SHA-2
The SHA-256 and SHA-512 functions are provided for interoperability with other applications. If you are looking for a generic hash function and not specifically SHA-2, using crypto_generichash()
(BLAKE2b) might be a better choice.
These functions are also not suitable for hashing passwords or deriving keys from passwords. Use one of the password hashing APIs instead.
These functions are not keyed and are thus deterministic. In addition, the untruncated versions are vulnerable to length extension attacks.
A message can be hashed in a single pass, but a streaming API is also available to process a message as a sequence of multiple chunks.
Single-part SHA-256 example
Multi-part SHA-256 example
Usage
SHA-256
Single-part:
Multi-part:
SHA-512
Single-part:
Multi-part:
Notes
The state must be initialized with crypto_hash_sha*_init()
before updating or finalizing it.
After crypto_hash_sha*_final()
, the state should not be used any more, unless it is reinitialized using crypto_hash_sha*_init()
.
SHA-512-256 is also available via the higher-level interface crypto_hash()
.
As an alternative to crypto_auth_hmac*()
or crypto_generichash()
, the SHA-256 and SHA-512 hash functions can be keyed, but the key must be placed after the message, after having padded the message to the block size (64 bytes for SHA-256, 128 bytes for SHA-512). Using the key as a prefix, rather than a suffix would allow for length extension attacks.
Constants
crypto_hash_sha256_BYTES
crypto_hash_sha512_BYTES
Data types
crypto_hash_sha256_state
crypto_hash_sha512_state
Last updated