HexaEightASKClientLibrary 1.9.131
See the version list below for details.
dotnet add package HexaEightASKClientLibrary --version 1.9.131
NuGet\Install-Package HexaEightASKClientLibrary -Version 1.9.131
<PackageReference Include="HexaEightASKClientLibrary" Version="1.9.131" />
<PackageVersion Include="HexaEightASKClientLibrary" Version="1.9.131" />
<PackageReference Include="HexaEightASKClientLibrary" />
paket add HexaEightASKClientLibrary --version 1.9.131
#r "nuget: HexaEightASKClientLibrary, 1.9.131"
#:package HexaEightASKClientLibrary@1.9.131
#addin nuget:?package=HexaEightASKClientLibrary&version=1.9.131
#tool nuget:?package=HexaEightASKClientLibrary&version=1.9.131
HexaEight ASK Client Library
How To Use The Library
Visit HexaEight For More Information
Breaking Changes - 1.9.6 and above - Support for Browsers
Code Sample
Initialize a new ASK Client
var HEClient = new ASKClient("HexaEight_LoginToken","Resource Name", "LoginToken_Password");
Set your Own Password for Session Encryption
HEClient.SetSafeKey("OwnPassword");
Set an API Key (RapidAPI)
HEClient.SetRapidAPIKey("APIKey");
Encrypt a Message For any Destination. (Destination should be a valid Email Address or Resource Provider)
var encryptedmessage = HEClient.EncryptMessageByKnownName("demo.hexaeight.com","Hello Demo");
Decrypt a Message Received
var decryptedmessage = HEClient.DecryptMessageByKnownName("demo.hexaeight.com",<Encrypted Message>);
Fetch Current Ephemeral Key for a Destination
var sharedkey = HEClient.GetSharedKeyByKnownName("<Valid Email Address or Resource Name");
Fetch an Old Ephemeral Key for a Destination - Added in 1.7.4
var sharedkey = HEClient.GetPreSharedKeyByKnownName("<Valid Email Address or Resource Name",UnixTimeStamp);
Decrypt a Message Using the Ephemeral Key - Added in 1.7.3
var decryptedmessage = HEClient.DecryptMessageUsingSharedKey(<Encrypted Message>,<sharedkey>);
Encrypt a Message Using the Ephemeral Key - Added in 1.7.6
var encryptedmessage = HEClient.EncryptMessageUsingSharedKey(<RecipientName>,<Encrypted Message>,<sharedkey>);
Encrypt a Message Using User Access Key (UAK) - Added in 1.7.9
var encryptedmessage = HEClient.EncryptMessageUsingUAK(<RecipientName>,<Encrypted Message>, <uak of user> <sharedkey of destination user resource>);
Decrypt a Message Encrypted Using UAK - Added in 1.7.9
var decryptedmessage = HEClient.DecryptMessageForUAK(<Encrypted Message>,<sharedkey of user>);
Added support for Binary Data Encryption and Decryption using Shared keys and User Access keys - Version 1.8.6
var encrypteddata = EncryptRaw(originaldata, Sharedkey);
var originaldata = DecryptRaw(encrypteddata, Sharedkey);
var encrypteddata = EncryptRawUsingUAK(originaldata, useraccesskey, sharedkey);
var originaldata = DecryptRawUsingUAK(encrypteddata, useraccesskey, sharedkey);
Added new capability for Fetching an Old Ephemeral Key for multiple Destinations - Useful for multi path traversal / multi message approvals
var sharedkey = HEClient.GetPreSharedKeyByKnownName("<Multiple Valid Email Address or Resource Name seperated by semicolons (;)",UnixTimeStamp);
| Product | Versions Compatible and additional computed target framework versions. |
|---|---|
| .NET | net5.0 was computed. net5.0-windows was computed. net6.0 was computed. net6.0-android was computed. net6.0-ios was computed. net6.0-maccatalyst was computed. net6.0-macos was computed. net6.0-tvos was computed. net6.0-windows was computed. net7.0 was computed. net7.0-android was computed. net7.0-ios was computed. net7.0-maccatalyst was computed. net7.0-macos was computed. net7.0-tvos was computed. net7.0-windows was computed. net8.0 was computed. net8.0-android was computed. net8.0-browser was computed. net8.0-ios was computed. net8.0-maccatalyst was computed. net8.0-macos was computed. net8.0-tvos was computed. net8.0-windows was computed. net9.0 was computed. net9.0-android was computed. net9.0-browser was computed. net9.0-ios was computed. net9.0-maccatalyst was computed. net9.0-macos was computed. net9.0-tvos was computed. net9.0-windows was computed. net10.0 was computed. net10.0-android was computed. net10.0-browser was computed. net10.0-ios was computed. net10.0-maccatalyst was computed. net10.0-macos was computed. net10.0-tvos was computed. net10.0-windows was computed. |
| .NET Core | netcoreapp3.0 was computed. netcoreapp3.1 was computed. |
| .NET Standard | netstandard2.1 is compatible. |
| MonoAndroid | monoandroid was computed. |
| MonoMac | monomac was computed. |
| MonoTouch | monotouch was computed. |
| Tizen | tizen60 was computed. |
| Xamarin.iOS | xamarinios was computed. |
| Xamarin.Mac | xamarinmac was computed. |
| Xamarin.TVOS | xamarintvos was computed. |
| Xamarin.WatchOS | xamarinwatchos was computed. |
-
.NETStandard 2.1
- Microsoft.VisualBasic (>= 10.3.0)
- netcore.encrypt (>= 2.0.9)
NuGet packages (2)
Showing the top 2 NuGet packages that depend on HexaEightASKClientLibrary:
| Package | Downloads |
|---|---|
|
HexaEightJWTLibrary
Create and Validate HexaEight JWT Tokens using this Libarary. This Library provides helper functions to implement HexaEight authenticated encryption and decryption of messages. |
|
|
HexaEightAgent
Create And Assign Identities for AI Agents using this Library |
GitHub repositories
This package is not used by any popular GitHub repositories.
| Version | Downloads | Last Updated |
|---|---|---|
| 1.9.140 | 290 | 12/7/2025 |
| 1.9.139 | 164 | 12/5/2025 |
| 1.9.138 | 668 | 12/3/2025 |
| 1.9.137 | 658 | 12/3/2025 |
| 1.9.136 | 664 | 12/3/2025 |
| 1.9.135 | 115 | 11/29/2025 |
| 1.9.134 | 113 | 11/28/2025 |
| 1.9.133 | 139 | 11/28/2025 |
| 1.9.132 | 277 | 11/22/2025 |
| 1.9.131 | 208 | 11/22/2025 |
| 1.9.130 | 253 | 11/22/2025 |
| 1.9.129 | 309 | 11/21/2025 |
| 1.9.128 | 386 | 11/21/2025 |
| 1.9.127 | 475 | 11/20/2025 |
| 1.9.126 | 405 | 11/20/2025 |
| 1.9.125 | 408 | 11/20/2025 |
| 1.9.124 | 395 | 11/20/2025 |
| 1.9.123 | 436 | 11/20/2025 |
| 1.9.122 | 397 | 11/19/2025 |
| 1.9.121 | 403 | 11/19/2025 |
| 1.9.120 | 347 | 11/17/2025 |
| 1.9.119 | 282 | 11/17/2025 |
| 1.9.118 | 241 | 11/14/2025 |
| 1.9.117 | 277 | 11/9/2025 |
| 1.9.116 | 156 | 11/8/2025 |
| 1.9.115 | 181 | 11/7/2025 |
| 1.9.114 | 184 | 11/7/2025 |
| 1.9.113 | 215 | 11/7/2025 |
| 1.9.112 | 182 | 11/7/2025 |
| 1.9.111 | 172 | 10/24/2025 |
| 1.9.109 | 185 | 10/23/2025 |
| 1.9.108 | 290 | 10/20/2025 |
| 1.9.107 | 229 | 10/20/2025 |
| 1.9.106 | 174 | 10/20/2025 |
| 1.9.105 | 180 | 10/20/2025 |
| 1.9.104 | 138 | 10/17/2025 |
| 1.9.103 | 482 | 9/21/2025 |
| 1.9.102 | 355 | 9/18/2025 |
| 1.9.101 | 347 | 9/15/2025 |
| 1.9.100 | 143 | 9/13/2025 |
| 1.9.99 | 124 | 9/13/2025 |
| 1.9.98 | 142 | 9/12/2025 |
| 1.9.97 | 256 | 6/29/2025 |
| 1.9.96 | 964 | 10/11/2024 |
| 1.9.95 | 436 | 10/11/2024 |
| 1.9.94 | 226 | 8/20/2024 |
| 1.9.93 | 312 | 8/11/2024 |
| 1.9.92 | 275 | 8/11/2024 |
| 1.9.91 | 446 | 8/7/2024 |
| 1.9.90 | 256 | 8/7/2024 |
| 1.9.89 | 3,492 | 1/30/2024 |
| 1.9.88 | 3,158 | 9/27/2023 |
| 1.9.87 | 194 | 9/27/2023 |
| 1.9.86 | 5,137 | 2/18/2023 |
| 1.9.85 | 492 | 2/18/2023 |
| 1.9.84 | 358 | 2/18/2023 |
| 1.9.83 | 32,294 | 7/21/2022 |
| 1.9.82 | 2,018 | 7/21/2022 |
| 1.9.81 | 860 | 7/21/2022 |
| 1.9.80 | 1,757 | 7/18/2022 |
| 1.9.79 | 894 | 7/18/2022 |
| 1.9.78 | 570 | 7/18/2022 |
| 1.9.77 | 570 | 7/18/2022 |
| 1.9.76 | 571 | 7/17/2022 |
| 1.9.75 | 864 | 7/17/2022 |
| 1.9.74 | 558 | 7/17/2022 |
| 1.9.73 | 1,154 | 7/17/2022 |
| 1.9.72 | 848 | 7/17/2022 |
| 1.9.4 | 9,724 | 5/2/2022 |