EVP_sha256
if (!EVP_Digest(der, der_len, md, &md_len, EVP_sha256(), NULL))
if (!EVP_DigestVerifyInit(ctx, NULL, EVP_sha256(), NULL, sctx->pkey))
evpmd = EVP_sha256();
const EVP_MD *EVP_sha256(void);
.digest = EVP_sha256,
.digest = EVP_sha256,
.digest = EVP_sha256,
.digest = EVP_sha256,
.digest = EVP_sha256,
.digest = EVP_sha256,
.digest = EVP_sha256,
LCRYPTO_ALIAS(EVP_sha256);
LCRYPTO_USED(EVP_sha256);
const EVP_MD *md = EVP_sha256();
(md = EVP_sha256()) == NULL ||
if ((md = EVP_sha256()) == NULL || HMAC(md, key.ptr,
(md = EVP_sha256()) == NULL ||
(md = EVP_sha256()) == NULL ||
if ((md = EVP_sha256()) == NULL ||
if ((const_md = EVP_sha256()) == NULL ||
return ((EVP_MD *)EVP_sha256());
return EVP_sha256();
*md = EVP_sha256();
*md = EVP_sha256();
s->session->session_id, &session_id_length, EVP_sha256(), NULL)) {
.md = EVP_sha256,
.md = EVP_sha256,
.md = EVP_sha256,
.md = EVP_sha256,
16, EVP_sha256(), NULL);
sizeof(tctx->tlsext_tick_hmac_key), EVP_sha256(),
return EVP_sha256();
sess->session_id, &session_id_length, EVP_sha256(), NULL))
EVP_sha256(), NULL))
if (X509_digest(cert, EVP_sha256(), d, &dlen) != 1)
if (X509_pubkey_digest(cert, EVP_sha256(), d, &dlen) != 1)
EVP_sha256(), NULL)) {
EVP_sha256(), NULL)) {
if (EVP_PKEY_CTX_set_hkdf_md(pctx, EVP_sha256()) <= 0) {
if (EVP_PKEY_CTX_set_tls1_prf_md(pctx, EVP_sha256()) <= 0) {
.md = EVP_sha256,
EVP_sha256,
EVP_sha256,
EVP_sha256,
if (HMAC_Init_ex(ctx, NULL, 0, EVP_sha256(), NULL)) {
if (!HMAC_Init_ex(ctx, test[4].key, test[4].key_len, EVP_sha256(), NULL)) {
message, priv, EVP_sha256())) <= 0) {
md = EVP_sha256();
rc = test_sm2(test_group, EVP_sha256(),
if (!X509_sign(x, pkey, EVP_sha256()))
if (!X509_CRL_sign(xc, pkey, EVP_sha256()))
if (!X509_REQ_sign(xr, pkey, EVP_sha256()))
if ((secrets = tls13_secrets_create(EVP_sha256(), 0)) == NULL)
{ EVP_PKEY_RSA, EVP_sha256, sizeof(sha256WithRSA), sha256WithRSA, 0 },
{ EVP_PKEY_EC, EVP_sha256, sizeof(ecdsa_sha256), ecdsa_sha256, 0 },
{ EVP_PKEY_RSA, EVP_sha256, sizeof(rsapss_sha256), rsapss_sha256,
{ EVP_PKEY_RSA, EVP_sha256, sizeof(rsapss_sha256nt), rsapss_sha256nt,
md = EVP_sha256();
md = EVP_sha256();
dsa.dsa_priv = EVP_sha256(); /* XXX should be passed */
dsa.dsa_priv = EVP_sha256();
digest = EVP_sha256();
if(!sldns_digest_evp(buf, len, res, EVP_sha256()))
if(!sldns_digest_evp(buf, len, res, EVP_sha256()))
ecdsa_evp_256_md = *EVP_sha256();
*digest_type = EVP_sha256();
*digest_type = EVP_sha256();
(int) len, EVP_sha256(), NULL) == 1);
if (EVP_DigestInit(context->ctx, EVP_sha256()) != 1) {
ret |= certhash_directory(argv[i], EVP_sha256());
digest = EVP_sha256();
cfg.md = EVP_sha256();
dgst = EVP_sha256();
cfg.digest = EVP_sha256();
16, EVP_sha256(), NULL);
fdig = EVP_sha256();
md = EVP_sha256();
{ SSH_DIGEST_SHA256, "SHA256", 32, EVP_sha256 },
if (EVP_DigestVerifyInit(md_ctx, NULL, EVP_sha256(), NULL,
return EVP_sha256();
if (!EVP_Digest(thumb, strlen(thumb), dig, &digsz, EVP_sha256(),
evp_md = EVP_sha256();
if (!X509_REQ_sign(x, pkey, EVP_sha256())) {
const EVP_MD* md = EVP_sha256();
if (X509_pubkey_digest(cert, EVP_sha256(), digest, &dlen) != 1)
if (!X509_sign(cert, capkey, EVP_sha256())) {
if (!ASN1_item_digest(it, EVP_sha256(), val, hash, NULL))
if (!EVP_Digest(buf, len, filehash, NULL, EVP_sha256(), NULL))
if (!EVP_Digest(der, len, mft->mfthash, NULL, EVP_sha256(), NULL))
if (!EVP_Digest(buf, len, filehash, NULL, EVP_sha256(), NULL))
if (X509_pubkey_digest(cert, EVP_sha256(), digest, &dlen) != 1)
return EVP_sha256();
digest = EVP_sha256();
if(!sldns_digest_evp(buf, len, res, EVP_sha256()))
if(!sldns_digest_evp(buf, len, res, EVP_sha256()))
ecdsa_evp_256_md = *EVP_sha256();
*digest_type = EVP_sha256();
*digest_type = EVP_sha256();