HS-HASH
1.0.4
There is a newer version of this package available.
See the version list below for details.
See the version list below for details.
dotnet add package HS-HASH --version 1.0.4
NuGet\Install-Package HS-HASH -Version 1.0.4
This command is intended to be used within the Package Manager Console in Visual Studio, as it uses the NuGet module's version of Install-Package.
<PackageReference Include="HS-HASH" Version="1.0.4" />
For projects that support PackageReference, copy this XML node into the project file to reference the package.
paket add HS-HASH --version 1.0.4
The NuGet Team does not provide support for this client. Please contact its maintainers for support.
#r "nuget: HS-HASH, 1.0.4"
#r directive can be used in F# Interactive and Polyglot Notebooks. Copy this into the interactive tool or source code of the script to reference the package.
// Install HS-HASH as a Cake Addin #addin nuget:?package=HS-HASH&version=1.0.4 // Install HS-HASH as a Cake Tool #tool nuget:?package=HS-HASH&version=1.0.4
The NuGet Team does not provide support for this client. Please contact its maintainers for support.
Features:
- SHA1
- SHA256
- SHA384
- SHA512
- MD5 (Use MD5 only for compatibility with legacy applications and data).
- Generate a random cryptographic key using the RNGCryptoServiceProvider
- Use this to generate a random string using Random rnd = new Random().
- And more
How To:
HASH Hash1 = new HASH();
private void Button_Click(object sender, RoutedEventArgs e)
{
// Hash options
// string hash = Hash1.Get_HashAlgorithm_Hash(tbStringToHash.Text);
// string hash = Hash1.Get_MD5_Hash(tbStringToHash.Text);
// string hash = Hash1.Get_SHA1_Hash(tbStringToHash.Text);
// string hash = Hash1.Get_SHA256_Hash(tbStringToHash.Text);
// string hash = Hash1.Get_SHA384_Hash(tbStringToHash.Text);
string hash = Hash1.Get_SHA512_Hash(tbStringToHash.Text);
tbHash.Text = hash;
}
private void Button_Click_1(object sender, RoutedEventArgs e)
{
// Verify hash options
// Hash1.Verify_HashAlgorithm_Hash(tbStringToHash.Text, tbHash.Text)
// Hash1.Verify_MD5_Hash(tbStringToHash.Text, tbHash.Text)
// Hash1.Verify_SHA1_Hash(tbStringToHash.Text, tbHash.Text)
// Hash1.Verify_SHA256_Hash(tbStringToHash.Text, tbHash.Text)
// Hash1.Verify_SHA384_Hash(tbStringToHash.Text, tbHash.Text)
// Hash1.Verify_SHA512_Hash(tbStringToHash.Text, tbHash.Text)
// Verify the hash
if (Hash1.Verify_SHA512_Hash(tbStringToHash.Text, tbHash.Text) == true)
{
MessageBox.Show("Good Password");
}
else
{
MessageBox.Show("Bad Password");
}
}
private void Window_Loaded(object sender, RoutedEventArgs e)
{
//Hash1.UseLowercaseHash = true;
//Hash1.RemoveSalt = true;
}
private void cbSalt_Click(object sender, RoutedEventArgs e)
{
if (cbSalt.IsChecked == true)
{
Hash1.RemoveSalt = true;
}
else
{
Hash1.RemoveSalt = false;
}
}
private void btnKeyGen_Click(object sender, RoutedEventArgs e)
{
//Generate a random cryptographic key using the RNGCryptoServiceProvider
tbStringToHash.Text = Hash1.GenerateRandomCryptographicKey();
//Use this to generate a random string using Random rnd = new Random(). NOTE: It is not recommended to use this for passwords.
//Hash1.RND_Characters = "0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz.!-_|#*";
//tbStringToHash.Text = Hash1.GenerateRandomString();
}
Other Options:
- Hash1.RemoveSalt = true;
- Hash1.UseLowercaseHash = true;
Product | Versions Compatible and additional computed target framework versions. |
---|---|
.NET | net5.0 was computed. net5.0-windows was computed. net6.0 was computed. net6.0-android was computed. net6.0-ios was computed. net6.0-maccatalyst was computed. net6.0-macos was computed. net6.0-tvos was computed. net6.0-windows was computed. net7.0 was computed. net7.0-android was computed. net7.0-ios was computed. net7.0-maccatalyst was computed. net7.0-macos was computed. net7.0-tvos was computed. net7.0-windows was computed. net8.0 was computed. net8.0-android was computed. net8.0-browser was computed. net8.0-ios was computed. net8.0-maccatalyst was computed. net8.0-macos was computed. net8.0-tvos was computed. net8.0-windows was computed. |
.NET Core | netcoreapp2.0 was computed. netcoreapp2.1 was computed. netcoreapp2.2 was computed. netcoreapp3.0 was computed. netcoreapp3.1 was computed. |
.NET Standard | netstandard2.0 is compatible. netstandard2.1 was computed. |
.NET Framework | net461 was computed. net462 was computed. net463 was computed. net47 was computed. net471 was computed. net472 was computed. net48 was computed. net481 was computed. |
MonoAndroid | monoandroid was computed. |
MonoMac | monomac was computed. |
MonoTouch | monotouch was computed. |
Tizen | tizen40 was computed. tizen60 was computed. |
Xamarin.iOS | xamarinios was computed. |
Xamarin.Mac | xamarinmac was computed. |
Xamarin.TVOS | xamarintvos was computed. |
Xamarin.WatchOS | xamarinwatchos was computed. |
Compatible target framework(s)
Included target framework(s) (in package)
Learn more about Target Frameworks and .NET Standard.
-
.NETStandard 2.0
- No dependencies.
NuGet packages
This package is not used by any NuGet packages.
GitHub repositories
This package is not used by any popular GitHub repositories.
1. Added Generate a random cryptographic key using the RNGCryptoServiceProvider.
2. Added Gandom string using Random rnd = new Random(). NOTE: It is not recommended to use this for passwords.