1*e71b7053SJung-uk Kim=pod 2*e71b7053SJung-uk Kim 3*e71b7053SJung-uk Kim=head1 NAME 4*e71b7053SJung-uk Kim 5*e71b7053SJung-uk KimEVP_sha3_224, 6*e71b7053SJung-uk KimEVP_sha3_256, 7*e71b7053SJung-uk KimEVP_sha3_384, 8*e71b7053SJung-uk KimEVP_sha3_512, 9*e71b7053SJung-uk KimEVP_shake128, 10*e71b7053SJung-uk KimEVP_shake256 11*e71b7053SJung-uk Kim- SHA-3 For EVP 12*e71b7053SJung-uk Kim 13*e71b7053SJung-uk Kim=head1 SYNOPSIS 14*e71b7053SJung-uk Kim 15*e71b7053SJung-uk Kim #include <openssl/evp.h> 16*e71b7053SJung-uk Kim 17*e71b7053SJung-uk Kim const EVP_MD *EVP_sha3_224(void); 18*e71b7053SJung-uk Kim const EVP_MD *EVP_sha3_256(void); 19*e71b7053SJung-uk Kim const EVP_MD *EVP_sha3_384(void); 20*e71b7053SJung-uk Kim const EVP_MD *EVP_sha3_512(void); 21*e71b7053SJung-uk Kim 22*e71b7053SJung-uk Kim const EVP_MD *EVP_shake128(void); 23*e71b7053SJung-uk Kim const EVP_MD *EVP_shake256(void); 24*e71b7053SJung-uk Kim 25*e71b7053SJung-uk Kim=head1 DESCRIPTION 26*e71b7053SJung-uk Kim 27*e71b7053SJung-uk KimSHA-3 (Secure Hash Algorithm 3) is a family of cryptographic hash functions 28*e71b7053SJung-uk Kimstandardized in NIST FIPS 202, first published in 2015. It is based on the 29*e71b7053SJung-uk KimKeccak algorithm. 30*e71b7053SJung-uk Kim 31*e71b7053SJung-uk Kim=over 4 32*e71b7053SJung-uk Kim 33*e71b7053SJung-uk Kim=item EVP_sha3_224(), 34*e71b7053SJung-uk KimEVP_sha3_256(), 35*e71b7053SJung-uk KimEVP_sha3_384(), 36*e71b7053SJung-uk KimEVP_sha3_512() 37*e71b7053SJung-uk Kim 38*e71b7053SJung-uk KimThe SHA-3 SHA-3-224, SHA-3-256, SHA-3-384, and SHA-3-512 algorithms 39*e71b7053SJung-uk Kimrespectively. They produce 224, 256, 384 and 512 bits of output from a given 40*e71b7053SJung-uk Kiminput. 41*e71b7053SJung-uk Kim 42*e71b7053SJung-uk Kim=item EVP_shake128(), 43*e71b7053SJung-uk KimEVP_shake256() 44*e71b7053SJung-uk Kim 45*e71b7053SJung-uk KimThe SHAKE-128 and SHAKE-256 Extendable Output Functions (XOF) that can generate 46*e71b7053SJung-uk Kima variable hash length. 47*e71b7053SJung-uk Kim 48*e71b7053SJung-uk KimSpecifically, B<EVP_shake128> provides an overall security of 128 bits, while 49*e71b7053SJung-uk KimB<EVP_shake256> provides that of 256 bits. 50*e71b7053SJung-uk Kim 51*e71b7053SJung-uk Kim=back 52*e71b7053SJung-uk Kim 53*e71b7053SJung-uk Kim 54*e71b7053SJung-uk Kim=head1 RETURN VALUES 55*e71b7053SJung-uk Kim 56*e71b7053SJung-uk KimThese functions return a B<EVP_MD> structure that contains the 57*e71b7053SJung-uk Kimimplementation of the symmetric cipher. See L<EVP_MD_meth_new(3)> for 58*e71b7053SJung-uk Kimdetails of the B<EVP_MD> structure. 59*e71b7053SJung-uk Kim 60*e71b7053SJung-uk Kim=head1 CONFORMING TO 61*e71b7053SJung-uk Kim 62*e71b7053SJung-uk KimNIST FIPS 202. 63*e71b7053SJung-uk Kim 64*e71b7053SJung-uk Kim=head1 SEE ALSO 65*e71b7053SJung-uk Kim 66*e71b7053SJung-uk KimL<evp(7)>, 67*e71b7053SJung-uk KimL<EVP_DigestInit(3)> 68*e71b7053SJung-uk Kim 69*e71b7053SJung-uk Kim=head1 COPYRIGHT 70*e71b7053SJung-uk Kim 71*e71b7053SJung-uk KimCopyright 2017 The OpenSSL Project Authors. All Rights Reserved. 72*e71b7053SJung-uk Kim 73*e71b7053SJung-uk KimLicensed under the OpenSSL license (the "License"). You may not use 74*e71b7053SJung-uk Kimthis file except in compliance with the License. You can obtain a copy 75*e71b7053SJung-uk Kimin the file LICENSE in the source distribution or at 76*e71b7053SJung-uk KimL<https://www.openssl.org/source/license.html>. 77*e71b7053SJung-uk Kim 78*e71b7053SJung-uk Kim=cut 79*e71b7053SJung-uk Kim 80