1*e71b7053SJung-uk Kim=pod
2*e71b7053SJung-uk Kim
3*e71b7053SJung-uk Kim=head1 NAME
4*e71b7053SJung-uk Kim
5*e71b7053SJung-uk KimEVP_sha3_224,
6*e71b7053SJung-uk KimEVP_sha3_256,
7*e71b7053SJung-uk KimEVP_sha3_384,
8*e71b7053SJung-uk KimEVP_sha3_512,
9*e71b7053SJung-uk KimEVP_shake128,
10*e71b7053SJung-uk KimEVP_shake256
11*e71b7053SJung-uk Kim- SHA-3 For EVP
12*e71b7053SJung-uk Kim
13*e71b7053SJung-uk Kim=head1 SYNOPSIS
14*e71b7053SJung-uk Kim
15*e71b7053SJung-uk Kim #include <openssl/evp.h>
16*e71b7053SJung-uk Kim
17*e71b7053SJung-uk Kim const EVP_MD *EVP_sha3_224(void);
18*e71b7053SJung-uk Kim const EVP_MD *EVP_sha3_256(void);
19*e71b7053SJung-uk Kim const EVP_MD *EVP_sha3_384(void);
20*e71b7053SJung-uk Kim const EVP_MD *EVP_sha3_512(void);
21*e71b7053SJung-uk Kim
22*e71b7053SJung-uk Kim const EVP_MD *EVP_shake128(void);
23*e71b7053SJung-uk Kim const EVP_MD *EVP_shake256(void);
24*e71b7053SJung-uk Kim
25*e71b7053SJung-uk Kim=head1 DESCRIPTION
26*e71b7053SJung-uk Kim
27*e71b7053SJung-uk KimSHA-3 (Secure Hash Algorithm 3) is a family of cryptographic hash functions
28*e71b7053SJung-uk Kimstandardized in NIST FIPS 202, first published in 2015. It is based on the
29*e71b7053SJung-uk KimKeccak algorithm.
30*e71b7053SJung-uk Kim
31*e71b7053SJung-uk Kim=over 4
32*e71b7053SJung-uk Kim
33*e71b7053SJung-uk Kim=item EVP_sha3_224(),
34*e71b7053SJung-uk KimEVP_sha3_256(),
35*e71b7053SJung-uk KimEVP_sha3_384(),
36*e71b7053SJung-uk KimEVP_sha3_512()
37*e71b7053SJung-uk Kim
38*e71b7053SJung-uk KimThe SHA-3 SHA-3-224, SHA-3-256, SHA-3-384, and SHA-3-512 algorithms
39*e71b7053SJung-uk Kimrespectively. They produce 224, 256, 384 and 512 bits of output from a given
40*e71b7053SJung-uk Kiminput.
41*e71b7053SJung-uk Kim
42*e71b7053SJung-uk Kim=item EVP_shake128(),
43*e71b7053SJung-uk KimEVP_shake256()
44*e71b7053SJung-uk Kim
45*e71b7053SJung-uk KimThe SHAKE-128 and SHAKE-256 Extendable Output Functions (XOF) that can generate
46*e71b7053SJung-uk Kima variable hash length.
47*e71b7053SJung-uk Kim
48*e71b7053SJung-uk KimSpecifically, B<EVP_shake128> provides an overall security of 128 bits, while
49*e71b7053SJung-uk KimB<EVP_shake256> provides that of 256 bits.
50*e71b7053SJung-uk Kim
51*e71b7053SJung-uk Kim=back
52*e71b7053SJung-uk Kim
53*e71b7053SJung-uk Kim
54*e71b7053SJung-uk Kim=head1 RETURN VALUES
55*e71b7053SJung-uk Kim
56*e71b7053SJung-uk KimThese functions return a B<EVP_MD> structure that contains the
57*e71b7053SJung-uk Kimimplementation of the symmetric cipher. See L<EVP_MD_meth_new(3)> for
58*e71b7053SJung-uk Kimdetails of the B<EVP_MD> structure.
59*e71b7053SJung-uk Kim
60*e71b7053SJung-uk Kim=head1 CONFORMING TO
61*e71b7053SJung-uk Kim
62*e71b7053SJung-uk KimNIST FIPS 202.
63*e71b7053SJung-uk Kim
64*e71b7053SJung-uk Kim=head1 SEE ALSO
65*e71b7053SJung-uk Kim
66*e71b7053SJung-uk KimL<evp(7)>,
67*e71b7053SJung-uk KimL<EVP_DigestInit(3)>
68*e71b7053SJung-uk Kim
69*e71b7053SJung-uk Kim=head1 COPYRIGHT
70*e71b7053SJung-uk Kim
71*e71b7053SJung-uk KimCopyright 2017 The OpenSSL Project Authors. All Rights Reserved.
72*e71b7053SJung-uk Kim
73*e71b7053SJung-uk KimLicensed under the OpenSSL license (the "License").  You may not use
74*e71b7053SJung-uk Kimthis file except in compliance with the License.  You can obtain a copy
75*e71b7053SJung-uk Kimin the file LICENSE in the source distribution or at
76*e71b7053SJung-uk KimL<https://www.openssl.org/source/license.html>.
77*e71b7053SJung-uk Kim
78*e71b7053SJung-uk Kim=cut
79*e71b7053SJung-uk Kim
80