Security

Hash

 * SHA-2 (256, 384, 512 output bits)
 * SHA-3 (256, 384, 512 output bits)
 * CRC-32
 * CRC-64

Symmetric

 * Algorithms (Key Size 128, 192, 256 bits)
 * AES
 * Serpent
 * Twofish
 * Camellia
 * ChaCha20


 * Modes
 * CBC
 * GCM
 * CCM

Asymetric (Public-key cryptography)

 * RSA (Key Size 2048, 3072, 4096, 8192)
 * ECC (Elliptic-curve cryptography)
 * ECDSA (Elliptic Curve Digital Signature Algorithm)
 * NIST P-256 Not safe!
 * NIST P-384 Not safe!
 * NIST P-521
 * EdSA (Edwards-curve Digital Signature Algorithm)
 * Ed25519 (Curve25519)
 * Ed41417
 * Ed448
 * Ed521

MAC (Message authentication code)

 * CMAC (Cipher-based Message Authentication Code)
 * GMAC (Galois Message Authentication Code) (2008)
 * HMAC (Hash-based message authentication code))
 * SHA-2 (256, 384, 512 output bits)
 * SHA-3 (256, 384, 512 output bits) (2015)
 * Poly1305 (2018)

Key Exchange

 * DH (Diffie–Hellman)
 * ECDH (Elliptic-curve Diffie–Hellman)
 * ECDHE (Elliptic Curve Ephemeral Diffie Hellman)

Key Derivation

 * PBKDF2 (2017)
 * Balloon (2016)
 * Argon2 (2015)
 * Lyra2 (2015)
 * Scrypt (2009)
 * bcrypt (1999)

Random number generator

 * Hardware/True random number generator
 * Pseudorandom/deterministic random number generator

Other

 * X.509 certificate read and write - PEM and DER formats
 * CSR (PKCS #10) writing in PEM and DER formats
 * RSA private and public key writing in PEM and DER formats
 * ECC private and public key writing in PEM and DER formats

TLS v1.3
  

AEAD (Authenticated Encryption with Associated Data):
 * TLS13-CHACHA20-POLY1305-SHA256
 * TLS13-AES-256-GCM-SHA384
 * TLS13-AES-128-GCM-SHA256

TLS v1.2
   


 * ECDHE-ECDSA-CHACHA20-POLY1305-SHA256
 * ECDHE-ECDSA-CHACHA20-POLY1305
 * ECDHE-ECDSA-AES256-SHA384
 * ECDHE-ECDSA-AES128-SHA256
 * ECDHE-RSA-CHACHA20-POLY1305