1=pod 2 3=head1 NAME 4 5EVP_sha224, 6EVP_sha256, 7EVP_sha512_224, 8EVP_sha512_256, 9EVP_sha384, 10EVP_sha512 11- SHA-2 For EVP 12 13=head1 SYNOPSIS 14 15 #include <openssl/evp.h> 16 17 const EVP_MD *EVP_sha224(void); 18 const EVP_MD *EVP_sha256(void); 19 const EVP_MD *EVP_sha512_224(void); 20 const EVP_MD *EVP_sha512_256(void); 21 const EVP_MD *EVP_sha384(void); 22 const EVP_MD *EVP_sha512(void); 23 24=head1 DESCRIPTION 25 26SHA-2 (Secure Hash Algorithm 2) is a family of cryptographic hash functions 27standardized in NIST FIPS 180-4, first published in 2001. 28 29=over 4 30 31=item EVP_sha224(), 32EVP_sha256(), 33EVP_sha512_224, 34EVP_sha512_256, 35EVP_sha384(), 36EVP_sha512() 37 38The SHA-2 SHA-224, SHA-256, SHA-512/224, SHA512/256, SHA-384 and SHA-512 39algorithms, which generate 224, 256, 224, 256, 384 and 512 bits 40respectively of output from a given input. 41 42The two algorithms: SHA-512/224 and SHA512/256 are truncated forms of the 43SHA-512 algorithm. They are distinct from SHA-224 and SHA-256 even though 44their outputs are of the same size. 45 46=back 47 48 49=head1 RETURN VALUES 50 51These functions return a B<EVP_MD> structure that contains the 52implementation of the symmetric cipher. See L<EVP_MD_meth_new(3)> for 53details of the B<EVP_MD> structure. 54 55=head1 CONFORMING TO 56 57NIST FIPS 180-4. 58 59=head1 SEE ALSO 60 61L<evp(7)>, 62L<EVP_DigestInit(3)> 63 64=head1 COPYRIGHT 65 66Copyright 2017-2018 The OpenSSL Project Authors. All Rights Reserved. 67 68Licensed under the OpenSSL license (the "License"). You may not use 69this file except in compliance with the License. You can obtain a copy 70in the file LICENSE in the source distribution or at 71L<https://www.openssl.org/source/license.html>. 72 73=cut 74 75