| Index Entry |   |  Section | 
 
  | 
| / |  |  | 
 | /etc/gcrypt/fips_enabled: |   | Configuration | 
 | /etc/gcrypt/hwf.deny: |   | Configuration | 
 | /etc/gcrypt/random.conf: |   | Configuration | 
 | /proc/cpuinfo: |   | Configuration | 
 | /proc/self/auxv: |   | Configuration | 
 
  | 
| 3 |  |  | 
 | 3DES: |   | Available ciphers | 
 
  | 
| A |  |  | 
 | Advanced Encryption Standard: |   | Available ciphers | 
 | AES: |   | Available ciphers | 
 | AES-Wrap mode: |   | Available cipher modes | 
 | Arcfour: |   | Available ciphers | 
 
  | 
| B |  |  | 
 | BLAKE2b-512, BLAKE2b-384, BLAKE2b-256, BLAKE2b-160: |   | Available hash algorithms | 
 | BLAKE2s-256, BLAKE2s-224, BLAKE2s-160, BLAKE2s-128: |   | Available hash algorithms | 
 | Blowfish: |   | Available ciphers | 
 | bug emulation: |   | Working with hash algorithms | 
 
  | 
| C |  |  | 
 | Camellia: |   | Available ciphers | 
 | CAST5: |   | Available ciphers | 
 | CBC, Cipher Block Chaining mode: |   | Available cipher modes | 
 | CBC-MAC: |   | Working with cipher handles | 
 | CCM, Counter with CBC-MAC mode: |   | Available cipher modes | 
 | CFB, Cipher Feedback mode: |   | Available cipher modes | 
 | ChaCha20: |   | Available ciphers | 
 | cipher text stealing: |   | Working with cipher handles | 
 | comp: |   | Cryptographic Functions | 
 | CRC32: |   | Available hash algorithms | 
 | CTR, Counter mode: |   | Available cipher modes | 
 
  | 
| D |  |  | 
 | DES: |   | Available ciphers | 
 | DES-EDE: |   | Available ciphers | 
 | Digital Encryption Standard: |   | Available ciphers | 
 | disable-jent: |   | Configuration | 
 
  | 
| E |  |  | 
 | EAX, EAX mode: |   | Available cipher modes | 
 | ECB, Electronic Codebook mode: |   | Available cipher modes | 
 | EdDSA: |   | Cryptographic Functions | 
 | error codes: |   | Error Values | 
 | error codes, list of: |   | Error Sources | 
 | error codes, list of: |   | Error Codes | 
 | error codes, printing of: |   | Error Strings | 
 | error sources: |   | Error Values | 
 | error sources, printing of: |   | Error Strings | 
 | error strings: |   | Error Strings | 
 | error values: |   | Error Values | 
 | error values, printing of: |   | Error Strings | 
 
  | 
| F |  |  | 
 | FIPS 140: |   | Enabling FIPS mode | 
 | FIPS 140: |   | Disabling FIPS mode | 
 | FIPS 186: |   | Cryptographic Functions | 
 | FIPS 186: |   | Public-Key Subsystem Architecture | 
 | FIPS 186-2: |   | Cryptographic Functions | 
 | FIPS mode: |   | Enabling FIPS mode | 
 | FIPS mode: |   | Disabling FIPS mode | 
 | fips_enabled: |   | Configuration | 
 
  | 
| G |  |  | 
 | GCM, Galois/Counter Mode: |   | Available cipher modes | 
 | GCM-SIV, GCM-SIV mode, AES-GCM-SIV: |   | Available cipher modes | 
 | GCRYPT_BARRETT: |   | Configuration | 
 | GCRYPT_RNDUNIX_DBG: |   | Configuration | 
 | GCRYPT_RNDUNIX_DBGALL: |   | Configuration | 
 | GCRYPT_RNDW32_DBG: |   | Configuration | 
 | GCRYPT_RNDW32_NOPERF: |   | Configuration | 
 | GOST 28147-89: |   | Available ciphers | 
 | GOST 28147-89 CryptoPro keymeshing: |   | Available ciphers | 
 | GPL, GNU General Public License: |   | Copying | 
 
  | 
| H |  |  | 
 | hardware features: |   | Hardware features | 
 | HAVAL: |   | Available hash algorithms | 
 | HMAC: |   | Working with hash algorithms | 
 | HMAC-BLAKE2s, HMAC-BLAKE2b: |   | Available MAC algorithms | 
 | HMAC-GOSTR-3411-94: |   | Available MAC algorithms | 
 | HMAC-MD2, HMAC-MD4, HMAC-MD5: |   | Available MAC algorithms | 
 | HMAC-RIPE-MD-160: |   | Available MAC algorithms | 
 | HMAC-SHA-1: |   | Available MAC algorithms | 
 | HMAC-SHA-224, HMAC-SHA-256, HMAC-SHA-384, HMAC-SHA-512: |   | Available MAC algorithms | 
 | HMAC-SHA-512/224, HMAC-SHA-512/256: |   | Available MAC algorithms | 
 | HMAC-SHA3-224, HMAC-SHA3-256, HMAC-SHA3-384, HMAC-SHA3-512: |   | Available MAC algorithms | 
 | HMAC-SM3: |   | Available MAC algorithms | 
 | HMAC-Stribog-256, HMAC-Stribog-512: |   | Available MAC algorithms | 
 | HMAC-TIGER1: |   | Available MAC algorithms | 
 | HMAC-Whirlpool: |   | Available MAC algorithms | 
 | HOME: |   | Configuration | 
 
  | 
| I |  |  | 
 | IDEA: |   | Available ciphers | 
 
  | 
| L |  |  | 
 | LGPL, GNU Lesser General Public License: |   | Library Copying | 
 | LIBGCRYPT_FORCE_FIPS_MODE: |   | Configuration | 
 
  | 
| M |  |  | 
 | MD2, MD4, MD5: |   | Available hash algorithms | 
 
  | 
| N |  |  | 
 | no-blinding: |   | Cryptographic Functions | 
 | no-keytest: |   | Cryptographic Functions | 
 | nocomp: |   | Cryptographic Functions | 
 
  | 
| O |  |  | 
 | OAEP: |   | Cryptographic Functions | 
 | OCB, OCB3: |   | Available cipher modes | 
 | OFB, Output Feedback mode: |   | Available cipher modes | 
 | only-urandom: |   | Configuration | 
 
  | 
| P |  |  | 
 | param: |   | Cryptographic Functions | 
 | PKCS1: |   | Cryptographic Functions | 
 | Poly1305 based AEAD mode with ChaCha20: |   | Available cipher modes | 
 | PSS: |   | Cryptographic Functions | 
 
  | 
| R |  |  | 
 | RC2: |   | Available ciphers | 
 | RC4: |   | Available ciphers | 
 | rfc-2268: |   | Available ciphers | 
 | RFC6979: |   | Cryptographic Functions | 
 | Rijndael: |   | Available ciphers | 
 | RIPE-MD-160: |   | Available hash algorithms | 
 
  | 
| S |  |  | 
 | Salsa20: |   | Available ciphers | 
 | Salsa20/12: |   | Available ciphers | 
 | Seed (cipher): |   | Available ciphers | 
 | Serpent: |   | Available ciphers | 
 | SHA-1: |   | Available hash algorithms | 
 | SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256: |   | Available hash algorithms | 
 | SHA3-224, SHA3-256, SHA3-384, SHA3-512, SHAKE128, SHAKE256: |   | Available hash algorithms | 
 | SIV, SIV mode: |   | Available cipher modes | 
 | SM3: |   | Available hash algorithms | 
 | SM4 (cipher): |   | Available ciphers | 
 | sync mode (OpenPGP): |   | Working with cipher handles | 
 
  | 
| T |  |  | 
 | TIGER, TIGER1, TIGER2: |   | Available hash algorithms | 
 | transient-key: |   | Cryptographic Functions | 
 | Triple-DES: |   | Available ciphers | 
 | Twofish: |   | Available ciphers | 
 
  | 
| W |  |  | 
 | Whirlpool: |   | Available hash algorithms | 
 
  | 
| X |  |  | 
 | X9.31: |   | Cryptographic Functions | 
 | X9.31: |   | Public-Key Subsystem Architecture | 
 | XTS, XTS mode: |   | Available cipher modes | 
 
  |