A common use for cryptographic hash functions is verifying file integrity by comparing the hash of the file with a known hash. This can easily be automated by reading a list of files with the corresponding known hashes.
The sha256_f program will be much more useful if it will be able to read and generate such files, ideally in the format used by the GNU coreutils sha256sum program.