sha256.3 (30f6269155927423eda4ed0bea2c903ef008b2d6) | sha256.3 (2768d7056727c414241ebc4b9d26e62dd5460760) |
---|---|
1.\" 2.\" ---------------------------------------------------------------------------- 3.\" "THE BEER-WARE LICENSE" (Revision 42): 4.\" <phk@FreeBSD.org> wrote this file. As long as you retain this notice you 5.\" can do whatever you want with this stuff. If we meet some day, and you think 6.\" this stuff is worth it, you can buy me a beer in return. Poul-Henning Kamp 7.\" ---------------------------------------------------------------------------- 8.\" --- 83 unchanged lines hidden (view full) --- 92which will also erase the 93.Vt SHA256_CTX . 94.Pp 95.Fn SHA256_End 96is a wrapper for 97.Fn SHA256_Final 98which converts the return value to a 65-character 99(including the terminating '\e0') | 1.\" 2.\" ---------------------------------------------------------------------------- 3.\" "THE BEER-WARE LICENSE" (Revision 42): 4.\" <phk@FreeBSD.org> wrote this file. As long as you retain this notice you 5.\" can do whatever you want with this stuff. If we meet some day, and you think 6.\" this stuff is worth it, you can buy me a beer in return. Poul-Henning Kamp 7.\" ---------------------------------------------------------------------------- 8.\" --- 83 unchanged lines hidden (view full) --- 92which will also erase the 93.Vt SHA256_CTX . 94.Pp 95.Fn SHA256_End 96is a wrapper for 97.Fn SHA256_Final 98which converts the return value to a 65-character 99(including the terminating '\e0') |
100.Tn ASCII 101string which represents the 256 bits in hexadecimal. | 100ASCII string which represents the 256 bits in hexadecimal. |
102.Pp 103.Fn SHA256_File 104calculates the digest of a file, and uses 105.Fn SHA256_End 106to return the result. 107If the file cannot be opened, a null pointer is returned. 108.Fn SHA256_FileChunk 109is similar to --- 63 unchanged lines hidden (view full) --- 173.Xr sha 3 , 174.Xr sha512 3 , 175.Xr skein 3 176.Sh HISTORY 177These functions appeared in 178.Fx 6.0 . 179.Sh AUTHORS 180The core hash routines were implemented by Colin Percival based on | 101.Pp 102.Fn SHA256_File 103calculates the digest of a file, and uses 104.Fn SHA256_End 105to return the result. 106If the file cannot be opened, a null pointer is returned. 107.Fn SHA256_FileChunk 108is similar to --- 63 unchanged lines hidden (view full) --- 172.Xr sha 3 , 173.Xr sha512 3 , 174.Xr skein 3 175.Sh HISTORY 176These functions appeared in 177.Fx 6.0 . 178.Sh AUTHORS 179The core hash routines were implemented by Colin Percival based on |
181the published 182.Tn FIPS 180-2 183standard. | 180the published FIPS 180-2 standard. |
184.Sh BUGS 185No method is known to exist which finds two files having the same hash value, 186nor to find a file with a specific hash value. 187There is on the other hand no guarantee that such a method does not exist. | 181.Sh BUGS 182No method is known to exist which finds two files having the same hash value, 183nor to find a file with a specific hash value. 184There is on the other hand no guarantee that such a method does not exist. |