--- /dev/null
+--- openssh-8.9p1/regress/misc/sk-dummy/sk-dummy.c.orig 2022-02-23 12:31:11.000000000 +0100
++++ openssh-8.9p1/regress/misc/sk-dummy/sk-dummy.c 2022-03-16 08:49:30.708560186 +0100
+@@ -326,7 +326,7 @@
+ BIO *bio = NULL;
+ EVP_PKEY *pk = NULL;
+ EC_KEY *ec = NULL;
+- SHA2_CTX ctx;
++ SHA256_CTX ctx;
+ uint8_t apphash[SHA256_DIGEST_LENGTH];
+ uint8_t sighash[SHA256_DIGEST_LENGTH];
+ uint8_t countbuf[4];
+@@ -356,9 +356,9 @@
+ }
+ /* Prepare data to be signed */
+ dump("message", message, message_len);
+- SHA256Init(&ctx);
+- SHA256Update(&ctx, (const u_char *)application, strlen(application));
+- SHA256Final(apphash, &ctx);
++ SHA256_Init(&ctx);
++ SHA256_Update(&ctx, (const u_char *)application, strlen(application));
++ SHA256_Final(apphash, &ctx);
+ dump("apphash", apphash, sizeof(apphash));
+ countbuf[0] = (counter >> 24) & 0xff;
+ countbuf[1] = (counter >> 16) & 0xff;
+@@ -366,12 +366,12 @@
+ countbuf[3] = counter & 0xff;
+ dump("countbuf", countbuf, sizeof(countbuf));
+ dump("flags", &flags, sizeof(flags));
+- SHA256Init(&ctx);
+- SHA256Update(&ctx, apphash, sizeof(apphash));
+- SHA256Update(&ctx, &flags, sizeof(flags));
+- SHA256Update(&ctx, countbuf, sizeof(countbuf));
+- SHA256Update(&ctx, message, message_len);
+- SHA256Final(sighash, &ctx);
++ SHA256_Init(&ctx);
++ SHA256_Update(&ctx, apphash, sizeof(apphash));
++ SHA256_Update(&ctx, &flags, sizeof(flags));
++ SHA256_Update(&ctx, countbuf, sizeof(countbuf));
++ SHA256_Update(&ctx, message, message_len);
++ SHA256_Final(sighash, &ctx);
+ dump("sighash", sighash, sizeof(sighash));
+ /* create and encode signature */
+ if ((sig = ECDSA_do_sign(sighash, sizeof(sighash), ec)) == NULL) {
+@@ -417,7 +417,7 @@
+ {
+ size_t o;
+ int ret = -1;
+- SHA2_CTX ctx;
++ SHA256_CTX ctx;
+ uint8_t apphash[SHA256_DIGEST_LENGTH];
+ uint8_t signbuf[sizeof(apphash) + sizeof(flags) +
+ sizeof(counter) + SHA256_DIGEST_LENGTH];
+@@ -435,9 +435,9 @@
+ }
+ /* Prepare data to be signed */
+ dump("message", message, message_len);
+- SHA256Init(&ctx);
+- SHA256Update(&ctx, (const u_char *)application, strlen(application));
+- SHA256Final(apphash, &ctx);
++ SHA256_Init(&ctx);
++ SHA256_Update(&ctx, (const u_char *)application, strlen(application));
++ SHA256_Final(apphash, &ctx);
+ dump("apphash", apphash, sizeof(apphash));
+
+ memcpy(signbuf, apphash, sizeof(apphash));
+@@ -495,7 +495,7 @@
+ {
+ struct sk_sign_response *response = NULL;
+ int ret = SSH_SK_ERR_GENERAL;
+- SHA2_CTX ctx;
++ SHA256_CTX ctx;
+ uint8_t message[32];
+
+ if (sign_response == NULL) {
+@@ -509,9 +509,9 @@
+ skdebug(__func__, "calloc response failed");
+ goto out;
+ }
+- SHA256Init(&ctx);
+- SHA256Update(&ctx, data, datalen);
+- SHA256Final(message, &ctx);
++ SHA256_Init(&ctx);
++ SHA256_Update(&ctx, data, datalen);
++ SHA256_Final(message, &ctx);
+ response->flags = flags;
+ response->counter = 0x12345678;
+ switch(alg) {