PasswordDeriveBytes Constructors
Definition
Important
Some information relates to prerelease product that may be substantially modified before it’s released. Microsoft makes no warranties, express or implied, with respect to the information provided here.
Initializes a new instance of the PasswordDeriveBytes class.
Overloads
PasswordDeriveBytes(Byte[], Byte[]) |
Initializes a new instance of the PasswordDeriveBytes class specifying the password and key salt to use to derive the key. |
PasswordDeriveBytes(String, Byte[]) |
Initializes a new instance of the PasswordDeriveBytes class with the password and key salt to use to derive the key. |
PasswordDeriveBytes(Byte[], Byte[], CspParameters) |
Initializes a new instance of the PasswordDeriveBytes class specifying the password, key salt, and cryptographic service provider (CSP) to use to derive the key. |
PasswordDeriveBytes(String, Byte[], CspParameters) |
Initializes a new instance of the PasswordDeriveBytes class with the password, key salt, and cryptographic service provider (CSP) parameters to use to derive the key. |
PasswordDeriveBytes(Byte[], Byte[], String, Int32) |
Initializes a new instance of the PasswordDeriveBytes class specifying the password, key salt, hash name, and iterations to use to derive the key. |
PasswordDeriveBytes(String, Byte[], String, Int32) |
Initializes a new instance of the PasswordDeriveBytes class with the password, key salt, hash name, and number of iterations to use to derive the key. |
PasswordDeriveBytes(Byte[], Byte[], String, Int32, CspParameters) |
Initializes a new instance of the PasswordDeriveBytes class specifying the password, key salt, hash name, iterations, and cryptographic service provider (CSP) to use to derive the key. |
PasswordDeriveBytes(String, Byte[], String, Int32, CspParameters) |
Initializes a new instance of the PasswordDeriveBytes class with the password, key salt, hash name, number of iterations, and cryptographic service provider (CSP) parameters to use to derive the key. |
PasswordDeriveBytes(Byte[], Byte[])
- Source:
- PasswordDeriveBytes.cs
- Source:
- PasswordDeriveBytes.cs
- Source:
- PasswordDeriveBytes.cs
Initializes a new instance of the PasswordDeriveBytes class specifying the password and key salt to use to derive the key.
public:
PasswordDeriveBytes(cli::array <System::Byte> ^ password, cli::array <System::Byte> ^ salt);
public PasswordDeriveBytes (byte[] password, byte[]? salt);
public PasswordDeriveBytes (byte[] password, byte[] salt);
new System.Security.Cryptography.PasswordDeriveBytes : byte[] * byte[] -> System.Security.Cryptography.PasswordDeriveBytes
Public Sub New (password As Byte(), salt As Byte())
Parameters
- password
- Byte[]
The password to derive the key for.
- salt
- Byte[]
The key salt to use to derive the key.
Examples
The following code example creates a key from a password using the PasswordDeriveBytes class.
using namespace System;
using namespace System::Security::Cryptography;
using namespace System::Text;
// Generates a random salt value of the specified length.
array<Byte>^ CreateRandomSalt(int length)
{
// Create a buffer
array<Byte>^ randomBytes;
if (length >= 1)
{
randomBytes = gcnew array <Byte>(length);
}
else
{
randomBytes = gcnew array <Byte>(1);
}
// Create a new RandomNumberGenerator.
RandomNumberGenerator^ randomNumberGenerator =
RandomNumberGenerator::Create();
// Fill the buffer with random bytes.
randomNumberGenerator->GetBytes(randomBytes);
// return the bytes.
return randomBytes;
}
// Clears the bytes in a buffer so they can't later be read from memory.
void ClearBytes(array<Byte>^ buffer)
{
// Check arguments.
if (buffer == nullptr)
{
throw gcnew ArgumentNullException("buffer");
}
// Set each byte in the buffer to 0.
for (int x = 0; x <= buffer->Length - 1; x++)
{
buffer[x] = 0;
}
}
int main(array<String^>^ args)
{
// Get a password from the user.
Console::WriteLine("Enter a password to produce a key:");
// Security Note: Never hard-code a password within your
// source code. Hard-coded passwords can be retrieved
// from a compiled assembly.
array<Byte>^ password = Encoding::Unicode->GetBytes(Console::ReadLine());
array<Byte>^ randomSalt = CreateRandomSalt(7);
// Create a TripleDESCryptoServiceProvider object.
TripleDESCryptoServiceProvider^ cryptoDESProvider =
gcnew TripleDESCryptoServiceProvider();
try
{
Console::WriteLine("Creating a key with PasswordDeriveBytes...");
// Create a PasswordDeriveBytes object and then create
// a TripleDES key from the password and salt.
PasswordDeriveBytes^ passwordDeriveBytes = gcnew PasswordDeriveBytes
(password->ToString(), randomSalt);
// Create the key and set it to the Key property
// of the TripleDESCryptoServiceProvider object.
// This example uses the SHA1 algorithm.
// Due to collision problems with SHA1, Microsoft recommends SHA256 or better.
cryptoDESProvider->Key = passwordDeriveBytes->CryptDeriveKey
("TripleDES", "SHA1", 192, cryptoDESProvider->IV);
Console::WriteLine("Operation complete.");
}
catch (Exception^ ex)
{
Console::WriteLine(ex->Message);
}
finally
{
// Clear the buffers
ClearBytes(password);
ClearBytes(randomSalt);
// Clear the key.
cryptoDESProvider->Clear();
}
Console::ReadLine();
}
using System;
using System.Security.Cryptography;
using System.Text;
public class PasswordDerivedBytesExample
{
public static void Main(String[] args)
{
// Get a password from the user.
Console.WriteLine("Enter a password to produce a key:");
byte[] pwd = Encoding.Unicode.GetBytes(Console.ReadLine());
byte[] salt = CreateRandomSalt(7);
// Create a TripleDESCryptoServiceProvider object.
TripleDESCryptoServiceProvider tdes = new TripleDESCryptoServiceProvider();
try
{
Console.WriteLine("Creating a key with PasswordDeriveBytes...");
// Create a PasswordDeriveBytes object and then create
// a TripleDES key from the password and salt.
PasswordDeriveBytes pdb = new PasswordDeriveBytes(pwd, salt);
// Create the key and set it to the Key property
// of the TripleDESCryptoServiceProvider object.
// This example uses the SHA1 algorithm.
// Due to collision problems with SHA1, Microsoft recommends SHA256 or better.
tdes.Key = pdb.CryptDeriveKey("TripleDES", "SHA1", 192, tdes.IV);
Console.WriteLine("Operation complete.");
}
catch (Exception e)
{
Console.WriteLine(e.Message);
}
finally
{
// Clear the buffers
ClearBytes(pwd);
ClearBytes(salt);
// Clear the key.
tdes.Clear();
}
Console.ReadLine();
}
//////////////////////////////////////////////////////////
// Helper methods:
// CreateRandomSalt: Generates a random salt value of the
// specified length.
//
// ClearBytes: Clear the bytes in a buffer so they can't
// later be read from memory.
//////////////////////////////////////////////////////////
public static byte[] CreateRandomSalt(int length)
{
// Create a buffer
byte[] randBytes;
if (length >= 1)
{
randBytes = new byte[length];
}
else
{
randBytes = new byte[1];
}
using (RandomNumberGenerator rng = RandomNumberGenerator.Create())
{
// Fill the buffer with random bytes.
rng.GetBytes(randBytes);
}
// return the bytes.
return randBytes;
}
public static void ClearBytes(byte[] buffer)
{
// Check arguments.
if (buffer == null)
{
throw new ArgumentException("buffer");
}
// Set each byte in the buffer to 0.
for (int x = 0; x < buffer.Length; x++)
{
buffer[x] = 0;
}
}
}
Imports System.Security.Cryptography
Imports System.Text
Module PasswordDerivedBytesExample
Sub Main(ByVal args() As String)
' Get a password from the user.
Console.WriteLine("Enter a password to produce a key:")
Dim pwd As Byte() = Encoding.Unicode.GetBytes(Console.ReadLine())
Dim salt As Byte() = CreateRandomSalt(7)
' Create a TripleDESCryptoServiceProvider object.
Dim tdes As New TripleDESCryptoServiceProvider()
Try
Console.WriteLine("Creating a key with PasswordDeriveBytes...")
' Create a PasswordDeriveBytes object and then create
' a TripleDES key from the password and salt.
Dim pdb As New PasswordDeriveBytes(pwd, salt)
' Create the key and set it to the Key property
' of the TripleDESCryptoServiceProvider object.
' This example uses the SHA1 algorithm.
' Due to collision problems with SHA1, Microsoft recommends SHA256 or better.
tdes.Key = pdb.CryptDeriveKey("TripleDES", "SHA1", 192, tdes.IV)
Console.WriteLine("Operation complete.")
Catch e As Exception
Console.WriteLine(e.Message)
Finally
' Clear the buffers
ClearBytes(pwd)
ClearBytes(salt)
' Clear the key.
tdes.Clear()
End Try
Console.ReadLine()
End Sub
'********************************************************
'* Helper methods:
'* createRandomSalt: Generates a random salt value of the
'* specified length.
'*
'* clearBytes: Clear the bytes in a buffer so they can't
'* later be read from memory.
'********************************************************
Function CreateRandomSalt(ByVal length As Integer) As Byte()
' Create a buffer
Dim randBytes() As Byte
If length >= 1 Then
randBytes = New Byte(length) {}
Else
randBytes = New Byte(0) {}
End If
' Create a new RandomNumberGenerator.
Using rand As RandomNumberGenerator = RandomNumberGenerator.Create()
' Fill the buffer with random bytes.
rand.GetBytes(randBytes)
End Using
' return the bytes.
Return randBytes
End Function
Sub ClearBytes(ByVal buffer() As Byte)
' Check arguments.
If buffer Is Nothing Then
Throw New ArgumentException("buffer")
End If
' Set each byte in the buffer to 0.
Dim x As Integer
For x = 0 To buffer.Length - 1
buffer(x) = 0
Next x
End Sub
End Module
Remarks
Important
Never hard code a password within your source code. Hard-coded passwords can be retrieved from an assembly using the Ildasm.exe (IL Disassembler), a hex editor, or by simply opening up the assembly in a text editor such as Notepad.exe.
See also
Applies to
PasswordDeriveBytes(String, Byte[])
- Source:
- PasswordDeriveBytes.cs
- Source:
- PasswordDeriveBytes.cs
- Source:
- PasswordDeriveBytes.cs
Initializes a new instance of the PasswordDeriveBytes class with the password and key salt to use to derive the key.
public:
PasswordDeriveBytes(System::String ^ strPassword, cli::array <System::Byte> ^ rgbSalt);
public PasswordDeriveBytes (string strPassword, byte[]? rgbSalt);
public PasswordDeriveBytes (string strPassword, byte[] rgbSalt);
new System.Security.Cryptography.PasswordDeriveBytes : string * byte[] -> System.Security.Cryptography.PasswordDeriveBytes
Public Sub New (strPassword As String, rgbSalt As Byte())
Parameters
- strPassword
- String
The password for which to derive the key.
- rgbSalt
- Byte[]
The key salt to use to derive the key.
Remarks
Important
Never hard-code a password within your source code. Hard coded passwords can be retrieved from an assembly using the Ildasm.exe (IL Disassembler) tool, a hex editor, or by simply opening up the assembly in a text editor like notepad.exe.
See also
Applies to
PasswordDeriveBytes(Byte[], Byte[], CspParameters)
- Source:
- PasswordDeriveBytes.cs
- Source:
- PasswordDeriveBytes.cs
- Source:
- PasswordDeriveBytes.cs
Initializes a new instance of the PasswordDeriveBytes class specifying the password, key salt, and cryptographic service provider (CSP) to use to derive the key.
public:
PasswordDeriveBytes(cli::array <System::Byte> ^ password, cli::array <System::Byte> ^ salt, System::Security::Cryptography::CspParameters ^ cspParams);
public PasswordDeriveBytes (byte[] password, byte[]? salt, System.Security.Cryptography.CspParameters? cspParams);
public PasswordDeriveBytes (byte[] password, byte[] salt, System.Security.Cryptography.CspParameters cspParams);
new System.Security.Cryptography.PasswordDeriveBytes : byte[] * byte[] * System.Security.Cryptography.CspParameters -> System.Security.Cryptography.PasswordDeriveBytes
Public Sub New (password As Byte(), salt As Byte(), cspParams As CspParameters)
Parameters
- password
- Byte[]
The password to derive the key for.
- salt
- Byte[]
The key salt to use to derive the key.
- cspParams
- CspParameters
The cryptographic service provider (CSP) parameters for the operation.
Examples
The following code example creates a key from a password using the PasswordDeriveBytes class.
using namespace System;
using namespace System::Security::Cryptography;
using namespace System::Text;
// Generates a random salt value of the specified length.
array<Byte>^ CreateRandomSalt(int length)
{
// Create a buffer
array<Byte>^ randomBytes;
if (length >= 1)
{
randomBytes = gcnew array <Byte>(length);
}
else
{
randomBytes = gcnew array <Byte>(1);
}
// Create a new RandomNumberGenerator.
RandomNumberGenerator^ randomNumberGenerator =
RandomNumberGenerator::Create();
// Fill the buffer with random bytes.
randomNumberGenerator->GetBytes(randomBytes);
// return the bytes.
return randomBytes;
}
// Clears the bytes in a buffer so they can't later be read from memory.
void ClearBytes(array<Byte>^ buffer)
{
// Check arguments.
if (buffer == nullptr)
{
throw gcnew ArgumentNullException("buffer");
}
// Set each byte in the buffer to 0.
for (int x = 0; x <= buffer->Length - 1; x++)
{
buffer[x] = 0;
}
}
int main(array<String^>^ args)
{
// Get a password from the user.
Console::WriteLine("Enter a password to produce a key:");
// Security Note: Never hard-code a password within your
// source code. Hard-coded passwords can be retrieved
// from a compiled assembly.
array<Byte>^ password = Encoding::Unicode->GetBytes(Console::ReadLine());
array<Byte>^ randomSalt = CreateRandomSalt(7);
// Create a TripleDESCryptoServiceProvider object.
TripleDESCryptoServiceProvider^ cryptoDESProvider =
gcnew TripleDESCryptoServiceProvider();
try
{
Console::WriteLine("Creating a key with PasswordDeriveBytes...");
// Create a PasswordDeriveBytes object and then create
// a TripleDES key from the password and salt.
PasswordDeriveBytes^ passwordDeriveBytes = gcnew PasswordDeriveBytes
(password->ToString(), randomSalt);
// Create the key and set it to the Key property
// of the TripleDESCryptoServiceProvider object.
// This example uses the SHA1 algorithm.
// Due to collision problems with SHA1, Microsoft recommends SHA256 or better.
cryptoDESProvider->Key = passwordDeriveBytes->CryptDeriveKey
("TripleDES", "SHA1", 192, cryptoDESProvider->IV);
Console::WriteLine("Operation complete.");
}
catch (Exception^ ex)
{
Console::WriteLine(ex->Message);
}
finally
{
// Clear the buffers
ClearBytes(password);
ClearBytes(randomSalt);
// Clear the key.
cryptoDESProvider->Clear();
}
Console::ReadLine();
}
using System;
using System.Security.Cryptography;
using System.Text;
public class PasswordDerivedBytesExample
{
public static void Main(String[] args)
{
// Get a password from the user.
Console.WriteLine("Enter a password to produce a key:");
byte[] pwd = Encoding.Unicode.GetBytes(Console.ReadLine());
byte[] salt = CreateRandomSalt(7);
// Create a TripleDESCryptoServiceProvider object.
TripleDESCryptoServiceProvider tdes = new TripleDESCryptoServiceProvider();
try
{
Console.WriteLine("Creating a key with PasswordDeriveBytes...");
// Create a PasswordDeriveBytes object and then create
// a TripleDES key from the password and salt.
PasswordDeriveBytes pdb = new PasswordDeriveBytes(pwd, salt);
// Create the key and set it to the Key property
// of the TripleDESCryptoServiceProvider object.
// This example uses the SHA1 algorithm.
// Due to collision problems with SHA1, Microsoft recommends SHA256 or better.
tdes.Key = pdb.CryptDeriveKey("TripleDES", "SHA1", 192, tdes.IV);
Console.WriteLine("Operation complete.");
}
catch (Exception e)
{
Console.WriteLine(e.Message);
}
finally
{
// Clear the buffers
ClearBytes(pwd);
ClearBytes(salt);
// Clear the key.
tdes.Clear();
}
Console.ReadLine();
}
//////////////////////////////////////////////////////////
// Helper methods:
// CreateRandomSalt: Generates a random salt value of the
// specified length.
//
// ClearBytes: Clear the bytes in a buffer so they can't
// later be read from memory.
//////////////////////////////////////////////////////////
public static byte[] CreateRandomSalt(int length)
{
// Create a buffer
byte[] randBytes;
if (length >= 1)
{
randBytes = new byte[length];
}
else
{
randBytes = new byte[1];
}
using (RandomNumberGenerator rng = RandomNumberGenerator.Create())
{
// Fill the buffer with random bytes.
rng.GetBytes(randBytes);
}
// return the bytes.
return randBytes;
}
public static void ClearBytes(byte[] buffer)
{
// Check arguments.
if (buffer == null)
{
throw new ArgumentException("buffer");
}
// Set each byte in the buffer to 0.
for (int x = 0; x < buffer.Length; x++)
{
buffer[x] = 0;
}
}
}
Imports System.Security.Cryptography
Imports System.Text
Module PasswordDerivedBytesExample
Sub Main(ByVal args() As String)
' Get a password from the user.
Console.WriteLine("Enter a password to produce a key:")
Dim pwd As Byte() = Encoding.Unicode.GetBytes(Console.ReadLine())
Dim salt As Byte() = CreateRandomSalt(7)
' Create a TripleDESCryptoServiceProvider object.
Dim tdes As New TripleDESCryptoServiceProvider()
Try
Console.WriteLine("Creating a key with PasswordDeriveBytes...")
' Create a PasswordDeriveBytes object and then create
' a TripleDES key from the password and salt.
Dim pdb As New PasswordDeriveBytes(pwd, salt)
' Create the key and set it to the Key property
' of the TripleDESCryptoServiceProvider object.
' This example uses the SHA1 algorithm.
' Due to collision problems with SHA1, Microsoft recommends SHA256 or better.
tdes.Key = pdb.CryptDeriveKey("TripleDES", "SHA1", 192, tdes.IV)
Console.WriteLine("Operation complete.")
Catch e As Exception
Console.WriteLine(e.Message)
Finally
' Clear the buffers
ClearBytes(pwd)
ClearBytes(salt)
' Clear the key.
tdes.Clear()
End Try
Console.ReadLine()
End Sub
'********************************************************
'* Helper methods:
'* createRandomSalt: Generates a random salt value of the
'* specified length.
'*
'* clearBytes: Clear the bytes in a buffer so they can't
'* later be read from memory.
'********************************************************
Function CreateRandomSalt(ByVal length As Integer) As Byte()
' Create a buffer
Dim randBytes() As Byte
If length >= 1 Then
randBytes = New Byte(length) {}
Else
randBytes = New Byte(0) {}
End If
' Create a new RandomNumberGenerator.
Using rand As RandomNumberGenerator = RandomNumberGenerator.Create()
' Fill the buffer with random bytes.
rand.GetBytes(randBytes)
End Using
' return the bytes.
Return randBytes
End Function
Sub ClearBytes(ByVal buffer() As Byte)
' Check arguments.
If buffer Is Nothing Then
Throw New ArgumentException("buffer")
End If
' Set each byte in the buffer to 0.
Dim x As Integer
For x = 0 To buffer.Length - 1
buffer(x) = 0
Next x
End Sub
End Module
Remarks
Important
Never hard code a password within your source code. Hard-coded passwords can be retrieved from an assembly using the Ildasm.exe (IL Disassembler) l, a hex editor, or by simply opening up the assembly in a text editor such as Notepad.exe.
See also
Applies to
PasswordDeriveBytes(String, Byte[], CspParameters)
- Source:
- PasswordDeriveBytes.cs
- Source:
- PasswordDeriveBytes.cs
- Source:
- PasswordDeriveBytes.cs
Initializes a new instance of the PasswordDeriveBytes class with the password, key salt, and cryptographic service provider (CSP) parameters to use to derive the key.
public:
PasswordDeriveBytes(System::String ^ strPassword, cli::array <System::Byte> ^ rgbSalt, System::Security::Cryptography::CspParameters ^ cspParams);
public PasswordDeriveBytes (string strPassword, byte[]? rgbSalt, System.Security.Cryptography.CspParameters? cspParams);
public PasswordDeriveBytes (string strPassword, byte[] rgbSalt, System.Security.Cryptography.CspParameters cspParams);
new System.Security.Cryptography.PasswordDeriveBytes : string * byte[] * System.Security.Cryptography.CspParameters -> System.Security.Cryptography.PasswordDeriveBytes
Public Sub New (strPassword As String, rgbSalt As Byte(), cspParams As CspParameters)
Parameters
- strPassword
- String
The password for which to derive the key.
- rgbSalt
- Byte[]
The key salt to use to derive the key.
- cspParams
- CspParameters
The CSP parameters for the operation.
Remarks
Important
Never hard-code a password within your source code. Hard coded passwords can be retrieved from an assembly using the Ildasm.exe (IL Disassembler) tool, a hex editor, or by simply opening up the assembly in a text editor like notepad.exe.
See also
Applies to
PasswordDeriveBytes(Byte[], Byte[], String, Int32)
- Source:
- PasswordDeriveBytes.cs
- Source:
- PasswordDeriveBytes.cs
- Source:
- PasswordDeriveBytes.cs
Initializes a new instance of the PasswordDeriveBytes class specifying the password, key salt, hash name, and iterations to use to derive the key.
public:
PasswordDeriveBytes(cli::array <System::Byte> ^ password, cli::array <System::Byte> ^ salt, System::String ^ hashName, int iterations);
public PasswordDeriveBytes (byte[] password, byte[]? salt, string hashName, int iterations);
public PasswordDeriveBytes (byte[] password, byte[] salt, string hashName, int iterations);
new System.Security.Cryptography.PasswordDeriveBytes : byte[] * byte[] * string * int -> System.Security.Cryptography.PasswordDeriveBytes
Public Sub New (password As Byte(), salt As Byte(), hashName As String, iterations As Integer)
Parameters
- password
- Byte[]
The password to derive the key for.
- salt
- Byte[]
The key salt to use to derive the key.
- hashName
- String
The hash algorithm to use to derive the key.
- iterations
- Int32
The iteration count to use to derive the key.
Remarks
Important
Never hard code a password within your source code. Hard-coded passwords can be retrieved from an assembly using the Ildasm.exe (IL Disassembler), a hex editor, or by simply opening up the assembly in a text editor such as Notepad.exe.
For a list of hash algorithm names, see the CryptoConfig class.
See also
Applies to
PasswordDeriveBytes(String, Byte[], String, Int32)
- Source:
- PasswordDeriveBytes.cs
- Source:
- PasswordDeriveBytes.cs
- Source:
- PasswordDeriveBytes.cs
Initializes a new instance of the PasswordDeriveBytes class with the password, key salt, hash name, and number of iterations to use to derive the key.
public:
PasswordDeriveBytes(System::String ^ strPassword, cli::array <System::Byte> ^ rgbSalt, System::String ^ strHashName, int iterations);
public PasswordDeriveBytes (string strPassword, byte[]? rgbSalt, string strHashName, int iterations);
public PasswordDeriveBytes (string strPassword, byte[] rgbSalt, string strHashName, int iterations);
new System.Security.Cryptography.PasswordDeriveBytes : string * byte[] * string * int -> System.Security.Cryptography.PasswordDeriveBytes
Public Sub New (strPassword As String, rgbSalt As Byte(), strHashName As String, iterations As Integer)
Parameters
- strPassword
- String
The password for which to derive the key.
- rgbSalt
- Byte[]
The key salt to use to derive the key.
- strHashName
- String
The name of the hash algorithm for the operation.
- iterations
- Int32
The number of iterations for the operation.
Remarks
Important
Never hard-code a password within your source code. Hard coded passwords can be retrieved from an assembly using the Ildasm.exe (IL Disassembler) tool, a hex editor, or by simply opening up the assembly in a text editor like notepad.exe.
For a list of hash algorithm names, see the CryptoConfig class.
See also
Applies to
PasswordDeriveBytes(Byte[], Byte[], String, Int32, CspParameters)
- Source:
- PasswordDeriveBytes.cs
- Source:
- PasswordDeriveBytes.cs
- Source:
- PasswordDeriveBytes.cs
Initializes a new instance of the PasswordDeriveBytes class specifying the password, key salt, hash name, iterations, and cryptographic service provider (CSP) to use to derive the key.
public:
PasswordDeriveBytes(cli::array <System::Byte> ^ password, cli::array <System::Byte> ^ salt, System::String ^ hashName, int iterations, System::Security::Cryptography::CspParameters ^ cspParams);
public PasswordDeriveBytes (byte[] password, byte[]? salt, string hashName, int iterations, System.Security.Cryptography.CspParameters? cspParams);
public PasswordDeriveBytes (byte[] password, byte[] salt, string hashName, int iterations, System.Security.Cryptography.CspParameters cspParams);
new System.Security.Cryptography.PasswordDeriveBytes : byte[] * byte[] * string * int * System.Security.Cryptography.CspParameters -> System.Security.Cryptography.PasswordDeriveBytes
Public Sub New (password As Byte(), salt As Byte(), hashName As String, iterations As Integer, cspParams As CspParameters)
Parameters
- password
- Byte[]
The password to derive the key for.
- salt
- Byte[]
The key salt to use to derive the key.
- hashName
- String
The hash algorithm to use to derive the key.
- iterations
- Int32
The iteration count to use to derive the key.
- cspParams
- CspParameters
The cryptographic service provider (CSP) parameters for the operation.
Remarks
Important
Never hard code a password within your source code. Hard-coded passwords can be retrieved from an assembly using the Ildasm.exe (IL Disassembler), a hex editor, or by simply opening up the assembly in a text editor such as Notepad.exe.
For a list of hash algorithm names, see the CryptoConfig class.
See also
Applies to
PasswordDeriveBytes(String, Byte[], String, Int32, CspParameters)
- Source:
- PasswordDeriveBytes.cs
- Source:
- PasswordDeriveBytes.cs
- Source:
- PasswordDeriveBytes.cs
Initializes a new instance of the PasswordDeriveBytes class with the password, key salt, hash name, number of iterations, and cryptographic service provider (CSP) parameters to use to derive the key.
public:
PasswordDeriveBytes(System::String ^ strPassword, cli::array <System::Byte> ^ rgbSalt, System::String ^ strHashName, int iterations, System::Security::Cryptography::CspParameters ^ cspParams);
public PasswordDeriveBytes (string strPassword, byte[]? rgbSalt, string strHashName, int iterations, System.Security.Cryptography.CspParameters? cspParams);
public PasswordDeriveBytes (string strPassword, byte[] rgbSalt, string strHashName, int iterations, System.Security.Cryptography.CspParameters cspParams);
new System.Security.Cryptography.PasswordDeriveBytes : string * byte[] * string * int * System.Security.Cryptography.CspParameters -> System.Security.Cryptography.PasswordDeriveBytes
Public Sub New (strPassword As String, rgbSalt As Byte(), strHashName As String, iterations As Integer, cspParams As CspParameters)
Parameters
- strPassword
- String
The password for which to derive the key.
- rgbSalt
- Byte[]
The key salt to use to derive the key.
- strHashName
- String
The name of the hash algorithm for the operation.
- iterations
- Int32
The number of iterations for the operation.
- cspParams
- CspParameters
The CSP parameters for the operation.
Remarks
Important
Never hard-code a password within your source code. Hard coded passwords can be retrieved from an assembly using the Ildasm.exe (IL Disassembler) tool, a hex editor, or by simply opening up the assembly in a text editor like notepad.exe.
For a list of hash algorithm names, see the CryptoConfig class.