The user commands encrypt, decrypt, digest, and mac are consumers of the Cryptographic Framework. The site security team should guide regular users to choose FIPS 140 algorithms of a validated key length.
For examples, see the following:
encrypt(1), decrypt(1), digest(1), and mac(1) man pages