For use where the HSM does not provide an out-of-the-box version of some cryptographic operation, for example the upcoming Post-quantum algorithms, or various (regional) nonstandard hashing or encrypting mechanisms, these can be coded up and loaded onto the HSM, for use by host-side applications.