_secrandom
dev_random
hres_timer
proc_walk
rdrand
rdseed
win32_stats
cast
des
gost_28147
idea
idea_sse2
kasumi
lion
mars
misty1
rc2
rc4
rc5
rc6
safer
seed
tea
xtea
xtea_simd
cbc_mac
x919_mac
# MD5 and SHA1 are broken but not prohibited. They are widely in use
# in non-crypto contexts and are required by TLS currently
md2
md4
rmd128
has160
gost_3411
cfb
ecb
ofb
elgamal
rw
nr
gost_3410
emsa_x931
pbkdf1
prf_x942
x931_rng
passhash9
cryptobox
# questionable entropy sources
egd
unix_procs