EVP_sha224.pod 1.6 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374
  1. =pod
  2. =head1 NAME
  3. EVP_sha224,
  4. EVP_sha256,
  5. EVP_sha512_224,
  6. EVP_sha512_256,
  7. EVP_sha384,
  8. EVP_sha512
  9. - SHA-2 For EVP
  10. =head1 SYNOPSIS
  11. #include <openssl/evp.h>
  12. const EVP_MD *EVP_sha224(void);
  13. const EVP_MD *EVP_sha256(void);
  14. const EVP_MD *EVP_sha512_224(void);
  15. const EVP_MD *EVP_sha512_256(void);
  16. const EVP_MD *EVP_sha384(void);
  17. const EVP_MD *EVP_sha512(void);
  18. =head1 DESCRIPTION
  19. SHA-2 (Secure Hash Algorithm 2) is a family of cryptographic hash functions
  20. standardized in NIST FIPS 180-4, first published in 2001.
  21. =over 4
  22. =item EVP_sha224(),
  23. EVP_sha256(),
  24. EVP_sha512_224,
  25. EVP_sha512_256,
  26. EVP_sha384(),
  27. EVP_sha512()
  28. The SHA-2 SHA-224, SHA-256, SHA-512/224, SHA512/256, SHA-384 and SHA-512
  29. algorithms, which generate 224, 256, 224, 256, 384 and 512 bits
  30. respectively of output from a given input.
  31. The two algorithms: SHA-512/224 and SHA512/256 are truncated forms of the
  32. SHA-512 algorithm. They are distinct from SHA-224 and SHA-256 even though
  33. their outputs are of the same size.
  34. =back
  35. =head1 RETURN VALUES
  36. These functions return a B<EVP_MD> structure that contains the
  37. implementation of the symmetric cipher. See L<EVP_MD_meth_new(3)> for
  38. details of the B<EVP_MD> structure.
  39. =head1 CONFORMING TO
  40. NIST FIPS 180-4.
  41. =head1 SEE ALSO
  42. L<evp(7)>,
  43. L<EVP_DigestInit(3)>
  44. =head1 COPYRIGHT
  45. Copyright 2017-2018 The OpenSSL Project Authors. All Rights Reserved.
  46. Licensed under the OpenSSL license (the "License"). You may not use
  47. this file except in compliance with the License. You can obtain a copy
  48. in the file LICENSE in the source distribution or at
  49. L<https://www.openssl.org/source/license.html>.
  50. =cut