sha256.3 (6cec9cad762b6476313fb1f8e931a1647822db6b) | sha256.3 (b468a9ff1d3a70c6d14cf2b49574cbbcc60ff997) |
---|---|
1.\" 2.\" ---------------------------------------------------------------------------- 3.\" "THE BEER-WARE LICENSE" (Revision 42): 4.\" <phk@FreeBSD.org> wrote this file. As long as you retain this notice you 5.\" can do whatever you want with this stuff. If we meet some day, and you think 6.\" this stuff is worth it, you can buy me a beer in return. Poul-Henning Kamp 7.\" ---------------------------------------------------------------------------- 8.\" 9.\" From: Id: mdX.3,v 1.14 1999/02/11 20:31:49 wollman Exp 10.\" $FreeBSD$ 11.\" | 1.\" 2.\" ---------------------------------------------------------------------------- 3.\" "THE BEER-WARE LICENSE" (Revision 42): 4.\" <phk@FreeBSD.org> wrote this file. As long as you retain this notice you 5.\" can do whatever you want with this stuff. If we meet some day, and you think 6.\" this stuff is worth it, you can buy me a beer in return. Poul-Henning Kamp 7.\" ---------------------------------------------------------------------------- 8.\" 9.\" From: Id: mdX.3,v 1.14 1999/02/11 20:31:49 wollman Exp 10.\" $FreeBSD$ 11.\" |
12.Dd March 28, 2014 | 12.Dd April 26, 2016 |
13.Dt SHA256 3 14.Os 15.Sh NAME 16.Nm SHA256_Init , 17.Nm SHA256_Update , 18.Nm SHA256_Final , 19.Nm SHA256_End , 20.Nm SHA256_File , --- 97 unchanged lines hidden (view full) --- 118after use. 119If the 120.Fa buf 121argument is non-null it must point to at least 65 characters of buffer space. 122.Sh SEE ALSO 123.Xr md4 3 , 124.Xr md5 3 , 125.Xr ripemd 3 , | 13.Dt SHA256 3 14.Os 15.Sh NAME 16.Nm SHA256_Init , 17.Nm SHA256_Update , 18.Nm SHA256_Final , 19.Nm SHA256_End , 20.Nm SHA256_File , --- 97 unchanged lines hidden (view full) --- 118after use. 119If the 120.Fa buf 121argument is non-null it must point to at least 65 characters of buffer space. 122.Sh SEE ALSO 123.Xr md4 3 , 124.Xr md5 3 , 125.Xr ripemd 3 , |
126.Xr sha 3 | 126.Xr sha 3 , 127.Xr sha256 3 , 128.Xr sha512 3 , 129.Xr skein 3 |
127.Sh HISTORY 128These functions appeared in 129.Fx 6.0 . 130.Sh AUTHORS 131The core hash routines were implemented by Colin Percival based on 132the published 133.Tn FIPS 180-2 134standard. 135.Sh BUGS 136No method is known to exist which finds two files having the same hash value, 137nor to find a file with a specific hash value. 138There is on the other hand no guarantee that such a method does not exist. | 130.Sh HISTORY 131These functions appeared in 132.Fx 6.0 . 133.Sh AUTHORS 134The core hash routines were implemented by Colin Percival based on 135the published 136.Tn FIPS 180-2 137standard. 138.Sh BUGS 139No method is known to exist which finds two files having the same hash value, 140nor to find a file with a specific hash value. 141There is on the other hand no guarantee that such a method does not exist. |