Sha256Crypter Class | CryptSharp |
SHA256 crypt. A reasonable choice if you cannot use Blowfish crypt for policy reasons.
Inheritance Hierarchy
CryptSharpShaCrypter
CryptSharpSha256Crypter
Namespace: CryptSharp
Assembly: CryptSharp (in CryptSharp.dll) Version: 2.1.0.0
Syntax
public class Sha256Crypter : ShaCrypter
Public Class Sha256Crypter Inherits ShaCrypter
public ref class Sha256Crypter : public ShaCrypter
type Sha256Crypter = class inherit ShaCrypter end
The Sha256Crypter type exposes the following members.
Constructors
Name | Description | |
---|---|---|
Sha256Crypter | Initializes a new instance of the Sha256Crypter class |
Methods
Name | Description | |
---|---|---|
CanCrypt |
Checks if the particular crypt algorithm is compatible with the salt string or crypted password.
(Inherited from ShaCrypter.) | |
Crypt(Byte) |
Creates a one-way password hash (crypted password) from password bytes.
(Inherited from Crypter.) | |
Crypt(String) |
Creates a one-way password hash (crypted password) from a password string.
(Inherited from Crypter.) | |
Crypt(Byte, CrypterOptions) |
Creates a one-way password hash (crypted password) from password bytes.
Options modify the crypt operation.
(Inherited from Crypter.) | |
Crypt(String, CrypterOptions) |
Creates a one-way password hash (crypted password) from a password string.
Options modify the crypt operation.
(Inherited from Crypter.) | |
Crypt(String, String) |
Creates a one-way password hash (crypted password) from a password string and a salt string.
The salt can be produced using GenerateSalt(CrypterOptions).
Because crypted passwords take the form algorithm+salt+hash, if you pass
a crypted password as the salt parameter, the same algorithm and salt will be used to re-crypt the
password. Since randomness comes from the salt, the same salt means the same hash, and so the
same crypted password will result. Therefore, this method can both generate *and* verify crypted passwords.
(Inherited from Crypter.) | |
Crypt(Byte, String) |
Creates a one-way password hash (crypted password) from password bytes and a salt string.
The salt can be produced using GenerateSalt(CrypterOptions).
Because crypted passwords take the form algorithm+salt+hash, if you pass
a crypted password as the salt parameter, the same algorithm and salt will be used to re-crypt the
password. Since randomness comes from the salt, the same salt means the same hash, and so the
same crypted password will result. Therefore, this method can both generate *and* verify crypted passwords.
(Inherited from ShaCrypter.) | |
GenerateSalt |
Generates a salt string with default options.
The purpose of salt is to make dictionary attacks against a whole password database much harder,
by causing the crypted password to be different even if two users have the same uncrypted password.
(Inherited from Crypter.) | |
GenerateSalt(Int32) |
Generates a salt string using the specified number of rounds.
The purpose of salt is to make dictionary attacks against a whole password database much harder,
by causing the crypted password to be different even if two users have the same uncrypted password.
(Inherited from Crypter.) | |
GenerateSalt(CrypterOptions) |
Generates a salt string. Options are used to modify the salt generation.
The purpose of salt is to make dictionary attacks against a whole password database much harder,
by causing the crypted password to be different even if two users have the same uncrypted password.
Randomness in a crypted password comes from its salt string, as do all recorded options.
The same salt string, when combined with the same password, will generate the same crypted password.
If the salt string differs, the same password will generate a different crypted password
(crypted passwords have the form algorithm+salt+hash, so the salt is always carried along
with the crypted password).
(Inherited from ShaCrypter.) |
Properties
Name | Description | |
---|---|---|
Properties |
Properties inherent to the particular crypt algorithm. These cannot be modified.
See CrypterProperty for possible keys.
(Inherited from ShaCrypter.) |
See Also