sha256.3 (30f6269155927423eda4ed0bea2c903ef008b2d6) sha256.3 (2768d7056727c414241ebc4b9d26e62dd5460760)
1.\"
2.\" ----------------------------------------------------------------------------
3.\" "THE BEER-WARE LICENSE" (Revision 42):
4.\" <phk@FreeBSD.org> wrote this file. As long as you retain this notice you
5.\" can do whatever you want with this stuff. If we meet some day, and you think
6.\" this stuff is worth it, you can buy me a beer in return. Poul-Henning Kamp
7.\" ----------------------------------------------------------------------------
8.\"

--- 83 unchanged lines hidden (view full) ---

92which will also erase the
93.Vt SHA256_CTX .
94.Pp
95.Fn SHA256_End
96is a wrapper for
97.Fn SHA256_Final
98which converts the return value to a 65-character
99(including the terminating '\e0')
1.\"
2.\" ----------------------------------------------------------------------------
3.\" "THE BEER-WARE LICENSE" (Revision 42):
4.\" <phk@FreeBSD.org> wrote this file. As long as you retain this notice you
5.\" can do whatever you want with this stuff. If we meet some day, and you think
6.\" this stuff is worth it, you can buy me a beer in return. Poul-Henning Kamp
7.\" ----------------------------------------------------------------------------
8.\"

--- 83 unchanged lines hidden (view full) ---

92which will also erase the
93.Vt SHA256_CTX .
94.Pp
95.Fn SHA256_End
96is a wrapper for
97.Fn SHA256_Final
98which converts the return value to a 65-character
99(including the terminating '\e0')
100.Tn ASCII
101string which represents the 256 bits in hexadecimal.
100ASCII string which represents the 256 bits in hexadecimal.
102.Pp
103.Fn SHA256_File
104calculates the digest of a file, and uses
105.Fn SHA256_End
106to return the result.
107If the file cannot be opened, a null pointer is returned.
108.Fn SHA256_FileChunk
109is similar to

--- 63 unchanged lines hidden (view full) ---

173.Xr sha 3 ,
174.Xr sha512 3 ,
175.Xr skein 3
176.Sh HISTORY
177These functions appeared in
178.Fx 6.0 .
179.Sh AUTHORS
180The core hash routines were implemented by Colin Percival based on
101.Pp
102.Fn SHA256_File
103calculates the digest of a file, and uses
104.Fn SHA256_End
105to return the result.
106If the file cannot be opened, a null pointer is returned.
107.Fn SHA256_FileChunk
108is similar to

--- 63 unchanged lines hidden (view full) ---

172.Xr sha 3 ,
173.Xr sha512 3 ,
174.Xr skein 3
175.Sh HISTORY
176These functions appeared in
177.Fx 6.0 .
178.Sh AUTHORS
179The core hash routines were implemented by Colin Percival based on
181the published
182.Tn FIPS 180-2
183standard.
180the published FIPS 180-2 standard.
184.Sh BUGS
185No method is known to exist which finds two files having the same hash value,
186nor to find a file with a specific hash value.
187There is on the other hand no guarantee that such a method does not exist.
181.Sh BUGS
182No method is known to exist which finds two files having the same hash value,
183nor to find a file with a specific hash value.
184There is on the other hand no guarantee that such a method does not exist.