Sha512Crypter Methods | CryptSharp |
The Sha512Crypter type exposes the following members.
Methods
Name | Description | |
---|---|---|
CanCrypt |
Checks if the particular crypt algorithm is compatible with the salt string or crypted password.
(Inherited from ShaCrypter.) |
|
Crypt(Byte) |
Creates a one-way password hash (crypted password) from password bytes.
(Inherited from Crypter.) |
|
Crypt(String) |
Creates a one-way password hash (crypted password) from a password string.
(Inherited from Crypter.) |
|
Crypt(Byte, CrypterOptions) |
Creates a one-way password hash (crypted password) from password bytes.
Options modify the crypt operation.
(Inherited from Crypter.) |
|
Crypt(String, CrypterOptions) |
Creates a one-way password hash (crypted password) from a password string.
Options modify the crypt operation.
(Inherited from Crypter.) |
|
Crypt(String, String) |
Creates a one-way password hash (crypted password) from a password string and a salt string.
The salt can be produced using GenerateSalt(CrypterOptions).
Because crypted passwords take the form algorithm+salt+hash, if you pass
a crypted password as the salt parameter, the same algorithm and salt will be used to re-crypt the
password. Since randomness comes from the salt, the same salt means the same hash, and so the
same crypted password will result. Therefore, this method can both generate *and* verify crypted passwords.
(Inherited from Crypter.) |
|
Crypt(Byte, String) |
Creates a one-way password hash (crypted password) from password bytes and a salt string.
The salt can be produced using GenerateSalt(CrypterOptions).
Because crypted passwords take the form algorithm+salt+hash, if you pass
a crypted password as the salt parameter, the same algorithm and salt will be used to re-crypt the
password. Since randomness comes from the salt, the same salt means the same hash, and so the
same crypted password will result. Therefore, this method can both generate *and* verify crypted passwords.
(Inherited from ShaCrypter.) |
|
GenerateSalt |
Generates a salt string with default options.
The purpose of salt is to make dictionary attacks against a whole password database much harder,
by causing the crypted password to be different even if two users have the same uncrypted password.
(Inherited from Crypter.) |
|
GenerateSalt(Int32) |
Generates a salt string using the specified number of rounds.
The purpose of salt is to make dictionary attacks against a whole password database much harder,
by causing the crypted password to be different even if two users have the same uncrypted password.
(Inherited from Crypter.) |
|
GenerateSalt(CrypterOptions) |
Generates a salt string. Options are used to modify the salt generation.
The purpose of salt is to make dictionary attacks against a whole password database much harder,
by causing the crypted password to be different even if two users have the same uncrypted password.
Randomness in a crypted password comes from its salt string, as do all recorded options.
The same salt string, when combined with the same password, will generate the same crypted password.
If the salt string differs, the same password will generate a different crypted password
(crypted passwords have the form algorithm+salt+hash, so the salt is always carried along
with the crypted password).
(Inherited from ShaCrypter.) |
See Also