SHA256_DIGEST_LENGTH
if (output->length != SHA256_DIGEST_LENGTH)
SHA256_DIGEST_LENGTH,
SHA256_DIGEST_LENGTH,
SHA256Final(u_int8_t digest[SHA256_DIGEST_LENGTH], SHA2_CTX *context)
memcpy(digest, context->state.st32, SHA256_DIGEST_LENGTH);
void SHA256Final(u_int8_t [SHA256_DIGEST_LENGTH], SHA2_CTX *)
__attribute__((__bounded__(__minbytes__,1,SHA256_DIGEST_LENGTH)));
#define SHA256_DIGEST_STRING_LENGTH (SHA256_DIGEST_LENGTH * 2 + 1)
uint8_t apphash[SHA256_DIGEST_LENGTH];
uint8_t sighash[SHA256_DIGEST_LENGTH];
if (message_len != SHA256_DIGEST_LENGTH) {
uint8_t apphash[SHA256_DIGEST_LENGTH];
sizeof(counter) + SHA256_DIGEST_LENGTH];
if (message_len != SHA256_DIGEST_LENGTH) {
unsigned char md[SHA256_DIGEST_LENGTH] = { 0 };
size_t md_len = SHA256_DIGEST_LENGTH;
unsigned char md[SHA256_DIGEST_LENGTH] = { 0 };
size_t md_len = SHA256_DIGEST_LENGTH;
unsigned char md[SHA256_DIGEST_LENGTH];
size_t md_len = SHA256_DIGEST_LENGTH;
memset(md, 0, SHA256_DIGEST_LENGTH);
memset(md, 0, SHA256_DIGEST_LENGTH);
if (*hash != NULL && *hash_len >= SHA256_DIGEST_LENGTH) {
md = OPENSSL_malloc(SHA256_DIGEST_LENGTH);
*hash_len = SHA256_DIGEST_LENGTH;
else if (len != ((plen + SHA256_DIGEST_LENGTH + AES_BLOCK_SIZE) & -AES_BLOCK_SIZE))
SHA256_Update(&key->md, out + plen, SHA256_DIGEST_LENGTH);
plen += SHA256_DIGEST_LENGTH;
unsigned int u[SHA256_DIGEST_LENGTH / sizeof(unsigned int)];
unsigned char c[64 + SHA256_DIGEST_LENGTH];
if (len < (iv + SHA256_DIGEST_LENGTH + 1))
maxpad = len - (SHA256_DIGEST_LENGTH + 1);
inp_len = len - (SHA256_DIGEST_LENGTH + pad + 1);
len -= SHA256_DIGEST_LENGTH; /* amend mac */
len += SHA256_DIGEST_LENGTH;
SHA256_Update(&key->md, pmac->c, SHA256_DIGEST_LENGTH);
unsigned char *p = out + len - 1 - maxpad - SHA256_DIGEST_LENGTH;
for (res = 0, i = 0, j = 0; j < maxpad + SHA256_DIGEST_LENGTH;
cmask = ((int)(j - off - SHA256_DIGEST_LENGTH)) >> (sizeof(int) * 8 - 1);
for (res = 0, i = 0; i < SHA256_DIGEST_LENGTH; i++)
return (int)(((len + SHA256_DIGEST_LENGTH + AES_BLOCK_SIZE) & -AES_BLOCK_SIZE)
return SHA256_DIGEST_LENGTH;
SHA256_DIGEST_LENGTH,
SHA256_DIGEST_LENGTH,
N = (L >= 2048 ? SHA256_DIGEST_LENGTH : SHA_DIGEST_LENGTH) * 8;
unsigned char seed[SHA256_DIGEST_LENGTH];
unsigned char buf[SHA256_DIGEST_LENGTH];
N = (L >= 2048 ? SHA256_DIGEST_LENGTH : SHA_DIGEST_LENGTH) * 8;
&& qsize != SHA256_DIGEST_LENGTH) {
res_len = SHA256_DIGEST_LENGTH;
{ OSSL_HPKE_KDF_ID_HKDF_SHA256, LN_sha256, SHA256_DIGEST_LENGTH },
LN_sha256, SHA256_DIGEST_LENGTH, 65, 65, 32, 0xFF },
LN_sha256, SHA256_DIGEST_LENGTH,
unsigned int md_len = SHA256_DIGEST_LENGTH;
unsigned char d_hash[SHA256_DIGEST_LENGTH] = { 0 };
md_len = SHA256_DIGEST_LENGTH;
unsigned char kdk[SHA256_DIGEST_LENGTH] = { 0 };
unsigned char hmac_out[SHA256_DIGEST_LENGTH];
if (HMAC_Init_ex(hmac, kdk, SHA256_DIGEST_LENGTH, md, NULL) <= 0) {
for (pos = 0; pos < tlen; pos += SHA256_DIGEST_LENGTH, iter++) {
md_len = SHA256_DIGEST_LENGTH;
if (pos + SHA256_DIGEST_LENGTH > tlen) {
ENCODE_DIGESTINFO_SHA(sha256, 0x01, SHA256_DIGEST_LENGTH)
ENCODE_DIGESTINFO_SHA(sha512_256, 0x06, SHA256_DIGEST_LENGTH)
ENCODE_DIGESTINFO_SHA(sha3_256, 0x08, SHA256_DIGEST_LENGTH)
MD_NID_CASE(sha256, SHA256_DIGEST_LENGTH)
MD_NID_CASE(sha512_256, SHA256_DIGEST_LENGTH)
MD_NID_CASE(sha3_256, SHA256_DIGEST_LENGTH)
static unsigned char m[SHA256_DIGEST_LENGTH];
case SHA256_DIGEST_LENGTH: \
for (nn = 0; nn < SHA256_DIGEST_LENGTH / 4; nn++) { \
if ((c)->md_len > SHA256_DIGEST_LENGTH) \
c->md_len = SHA256_DIGEST_LENGTH;
c->md_len = SHA256_DIGEST_LENGTH;
case SHA256_DIGEST_LENGTH:
for (n = 0; n < SHA256_DIGEST_LENGTH / 8; n++) {
|| !EVP_MD_meth_set_result_size(md, SHA256_DIGEST_LENGTH)
fill_known_data(md, SHA256_DIGEST_LENGTH);
#define CT_V1_HASHLEN SHA256_DIGEST_LENGTH
else if (len != ((plen + SHA256_DIGEST_LENGTH + AES_BLOCK_SIZE) & -AES_BLOCK_SIZE))
sha256_update(&sctx->md, out + plen, SHA256_DIGEST_LENGTH);
plen += SHA256_DIGEST_LENGTH;
unsigned int u[SHA256_DIGEST_LENGTH / sizeof(unsigned int)];
unsigned char c[64 + SHA256_DIGEST_LENGTH];
if (len < (iv + SHA256_DIGEST_LENGTH + 1))
maxpad = len - (SHA256_DIGEST_LENGTH + 1);
inp_len = len - (SHA256_DIGEST_LENGTH + pad + 1);
len -= SHA256_DIGEST_LENGTH; /* amend mac */
len += SHA256_DIGEST_LENGTH;
sha256_update(&sctx->md, pmac->c, SHA256_DIGEST_LENGTH);
unsigned char *p = out + len - 1 - maxpad - SHA256_DIGEST_LENGTH;
j < maxpad + SHA256_DIGEST_LENGTH;
cmask = ((int)(j - off - SHA256_DIGEST_LENGTH)) >> (sizeof(int) * 8 - 1);
vctx->removetlsfixed = SHA256_DIGEST_LENGTH + AES_BLOCK_SIZE;
ctx->tls_aad_pad = (int)(((len + SHA256_DIGEST_LENGTH + AES_BLOCK_SIZE) & -AES_BLOCK_SIZE)
ctx->tls_aad_pad = SHA256_DIGEST_LENGTH;
SHA256_CBLOCK, SHA256_DIGEST_LENGTH, SHA2_FLAGS,
SHA512_CBLOCK, SHA256_DIGEST_LENGTH, SHA2_FLAGS,
unsigned char mac[SHA256_DIGEST_LENGTH];
unsigned char cookie_hmac_key[SHA256_DIGEST_LENGTH];
unsigned char hmac[SHA256_DIGEST_LENGTH];
if (rawlen < SHA256_DIGEST_LENGTH
|| !PACKET_forward(&raw, rawlen - SHA256_DIGEST_LENGTH)) {
hmaclen = SHA256_DIGEST_LENGTH;
rawlen - SHA256_DIGEST_LENGTH)
|| hmaclen != SHA256_DIGEST_LENGTH) {
if (CRYPTO_memcmp(hmac, mdin, SHA256_DIGEST_LENGTH) != 0) {
|| PACKET_remaining(&cookie) != SHA256_DIGEST_LENGTH) {
|| !WPACKET_reserve_bytes(pkt, SHA256_DIGEST_LENGTH, &hmac)) {
hmaclen = SHA256_DIGEST_LENGTH;
if (!ossl_assert(totcookielen <= MAX_COOKIE_SIZE - SHA256_DIGEST_LENGTH)) {
+ SSL_COOKIE_LENGTH + SHA256_DIGEST_LENGTH)
&& TEST_int_eq(EVP_MD_get_size(md), SHA256_DIGEST_LENGTH)
unsigned char out[SHA256_DIGEST_LENGTH];
|| !TEST_mem_eq(out, SHA256_DIGEST_LENGTH, exptd,
SHA256_DIGEST_LENGTH)
|| !TEST_size_t_eq(sz, expand_only ? SHA256_DIGEST_LENGTH : SIZE_MAX))
|| !TEST_size_t_eq(len, SHA256_DIGEST_LENGTH)
|| !TEST_size_t_eq(dlen, SHA256_DIGEST_LENGTH))
} else if (mdsize == SHA256_DIGEST_LENGTH) {
static const unsigned char output[SHA256_DIGEST_LENGTH] = {
return test_static_sha_common("abc", SHA256_DIGEST_LENGTH, output, &SHA256);
: SHA256_DIGEST_LENGTH)))
#define MAX_HASH_SIZE SHA256_DIGEST_LENGTH
*hsizep = SHA256_DIGEST_LENGTH;
#ifndef SHA256_DIGEST_LENGTH
{ "sha256", SHA256_DIGEST_LENGTH },
c->md_len = SHA256_DIGEST_LENGTH;
case SHA256_DIGEST_LENGTH: \
for (nn=0; nn < SHA256_DIGEST_LENGTH / 4; nn++) \
case SHA256_DIGEST_LENGTH:
for (n = 0; n < SHA256_DIGEST_LENGTH / 8; n++) {
#define SHA256_DIGEST_STRING_LENGTH (SHA256_DIGEST_LENGTH * 2 + 1)
void SHA256_Final(unsigned char [__min_size(SHA256_DIGEST_LENGTH)],
SHA256_Final(unsigned char digest[static SHA256_DIGEST_LENGTH], SHA256_CTX *ctx)
be32enc_vect(digest, ctx->state, SHA256_DIGEST_LENGTH);
bcopy(&ctx, out, SHA256_DIGEST_LENGTH);
bcopy(&ctx, out, SHA256_DIGEST_LENGTH);
#define G_ELI_AUTH_SECKEYLEN SHA256_DIGEST_LENGTH
u_char hash[SHA256_DIGEST_LENGTH];
uint8_t hash[SHA256_DIGEST_LENGTH];
_Static_assert(sizeof(key) == SHA256_DIGEST_LENGTH,
uint8_t digest[SHA256_DIGEST_LENGTH];
MAC_VERIEXEC_FPMOD(SHA256, SHA256_DIGEST_LENGTH, sizeof(SHA256_CTX),
unsigned char hash[SHA256_DIGEST_LENGTH];
return (memcmp(expected_hash, hash, SHA256_DIGEST_LENGTH));
if (strlen(manifest_hash) != 2 * SHA256_DIGEST_LENGTH)
{"sha256=", SHA256_DIGEST_LENGTH},