Walter 2024.11.14.1710

Prefix Reserved
There is a newer version of this package available.
See the version list below for details.
dotnet add package Walter --version 2024.11.14.1710                
NuGet\Install-Package Walter -Version 2024.11.14.1710                
This command is intended to be used within the Package Manager Console in Visual Studio, as it uses the NuGet module's version of Install-Package.
<PackageReference Include="Walter" Version="2024.11.14.1710" />                
For projects that support PackageReference, copy this XML node into the project file to reference the package.
paket add Walter --version 2024.11.14.1710                
#r "nuget: Walter, 2024.11.14.1710"                
#r directive can be used in F# Interactive and Polyglot Notebooks. Copy this into the interactive tool or source code of the script to reference the package.
// Install Walter as a Cake Addin
#addin nuget:?package=Walter&version=2024.11.14.1710

// Install Walter as a Cake Tool
#tool nuget:?package=Walter&version=2024.11.14.1710                

WALTER

Introducing the WALTER Framework: Workable Algorithms for Location-aware Transmission, Encryption Response. Designed for modern developers, WALTER is a groundbreaking suite of NuGet packages crafted for excellence in .NET Standard 2.0, 2.1, Core 3.1, and .NET 6, 7, 8, as well as C++ environments. Emphasizing 100% AoT support and reflection-free operations, this framework is the epitome of performance and stability.

Whether you're tackling networking, encryption, or secure communication, WALTER offers unparalleled efficiency and precision in processing, making it an essential tool for developers who prioritize speed and memory management in their applications.

About this Nuget Package

This NuGet package contains helpful extension methods for any .NET project targeting anything from the Web to MAUI, Native Windows, Linux, or Mac. Even though this NuGet package is not intended for direct use, it does come with some handy features. You can download the cmpiled help file as well as see code samples in github

Delphi Inside

The WALTER framework's integration with the Walter.Native.Wrapper NuGet package is a result of our intentional effort to leverage Delphi for native development excellence. This decision enables WALTER to provide developers with access to robust wrapper classes, facilitating direct utilization of native functionalities across various platforms. The capabilities we've built into Delphi are not by accident but the outcome of dedicated engineering to ensure future-proof encryption, top-tier performance, and security.

Cross-Platform by Design

This strategic integration means that when you use WALTER, you're also harnessing the power of native cross-platform binaries provided by Walter.Native.Wrapper. As a result, developers can enjoy the full spectrum of native functionalities without compromising on performance or cross-platform compatibility.

Seamless Inclusion in Deployments

The package automatically includes the appropriate native binary for each platform, ensuring your applications benefit from native performance enhancements and capabilities directly within .NET projects. This integration is tailored to each platform's needs:

  • For Windows, the walternative.dll is included.
  • In Android APK packages, WalterNative.so is bundled.
  • For iOS, applications leverage WalterNative.dylib.
  • On Linux, the framework utilizes libWalterNative.xso, a decision made to prevent the highjacking of .so files by the Android build process. It's important to note that the file name libWalterNative.xso is carefully chosen and should not be altered to libWalterNative.so, as the framework expects to link libWalterNative.xso from disk.

This seamless inclusion simplifies the development process, allowing you to focus on building robust applications while WALTER takes care of the underlying native integration.

Ahead-Of-Time (AOT) Compilation Compliant

The NuGet package can be used with projects that are trimming and use AoT. However, Newtonsoft Json is not AoT compliant as it uses reflection; therefore, Newtonsoft extension methods are excluded from AoT support.

Json Extensions

We offer helpful extension methods for when you need to process Large JSON files and can't load the whole file in memory as well as exception free processing of json files, strings and streams using the IsValidJson<T>() extension method

The JsonStreamReader<T> class in the Walter namespace is a powerful utility for deserializing JSON data from streams in .NET. This class provides a seamless way to read JSON content instance by instance, handling exceptions gracefully, and is compliant with various .NET versions including .NET Standard 2.0, 2.1, Core 3.1, and .NET 6, 7, 8. It's designed to work efficiently.

Usage

Cross Platform compatible SecureString

The SecureString class offers a robust solution for handling confidential strings and byte arrays securely within memory. Designed to safeguard sensitive information against reverse engineering and memory dumps, SecureString is ideal for a wide range of platforms, including Android, iOS, Unix, and Linux. By extending functionality from a native wrapper, it capitalizes on platform-specific memory protection mechanisms, without relying on the underlying platform features to secure memory.

Usage Example

This example demonstrates how to use SecureString to securely handle an API key required for web requests to a third-party service. The API key is loaded from a disk file, ensuring it's protected both in memory and when persisted.

// Load the API key from a file on disk securely
var apiKeyFilePath = Path.Combine("path", "to", "apiKey.txt");
var apiKeyFile = new FileInfo(apiKeyFilePath);
var apiKey = SecureString.LoadFromDisk(SecureMemoryProtection.Machine, apiKeyFile);

// Use the API key in a web request
// Note: Actual usage might depend on the specific mechanism provided by SecureString to convert it back to a usable format securely.
// This is a simplified illustration.
using (var client = new HttpClient())
{
    client.DefaultRequestHeaders.Authorization = new AuthenticationHeaderValue("Bearer", apiKey.GetProtectedString());
    var response = await client.GetAsync("https://api.example.com/data");
    Console.WriteLine(response.Content.ReadAsStringAsync().Result);
}


The class is used for reading JSON data from a stream, with error handling mechanisms to capture any exceptions during the deserialization process.
### Process a file row by row so you do not have to have the whole file in memory while processing it.
```c#
using var stream = File.OpenRead("AppData\\LinkedIn.json");
var sr = new Walter.JsonStreamReader<TCPIPNetwork>(stream,TCPIPNetworkJsonContext.Default.TCPIPNetwork);
int i=0;
var result= new List<TCPIPNetwork>();
await foreach (TCPIPNetwork item in sr.ReadAsync())
{
    i++;
    result.Add(item)
    if(sr.Errors.Count>0)
    {
        _logger.LogError(sr.Errors[^1]
                        ,"File line {line}, failed so entry {i} is skipped as it failed due to {error}"
                        ,sr.Errors[^1].LineNumber,i+1,sr.Errors[^1].Message);
        
    }

}

The Importance of Secure<T> for Data Protection

In the digital age, safeguarding sensitive data is paramount. As applications extend across various platforms—mobile devices (iOS, Android), and desktop operating systems (Windows, Linux)—the need for robust data protection mechanisms grows. The Secure<T> class stands out as a vital tool for developers, designed to protect sensitive information from cyber threats, unauthorized access, and exploitation.

Cross-Platform Compatibility

Secure<T> offers a unified approach to data security, ensuring compatibility across different environments. This universality makes it an ideal solution for applications running on a variety of platforms, providing a consistent method to secure sensitive data in memory.

Protection Against Common Vulnerabilities

Sensitive data, when stored in plain text or insufficiently protected, is vulnerable to reverse engineering and memory dumps. These techniques, frequently employed by attackers, can compromise data integrity and confidentiality. Secure<T> is engineered to mitigate these risks by leveraging advanced encryption and memory protection mechanisms.

Ideal for Sensitive Data

Storing confidential information—user credentials, personal details, financial records, or proprietary business data—demands stringent security measures. Secure<T> excels in this regard, enabling developers to encrypt and securely manage such data. It ensures that sensitive information is not only protected on disk but also kept secure when loaded into memory.

Read-Only Memory Protection

Secure<T> uniquely offers a mechanism to maintain a read-only version of sensitive data in memory. This approach minimizes the risk of unintended modifications or leaks, further enhancing the security posture of applications that handle critical data.

Use Case: Mobile and Desktop Applications

Whether developing for mobile devices or desktops, Secure<T> provides a scalable and effective solution to protect sensitive data. It is particularly beneficial for applications that require the highest level of security, such as financial apps, health care systems, and personal data managers.

In conclusion, the Secure<T> class is a cornerstone of modern data protection strategies, ensuring sensitive information remains secure across all platforms and use cases. Its ability to safeguard data against common vulnerabilities, coupled with cross-platform compatibility and read-only memory protection, makes it an indispensable tool for developers committed to data security.

Process data from a webservice

The sample shows fetching a JSON stream from a web service streaming endpoint and processing the data row by row:

using System.Net.Http;
using System.IO;
using System.Threading.Tasks;

// ... other necessary namespaces

public async Task ProcessJsonDataFromWebServiceAsync()
{
    using var httpClient = new HttpClient();
    try
    {
        var response = await httpClient.GetStreamAsync("https://example.com/api/datastream");
        
        var sr = new Walter.JsonStreamReader<TCPIPNetwork>(response, TCPIPNetworkJsonContext.Default.TCPIPNetwork);
        int i = 0;
        await foreach (TCPIPNetwork item in sr.ReadAsync())
        {
            i++;
            // Process each item
            // ...

            if (sr.Errors.Count > 0)
            {
                _logger.LogError(sr.Errors[i - 1],
                                 "File line {line}, failed so entry {i} is skipped as it failed due to {error}",
                                 sr.Errors[i - 1].LineNumber, i, sr.Errors[i - 1].Message);
            }
        }
    }
    catch (HttpRequestException e)
    {
        _logger.LogError("Error fetching data from web service: {Message}", e.Message);
    }
}

Read a file in one time and process all entries skip those that would fail

using var stream = File.OpenRead("TestData\\LinkedIn.json");
var sr = new Walter.JsonStreamReader<List<TCPIPNetwork>>(stream,TCPIPNetworkListJsonContext.Default.ListTCPIPNetwork);
var list = sr.Read();

foreach (var item in list)
{
 ...
}

String extension methods

This NuGet package includes a range of useful extension methods, enhancing functionality for JSON processing, conversions between hex and bytes, and handling SQL Server varbinary types. For additional examples and comprehensive documentation, you can visit the GitHub repository.

ToSqlBinaryString() integration of Encrypted Data into T-SQL Command

The encryptedBytes.ToSqlBinaryString() method is utilized to convert the byte array (which is the result of the encryption process) into a SQL Server-friendly varbinary format. This format is compatible with T-SQL syntax and is necessary for correctly storing the encrypted data in the database.

The resulting string, prefixed with 0x, represents the hexadecimal representation of the encrypted data. This string is directly embedded into the T-SQL command, allowing the encrypted data to be used in database operations such as INSERT or UPDATE statements. In this way, the encrypted data can be stored securely in the database while maintaining the ability to perform standard SQL operations on it.

var encryptedDataString = encryptedBytes.ToSqlBinaryString();
var tsql = @$"
    DECLARE @EncryptedData VARBINARY(64) = {encryptedDataString};
    ...
    INSERT INTO MyTable (EncryptedColumn) VALUES (@EncryptedData);
";

Secure encryption and decryption

Sample Test Cases for Understanding the Deterministic Encryption

Deterministic encryption is a method where identical plain text values are always encrypted into identical cipher text. This approach is particularly useful in scenarios where you need to:

  • Store Sensitive Data on Third-party Servers: Especially relevant under GDPR compliance when using cloud services where you don't have control over the underlying hardware or database encryption mechanisms.
  • Enable Grouping and Searching: Deterministic encryption allows for the encrypted data to be searchable and groupable, which is essential for performing database operations without decrypting the data, thus maintaining security and privacy.

Benefits and Considerations

  • Data Privacy and Security: Ensures that sensitive data, such as personal information or proprietary corporate data, is stored securely, even in environments not directly controlled by your organization.
  • Searchability and Operational Efficiency: Unlike other forms of encryption, deterministic encryption allows for efficient database operations such as indexing, searching, and grouping on encrypted data.
  • Compliance with Regulations: Meets the requirements of regulations like GDPR, which mandate the protection of personal data, especially when processed or stored on external or cloud-based systems.

When to Use

  • GDPR Compliance in Cloud-Based Storage: Ideal for scenarios requiring GDPR compliance while using cloud-based databases.
  • Maintaining Operational Capabilities: When the ability to search or group data directly in the database is necessary for operational efficiency.

Important Considerations

  • Not a One-Size-Fits-All Solution: Deterministic encryption is a tool among many in the security engineer's toolkit and should be used judiciously. It is not always the preferred method of encryption but can be effective for specific use cases.
  • Secure Key Management: The security of deterministic encryption heavily relies on how the encryption keys are managed. It is crucial to ensure these keys are stored and handled securely, separate from the data they encrypt.

Deterministic encryption provides a balance between operational functionality and data security, making it a valuable option for specific use cases in cloud-based applications and services, particularly where GDPR compliance is a concern.

// Sample to demonstrate GDPR-compliant encryption of sensitive data using deterministic encryption
// for storage in a third-party hosted SQL server.

// Define the company name to be encrypted.
string companyName = "Undefined Corp";

// Create an instance of the symmetric encryption service with a secure password and salt.
// Note: In a production environment, securely manage the password and salt, avoiding hardcoded values.
var encryptionService = new Walter.Cypher.DeterministicEncryption(
    password: "My $ectet Pa$w0rd",
    salt: "123456789+*ç%&/"
);

// Encrypt the company name into a byte array.
byte[] encryptedBytes = encryptionService.Encrypt(companyName.ToBytes());

// Prepare the T-SQL command for data insertion, using the encrypted company name.
var tsql = @$"
DECLARE @UndefinedCorp VARBINARY(64) = {encryptedBytes.ToSqlBinaryString()};
DECLARE @checksum int = CHECKSUM(@UndefinedCorp);

// Check for the existence of the company and insert if not present.
if not exists(select * from [dbo].[Companies] where [CompanyName] = @UndefinedCorp and [cs_CompanyName] = @checksum)
BEGIN
    INSERT [dbo].[Companies] ([CompanyName],[cs_CompanyName],[TrueUpDays],[AutoInvoice],[ApplicableLicenseExcempt])
    Values(@UndefinedCorp, @checksum, -1, 0, 1);
END
";

// Execute the T-SQL command to store the encrypted data.
using var con = new SqlConnection(config.GetConnectionString("Billing"));
using var cmd = con.CreateCommand();
cmd.CommandText = tsql;
cmd.CommandType = System.Data.CommandType.Text;
con.Open();
cmd.ExecuteNonQuery();

Sample Test Cases for Understanding the Symmetric Encryption

We've included sample test cases in our codebase to demonstrate the functionality of the Symmetric Encryption process. These samples are crafted not just to test the code, but also to serve as practical examples for those looking to understand the encryption and decryption mechanisms in depth.

Why Test Cases?
  • Hands-On Learning: By setting breakpoints and stepping through these tests, you can gain a hands-on understanding of how the encryption and decryption process works.
  • Debugging and Inspection: It's an excellent opportunity to inspect the flow of data, observe how the encryption algorithm behaves, and understand how different components interact.
  • Real-World Examples: These tests are more than theoretical scenarios; they represent real-world use cases, helping you relate the functionality to practical applications.
What's in the Sample?
  • Encryption Consistency Test: Encrypt_WithSamePassword_ShouldGenerateDifferentCiphertexts ensures that the encryption process is secure and generates different ciphertexts for the same plaintext.
  • Cross-Instance Compatibility Test: EncryptAndDecrypt_WithDifferentInstances_ShouldBeCompatible confirms that the encrypted data by one instance can be decrypted by another, ensuring consistency across different instances.
How to Use the Sample

Understood, let's adjust the instructions to focus on using the NuGet package directly without the need for cloning a repository. Here's the revised section for your README.md:

How to Use the Sample

To effectively use and understand the Symmetric Encryption examples in the 'walter' NuGet package, follow these steps:

  1. Install the 'walter' NuGet Package: Start by adding the 'walter' package to your C# project. This package is essential as it contains the components you'll need for the encryption examples.
  2. Navigate to your Tests: Copy and past the test cases in the project's test project.
  3. Set Breakpoints: Place breakpoints at critical points in the tests.
  4. Debug and Step Through: Run the tests in debug mode and step through the code to observe how the encryption process is executed and validated.

We encourage you to explore these tests to deepen your understanding of symmetric encryption in a .NET environment.

[TestClass]
public class SymmetricEncryptionTests
{
    // This test verifies that the same text encrypted with the same password generates different byte arrays.
    // This is important to ensure that the encryption algorithm uses a unique initialization vector (IV) for each encryption,
    // which enhances security by producing different ciphertexts for the same plaintext.
    [TestMethod]
    public void Encrypt_WithSamePassword_ShouldGenerateDifferentCiphertexts()
    {
        var secretText = "Hello World";
        var encryptionInstance1 = new SymmetricEncryption("TestPassword");
        var encryptionInstance2 = new SymmetricEncryption("TestPassword");

        byte[] encryptedBytes1 = encryptionInstance1.Encrypt(Encoding.UTF8.GetBytes(secretText));
        byte[] encryptedBytes2 = encryptionInstance2.Encrypt(Encoding.UTF8.GetBytes(secretText));

        string ciphertext1 = Encoding.UTF8.GetString(encryptedBytes1);
        string ciphertext2 = Encoding.UTF8.GetString(encryptedBytes2);

        Assert.AreNotEqual(ciphertext1, ciphertext2, "Encrypted bytes should be different for the same input text.");

        string decryptedText1 = Encoding.UTF8.GetString(encryptionInstance1.Decrypt(encryptedBytes1));
        string decryptedText2 = Encoding.UTF8.GetString(encryptionInstance2.Decrypt(encryptedBytes2));

        Assert.AreEqual(decryptedText1, decryptedText2, "Decrypted texts should match the original secret text.");
    }

    // This test ensures that text encrypted by one instance of the SymmetricEncryption class
    // can be decrypted by another instance using the same password. This is crucial for verifying
    // that the encryption and decryption processes are compatible and consistent across different instances.
    [TestMethod]
    public void EncryptAndDecrypt_WithDifferentInstances_ShouldBeCompatible()
    {
        var secretText = "Hello World";
        var encryptionInstanceClient = new SymmetricEncryption("TestPassword");
        var encryptionInstanceServer = new SymmetricEncryption("TestPassword");

        string ciphertext = encryptionInstanceClient.EncryptString(secretText);
        string decryptedText = encryptionInstanceServer.DecryptString(ciphertext);

        Assert.AreEqual(secretText, decryptedText, "Decrypted text should match the original secret text.");
    }
}

Extension methods

There are several extension methods that are usfull like ToBytes() and ToSqlBinaryString() as shown in the bellow code sample.

In the sample bellow we show how you could pre-populat database defaults in a GDPR compliant way where you can use the framweork to generate predefined standard values.

var corp = "Undefined Corp";
var cypher = new Walter.Cypher.SymmetricEncryption(password: "My $ectet Pa$w0rd"
                                             , padding: System.Security.Cryptography.PaddingMode.PKCS7
                                             );

byte[] bytes = cypher.Encrypt(corp.ToBytes());
var tsql = @$"
    declare @UndefinedCorp Varbinary(64) = {bytes.ToSqlBinaryString()};
    declare @checksum int = CHECKSUM(@UndefinedCorp);

    if not exists(select * from  [dbo].[Companies] where [CompanyName] =@UndefinedCorp and [cs_CompanyName]= @checksum)
    BEGIN
        INSERT [dbo].[Companies] ([CompanyName],[cs_CompanyName],[TrueUpDays],[AutoInvoice])
        Values(@UndefinedCorp,@checksum,-1,0);
    END
";


using var con = new SqlConnection(config.GetConnectionString("Billing"));
using var cmd = con.CreateCommand();
cmd.CommandText = tsql;
cmd.CommandType = System.Data.CommandType.Text;
con.Open();
cmd.ExecuteNonQuery();

AoT Exceptions Extension for .NET

The ExceptionsExtension class is a powerful utility for .NET developers, enhancing exception handling with additional diagnostic information. This extension provides methods to extract class names, method names, file names, and approximate line numbers from exceptions especially usefull in AoT.

Features
  • ClassName: Retrieves the class name where the exception originated.
  • MethodName: Obtains the method name that generated the exception.
  • FileName: Gets the filename of the class that generated the exception.
  • CodeLineNumber: Provides the actual or approximate line number where the exception was thrown.
Usage

Here is a examples of how to use the ExceptionsExtension method:

try
{
    _ = File.Open("A:\\doesNotExist.txt", FileMode.Open);
}
catch (Exception e)
{
    //if the binary is AoT compiled the line number is this line
    _logger.LogError(e, "{Class}.{method} (line {line}) failed with a {exception}:{message}",e.ClassName(), e.MethodName(), e.CodeLineNumber(),e.GetType().Name,e.Message);
}

ThrottleExtensions Class

The ThrottleExtensions class provides extension methods for managing throttled HTTP requests at the application level. This is especially useful when interacting with APIs that impose rate limits on the number of requests within a specific time window. With ThrottleExtensions, you can ensure that requests sent to the same domain or endpoint do not exceed the allowed rate by delaying requests when necessary.

The throttling mechanism applies globally across the application, meaning that requests from different parts of your application, even if they're being made from different threads, are synchronized to respect the same rate limits. This helps prevent overloading an API with too many requests, avoiding issues like 429 Too Many Requests errors.

In this example, we demonstrate how to use ThrottleExtensions to throttle requests based on both domain and API key. Two separate API keys are used for the same domain, and the requests are throttled independently for each key.

Example: Throttling Requests by Domain

using var client = new HttpClient();
string url = "https://api.example.com/data";

// Send a GET request with a rate limit of 5 requests per 10 seconds
var response = await client.GetAsync(url, 5, TimeSpan.FromSeconds(10));

if (response.IsSuccessStatusCode)
{
    var content = await response.Content.ReadAsStringAsync();
    Console.WriteLine(content);
}
else
{
    Console.WriteLine($"Request failed with status code {response.StatusCode}");
}

Example: Throttling Requests by Domain and API Key

using System;
using System.Net.Http;
using System.Threading.Tasks;

public class ApiRequestExample
{
    private static readonly HttpClient _client = new HttpClient();

    public static async Task Main(string[] args)
    {
        string domain = "api.example.com";
        string apiKey1 = "API_KEY_1";
        string apiKey2 = "API_KEY_2";

        string url = $"https://{domain}/data";

        // Send requests with different API keys concurrently, but throttle based on both domain and API key
        Task requestWithApiKey1 = SendThrottledRequest(url, domain, apiKey1, 5, TimeSpan.FromSeconds(10));
        Task requestWithApiKey2 = SendThrottledRequest(url, domain, apiKey2, 5, TimeSpan.FromSeconds(10));

        await Task.WhenAll(requestWithApiKey1, requestWithApiKey2);
    }

    private static async Task SendThrottledRequest(string url, string domain, string apiKey, int requests, TimeSpan per)
    {
        // Combine the domain and API key to create a unique throttling key
        string throttlingKey = $"{domain}:{apiKey}";

        // Throttle requests based on the domain and API key combination
        await throttlingKey.Throttle(requests, per);

        // Make the actual HTTP request with the API key
        using var requestMessage = new HttpRequestMessage(HttpMethod.Get, url);
        requestMessage.Headers.Add("Authorization", $"Bearer {apiKey}");

        var response = await _client.SendAsync(requestMessage);

        if (response.IsSuccessStatusCode)
        {
            string content = await response.Content.ReadAsStringAsync();
            Console.WriteLine($"Response with API key {apiKey}: {content}");
        }
        else
        {
            Console.WriteLine($"Request with API key {apiKey} failed: {response.StatusCode}");
        }
    }
}

Visit www.asp-waf.com for more information.

Product Compatible and additional computed target framework versions.
.NET net5.0 was computed.  net5.0-windows was computed.  net6.0 is compatible.  net6.0-android was computed.  net6.0-ios was computed.  net6.0-maccatalyst was computed.  net6.0-macos was computed.  net6.0-tvos was computed.  net6.0-windows was computed.  net7.0 is compatible.  net7.0-android was computed.  net7.0-ios was computed.  net7.0-maccatalyst was computed.  net7.0-macos was computed.  net7.0-tvos was computed.  net7.0-windows was computed.  net8.0 is compatible.  net8.0-android was computed.  net8.0-browser was computed.  net8.0-ios was computed.  net8.0-maccatalyst was computed.  net8.0-macos was computed.  net8.0-tvos was computed.  net8.0-windows was computed.  net8.0-windows7.0 is compatible. 
.NET Core netcoreapp2.0 was computed.  netcoreapp2.1 was computed.  netcoreapp2.2 was computed.  netcoreapp3.0 was computed.  netcoreapp3.1 is compatible. 
.NET Standard netstandard2.0 is compatible.  netstandard2.1 is compatible. 
.NET Framework net461 was computed.  net462 was computed.  net463 was computed.  net47 was computed.  net471 was computed.  net472 was computed.  net48 was computed.  net481 was computed. 
MonoAndroid monoandroid was computed. 
MonoMac monomac was computed. 
MonoTouch monotouch was computed. 
Tizen tizen40 was computed.  tizen60 was computed. 
Xamarin.iOS xamarinios was computed. 
Xamarin.Mac xamarinmac was computed. 
Xamarin.TVOS xamarintvos was computed. 
Xamarin.WatchOS xamarinwatchos was computed. 
Compatible target framework(s)
Included target framework(s) (in package)
Learn more about Target Frameworks and .NET Standard.

NuGet packages (5)

Showing the top 5 NuGet packages that depend on Walter:

Package Downloads
Walter.Cypher

The cypher package for hashing data in a convenient and secure way as well as symmetric and asymmetric encryption methods.You can find On-line documentation at https://cypherapi.asp-waf.com/ as well as using the sample code found at https://github.com/ASP-WAF/Cypher

Walter.Cypher.Native.Json

The cypher package targeting native json and securing data in transit via custom converters.

Walter.Cypher.Newtonsoft.Json

The cypher package targeting newtonsoft json and securing data in transit via custome converters.

Walter.Web.HtmlTools.HtmlMinify

This package allows you to minify HTML generated by MVC projects making the response generally smaller as well as less readable for those that want to copy or work.

Walter.Extensions.Logging.MSTest

This package was created to assist in capturing and directing `ILogger` output to the MSTest output window. This is especially useful for debugging and tracing logs during test execution, ensuring that all log output is easily accessible in your test results.

GitHub repositories

This package is not used by any popular GitHub repositories.

Version Downloads Last updated
2024.11.30.1642 412 12/13/2024
2024.11.28.1614 382 11/28/2024
2024.11.20.705 507 11/21/2024
2024.11.14.1710 101 11/14/2024
2024.11.6.1222 923 11/6/2024
2024.10.28.1605 495 10/28/2024
2024.10.28.1335 466 10/28/2024
2024.10.19.1530 429 10/20/2024
2024.10.9.1059 163 10/9/2024
2024.9.17.1417 1,353 9/17/2024
2024.9.12.1923 572 9/12/2024
2024.9.6.1352 590 9/7/2024
2024.9.4.1300 215 9/4/2024
2024.9.1.1128 591 9/1/2024
2024.8.30.1347 118 8/31/2024 2024.8.30.1347 is deprecated because it has critical bugs.
2024.8.19.1111 1,132 8/19/2024
2024.8.14.1042 997 8/14/2024
2024.8.12.918 663 8/12/2024
2024.8.5.1010 485 8/5/2024
2024.7.26.543 656 7/26/2024
2024.7.11.1604 547 7/11/2024
2024.7.9.1504 567 7/9/2024
2024.7.4.1422 134 7/4/2024
2024.7.3.1001 935 7/3/2024
2024.6.26.1407 1,020 6/28/2024
2024.6.6.1320 448 6/8/2024
2024.5.15.1634 393 5/15/2024
2024.5.14.829 326 5/14/2024
2024.5.13.1637 192 5/13/2024
2024.5.8.1005 348 5/8/2024
2024.4.4.2102 369 4/4/2024
2024.4.4.1525 120 4/4/2024
2024.3.26.1111 127 3/26/2024
2024.3.26.939 281 3/26/2024
2024.3.19.2310 295 3/19/2024
2024.3.19.2136 123 3/19/2024
2024.3.19.1207 121 3/19/2024
2024.3.18.2046 132 3/18/2024
2024.3.18.2030 126 3/18/2024
2024.3.18.1707 124 3/18/2024
2024.3.12.1022 308 3/12/2024
2024.3.7.836 284 3/7/2024
2024.3.6.1645 208 3/6/2024
2024.3.3.842 315 3/3/2024
2024.3.1.1143 247 3/1/2024
2024.2.27.1029 196 2/27/2024
2024.2.25.1737 123 2/25/2024
2024.2.19.1557 143 2/21/2024
2024.2.6.759 198 2/6/2024
2024.2.5.1743 133 2/6/2024
2024.2.1.1335 126 2/1/2024
2024.1.22.746 159 1/22/2024
2024.1.21.1514 124 1/21/2024
2024.1.20.1130 120 1/20/2024
2024.1.19.1524 133 1/19/2024 2024.1.19.1524 is deprecated because it has critical bugs.
2023.12.5.856 174 12/5/2023
2023.10.12.1926 4,226 10/12/2023
2023.9.14.812 1,761 9/14/2023
2023.8.29.1040 9,604 8/29/2023
2023.8.17.903 1,885 8/17/2023
2023.8.9.1314 1,981 8/9/2023
2023.8.2.750 2,041 8/2/2023
2023.7.12.830 2,056 7/12/2023
2023.7.5.1419 2,164 7/6/2023
2023.6.14.1628 3,895 6/14/2023
2023.5.30.1640 2,581 5/30/2023
2023.5.4.1552 2,611 5/4/2023
2023.4.12.1236 7,076 4/12/2023
2023.3.14.1356 5,642 3/14/2023
2023.3.1.810 3,360 3/1/2023
2023.2.25.1185 1,061 2/25/2023
2023.2.22.27 5,817 2/22/2023
2023.2.15.1413 3,551 2/15/2023
2023.2.11.1628 3,551 2/11/2023
2023.1.11.534 3,879 1/11/2023
2022.12.14.648 13,100 12/14/2022
2022.11.27.1059 4,246 11/27/2022
2022.11.21.338 4,324 11/21/2022
2022.11.14.1819 4,551 11/14/2022
2022.11.14.1533 789 11/14/2022
2022.11.13.830 411 11/13/2022
2022.10.31.740 8,395 11/1/2022
2022.10.15.652 8,705 10/15/2022
2022.10.1.810 10,680 10/1/2022
2022.9.26.1444 11,312 9/26/2022
2022.9.14.809 9,919 9/14/2022
2022.9.8.1009 18,764 9/8/2022
2022.8.20.1007 10,112 8/20/2022
2022.8.1.1 10,377 7/31/2022
2022.7.15.841 19,527 7/15/2022
2022.7.1.1300 10,557 7/1/2022
2022.6.21.647 10,435 6/21/2022
2022.5.4.1010 37,499 5/4/2022
2022.4.10.828 30,187 4/10/2022
2022.3.26.1117 29,872 3/26/2022
2022.2.11.931 51,571 2/17/2022
2022.2.7.1634 541 2/17/2022
2022.1.15.1312 21,555 1/17/2022
2022.1.10.537 20,528 1/10/2022
2022.1.7.1357 9,883 1/8/2022
2021.12.28.1452 11,250 12/28/2021
2021.12.15.911 10,601 12/16/2021
2021.11.19.850 37,934 11/19/2021
2021.11.11.1334 31,065 11/16/2021
2021.11.8.2109 9,156 11/9/2021
2021.11.8.1612 56,057 11/8/2021
2021.10.13.1459 10,184 10/18/2021
2021.10.11.1400 456 10/11/2021
2021.10.9.1133 684 10/10/2021
2021.9.26.1913 65,503 9/26/2021
2021.9.17.1702 15,521 9/18/2021
2021.8.30.1319 96,227 8/30/2021
2021.8.14.1600 53,501 8/16/2021
2021.8.14.829 5,837 8/14/2021
2021.8.8.1612 18,627 8/8/2021
2021.8.8.1138 652 8/8/2021
2021.7.22.1033 63,767 7/23/2021
2021.7.15.1547 10,100 7/15/2021
2021.7.12.734 10,020 7/13/2021
2021.6.26.1753 37,337 6/27/2021
2021.6.23.734 19,393 6/24/2021
2021.6.19.803 10,650 6/20/2021
2021.6.11.1600 37,184 6/13/2021
2021.6.9.1120 10,241 6/9/2021
2021.6.7.1407 2,830 6/7/2021
2021.5.31.1533 18,934 5/31/2021
2021.5.28.1451 10,269 5/31/2021
2021.5.25.1732 9,103 5/25/2021
2021.5.12.929 28,118 5/12/2021
2021.5.12.914 641 5/12/2021
2021.5.12.637 7,592 5/12/2021
2021.5.5.1901 33,240 5/6/2021
2021.5.2.1617 9,880 5/4/2021
2021.4.28.1503 19,033 4/28/2021
2021.4.5.1653 63,308 4/5/2021
2021.4.2.1918 466 4/2/2021
2021.4.1.913 10,045 4/1/2021
2021.3.31.1630 9,976 4/1/2021
2021.3.17.606 10,552 3/18/2021
2021.3.3.1259 730 3/3/2021
2021.3.3.833 705 3/3/2021
2021.3.1.1205 25,012 3/2/2021
2021.3.1.1 17,256 2/27/2021
2021.2.21.3 16,584 2/21/2021
2021.2.19.3 9,410 2/20/2021
2021.2.19.2 8,914 2/19/2021
2021.2.16.1 24,055 2/16/2021
2021.2.15.1 17,395 2/14/2021
2021.2.10.1 38,375 2/10/2021
2021.2.7.1 24,374 2/6/2021
2020.12.27.1 17,059 12/27/2020
2020.12.26.2 24,984 12/27/2020
2020.12.24.2 758 12/26/2020
2020.12.24.1 727 12/24/2020
2020.12.18.1 9,252 12/19/2020
2020.12.15.1 16,662 12/15/2020
2020.12.14.5 12,509 12/14/2020
2020.12.14.4 8,595 12/14/2020
2020.12.14.3 8,435 12/14/2020
2020.11.27.1 68,197 11/27/2020
2020.11.25.1 13,449 11/25/2020
2020.11.23.1 732 11/25/2020
2020.11.22.2 8,968 11/23/2020
2020.11.20.1 8,247 11/21/2020
2020.11.19.3 8,319 11/19/2020
2020.11.11.1 66,094 11/11/2020
2020.10.9.5 129,616 10/9/2020
2020.10.5.1 71,601 10/5/2020
2020.10.4.1 788 10/4/2020
2020.10.1.1 19,321 10/1/2020
2020.9.29.9 13,287 9/29/2020
2020.9.24.2 24,324 9/24/2020
2020.9.11.1 50,623 9/11/2020
2020.9.11 621 9/11/2020
2020.9.8 18,021 9/8/2020
2020.9.6.4 5,561 9/6/2020
2020.9.6.3 792 9/6/2020
2020.9.6.2 2,146 9/6/2020
2020.9.3.1 15,407 9/3/2020

28 October 2024
- Fix Obfuscation tool error

01 September 2024
- Fix SSL bug

19 August 2024
- TestClock update
- Fix bug in TLS client

14 August 2024
- update to include SDK 8.0.8 and 6.0.33

12 August 2024
- update template for ILogger.LogException(exception)

11 July 2024
- Update to SDK 8.0.303 for .net 8 and 6

03 July 2024
- remove code analysis dependency

25 June 2024
- Net Packages update

14 May 2024
- Add .net string extension methods for NETSTANDARD2_0.

6 March 2024
- Bring native support for [1..] and [..^1] range and index operation to .net standard 2.0 projects
- Brings support for string Replace(this string original, string newValue, StringComparison comparisonType) to .net standard 2.0 projects



1 March 2024
- Add NistClock, extension methods, new methods for Guard class

19 February 2024
- Add Documentation API

3 February 2024
- Enable Logging in Walter Framework using the AddLoggingForWalter extension on the IServiceProvider interface

18 January 2024
- Update package to include other frameworks
- Add new License framework
- Add Cypher, DateTime mocking and other helper methods
- Add and update extension methods to be AOT compatible
- Make nuget package and enable trimming for consuming applications
- see on-line help at https://walter.vesnx.com/

14 November 2023
- Add support for .net 8