SHA-256: Difference between revisions
→{{header|V (Vlang)}}: Update code to work with V 0.4.5
(→{{header|V (Vlang)}}: Update code to work with V 0.4.5) |
|||
(21 intermediate revisions by 13 users not shown) | |||
Line 4:
Either by using a dedicated library or implementing the algorithm in your language, show that the SHA-256 digest of the string "Rosetta code" is: 764faf5c61ac315f1497f9dfa542713965b785e5cc2f707d6468d7d1124cdfcf
=={{header|AArch64 Assembly}}==
{{works with|as|Raspberry Pi 3B version Buster 64 bits <br> or android 64 bits with application Termux }}
<syntaxhighlight lang="aarch64 assembly">
/* ARM assembly AARCH64 Raspberry PI 3B */
/* program sha256_64.s */
Line 16:
.equ LGHASH, 32 // result length
/*******************************************/
Line 141 ⟶ 142:
strb w3,[x1,x2]
add x2,x2,#1 // length in bytes
str xzr,[x1,x2] // zeroes in end of array
lsl x4,x2,#3 // length in bits
addZeroes:
lsr x5,x2,#6
Line 149 ⟶ 150:
cmp x5,#56
beq storeLength // yes -> end add
add x2,x2,#1 // increment lenght bytes
add x4,x4,#8 // increment length in bits
Line 181 ⟶ 182:
ldr x1,qAdrsZoneTrav
add x2,x1,x7,lsl #6 // compute block begin indice * 4 * 16
loopPrep: // loop for expand 80 words
cmp x6,#15 //
Line 228 ⟶ 227:
/* x7 block counter */
/* x8 addresse variables a b c d e f g h */
// init variable a b c d e f g h
ldr x0,qAdrtbH
Line 322 ⟶ 319:
blt loopBlock // loop other block
100:
ldp x1,lr,[sp],16
ret
qAdrtbConstHi: .quad tbConstHi
qAdrtbConstKt: .quad tbConstKt
Line 414 ⟶ 412:
/* for this file see task include a file in language AArch64 assembly */
.include "../includeARM64.inc"
</syntaxhighlight>
{{Output}}
<pre>
Line 424 ⟶ 421:
=={{header|Ada}}==
{{libheader|CryptAda}}
<
with CryptAda.Pragmatics;
Line 457 ⟶ 454:
Ada.Text_IO.Put_Line
("""" & Text & """: " & CryptAda.Utils.Format.To_Hex_String (Hashes.Get_Bytes (Hash)));
end RC_SHA_256;</
{{out}}
<pre>"Rosetta code": 764FAF5C61AC315F1497F9DFA542713965B785E5CC2F707D6468D7D1124CDFCF</pre>
=={{header|ARM Assembly}}==
{{works with|as|Raspberry Pi}}
<syntaxhighlight lang="arm assembly">
/* ARM assembly Raspberry PI */
/* program sha256.s */
Line 839 ⟶ 836:
/***************************************************/
.include "../affichage.inc"
</syntaxhighlight>
{{Output}}
<pre>
Line 847 ⟶ 844:
=={{header|AutoHotkey}}==
Source: [https://github.com/jNizM/AutoHotkey_Scripts/tree/master/Functions/Checksums SHA-256 @github] by jNizM
<
MsgBox, % "File:`n" (file) "`n`nSHA-256:`n" FileSHA256(file)
Line 896 ⟶ 893:
StrPut(string, &data, floor(length / chrlength), encoding)
return CalcAddrHash(&data, length, algid, hash, hashlength)
}</
{{out}}
<pre>String: Rosetta code
Line 903 ⟶ 900:
=={{header|AWK}}==
Using the system function as a 'library'.
<syntaxhighlight lang="awk">{
("echo -n " $0 " | sha256sum") | getline sha;
gsub(/[^0-9a-zA-Z]/, "", sha);
print sha;
}
</syntaxhighlight>
{{out}}
<pre>764faf5c61ac315f1497f9dfa542713965b785e5cc2f707d6468d7d1124cdfcf</pre>
=={{header|
==={{header|BaCon}}===
<syntaxhighlight lang="qbasic">PRAGMA INCLUDE <openssl/sha.h>
PRAGMA LDFLAGS -lcrypto
Line 927 ⟶ 925:
NEXT
PRINT</
{{out}}
<pre>
Line 939 ⟶ 937:
</pre>
==={{header|BBC BASIC}}===
====Library====
{{works with|BBC BASIC for Windows}}
<
END
Line 966 ⟶ 964:
hash$ += RIGHT$("0" + STR$~buffer%?i%, 2)
NEXT
= hash$</
{{out}}
<pre>
764FAF5C61AC315F1497F9DFA542713965B785E5CC2F707D6468D7D1124CDFCF
</pre>
====Native====
{{works with|BBC BASIC for Windows}}
<
REM Must run in FLOAT64 mode:
Line 1,097 ⟶ 1,095:
WHILE n# > &7FFFFFFF : n# -= 2^32 : ENDWHILE
WHILE n# < &80000000 : n# += 2^32 : ENDWHILE
= n#</
{{out}}
<pre>
764FAF5C 61AC315F 1497F9DF A5427139 65B785E5 CC2F707D 6468D7D1 124CDFCF
Line 1,105 ⟶ 1,103:
=={{header|C}}==
Requires OpenSSL, compile flag: <code>-lssl -lcrypto</code>
<
#include <string.h>
#include <openssl/sha.h>
Line 1,119 ⟶ 1,117:
return 0;
}</
=={{header|C sharp}}==
<
using System.Security.Cryptography;
using System.Text;
Line 1,143 ⟶ 1,141:
}
}
}</
=={{header|C++}}==
Line 1,151 ⟶ 1,149:
Missing description how to use g++ or other program linux\windows 10
<
#include <cryptopp/filters.h>
#include <cryptopp/hex.h>
Line 1,170 ⟶ 1,168:
return 0;
}
</syntaxhighlight>
===Implementation===
<syntaxhighlight lang="c++">
#include <bit>
#include <cstdint>
#include <iostream>
#include <sstream>
#include <stdexcept>
#include <string>
#include <vector>
class SHA256 {
public:
std::string message_digest(const std::string& message) {
std::vector<int64_t> hash = { 0x6a09e667, 0xbb67ae85, 0x3c6ef372, 0xa54ff53a,
0x510e527f, 0x9b05688c, 0x1f83d9ab, 0x5be0cd19 };
const std::vector<int8_t> bytes = add_padding(message);
for ( uint64_t i = 0; i < bytes.size() / BLOCK_LENGTH; ++i ) {
std::vector<int32_t> words(BLOCK_LENGTH, 0);
for ( int32_t j = 0; j < BLOCK_LENGTH; ++j ) {
words[j / 4] |= ( bytes[i * BLOCK_LENGTH + j] & 0xff ) << ( ( 3 - j % 4 ) * 8 );
}
for ( int32_t j = 16; j < BLOCK_LENGTH; j++ ) {
words[j] = sigma(3, words[j - 2]) + words[j - 7] + sigma(2, words[j - 15]) + words[j - 16];
}
int32_t a = hash[0], b = hash[1], c = hash[2], d = hash[3],
e = hash[4], f = hash[5], g = hash[6], h = hash[7];
for ( int32_t j = 0; j < BLOCK_LENGTH; ++j ) {
int32_t t = h + sigma(1, e) + ch(e, f, g) + kk[j] + words[j];
int32_t tt = sigma(0, a) + maj(a, b, c);
h = g; g = f; f = e;
e = d + t;
d = c; c = b; b = a;
a = t + tt;
}
hash[0] += a; hash[1] += b; hash[2] += c; hash[3] += d;
hash[4] += e; hash[5] += f; hash[6] += g; hash[7] += h;
}
std::stringstream stream;
for ( int32_t i = 0; i < BLOCK_LENGTH; ++i ) {
int8_t byte_value = static_cast<int8_t>(hash[i / 8] >> ( 7 - i % 8 ) * 4);
stream << std::hex << ( byte_value & 0xf );
}
return stream.str();
}
private:
std::vector<int8_t> add_padding(const std::string& message) {
std::vector<int8_t> bytes(message.begin(), message.end());
bytes.emplace_back(static_cast<uint8_t>(0x80));
uint32_t padding = BLOCK_LENGTH - ( bytes.size() % BLOCK_LENGTH );
if ( padding < 8 ) {
padding += BLOCK_LENGTH;
}
bytes.resize(bytes.size() + padding - 8, static_cast<int8_t>(0x0));
const uint64_t bit_length = 8 * message.length();
for ( int32_t i = 7; i >= 0; --i ) {
bytes.emplace_back(static_cast<int8_t>(bit_length >> ( 8 * i )));
}
return bytes;
}
int32_t sigma(const uint32_t& group, const uint32_t& x) {
int32_t result;
switch ( group ) {
case 0 : result = std::rotr(x, 2) ^ std::rotr(x, 13) ^ std::rotr(x, 22); break;
case 1 : result = std::rotr(x, 6) ^ std::rotr(x, 11) ^ std::rotr(x, 25); break;
case 2 : result = std::rotr(x, 7) ^ std::rotr(x, 18) ^ ( x >> 3 ); break;
case 3 : result = std::rotr(x, 17) ^ std::rotr(x, 19) ^ ( x >> 10 ); break;
default : throw std::invalid_argument("Unexpected argument for sigma: " + std::to_string(group));
}
return result;
}
int32_t ch(const int32_t& x, const int32_t y, const int32_t z) {
return ( x & y ) ^ ( ~x & z );
}
int32_t maj(const int32_t& x, const int32_t y, const int32_t z) {
return ( x & y ) ^ ( x & z ) ^ ( y & z );
}
const std::vector<int64_t> kk = {
0x428a2f98, 0x71374491, 0xb5c0fbcf, 0xe9b5dba5, 0x3956c25b, 0x59f111f1, 0x923f82a4, 0xab1c5ed5,
0xd807aa98, 0x12835b01, 0x243185be, 0x550c7dc3, 0x72be5d74, 0x80deb1fe, 0x9bdc06a7, 0xc19bf174,
0xe49b69c1, 0xefbe4786, 0x0fc19dc6, 0x240ca1cc, 0x2de92c6f, 0x4a7484aa, 0x5cb0a9dc, 0x76f988da,
0x983e5152, 0xa831c66d, 0xb00327c8, 0xbf597fc7, 0xc6e00bf3, 0xd5a79147, 0x06ca6351, 0x14292967,
0x27b70a85, 0x2e1b2138, 0x4d2c6dfc, 0x53380d13, 0x650a7354, 0x766a0abb, 0x81c2c92e, 0x92722c85,
0xa2bfe8a1, 0xa81a664b, 0xc24b8b70, 0xc76c51a3, 0xd192e819, 0xd6990624, 0xf40e3585, 0x106aa070,
0x19a4c116, 0x1e376c08, 0x2748774c, 0x34b0bcb5, 0x391c0cb3, 0x4ed8aa4a, 0x5b9cca4f, 0x682e6ff3,
0x748f82ee, 0x78a5636f, 0x84c87814, 0x8cc70208, 0x90befffa, 0xa4506ceb, 0xbef9a3f7, 0xc67178f2 };
const int32_t BLOCK_LENGTH = 64;
};
int main() {
SHA256 sha256;
std::cout << sha256.message_digest("Rosetta code") << std::endl;
}
</syntaxhighlight>
{{ out }}
<pre>
764faf5c61ac315f1497f9dfa542713965b785e5cc2f707d6468d7d1124cdfcf
</pre>
=={{header|Caché ObjectScript}}==
Line 1,181 ⟶ 1,290:
=={{header|Clojure}}==
{{libheader|pandect}}
<
(sha256 "Rosetta code")</
{{Out}}
Line 1,189 ⟶ 1,298:
=={{header|Common Lisp}}==
{{libheader|Ironclad}}
<
(defun sha-256 (str)
(ironclad:byte-array-to-hex-string
Line 1,195 ⟶ 1,304:
(ironclad:ascii-string-to-byte-array str))))
(sha-256 "Rosetta code")</
{{Out}}
Line 1,201 ⟶ 1,310:
=={{header|Crystal}}==
<
puts OpenSSL::Digest.new("SHA256").update("Rosetta code")
</syntaxhighlight>
Output:
<pre>764faf5c61ac315f1497f9dfa542713965b785e5cc2f707d6468d7d1124cdfcf</pre>
Line 1,209 ⟶ 1,318:
=={{header|D}}==
===Standard Version===
<
import std.stdio, std.digest.sha;
writefln("%-(%02x%)", "Rosetta code".sha256Of);
}</
{{out}}
<pre>764faf5c61ac315f1497f9dfa542713965b785e5cc2f707d6468d7d1124cdfcf</pre>
===Simple Implementation===
<
// Translated to D language. Only lightly tested, not for serious use.
Line 1,319 ⟶ 1,428:
pure nothrow @nogc in {
assert(inBuffer.length % 64 == 0);
}
// Round functions.
static uint F1(in uint e, in uint f, in uint g) pure nothrow @safe @nogc {
Line 1,565 ⟶ 1,674:
writefln("%(%02x%)", SHA256.digest(data));
}
}</
Compile with -version=sha_256_main to run the main function.
{{out}}
<pre>764faf5c61ac315f1497f9dfa542713965b785e5cc2f707d6468d7d1124cdfcf</pre>
This is a moderately efficient implementation, about 100 MB/s on a 4096 bytes input buffer on a 32 bit system, using the ldc2 compiler. On a more modern CPU (Intel Ivy Bridge) using HyperThreading, handwritten assembly by Intel is about twice faster.
=={{header|Delphi}}==
{{libheader| System.SysUtils}}
{{libheader| DCPsha256}} Part of '''DCPcrypt Cryptographic Component Library v2.1'''[https://bitbucket.org/wpostma/dcpcrypt2010] by David Barton.
<syntaxhighlight lang="delphi">
program SHA_256;
Line 1,606 ⟶ 1,716:
end.
</syntaxhighlight>
{{out}}
<pre>
Line 1,612 ⟶ 1,722:
</pre>
=={{header|DWScript}}==
<
=={{header|Emacs Lisp}}==
<
=={{header|Erlang}}==
Line 1,627 ⟶ 1,737:
=={{header|F_Sharp|F#}}==
<
open System.Text
Line 1,635 ⟶ 1,745:
|> System.BitConverter.ToString
|> printfn "%s"
</syntaxhighlight>
{{out}}
<pre>76-4F-AF-5C-61-AC-31-5F-14-97-F9-DF-A5-42-71-39-65-B7-85-E5-CC-2F-70-7D-64-68-D7-D1-12-4C-DF-CF
Line 1,642 ⟶ 1,752:
=={{header|Factor}}==
{{works with|Factor|0.98}}
<
"Rosetta code" sha-256 checksum-bytes bytes>hex-string print</
{{out}}
<pre>
Line 1,653 ⟶ 1,763:
===GNU Forth 0.7.9 on Linux===
Uses the information from the C version on which libraries to reference.
<syntaxhighlight lang="forth">
c-library crypto
Line 1,671 ⟶ 1,781:
s" Rosetta code" 0 sha256 .digest cr
bye
</syntaxhighlight>
{{Out}}
<pre>
Line 1,685 ⟶ 1,795:
764FAF5C61AC315F1497F9DFA542713965B785E5CC2F707D6468D7D1124CDFCF rc.txt (12 bytes)</pre>
<
use kernel32
use advapi32
Line 1,780 ⟶ 1,890:
deallocate(name)
end do
end program</
=={{header|Free Pascal}}==
<
uses
Line 1,810 ⟶ 1,920:
writeln(lowerCase(output));
end.</
{{out}}
<pre>764faf5c61ac315f1497f9dfa542713965b785e5cc2f707d6468d7d1124cdfcf</pre>
=={{header|FreeBASIC}}==
<
' FIPS PUB 180-4
' compile with: fbc -s console
Line 1,947 ⟶ 2,057:
Print : Print "hit any key to end program"
Sleep
End</
{{out}}
<pre>Rosetta code => 764faf5c61ac315f1497f9dfa542713965b785e5cc2f707d6468d7d1124cdfcf</pre>
Line 1,953 ⟶ 2,063:
=={{header|Frink}}==
Frink has convenience methods to use any message hashing algorithm provided by your Java Virtual Machine. The result can be returned as a hexadecimal string, an integer, or an array of bytes.
<
{{out}}
<pre>764faf5c61ac315f1497f9dfa542713965b785e5cc2f707d6468d7d1124cdfcf</pre>
Line 1,960 ⟶ 2,070:
A SHA-256 function can be defined using the Java support library.
<
def sha256Java( message ) = map( a -> format('%02x', a), list(MessageDigest.getInstance('SHA-256').digest(message.getBytes('UTF-8'))) ).mkString()</
Here is a definition implemented as a direct translation of the pseudocode at '''[[wp:SHA-256|SHA-256]]'''.
<
//Initialize hash values
h0 = 0x6a09e667
Line 2,048 ⟶ 2,158:
// Produce the final hash value (big-endian)
map( a -> format('%08x', a.intValue()), [h0, h1, h2, h3, h4, h5, h6, h7] ).mkString()</
Here is a test comparing the two and also verifying the hash values of the empty message string.
<
println( 'FunL: "' + message + '" ~> ' + sha256(message) )
Line 2,060 ⟶ 2,170:
println( 'FunL: "' + message + '" ~> ' + sha256(message) )
println( 'Java: "' + message + '" ~> ' + sha256Java(message) )</
{{out}}
Line 2,072 ⟶ 2,182:
=={{header|Genie}}==
<
/*
SHA-256 in Genie
Line 2,086 ⟶ 2,196:
print digest
assert(digest == "764faf5c61ac315f1497f9dfa542713965b785e5cc2f707d6468d7d1124cdfcf")</
{{out}}
Line 2,095 ⟶ 2,205:
=={{header|Go}}==
<
import (
Line 2,109 ⟶ 2,219:
}
fmt.Printf("%x\n", h.Sum(nil))
}</
{{out}}
<pre>
Line 2,116 ⟶ 2,226:
=={{header|Groovy}}==
<
java.security.MessageDigest.getInstance("SHA-256").digest(text.bytes)
.collect { String.format("%02x", it) }.join('')
}</
Testing
<
=={{header|Halon}}==
<
echo sha2($var, 256);</
{{out}}
<pre>764faf5c61ac315f1497f9dfa542713965b785e5cc2f707d6468d7d1124cdfcf</pre>
=={{header|Haskell}}==
<
import Crypto.Hash.SHA256 (hash)
import Data.ByteString (unpack, pack)
Line 2,142 ⟶ 2,252:
map (fromIntegral.ord) -- to array of Word8
"Rosetta code"
</syntaxhighlight>
{{out}}
<pre style="font-size:80%">764faf5c61ac315f1497f9dfa542713965b785e5cc2f707d6468d7d1124cdfcf
Line 2,148 ⟶ 2,258:
=={{header|Haxe}}==
<
class Main {
Line 2,155 ⟶ 2,265:
Sys.println(sha256);
}
}</
{{out}}
<pre>764faf5c61ac315f1497f9dfa542713965b785e5cc2f707d6468d7d1124cdfcf</pre>
Line 2,162 ⟶ 2,272:
'''Solution:'''
From J8 the <tt>ide/qt</tt> addon provides bindings to Qt libraries that include support for various hashing algorithms including SHA-256.
<
getsha256=: 'sha256'&gethash_jqtide_</
'''Example Usage:'''
<
764faf5c61ac315f1497f9dfa542713965b785e5cc2f707d6468d7d1124cdfcf</
Note that the older version Qt4 libraries currently shipped by default on many Linux distributions don't support SHA-256. On Windows and Mac, J8 includes the later Qt5 libraries that include support for SHA-256.
Line 2,172 ⟶ 2,282:
Starting in J8.06, the sha family of hashes have built-in support.
<
<
764faf5c61ac315f1497f9dfa542713965b785e5cc2f707d6468d7d1124cdfcf</
=={{header|Java}}==
The solution to this task would be a small modification to [[MD5#Java|MD5]] (replacing "MD5" with "SHA-256" as noted [http://docs.oracle.com/javase/7/docs/technotes/guides/security/StandardNames.html#MessageDigest here]).
===Implementation===
<syntaxhighlight lang = "java">
import java.nio.charset.StandardCharsets;
import java.util.Arrays;
public final class SHA256Task {
public static void main(String[] args) {
System.out.println(SHA256.messageDigest("Rosetta code"));
}
}
final class SHA256 {
public static String messageDigest(String message) {
int[] hash = { 0x6a09e667, 0xbb67ae85, 0x3c6ef372, 0xa54ff53a,
0x510e527f, 0x9b05688c, 0x1f83d9ab, 0x5be0cd19 };
final byte[] bytes = addPadding(message);
for ( int i = 0; i < bytes.length / BLOCK_LENGTH; i++ ) {
int[] words = new int[BLOCK_LENGTH];
for ( int j = 0; j < BLOCK_LENGTH; j++ ) {
words[j / 4] |= ( bytes[i * BLOCK_LENGTH + j] & 0xff ) << ( ( 3 - j % 4 ) * 8 );
}
for ( int j = 16; j < BLOCK_LENGTH; j++ ) {
words[j] = sigma(3, words[j - 2]) + words[j - 7] + sigma(2, words[j - 15]) + words[j - 16];
}
int a = hash[0], b = hash[1], c = hash[2], d = hash[3],
e = hash[4], f = hash[5], g = hash[6], h = hash[7];
for ( int j = 0; j < BLOCK_LENGTH; j++ ) {
int t = h + sigma(1, e) + ch(e, f, g) + kk[j] + words[j];
int tt = sigma(0, a) + maj(a, b, c);
h = g; g = f; f = e;
e = d + t;
d = c; c = b; b = a;
a = t + tt;
}
hash[0] += a; hash[1] += b; hash[2] += c; hash[3] += d;
hash[4] += e; hash[5] += f; hash[6] += g; hash[7] += h;
}
StringBuilder result = new StringBuilder();
for ( int i = 0; i < BLOCK_LENGTH; i++ ) {
result.append(String.format("%1x", ( hash[i / 8] >>> ( 7 - i % 8 ) * 4 ) & 0xf ));
}
return result.toString();
}
private static byte[] addPadding(String message) {
byte[] bytes = message.getBytes(StandardCharsets.ISO_8859_1);
bytes = Arrays.copyOf(bytes, bytes.length + 1);
bytes[bytes.length - 1] = (byte) 0x80;
int padding = BLOCK_LENGTH - ( bytes.length % BLOCK_LENGTH );
if ( padding < 8 ) {
padding += BLOCK_LENGTH;
}
bytes = Arrays.copyOf(bytes, bytes.length + padding);
final long bitLength = message.length() * 8;
for ( int i = 0; i < 8; i++ ) {
bytes[bytes.length - 1 - i] = (byte) ( bitLength >>> ( 8 * i ) );
}
return bytes;
}
private static int sigma(int group, int x) {
return switch ( group ) {
case 0 -> Integer.rotateRight(x, 2) ^ Integer.rotateRight(x, 13) ^ Integer.rotateRight(x, 22);
case 1 -> Integer.rotateRight(x, 6) ^ Integer.rotateRight(x, 11) ^ Integer.rotateRight(x, 25);
case 2 -> Integer.rotateRight(x, 7) ^ Integer.rotateRight(x, 18) ^ ( x >>> 3 );
case 3 -> Integer.rotateRight(x, 17) ^ Integer.rotateRight(x, 19) ^ ( x >>> 10 );
default -> throw new AssertionError("Unexpected argument for sigma: " + group);
};
}
private static int ch(int x, int y, int z) {
return ( x & y ) ^ ( ~x & z );
}
private static int maj(int x, int y, int z) {
return ( x & y ) ^ ( x & z ) ^ ( y & z );
}
private static final int[] kk = new int[] {
0x428a2f98, 0x71374491, 0xb5c0fbcf, 0xe9b5dba5, 0x3956c25b, 0x59f111f1, 0x923f82a4, 0xab1c5ed5,
0xd807aa98, 0x12835b01, 0x243185be, 0x550c7dc3, 0x72be5d74, 0x80deb1fe, 0x9bdc06a7, 0xc19bf174,
0xe49b69c1, 0xefbe4786, 0x0fc19dc6, 0x240ca1cc, 0x2de92c6f, 0x4a7484aa, 0x5cb0a9dc, 0x76f988da,
0x983e5152, 0xa831c66d, 0xb00327c8, 0xbf597fc7, 0xc6e00bf3, 0xd5a79147, 0x06ca6351, 0x14292967,
0x27b70a85, 0x2e1b2138, 0x4d2c6dfc, 0x53380d13, 0x650a7354, 0x766a0abb, 0x81c2c92e, 0x92722c85,
0xa2bfe8a1, 0xa81a664b, 0xc24b8b70, 0xc76c51a3, 0xd192e819, 0xd6990624, 0xf40e3585, 0x106aa070,
0x19a4c116, 0x1e376c08, 0x2748774c, 0x34b0bcb5, 0x391c0cb3, 0x4ed8aa4a, 0x5b9cca4f, 0x682e6ff3,
0x748f82ee, 0x78a5636f, 0x84c87814, 0x8cc70208, 0x90befffa, 0xa4506ceb, 0xbef9a3f7, 0xc67178f2 };
private static final int BLOCK_LENGTH = 64;
}
</syntaxhighlight>
{{ out }}
<pre>
764faf5c61ac315f1497f9dfa542713965b785e5cc2f707d6468d7d1124cdfcf
</pre>
=={{header|JavaScript}}==
<
const crypto = require('crypto');
Line 2,188 ⟶ 2,405:
console.log(hash);
</syntaxhighlight>
{{out}}
<pre>
Line 2,195 ⟶ 2,412:
=={{header|Jsish}}==
<
var str = 'Rosetta code';
puts(Util.hash(str, {type:'sha256'}));
Line 2,203 ⟶ 2,420:
764faf5c61ac315f1497f9dfa542713965b785e5cc2f707d6468d7d1124cdfcf
=!EXPECTEND!=
*/</
{{out}}
Line 2,214 ⟶ 2,431:
{{works with|Julia|0.6}}
<
using Nettle
Line 2,223 ⟶ 2,440:
digest1 = join(num2hex.(sha256(msg)))
@assert digest == digest1</
=={{header|Kotlin}}==
<
import java.security.MessageDigest
Line 2,237 ⟶ 2,454:
for (byte in digest) print("%02x".format(byte))
println()
}</
{{out}}
Line 2,251 ⟶ 2,468:
Use the cipher_list method to view these algorithms.
<
// algorithms supported by the installation of Lasso
cipher_list
Line 2,261 ⟶ 2,478:
// return the SHA-256 digest. Dependant on SHA-256 being an available digest method
cipher_digest('Rosetta Code', -digest='SHA-256',-hex=true)
</syntaxhighlight>
=={{header|Lua}}==
Line 2,268 ⟶ 2,485:
{{libheader|sha2}} ([http://code.google.com/p/sha2/ luarocks install sha2])
<
require "sha2"
print(sha2.sha256hex("Rosetta code"))</
{{out}}
Line 2,278 ⟶ 2,495:
=={{header|Mathematica}}/{{header|Wolfram Language}}==
<syntaxhighlight lang="text">Hash["Rosetta code","SHA256","HexString"]</
{{out}}
<pre>764faf5c61ac315f1497f9dfa542713965b785e5cc2f707d6468d7d1124cdfcf</pre>
Line 2,284 ⟶ 2,501:
=={{header|min}}==
{{works with|min|0.19.6}}
<
{{out}}
<pre>
Line 2,292 ⟶ 2,509:
=={{header|NetRexx}}==
This solution is basically the same as that for [[MD5#NetRExx|MD5]], substituting "SHA-256" for "MD5" as the algorithm to use in the <tt>MessageDigest</tt> instance.
<
options replace format comments java crossref savelog symbols binary
Line 2,342 ⟶ 2,559:
return digestSum
</syntaxhighlight>
'''Output:'''
<pre>
Line 2,351 ⟶ 2,568:
=={{header|NewLISP}}==
<
;; (import native functions from the crypto library, provided by OpenSSL)
(module "crypto.lsp")
(crypto:sha256 "Rosetta Code")</
=={{header|Nim}}==
Line 2,360 ⟶ 2,577:
Using the third party library <code>nimcrypto</code>, the program is very simple:
<
echo sha256.digest("Rosetta code")</
{{out}}
Line 2,371 ⟶ 2,588:
{{libheader|OpenSSL}}
<
const SHA256Len = 32
Line 2,383 ⟶ 2,600:
result.add s[i].BiggestInt.toHex(2).toLower
echo SHA256("Rosetta code")</
{{out}}
Line 2,390 ⟶ 2,607:
=={{header|Oberon-2}}==
{{works with|oo2c}}{{libheader|crypto}}
<
MODULE SHA256;
IMPORT
Line 2,409 ⟶ 2,626:
Out.String("SHA256: ");Utils.PrintHex(str,0,h.size);Out.Ln
END SHA256.
</syntaxhighlight>
{{out}}
<pre>
Line 2,418 ⟶ 2,635:
=={{header|Objeck}}==
<syntaxhighlight lang="objeck">
class ShaHash {
function : Main(args : String[]) ~ Nil {
Line 2,427 ⟶ 2,644:
}
}
</syntaxhighlight>
<pre>
764faf5c61ac315f1497f9dfa542713965b785e5cc2f707d6468d7d1124cdfcf
Line 2,439 ⟶ 2,656:
</pre>
or in XCode.
<
#import <CommonCrypto/CommonDigest.h>
Line 2,458 ⟶ 2,675:
return 0;
}
</syntaxhighlight>
=={{header|OCaml}}==
Line 2,464 ⟶ 2,681:
{{libheader|caml-sha}}
<
let s = "Rosetta code" in
let digest = Sha256.string s in
print_endline (Sha256.to_hex digest)</
Running this script in interpreted mode:
Line 2,479 ⟶ 2,696:
Apple OS X command line with echo and sha256sum.
<
Using the -n flag for echo is required as echo normally outputs a newline.
Line 2,490 ⟶ 2,707:
It works on Linux systems.
<
The code above creates a new function sha256(s) which returns SHA-256 hash of item s.
Line 2,500 ⟶ 2,717:
=={{header|Perl}}==
The preferred way to do a task like this is to use an already written module, for example:
<
use strict ;
use warnings ;
Line 2,507 ⟶ 2,724:
my $digest = sha256_hex my $phrase = "Rosetta code" ;
print "SHA-256('$phrase'): $digest\n" ;
</syntaxhighlight>
{{out}}
<pre>SHA-256('Rosetta code'): 764faf5c61ac315f1497f9dfa542713965b785e5cc2f707d6468d7d1124cdfcf
Line 2,514 ⟶ 2,731:
On the other hand, one of perl's mottos is There Is More Than One Way To Do It, so of course
you could write your own implementation if you wanted to.
<syntaxhighlight lang="perl">
package Digest::SHA256::PP;
Line 2,654 ⟶ 2,871:
1;
</syntaxhighlight>
{{out}}
<pre>
Line 2,662 ⟶ 2,879:
=={{header|Phix}}==
<!--<
<span style="color: #008080;">include</span> <span style="color: #000000;">builtins</span><span style="color: #0000FF;">\</span><span style="color: #000000;">sha256</span><span style="color: #0000FF;">.</span><span style="color: #000000;">e</span>
Line 2,674 ⟶ 2,891:
<span style="color: #0000FF;">?</span><span style="color: #000000;">asHex</span><span style="color: #0000FF;">(</span><span style="color: #000000;">sha256</span><span style="color: #0000FF;">(</span><span style="color: #008000;">"Rosetta code"</span><span style="color: #0000FF;">))</span>
<!--</
{{out}}
<pre>
Line 2,681 ⟶ 2,898:
The standard include file sha256.e is now mainly optimised inline assembly, but the following
is, I feel, more in the spirit of this site
<!--<
<span style="color: #000080;font-style:italic;">--
-- demo\rosetta\sha-256.exw
Line 2,802 ⟶ 3,019:
<span style="color: #0000FF;">?</span><span style="color: #000000;">sha256</span><span style="color: #0000FF;">(</span><span style="color: #008000;">"Rosetta code"</span><span style="color: #0000FF;">)</span>
<!--</
{{out}}
<pre>
Line 2,809 ⟶ 3,026:
=={{header|PHP}}==
<
echo hash('sha256', 'Rosetta code');
</syntaxhighlight>
{{out}}
<pre>764faf5c61ac315f1497f9dfa542713965b785e5cc2f707d6468d7d1124cdfcf</pre>
Line 2,817 ⟶ 3,034:
=={{header|PicoLisp}}==
Library and implementation.
<
(mapcar hex
'("428A2F98" "71374491" "B5C0FBCF" "E9B5DBA5" "3956C25B"
Line 2,976 ⟶ 3,193:
'(NIL (32)) ) ) ) ) )
(bye)</
=={{header|Pike}}==
<syntaxhighlight lang="pike">
string input = "Rosetta code";
string out = Crypto.SHA256.hash(input);
write( String.string2hex(out) +"\n");
</syntaxhighlight>
{{Out}}
<pre>
Line 2,991 ⟶ 3,208:
=={{header|PowerShell}}==
{{works with|PowerShell 5.0}}
<syntaxhighlight lang="powershell">
Set-Content -Value "Rosetta code" -Path C:\Colors\blue.txt -NoNewline -Force
Get-FileHash -Path C:\Colors\blue.txt -Algorithm SHA256
</syntaxhighlight>
{{out}}
<pre>
Line 3,004 ⟶ 3,221:
=={{header|PureBasic}}==
PB Version 5.40
<
bit.i= 256
Line 3,011 ⟶ 3,228:
OpenConsole()
Print("[SHA2 "+Str(bit)+" bit] Text: "+a$+" ==> "+b$)
Input()</
{{out}}
<pre>[SHA2 256 bit] Text: Rosetta code ==> 764faf5c61ac315f1497f9dfa542713965b785e5cc2f707d6468d7d1124cdfcf</pre>
Line 3,017 ⟶ 3,234:
=={{header|Python}}==
Python has a standard module for this:
<
>>> hashlib.sha256( "Rosetta code".encode() ).hexdigest()
'764faf5c61ac315f1497f9dfa542713965b785e5cc2f707d6468d7d1124cdfcf'
>>> </
=={{header|R}}==
<
library(digest)
input <- "Rosetta code"
cat(digest(input, algo = "sha256", serialize = FALSE), "\n")
</syntaxhighlight>
{{out}}
<pre>
Line 3,035 ⟶ 3,252:
=={{header|Racket}}==
<
#lang racket/base
Line 3,056 ⟶ 3,273:
;; use the defined wrapper to solve the task
(displayln (sha256 #"Rosetta code"))
</syntaxhighlight>
{{out}}
Line 3,066 ⟶ 3,283:
The following implementation takes all data as input. Ideally, input should be given lazily or something.
<syntaxhighlight lang="raku"
our proto sha256($) returns blob8 {*}
multi sha256(Str $str) { samewith $str.encode }
multi sha256(blob8 $data) {
sub rotr { $^a +> $^b +| $a +< (32 - $b) }
sub
sub
sub Maj { $^x +& $^y +^ $x +& $^z +^ $y +& $z }
sub Σ0 { rotr($^x, 2) +^ rotr($x, 13) +^ rotr($x, 22) }
sub Σ1 { rotr($^x, 6) +^ rotr($x, 11) +^ rotr($x, 25) }
sub σ0 { rotr($^x, 7) +^ rotr($x, 18) +^ $x +> 3 }
sub σ1 { rotr($^x, 17) +^ rotr($x, 19) +^ $x +> 10 }
return blob8.new:
map |*.polymod(256 xx 3).reverse,
|reduce -> $H, $block {
blob32.new: $H[] Z+
reduce -> $h, $j {
my uint32 ($T1, $T2) =
$h[7] + Σ1($h[4]) + Ch(|$h[4..6])
+ (BEGIN init(* **(1/3))[^64])[$j] +
(
(state buf32 $w .= new)[$j] = $j < 16 ?? $block[$j] !!
σ0($w[$j-15]) + $w[$j-7] + σ1($w[$j-2]) + $w[$j-16]
),
Σ0($h[0]) +
blob32.new: $T1 + $T2,
},
},
(BEGIN init(&sqrt)[^8]),
|blob32.new(
blob8.new(
@$data,
0x80,
0 xx (-($data + 1
(8*$data).polymod(256 xx 7).reverse
).rotor(4)
.map: {
).rotor(16)
}</syntaxhighlight>
{{out}}
<pre>
===
<syntaxhighlight lang="raku"
# If you want a string
Line 3,120 ⟶ 3,335:
# If you want a binary Blob
say sha256 'Rosetta code';</
{{out}}
<pre>764faf5c61ac315f1497f9dfa542713965b785e5cc2f707d6468d7d1124cdfcf
Line 3,126 ⟶ 3,341:
=={{header|Ring}}==
<
# Project: SHA-256
Line 3,134 ⟶ 3,349:
see "SHA-256: "
see sha256(str) + nl
</syntaxhighlight>
Output:
<pre>
Line 3,142 ⟶ 3,357:
=={{header|Ruby}}==
<
puts Digest::SHA256.hexdigest('Rosetta code')</
=={{header|Rust}}==
=== Library ===
<syntaxhighlight lang="rust">use sha2::{Digest, Sha256};
fn hex_string(input: &[u8]) -> String {
Line 3,171 ⟶ 3,388:
println!("{}", hex);
}
</syntaxhighlight>
{{out}}
<pre>
764faf5c61ac315f1497f9dfa542713965b785e5cc2f707d6468d7d1124cdfcf
</pre>
=== Pure Rust ===
<syntaxhighlight lang="rust">const HASH_VALUES: [u32; 8] = [
0x6a09e667, 0xbb67ae85, 0x3c6ef372, 0xa54ff53a, 0x510e527f, 0x9b05688c, 0x1f83d9ab, 0x5be0cd19,
];
const ROUND_CONSTANTS: [u32; 64] = [
0x428a2f98, 0x71374491, 0xb5c0fbcf, 0xe9b5dba5, 0x3956c25b, 0x59f111f1, 0x923f82a4, 0xab1c5ed5,
0xd807aa98, 0x12835b01, 0x243185be, 0x550c7dc3, 0x72be5d74, 0x80deb1fe, 0x9bdc06a7, 0xc19bf174,
0xe49b69c1, 0xefbe4786, 0x0fc19dc6, 0x240ca1cc, 0x2de92c6f, 0x4a7484aa, 0x5cb0a9dc, 0x76f988da,
0x983e5152, 0xa831c66d, 0xb00327c8, 0xbf597fc7, 0xc6e00bf3, 0xd5a79147, 0x06ca6351, 0x14292967,
0x27b70a85, 0x2e1b2138, 0x4d2c6dfc, 0x53380d13, 0x650a7354, 0x766a0abb, 0x81c2c92e, 0x92722c85,
0xa2bfe8a1, 0xa81a664b, 0xc24b8b70, 0xc76c51a3, 0xd192e819, 0xd6990624, 0xf40e3585, 0x106aa070,
0x19a4c116, 0x1e376c08, 0x2748774c, 0x34b0bcb5, 0x391c0cb3, 0x4ed8aa4a, 0x5b9cca4f, 0x682e6ff3,
0x748f82ee, 0x78a5636f, 0x84c87814, 0x8cc70208, 0x90befffa, 0xa4506ceb, 0xbef9a3f7, 0xc67178f2,
];
const INPUT: &str = "Rosetta code";
fn main() {
let mut bytes = INPUT.as_bytes().to_vec();
let mut hash_values = HASH_VALUES.to_vec();
let input_len = bytes.len(); // Bytes
let input_len_byte = (input_len * 8).to_be_bytes(); // Bits
let padding = ((64 * ((input_len + 72) / 64)) - input_len) - 9; // Bytes
bytes.push(128);
bytes.append(&mut vec![0; padding]);
bytes.extend(input_len_byte);
for byte_chunk in bytes.chunks(64) {
let mut working_hash = hash_values.clone();
let mut joined_bytes: Vec<u32> = byte_chunk
.chunks(4)
.map(|chunk| u32::from_be_bytes(chunk.try_into().unwrap()))
.collect();
joined_bytes.append(&mut vec![0; 48]);
// Message loop
for i in 16..64 {
let chunk_index_1 = joined_bytes[i - 15];
let chunk_index_2 = joined_bytes[i - 2];
let sigma_1 = chunk_index_1.rotate_right(7)
^ chunk_index_1.rotate_right(18)
^ (chunk_index_1 >> 3);
let sigma_2 = chunk_index_2.rotate_right(17)
^ chunk_index_2.rotate_right(19)
^ (chunk_index_2 >> 10);
joined_bytes[i] = joined_bytes[i - 16]
.wrapping_add(sigma_1.wrapping_add(joined_bytes[i - 7].wrapping_add(sigma_2)));
}
// Compression loop
for i in 0..64 {
let sigma_1 = working_hash[4].rotate_right(6)
^ working_hash[4].rotate_right(11)
^ working_hash[4].rotate_right(25);
let choice =
(working_hash[4] & working_hash[5]) ^ ((!working_hash[4]) & working_hash[6]);
let temp_1 = working_hash[7].wrapping_add(sigma_1.wrapping_add(
choice.wrapping_add(ROUND_CONSTANTS[i].wrapping_add(joined_bytes[i])),
));
let sigma_0 = working_hash[0].rotate_right(2)
^ working_hash[0].rotate_right(13)
^ working_hash[0].rotate_right(22);
let majority = (working_hash[0] & working_hash[1])
^ (working_hash[0] & working_hash[2])
^ (working_hash[1] & working_hash[2]);
let temp_2 = sigma_0.wrapping_add(majority);
working_hash.pop();
working_hash.insert(0, temp_1.wrapping_add(temp_2));
working_hash[4] = working_hash[4].wrapping_add(temp_1);
}
hash_values = hash_values
.iter()
.zip(working_hash)
.map(|(hv1, hv2)| hv1.wrapping_add(hv2))
.collect();
}
let output: String = hash_values
.iter()
.map(|val| format!("{:08x}", val))
.collect::<Vec<String>>()
.join("");
assert_eq!(
output,
"764faf5c61ac315f1497f9dfa542713965b785e5cc2f707d6468d7d1124cdfcf"
);
println!("{}", output);
}
</syntaxhighlight>
{{out}}
Line 3,179 ⟶ 3,507:
=={{header|Scala}}==
{{libheader|Scala}}<
def MD5(s: String): String = {
Line 3,189 ⟶ 3,517:
assert(MD5("Rosetta code") == "764faf5c61ac315f1497f9dfa542713965b785e5cc2f707d6468d7d1124cdfcf")
println("Successfully completed without errors.")
}</
=={{header|Seed7}}==
<
include "msgdigest.s7i";
Line 3,198 ⟶ 3,526:
begin
writeln(hex(sha256("Rosetta code")));
end func;</
{{out}}
Line 3,206 ⟶ 3,534:
=={{header|Sidef}}==
<
say sha.sha256_hex('Rosetta code');</
{{out}}
<pre>764faf5c61ac315f1497f9dfa542713965b785e5cc2f707d6468d7d1124cdfcf</pre>
=={{header|Slope}}==
<syntaxhighlight lang="slope">(display (string->sha256 "Rosetta code"))</syntaxhighlight>
{{out}}
<pre>764faf5c61ac315f1497f9dfa542713965b785e5cc2f707d6468d7d1124cdfcf</pre>
Line 3,214 ⟶ 3,547:
Use the [http://smalltalkhub.com/#!/~Cryptography/Cryptography Cryptography] library:
<
(SHA256 new hashStream: 'Rosetta code' readStream) hex.
</syntaxhighlight>
=={{header|Tcl}}==
<
puts [sha2::sha256 -hex "Rosetta code"]</
{{out}}
<pre>764faf5c61ac315f1497f9dfa542713965b785e5cc2f707d6468d7d1124cdfcf</pre>
=={{header|TXR}}==
<pre>1> (sha256 "Rosetta code")
#b'764faf5c61ac315f 1497f9dfa5427139 65b785e5cc2f707d 6468d7d1124cdfcf'</pre>
=={{header|V (Vlang)}}==
<syntaxhighlight lang="v (vlang)">
import crypto.sha256
fn main() {
println('${sha256.hexhash('Rosetta code')}')
mut h := sha256.new()
h.write('Rosetta code'.bytes())!
println('${h.sum([]u8{}).hex()}')
}
</syntaxhighlight>
{{out}}
<pre>764faf5c61ac315f1497f9dfa542713965b785e5cc2f707d6468d7d1124cdfcf
764faf5c61ac315f1497f9dfa542713965b785e5cc2f707d6468d7d1124cdfcf
</pre>
=={{header|Wren}}==
{{libheader|Wren-crypto}}
{{libheader|Wren-fmt}}
<
import "./fmt" for Fmt
var strings = [
Line 3,247 ⟶ 3,603:
var hash = Sha256.digest(s)
Fmt.print("$s <== '$0s'", hash, s)
}</
{{out}}
Line 3,265 ⟶ 3,621:
=={{header|zkl}}==
Uses shared library zklMsgHash.so
<
MsgHash.SHA256("Rosetta code")=="764faf5c61ac315f1497f9dfa542713965b785e5cc2f707d6468d7d1124cdfcf"</
{{out}}
<pre>True</pre>
|