aes
serpent
threefish
chacha
sha2_32
sha2_64
blake2
skein
keccak
sha3
gcm
ocb
chacha20poly1305
kdf2
hkdf
cmac
hmac
poly1305
siphash
pbkdf2
bcrypt
# required for private key encryption
pbes2
ed25519
curve25519
ecdh
ecdsa
rsa
rfc6979
eme_oaep
emsa_pssr
emsa1
auto_rng
hmac_drbg
ffi
tls
prf_tls
newhope
ed25519
clmul
locking_allocator
http_util # needed by x509 for OCSP online checks
aes_ni
aes_ssse3
serpent_simd
threefish_avx2
chacha_sse2
sha1_sse2
sha1_x86
sha1_armv8
sha2_32_x86
sha2_32_armv8
simd
sessions_sql
certstor_sql
rdrand_rng
system_rng
# entropy sources
darwin_secrandom
dev_random
proc_walk
rdrand
rdseed
win32_stats
# Just say no to TLS 1.0
tls_cbc
cast
des
gost_28147
idea
idea_sse2
kasumi
lion
misty1
rc4
seed
xtea
cbc_mac
x919_mac
# MD5 and SHA1 are broken but not prohibited. They are widely in use
# in non-crypto contexts and are required by TLS currently
md4
gost_3411
cfb
ofb
elgamal
gost_3410
emsa_x931
pbkdf1
prf_x942
passhash9
cryptobox