OpenEdge provides message digest features in ABL that you can use to provide your own data integrity tests. The most direct is the MESSAGE-DIGEST function that produces a message digest given a hashing algorithm, data to digest, and a hash key. In addition to the common hashing algorithms noted in the previous section, this function also supports SHA-256 and SHA-512, which are respectively more complex algorithms that produce larger digests.
OpenEdge also allows you to specify the hashing algorithm for PBE (see Password-based encryption (PBE) using a choice of message digest algorithms.
For more information, see the sections on cryptography in OpenEdge Development: Programming Interfaces.
Caution: Progress Software Corporation recommends that you use the cryptographic features of ABL only if you have a well-grounded understanding of cryptography and its usage. Use of cryptography without the necessary preparation can result in permanent data loss. In general, cryptography can have significant negative impact on application performance and decrease effective data compression for data stored in a database.
OpenEdge also uses message digests and MAC keys to:
Support security options for Java Open Clients. For more information, see OpenEdge Development: Java Open Clients.
Provide enhanced source code version detection for WebClient applications. For more information, see the sections on using MD5 message digests in OpenEdge Deployment: WebClient Applications.
Seal audit data from unauthorized alteration. For more information, see Auditing in OpenEdge.