diff --git a/404.html b/404.html index 80b323a..d7c7953 100644 --- a/404.html +++ b/404.html @@ -22,7 +22,7 @@ secretbase - 1.0.2.9000 + 1.0.3 diff --git a/CODE_OF_CONDUCT.html b/CODE_OF_CONDUCT.html index f3eebdc..74bc24c 100644 --- a/CODE_OF_CONDUCT.html +++ b/CODE_OF_CONDUCT.html @@ -7,7 +7,7 @@ secretbase - 1.0.2.9000 + 1.0.3 diff --git a/LICENSE.html b/LICENSE.html index 13fb145..ea2ec65 100644 --- a/LICENSE.html +++ b/LICENSE.html @@ -7,7 +7,7 @@ secretbase - 1.0.2.9000 + 1.0.3 diff --git a/authors.html b/authors.html index dba9fb1..e8c0ff3 100644 --- a/authors.html +++ b/authors.html @@ -7,7 +7,7 @@ secretbase - 1.0.2.9000 + 1.0.3 @@ -57,13 +57,13 @@ Citation Gao C (2024). secretbase: Cryptographic Hash, Extendable-Output and Base64 Functions. -R package version 1.0.2.9000, https://doi.org/10.5281/zenodo.10553139. +R package version 1.0.3, https://doi.org/10.5281/zenodo.10553139. @Manual{, title = {secretbase: Cryptographic Hash, Extendable-Output and Base64 Functions}, author = {Charlie Gao}, year = {2024}, - note = {R package version 1.0.2.9000}, + note = {R package version 1.0.3}, url = {https://doi.org/10.5281/zenodo.10553139}, } diff --git a/index.html b/index.html index a6c8aad..52b4e15 100644 --- a/index.html +++ b/index.html @@ -24,7 +24,7 @@ secretbase - 1.0.2.9000 + 1.0.3 @@ -78,7 +78,7 @@ Overview SHA-3 -For the SHA-3 cryptographic hash algorithm, specify bits as 224, 256, 384 or 512: +For the SHA-3 cryptographic hash algorithm, specify bits as one of 224, 256, 384 or 512: sha3("secret base") #> [1] "a721d57570e7ce366adee2fccbe9770723c6e3622549c31c7cab9dbb4a795520" @@ -119,7 +119,7 @@ Stream hash files Hash to integer / SHAKE256 XOF -May be used as deterministic random seeds for R’s pseudo random number generators (RNGs). Specify convert = NA (and bits = 32 for a single integer value): +May be used as deterministic random seeds for R’s pseudo random number generators (RNGs). Specify convert = NA and bits = 32 for a single integer value: shake256("秘密の基地の中", bits = 32L, convert = NA) #> [1] 2000208511 diff --git a/news/index.html b/news/index.html index 1f83eec..a1a6b98 100644 --- a/news/index.html +++ b/news/index.html @@ -7,7 +7,7 @@ secretbase - 1.0.2.9000 + 1.0.3 @@ -40,7 +40,7 @@ Changelog -secretbase 1.0.2.9000 (development) +secretbase 1.0.3 base64dec() now emits a suppressable warning when failing to convert back to a character string. diff --git a/pkgdown.yml b/pkgdown.yml index 51e548a..28d466c 100644 --- a/pkgdown.yml +++ b/pkgdown.yml @@ -2,7 +2,7 @@ pandoc: 3.1.11 pkgdown: 2.1.1 pkgdown_sha: ~ articles: {} -last_built: 2024-10-02T12:25Z +last_built: 2024-10-02T13:23Z urls: reference: https://shikokuchuo.net/secretbase/reference article: https://shikokuchuo.net/secretbase/articles diff --git a/reference/base64dec.html b/reference/base64dec.html index efaa5ae..f8942ab 100644 --- a/reference/base64dec.html +++ b/reference/base64dec.html @@ -7,7 +7,7 @@ secretbase - 1.0.2.9000 + 1.0.3 diff --git a/reference/base64enc.html b/reference/base64enc.html index d3add06..6f79ffc 100644 --- a/reference/base64enc.html +++ b/reference/base64enc.html @@ -7,7 +7,7 @@ secretbase - 1.0.2.9000 + 1.0.3 diff --git a/reference/index.html b/reference/index.html index 31b5716..f67668c 100644 --- a/reference/index.html +++ b/reference/index.html @@ -7,7 +7,7 @@ secretbase - 1.0.2.9000 + 1.0.3 diff --git a/reference/keccak.html b/reference/keccak.html index e9f3e52..489aba7 100644 --- a/reference/keccak.html +++ b/reference/keccak.html @@ -7,7 +7,7 @@ secretbase - 1.0.2.9000 + 1.0.3 diff --git a/reference/secretbase-package.html b/reference/secretbase-package.html index 47d291a..dace0d0 100644 --- a/reference/secretbase-package.html +++ b/reference/secretbase-package.html @@ -17,7 +17,7 @@ secretbase - 1.0.2.9000 + 1.0.3 diff --git a/reference/sha256.html b/reference/sha256.html index a3864c9..f3e0164 100644 --- a/reference/sha256.html +++ b/reference/sha256.html @@ -9,7 +9,7 @@ secretbase - 1.0.2.9000 + 1.0.3 diff --git a/reference/sha3.html b/reference/sha3.html index 20f6306..e8399a8 100644 --- a/reference/sha3.html +++ b/reference/sha3.html @@ -7,7 +7,7 @@ secretbase - 1.0.2.9000 + 1.0.3 diff --git a/reference/shake256.html b/reference/shake256.html index 3d84a38..2b1938e 100644 --- a/reference/shake256.html +++ b/reference/shake256.html @@ -7,7 +7,7 @@ secretbase - 1.0.2.9000 + 1.0.3 diff --git a/reference/siphash13.html b/reference/siphash13.html index a7b2ff1..90e0bcd 100644 --- a/reference/siphash13.html +++ b/reference/siphash13.html @@ -11,7 +11,7 @@ secretbase - 1.0.2.9000 + 1.0.3 diff --git a/search.json b/search.json index fa72a6a..3c8fd0e 100644 --- a/search.json +++ b/search.json @@ -1 +1 @@ -[{"path":[]},{"path":"https://shikokuchuo.net/secretbase/CODE_OF_CONDUCT.html","id":"our-pledge","dir":"","previous_headings":"","what":"Our Pledge","title":"Contributor Covenant Code of Conduct","text":"members, contributors, leaders pledge make participation community harassment-free experience everyone, regardless age, body size, visible invisible disability, ethnicity, sex characteristics, gender identity expression, level experience, education, socio-economic status, nationality, personal appearance, race, religion, sexual identity orientation. pledge act interact ways contribute open, welcoming, diverse, inclusive, healthy community.","code":""},{"path":"https://shikokuchuo.net/secretbase/CODE_OF_CONDUCT.html","id":"our-standards","dir":"","previous_headings":"","what":"Our Standards","title":"Contributor Covenant Code of Conduct","text":"Examples behavior contributes positive environment community include: Demonstrating empathy kindness toward people respectful differing opinions, viewpoints, experiences Giving gracefully accepting constructive feedback Accepting responsibility apologizing affected mistakes, learning experience Focusing best just us individuals, overall community Examples unacceptable behavior include: use sexualized language imagery, sexual attention advances kind Trolling, insulting derogatory comments, personal political attacks Public private harassment Publishing others’ private information, physical email address, without explicit permission conduct reasonably considered inappropriate professional setting","code":""},{"path":"https://shikokuchuo.net/secretbase/CODE_OF_CONDUCT.html","id":"enforcement-responsibilities","dir":"","previous_headings":"","what":"Enforcement Responsibilities","title":"Contributor Covenant Code of Conduct","text":"Community leaders responsible clarifying enforcing standards acceptable behavior take appropriate fair corrective action response behavior deem inappropriate, threatening, offensive, harmful. Community leaders right responsibility remove, edit, reject comments, commits, code, wiki edits, issues, contributions aligned Code Conduct, communicate reasons moderation decisions appropriate.","code":""},{"path":"https://shikokuchuo.net/secretbase/CODE_OF_CONDUCT.html","id":"scope","dir":"","previous_headings":"","what":"Scope","title":"Contributor Covenant Code of Conduct","text":"Code Conduct applies within community spaces, also applies individual officially representing community public spaces. Examples representing community include using official e-mail address, posting via official social media account, acting appointed representative online offline event.","code":""},{"path":"https://shikokuchuo.net/secretbase/CODE_OF_CONDUCT.html","id":"enforcement","dir":"","previous_headings":"","what":"Enforcement","title":"Contributor Covenant Code of Conduct","text":"Instances abusive, harassing, otherwise unacceptable behavior may reported community leaders responsible enforcement code@hibiki-ai.com. complaints reviewed investigated promptly fairly. community leaders obligated respect privacy security reporter incident.","code":""},{"path":"https://shikokuchuo.net/secretbase/CODE_OF_CONDUCT.html","id":"enforcement-guidelines","dir":"","previous_headings":"","what":"Enforcement Guidelines","title":"Contributor Covenant Code of Conduct","text":"Community leaders follow Community Impact Guidelines determining consequences action deem violation Code Conduct:","code":""},{"path":"https://shikokuchuo.net/secretbase/CODE_OF_CONDUCT.html","id":"id_1-correction","dir":"","previous_headings":"Enforcement Guidelines","what":"1. Correction","title":"Contributor Covenant Code of Conduct","text":"Community Impact: Use inappropriate language behavior deemed unprofessional unwelcome community. Consequence: private, written warning community leaders, providing clarity around nature violation explanation behavior inappropriate. public apology may requested.","code":""},{"path":"https://shikokuchuo.net/secretbase/CODE_OF_CONDUCT.html","id":"id_2-warning","dir":"","previous_headings":"Enforcement Guidelines","what":"2. Warning","title":"Contributor Covenant Code of Conduct","text":"Community Impact: violation single incident series actions. Consequence: warning consequences continued behavior. interaction people involved, including unsolicited interaction enforcing Code Conduct, specified period time. includes avoiding interactions community spaces well external channels like social media. Violating terms may lead temporary permanent ban.","code":""},{"path":"https://shikokuchuo.net/secretbase/CODE_OF_CONDUCT.html","id":"id_3-temporary-ban","dir":"","previous_headings":"Enforcement Guidelines","what":"3. Temporary Ban","title":"Contributor Covenant Code of Conduct","text":"Community Impact: serious violation community standards, including sustained inappropriate behavior. Consequence: temporary ban sort interaction public communication community specified period time. public private interaction people involved, including unsolicited interaction enforcing Code Conduct, allowed period. Violating terms may lead permanent ban.","code":""},{"path":"https://shikokuchuo.net/secretbase/CODE_OF_CONDUCT.html","id":"id_4-permanent-ban","dir":"","previous_headings":"Enforcement Guidelines","what":"4. Permanent Ban","title":"Contributor Covenant Code of Conduct","text":"Community Impact: Demonstrating pattern violation community standards, including sustained inappropriate behavior, harassment individual, aggression toward disparagement classes individuals. Consequence: permanent ban sort public interaction within community.","code":""},{"path":"https://shikokuchuo.net/secretbase/CODE_OF_CONDUCT.html","id":"attribution","dir":"","previous_headings":"","what":"Attribution","title":"Contributor Covenant Code of Conduct","text":"Code Conduct adapted Contributor Covenant, version 2.0, available https://www.contributor-covenant.org/version/2/0/code_of_conduct.html. Community Impact Guidelines inspired Mozilla’s code conduct enforcement ladder. answers common questions code conduct, see FAQ https://www.contributor-covenant.org/faq. Translations available https://www.contributor-covenant.org/translations.","code":""},{"path":"https://shikokuchuo.net/secretbase/LICENSE.html","id":null,"dir":"","previous_headings":"","what":"GNU General Public License","title":"GNU General Public License","text":"Version 3, 29 June 2007Copyright © 2007 Free Software Foundation, Inc. Everyone permitted copy distribute verbatim copies license document, changing allowed.","code":""},{"path":"https://shikokuchuo.net/secretbase/LICENSE.html","id":"preamble","dir":"","previous_headings":"","what":"Preamble","title":"GNU General Public License","text":"GNU General Public License free, copyleft license software kinds works. licenses software practical works designed take away freedom share change works. contrast, GNU General Public License intended guarantee freedom share change versions program–make sure remains free software users. , Free Software Foundation, use GNU General Public License software; applies also work released way authors. can apply programs, . speak free software, referring freedom, price. General Public Licenses designed make sure freedom distribute copies free software (charge wish), receive source code can get want , can change software use pieces new free programs, know can things. protect rights, need prevent others denying rights asking surrender rights. Therefore, certain responsibilities distribute copies software, modify : responsibilities respect freedom others. example, distribute copies program, whether gratis fee, must pass recipients freedoms received. must make sure , , receive can get source code. must show terms know rights. Developers use GNU GPL protect rights two steps: (1) assert copyright software, (2) offer License giving legal permission copy, distribute /modify . developers’ authors’ protection, GPL clearly explains warranty free software. users’ authors’ sake, GPL requires modified versions marked changed, problems attributed erroneously authors previous versions. devices designed deny users access install run modified versions software inside , although manufacturer can . fundamentally incompatible aim protecting users’ freedom change software. systematic pattern abuse occurs area products individuals use, precisely unacceptable. Therefore, designed version GPL prohibit practice products. problems arise substantially domains, stand ready extend provision domains future versions GPL, needed protect freedom users. Finally, every program threatened constantly software patents. States allow patents restrict development use software general-purpose computers, , wish avoid special danger patents applied free program make effectively proprietary. prevent , GPL assures patents used render program non-free. precise terms conditions copying, distribution modification follow.","code":""},{"path":[]},{"path":"https://shikokuchuo.net/secretbase/LICENSE.html","id":"id_0-definitions","dir":"","previous_headings":"TERMS AND CONDITIONS","what":"0. Definitions","title":"GNU General Public License","text":"“License” refers version 3 GNU General Public License. “Copyright” also means copyright-like laws apply kinds works, semiconductor masks. “Program” refers copyrightable work licensed License. licensee addressed “”. “Licensees” “recipients” may individuals organizations. “modify” work means copy adapt part work fashion requiring copyright permission, making exact copy. resulting work called “modified version” earlier work work “based ” earlier work. “covered work” means either unmodified Program work based Program. “propagate” work means anything , without permission, make directly secondarily liable infringement applicable copyright law, except executing computer modifying private copy. Propagation includes copying, distribution (without modification), making available public, countries activities well. “convey” work means kind propagation enables parties make receive copies. Mere interaction user computer network, transfer copy, conveying. interactive user interface displays “Appropriate Legal Notices” extent includes convenient prominently visible feature (1) displays appropriate copyright notice, (2) tells user warranty work (except extent warranties provided), licensees may convey work License, view copy License. interface presents list user commands options, menu, prominent item list meets criterion.","code":""},{"path":"https://shikokuchuo.net/secretbase/LICENSE.html","id":"id_1-source-code","dir":"","previous_headings":"TERMS AND CONDITIONS","what":"1. Source Code","title":"GNU General Public License","text":"“source code” work means preferred form work making modifications . “Object code” means non-source form work. “Standard Interface” means interface either official standard defined recognized standards body, , case interfaces specified particular programming language, one widely used among developers working language. “System Libraries” executable work include anything, work whole, () included normal form packaging Major Component, part Major Component, (b) serves enable use work Major Component, implement Standard Interface implementation available public source code form. “Major Component”, context, means major essential component (kernel, window system, ) specific operating system () executable work runs, compiler used produce work, object code interpreter used run . “Corresponding Source” work object code form means source code needed generate, install, (executable work) run object code modify work, including scripts control activities. However, include work’s System Libraries, general-purpose tools generally available free programs used unmodified performing activities part work. example, Corresponding Source includes interface definition files associated source files work, source code shared libraries dynamically linked subprograms work specifically designed require, intimate data communication control flow subprograms parts work. Corresponding Source need include anything users can regenerate automatically parts Corresponding Source. Corresponding Source work source code form work.","code":""},{"path":"https://shikokuchuo.net/secretbase/LICENSE.html","id":"id_2-basic-permissions","dir":"","previous_headings":"TERMS AND CONDITIONS","what":"2. Basic Permissions","title":"GNU General Public License","text":"rights granted License granted term copyright Program, irrevocable provided stated conditions met. License explicitly affirms unlimited permission run unmodified Program. output running covered work covered License output, given content, constitutes covered work. License acknowledges rights fair use equivalent, provided copyright law. may make, run propagate covered works convey, without conditions long license otherwise remains force. may convey covered works others sole purpose make modifications exclusively , provide facilities running works, provided comply terms License conveying material control copyright. thus making running covered works must exclusively behalf, direction control, terms prohibit making copies copyrighted material outside relationship . Conveying circumstances permitted solely conditions stated . Sublicensing allowed; section 10 makes unnecessary.","code":""},{"path":"https://shikokuchuo.net/secretbase/LICENSE.html","id":"id_3-protecting-users-legal-rights-from-anti-circumvention-law","dir":"","previous_headings":"TERMS AND CONDITIONS","what":"3. Protecting Users’ Legal Rights From Anti-Circumvention Law","title":"GNU General Public License","text":"covered work shall deemed part effective technological measure applicable law fulfilling obligations article 11 WIPO copyright treaty adopted 20 December 1996, similar laws prohibiting restricting circumvention measures. convey covered work, waive legal power forbid circumvention technological measures extent circumvention effected exercising rights License respect covered work, disclaim intention limit operation modification work means enforcing, work’s users, third parties’ legal rights forbid circumvention technological measures.","code":""},{"path":"https://shikokuchuo.net/secretbase/LICENSE.html","id":"id_4-conveying-verbatim-copies","dir":"","previous_headings":"TERMS AND CONDITIONS","what":"4. Conveying Verbatim Copies","title":"GNU General Public License","text":"may convey verbatim copies Program’s source code receive , medium, provided conspicuously appropriately publish copy appropriate copyright notice; keep intact notices stating License non-permissive terms added accord section 7 apply code; keep intact notices absence warranty; give recipients copy License along Program. may charge price price copy convey, may offer support warranty protection fee.","code":""},{"path":"https://shikokuchuo.net/secretbase/LICENSE.html","id":"id_5-conveying-modified-source-versions","dir":"","previous_headings":"TERMS AND CONDITIONS","what":"5. Conveying Modified Source Versions","title":"GNU General Public License","text":"may convey work based Program, modifications produce Program, form source code terms section 4, provided also meet conditions: ) work must carry prominent notices stating modified , giving relevant date. b) work must carry prominent notices stating released License conditions added section 7. requirement modifies requirement section 4 “keep intact notices”. c) must license entire work, whole, License anyone comes possession copy. License therefore apply, along applicable section 7 additional terms, whole work, parts, regardless packaged. License gives permission license work way, invalidate permission separately received . d) work interactive user interfaces, must display Appropriate Legal Notices; however, Program interactive interfaces display Appropriate Legal Notices, work need make . compilation covered work separate independent works, nature extensions covered work, combined form larger program, volume storage distribution medium, called “aggregate” compilation resulting copyright used limit access legal rights compilation’s users beyond individual works permit. Inclusion covered work aggregate cause License apply parts aggregate.","code":""},{"path":"https://shikokuchuo.net/secretbase/LICENSE.html","id":"id_6-conveying-non-source-forms","dir":"","previous_headings":"TERMS AND CONDITIONS","what":"6. Conveying Non-Source Forms","title":"GNU General Public License","text":"may convey covered work object code form terms sections 4 5, provided also convey machine-readable Corresponding Source terms License, one ways: ) Convey object code , embodied , physical product (including physical distribution medium), accompanied Corresponding Source fixed durable physical medium customarily used software interchange. b) Convey object code , embodied , physical product (including physical distribution medium), accompanied written offer, valid least three years valid long offer spare parts customer support product model, give anyone possesses object code either (1) copy Corresponding Source software product covered License, durable physical medium customarily used software interchange, price reasonable cost physically performing conveying source, (2) access copy Corresponding Source network server charge. c) Convey individual copies object code copy written offer provide Corresponding Source. alternative allowed occasionally noncommercially, received object code offer, accord subsection 6b. d) Convey object code offering access designated place (gratis charge), offer equivalent access Corresponding Source way place charge. need require recipients copy Corresponding Source along object code. place copy object code network server, Corresponding Source may different server (operated third party) supports equivalent copying facilities, provided maintain clear directions next object code saying find Corresponding Source. Regardless server hosts Corresponding Source, remain obligated ensure available long needed satisfy requirements. e) Convey object code using peer--peer transmission, provided inform peers object code Corresponding Source work offered general public charge subsection 6d. separable portion object code, whose source code excluded Corresponding Source System Library, need included conveying object code work. “User Product” either (1) “consumer product”, means tangible personal property normally used personal, family, household purposes, (2) anything designed sold incorporation dwelling. determining whether product consumer product, doubtful cases shall resolved favor coverage. particular product received particular user, “normally used” refers typical common use class product, regardless status particular user way particular user actually uses, expects expected use, product. product consumer product regardless whether product substantial commercial, industrial non-consumer uses, unless uses represent significant mode use product. “Installation Information” User Product means methods, procedures, authorization keys, information required install execute modified versions covered work User Product modified version Corresponding Source. information must suffice ensure continued functioning modified object code case prevented interfered solely modification made. convey object code work section , , specifically use , User Product, conveying occurs part transaction right possession use User Product transferred recipient perpetuity fixed term (regardless transaction characterized), Corresponding Source conveyed section must accompanied Installation Information. requirement apply neither third party retains ability install modified object code User Product (example, work installed ROM). requirement provide Installation Information include requirement continue provide support service, warranty, updates work modified installed recipient, User Product modified installed. Access network may denied modification materially adversely affects operation network violates rules protocols communication across network. Corresponding Source conveyed, Installation Information provided, accord section must format publicly documented (implementation available public source code form), must require special password key unpacking, reading copying.","code":""},{"path":"https://shikokuchuo.net/secretbase/LICENSE.html","id":"id_7-additional-terms","dir":"","previous_headings":"TERMS AND CONDITIONS","what":"7. Additional Terms","title":"GNU General Public License","text":"“Additional permissions” terms supplement terms License making exceptions one conditions. Additional permissions applicable entire Program shall treated though included License, extent valid applicable law. additional permissions apply part Program, part may used separately permissions, entire Program remains governed License without regard additional permissions. convey copy covered work, may option remove additional permissions copy, part . (Additional permissions may written require removal certain cases modify work.) may place additional permissions material, added covered work, can give appropriate copyright permission. Notwithstanding provision License, material add covered work, may (authorized copyright holders material) supplement terms License terms: ) Disclaiming warranty limiting liability differently terms sections 15 16 License; b) Requiring preservation specified reasonable legal notices author attributions material Appropriate Legal Notices displayed works containing ; c) Prohibiting misrepresentation origin material, requiring modified versions material marked reasonable ways different original version; d) Limiting use publicity purposes names licensors authors material; e) Declining grant rights trademark law use trade names, trademarks, service marks; f) Requiring indemnification licensors authors material anyone conveys material (modified versions ) contractual assumptions liability recipient, liability contractual assumptions directly impose licensors authors. non-permissive additional terms considered “restrictions” within meaning section 10. Program received , part , contains notice stating governed License along term restriction, may remove term. license document contains restriction permits relicensing conveying License, may add covered work material governed terms license document, provided restriction survive relicensing conveying. add terms covered work accord section, must place, relevant source files, statement additional terms apply files, notice indicating find applicable terms. Additional terms, permissive non-permissive, may stated form separately written license, stated exceptions; requirements apply either way.","code":""},{"path":"https://shikokuchuo.net/secretbase/LICENSE.html","id":"id_8-termination","dir":"","previous_headings":"TERMS AND CONDITIONS","what":"8. Termination","title":"GNU General Public License","text":"may propagate modify covered work except expressly provided License. attempt otherwise propagate modify void, automatically terminate rights License (including patent licenses granted third paragraph section 11). However, cease violation License, license particular copyright holder reinstated () provisionally, unless copyright holder explicitly finally terminates license, (b) permanently, copyright holder fails notify violation reasonable means prior 60 days cessation. Moreover, license particular copyright holder reinstated permanently copyright holder notifies violation reasonable means, first time received notice violation License (work) copyright holder, cure violation prior 30 days receipt notice. Termination rights section terminate licenses parties received copies rights License. rights terminated permanently reinstated, qualify receive new licenses material section 10.","code":""},{"path":"https://shikokuchuo.net/secretbase/LICENSE.html","id":"id_9-acceptance-not-required-for-having-copies","dir":"","previous_headings":"TERMS AND CONDITIONS","what":"9. Acceptance Not Required for Having Copies","title":"GNU General Public License","text":"required accept License order receive run copy Program. Ancillary propagation covered work occurring solely consequence using peer--peer transmission receive copy likewise require acceptance. However, nothing License grants permission propagate modify covered work. actions infringe copyright accept License. Therefore, modifying propagating covered work, indicate acceptance License .","code":""},{"path":"https://shikokuchuo.net/secretbase/LICENSE.html","id":"id_10-automatic-licensing-of-downstream-recipients","dir":"","previous_headings":"TERMS AND CONDITIONS","what":"10. Automatic Licensing of Downstream Recipients","title":"GNU General Public License","text":"time convey covered work, recipient automatically receives license original licensors, run, modify propagate work, subject License. responsible enforcing compliance third parties License. “entity transaction” transaction transferring control organization, substantially assets one, subdividing organization, merging organizations. propagation covered work results entity transaction, party transaction receives copy work also receives whatever licenses work party’s predecessor interest give previous paragraph, plus right possession Corresponding Source work predecessor interest, predecessor can get reasonable efforts. may impose restrictions exercise rights granted affirmed License. example, may impose license fee, royalty, charge exercise rights granted License, may initiate litigation (including cross-claim counterclaim lawsuit) alleging patent claim infringed making, using, selling, offering sale, importing Program portion .","code":""},{"path":"https://shikokuchuo.net/secretbase/LICENSE.html","id":"id_11-patents","dir":"","previous_headings":"TERMS AND CONDITIONS","what":"11. Patents","title":"GNU General Public License","text":"“contributor” copyright holder authorizes use License Program work Program based. work thus licensed called contributor’s “contributor version”. contributor’s “essential patent claims” patent claims owned controlled contributor, whether already acquired hereafter acquired, infringed manner, permitted License, making, using, selling contributor version, include claims infringed consequence modification contributor version. purposes definition, “control” includes right grant patent sublicenses manner consistent requirements License. contributor grants non-exclusive, worldwide, royalty-free patent license contributor’s essential patent claims, make, use, sell, offer sale, import otherwise run, modify propagate contents contributor version. following three paragraphs, “patent license” express agreement commitment, however denominated, enforce patent (express permission practice patent covenant sue patent infringement). “grant” patent license party means make agreement commitment enforce patent party. convey covered work, knowingly relying patent license, Corresponding Source work available anyone copy, free charge terms License, publicly available network server readily accessible means, must either (1) cause Corresponding Source available, (2) arrange deprive benefit patent license particular work, (3) arrange, manner consistent requirements License, extend patent license downstream recipients. “Knowingly relying” means actual knowledge , patent license, conveying covered work country, recipient’s use covered work country, infringe one identifiable patents country reason believe valid. , pursuant connection single transaction arrangement, convey, propagate procuring conveyance , covered work, grant patent license parties receiving covered work authorizing use, propagate, modify convey specific copy covered work, patent license grant automatically extended recipients covered work works based . patent license “discriminatory” include within scope coverage, prohibits exercise , conditioned non-exercise one rights specifically granted License. may convey covered work party arrangement third party business distributing software, make payment third party based extent activity conveying work, third party grants, parties receive covered work , discriminatory patent license () connection copies covered work conveyed (copies made copies), (b) primarily connection specific products compilations contain covered work, unless entered arrangement, patent license granted, prior 28 March 2007. Nothing License shall construed excluding limiting implied license defenses infringement may otherwise available applicable patent law.","code":""},{"path":"https://shikokuchuo.net/secretbase/LICENSE.html","id":"id_12-no-surrender-of-others-freedom","dir":"","previous_headings":"TERMS AND CONDITIONS","what":"12. No Surrender of Others’ Freedom","title":"GNU General Public License","text":"conditions imposed (whether court order, agreement otherwise) contradict conditions License, excuse conditions License. convey covered work satisfy simultaneously obligations License pertinent obligations, consequence may convey . example, agree terms obligate collect royalty conveying convey Program, way satisfy terms License refrain entirely conveying Program.","code":""},{"path":"https://shikokuchuo.net/secretbase/LICENSE.html","id":"id_13-use-with-the-gnu-affero-general-public-license","dir":"","previous_headings":"TERMS AND CONDITIONS","what":"13. Use with the GNU Affero General Public License","title":"GNU General Public License","text":"Notwithstanding provision License, permission link combine covered work work licensed version 3 GNU Affero General Public License single combined work, convey resulting work. terms License continue apply part covered work, special requirements GNU Affero General Public License, section 13, concerning interaction network apply combination .","code":""},{"path":"https://shikokuchuo.net/secretbase/LICENSE.html","id":"id_14-revised-versions-of-this-license","dir":"","previous_headings":"TERMS AND CONDITIONS","what":"14. Revised Versions of this License","title":"GNU General Public License","text":"Free Software Foundation may publish revised /new versions GNU General Public License time time. new versions similar spirit present version, may differ detail address new problems concerns. version given distinguishing version number. Program specifies certain numbered version GNU General Public License “later version” applies , option following terms conditions either numbered version later version published Free Software Foundation. Program specify version number GNU General Public License, may choose version ever published Free Software Foundation. Program specifies proxy can decide future versions GNU General Public License can used, proxy’s public statement acceptance version permanently authorizes choose version Program. Later license versions may give additional different permissions. However, additional obligations imposed author copyright holder result choosing follow later version.","code":""},{"path":"https://shikokuchuo.net/secretbase/LICENSE.html","id":"id_15-disclaimer-of-warranty","dir":"","previous_headings":"TERMS AND CONDITIONS","what":"15. Disclaimer of Warranty","title":"GNU General Public License","text":"WARRANTY PROGRAM, EXTENT PERMITTED APPLICABLE LAW. EXCEPT OTHERWISE STATED WRITING COPYRIGHT HOLDERS /PARTIES PROVIDE PROGRAM “” WITHOUT WARRANTY KIND, EITHER EXPRESSED IMPLIED, INCLUDING, LIMITED , IMPLIED WARRANTIES MERCHANTABILITY FITNESS PARTICULAR PURPOSE. ENTIRE RISK QUALITY PERFORMANCE PROGRAM . PROGRAM PROVE DEFECTIVE, ASSUME COST NECESSARY SERVICING, REPAIR CORRECTION.","code":""},{"path":"https://shikokuchuo.net/secretbase/LICENSE.html","id":"id_16-limitation-of-liability","dir":"","previous_headings":"TERMS AND CONDITIONS","what":"16. Limitation of Liability","title":"GNU General Public License","text":"EVENT UNLESS REQUIRED APPLICABLE LAW AGREED WRITING COPYRIGHT HOLDER, PARTY MODIFIES /CONVEYS PROGRAM PERMITTED , LIABLE DAMAGES, INCLUDING GENERAL, SPECIAL, INCIDENTAL CONSEQUENTIAL DAMAGES ARISING USE INABILITY USE PROGRAM (INCLUDING LIMITED LOSS DATA DATA RENDERED INACCURATE LOSSES SUSTAINED THIRD PARTIES FAILURE PROGRAM OPERATE PROGRAMS), EVEN HOLDER PARTY ADVISED POSSIBILITY DAMAGES.","code":""},{"path":"https://shikokuchuo.net/secretbase/LICENSE.html","id":"id_17-interpretation-of-sections-15-and-16","dir":"","previous_headings":"TERMS AND CONDITIONS","what":"17. Interpretation of Sections 15 and 16","title":"GNU General Public License","text":"disclaimer warranty limitation liability provided given local legal effect according terms, reviewing courts shall apply local law closely approximates absolute waiver civil liability connection Program, unless warranty assumption liability accompanies copy Program return fee. END TERMS CONDITIONS","code":""},{"path":"https://shikokuchuo.net/secretbase/LICENSE.html","id":"how-to-apply-these-terms-to-your-new-programs","dir":"","previous_headings":"","what":"How to Apply These Terms to Your New Programs","title":"GNU General Public License","text":"develop new program, want greatest possible use public, best way achieve make free software everyone can redistribute change terms. , attach following notices program. safest attach start source file effectively state exclusion warranty; file least “copyright” line pointer full notice found. Also add information contact electronic paper mail. program terminal interaction, make output short notice like starts interactive mode: hypothetical commands show w show c show appropriate parts General Public License. course, program’s commands might different; GUI interface, use “box”. also get employer (work programmer) school, , sign “copyright disclaimer” program, necessary. information , apply follow GNU GPL, see . GNU General Public License permit incorporating program proprietary programs. program subroutine library, may consider useful permit linking proprietary applications library. want , use GNU Lesser General Public License instead License. first, please read .","code":" Copyright (C) This program is free software: you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version. This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details. You should have received a copy of the GNU General Public License along with this program. If not, see . Copyright (C) This program comes with ABSOLUTELY NO WARRANTY; for details type 'show w'. This is free software, and you are welcome to redistribute it under certain conditions; type 'show c' for details."},{"path":"https://shikokuchuo.net/secretbase/authors.html","id":null,"dir":"","previous_headings":"","what":"Authors","title":"Authors and Citation","text":"Charlie Gao. Author, maintainer. Hibiki AI Limited. Copyright holder.","code":""},{"path":"https://shikokuchuo.net/secretbase/authors.html","id":"citation","dir":"","previous_headings":"","what":"Citation","title":"Authors and Citation","text":"Gao C (2024). secretbase: Cryptographic Hash, Extendable-Output Base64 Functions. R package version 1.0.2.9000, https://doi.org/10.5281/zenodo.10553139.","code":"@Manual{, title = {secretbase: Cryptographic Hash, Extendable-Output and Base64 Functions}, author = {Charlie Gao}, year = {2024}, note = {R package version 1.0.2.9000}, url = {https://doi.org/10.5281/zenodo.10553139}, }"},{"path":"https://shikokuchuo.net/secretbase/index.html","id":"secretbase","dir":"","previous_headings":"","what":"Cryptographic Hash, Extendable-Output and Base64 Functions","title":"Cryptographic Hash, Extendable-Output and Base64 Functions","text":"Fast memory-efficient streaming hash functions base64 encoding / decoding. Hashes strings raw vectors directly. Stream hashes files potentially larger memory, well -memory objects R’s serialization mechanism. Implementations include SHA-256, SHA-3 ‘Keccak’ cryptographic hash functions, SHAKE256 extendable-output function (XOF), ‘SipHash’ pseudo-random function.","code":"________ /\\ sec \\ / \\ ret \\ \\ / base / \\/_______/"},{"path":"https://shikokuchuo.net/secretbase/index.html","id":"overview","dir":"","previous_headings":"","what":"Overview","title":"Cryptographic Hash, Extendable-Output and Base64 Functions","text":"","code":"library(secretbase)"},{"path":"https://shikokuchuo.net/secretbase/index.html","id":"sha-3","dir":"","previous_headings":"Overview","what":"SHA-3","title":"Cryptographic Hash, Extendable-Output and Base64 Functions","text":"SHA-3 cryptographic hash algorithm, specify bits 224, 256, 384 512:","code":"sha3(\"secret base\") #> [1] \"a721d57570e7ce366adee2fccbe9770723c6e3622549c31c7cab9dbb4a795520\" sha3(\"secret base\", convert = FALSE) #> [1] a7 21 d5 75 70 e7 ce 36 6a de e2 fc cb e9 77 07 23 c6 e3 62 25 49 c3 1c 7c #> [26] ab 9d bb 4a 79 55 20 sha3(\"秘密の基地の中\", bits = 512L) #> [1] \"e30cdc73f6575c40d55b5edc8eb4f97940f5ca491640b41612e02a05f3e59dd9c6c33f601d8d7a8e2ca0504b8c22f7bc69fa8f10d7c01aab392781ff4ae1e610\""},{"path":"https://shikokuchuo.net/secretbase/index.html","id":"hash-strings-and-raw-vectors","dir":"","previous_headings":"Overview","what":"Hash strings and raw vectors","title":"Cryptographic Hash, Extendable-Output and Base64 Functions","text":"Character strings raw vectors hashed directly ().","code":""},{"path":"https://shikokuchuo.net/secretbase/index.html","id":"stream-hash-r-objects","dir":"","previous_headings":"Overview","what":"Stream hash R objects","title":"Cryptographic Hash, Extendable-Output and Base64 Functions","text":"objects stream hashed using R serialization memory-efficient performed without allocation serialized object portable always uses R serialization version 3, big-endian representation, skipping headers (contain R version native encoding information)","code":"sha3(data.frame(a = 1, b = 2), bits = 224L) #> [1] \"03778aad53bff7dd68caab94374bba6f07cea235fb97b3c52cf612e9\" sha3(NULL) #> [1] \"b3e37e4c5def1bfb2841b79ef8503b83d1fed46836b5b913d7c16de92966dcee\""},{"path":"https://shikokuchuo.net/secretbase/index.html","id":"stream-hash-files","dir":"","previous_headings":"Overview","what":"Stream hash files","title":"Cryptographic Hash, Extendable-Output and Base64 Functions","text":"Files read hashed incrementally, accepting files larger memory:","code":"file <- tempfile(); cat(\"secret base\", file = file) sha3(file = file) #> [1] \"a721d57570e7ce366adee2fccbe9770723c6e3622549c31c7cab9dbb4a795520\""},{"path":"https://shikokuchuo.net/secretbase/index.html","id":"hash-to-integer--shake256-xof","dir":"","previous_headings":"Overview","what":"Hash to integer / SHAKE256 XOF","title":"Cryptographic Hash, Extendable-Output and Base64 Functions","text":"May used deterministic random seeds R’s pseudo random number generators (RNGs). Specify convert = NA (bits = 32 single integer value): use parallel computing, valid method reducing negligible probability RNGs process may overlap. may especially suitable first-best alternatives using recursive streams expensive unable preserve reproducibility. [1]","code":"shake256(\"秘密の基地の中\", bits = 32L, convert = NA) #> [1] 2000208511"},{"path":"https://shikokuchuo.net/secretbase/index.html","id":"keccak","dir":"","previous_headings":"Overview","what":"Keccak","title":"Cryptographic Hash, Extendable-Output and Base64 Functions","text":"","code":"keccak(\"secret base\", bits = 384L) #> [1] \"c82bae24175676028e44aa08b9e2424311847adb0b071c68c7ea47edf049b0e935ddd2fc7c499333bccc08c7eb7b1203\""},{"path":"https://shikokuchuo.net/secretbase/index.html","id":"sha-256","dir":"","previous_headings":"Overview","what":"SHA-256","title":"Cryptographic Hash, Extendable-Output and Base64 Functions","text":"SHA-256 HMAC, pass key character string raw vector:","code":"sha256(\"secret base\") #> [1] \"1951c1ca3d50e95e6ede2b1c26fefd0f0e8eba1e51a837f8ccefb583a2b686fe\" sha256(\"secret base\", key = \"秘密の基地の中\") #> [1] \"ec58099ab21325e792bef8f1aafc0a70e1a7227463cfc410931112705d753392\""},{"path":"https://shikokuchuo.net/secretbase/index.html","id":"siphash","dir":"","previous_headings":"Overview","what":"SipHash","title":"Cryptographic Hash, Extendable-Output and Base64 Functions","text":"SipHash-1-3 optimized performance. Pass key character string raw vector 16 bytes (128 bits):","code":"siphash13(\"secret base\", key = charToRaw(\"秘密の基地の中\")) #> [1] \"a1f0a751892cc7dd\""},{"path":"https://shikokuchuo.net/secretbase/index.html","id":"base64-encoding--decoding","dir":"","previous_headings":"Overview","what":"Base64 Encoding / Decoding","title":"Cryptographic Hash, Extendable-Output and Base64 Functions","text":"Strings: Raw vectors: Serialized objects:","code":"base64enc(\"secret base\") #> [1] \"c2VjcmV0IGJhc2U=\" base64dec(base64enc(\"secret base\")) #> [1] \"secret base\" base64enc(as.raw(c(1L, 2L, 4L)), convert = FALSE) #> [1] 41 51 49 45 base64dec(base64enc(as.raw(c(1L, 2L, 4L))), convert = FALSE) #> [1] 01 02 04 base64enc(data.frame()) #> [1] \"WAoAAAADAAQEAQADBQAAAAAFVVRGLTgAAAMTAAAAAAAABAIAAAABAAQACQAAAAVuYW1lcwAAABAAAAAAAAAEAgAAAAEABAAJAAAACXJvdy5uYW1lcwAAAA0AAAAAAAAEAgAAAAEABAAJAAAABWNsYXNzAAAAEAAAAAEABAAJAAAACmRhdGEuZnJhbWUAAAD+\" base64dec(base64enc(data.frame()), convert = NA) #> data frame with 0 columns and 0 rows"},{"path":"https://shikokuchuo.net/secretbase/index.html","id":"installation","dir":"","previous_headings":"","what":"Installation","title":"Cryptographic Hash, Extendable-Output and Base64 Functions","text":"Install latest release CRAN R-multiverse: current development version available R-universe:","code":"install.packages(\"secretbase\") install.packages(\"secretbase\", repos = \"https://shikokuchuo.r-universe.dev\")"},{"path":"https://shikokuchuo.net/secretbase/index.html","id":"implementation","dir":"","previous_headings":"","what":"Implementation","title":"Cryptographic Hash, Extendable-Output and Base64 Functions","text":"SHA-3 Secure Hash Standard published National Institute Standards Technology (NIST) 2015 doi:10.6028/NIST.FIPS.202. SHA-3 based Keccak algorithm, designed G. Bertoni, J. Daemen, M. Peeters G. Van Assche. SHA-256 Secure Hash Standard published NIST 2002 https://csrc.nist.gov/publications/fips/fips180-2/fips180-2.pdf. SHA-256, SHA-3, Keccak, base64 implementations based ‘Mbed TLS’ Trusted Firmware Project https://www.trustedfirmware.org/projects/mbed-tls. SipHash family pseudo-random functions Jean-Philippe Aumasson Daniel J. Bernstein published 2012 https://ia.cr/2012/351. [2] SipHash implementation based Daniele Nicolodi, David Rheinsberg Tom Gundersen https://github.com/c-util/c-siphash, turn based reference implementation Jean-Philippe Aumasson Daniel J. Bernstein released public domain https://github.com/veorq/SipHash.","code":""},{"path":"https://shikokuchuo.net/secretbase/index.html","id":"references","dir":"","previous_headings":"","what":"References","title":"Cryptographic Hash, Extendable-Output and Base64 Functions","text":"[1] Pierre L’Ecuyer, David Munger, Boris Oreshkin Richard Simard (2017), “Random numbers parallel computers: Requirements methods, emphasis GPUs”, Mathematics Computers Simulation, Vol. 135, May 2017, pp. 3-17 doi:10.1016/j.matcom.2016.05.00. [2] Jean-Philippe Aumasson Daniel J. Bernstein (2012), “SipHash: fast short-input PRF”, Paper 2012/351, Cryptology ePrint Archive, https://ia.cr/2012/351.","code":""},{"path":"https://shikokuchuo.net/secretbase/index.html","id":"links","dir":"","previous_headings":"","what":"Links","title":"Cryptographic Hash, Extendable-Output and Base64 Functions","text":"◈ secretbase R package: https://shikokuchuo.net/secretbase/ Mbed TLS website: https://www.trustedfirmware.org/projects/mbed-tls SipHash streaming implementation: https://github.com/c-util/c-siphash SipHash reference implementation: https://github.com/veorq/SipHash – Please note project released Contributor Code Conduct. participating project agree abide terms.","code":""},{"path":"https://shikokuchuo.net/secretbase/reference/base64dec.html","id":null,"dir":"Reference","previous_headings":"","what":"Base64 Decode — base64dec","title":"Base64 Decode — base64dec","text":"Decodes character string, raw vector object base64 encoding.","code":""},{"path":"https://shikokuchuo.net/secretbase/reference/base64dec.html","id":"ref-usage","dir":"Reference","previous_headings":"","what":"Usage","title":"Base64 Decode — base64dec","text":"","code":"base64dec(x, convert = TRUE)"},{"path":"https://shikokuchuo.net/secretbase/reference/base64dec.html","id":"arguments","dir":"Reference","previous_headings":"","what":"Arguments","title":"Base64 Decode — base64dec","text":"x object. convert [default TRUE] logical TRUE convert back character string, FALSE convert back raw vector NA decode unserialize back original object.","code":""},{"path":"https://shikokuchuo.net/secretbase/reference/base64dec.html","id":"value","dir":"Reference","previous_headings":"","what":"Value","title":"Base64 Decode — base64dec","text":"character string, raw vector, object depending value ‘convert’. conversion character string fails, raw vector returned instead (accompanied warning).","code":""},{"path":"https://shikokuchuo.net/secretbase/reference/base64dec.html","id":"details","dir":"Reference","previous_headings":"","what":"Details","title":"Base64 Decode — base64dec","text":"value ‘convert’ set TRUE, FALSE NA reverse 3 encoding operations (strings, raw vectors arbitrary objects), order return original object.","code":""},{"path":"https://shikokuchuo.net/secretbase/reference/base64dec.html","id":"references","dir":"Reference","previous_headings":"","what":"References","title":"Base64 Decode — base64dec","text":"implementation based 'Mbed TLS Contributors' 'Mbed TLS' Trusted Firmware Project https://www.trustedfirmware.org/projects/mbed-tls.","code":""},{"path":[]},{"path":"https://shikokuchuo.net/secretbase/reference/base64dec.html","id":"ref-examples","dir":"Reference","previous_headings":"","what":"Examples","title":"Base64 Decode — base64dec","text":"","code":"base64dec(base64enc(\"secret base\")) #> [1] \"secret base\" base64dec(base64enc(as.raw(c(1L, 2L, 4L))), convert = FALSE) #> [1] 01 02 04 base64dec(base64enc(data.frame()), convert = NA) #> data frame with 0 columns and 0 rows"},{"path":"https://shikokuchuo.net/secretbase/reference/base64enc.html","id":null,"dir":"Reference","previous_headings":"","what":"Base64 Encode — base64enc","title":"Base64 Encode — base64enc","text":"Encodes character string, raw vector object base64 encoding.","code":""},{"path":"https://shikokuchuo.net/secretbase/reference/base64enc.html","id":"ref-usage","dir":"Reference","previous_headings":"","what":"Usage","title":"Base64 Encode — base64enc","text":"","code":"base64enc(x, convert = TRUE)"},{"path":"https://shikokuchuo.net/secretbase/reference/base64enc.html","id":"arguments","dir":"Reference","previous_headings":"","what":"Arguments","title":"Base64 Encode — base64enc","text":"x object. convert [default TRUE] logical TRUE encode character string FALSE raw vector.","code":""},{"path":"https://shikokuchuo.net/secretbase/reference/base64enc.html","id":"value","dir":"Reference","previous_headings":"","what":"Value","title":"Base64 Encode — base64enc","text":"character string raw vector depending value ‘convert’.","code":""},{"path":"https://shikokuchuo.net/secretbase/reference/base64enc.html","id":"details","dir":"Reference","previous_headings":"","what":"Details","title":"Base64 Encode — base64enc","text":"character string raw vector (attributes) encoded , whilst objects first serialized (using R serialisation version 3, big-endian representation).","code":""},{"path":"https://shikokuchuo.net/secretbase/reference/base64enc.html","id":"references","dir":"Reference","previous_headings":"","what":"References","title":"Base64 Encode — base64enc","text":"implementation based 'Mbed TLS Contributors' 'Mbed TLS' Trusted Firmware Project https://www.trustedfirmware.org/projects/mbed-tls.","code":""},{"path":[]},{"path":"https://shikokuchuo.net/secretbase/reference/base64enc.html","id":"ref-examples","dir":"Reference","previous_headings":"","what":"Examples","title":"Base64 Encode — base64enc","text":"","code":"base64enc(\"secret base\") #> [1] \"c2VjcmV0IGJhc2U=\" base64enc(as.raw(c(1L, 2L, 4L)), convert = FALSE) #> [1] 41 51 49 45 base64enc(data.frame()) #> [1] \"WAoAAAADAAQEAQADBQAAAAAFVVRGLTgAAAMTAAAAAAAABAIAAAABAAQACQAAAAVuYW1lcwAAABAAAAAAAAAEAgAAAAEABAAJAAAACXJvdy5uYW1lcwAAAA0AAAAAAAAEAgAAAAEABAAJAAAABWNsYXNzAAAAEAAAAAEABAAJAAAACmRhdGEuZnJhbWUAAAD+\""},{"path":"https://shikokuchuo.net/secretbase/reference/keccak.html","id":null,"dir":"Reference","previous_headings":"","what":"Keccak Cryptographic Hash Algorithms — keccak","title":"Keccak Cryptographic Hash Algorithms — keccak","text":"Returns Keccak hash supplied object file.","code":""},{"path":"https://shikokuchuo.net/secretbase/reference/keccak.html","id":"ref-usage","dir":"Reference","previous_headings":"","what":"Usage","title":"Keccak Cryptographic Hash Algorithms — keccak","text":"","code":"keccak(x, bits = 256L, convert = TRUE, file)"},{"path":"https://shikokuchuo.net/secretbase/reference/keccak.html","id":"arguments","dir":"Reference","previous_headings":"","what":"Arguments","title":"Keccak Cryptographic Hash Algorithms — keccak","text":"x object hash. character string raw vector (without attributes) hashed ‘’. objects stream hashed using R serialization (without allocation serialized object). bits [default 256L] output size returned hash. Must one 224, 256, 384 512. convert [default TRUE] TRUE, hash converted hex representation character string, FALSE, output directly raw vector, NA, vector (32-bit) integer values. file character file name / path. specified, ‘x’ ignored. file stream hashed, thus capable handling files larger memory.","code":""},{"path":"https://shikokuchuo.net/secretbase/reference/keccak.html","id":"value","dir":"Reference","previous_headings":"","what":"Value","title":"Keccak Cryptographic Hash Algorithms — keccak","text":"character string, raw integer vector depending ‘convert’.","code":""},{"path":"https://shikokuchuo.net/secretbase/reference/keccak.html","id":"r-serialization-stream-hashing","dir":"Reference","previous_headings":"","what":"R Serialization Stream Hashing","title":"Keccak Cryptographic Hash Algorithms — keccak","text":"used, serialization always version 3 big-endian represenation headers (containing R version native encoding information) skipped ensure portability across platforms.","code":""},{"path":"https://shikokuchuo.net/secretbase/reference/keccak.html","id":"references","dir":"Reference","previous_headings":"","what":"References","title":"Keccak Cryptographic Hash Algorithms — keccak","text":"Keccak underlying algorithm SHA-3, identical apart value padding parameter. Keccak algorithm designed G. Bertoni, J. Daemen, M. Peeters G. Van Assche. implementation based one 'Mbed TLS Contributors' 'Mbed TLS' Trusted Firmware Project https://www.trustedfirmware.org/projects/mbed-tls.","code":""},{"path":"https://shikokuchuo.net/secretbase/reference/keccak.html","id":"ref-examples","dir":"Reference","previous_headings":"","what":"Examples","title":"Keccak Cryptographic Hash Algorithms — keccak","text":"","code":"# Keccak-256 hash as character string: keccak(\"secret base\") #> [1] \"3fc6092bbec5a434a9933b486a89fa466c1ca013d1e37ab4348ce3764f3463d1\" # Keccak-256 hash as raw vector: keccak(\"secret base\", convert = FALSE) #> [1] 3f c6 09 2b be c5 a4 34 a9 93 3b 48 6a 89 fa 46 6c 1c a0 13 d1 e3 7a b4 34 #> [26] 8c e3 76 4f 34 63 d1 # Keccak-224 hash as character string: keccak(\"secret base\", bits = 224) #> [1] \"1ddaa7776f138ff5bba898ca7530410a52d09da412c4276bda0682a8\" # Keccak-384 hash as character string: keccak(\"secret base\", bits = 384) #> [1] \"c82bae24175676028e44aa08b9e2424311847adb0b071c68c7ea47edf049b0e935ddd2fc7c499333bccc08c7eb7b1203\" # Keccak-512 hash as character string: keccak(\"secret base\", bits = 512) #> [1] \"38297e891d9118e4cf6ff5ba6d6de8c2c3bfa790b425848da7b1d8dffcb4a6a3ca2e32ca0a66f36ce2882786ce2299642de8ffd3bae3b51a1ee145fad555a9d8\" # Keccak-256 hash a file: file <- tempfile(); cat(\"secret base\", file = file) keccak(file = file) #> [1] \"3fc6092bbec5a434a9933b486a89fa466c1ca013d1e37ab4348ce3764f3463d1\" unlink(file)"},{"path":"https://shikokuchuo.net/secretbase/reference/secretbase-package.html","id":null,"dir":"Reference","previous_headings":"","what":"secretbase: Cryptographic Hash, Extendable-Output and Base64 Functions — secretbase-package","title":"secretbase: Cryptographic Hash, Extendable-Output and Base64 Functions — secretbase-package","text":"Fast memory-efficient streaming hash functions base64 encoding / decoding. Hashes strings raw vectors directly. Stream hashes files potentially larger memory, well -memory objects R's serialization mechanism. Implementations include SHA-256, SHA-3 'Keccak' cryptographic hash functions, SHAKE256 extendable-output function (XOF), 'SipHash' pseudo-random function.","code":""},{"path":[]},{"path":"https://shikokuchuo.net/secretbase/reference/secretbase-package.html","id":"author","dir":"Reference","previous_headings":"","what":"Author","title":"secretbase: Cryptographic Hash, Extendable-Output and Base64 Functions — secretbase-package","text":"Charlie Gao charlie.gao@shikokuchuo.net (ORCID)","code":""},{"path":"https://shikokuchuo.net/secretbase/reference/sha256.html","id":null,"dir":"Reference","previous_headings":"","what":"SHA-256 Cryptographic Hash Algorithm — sha256","title":"SHA-256 Cryptographic Hash Algorithm — sha256","text":"Returns SHA-256 hash supplied object file, HMAC secret key supplied.","code":""},{"path":"https://shikokuchuo.net/secretbase/reference/sha256.html","id":"ref-usage","dir":"Reference","previous_headings":"","what":"Usage","title":"SHA-256 Cryptographic Hash Algorithm — sha256","text":"","code":"sha256(x, key = NULL, convert = TRUE, file)"},{"path":"https://shikokuchuo.net/secretbase/reference/sha256.html","id":"arguments","dir":"Reference","previous_headings":"","what":"Arguments","title":"SHA-256 Cryptographic Hash Algorithm — sha256","text":"x object hash. character string raw vector (without attributes) hashed ‘’. objects stream hashed using R serialization (without allocation serialized object). key [default NULL] NULL, SHA-256 hash ‘x’ returned. Alternatively, supply character string raw vector secret key generate HMAC. Note: character vectors, first element used. convert [default TRUE] TRUE, hash converted hex representation character string, FALSE, output directly raw vector, NA, vector (32-bit) integer values. file character file name / path. specified, ‘x’ ignored. file stream hashed, thus capable handling files larger memory.","code":""},{"path":"https://shikokuchuo.net/secretbase/reference/sha256.html","id":"value","dir":"Reference","previous_headings":"","what":"Value","title":"SHA-256 Cryptographic Hash Algorithm — sha256","text":"character string, raw integer vector depending ‘convert’.","code":""},{"path":"https://shikokuchuo.net/secretbase/reference/sha256.html","id":"r-serialization-stream-hashing","dir":"Reference","previous_headings":"","what":"R Serialization Stream Hashing","title":"SHA-256 Cryptographic Hash Algorithm — sha256","text":"used, serialization always version 3 big-endian represenation headers (containing R version native encoding information) skipped ensure portability across platforms.","code":""},{"path":"https://shikokuchuo.net/secretbase/reference/sha256.html","id":"references","dir":"Reference","previous_headings":"","what":"References","title":"SHA-256 Cryptographic Hash Algorithm — sha256","text":"SHA-256 Secure Hash Standard published National Institute Standards Technology (NIST) 2002 https://csrc.nist.gov/publications/fips/fips180-2/fips180-2.pdf. implementation based one 'Mbed TLS Contributors' 'Mbed TLS' Trusted Firmware Project https://www.trustedfirmware.org/projects/mbed-tls.","code":""},{"path":"https://shikokuchuo.net/secretbase/reference/sha256.html","id":"ref-examples","dir":"Reference","previous_headings":"","what":"Examples","title":"SHA-256 Cryptographic Hash Algorithm — sha256","text":"","code":"# SHA-256 hash as character string: sha256(\"secret base\") #> [1] \"1951c1ca3d50e95e6ede2b1c26fefd0f0e8eba1e51a837f8ccefb583a2b686fe\" # SHA-256 hash as raw vector: sha256(\"secret base\", convert = FALSE) #> [1] 19 51 c1 ca 3d 50 e9 5e 6e de 2b 1c 26 fe fd 0f 0e 8e ba 1e 51 a8 37 f8 cc #> [26] ef b5 83 a2 b6 86 fe # SHA-256 hash a file: file <- tempfile(); cat(\"secret base\", file = file) sha256(file = file) #> [1] \"1951c1ca3d50e95e6ede2b1c26fefd0f0e8eba1e51a837f8ccefb583a2b686fe\" unlink(file) # SHA-256 HMAC using a character string secret key: sha256(\"secret\", key = \"base\") #> [1] \"14b24e4c66bd03c1d6b59bc59e1e47468a437001662ae4be2cb30e0483e13e44\" # SHA-256 HMAC using a raw vector secret key: sha256(\"secret\", key = charToRaw(\"base\")) #> [1] \"14b24e4c66bd03c1d6b59bc59e1e47468a437001662ae4be2cb30e0483e13e44\""},{"path":"https://shikokuchuo.net/secretbase/reference/sha3.html","id":null,"dir":"Reference","previous_headings":"","what":"SHA-3 Cryptographic Hash Algorithms — sha3","title":"SHA-3 Cryptographic Hash Algorithms — sha3","text":"Returns SHA-3 hash supplied object file.","code":""},{"path":"https://shikokuchuo.net/secretbase/reference/sha3.html","id":"ref-usage","dir":"Reference","previous_headings":"","what":"Usage","title":"SHA-3 Cryptographic Hash Algorithms — sha3","text":"","code":"sha3(x, bits = 256L, convert = TRUE, file)"},{"path":"https://shikokuchuo.net/secretbase/reference/sha3.html","id":"arguments","dir":"Reference","previous_headings":"","what":"Arguments","title":"SHA-3 Cryptographic Hash Algorithms — sha3","text":"x object hash. character string raw vector (without attributes) hashed ‘’. objects stream hashed using R serialization (without allocation serialized object). bits [default 256L] output size returned hash. Must one 224, 256, 384 512. convert [default TRUE] TRUE, hash converted hex representation character string, FALSE, output directly raw vector, NA, vector (32-bit) integer values. file character file name / path. specified, ‘x’ ignored. file stream hashed, thus capable handling files larger memory.","code":""},{"path":"https://shikokuchuo.net/secretbase/reference/sha3.html","id":"value","dir":"Reference","previous_headings":"","what":"Value","title":"SHA-3 Cryptographic Hash Algorithms — sha3","text":"character string, raw integer vector depending ‘convert’.","code":""},{"path":"https://shikokuchuo.net/secretbase/reference/sha3.html","id":"r-serialization-stream-hashing","dir":"Reference","previous_headings":"","what":"R Serialization Stream Hashing","title":"SHA-3 Cryptographic Hash Algorithms — sha3","text":"used, serialization always version 3 big-endian represenation headers (containing R version native encoding information) skipped ensure portability across platforms.","code":""},{"path":"https://shikokuchuo.net/secretbase/reference/sha3.html","id":"references","dir":"Reference","previous_headings":"","what":"References","title":"SHA-3 Cryptographic Hash Algorithms — sha3","text":"SHA-3 Secure Hash Standard published National Institute Standards Technology (NIST) 2015 doi:10.6028/NIST.FIPS.202 . implementation based one 'Mbed TLS Contributors' 'Mbed TLS' Trusted Firmware Project https://www.trustedfirmware.org/projects/mbed-tls.","code":""},{"path":"https://shikokuchuo.net/secretbase/reference/sha3.html","id":"ref-examples","dir":"Reference","previous_headings":"","what":"Examples","title":"SHA-3 Cryptographic Hash Algorithms — sha3","text":"","code":"# SHA3-256 hash as character string: sha3(\"secret base\") #> [1] \"a721d57570e7ce366adee2fccbe9770723c6e3622549c31c7cab9dbb4a795520\" # SHA3-256 hash as raw vector: sha3(\"secret base\", convert = FALSE) #> [1] a7 21 d5 75 70 e7 ce 36 6a de e2 fc cb e9 77 07 23 c6 e3 62 25 49 c3 1c 7c #> [26] ab 9d bb 4a 79 55 20 # SHA3-224 hash as character string: sha3(\"secret base\", bits = 224) #> [1] \"5511b3469d3f1a87b62ce8f0d2dc9510ec5e4547579b8afb32052f99\" # SHA3-384 hash as character string: sha3(\"secret base\", bits = 384) #> [1] \"79e54f865df004dde10dc2f61baf47eb4637c68d87a2baeb7fe6bc0ac983c2154835ec7deb49b16c246c0dc1d43e32f9\" # SHA3-512 hash as character string: sha3(\"secret base\", bits = 512) #> [1] \"31076b4690961320a761be0951eeaa9efd0c75c37137a2a50877cbebb8afcc6d7927c41a120ae8fa73fdce8fff726fcbc51d448d020240bc7455963a16e639b1\" # SHA3-256 hash a file: file <- tempfile(); cat(\"secret base\", file = file) sha3(file = file) #> [1] \"a721d57570e7ce366adee2fccbe9770723c6e3622549c31c7cab9dbb4a795520\" unlink(file)"},{"path":"https://shikokuchuo.net/secretbase/reference/shake256.html","id":null,"dir":"Reference","previous_headings":"","what":"SHAKE256 Extendable Output Function — shake256","title":"SHAKE256 Extendable Output Function — shake256","text":"Returns SHAKE256 hash supplied object file.","code":""},{"path":"https://shikokuchuo.net/secretbase/reference/shake256.html","id":"ref-usage","dir":"Reference","previous_headings":"","what":"Usage","title":"SHAKE256 Extendable Output Function — shake256","text":"","code":"shake256(x, bits = 256L, convert = TRUE, file)"},{"path":"https://shikokuchuo.net/secretbase/reference/shake256.html","id":"arguments","dir":"Reference","previous_headings":"","what":"Arguments","title":"SHAKE256 Extendable Output Function — shake256","text":"x object hash. character string raw vector (without attributes) hashed ‘’. objects stream hashed using R serialization (without allocation serialized object). bits [default 256L] output size returned hash. Must 8 2^24 coercible integer. convert [default TRUE] TRUE, hash converted hex representation character string, FALSE, output directly raw vector, NA, vector (32-bit) integer values. file character file name / path. specified, ‘x’ ignored. file stream hashed, thus capable handling files larger memory.","code":""},{"path":"https://shikokuchuo.net/secretbase/reference/shake256.html","id":"value","dir":"Reference","previous_headings":"","what":"Value","title":"SHAKE256 Extendable Output Function — shake256","text":"character string, raw integer vector depending ‘convert’.","code":""},{"path":"https://shikokuchuo.net/secretbase/reference/shake256.html","id":"details","dir":"Reference","previous_headings":"","what":"Details","title":"SHAKE256 Extendable Output Function — shake256","text":"produce single integer values suitable use random seeds R's pseudo random number generators (RNGs), set ‘bits’ 32 ‘convert’ NA.","code":""},{"path":"https://shikokuchuo.net/secretbase/reference/shake256.html","id":"r-serialization-stream-hashing","dir":"Reference","previous_headings":"","what":"R Serialization Stream Hashing","title":"SHAKE256 Extendable Output Function — shake256","text":"used, serialization always version 3 big-endian represenation headers (containing R version native encoding information) skipped ensure portability across platforms.","code":""},{"path":"https://shikokuchuo.net/secretbase/reference/shake256.html","id":"references","dir":"Reference","previous_headings":"","what":"References","title":"SHAKE256 Extendable Output Function — shake256","text":"implementation based one 'Mbed TLS Contributors' 'Mbed TLS' Trusted Firmware Project https://www.trustedfirmware.org/projects/mbed-tls.","code":""},{"path":"https://shikokuchuo.net/secretbase/reference/shake256.html","id":"ref-examples","dir":"Reference","previous_headings":"","what":"Examples","title":"SHAKE256 Extendable Output Function — shake256","text":"","code":"# SHAKE256 hash as character string: shake256(\"secret base\") #> [1] \"995ebac18dbfeb170606cbbc0f2accce85db4db0dcf4fbe4d3efaf8ccf4e0a94\" # SHAKE256 hash as raw vector: shake256(\"secret base\", convert = FALSE) #> [1] 99 5e ba c1 8d bf eb 17 06 06 cb bc 0f 2a cc ce 85 db 4d b0 dc f4 fb e4 d3 #> [26] ef af 8c cf 4e 0a 94 # SHAKE256 hash to integer: shake256(\"secret base\", bits = 32L, convert = NA) #> [1] -1044750695 # SHAKE256 hash a file: file <- tempfile(); cat(\"secret base\", file = file) shake256(file = file) #> [1] \"995ebac18dbfeb170606cbbc0f2accce85db4db0dcf4fbe4d3efaf8ccf4e0a94\" unlink(file)"},{"path":"https://shikokuchuo.net/secretbase/reference/siphash13.html","id":null,"dir":"Reference","previous_headings":"","what":"SipHash Pseudorandom Function — siphash13","title":"SipHash Pseudorandom Function — siphash13","text":"Returns fast, cryptographically-strong SipHash keyed hash supplied object file. SipHash-1-3 optimised performance. Note: SipHash cryptographic hash algorithm.","code":""},{"path":"https://shikokuchuo.net/secretbase/reference/siphash13.html","id":"ref-usage","dir":"Reference","previous_headings":"","what":"Usage","title":"SipHash Pseudorandom Function — siphash13","text":"","code":"siphash13(x, key = NULL, convert = TRUE, file)"},{"path":"https://shikokuchuo.net/secretbase/reference/siphash13.html","id":"arguments","dir":"Reference","previous_headings":"","what":"Arguments","title":"SipHash Pseudorandom Function — siphash13","text":"x object hash. character string raw vector (without attributes) hashed ‘’. objects stream hashed using R serialization (without allocation serialized object). key [default NULL] character string raw vector comprising 16 byte (128 bit) key data, else NULL equivalent '0'. longer vector supplied, first 16 bytes used, shorter, padded trailing '0'. Note: character vectors, first element used. convert [default TRUE] TRUE, hash converted hex representation character string, FALSE, output directly raw vector, NA, vector (32-bit) integer values. file character file name / path. specified, ‘x’ ignored. file stream hashed, thus capable handling files larger memory.","code":""},{"path":"https://shikokuchuo.net/secretbase/reference/siphash13.html","id":"value","dir":"Reference","previous_headings":"","what":"Value","title":"SipHash Pseudorandom Function — siphash13","text":"character string, raw integer vector depending ‘convert’.","code":""},{"path":"https://shikokuchuo.net/secretbase/reference/siphash13.html","id":"r-serialization-stream-hashing","dir":"Reference","previous_headings":"","what":"R Serialization Stream Hashing","title":"SipHash Pseudorandom Function — siphash13","text":"used, serialization always version 3 big-endian represenation headers (containing R version native encoding information) skipped ensure portability across platforms.","code":""},{"path":"https://shikokuchuo.net/secretbase/reference/siphash13.html","id":"references","dir":"Reference","previous_headings":"","what":"References","title":"SipHash Pseudorandom Function — siphash13","text":"SipHash family cryptographically-strong pseudorandom functions (PRFs) described 'SipHash: fast short-input PRF', Jean-Philippe Aumasson Daniel J. Bernstein, Paper 2012/351, 2012, Cryptology ePrint Archive https://ia.cr/2012/351. implementation based SipHash streaming implementation Daniele Nicolodi, David Rheinsberg Tom Gundersen https://github.com/c-util/c-siphash. turn based SipHash reference implementation Jean-Philippe Aumasson Daniel J. Bernstein released public domain https://github.com/veorq/SipHash.","code":""},{"path":"https://shikokuchuo.net/secretbase/reference/siphash13.html","id":"ref-examples","dir":"Reference","previous_headings":"","what":"Examples","title":"SipHash Pseudorandom Function — siphash13","text":"","code":"# SipHash-1-3 hash as character string: siphash13(\"secret base\") #> [1] \"48c60a316babef0e\" # SipHash-1-3 hash as raw vector: siphash13(\"secret base\", convert = FALSE) #> [1] 48 c6 0a 31 6b ab ef 0e # SipHash-1-3 hash using a character string key: siphash13(\"secret\", key = \"base\") #> [1] \"a790b03148f72cce\" # SipHash-1-3 hash using a raw vector key: siphash13(\"secret\", key = charToRaw(\"base\")) #> [1] \"a790b03148f72cce\" # SipHash-1-3 hash a file: file <- tempfile(); cat(\"secret base\", file = file) siphash13(file = file) #> [1] \"48c60a316babef0e\" unlink(file)"},{"path":"https://shikokuchuo.net/secretbase/news/index.html","id":"secretbase-1029000-development","dir":"Changelog","previous_headings":"","what":"secretbase 1.0.2.9000 (development)","title":"secretbase 1.0.2.9000 (development)","text":"base64dec() now emits suppressable warning failing convert back character string.","code":""},{"path":"https://shikokuchuo.net/secretbase/news/index.html","id":"secretbase-102","dir":"Changelog","previous_headings":"","what":"secretbase 1.0.2","title":"secretbase 1.0.2","text":"CRAN release: 2024-09-09 Improves hash performance situations, especially large files, optimizing buffer sizes.","code":""},{"path":"https://shikokuchuo.net/secretbase/news/index.html","id":"secretbase-101","dir":"Changelog","previous_headings":"","what":"secretbase 1.0.1","title":"secretbase 1.0.1","text":"CRAN release: 2024-07-22 Improved error message argument ‘convert’ logical type.","code":""},{"path":"https://shikokuchuo.net/secretbase/news/index.html","id":"secretbase-100","dir":"Changelog","previous_headings":"","what":"secretbase 1.0.0","title":"secretbase 1.0.0","text":"CRAN release: 2024-06-16 Adds base64 encoding decoding. sha3() restricts ‘bit’ argument one 224, 256, 384 512.","code":""},{"path":"https://shikokuchuo.net/secretbase/news/index.html","id":"secretbase-050","dir":"Changelog","previous_headings":"","what":"secretbase 0.5.0","title":"secretbase 0.5.0","text":"CRAN release: 2024-04-25 Adds Keccak cryptographic hash algorithm. Adds shake256() delineate sha3(). Use sha3() supplying ‘bit’ argument 224, 256, 384 512 deprecated.","code":""},{"path":"https://shikokuchuo.net/secretbase/news/index.html","id":"secretbase-040","dir":"Changelog","previous_headings":"","what":"secretbase 0.4.0","title":"secretbase 0.4.0","text":"CRAN release: 2024-04-04 Adds HMAC generation sha256(). Adds SipHash pseudo-random function (PRF) fast, cryptographically-strong keyed hash.","code":""},{"path":"https://shikokuchuo.net/secretbase/news/index.html","id":"secretbase-0301","dir":"Changelog","previous_headings":"","what":"secretbase 0.3.0.1","title":"secretbase 0.3.0.1","text":"CRAN release: 2024-03-01 CRAN release correcting Clang-UBSAN checks.","code":""},{"path":"https://shikokuchuo.net/secretbase/news/index.html","id":"secretbase-030","dir":"Changelog","previous_headings":"","what":"secretbase 0.3.0","title":"secretbase 0.3.0","text":"CRAN release: 2024-02-21 Adds SHA-256 cryptographic hash algorithm. Folds file hashing ‘file’ argument main hash function.","code":""},{"path":"https://shikokuchuo.net/secretbase/news/index.html","id":"secretbase-020","dir":"Changelog","previous_headings":"","what":"secretbase 0.2.0","title":"secretbase 0.2.0","text":"CRAN release: 2024-02-01 Adds file hashing interface.","code":""},{"path":"https://shikokuchuo.net/secretbase/news/index.html","id":"secretbase-010","dir":"Changelog","previous_headings":"","what":"secretbase 0.1.0","title":"secretbase 0.1.0","text":"CRAN release: 2024-01-22 Initial CRAN release.","code":""},{"path":"https://shikokuchuo.net/secretbase/news/index.html","id":"secretbase-001","dir":"Changelog","previous_headings":"","what":"secretbase 0.0.1","title":"secretbase 0.0.1","text":"Initial release rOpenSci R-universe Github.","code":""}] +[{"path":[]},{"path":"https://shikokuchuo.net/secretbase/CODE_OF_CONDUCT.html","id":"our-pledge","dir":"","previous_headings":"","what":"Our Pledge","title":"Contributor Covenant Code of Conduct","text":"members, contributors, leaders pledge make participation community harassment-free experience everyone, regardless age, body size, visible invisible disability, ethnicity, sex characteristics, gender identity expression, level experience, education, socio-economic status, nationality, personal appearance, race, religion, sexual identity orientation. pledge act interact ways contribute open, welcoming, diverse, inclusive, healthy community.","code":""},{"path":"https://shikokuchuo.net/secretbase/CODE_OF_CONDUCT.html","id":"our-standards","dir":"","previous_headings":"","what":"Our Standards","title":"Contributor Covenant Code of Conduct","text":"Examples behavior contributes positive environment community include: Demonstrating empathy kindness toward people respectful differing opinions, viewpoints, experiences Giving gracefully accepting constructive feedback Accepting responsibility apologizing affected mistakes, learning experience Focusing best just us individuals, overall community Examples unacceptable behavior include: use sexualized language imagery, sexual attention advances kind Trolling, insulting derogatory comments, personal political attacks Public private harassment Publishing others’ private information, physical email address, without explicit permission conduct reasonably considered inappropriate professional setting","code":""},{"path":"https://shikokuchuo.net/secretbase/CODE_OF_CONDUCT.html","id":"enforcement-responsibilities","dir":"","previous_headings":"","what":"Enforcement Responsibilities","title":"Contributor Covenant Code of Conduct","text":"Community leaders responsible clarifying enforcing standards acceptable behavior take appropriate fair corrective action response behavior deem inappropriate, threatening, offensive, harmful. Community leaders right responsibility remove, edit, reject comments, commits, code, wiki edits, issues, contributions aligned Code Conduct, communicate reasons moderation decisions appropriate.","code":""},{"path":"https://shikokuchuo.net/secretbase/CODE_OF_CONDUCT.html","id":"scope","dir":"","previous_headings":"","what":"Scope","title":"Contributor Covenant Code of Conduct","text":"Code Conduct applies within community spaces, also applies individual officially representing community public spaces. Examples representing community include using official e-mail address, posting via official social media account, acting appointed representative online offline event.","code":""},{"path":"https://shikokuchuo.net/secretbase/CODE_OF_CONDUCT.html","id":"enforcement","dir":"","previous_headings":"","what":"Enforcement","title":"Contributor Covenant Code of Conduct","text":"Instances abusive, harassing, otherwise unacceptable behavior may reported community leaders responsible enforcement code@hibiki-ai.com. complaints reviewed investigated promptly fairly. community leaders obligated respect privacy security reporter incident.","code":""},{"path":"https://shikokuchuo.net/secretbase/CODE_OF_CONDUCT.html","id":"enforcement-guidelines","dir":"","previous_headings":"","what":"Enforcement Guidelines","title":"Contributor Covenant Code of Conduct","text":"Community leaders follow Community Impact Guidelines determining consequences action deem violation Code Conduct:","code":""},{"path":"https://shikokuchuo.net/secretbase/CODE_OF_CONDUCT.html","id":"id_1-correction","dir":"","previous_headings":"Enforcement Guidelines","what":"1. Correction","title":"Contributor Covenant Code of Conduct","text":"Community Impact: Use inappropriate language behavior deemed unprofessional unwelcome community. Consequence: private, written warning community leaders, providing clarity around nature violation explanation behavior inappropriate. public apology may requested.","code":""},{"path":"https://shikokuchuo.net/secretbase/CODE_OF_CONDUCT.html","id":"id_2-warning","dir":"","previous_headings":"Enforcement Guidelines","what":"2. Warning","title":"Contributor Covenant Code of Conduct","text":"Community Impact: violation single incident series actions. Consequence: warning consequences continued behavior. interaction people involved, including unsolicited interaction enforcing Code Conduct, specified period time. includes avoiding interactions community spaces well external channels like social media. Violating terms may lead temporary permanent ban.","code":""},{"path":"https://shikokuchuo.net/secretbase/CODE_OF_CONDUCT.html","id":"id_3-temporary-ban","dir":"","previous_headings":"Enforcement Guidelines","what":"3. Temporary Ban","title":"Contributor Covenant Code of Conduct","text":"Community Impact: serious violation community standards, including sustained inappropriate behavior. Consequence: temporary ban sort interaction public communication community specified period time. public private interaction people involved, including unsolicited interaction enforcing Code Conduct, allowed period. Violating terms may lead permanent ban.","code":""},{"path":"https://shikokuchuo.net/secretbase/CODE_OF_CONDUCT.html","id":"id_4-permanent-ban","dir":"","previous_headings":"Enforcement Guidelines","what":"4. Permanent Ban","title":"Contributor Covenant Code of Conduct","text":"Community Impact: Demonstrating pattern violation community standards, including sustained inappropriate behavior, harassment individual, aggression toward disparagement classes individuals. Consequence: permanent ban sort public interaction within community.","code":""},{"path":"https://shikokuchuo.net/secretbase/CODE_OF_CONDUCT.html","id":"attribution","dir":"","previous_headings":"","what":"Attribution","title":"Contributor Covenant Code of Conduct","text":"Code Conduct adapted Contributor Covenant, version 2.0, available https://www.contributor-covenant.org/version/2/0/code_of_conduct.html. Community Impact Guidelines inspired Mozilla’s code conduct enforcement ladder. answers common questions code conduct, see FAQ https://www.contributor-covenant.org/faq. Translations available https://www.contributor-covenant.org/translations.","code":""},{"path":"https://shikokuchuo.net/secretbase/LICENSE.html","id":null,"dir":"","previous_headings":"","what":"GNU General Public License","title":"GNU General Public License","text":"Version 3, 29 June 2007Copyright © 2007 Free Software Foundation, Inc. Everyone permitted copy distribute verbatim copies license document, changing allowed.","code":""},{"path":"https://shikokuchuo.net/secretbase/LICENSE.html","id":"preamble","dir":"","previous_headings":"","what":"Preamble","title":"GNU General Public License","text":"GNU General Public License free, copyleft license software kinds works. licenses software practical works designed take away freedom share change works. contrast, GNU General Public License intended guarantee freedom share change versions program–make sure remains free software users. , Free Software Foundation, use GNU General Public License software; applies also work released way authors. can apply programs, . speak free software, referring freedom, price. General Public Licenses designed make sure freedom distribute copies free software (charge wish), receive source code can get want , can change software use pieces new free programs, know can things. protect rights, need prevent others denying rights asking surrender rights. Therefore, certain responsibilities distribute copies software, modify : responsibilities respect freedom others. example, distribute copies program, whether gratis fee, must pass recipients freedoms received. must make sure , , receive can get source code. must show terms know rights. Developers use GNU GPL protect rights two steps: (1) assert copyright software, (2) offer License giving legal permission copy, distribute /modify . developers’ authors’ protection, GPL clearly explains warranty free software. users’ authors’ sake, GPL requires modified versions marked changed, problems attributed erroneously authors previous versions. devices designed deny users access install run modified versions software inside , although manufacturer can . fundamentally incompatible aim protecting users’ freedom change software. systematic pattern abuse occurs area products individuals use, precisely unacceptable. Therefore, designed version GPL prohibit practice products. problems arise substantially domains, stand ready extend provision domains future versions GPL, needed protect freedom users. Finally, every program threatened constantly software patents. States allow patents restrict development use software general-purpose computers, , wish avoid special danger patents applied free program make effectively proprietary. prevent , GPL assures patents used render program non-free. precise terms conditions copying, distribution modification follow.","code":""},{"path":[]},{"path":"https://shikokuchuo.net/secretbase/LICENSE.html","id":"id_0-definitions","dir":"","previous_headings":"TERMS AND CONDITIONS","what":"0. Definitions","title":"GNU General Public License","text":"“License” refers version 3 GNU General Public License. “Copyright” also means copyright-like laws apply kinds works, semiconductor masks. “Program” refers copyrightable work licensed License. licensee addressed “”. “Licensees” “recipients” may individuals organizations. “modify” work means copy adapt part work fashion requiring copyright permission, making exact copy. resulting work called “modified version” earlier work work “based ” earlier work. “covered work” means either unmodified Program work based Program. “propagate” work means anything , without permission, make directly secondarily liable infringement applicable copyright law, except executing computer modifying private copy. Propagation includes copying, distribution (without modification), making available public, countries activities well. “convey” work means kind propagation enables parties make receive copies. Mere interaction user computer network, transfer copy, conveying. interactive user interface displays “Appropriate Legal Notices” extent includes convenient prominently visible feature (1) displays appropriate copyright notice, (2) tells user warranty work (except extent warranties provided), licensees may convey work License, view copy License. interface presents list user commands options, menu, prominent item list meets criterion.","code":""},{"path":"https://shikokuchuo.net/secretbase/LICENSE.html","id":"id_1-source-code","dir":"","previous_headings":"TERMS AND CONDITIONS","what":"1. Source Code","title":"GNU General Public License","text":"“source code” work means preferred form work making modifications . “Object code” means non-source form work. “Standard Interface” means interface either official standard defined recognized standards body, , case interfaces specified particular programming language, one widely used among developers working language. “System Libraries” executable work include anything, work whole, () included normal form packaging Major Component, part Major Component, (b) serves enable use work Major Component, implement Standard Interface implementation available public source code form. “Major Component”, context, means major essential component (kernel, window system, ) specific operating system () executable work runs, compiler used produce work, object code interpreter used run . “Corresponding Source” work object code form means source code needed generate, install, (executable work) run object code modify work, including scripts control activities. However, include work’s System Libraries, general-purpose tools generally available free programs used unmodified performing activities part work. example, Corresponding Source includes interface definition files associated source files work, source code shared libraries dynamically linked subprograms work specifically designed require, intimate data communication control flow subprograms parts work. Corresponding Source need include anything users can regenerate automatically parts Corresponding Source. Corresponding Source work source code form work.","code":""},{"path":"https://shikokuchuo.net/secretbase/LICENSE.html","id":"id_2-basic-permissions","dir":"","previous_headings":"TERMS AND CONDITIONS","what":"2. Basic Permissions","title":"GNU General Public License","text":"rights granted License granted term copyright Program, irrevocable provided stated conditions met. License explicitly affirms unlimited permission run unmodified Program. output running covered work covered License output, given content, constitutes covered work. License acknowledges rights fair use equivalent, provided copyright law. may make, run propagate covered works convey, without conditions long license otherwise remains force. may convey covered works others sole purpose make modifications exclusively , provide facilities running works, provided comply terms License conveying material control copyright. thus making running covered works must exclusively behalf, direction control, terms prohibit making copies copyrighted material outside relationship . Conveying circumstances permitted solely conditions stated . Sublicensing allowed; section 10 makes unnecessary.","code":""},{"path":"https://shikokuchuo.net/secretbase/LICENSE.html","id":"id_3-protecting-users-legal-rights-from-anti-circumvention-law","dir":"","previous_headings":"TERMS AND CONDITIONS","what":"3. Protecting Users’ Legal Rights From Anti-Circumvention Law","title":"GNU General Public License","text":"covered work shall deemed part effective technological measure applicable law fulfilling obligations article 11 WIPO copyright treaty adopted 20 December 1996, similar laws prohibiting restricting circumvention measures. convey covered work, waive legal power forbid circumvention technological measures extent circumvention effected exercising rights License respect covered work, disclaim intention limit operation modification work means enforcing, work’s users, third parties’ legal rights forbid circumvention technological measures.","code":""},{"path":"https://shikokuchuo.net/secretbase/LICENSE.html","id":"id_4-conveying-verbatim-copies","dir":"","previous_headings":"TERMS AND CONDITIONS","what":"4. Conveying Verbatim Copies","title":"GNU General Public License","text":"may convey verbatim copies Program’s source code receive , medium, provided conspicuously appropriately publish copy appropriate copyright notice; keep intact notices stating License non-permissive terms added accord section 7 apply code; keep intact notices absence warranty; give recipients copy License along Program. may charge price price copy convey, may offer support warranty protection fee.","code":""},{"path":"https://shikokuchuo.net/secretbase/LICENSE.html","id":"id_5-conveying-modified-source-versions","dir":"","previous_headings":"TERMS AND CONDITIONS","what":"5. Conveying Modified Source Versions","title":"GNU General Public License","text":"may convey work based Program, modifications produce Program, form source code terms section 4, provided also meet conditions: ) work must carry prominent notices stating modified , giving relevant date. b) work must carry prominent notices stating released License conditions added section 7. requirement modifies requirement section 4 “keep intact notices”. c) must license entire work, whole, License anyone comes possession copy. License therefore apply, along applicable section 7 additional terms, whole work, parts, regardless packaged. License gives permission license work way, invalidate permission separately received . d) work interactive user interfaces, must display Appropriate Legal Notices; however, Program interactive interfaces display Appropriate Legal Notices, work need make . compilation covered work separate independent works, nature extensions covered work, combined form larger program, volume storage distribution medium, called “aggregate” compilation resulting copyright used limit access legal rights compilation’s users beyond individual works permit. Inclusion covered work aggregate cause License apply parts aggregate.","code":""},{"path":"https://shikokuchuo.net/secretbase/LICENSE.html","id":"id_6-conveying-non-source-forms","dir":"","previous_headings":"TERMS AND CONDITIONS","what":"6. Conveying Non-Source Forms","title":"GNU General Public License","text":"may convey covered work object code form terms sections 4 5, provided also convey machine-readable Corresponding Source terms License, one ways: ) Convey object code , embodied , physical product (including physical distribution medium), accompanied Corresponding Source fixed durable physical medium customarily used software interchange. b) Convey object code , embodied , physical product (including physical distribution medium), accompanied written offer, valid least three years valid long offer spare parts customer support product model, give anyone possesses object code either (1) copy Corresponding Source software product covered License, durable physical medium customarily used software interchange, price reasonable cost physically performing conveying source, (2) access copy Corresponding Source network server charge. c) Convey individual copies object code copy written offer provide Corresponding Source. alternative allowed occasionally noncommercially, received object code offer, accord subsection 6b. d) Convey object code offering access designated place (gratis charge), offer equivalent access Corresponding Source way place charge. need require recipients copy Corresponding Source along object code. place copy object code network server, Corresponding Source may different server (operated third party) supports equivalent copying facilities, provided maintain clear directions next object code saying find Corresponding Source. Regardless server hosts Corresponding Source, remain obligated ensure available long needed satisfy requirements. e) Convey object code using peer--peer transmission, provided inform peers object code Corresponding Source work offered general public charge subsection 6d. separable portion object code, whose source code excluded Corresponding Source System Library, need included conveying object code work. “User Product” either (1) “consumer product”, means tangible personal property normally used personal, family, household purposes, (2) anything designed sold incorporation dwelling. determining whether product consumer product, doubtful cases shall resolved favor coverage. particular product received particular user, “normally used” refers typical common use class product, regardless status particular user way particular user actually uses, expects expected use, product. product consumer product regardless whether product substantial commercial, industrial non-consumer uses, unless uses represent significant mode use product. “Installation Information” User Product means methods, procedures, authorization keys, information required install execute modified versions covered work User Product modified version Corresponding Source. information must suffice ensure continued functioning modified object code case prevented interfered solely modification made. convey object code work section , , specifically use , User Product, conveying occurs part transaction right possession use User Product transferred recipient perpetuity fixed term (regardless transaction characterized), Corresponding Source conveyed section must accompanied Installation Information. requirement apply neither third party retains ability install modified object code User Product (example, work installed ROM). requirement provide Installation Information include requirement continue provide support service, warranty, updates work modified installed recipient, User Product modified installed. Access network may denied modification materially adversely affects operation network violates rules protocols communication across network. Corresponding Source conveyed, Installation Information provided, accord section must format publicly documented (implementation available public source code form), must require special password key unpacking, reading copying.","code":""},{"path":"https://shikokuchuo.net/secretbase/LICENSE.html","id":"id_7-additional-terms","dir":"","previous_headings":"TERMS AND CONDITIONS","what":"7. Additional Terms","title":"GNU General Public License","text":"“Additional permissions” terms supplement terms License making exceptions one conditions. Additional permissions applicable entire Program shall treated though included License, extent valid applicable law. additional permissions apply part Program, part may used separately permissions, entire Program remains governed License without regard additional permissions. convey copy covered work, may option remove additional permissions copy, part . (Additional permissions may written require removal certain cases modify work.) may place additional permissions material, added covered work, can give appropriate copyright permission. Notwithstanding provision License, material add covered work, may (authorized copyright holders material) supplement terms License terms: ) Disclaiming warranty limiting liability differently terms sections 15 16 License; b) Requiring preservation specified reasonable legal notices author attributions material Appropriate Legal Notices displayed works containing ; c) Prohibiting misrepresentation origin material, requiring modified versions material marked reasonable ways different original version; d) Limiting use publicity purposes names licensors authors material; e) Declining grant rights trademark law use trade names, trademarks, service marks; f) Requiring indemnification licensors authors material anyone conveys material (modified versions ) contractual assumptions liability recipient, liability contractual assumptions directly impose licensors authors. non-permissive additional terms considered “restrictions” within meaning section 10. Program received , part , contains notice stating governed License along term restriction, may remove term. license document contains restriction permits relicensing conveying License, may add covered work material governed terms license document, provided restriction survive relicensing conveying. add terms covered work accord section, must place, relevant source files, statement additional terms apply files, notice indicating find applicable terms. Additional terms, permissive non-permissive, may stated form separately written license, stated exceptions; requirements apply either way.","code":""},{"path":"https://shikokuchuo.net/secretbase/LICENSE.html","id":"id_8-termination","dir":"","previous_headings":"TERMS AND CONDITIONS","what":"8. Termination","title":"GNU General Public License","text":"may propagate modify covered work except expressly provided License. attempt otherwise propagate modify void, automatically terminate rights License (including patent licenses granted third paragraph section 11). However, cease violation License, license particular copyright holder reinstated () provisionally, unless copyright holder explicitly finally terminates license, (b) permanently, copyright holder fails notify violation reasonable means prior 60 days cessation. Moreover, license particular copyright holder reinstated permanently copyright holder notifies violation reasonable means, first time received notice violation License (work) copyright holder, cure violation prior 30 days receipt notice. Termination rights section terminate licenses parties received copies rights License. rights terminated permanently reinstated, qualify receive new licenses material section 10.","code":""},{"path":"https://shikokuchuo.net/secretbase/LICENSE.html","id":"id_9-acceptance-not-required-for-having-copies","dir":"","previous_headings":"TERMS AND CONDITIONS","what":"9. Acceptance Not Required for Having Copies","title":"GNU General Public License","text":"required accept License order receive run copy Program. Ancillary propagation covered work occurring solely consequence using peer--peer transmission receive copy likewise require acceptance. However, nothing License grants permission propagate modify covered work. actions infringe copyright accept License. Therefore, modifying propagating covered work, indicate acceptance License .","code":""},{"path":"https://shikokuchuo.net/secretbase/LICENSE.html","id":"id_10-automatic-licensing-of-downstream-recipients","dir":"","previous_headings":"TERMS AND CONDITIONS","what":"10. Automatic Licensing of Downstream Recipients","title":"GNU General Public License","text":"time convey covered work, recipient automatically receives license original licensors, run, modify propagate work, subject License. responsible enforcing compliance third parties License. “entity transaction” transaction transferring control organization, substantially assets one, subdividing organization, merging organizations. propagation covered work results entity transaction, party transaction receives copy work also receives whatever licenses work party’s predecessor interest give previous paragraph, plus right possession Corresponding Source work predecessor interest, predecessor can get reasonable efforts. may impose restrictions exercise rights granted affirmed License. example, may impose license fee, royalty, charge exercise rights granted License, may initiate litigation (including cross-claim counterclaim lawsuit) alleging patent claim infringed making, using, selling, offering sale, importing Program portion .","code":""},{"path":"https://shikokuchuo.net/secretbase/LICENSE.html","id":"id_11-patents","dir":"","previous_headings":"TERMS AND CONDITIONS","what":"11. Patents","title":"GNU General Public License","text":"“contributor” copyright holder authorizes use License Program work Program based. work thus licensed called contributor’s “contributor version”. contributor’s “essential patent claims” patent claims owned controlled contributor, whether already acquired hereafter acquired, infringed manner, permitted License, making, using, selling contributor version, include claims infringed consequence modification contributor version. purposes definition, “control” includes right grant patent sublicenses manner consistent requirements License. contributor grants non-exclusive, worldwide, royalty-free patent license contributor’s essential patent claims, make, use, sell, offer sale, import otherwise run, modify propagate contents contributor version. following three paragraphs, “patent license” express agreement commitment, however denominated, enforce patent (express permission practice patent covenant sue patent infringement). “grant” patent license party means make agreement commitment enforce patent party. convey covered work, knowingly relying patent license, Corresponding Source work available anyone copy, free charge terms License, publicly available network server readily accessible means, must either (1) cause Corresponding Source available, (2) arrange deprive benefit patent license particular work, (3) arrange, manner consistent requirements License, extend patent license downstream recipients. “Knowingly relying” means actual knowledge , patent license, conveying covered work country, recipient’s use covered work country, infringe one identifiable patents country reason believe valid. , pursuant connection single transaction arrangement, convey, propagate procuring conveyance , covered work, grant patent license parties receiving covered work authorizing use, propagate, modify convey specific copy covered work, patent license grant automatically extended recipients covered work works based . patent license “discriminatory” include within scope coverage, prohibits exercise , conditioned non-exercise one rights specifically granted License. may convey covered work party arrangement third party business distributing software, make payment third party based extent activity conveying work, third party grants, parties receive covered work , discriminatory patent license () connection copies covered work conveyed (copies made copies), (b) primarily connection specific products compilations contain covered work, unless entered arrangement, patent license granted, prior 28 March 2007. Nothing License shall construed excluding limiting implied license defenses infringement may otherwise available applicable patent law.","code":""},{"path":"https://shikokuchuo.net/secretbase/LICENSE.html","id":"id_12-no-surrender-of-others-freedom","dir":"","previous_headings":"TERMS AND CONDITIONS","what":"12. No Surrender of Others’ Freedom","title":"GNU General Public License","text":"conditions imposed (whether court order, agreement otherwise) contradict conditions License, excuse conditions License. convey covered work satisfy simultaneously obligations License pertinent obligations, consequence may convey . example, agree terms obligate collect royalty conveying convey Program, way satisfy terms License refrain entirely conveying Program.","code":""},{"path":"https://shikokuchuo.net/secretbase/LICENSE.html","id":"id_13-use-with-the-gnu-affero-general-public-license","dir":"","previous_headings":"TERMS AND CONDITIONS","what":"13. Use with the GNU Affero General Public License","title":"GNU General Public License","text":"Notwithstanding provision License, permission link combine covered work work licensed version 3 GNU Affero General Public License single combined work, convey resulting work. terms License continue apply part covered work, special requirements GNU Affero General Public License, section 13, concerning interaction network apply combination .","code":""},{"path":"https://shikokuchuo.net/secretbase/LICENSE.html","id":"id_14-revised-versions-of-this-license","dir":"","previous_headings":"TERMS AND CONDITIONS","what":"14. Revised Versions of this License","title":"GNU General Public License","text":"Free Software Foundation may publish revised /new versions GNU General Public License time time. new versions similar spirit present version, may differ detail address new problems concerns. version given distinguishing version number. Program specifies certain numbered version GNU General Public License “later version” applies , option following terms conditions either numbered version later version published Free Software Foundation. Program specify version number GNU General Public License, may choose version ever published Free Software Foundation. Program specifies proxy can decide future versions GNU General Public License can used, proxy’s public statement acceptance version permanently authorizes choose version Program. Later license versions may give additional different permissions. However, additional obligations imposed author copyright holder result choosing follow later version.","code":""},{"path":"https://shikokuchuo.net/secretbase/LICENSE.html","id":"id_15-disclaimer-of-warranty","dir":"","previous_headings":"TERMS AND CONDITIONS","what":"15. Disclaimer of Warranty","title":"GNU General Public License","text":"WARRANTY PROGRAM, EXTENT PERMITTED APPLICABLE LAW. EXCEPT OTHERWISE STATED WRITING COPYRIGHT HOLDERS /PARTIES PROVIDE PROGRAM “” WITHOUT WARRANTY KIND, EITHER EXPRESSED IMPLIED, INCLUDING, LIMITED , IMPLIED WARRANTIES MERCHANTABILITY FITNESS PARTICULAR PURPOSE. ENTIRE RISK QUALITY PERFORMANCE PROGRAM . PROGRAM PROVE DEFECTIVE, ASSUME COST NECESSARY SERVICING, REPAIR CORRECTION.","code":""},{"path":"https://shikokuchuo.net/secretbase/LICENSE.html","id":"id_16-limitation-of-liability","dir":"","previous_headings":"TERMS AND CONDITIONS","what":"16. Limitation of Liability","title":"GNU General Public License","text":"EVENT UNLESS REQUIRED APPLICABLE LAW AGREED WRITING COPYRIGHT HOLDER, PARTY MODIFIES /CONVEYS PROGRAM PERMITTED , LIABLE DAMAGES, INCLUDING GENERAL, SPECIAL, INCIDENTAL CONSEQUENTIAL DAMAGES ARISING USE INABILITY USE PROGRAM (INCLUDING LIMITED LOSS DATA DATA RENDERED INACCURATE LOSSES SUSTAINED THIRD PARTIES FAILURE PROGRAM OPERATE PROGRAMS), EVEN HOLDER PARTY ADVISED POSSIBILITY DAMAGES.","code":""},{"path":"https://shikokuchuo.net/secretbase/LICENSE.html","id":"id_17-interpretation-of-sections-15-and-16","dir":"","previous_headings":"TERMS AND CONDITIONS","what":"17. Interpretation of Sections 15 and 16","title":"GNU General Public License","text":"disclaimer warranty limitation liability provided given local legal effect according terms, reviewing courts shall apply local law closely approximates absolute waiver civil liability connection Program, unless warranty assumption liability accompanies copy Program return fee. END TERMS CONDITIONS","code":""},{"path":"https://shikokuchuo.net/secretbase/LICENSE.html","id":"how-to-apply-these-terms-to-your-new-programs","dir":"","previous_headings":"","what":"How to Apply These Terms to Your New Programs","title":"GNU General Public License","text":"develop new program, want greatest possible use public, best way achieve make free software everyone can redistribute change terms. , attach following notices program. safest attach start source file effectively state exclusion warranty; file least “copyright” line pointer full notice found. Also add information contact electronic paper mail. program terminal interaction, make output short notice like starts interactive mode: hypothetical commands show w show c show appropriate parts General Public License. course, program’s commands might different; GUI interface, use “box”. also get employer (work programmer) school, , sign “copyright disclaimer” program, necessary. information , apply follow GNU GPL, see . GNU General Public License permit incorporating program proprietary programs. program subroutine library, may consider useful permit linking proprietary applications library. want , use GNU Lesser General Public License instead License. first, please read .","code":" Copyright (C) This program is free software: you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version. This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details. You should have received a copy of the GNU General Public License along with this program. If not, see . Copyright (C) This program comes with ABSOLUTELY NO WARRANTY; for details type 'show w'. This is free software, and you are welcome to redistribute it under certain conditions; type 'show c' for details."},{"path":"https://shikokuchuo.net/secretbase/authors.html","id":null,"dir":"","previous_headings":"","what":"Authors","title":"Authors and Citation","text":"Charlie Gao. Author, maintainer. Hibiki AI Limited. Copyright holder.","code":""},{"path":"https://shikokuchuo.net/secretbase/authors.html","id":"citation","dir":"","previous_headings":"","what":"Citation","title":"Authors and Citation","text":"Gao C (2024). secretbase: Cryptographic Hash, Extendable-Output Base64 Functions. R package version 1.0.3, https://doi.org/10.5281/zenodo.10553139.","code":"@Manual{, title = {secretbase: Cryptographic Hash, Extendable-Output and Base64 Functions}, author = {Charlie Gao}, year = {2024}, note = {R package version 1.0.3}, url = {https://doi.org/10.5281/zenodo.10553139}, }"},{"path":"https://shikokuchuo.net/secretbase/index.html","id":"secretbase","dir":"","previous_headings":"","what":"Cryptographic Hash, Extendable-Output and Base64 Functions","title":"Cryptographic Hash, Extendable-Output and Base64 Functions","text":"Fast memory-efficient streaming hash functions base64 encoding / decoding. Hashes strings raw vectors directly. Stream hashes files potentially larger memory, well -memory objects R’s serialization mechanism. Implementations include SHA-256, SHA-3 ‘Keccak’ cryptographic hash functions, SHAKE256 extendable-output function (XOF), ‘SipHash’ pseudo-random function.","code":"________ /\\ sec \\ / \\ ret \\ \\ / base / \\/_______/"},{"path":"https://shikokuchuo.net/secretbase/index.html","id":"overview","dir":"","previous_headings":"","what":"Overview","title":"Cryptographic Hash, Extendable-Output and Base64 Functions","text":"","code":"library(secretbase)"},{"path":"https://shikokuchuo.net/secretbase/index.html","id":"sha-3","dir":"","previous_headings":"Overview","what":"SHA-3","title":"Cryptographic Hash, Extendable-Output and Base64 Functions","text":"SHA-3 cryptographic hash algorithm, specify bits one 224, 256, 384 512:","code":"sha3(\"secret base\") #> [1] \"a721d57570e7ce366adee2fccbe9770723c6e3622549c31c7cab9dbb4a795520\" sha3(\"secret base\", convert = FALSE) #> [1] a7 21 d5 75 70 e7 ce 36 6a de e2 fc cb e9 77 07 23 c6 e3 62 25 49 c3 1c 7c #> [26] ab 9d bb 4a 79 55 20 sha3(\"秘密の基地の中\", bits = 512L) #> [1] \"e30cdc73f6575c40d55b5edc8eb4f97940f5ca491640b41612e02a05f3e59dd9c6c33f601d8d7a8e2ca0504b8c22f7bc69fa8f10d7c01aab392781ff4ae1e610\""},{"path":"https://shikokuchuo.net/secretbase/index.html","id":"hash-strings-and-raw-vectors","dir":"","previous_headings":"Overview","what":"Hash strings and raw vectors","title":"Cryptographic Hash, Extendable-Output and Base64 Functions","text":"Character strings raw vectors hashed directly ().","code":""},{"path":"https://shikokuchuo.net/secretbase/index.html","id":"stream-hash-r-objects","dir":"","previous_headings":"Overview","what":"Stream hash R objects","title":"Cryptographic Hash, Extendable-Output and Base64 Functions","text":"objects stream hashed using R serialization memory-efficient performed without allocation serialized object portable always uses R serialization version 3, big-endian representation, skipping headers (contain R version native encoding information)","code":"sha3(data.frame(a = 1, b = 2), bits = 224L) #> [1] \"03778aad53bff7dd68caab94374bba6f07cea235fb97b3c52cf612e9\" sha3(NULL) #> [1] \"b3e37e4c5def1bfb2841b79ef8503b83d1fed46836b5b913d7c16de92966dcee\""},{"path":"https://shikokuchuo.net/secretbase/index.html","id":"stream-hash-files","dir":"","previous_headings":"Overview","what":"Stream hash files","title":"Cryptographic Hash, Extendable-Output and Base64 Functions","text":"Files read hashed incrementally, accepting files larger memory:","code":"file <- tempfile(); cat(\"secret base\", file = file) sha3(file = file) #> [1] \"a721d57570e7ce366adee2fccbe9770723c6e3622549c31c7cab9dbb4a795520\""},{"path":"https://shikokuchuo.net/secretbase/index.html","id":"hash-to-integer--shake256-xof","dir":"","previous_headings":"Overview","what":"Hash to integer / SHAKE256 XOF","title":"Cryptographic Hash, Extendable-Output and Base64 Functions","text":"May used deterministic random seeds R’s pseudo random number generators (RNGs). Specify convert = NA bits = 32 single integer value: use parallel computing, valid method reducing negligible probability RNGs process may overlap. may especially suitable first-best alternatives using recursive streams expensive unable preserve reproducibility. [1]","code":"shake256(\"秘密の基地の中\", bits = 32L, convert = NA) #> [1] 2000208511"},{"path":"https://shikokuchuo.net/secretbase/index.html","id":"keccak","dir":"","previous_headings":"Overview","what":"Keccak","title":"Cryptographic Hash, Extendable-Output and Base64 Functions","text":"","code":"keccak(\"secret base\", bits = 384L) #> [1] \"c82bae24175676028e44aa08b9e2424311847adb0b071c68c7ea47edf049b0e935ddd2fc7c499333bccc08c7eb7b1203\""},{"path":"https://shikokuchuo.net/secretbase/index.html","id":"sha-256","dir":"","previous_headings":"Overview","what":"SHA-256","title":"Cryptographic Hash, Extendable-Output and Base64 Functions","text":"SHA-256 HMAC, pass key character string raw vector:","code":"sha256(\"secret base\") #> [1] \"1951c1ca3d50e95e6ede2b1c26fefd0f0e8eba1e51a837f8ccefb583a2b686fe\" sha256(\"secret base\", key = \"秘密の基地の中\") #> [1] \"ec58099ab21325e792bef8f1aafc0a70e1a7227463cfc410931112705d753392\""},{"path":"https://shikokuchuo.net/secretbase/index.html","id":"siphash","dir":"","previous_headings":"Overview","what":"SipHash","title":"Cryptographic Hash, Extendable-Output and Base64 Functions","text":"SipHash-1-3 optimized performance. Pass key character string raw vector 16 bytes (128 bits):","code":"siphash13(\"secret base\", key = charToRaw(\"秘密の基地の中\")) #> [1] \"a1f0a751892cc7dd\""},{"path":"https://shikokuchuo.net/secretbase/index.html","id":"base64-encoding--decoding","dir":"","previous_headings":"Overview","what":"Base64 Encoding / Decoding","title":"Cryptographic Hash, Extendable-Output and Base64 Functions","text":"Strings: Raw vectors: Serialized objects:","code":"base64enc(\"secret base\") #> [1] \"c2VjcmV0IGJhc2U=\" base64dec(base64enc(\"secret base\")) #> [1] \"secret base\" base64enc(as.raw(c(1L, 2L, 4L)), convert = FALSE) #> [1] 41 51 49 45 base64dec(base64enc(as.raw(c(1L, 2L, 4L))), convert = FALSE) #> [1] 01 02 04 base64enc(data.frame()) #> [1] \"WAoAAAADAAQEAQADBQAAAAAFVVRGLTgAAAMTAAAAAAAABAIAAAABAAQACQAAAAVuYW1lcwAAABAAAAAAAAAEAgAAAAEABAAJAAAACXJvdy5uYW1lcwAAAA0AAAAAAAAEAgAAAAEABAAJAAAABWNsYXNzAAAAEAAAAAEABAAJAAAACmRhdGEuZnJhbWUAAAD+\" base64dec(base64enc(data.frame()), convert = NA) #> data frame with 0 columns and 0 rows"},{"path":"https://shikokuchuo.net/secretbase/index.html","id":"installation","dir":"","previous_headings":"","what":"Installation","title":"Cryptographic Hash, Extendable-Output and Base64 Functions","text":"Install latest release CRAN R-multiverse: current development version available R-universe:","code":"install.packages(\"secretbase\") install.packages(\"secretbase\", repos = \"https://shikokuchuo.r-universe.dev\")"},{"path":"https://shikokuchuo.net/secretbase/index.html","id":"implementation","dir":"","previous_headings":"","what":"Implementation","title":"Cryptographic Hash, Extendable-Output and Base64 Functions","text":"SHA-3 Secure Hash Standard published National Institute Standards Technology (NIST) 2015 doi:10.6028/NIST.FIPS.202. SHA-3 based Keccak algorithm, designed G. Bertoni, J. Daemen, M. Peeters G. Van Assche. SHA-256 Secure Hash Standard published NIST 2002 https://csrc.nist.gov/publications/fips/fips180-2/fips180-2.pdf. SHA-256, SHA-3, Keccak, base64 implementations based ‘Mbed TLS’ Trusted Firmware Project https://www.trustedfirmware.org/projects/mbed-tls. SipHash family pseudo-random functions Jean-Philippe Aumasson Daniel J. Bernstein published 2012 https://ia.cr/2012/351. [2] SipHash implementation based Daniele Nicolodi, David Rheinsberg Tom Gundersen https://github.com/c-util/c-siphash, turn based reference implementation Jean-Philippe Aumasson Daniel J. Bernstein released public domain https://github.com/veorq/SipHash.","code":""},{"path":"https://shikokuchuo.net/secretbase/index.html","id":"references","dir":"","previous_headings":"","what":"References","title":"Cryptographic Hash, Extendable-Output and Base64 Functions","text":"[1] Pierre L’Ecuyer, David Munger, Boris Oreshkin Richard Simard (2017), “Random numbers parallel computers: Requirements methods, emphasis GPUs”, Mathematics Computers Simulation, Vol. 135, May 2017, pp. 3-17 doi:10.1016/j.matcom.2016.05.00. [2] Jean-Philippe Aumasson Daniel J. Bernstein (2012), “SipHash: fast short-input PRF”, Paper 2012/351, Cryptology ePrint Archive, https://ia.cr/2012/351.","code":""},{"path":"https://shikokuchuo.net/secretbase/index.html","id":"links","dir":"","previous_headings":"","what":"Links","title":"Cryptographic Hash, Extendable-Output and Base64 Functions","text":"◈ secretbase R package: https://shikokuchuo.net/secretbase/ Mbed TLS website: https://www.trustedfirmware.org/projects/mbed-tls SipHash streaming implementation: https://github.com/c-util/c-siphash SipHash reference implementation: https://github.com/veorq/SipHash – Please note project released Contributor Code Conduct. participating project agree abide terms.","code":""},{"path":"https://shikokuchuo.net/secretbase/reference/base64dec.html","id":null,"dir":"Reference","previous_headings":"","what":"Base64 Decode — base64dec","title":"Base64 Decode — base64dec","text":"Decodes character string, raw vector object base64 encoding.","code":""},{"path":"https://shikokuchuo.net/secretbase/reference/base64dec.html","id":"ref-usage","dir":"Reference","previous_headings":"","what":"Usage","title":"Base64 Decode — base64dec","text":"","code":"base64dec(x, convert = TRUE)"},{"path":"https://shikokuchuo.net/secretbase/reference/base64dec.html","id":"arguments","dir":"Reference","previous_headings":"","what":"Arguments","title":"Base64 Decode — base64dec","text":"x object. convert [default TRUE] logical TRUE convert back character string, FALSE convert back raw vector NA decode unserialize back original object.","code":""},{"path":"https://shikokuchuo.net/secretbase/reference/base64dec.html","id":"value","dir":"Reference","previous_headings":"","what":"Value","title":"Base64 Decode — base64dec","text":"character string, raw vector, object depending value ‘convert’. conversion character string fails, raw vector returned instead (accompanied warning).","code":""},{"path":"https://shikokuchuo.net/secretbase/reference/base64dec.html","id":"details","dir":"Reference","previous_headings":"","what":"Details","title":"Base64 Decode — base64dec","text":"value ‘convert’ set TRUE, FALSE NA reverse 3 encoding operations (strings, raw vectors arbitrary objects), order return original object.","code":""},{"path":"https://shikokuchuo.net/secretbase/reference/base64dec.html","id":"references","dir":"Reference","previous_headings":"","what":"References","title":"Base64 Decode — base64dec","text":"implementation based 'Mbed TLS Contributors' 'Mbed TLS' Trusted Firmware Project https://www.trustedfirmware.org/projects/mbed-tls.","code":""},{"path":[]},{"path":"https://shikokuchuo.net/secretbase/reference/base64dec.html","id":"ref-examples","dir":"Reference","previous_headings":"","what":"Examples","title":"Base64 Decode — base64dec","text":"","code":"base64dec(base64enc(\"secret base\")) #> [1] \"secret base\" base64dec(base64enc(as.raw(c(1L, 2L, 4L))), convert = FALSE) #> [1] 01 02 04 base64dec(base64enc(data.frame()), convert = NA) #> data frame with 0 columns and 0 rows"},{"path":"https://shikokuchuo.net/secretbase/reference/base64enc.html","id":null,"dir":"Reference","previous_headings":"","what":"Base64 Encode — base64enc","title":"Base64 Encode — base64enc","text":"Encodes character string, raw vector object base64 encoding.","code":""},{"path":"https://shikokuchuo.net/secretbase/reference/base64enc.html","id":"ref-usage","dir":"Reference","previous_headings":"","what":"Usage","title":"Base64 Encode — base64enc","text":"","code":"base64enc(x, convert = TRUE)"},{"path":"https://shikokuchuo.net/secretbase/reference/base64enc.html","id":"arguments","dir":"Reference","previous_headings":"","what":"Arguments","title":"Base64 Encode — base64enc","text":"x object. convert [default TRUE] logical TRUE encode character string FALSE raw vector.","code":""},{"path":"https://shikokuchuo.net/secretbase/reference/base64enc.html","id":"value","dir":"Reference","previous_headings":"","what":"Value","title":"Base64 Encode — base64enc","text":"character string raw vector depending value ‘convert’.","code":""},{"path":"https://shikokuchuo.net/secretbase/reference/base64enc.html","id":"details","dir":"Reference","previous_headings":"","what":"Details","title":"Base64 Encode — base64enc","text":"character string raw vector (attributes) encoded , whilst objects first serialized (using R serialisation version 3, big-endian representation).","code":""},{"path":"https://shikokuchuo.net/secretbase/reference/base64enc.html","id":"references","dir":"Reference","previous_headings":"","what":"References","title":"Base64 Encode — base64enc","text":"implementation based 'Mbed TLS Contributors' 'Mbed TLS' Trusted Firmware Project https://www.trustedfirmware.org/projects/mbed-tls.","code":""},{"path":[]},{"path":"https://shikokuchuo.net/secretbase/reference/base64enc.html","id":"ref-examples","dir":"Reference","previous_headings":"","what":"Examples","title":"Base64 Encode — base64enc","text":"","code":"base64enc(\"secret base\") #> [1] \"c2VjcmV0IGJhc2U=\" base64enc(as.raw(c(1L, 2L, 4L)), convert = FALSE) #> [1] 41 51 49 45 base64enc(data.frame()) #> [1] \"WAoAAAADAAQEAQADBQAAAAAFVVRGLTgAAAMTAAAAAAAABAIAAAABAAQACQAAAAVuYW1lcwAAABAAAAAAAAAEAgAAAAEABAAJAAAACXJvdy5uYW1lcwAAAA0AAAAAAAAEAgAAAAEABAAJAAAABWNsYXNzAAAAEAAAAAEABAAJAAAACmRhdGEuZnJhbWUAAAD+\""},{"path":"https://shikokuchuo.net/secretbase/reference/keccak.html","id":null,"dir":"Reference","previous_headings":"","what":"Keccak Cryptographic Hash Algorithms — keccak","title":"Keccak Cryptographic Hash Algorithms — keccak","text":"Returns Keccak hash supplied object file.","code":""},{"path":"https://shikokuchuo.net/secretbase/reference/keccak.html","id":"ref-usage","dir":"Reference","previous_headings":"","what":"Usage","title":"Keccak Cryptographic Hash Algorithms — keccak","text":"","code":"keccak(x, bits = 256L, convert = TRUE, file)"},{"path":"https://shikokuchuo.net/secretbase/reference/keccak.html","id":"arguments","dir":"Reference","previous_headings":"","what":"Arguments","title":"Keccak Cryptographic Hash Algorithms — keccak","text":"x object hash. character string raw vector (without attributes) hashed ‘’. objects stream hashed using R serialization (without allocation serialized object). bits [default 256L] output size returned hash. Must one 224, 256, 384 512. convert [default TRUE] TRUE, hash converted hex representation character string, FALSE, output directly raw vector, NA, vector (32-bit) integer values. file character file name / path. specified, ‘x’ ignored. file stream hashed, thus capable handling files larger memory.","code":""},{"path":"https://shikokuchuo.net/secretbase/reference/keccak.html","id":"value","dir":"Reference","previous_headings":"","what":"Value","title":"Keccak Cryptographic Hash Algorithms — keccak","text":"character string, raw integer vector depending ‘convert’.","code":""},{"path":"https://shikokuchuo.net/secretbase/reference/keccak.html","id":"r-serialization-stream-hashing","dir":"Reference","previous_headings":"","what":"R Serialization Stream Hashing","title":"Keccak Cryptographic Hash Algorithms — keccak","text":"used, serialization always version 3 big-endian represenation headers (containing R version native encoding information) skipped ensure portability across platforms.","code":""},{"path":"https://shikokuchuo.net/secretbase/reference/keccak.html","id":"references","dir":"Reference","previous_headings":"","what":"References","title":"Keccak Cryptographic Hash Algorithms — keccak","text":"Keccak underlying algorithm SHA-3, identical apart value padding parameter. Keccak algorithm designed G. Bertoni, J. Daemen, M. Peeters G. Van Assche. implementation based one 'Mbed TLS Contributors' 'Mbed TLS' Trusted Firmware Project https://www.trustedfirmware.org/projects/mbed-tls.","code":""},{"path":"https://shikokuchuo.net/secretbase/reference/keccak.html","id":"ref-examples","dir":"Reference","previous_headings":"","what":"Examples","title":"Keccak Cryptographic Hash Algorithms — keccak","text":"","code":"# Keccak-256 hash as character string: keccak(\"secret base\") #> [1] \"3fc6092bbec5a434a9933b486a89fa466c1ca013d1e37ab4348ce3764f3463d1\" # Keccak-256 hash as raw vector: keccak(\"secret base\", convert = FALSE) #> [1] 3f c6 09 2b be c5 a4 34 a9 93 3b 48 6a 89 fa 46 6c 1c a0 13 d1 e3 7a b4 34 #> [26] 8c e3 76 4f 34 63 d1 # Keccak-224 hash as character string: keccak(\"secret base\", bits = 224) #> [1] \"1ddaa7776f138ff5bba898ca7530410a52d09da412c4276bda0682a8\" # Keccak-384 hash as character string: keccak(\"secret base\", bits = 384) #> [1] \"c82bae24175676028e44aa08b9e2424311847adb0b071c68c7ea47edf049b0e935ddd2fc7c499333bccc08c7eb7b1203\" # Keccak-512 hash as character string: keccak(\"secret base\", bits = 512) #> [1] \"38297e891d9118e4cf6ff5ba6d6de8c2c3bfa790b425848da7b1d8dffcb4a6a3ca2e32ca0a66f36ce2882786ce2299642de8ffd3bae3b51a1ee145fad555a9d8\" # Keccak-256 hash a file: file <- tempfile(); cat(\"secret base\", file = file) keccak(file = file) #> [1] \"3fc6092bbec5a434a9933b486a89fa466c1ca013d1e37ab4348ce3764f3463d1\" unlink(file)"},{"path":"https://shikokuchuo.net/secretbase/reference/secretbase-package.html","id":null,"dir":"Reference","previous_headings":"","what":"secretbase: Cryptographic Hash, Extendable-Output and Base64 Functions — secretbase-package","title":"secretbase: Cryptographic Hash, Extendable-Output and Base64 Functions — secretbase-package","text":"Fast memory-efficient streaming hash functions base64 encoding / decoding. Hashes strings raw vectors directly. Stream hashes files potentially larger memory, well -memory objects R's serialization mechanism. Implementations include SHA-256, SHA-3 'Keccak' cryptographic hash functions, SHAKE256 extendable-output function (XOF), 'SipHash' pseudo-random function.","code":""},{"path":[]},{"path":"https://shikokuchuo.net/secretbase/reference/secretbase-package.html","id":"author","dir":"Reference","previous_headings":"","what":"Author","title":"secretbase: Cryptographic Hash, Extendable-Output and Base64 Functions — secretbase-package","text":"Charlie Gao charlie.gao@shikokuchuo.net (ORCID)","code":""},{"path":"https://shikokuchuo.net/secretbase/reference/sha256.html","id":null,"dir":"Reference","previous_headings":"","what":"SHA-256 Cryptographic Hash Algorithm — sha256","title":"SHA-256 Cryptographic Hash Algorithm — sha256","text":"Returns SHA-256 hash supplied object file, HMAC secret key supplied.","code":""},{"path":"https://shikokuchuo.net/secretbase/reference/sha256.html","id":"ref-usage","dir":"Reference","previous_headings":"","what":"Usage","title":"SHA-256 Cryptographic Hash Algorithm — sha256","text":"","code":"sha256(x, key = NULL, convert = TRUE, file)"},{"path":"https://shikokuchuo.net/secretbase/reference/sha256.html","id":"arguments","dir":"Reference","previous_headings":"","what":"Arguments","title":"SHA-256 Cryptographic Hash Algorithm — sha256","text":"x object hash. character string raw vector (without attributes) hashed ‘’. objects stream hashed using R serialization (without allocation serialized object). key [default NULL] NULL, SHA-256 hash ‘x’ returned. Alternatively, supply character string raw vector secret key generate HMAC. Note: character vectors, first element used. convert [default TRUE] TRUE, hash converted hex representation character string, FALSE, output directly raw vector, NA, vector (32-bit) integer values. file character file name / path. specified, ‘x’ ignored. file stream hashed, thus capable handling files larger memory.","code":""},{"path":"https://shikokuchuo.net/secretbase/reference/sha256.html","id":"value","dir":"Reference","previous_headings":"","what":"Value","title":"SHA-256 Cryptographic Hash Algorithm — sha256","text":"character string, raw integer vector depending ‘convert’.","code":""},{"path":"https://shikokuchuo.net/secretbase/reference/sha256.html","id":"r-serialization-stream-hashing","dir":"Reference","previous_headings":"","what":"R Serialization Stream Hashing","title":"SHA-256 Cryptographic Hash Algorithm — sha256","text":"used, serialization always version 3 big-endian represenation headers (containing R version native encoding information) skipped ensure portability across platforms.","code":""},{"path":"https://shikokuchuo.net/secretbase/reference/sha256.html","id":"references","dir":"Reference","previous_headings":"","what":"References","title":"SHA-256 Cryptographic Hash Algorithm — sha256","text":"SHA-256 Secure Hash Standard published National Institute Standards Technology (NIST) 2002 https://csrc.nist.gov/publications/fips/fips180-2/fips180-2.pdf. implementation based one 'Mbed TLS Contributors' 'Mbed TLS' Trusted Firmware Project https://www.trustedfirmware.org/projects/mbed-tls.","code":""},{"path":"https://shikokuchuo.net/secretbase/reference/sha256.html","id":"ref-examples","dir":"Reference","previous_headings":"","what":"Examples","title":"SHA-256 Cryptographic Hash Algorithm — sha256","text":"","code":"# SHA-256 hash as character string: sha256(\"secret base\") #> [1] \"1951c1ca3d50e95e6ede2b1c26fefd0f0e8eba1e51a837f8ccefb583a2b686fe\" # SHA-256 hash as raw vector: sha256(\"secret base\", convert = FALSE) #> [1] 19 51 c1 ca 3d 50 e9 5e 6e de 2b 1c 26 fe fd 0f 0e 8e ba 1e 51 a8 37 f8 cc #> [26] ef b5 83 a2 b6 86 fe # SHA-256 hash a file: file <- tempfile(); cat(\"secret base\", file = file) sha256(file = file) #> [1] \"1951c1ca3d50e95e6ede2b1c26fefd0f0e8eba1e51a837f8ccefb583a2b686fe\" unlink(file) # SHA-256 HMAC using a character string secret key: sha256(\"secret\", key = \"base\") #> [1] \"14b24e4c66bd03c1d6b59bc59e1e47468a437001662ae4be2cb30e0483e13e44\" # SHA-256 HMAC using a raw vector secret key: sha256(\"secret\", key = charToRaw(\"base\")) #> [1] \"14b24e4c66bd03c1d6b59bc59e1e47468a437001662ae4be2cb30e0483e13e44\""},{"path":"https://shikokuchuo.net/secretbase/reference/sha3.html","id":null,"dir":"Reference","previous_headings":"","what":"SHA-3 Cryptographic Hash Algorithms — sha3","title":"SHA-3 Cryptographic Hash Algorithms — sha3","text":"Returns SHA-3 hash supplied object file.","code":""},{"path":"https://shikokuchuo.net/secretbase/reference/sha3.html","id":"ref-usage","dir":"Reference","previous_headings":"","what":"Usage","title":"SHA-3 Cryptographic Hash Algorithms — sha3","text":"","code":"sha3(x, bits = 256L, convert = TRUE, file)"},{"path":"https://shikokuchuo.net/secretbase/reference/sha3.html","id":"arguments","dir":"Reference","previous_headings":"","what":"Arguments","title":"SHA-3 Cryptographic Hash Algorithms — sha3","text":"x object hash. character string raw vector (without attributes) hashed ‘’. objects stream hashed using R serialization (without allocation serialized object). bits [default 256L] output size returned hash. Must one 224, 256, 384 512. convert [default TRUE] TRUE, hash converted hex representation character string, FALSE, output directly raw vector, NA, vector (32-bit) integer values. file character file name / path. specified, ‘x’ ignored. file stream hashed, thus capable handling files larger memory.","code":""},{"path":"https://shikokuchuo.net/secretbase/reference/sha3.html","id":"value","dir":"Reference","previous_headings":"","what":"Value","title":"SHA-3 Cryptographic Hash Algorithms — sha3","text":"character string, raw integer vector depending ‘convert’.","code":""},{"path":"https://shikokuchuo.net/secretbase/reference/sha3.html","id":"r-serialization-stream-hashing","dir":"Reference","previous_headings":"","what":"R Serialization Stream Hashing","title":"SHA-3 Cryptographic Hash Algorithms — sha3","text":"used, serialization always version 3 big-endian represenation headers (containing R version native encoding information) skipped ensure portability across platforms.","code":""},{"path":"https://shikokuchuo.net/secretbase/reference/sha3.html","id":"references","dir":"Reference","previous_headings":"","what":"References","title":"SHA-3 Cryptographic Hash Algorithms — sha3","text":"SHA-3 Secure Hash Standard published National Institute Standards Technology (NIST) 2015 doi:10.6028/NIST.FIPS.202 . implementation based one 'Mbed TLS Contributors' 'Mbed TLS' Trusted Firmware Project https://www.trustedfirmware.org/projects/mbed-tls.","code":""},{"path":"https://shikokuchuo.net/secretbase/reference/sha3.html","id":"ref-examples","dir":"Reference","previous_headings":"","what":"Examples","title":"SHA-3 Cryptographic Hash Algorithms — sha3","text":"","code":"# SHA3-256 hash as character string: sha3(\"secret base\") #> [1] \"a721d57570e7ce366adee2fccbe9770723c6e3622549c31c7cab9dbb4a795520\" # SHA3-256 hash as raw vector: sha3(\"secret base\", convert = FALSE) #> [1] a7 21 d5 75 70 e7 ce 36 6a de e2 fc cb e9 77 07 23 c6 e3 62 25 49 c3 1c 7c #> [26] ab 9d bb 4a 79 55 20 # SHA3-224 hash as character string: sha3(\"secret base\", bits = 224) #> [1] \"5511b3469d3f1a87b62ce8f0d2dc9510ec5e4547579b8afb32052f99\" # SHA3-384 hash as character string: sha3(\"secret base\", bits = 384) #> [1] \"79e54f865df004dde10dc2f61baf47eb4637c68d87a2baeb7fe6bc0ac983c2154835ec7deb49b16c246c0dc1d43e32f9\" # SHA3-512 hash as character string: sha3(\"secret base\", bits = 512) #> [1] \"31076b4690961320a761be0951eeaa9efd0c75c37137a2a50877cbebb8afcc6d7927c41a120ae8fa73fdce8fff726fcbc51d448d020240bc7455963a16e639b1\" # SHA3-256 hash a file: file <- tempfile(); cat(\"secret base\", file = file) sha3(file = file) #> [1] \"a721d57570e7ce366adee2fccbe9770723c6e3622549c31c7cab9dbb4a795520\" unlink(file)"},{"path":"https://shikokuchuo.net/secretbase/reference/shake256.html","id":null,"dir":"Reference","previous_headings":"","what":"SHAKE256 Extendable Output Function — shake256","title":"SHAKE256 Extendable Output Function — shake256","text":"Returns SHAKE256 hash supplied object file.","code":""},{"path":"https://shikokuchuo.net/secretbase/reference/shake256.html","id":"ref-usage","dir":"Reference","previous_headings":"","what":"Usage","title":"SHAKE256 Extendable Output Function — shake256","text":"","code":"shake256(x, bits = 256L, convert = TRUE, file)"},{"path":"https://shikokuchuo.net/secretbase/reference/shake256.html","id":"arguments","dir":"Reference","previous_headings":"","what":"Arguments","title":"SHAKE256 Extendable Output Function — shake256","text":"x object hash. character string raw vector (without attributes) hashed ‘’. objects stream hashed using R serialization (without allocation serialized object). bits [default 256L] output size returned hash. Must 8 2^24 coercible integer. convert [default TRUE] TRUE, hash converted hex representation character string, FALSE, output directly raw vector, NA, vector (32-bit) integer values. file character file name / path. specified, ‘x’ ignored. file stream hashed, thus capable handling files larger memory.","code":""},{"path":"https://shikokuchuo.net/secretbase/reference/shake256.html","id":"value","dir":"Reference","previous_headings":"","what":"Value","title":"SHAKE256 Extendable Output Function — shake256","text":"character string, raw integer vector depending ‘convert’.","code":""},{"path":"https://shikokuchuo.net/secretbase/reference/shake256.html","id":"details","dir":"Reference","previous_headings":"","what":"Details","title":"SHAKE256 Extendable Output Function — shake256","text":"produce single integer values suitable use random seeds R's pseudo random number generators (RNGs), set ‘bits’ 32 ‘convert’ NA.","code":""},{"path":"https://shikokuchuo.net/secretbase/reference/shake256.html","id":"r-serialization-stream-hashing","dir":"Reference","previous_headings":"","what":"R Serialization Stream Hashing","title":"SHAKE256 Extendable Output Function — shake256","text":"used, serialization always version 3 big-endian represenation headers (containing R version native encoding information) skipped ensure portability across platforms.","code":""},{"path":"https://shikokuchuo.net/secretbase/reference/shake256.html","id":"references","dir":"Reference","previous_headings":"","what":"References","title":"SHAKE256 Extendable Output Function — shake256","text":"implementation based one 'Mbed TLS Contributors' 'Mbed TLS' Trusted Firmware Project https://www.trustedfirmware.org/projects/mbed-tls.","code":""},{"path":"https://shikokuchuo.net/secretbase/reference/shake256.html","id":"ref-examples","dir":"Reference","previous_headings":"","what":"Examples","title":"SHAKE256 Extendable Output Function — shake256","text":"","code":"# SHAKE256 hash as character string: shake256(\"secret base\") #> [1] \"995ebac18dbfeb170606cbbc0f2accce85db4db0dcf4fbe4d3efaf8ccf4e0a94\" # SHAKE256 hash as raw vector: shake256(\"secret base\", convert = FALSE) #> [1] 99 5e ba c1 8d bf eb 17 06 06 cb bc 0f 2a cc ce 85 db 4d b0 dc f4 fb e4 d3 #> [26] ef af 8c cf 4e 0a 94 # SHAKE256 hash to integer: shake256(\"secret base\", bits = 32L, convert = NA) #> [1] -1044750695 # SHAKE256 hash a file: file <- tempfile(); cat(\"secret base\", file = file) shake256(file = file) #> [1] \"995ebac18dbfeb170606cbbc0f2accce85db4db0dcf4fbe4d3efaf8ccf4e0a94\" unlink(file)"},{"path":"https://shikokuchuo.net/secretbase/reference/siphash13.html","id":null,"dir":"Reference","previous_headings":"","what":"SipHash Pseudorandom Function — siphash13","title":"SipHash Pseudorandom Function — siphash13","text":"Returns fast, cryptographically-strong SipHash keyed hash supplied object file. SipHash-1-3 optimised performance. Note: SipHash cryptographic hash algorithm.","code":""},{"path":"https://shikokuchuo.net/secretbase/reference/siphash13.html","id":"ref-usage","dir":"Reference","previous_headings":"","what":"Usage","title":"SipHash Pseudorandom Function — siphash13","text":"","code":"siphash13(x, key = NULL, convert = TRUE, file)"},{"path":"https://shikokuchuo.net/secretbase/reference/siphash13.html","id":"arguments","dir":"Reference","previous_headings":"","what":"Arguments","title":"SipHash Pseudorandom Function — siphash13","text":"x object hash. character string raw vector (without attributes) hashed ‘’. objects stream hashed using R serialization (without allocation serialized object). key [default NULL] character string raw vector comprising 16 byte (128 bit) key data, else NULL equivalent '0'. longer vector supplied, first 16 bytes used, shorter, padded trailing '0'. Note: character vectors, first element used. convert [default TRUE] TRUE, hash converted hex representation character string, FALSE, output directly raw vector, NA, vector (32-bit) integer values. file character file name / path. specified, ‘x’ ignored. file stream hashed, thus capable handling files larger memory.","code":""},{"path":"https://shikokuchuo.net/secretbase/reference/siphash13.html","id":"value","dir":"Reference","previous_headings":"","what":"Value","title":"SipHash Pseudorandom Function — siphash13","text":"character string, raw integer vector depending ‘convert’.","code":""},{"path":"https://shikokuchuo.net/secretbase/reference/siphash13.html","id":"r-serialization-stream-hashing","dir":"Reference","previous_headings":"","what":"R Serialization Stream Hashing","title":"SipHash Pseudorandom Function — siphash13","text":"used, serialization always version 3 big-endian represenation headers (containing R version native encoding information) skipped ensure portability across platforms.","code":""},{"path":"https://shikokuchuo.net/secretbase/reference/siphash13.html","id":"references","dir":"Reference","previous_headings":"","what":"References","title":"SipHash Pseudorandom Function — siphash13","text":"SipHash family cryptographically-strong pseudorandom functions (PRFs) described 'SipHash: fast short-input PRF', Jean-Philippe Aumasson Daniel J. Bernstein, Paper 2012/351, 2012, Cryptology ePrint Archive https://ia.cr/2012/351. implementation based SipHash streaming implementation Daniele Nicolodi, David Rheinsberg Tom Gundersen https://github.com/c-util/c-siphash. turn based SipHash reference implementation Jean-Philippe Aumasson Daniel J. Bernstein released public domain https://github.com/veorq/SipHash.","code":""},{"path":"https://shikokuchuo.net/secretbase/reference/siphash13.html","id":"ref-examples","dir":"Reference","previous_headings":"","what":"Examples","title":"SipHash Pseudorandom Function — siphash13","text":"","code":"# SipHash-1-3 hash as character string: siphash13(\"secret base\") #> [1] \"48c60a316babef0e\" # SipHash-1-3 hash as raw vector: siphash13(\"secret base\", convert = FALSE) #> [1] 48 c6 0a 31 6b ab ef 0e # SipHash-1-3 hash using a character string key: siphash13(\"secret\", key = \"base\") #> [1] \"a790b03148f72cce\" # SipHash-1-3 hash using a raw vector key: siphash13(\"secret\", key = charToRaw(\"base\")) #> [1] \"a790b03148f72cce\" # SipHash-1-3 hash a file: file <- tempfile(); cat(\"secret base\", file = file) siphash13(file = file) #> [1] \"48c60a316babef0e\" unlink(file)"},{"path":"https://shikokuchuo.net/secretbase/news/index.html","id":"secretbase-103","dir":"Changelog","previous_headings":"","what":"secretbase 1.0.3","title":"secretbase 1.0.3","text":"base64dec() now emits suppressable warning failing convert back character string.","code":""},{"path":"https://shikokuchuo.net/secretbase/news/index.html","id":"secretbase-102","dir":"Changelog","previous_headings":"","what":"secretbase 1.0.2","title":"secretbase 1.0.2","text":"CRAN release: 2024-09-09 Improves hash performance situations, especially large files, optimizing buffer sizes.","code":""},{"path":"https://shikokuchuo.net/secretbase/news/index.html","id":"secretbase-101","dir":"Changelog","previous_headings":"","what":"secretbase 1.0.1","title":"secretbase 1.0.1","text":"CRAN release: 2024-07-22 Improved error message argument ‘convert’ logical type.","code":""},{"path":"https://shikokuchuo.net/secretbase/news/index.html","id":"secretbase-100","dir":"Changelog","previous_headings":"","what":"secretbase 1.0.0","title":"secretbase 1.0.0","text":"CRAN release: 2024-06-16 Adds base64 encoding decoding. sha3() restricts ‘bit’ argument one 224, 256, 384 512.","code":""},{"path":"https://shikokuchuo.net/secretbase/news/index.html","id":"secretbase-050","dir":"Changelog","previous_headings":"","what":"secretbase 0.5.0","title":"secretbase 0.5.0","text":"CRAN release: 2024-04-25 Adds Keccak cryptographic hash algorithm. Adds shake256() delineate sha3(). Use sha3() supplying ‘bit’ argument 224, 256, 384 512 deprecated.","code":""},{"path":"https://shikokuchuo.net/secretbase/news/index.html","id":"secretbase-040","dir":"Changelog","previous_headings":"","what":"secretbase 0.4.0","title":"secretbase 0.4.0","text":"CRAN release: 2024-04-04 Adds HMAC generation sha256(). Adds SipHash pseudo-random function (PRF) fast, cryptographically-strong keyed hash.","code":""},{"path":"https://shikokuchuo.net/secretbase/news/index.html","id":"secretbase-0301","dir":"Changelog","previous_headings":"","what":"secretbase 0.3.0.1","title":"secretbase 0.3.0.1","text":"CRAN release: 2024-03-01 CRAN release correcting Clang-UBSAN checks.","code":""},{"path":"https://shikokuchuo.net/secretbase/news/index.html","id":"secretbase-030","dir":"Changelog","previous_headings":"","what":"secretbase 0.3.0","title":"secretbase 0.3.0","text":"CRAN release: 2024-02-21 Adds SHA-256 cryptographic hash algorithm. Folds file hashing ‘file’ argument main hash function.","code":""},{"path":"https://shikokuchuo.net/secretbase/news/index.html","id":"secretbase-020","dir":"Changelog","previous_headings":"","what":"secretbase 0.2.0","title":"secretbase 0.2.0","text":"CRAN release: 2024-02-01 Adds file hashing interface.","code":""},{"path":"https://shikokuchuo.net/secretbase/news/index.html","id":"secretbase-010","dir":"Changelog","previous_headings":"","what":"secretbase 0.1.0","title":"secretbase 0.1.0","text":"CRAN release: 2024-01-22 Initial CRAN release.","code":""},{"path":"https://shikokuchuo.net/secretbase/news/index.html","id":"secretbase-001","dir":"Changelog","previous_headings":"","what":"secretbase 0.0.1","title":"secretbase 0.0.1","text":"Initial release rOpenSci R-universe Github.","code":""}]
Gao C (2024). secretbase: Cryptographic Hash, Extendable-Output and Base64 Functions. -R package version 1.0.2.9000, https://doi.org/10.5281/zenodo.10553139. +R package version 1.0.3, https://doi.org/10.5281/zenodo.10553139.
@Manual{, title = {secretbase: Cryptographic Hash, Extendable-Output and Base64 Functions}, author = {Charlie Gao}, year = {2024}, - note = {R package version 1.0.2.9000}, + note = {R package version 1.0.3}, url = {https://doi.org/10.5281/zenodo.10553139}, }
For the SHA-3 cryptographic hash algorithm, specify bits as 224, 256, 384 or 512:
bits
224
256
384
512
For the SHA-3 cryptographic hash algorithm, specify bits as one of 224, 256, 384 or 512:
sha3("secret base") #> [1] "a721d57570e7ce366adee2fccbe9770723c6e3622549c31c7cab9dbb4a795520" @@ -119,7 +119,7 @@ Stream hash files Hash to integer / SHAKE256 XOF -May be used as deterministic random seeds for R’s pseudo random number generators (RNGs). Specify convert = NA (and bits = 32 for a single integer value): +May be used as deterministic random seeds for R’s pseudo random number generators (RNGs). Specify convert = NA and bits = 32 for a single integer value: shake256("秘密の基地の中", bits = 32L, convert = NA) #> [1] 2000208511 diff --git a/news/index.html b/news/index.html index 1f83eec..a1a6b98 100644 --- a/news/index.html +++ b/news/index.html @@ -7,7 +7,7 @@ secretbase - 1.0.2.9000 + 1.0.3 @@ -40,7 +40,7 @@ Changelog
May be used as deterministic random seeds for R’s pseudo random number generators (RNGs). Specify convert = NA (and bits = 32 for a single integer value):
convert = NA
bits = 32
May be used as deterministic random seeds for R’s pseudo random number generators (RNGs). Specify convert = NA and bits = 32 for a single integer value:
shake256("秘密の基地の中", bits = 32L, convert = NA) #> [1] 2000208511
base64dec()