skein.3 (0269ae4c19ad779b43b0d6e2416ac7386945d692) skein.3 (3d265fce43746c293ae826e9603adbfe09f93cf6)
1.\"-
2.\" Copyright (c) 2016 Allan Jude
3.\" All rights reserved.
4.\"
5.\" Redistribution and use in source and binary forms, with or without
6.\" modification, are permitted provided that the following conditions
7.\" are met:
8.\" 1. Redistributions of source code must retain the above copyright

--- 187 unchanged lines hidden (view full) ---

196.It Bq Er ENOMEM
197Insufficient storage space is available.
198.El
199.Pp
200The
201.Fn SKEIN256_File
202and
203.Fn SKEIN256_FileChunk
1.\"-
2.\" Copyright (c) 2016 Allan Jude
3.\" All rights reserved.
4.\"
5.\" Redistribution and use in source and binary forms, with or without
6.\" modification, are permitted provided that the following conditions
7.\" are met:
8.\" 1. Redistributions of source code must retain the above copyright

--- 187 unchanged lines hidden (view full) ---

196.It Bq Er ENOMEM
197Insufficient storage space is available.
198.El
199.Pp
200The
201.Fn SKEIN256_File
202and
203.Fn SKEIN256_FileChunk
204may return NULL when underlying
204may return NULL when underlying
205.Xr open 2 ,
206.Xr fstat 2 ,
207.Xr lseek 2 ,
208or
209.Xr SKEIN256_End 2
210fail.
211.Sh SEE ALSO
212.Xr md4 3 ,
213.Xr md5 3 ,
214.Xr ripemd 3 ,
215.Xr sha 3 ,
216.Xr sha256 3 ,
217.Xr sha512 3
218.Sh HISTORY
219These functions appeared in
220.Fx 11.0 .
221.Sh AUTHORS
222.An -nosplit
205.Xr open 2 ,
206.Xr fstat 2 ,
207.Xr lseek 2 ,
208or
209.Xr SKEIN256_End 2
210fail.
211.Sh SEE ALSO
212.Xr md4 3 ,
213.Xr md5 3 ,
214.Xr ripemd 3 ,
215.Xr sha 3 ,
216.Xr sha256 3 ,
217.Xr sha512 3
218.Sh HISTORY
219These functions appeared in
220.Fx 11.0 .
221.Sh AUTHORS
222.An -nosplit
223The core hash routines were imported from version 1.3 of the optimized
223The core hash routines were imported from version 1.3 of the optimized
224Skein reference implementation written by
225.An Doug Whiting
226as submitted to the NSA SHA-3 contest.
227The algorithms were developed by
224Skein reference implementation written by
225.An Doug Whiting
226as submitted to the NSA SHA-3 contest.
227The algorithms were developed by
228.An Niels Ferguson ,
228.An Niels Ferguson ,
229.An Stefan Lucks ,
229.An Stefan Lucks ,
230.An Bruce Schneier ,
231.An Doug Whiting ,
230.An Bruce Schneier ,
231.An Doug Whiting ,
232.An Mihir Bellare ,
233.An Tadayoshi Kohno ,
234.An Jon Callas,
235and
236.An Jesse Walker .
232.An Mihir Bellare ,
233.An Tadayoshi Kohno ,
234.An Jon Callas,
235and
236.An Jesse Walker .