hashsrv

hashsrv is a web service that performs hashing, encryption, encoding, and compression. Available functions include:
Stack InFunctionStack OutDescription
3des-blocksize8Pushes the Triple DES block size on the stack
PlainData, IV, Key3des-cfbCipherDataEncrypts data using the given IV and 24-byte Key, placing the ciphertext back on the stack. Uses Triple DES encryption and the CFB block mode.
Data, IV, Key3des-ctrRDataEncrypts or decrypts data using the given IV and 24-byte Key, placing the result back on the stack. Uses Triple DES encryption and the CTR block mode.
Data, IV, Key3des-ofbRDataEncrypts or decrypts data using the given IV and 24-byte Key, placing the result back on the stack. Uses Triple DES encryption and the OFB block mode.
Dataadler32ChecksumCompute the Adler-32 checksum
aes-blocksize16Pushes the AES block size on the stack
PlainData, IV, Keyaes-cfbCipherDataEncrypts data using the given IV and 16-byte Key, placing the ciphertext back on the stack. Uses AES encryption and the CFB block mode.
Data, IV, Keyaes-ctrRDataEncrypts or decrypts data using the given IV and 16-byte Key, placing the result back on the stack. Uses AES encryption and the CTR block mode.
Data, IV, Keyaes-ofbRDataEncrypts or decrypts data using the given IV and 16-byte Key, placing the result back on the stack. Uses AES encryption and the OFB block mode.
Val1, Val2appendAppendedAppends the value on the top of the stack to the previous value on the stack
Dataascii85EncodedDataEncode the data to ascii-85
Database32EncodedDataEncode the data to base32
Database32-hexEncodedDataEncode the data to base32 hex
Database64EncodedDataEncode the data to base64
Database64-urlEncodedDataEncode the data to base64 url
blowfish-blocksize8Pushes the blowfish block size on the stack
PlainData, IV, Keyblowfish-cfbCipherDataEncrypts data using the given IV and 1 to 56-byte Key, placing the ciphertext back on the stack. Uses Blowfish encryption and the CFB block mode.
Data, IV, Keyblowfish-ctrRDataEncrypts or decrypts data using the given IV and 1 to 56-byte Key, placing the result back on the stack. Uses Blowfish encryption and the CTR block mode.
Data, IV, Keyblowfish-ofbRDataEncrypts or decrypts data using the given IV and 1 to 56-byte Key, placing the result back on the stack. Uses Blowfish encryption and the OFB block mode.
PlainData, IV, Key, Saltblowfish-salt-cfbCipherDataEncrypts data using the given IV and 1 to 56-byte Key, placing the ciphertext back on the stack. Uses Blowfish encryption and the CFB block mode.
Data, IV, Key, Saltblowfish-salt-ctrRDataEncrypts or decrypts data using the given IV and 1 to 56-byte Key, placing the result back on the stack. Uses Blowfish encryption and the CTR block mode.
Data, IV, Key, Saltblowfish-salt-ofbRDataEncrypts or decrypts data using the given IV and 1 to 56-byte Key, placing the result back on the stack. Uses Blowfish encryption and the OFB block mode.
Namecall(varies)Loads the named value from the dictionary and executes the commands contained there (formatted like normal - /md5/hex for example)
Datacrc32ChecksumCompute the CRC-32 checksum using the IEEE polynomial
Datacrc32-castagnoliChecksumCompute the CRC-32 checksum using the Castagnoli polynomial
Datacrc32-ieeeChecksumCompute the CRC-32 checksum using the IEEE polynomial
Datacrc32-koopmanChecksumCompute the CRC-32 checksum using the Koopman polynomial
Datacrc64-ecmaChecksumCompute the CRC-64 checksum using the ECMA polynomial
Datacrc64-isoChecksumCompute the CRC-64 checksum using the ISO polynomial
Data, FactordeflateCompressedCompresses data using the flate algorithm - stack contains a compression factor where -1 is default and 0-9 controls compression (0 is none, and 9 is the most)
des-blocksize8Pushes the DES block size on the stack
PlainData, IV, Keydes-cfbCipherDataEncrypts data using the given IV and 8-byte Key, placing the ciphertext back on the stack. Uses DES encryption and the CFB block mode.
Data, IV, Keydes-ctrRDataEncrypts or decrypts data using the given IV and 8-byte Key, placing the result back on the stack. Uses DES encryption and the CTR block mode.
Data, IV, Keydes-ofbRDataEncrypts or decrypts data using the given IV and 8-byte Key, placing the result back on the stack. Uses DES encryption and the OFB block mode.
Data1, Data2eqFails the command unless the two data elements are equal
Datafnv32HashCompute the FNV-1 non-cryptographic hash for 32-bits
Datafnv32aHashCompute the FNV-1a non-cryptographic hash for 32-bits
Datafnv64HashCompute the FNV-1 non-cryptographic hash for 64-bits
Datafnv64aHashCompute the FNV-1a non-cryptographic hash for 64-bits
Data, FactorgzipCompressedCompresses data using the gzip algorithm - stack contains a compression factor where -1 is default, 0 is none, 1 is best speed, and 9 is best size
DatahexEncodedDataEncode the data to hex
Data, Keyhmac-md5HashHMAC hashes data using MD5
Data, Keyhmac-ripemd160HashHMAC hashes data using RIPEMD160
Data, Keyhmac-sha1HashHMAC hashes data using SHA1
Data, Keyhmac-sha224HashHMAC hashes data using SHA224
Data, Keyhmac-sha256HashHMAC hashes data using SHA256
Data, Keyhmac-sha384HashHMAC hashes data using SHA384
Data, Keyhmac-sha512HashHMAC hashes data using SHA512
CompressedinflateDataDecompresses data using the flate algorithm
Data, CountleftSliceOfDataTakes the leftmost bytes of data
DatalenData, LengthPushes the length of the value on the stack in bytes onto the stack
NameloadValuePushes a named value from the dictinary onto the stack
Data, Bitslzw-lsbCompressedCompresses data using the lzw algorithm - stack contains the number of bits to use for literal codes, typically 8 but can be 2-8. This version uses least significant bit ordering as used in the GIF file format.
Data, Bitslzw-msbCompressedCompresses data using the lzw algorithm - stack contains the number of bits to use for literal codes, typically 8 but can be 2-8. This version uses most significant bit ordering as used in the TIFF and PDF file formats.
Datamd5HashHashes data using MD5
md5-len16Returns the number of bytes for MD5
Data1, Data2neqFails the command unless the two data elements are not equal
DatapopPops the value off the top of the stack (effectively discarding)
DatapushData, DataDuplicates the value on the top of the stack
CountrandDataGenerates cryptographically random bytes given the count on the stack
Data, CountrightSliceOfDataTakes the rightmost bytes of data
Dataripemd160HashHashes data using RIPEMD160
ripemd160-len20Returns the number of bytes for RIPEMD160
Value, NamesavePops a value from the stack and places it into the dictionary
Datasha1HashHashes data using SHA1
sha1-len20Returns the number of bytes for SHA1
Datasha224HashHashes data using SHA224
sha224-len28Returns the number of bytes for SHA224
Datasha256HashHashes data using SHA256
sha256-len32Returns the number of bytes for SHA256
Datasha384HashHashes data using SHA384
sha384-len48Returns the number of bytes for SHA384
Datasha512HashHashes data using SHA512
sha512-len64Returns the number of bytes for SHA512
Data, Start, EndsliceSliceOfDataSlices the value on the stack, taking elements from start to end on the stack. Use -1 for values from the beginning or end. One example is /9/20/slice which takes elements 9 through 19, or /2/-1/slice which takes elements 2 through the end.
DatasnappyCompressedCompresses data using the Snappy algorithm
Data, PositionsnipData1, Data2Snips the data in half at the given position, resulting in two values on the stack
Val1, Val2swapVal2, Val1Swaps the two values at the top of the stack
twofish-blocksize16Pushes the twofish block size on the stack
PlainData, IV, Keytwofish-cfbCipherDataEncrypts data using the given IV and 16, 24, or 32-byte Key, placing the ciphertext back on the stack. Uses Twofish encryption and the CFB block mode.
Data, IV, Keytwofish-ctrRDataEncrypts or decrypts data using the given IV and 16, 24, or 32-byte Key, placing the result back on the stack. Uses Twofish encryption and the CTR block mode.
Data, IV, Keytwofish-ofbRDataEncrypts or decrypts data using the given IV and 16, 24, or 32-byte Key, placing the result back on the stack. Uses Twofish encryption and the OFB block mode.
CipherData, IV, Keyun3des-cfbPlainDataDecrypts data using the given IV and 24-byte Key, placing the plaintext back on the stack. Uses Triple DES encryption and the CFB block mode.
CipherData, IV, Keyunaes-cfbPlainDataDecrypts data using the given IV and 16-byte Key, placing the plaintext back on the stack. Uses AES encryption and the CFB block mode.
EncodedDataunascii85DataDecode the data from ascii-85
EncodedDataunbase32DataDecode the data from base32
EncodedDataunbase32-hexDataDecode the data from base32 hex
EncodedDataunbase64DataDecode the data from base64
EncodedDataunbase64-urlDataDecode the data from base64 url
CipherData, IV, Keyunblowfish-cfbPlainDataDecrypts data using the given IV and 1 to 56-byte Key, placing the plaintext back on the stack. Uses Blowfish encryption and the CFB block mode.
CipherData, IV, Key, Saltunblowfish-salt-cfbPlainDataDecrypts data using the given IV and 1 to 56-byte Key, placing the plaintext back on the stack. Uses Blowfish encryption and the CFB block mode.
Compressedunbzip2DataDecompresses data using the bzip2 algorithm
CipherData, IV, Keyundes-cfbPlainDataDecrypts data using the given IV and 8-byte Key, placing the plaintext back on the stack. Uses DES encryption and the CFB block mode.
CompressedungzipDataDecompresses data using the gzip algorithm
EncodedDataunhexDataDecode the data from hex
Compressed, Bitsunlzw-lsbDataDecompresses data using the lzw algorithm - stack contains the number of bits to use for literal codes, typically 8 but can be 2-8. This version uses least significant bit ordering as used in the GIF file format.
Compressed, Bitsunlzw-msbDataDecompresses data using the lzw algorithm - stack contains the number of bits to use for literal codes, typically 8 but can be 2-8. This version uses most significant bit ordering as used in the TIFF and PDF file formats.
CompressedunsnappyDataDecompresses data using the Snappy algorithm
CipherData, IV, Keyuntwofish-cfbPlainDataDecrypts data using the given IV and 16, 24, or 32-byte Key, placing the plaintext back on the stack. Uses Twofish encryption and the CFB block mode.
CompressedunzlibDataDecompresses data using the zlib algorithm
DatazlibCompressedCompresses data using the zlib algorithm
Variables:
NameLengthTextBytes
body0""
checksig-md565"/md5-len/snip/swap/temp/save/push/hash-hmac-md5/call/temp/load/eq"2f 6d 64 35 2d 6c 65 6e 2f 73 6e 69 70 2f 73 77 61 70 2f 74 65 6d 70 2f 73 61 76 65 2f 70 75 73 68 2f 68 61 73 68 2d 68 6d 61 63 2d 6d 64 35 2f 63 61 6c 6c 2f 74 65 6d 70 2f 6c 6f 61 64 2f 65 71
checksig-ripemd16077"/ripemd160-len/snip/swap/temp/save/push/hash-hmac-ripemd160/call/temp/load/eq"2f 72 69 70 65 6d 64 31 36 30 2d 6c 65 6e 2f 73 6e 69 70 2f 73 77 61 70 2f 74 65 6d 70 2f 73 61 76 65 2f 70 75 73 68 2f 68 61 73 68 2d 68 6d 61 63 2d 72 69 70 65 6d 64 31 36 30 2f 63 61 6c 6c 2f 74 65 6d 70 2f 6c 6f 61 64 2f 65 71
checksig-sha167"/sha1-len/snip/swap/temp/save/push/hash-hmac-sha1/call/temp/load/eq"2f 73 68 61 31 2d 6c 65 6e 2f 73 6e 69 70 2f 73 77 61 70 2f 74 65 6d 70 2f 73 61 76 65 2f 70 75 73 68 2f 68 61 73 68 2d 68 6d 61 63 2d 73 68 61 31 2f 63 61 6c 6c 2f 74 65 6d 70 2f 6c 6f 61 64 2f 65 71
checksig-sha22471"/sha224-len/snip/swap/temp/save/push/hash-hmac-sha224/call/temp/load/eq"2f 73 68 61 32 32 34 2d 6c 65 6e 2f 73 6e 69 70 2f 73 77 61 70 2f 74 65 6d 70 2f 73 61 76 65 2f 70 75 73 68 2f 68 61 73 68 2d 68 6d 61 63 2d 73 68 61 32 32 34 2f 63 61 6c 6c 2f 74 65 6d 70 2f 6c 6f 61 64 2f 65 71
checksig-sha25671"/sha256-len/snip/swap/temp/save/push/hash-hmac-sha256/call/temp/load/eq"2f 73 68 61 32 35 36 2d 6c 65 6e 2f 73 6e 69 70 2f 73 77 61 70 2f 74 65 6d 70 2f 73 61 76 65 2f 70 75 73 68 2f 68 61 73 68 2d 68 6d 61 63 2d 73 68 61 32 35 36 2f 63 61 6c 6c 2f 74 65 6d 70 2f 6c 6f 61 64 2f 65 71
checksig-sha38471"/sha384-len/snip/swap/temp/save/push/hash-hmac-sha384/call/temp/load/eq"2f 73 68 61 33 38 34 2d 6c 65 6e 2f 73 6e 69 70 2f 73 77 61 70 2f 74 65 6d 70 2f 73 61 76 65 2f 70 75 73 68 2f 68 61 73 68 2d 68 6d 61 63 2d 73 68 61 33 38 34 2f 63 61 6c 6c 2f 74 65 6d 70 2f 6c 6f 61 64 2f 65 71
checksig-sha51271"/sha512-len/snip/swap/temp/save/push/hash-hmac-sha512/call/temp/load/eq"2f 73 68 61 35 31 32 2d 6c 65 6e 2f 73 6e 69 70 2f 73 77 61 70 2f 74 65 6d 70 2f 73 61 76 65 2f 70 75 73 68 2f 68 61 73 68 2d 68 6d 61 63 2d 73 68 61 35 31 32 2f 63 61 6c 6c 2f 74 65 6d 70 2f 6c 6f 61 64 2f 65 71
decrypt-3des76"/3des-blocksize/snip/swap/key/load/push/md5/swap/crc64-iso/append/un3des-cfb"2f 33 64 65 73 2d 62 6c 6f 63 6b 73 69 7a 65 2f 73 6e 69 70 2f 73 77 61 70 2f 6b 65 79 2f 6c 6f 61 64 2f 70 75 73 68 2f 6d 64 35 2f 73 77 61 70 2f 63 72 63 36 34 2d 69 73 6f 2f 61 70 70 65 6e 64 2f 75 6e 33 64 65 73 2d 63 66 62
decrypt-aes47"/aes-blocksize/snip/swap/key/load/md5/unaes-cfb"2f 61 65 73 2d 62 6c 6f 63 6b 73 69 7a 65 2f 73 6e 69 70 2f 73 77 61 70 2f 6b 65 79 2f 6c 6f 61 64 2f 6d 64 35 2f 75 6e 61 65 73 2d 63 66 62
decrypt-blowfish60"/blowfish-blocksize/snip/swap/key/load/sha256/unblowfish-cfb"2f 62 6c 6f 77 66 69 73 68 2d 62 6c 6f 63 6b 73 69 7a 65 2f 73 6e 69 70 2f 73 77 61 70 2f 6b 65 79 2f 6c 6f 61 64 2f 73 68 61 32 35 36 2f 75 6e 62 6c 6f 77 66 69 73 68 2d 63 66 62
decrypt-des53"/des-blocksize/snip/swap/key/load/crc64-iso/undes-cfb"2f 64 65 73 2d 62 6c 6f 63 6b 73 69 7a 65 2f 73 6e 69 70 2f 73 77 61 70 2f 6b 65 79 2f 6c 6f 61 64 2f 63 72 63 36 34 2d 69 73 6f 2f 75 6e 64 65 73 2d 63 66 62
decrypt-sign-3des39"/checksig-sha256/call/decrypt-3des/call"2f 63 68 65 63 6b 73 69 67 2d 73 68 61 32 35 36 2f 63 61 6c 6c 2f 64 65 63 72 79 70 74 2d 33 64 65 73 2f 63 61 6c 6c
decrypt-sign-aes38"/checksig-sha256/call/decrypt-aes/call"2f 63 68 65 63 6b 73 69 67 2d 73 68 61 32 35 36 2f 63 61 6c 6c 2f 64 65 63 72 79 70 74 2d 61 65 73 2f 63 61 6c 6c
decrypt-sign-blowfish43"/checksig-sha256/call/decrypt-blowfish/call"2f 63 68 65 63 6b 73 69 67 2d 73 68 61 32 35 36 2f 63 61 6c 6c 2f 64 65 63 72 79 70 74 2d 62 6c 6f 77 66 69 73 68 2f 63 61 6c 6c
decrypt-sign-des38"/checksig-sha256/call/decrypt-des/call"2f 63 68 65 63 6b 73 69 67 2d 73 68 61 32 35 36 2f 63 61 6c 6c 2f 64 65 63 72 79 70 74 2d 64 65 73 2f 63 61 6c 6c
decrypt-sign-twofish42"/checksig-sha256/call/decrypt-twofish/call"2f 63 68 65 63 6b 73 69 67 2d 73 68 61 32 35 36 2f 63 61 6c 6c 2f 64 65 63 72 79 70 74 2d 74 77 6f 66 69 73 68 2f 63 61 6c 6c
decrypt-twofish58"/twofish-blocksize/snip/swap/key/load/sha256/untwofish-cfb"2f 74 77 6f 66 69 73 68 2d 62 6c 6f 63 6b 73 69 7a 65 2f 73 6e 69 70 2f 73 77 61 70 2f 6b 65 79 2f 6c 6f 61 64 2f 73 68 61 32 35 36 2f 75 6e 74 77 6f 66 69 73 68 2d 63 66 62
encrypt-3des102"/3des-blocksize/rand/push/iv/save/key/load/push/md5/swap/crc64-iso/append/3des-cfb/iv/load/swap/append"2f 33 64 65 73 2d 62 6c 6f 63 6b 73 69 7a 65 2f 72 61 6e 64 2f 70 75 73 68 2f 69 76 2f 73 61 76 65 2f 6b 65 79 2f 6c 6f 61 64 2f 70 75 73 68 2f 6d 64 35 2f 73 77 61 70 2f 63 72 63 36 34 2d 69 73 6f 2f 61 70 70 65 6e 64 2f 33 64 65 73 2d 63 66 62 2f 69 76 2f 6c 6f 61 64 2f 73 77 61 70 2f 61 70 70 65 6e 64
encrypt-aes73"/aes-blocksize/rand/push/iv/save/key/load/md5/aes-cfb/iv/load/swap/append"2f 61 65 73 2d 62 6c 6f 63 6b 73 69 7a 65 2f 72 61 6e 64 2f 70 75 73 68 2f 69 76 2f 73 61 76 65 2f 6b 65 79 2f 6c 6f 61 64 2f 6d 64 35 2f 61 65 73 2d 63 66 62 2f 69 76 2f 6c 6f 61 64 2f 73 77 61 70 2f 61 70 70 65 6e 64
encrypt-blowfish86"/blowfish-blocksize/rand/push/iv/save/key/load/sha256/blowfish-cfb/iv/load/swap/append"2f 62 6c 6f 77 66 69 73 68 2d 62 6c 6f 63 6b 73 69 7a 65 2f 72 61 6e 64 2f 70 75 73 68 2f 69 76 2f 73 61 76 65 2f 6b 65 79 2f 6c 6f 61 64 2f 73 68 61 32 35 36 2f 62 6c 6f 77 66 69 73 68 2d 63 66 62 2f 69 76 2f 6c 6f 61 64 2f 73 77 61 70 2f 61 70 70 65 6e 64
encrypt-des79"/des-blocksize/rand/push/iv/save/key/load/crc64-iso/des-cfb/iv/load/swap/append"2f 64 65 73 2d 62 6c 6f 63 6b 73 69 7a 65 2f 72 61 6e 64 2f 70 75 73 68 2f 69 76 2f 73 61 76 65 2f 6b 65 79 2f 6c 6f 61 64 2f 63 72 63 36 34 2d 69 73 6f 2f 64 65 73 2d 63 66 62 2f 69 76 2f 6c 6f 61 64 2f 73 77 61 70 2f 61 70 70 65 6e 64
encrypt-sign-3des35"/encrypt-3des/call/sign-sha256/call"2f 65 6e 63 72 79 70 74 2d 33 64 65 73 2f 63 61 6c 6c 2f 73 69 67 6e 2d 73 68 61 32 35 36 2f 63 61 6c 6c
encrypt-sign-aes34"/encrypt-aes/call/sign-sha256/call"2f 65 6e 63 72 79 70 74 2d 61 65 73 2f 63 61 6c 6c 2f 73 69 67 6e 2d 73 68 61 32 35 36 2f 63 61 6c 6c
encrypt-sign-blowfish39"/encrypt-blowfish/call/sign-sha256/call"2f 65 6e 63 72 79 70 74 2d 62 6c 6f 77 66 69 73 68 2f 63 61 6c 6c 2f 73 69 67 6e 2d 73 68 61 32 35 36 2f 63 61 6c 6c
encrypt-sign-des34"/encrypt-des/call/sign-sha256/call"2f 65 6e 63 72 79 70 74 2d 64 65 73 2f 63 61 6c 6c 2f 73 69 67 6e 2d 73 68 61 32 35 36 2f 63 61 6c 6c
encrypt-sign-twofish38"/encrypt-twofish/call/sign-sha256/call"2f 65 6e 63 72 79 70 74 2d 74 77 6f 66 69 73 68 2f 63 61 6c 6c 2f 73 69 67 6e 2d 73 68 61 32 35 36 2f 63 61 6c 6c
encrypt-twofish84"/twofish-blocksize/rand/push/iv/save/key/load/sha256/twofish-cfb/iv/load/swap/append"2f 74 77 6f 66 69 73 68 2d 62 6c 6f 63 6b 73 69 7a 65 2f 72 61 6e 64 2f 70 75 73 68 2f 69 76 2f 73 61 76 65 2f 6b 65 79 2f 6c 6f 61 64 2f 73 68 61 32 35 36 2f 74 77 6f 66 69 73 68 2d 63 66 62 2f 69 76 2f 6c 6f 61 64 2f 73 77 61 70 2f 61 70 70 65 6e 64
hash-hmac-md522"/key/load/md5/hmac-md5"2f 6b 65 79 2f 6c 6f 61 64 2f 6d 64 35 2f 68 6d 61 63 2d 6d 64 35
hash-hmac-ripemd16034"/key/load/ripemd160/hmac-ripemd160"2f 6b 65 79 2f 6c 6f 61 64 2f 72 69 70 65 6d 64 31 36 30 2f 68 6d 61 63 2d 72 69 70 65 6d 64 31 36 30
hash-hmac-sha124"/key/load/sha1/hmac-sha1"2f 6b 65 79 2f 6c 6f 61 64 2f 73 68 61 31 2f 68 6d 61 63 2d 73 68 61 31
hash-hmac-sha22428"/key/load/sha224/hmac-sha224"2f 6b 65 79 2f 6c 6f 61 64 2f 73 68 61 32 32 34 2f 68 6d 61 63 2d 73 68 61 32 32 34
hash-hmac-sha25628"/key/load/sha256/hmac-sha256"2f 6b 65 79 2f 6c 6f 61 64 2f 73 68 61 32 35 36 2f 68 6d 61 63 2d 73 68 61 32 35 36
hash-hmac-sha38428"/key/load/sha384/hmac-sha384"2f 6b 65 79 2f 6c 6f 61 64 2f 73 68 61 33 38 34 2f 68 6d 61 63 2d 73 68 61 33 38 34
hash-hmac-sha51228"/key/load/sha512/hmac-sha512"2f 6b 65 79 2f 6c 6f 61 64 2f 73 68 61 35 31 32 2f 68 6d 61 63 2d 73 68 61 35 31 32
key46"& fri3d Gr33n tomat0s wiTh g0rill4_glu3 sauce!"26 20 66 72 69 33 64 20 47 72 33 33 6e 20 74 6f 6d 61 74 30 73 20 77 69 54 68 20 67 30 72 69 6c 6c 34 5f 67 6c 75 33 20 73 61 75 63 65 21
sign-md536"/push/hash-hmac-md5/call/swap/append"2f 70 75 73 68 2f 68 61 73 68 2d 68 6d 61 63 2d 6d 64 35 2f 63 61 6c 6c 2f 73 77 61 70 2f 61 70 70 65 6e 64
sign-ripemd16042"/push/hash-hmac-ripemd160/call/swap/append"2f 70 75 73 68 2f 68 61 73 68 2d 68 6d 61 63 2d 72 69 70 65 6d 64 31 36 30 2f 63 61 6c 6c 2f 73 77 61 70 2f 61 70 70 65 6e 64
sign-sha137"/push/hash-hmac-sha1/call/swap/append"2f 70 75 73 68 2f 68 61 73 68 2d 68 6d 61 63 2d 73 68 61 31 2f 63 61 6c 6c 2f 73 77 61 70 2f 61 70 70 65 6e 64
sign-sha22439"/push/hash-hmac-sha224/call/swap/append"2f 70 75 73 68 2f 68 61 73 68 2d 68 6d 61 63 2d 73 68 61 32 32 34 2f 63 61 6c 6c 2f 73 77 61 70 2f 61 70 70 65 6e 64
sign-sha25639"/push/hash-hmac-sha256/call/swap/append"2f 70 75 73 68 2f 68 61 73 68 2d 68 6d 61 63 2d 73 68 61 32 35 36 2f 63 61 6c 6c 2f 73 77 61 70 2f 61 70 70 65 6e 64
sign-sha38439"/push/hash-hmac-sha384/call/swap/append"2f 70 75 73 68 2f 68 61 73 68 2d 68 6d 61 63 2d 73 68 61 33 38 34 2f 63 61 6c 6c 2f 73 77 61 70 2f 61 70 70 65 6e 64
sign-sha51239"/push/hash-hmac-sha512/call/swap/append"2f 70 75 73 68 2f 68 61 73 68 2d 68 6d 61 63 2d 73 68 61 35 31 32 2f 63 61 6c 6c 2f 73 77 61 70 2f 61 70 70 65 6e 64