SHA384_DIGEST_LENGTH
if (output->length != SHA384_DIGEST_LENGTH)
SHA384_DIGEST_LENGTH,
memcpy(res, data, SHA384_DIGEST_LENGTH);
SHA384_DIGEST_LENGTH,
SHA384Final(u_int8_t digest[SHA384_DIGEST_LENGTH], SHA2_CTX *context)
memcpy(digest, context->state.st64, SHA384_DIGEST_LENGTH);
void SHA384Final(u_int8_t [SHA384_DIGEST_LENGTH], SHA2_CTX *)
__attribute__((__bounded__(__minbytes__,1,SHA384_DIGEST_LENGTH)));
#define SHA384_DIGEST_STRING_LENGTH (SHA384_DIGEST_LENGTH * 2 + 1)
SHA384_DIGEST_LENGTH,
res_len = SHA384_DIGEST_LENGTH;
{ OSSL_HPKE_KDF_ID_HKDF_SHA384, LN_sha384, SHA384_DIGEST_LENGTH },
LN_sha384, SHA384_DIGEST_LENGTH, 97, 97, 48, 0xFF },
ENCODE_DIGESTINFO_SHA(sha384, 0x02, SHA384_DIGEST_LENGTH)
ENCODE_DIGESTINFO_SHA(sha3_384, 0x09, SHA384_DIGEST_LENGTH)
MD_NID_CASE(sha384, SHA384_DIGEST_LENGTH)
MD_NID_CASE(sha3_384, SHA384_DIGEST_LENGTH)
static unsigned char m[SHA384_DIGEST_LENGTH];
c->md_len = SHA384_DIGEST_LENGTH;
case SHA384_DIGEST_LENGTH:
for (n = 0; n < SHA384_DIGEST_LENGTH / 8; n++) {
|| !EVP_MD_meth_set_result_size(md, SHA384_DIGEST_LENGTH)
fill_known_data(md, SHA384_DIGEST_LENGTH);
SHA512_CBLOCK, SHA384_DIGEST_LENGTH, SHA2_FLAGS,
const unsigned char key[SHA384_DIGEST_LENGTH] = {
if (mdsize == SHA384_DIGEST_LENGTH) {
clientpsk = serverpsk = create_a_psk(clientquic, SHA384_DIGEST_LENGTH);
static const unsigned char output[SHA384_DIGEST_LENGTH] = {
return test_static_sha_common("abc", SHA384_DIGEST_LENGTH, output, &SHA384);
clientpsk = serverpsk = create_a_psk(clientssl, SHA384_DIGEST_LENGTH);
SHA384_DIGEST_LENGTH))) {
SHA384_DIGEST_LENGTH)))
? SHA384_DIGEST_LENGTH
SHA384_DIGEST_LENGTH)))
SHA384_DIGEST_LENGTH)))
SHA384_DIGEST_LENGTH)))
SHA384_DIGEST_LENGTH)))
SHA384_DIGEST_LENGTH)))
&sess, idx, SHA384_DIGEST_LENGTH)))
SHA384_DIGEST_LENGTH)))
{ "sha384", SHA384_DIGEST_LENGTH },
case SHA384_DIGEST_LENGTH:
for (n = 0; n < SHA384_DIGEST_LENGTH / 8; n++) {
c->md_len = SHA384_DIGEST_LENGTH;
#define SHA384_DIGEST_STRING_LENGTH (SHA384_DIGEST_LENGTH * 2 + 1)
void SHA384_Final(unsigned char [__min_size(SHA384_DIGEST_LENGTH)],
SHA384_Final(unsigned char digest[static SHA384_DIGEST_LENGTH], SHA384_CTX *ctx)
be64enc_vect(digest, ctx->state, SHA384_DIGEST_LENGTH);
MAC_VERIEXEC_FPMOD(SHA384, SHA384_DIGEST_LENGTH, sizeof(SHA384_CTX),
#if MAXFINGERPRINTLEN >= SHA384_DIGEST_LENGTH
{"sha384=", SHA384_DIGEST_LENGTH},