|
|
|
|
|
- Availability of algorithms
- HashCheckString and UNICODE
HashCheckString (Function) Sintaxis
Checking a simple hash Ocultar los detalles
<Result> = HashCheckString(<Type of algorithm> , <String> , <Hash>)
<Result>: Boolean - True if the result when <String> was hashed by <Type of algorithm> corresponds to <Hash>,
- False otherwise.
<Type of algorithm>: Integer constant Indicates the type of algorithm used when hashing the <String>:
| | DJB2 family (Bernstein) | | MD4 family | HA_MD4 | MD5 family | HA_MD5_128 Please note: this type of algorithm is currently deprecated. | MURMUR family | - HA_MURMUR_1 Murmur algorithm version 1: 32-bit hash result
- HA_MURMUR_2 Murmur algorithm version 2: 32-bit hash result
- HA_MURMUR_2_64A Murmur algorithm version 2: 64-bit hash result optimized for 64-bit processors
- HA_MURMUR_2_64B Murmur algorithm version 2: 64-bit hash result optimized for 32-bit processors
- HA_MURMUR_2_A Murmur version 2 incremental algorithm: 32-bit hash result
- HA_MURMUR_2_BIG_ENDIAN Murmur algorithm version 2 for big-endian machine: 32-bit hash result
- HA_MURMUR_2_ALIGNE Murmur algorithm version 2 for aligned machine: 32-bit hash result
- HA_MURMUR_3_32 Murmur algorithm version 3: 32-bit hash result
- HA_MURMUR_3_128_X86 Murmur algorithm version 3: 128-bit hash result optimized for 32-bit processors
- HA_MURMUR_3_128_X64 Murmur algorithm version 3: 128-bit hash result optimized for 64-bit processors
| RIPEMD family | - HA_RIPEMD_128
- HA_RIPEMD_160
| SHA family | - HA_SHA_160 (also called SHA-1)
- HA_SHA_256 (FIPS PUB 198 specifications)
- HA_SHA_256_DOUBLE
- HA_SHA_384
- HA_SHA_512
| SHA-3 family | - HA_SHA3_224
- HA_SHA3_256
- HA_SHA3_384
- HA_SHA3_512
| TIGER family | - HA_TIGER_128
- HA_TIGER_160
- HA_TIGER_192
| WHIRLPOOL family | HA_WHIRLPOOL | CKSUM family | - HA_CKSUM_8
- HA_CKSUM_16
- HA_CKSUM_32
- HA_CKSUM_64
|
- MD4 / MD5 / SHA / RIPEMD algorithms: classic cryptographic hash functions.
- TIGER / WHIRLPOOL algorithms: hash functions with very good cryptographic properties, optimized for 64-bit (but can be used in 32-bit).
- CKSUM algorithms: hash functions with no cryptographic properties, to be used only for minimal checks or hash tables.
- DJB2 algorithm (Bernstein): string-only hash functions with no cryptographic properties, to be used only for minimal checks or hash tables. Few risks to get an identical hash.
- MURMUR algorithm: very fast hash functions with no cryptographic properties. This algorithm is used by the "bloom filter" of bitcoin wallets.
<String>: Character string String for which the Hash will be checked. <Hash>: Character string Hash of string to check. This Hash must be the result of HashString previously called for <String> using the <Type of algorithm>.
Checking a hash with message authentication (HMAC/MURMUR algorithm) Ocultar los detalles
<Result> = HashCheckString(<Type of algorithm> , <String> , <Hash> , <Secret key>)
<Result>: Boolean - True if the result when <String> was hashed by <Type of algorithm> corresponds to <Hash>,
- False otherwise.
<Type of algorithm>: Integer constant Indicates the type of algorithm (HMAC or MURMUR) used to hash the <String>:
| | MD4 family | HA_HMAC_MD4
| MD5 family | HA_HMAC_MD5_128 Please note: this type of algorithm is currently deprecated. | MURMUR family | - HA_MURMUR_1 Murmur algorithm version 1: 32-bit hash result
- HA_MURMUR_2 Murmur algorithm version 2: 32-bit hash result
- HA_MURMUR_2_64A Murmur algorithm version 2: 64-bit hash result optimized for 64-bit processors
- HA_MURMUR_2_64B Murmur algorithm version 2: 64-bit hash result optimized for 32-bit processors
- HA_MURMUR_2_A Murmur version 2 incremental algorithm: 32-bit hash result
- HA_MURMUR_2_BIG_ENDIAN Murmur algorithm version 2 for big-endian machine: 32-bit hash result
- HA_MURMUR_2_ALIGNE Murmur algorithm version 2 for aligned machine: 32-bit hash result
- HA_MURMUR_3_32 Murmur algorithm version 3: 32-bit hash result
- HA_MURMUR_3_128_X86 Murmur algorithm version 3: 128-bit hash result optimized for 32-bit processors
- HA_MURMUR_3_128_X64 Murmur algorithm version 3: 128-bit hash result optimized for 64-bit processors
| RIPEMD family | - HA_HMAC_RIPEMD_128
- HA_HMAC_RIPEMD_160
| SHA family | - HA_HMAC_SHA_160
- HA_HMAC_SHA_256
- HA_HMAC_SHA_256_DOUBLE
- HA_HMAC_SHA_384
- HA_HMAC_SHA_512
| SHA-3 family | - HA_HMAC_SHA3_224
- HA_HMAC_SHA3_256
- HA_HMAC_SHA3_384
- HA_HMAC_SHA3_512
| TIGER family | - HA_HMAC_TIGER_128
- HA_HMAC_TIGER_160
- HA_HMAC_TIGER_192
| WHIRLPOOL family | HA_HMAC_WHIRLPOOL |
- MD4 / MD5 / SHA / RIPEMD algorithms: classic cryptographic hash functions.
- TIGER / WHIRLPOOL algorithms: hash functions with very good cryptographic properties, optimized for 64-bit (but can be used in 32-bit).
- MURMUR algorithm: very fast hash functions with no cryptographic properties. This algorithm is used by the "bloom filter" of bitcoin wallets.
<String>: Character string String for which the Hash will be checked. <Hash>: Character string Hash of string to check. This Hash must be the result of HashString previously called for <String> using the <Type of algorithm>. <Secret key>: Character string or Secret string Authentication key of message. This key must be identical to the one used to calculate the Hash.
Novedad versión 2025Cadenas secretas: Si utiliza el almacén de cadenas secretas, el tipo de cadena secreta utilizado para este parámetro puede ser: - Buffer - ASCII o Buffer - UTF-8,
- ANSI string - Latin,
- ANSI o Unicode string,
- Unicode string.
Para obtener más información sobre las cadenas secretas y el almacén, consulte Almacén de cadenas secretas. Novedad versión 2025 Observaciones HashCheckString and UNICODE Cross-platform development To use string hashes across platforms (e.g. a hash generated on iOS and verified on Android or Windows), do not use Unicode strings. Indeed, the Unicode strings do not have the same format according to the platforms. In this case, we advise you to use strings in ANSI or UTF 8 format (and to convert the Unicode strings if necessary). Clasificación Lógica de negocio / UI: Lógica de negocio
Esta página también está disponible para…
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|