Root > Reference > All Functions > SHA256Hash

Function SHA256Hash

Previous pageReturn to chapter overviewNext page   

Calculates SHA-2/SHA-256 hash.







Code (Delphi)

function SHA256Hash(

const AData: Pointer;

const ADataSize: Cardinal

): TSHA256Hash; overload;


function SHA256Hash(

const AData: RawByteString

): TSHA256Hash; overload;



AData [in]

A data to calculate hash.


ADataSize [in]

Size of AData in bytes.


Return value

SHA-256 hash of the specified AData.



SHA-2 (Secure Hash Algorithm 2) is a set of cryptographic hash functions. The SHA-2 family consists of six hash functions with digests (hash values) that are 224, 256, 384 or 512 bits: SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256. SHA-256 and SHA-512 are novel hash functions computed with 32-bit and 64-bit words, respectively. They use different shift amounts and additive constants, but their structures are otherwise virtually identical, differing only in the number of rounds.


The SHA-2 hash function is implemented in some widely used security applications and protocols, including TLS and SSL, PGP, SSH, S/MIME, and IPsec.



SHA-2 is considered to be more secure than SHA-1.


Send feedback... Build date: 2022-03-28
Last edited: 2022-03-28
The documentation team uses the feedback submitted to improve the EurekaLog documentation. We do not use your e-mail address for any other purpose. We will remove your e-mail address from our system after the issue you are reporting has been resolved. While we are working to resolve this issue, we may send you an e-mail message to request more information about your feedback. After the issues have been addressed, we may send you an email message to let you know that your feedback has been addressed.

Permanent link to this article: