OpenEdge usage
- Last Updated: February 11, 2026
- 1 minute read
- OpenEdge
- Version 13.0
- Documentation
OpenEdge provides message digest features in ABL that you can use to provide
your own data integrity tests. The most direct is the MESSAGE-DIGEST function that produces a message digest given a hashing algorithm,
data, and a hash key. This function supports the following algorithms: SHA-1, SHA-256,
SHA-512, HMAC-SHA-1, HMAC-SHA-256, HMAC-SHA-384, and HMAC-SHA-512.
OpenEdge also allows you to specify the hashing algorithm for PBE (see Password-based encryption (PBE) using a choice of message digest algorithms.
For more information, see the sections on cryptography in OpenEdge Programming Interfaces.
CAUTION: Progress Software Corporation recommends that you use the cryptographic
features of ABL only if you have a well-grounded understanding of cryptography and its
usage. Use of cryptography without the necessary preparation can result in permanent data
loss. In general, cryptography can have significant negative impact on application performance
and decrease effective data compression for data stored in a database.
OpenEdge also uses message digests and MAC keys to:
- Provide data privacy for an TLS session. For more information, see Public Key Infrastructure (PKI).
- Support security options for Java Open Clients. For more information, see Develop Java Open Clients.
- Provide enhanced source code version detection for WebClient applications. For more information, see Develop Web Clients.
- Seal audit data from unauthorized alteration. For more information, see Auditing in OpenEdge.