PasswordDeriveBytes 建構函式
定義
重要
部分資訊涉及發行前產品,在發行之前可能會有大幅修改。 Microsoft 對此處提供的資訊,不做任何明確或隱含的瑕疵擔保。
初始化 PasswordDeriveBytes 類別的新執行個體。
多載
PasswordDeriveBytes(Byte[], Byte[]) |
指定用來衍生金鑰的密碼和金鑰 Salt,初始化 PasswordDeriveBytes 類別的新執行個體。 |
PasswordDeriveBytes(String, Byte[]) |
使用用來衍生金鑰的密碼和金鑰 Salt,初始化 PasswordDeriveBytes 類別的新執行個體。 |
PasswordDeriveBytes(Byte[], Byte[], CspParameters) |
指定用來衍生金鑰的密碼、金鑰 Salt 和密碼編譯服務提供者 (CSP),初始化 PasswordDeriveBytes 類別的新執行個體。 |
PasswordDeriveBytes(String, Byte[], CspParameters) |
使用用來衍生金鑰的密碼、金鑰 Salt 和密碼編譯服務提供者 (CSP),初始化 PasswordDeriveBytes 類別的新執行個體。 |
PasswordDeriveBytes(Byte[], Byte[], String, Int32) |
指定用來衍生金鑰的密碼、金鑰 Salt、雜湊名稱和反覆運算,初始化 PasswordDeriveBytes 類別的新執行個體。 |
PasswordDeriveBytes(String, Byte[], String, Int32) |
使用用來衍生金鑰的密碼、金鑰 Salt、雜湊名稱和重複次數,初始化 PasswordDeriveBytes 類別的新執行個體。 |
PasswordDeriveBytes(Byte[], Byte[], String, Int32, CspParameters) |
指定用來衍生金鑰的密碼、金鑰 Salt、雜湊名稱、反覆運算和密碼編譯服務提供者 (CSP),初始化 PasswordDeriveBytes 類別的新執行個體。 |
PasswordDeriveBytes(String, Byte[], String, Int32, CspParameters) |
使用用來衍生金鑰的密碼、金鑰 Salt、雜湊名稱、重複次數和密碼編譯服務提供者 (CSP),初始化 PasswordDeriveBytes 類別的新執行個體。 |
PasswordDeriveBytes(Byte[], Byte[])
指定用來衍生金鑰的密碼和金鑰 Salt,初始化 PasswordDeriveBytes 類別的新執行個體。
public:
PasswordDeriveBytes(cli::array <System::Byte> ^ password, cli::array <System::Byte> ^ salt);
public PasswordDeriveBytes (byte[] password, byte[]? salt);
public PasswordDeriveBytes (byte[] password, byte[] salt);
new System.Security.Cryptography.PasswordDeriveBytes : byte[] * byte[] -> System.Security.Cryptography.PasswordDeriveBytes
Public Sub New (password As Byte(), salt As Byte())
參數
- password
- Byte[]
用來衍生金鑰的密碼。
- salt
- Byte[]
用來衍生金鑰的金鑰 Salt。
範例
下列程式代碼範例會使用 PasswordDeriveBytes 類別,從密碼建立密鑰。
using namespace System;
using namespace System::Security::Cryptography;
using namespace System::Text;
// Generates a random salt value of the specified length.
array<Byte>^ CreateRandomSalt(int length)
{
// Create a buffer
array<Byte>^ randomBytes;
if (length >= 1)
{
randomBytes = gcnew array <Byte>(length);
}
else
{
randomBytes = gcnew array <Byte>(1);
}
// Create a new RNGCryptoServiceProvider.
RNGCryptoServiceProvider^ cryptoRNGProvider =
gcnew RNGCryptoServiceProvider();
// Fill the buffer with random bytes.
cryptoRNGProvider->GetBytes(randomBytes);
// return the bytes.
return randomBytes;
}
// Clears the bytes in a buffer so they can't later be read from memory.
void ClearBytes(array<Byte>^ buffer)
{
// Check arguments.
if (buffer == nullptr)
{
throw gcnew ArgumentNullException("buffer");
}
// Set each byte in the buffer to 0.
for (int x = 0; x <= buffer->Length - 1; x++)
{
buffer[x] = 0;
}
}
int main(array<String^>^ args)
{
// Get a password from the user.
Console::WriteLine("Enter a password to produce a key:");
// Security Note: Never hard-code a password within your
// source code. Hard-coded passwords can be retrieved
// from a compiled assembly.
array<Byte>^ password = Encoding::Unicode->GetBytes(Console::ReadLine());
array<Byte>^ randomSalt = CreateRandomSalt(7);
// Create a TripleDESCryptoServiceProvider object.
TripleDESCryptoServiceProvider^ cryptoDESProvider =
gcnew TripleDESCryptoServiceProvider();
try
{
Console::WriteLine("Creating a key with PasswordDeriveBytes...");
// Create a PasswordDeriveBytes object and then create
// a TripleDES key from the password and salt.
PasswordDeriveBytes^ passwordDeriveBytes = gcnew PasswordDeriveBytes
(password->ToString(), randomSalt);
// Create the key and set it to the Key property
// of the TripleDESCryptoServiceProvider object.
// This example uses the SHA1 algorithm.
// Due to collision problems with SHA1, Microsoft recommends SHA256 or better.
cryptoDESProvider->Key = passwordDeriveBytes->CryptDeriveKey
("TripleDES", "SHA1", 192, cryptoDESProvider->IV);
Console::WriteLine("Operation complete.");
}
catch (Exception^ ex)
{
Console::WriteLine(ex->Message);
}
finally
{
// Clear the buffers
ClearBytes(password);
ClearBytes(randomSalt);
// Clear the key.
cryptoDESProvider->Clear();
}
Console::ReadLine();
}
using System;
using System.Security.Cryptography;
using System.Text;
public class PasswordDerivedBytesExample
{
public static void Main(String[] args)
{
// Get a password from the user.
Console.WriteLine("Enter a password to produce a key:");
byte[] pwd = Encoding.Unicode.GetBytes(Console.ReadLine());
byte[] salt = CreateRandomSalt(7);
// Create a TripleDESCryptoServiceProvider object.
TripleDESCryptoServiceProvider tdes = new TripleDESCryptoServiceProvider();
try
{
Console.WriteLine("Creating a key with PasswordDeriveBytes...");
// Create a PasswordDeriveBytes object and then create
// a TripleDES key from the password and salt.
PasswordDeriveBytes pdb = new PasswordDeriveBytes(pwd, salt);
// Create the key and set it to the Key property
// of the TripleDESCryptoServiceProvider object.
// This example uses the SHA1 algorithm.
// Due to collision problems with SHA1, Microsoft recommends SHA256 or better.
tdes.Key = pdb.CryptDeriveKey("TripleDES", "SHA1", 192, tdes.IV);
Console.WriteLine("Operation complete.");
}
catch (Exception e)
{
Console.WriteLine(e.Message);
}
finally
{
// Clear the buffers
ClearBytes(pwd);
ClearBytes(salt);
// Clear the key.
tdes.Clear();
}
Console.ReadLine();
}
//////////////////////////////////////////////////////////
// Helper methods:
// CreateRandomSalt: Generates a random salt value of the
// specified length.
//
// ClearBytes: Clear the bytes in a buffer so they can't
// later be read from memory.
//////////////////////////////////////////////////////////
public static byte[] CreateRandomSalt(int length)
{
// Create a buffer
byte[] randBytes;
if (length >= 1)
{
randBytes = new byte[length];
}
else
{
randBytes = new byte[1];
}
// Create a new RNGCryptoServiceProvider.
RNGCryptoServiceProvider rand = new RNGCryptoServiceProvider();
// Fill the buffer with random bytes.
rand.GetBytes(randBytes);
// return the bytes.
return randBytes;
}
public static void ClearBytes(byte[] buffer)
{
// Check arguments.
if (buffer == null)
{
throw new ArgumentException("buffer");
}
// Set each byte in the buffer to 0.
for (int x = 0; x < buffer.Length; x++)
{
buffer[x] = 0;
}
}
}
Imports System.Security.Cryptography
Imports System.Text
Module PasswordDerivedBytesExample
Sub Main(ByVal args() As String)
' Get a password from the user.
Console.WriteLine("Enter a password to produce a key:")
Dim pwd As Byte() = Encoding.Unicode.GetBytes(Console.ReadLine())
Dim salt As Byte() = CreateRandomSalt(7)
' Create a TripleDESCryptoServiceProvider object.
Dim tdes As New TripleDESCryptoServiceProvider()
Try
Console.WriteLine("Creating a key with PasswordDeriveBytes...")
' Create a PasswordDeriveBytes object and then create
' a TripleDES key from the password and salt.
Dim pdb As New PasswordDeriveBytes(pwd, salt)
' Create the key and set it to the Key property
' of the TripleDESCryptoServiceProvider object.
' This example uses the SHA1 algorithm.
' Due to collision problems with SHA1, Microsoft recommends SHA256 or better.
tdes.Key = pdb.CryptDeriveKey("TripleDES", "SHA1", 192, tdes.IV)
Console.WriteLine("Operation complete.")
Catch e As Exception
Console.WriteLine(e.Message)
Finally
' Clear the buffers
ClearBytes(pwd)
ClearBytes(salt)
' Clear the key.
tdes.Clear()
End Try
Console.ReadLine()
End Sub
'********************************************************
'* Helper methods:
'* createRandomSalt: Generates a random salt value of the
'* specified length.
'*
'* clearBytes: Clear the bytes in a buffer so they can't
'* later be read from memory.
'********************************************************
Function CreateRandomSalt(ByVal length As Integer) As Byte()
' Create a buffer
Dim randBytes() As Byte
If length >= 1 Then
randBytes = New Byte(length) {}
Else
randBytes = New Byte(0) {}
End If
' Create a new RNGCryptoServiceProvider.
Dim rand As New RNGCryptoServiceProvider()
' Fill the buffer with random bytes.
rand.GetBytes(randBytes)
' return the bytes.
Return randBytes
End Function
Sub ClearBytes(ByVal buffer() As Byte)
' Check arguments.
If buffer Is Nothing Then
Throw New ArgumentException("buffer")
End If
' Set each byte in the buffer to 0.
Dim x As Integer
For x = 0 To buffer.Length - 1
buffer(x) = 0
Next x
End Sub
End Module
備註
重要
絕對不要在原始程式碼內硬式編碼密碼。 硬式編碼的密碼可以使用 Ildasm.exe (IL 反組譯程式) 、十六進位編輯器,或直接在文本編輯器中開啟元件,例如 Notepad.exe 來擷取元件。
另請參閱
適用於
PasswordDeriveBytes(String, Byte[])
使用用來衍生金鑰的密碼和金鑰 Salt,初始化 PasswordDeriveBytes 類別的新執行個體。
public:
PasswordDeriveBytes(System::String ^ strPassword, cli::array <System::Byte> ^ rgbSalt);
public PasswordDeriveBytes (string strPassword, byte[]? rgbSalt);
public PasswordDeriveBytes (string strPassword, byte[] rgbSalt);
new System.Security.Cryptography.PasswordDeriveBytes : string * byte[] -> System.Security.Cryptography.PasswordDeriveBytes
Public Sub New (strPassword As String, rgbSalt As Byte())
參數
- strPassword
- String
用來衍生金鑰的密碼。
- rgbSalt
- Byte[]
用來衍生金鑰的金鑰 Salt。
備註
重要
絕對不要在原始程式碼中硬式編碼密碼。 硬式編碼密碼可以從元件擷取,方法是使用 Ildasm.exe (IL 反組譯程式) 工具、十六進位編輯器,或在文本編輯器中開啟元件,例如 notepad.exe。
另請參閱
適用於
PasswordDeriveBytes(Byte[], Byte[], CspParameters)
指定用來衍生金鑰的密碼、金鑰 Salt 和密碼編譯服務提供者 (CSP),初始化 PasswordDeriveBytes 類別的新執行個體。
public:
PasswordDeriveBytes(cli::array <System::Byte> ^ password, cli::array <System::Byte> ^ salt, System::Security::Cryptography::CspParameters ^ cspParams);
public PasswordDeriveBytes (byte[] password, byte[]? salt, System.Security.Cryptography.CspParameters? cspParams);
public PasswordDeriveBytes (byte[] password, byte[] salt, System.Security.Cryptography.CspParameters cspParams);
new System.Security.Cryptography.PasswordDeriveBytes : byte[] * byte[] * System.Security.Cryptography.CspParameters -> System.Security.Cryptography.PasswordDeriveBytes
Public Sub New (password As Byte(), salt As Byte(), cspParams As CspParameters)
參數
- password
- Byte[]
用來衍生金鑰的密碼。
- salt
- Byte[]
用來衍生金鑰的金鑰 Salt。
- cspParams
- CspParameters
作業的密碼編譯服務提供者 (CSP) 參數。
範例
下列程式代碼範例會使用 PasswordDeriveBytes 類別,從密碼建立密鑰。
using namespace System;
using namespace System::Security::Cryptography;
using namespace System::Text;
// Generates a random salt value of the specified length.
array<Byte>^ CreateRandomSalt(int length)
{
// Create a buffer
array<Byte>^ randomBytes;
if (length >= 1)
{
randomBytes = gcnew array <Byte>(length);
}
else
{
randomBytes = gcnew array <Byte>(1);
}
// Create a new RNGCryptoServiceProvider.
RNGCryptoServiceProvider^ cryptoRNGProvider =
gcnew RNGCryptoServiceProvider();
// Fill the buffer with random bytes.
cryptoRNGProvider->GetBytes(randomBytes);
// return the bytes.
return randomBytes;
}
// Clears the bytes in a buffer so they can't later be read from memory.
void ClearBytes(array<Byte>^ buffer)
{
// Check arguments.
if (buffer == nullptr)
{
throw gcnew ArgumentNullException("buffer");
}
// Set each byte in the buffer to 0.
for (int x = 0; x <= buffer->Length - 1; x++)
{
buffer[x] = 0;
}
}
int main(array<String^>^ args)
{
// Get a password from the user.
Console::WriteLine("Enter a password to produce a key:");
// Security Note: Never hard-code a password within your
// source code. Hard-coded passwords can be retrieved
// from a compiled assembly.
array<Byte>^ password = Encoding::Unicode->GetBytes(Console::ReadLine());
array<Byte>^ randomSalt = CreateRandomSalt(7);
// Create a TripleDESCryptoServiceProvider object.
TripleDESCryptoServiceProvider^ cryptoDESProvider =
gcnew TripleDESCryptoServiceProvider();
try
{
Console::WriteLine("Creating a key with PasswordDeriveBytes...");
// Create a PasswordDeriveBytes object and then create
// a TripleDES key from the password and salt.
PasswordDeriveBytes^ passwordDeriveBytes = gcnew PasswordDeriveBytes
(password->ToString(), randomSalt);
// Create the key and set it to the Key property
// of the TripleDESCryptoServiceProvider object.
// This example uses the SHA1 algorithm.
// Due to collision problems with SHA1, Microsoft recommends SHA256 or better.
cryptoDESProvider->Key = passwordDeriveBytes->CryptDeriveKey
("TripleDES", "SHA1", 192, cryptoDESProvider->IV);
Console::WriteLine("Operation complete.");
}
catch (Exception^ ex)
{
Console::WriteLine(ex->Message);
}
finally
{
// Clear the buffers
ClearBytes(password);
ClearBytes(randomSalt);
// Clear the key.
cryptoDESProvider->Clear();
}
Console::ReadLine();
}
using System;
using System.Security.Cryptography;
using System.Text;
public class PasswordDerivedBytesExample
{
public static void Main(String[] args)
{
// Get a password from the user.
Console.WriteLine("Enter a password to produce a key:");
byte[] pwd = Encoding.Unicode.GetBytes(Console.ReadLine());
byte[] salt = CreateRandomSalt(7);
// Create a TripleDESCryptoServiceProvider object.
TripleDESCryptoServiceProvider tdes = new TripleDESCryptoServiceProvider();
try
{
Console.WriteLine("Creating a key with PasswordDeriveBytes...");
// Create a PasswordDeriveBytes object and then create
// a TripleDES key from the password and salt.
PasswordDeriveBytes pdb = new PasswordDeriveBytes(pwd, salt);
// Create the key and set it to the Key property
// of the TripleDESCryptoServiceProvider object.
// This example uses the SHA1 algorithm.
// Due to collision problems with SHA1, Microsoft recommends SHA256 or better.
tdes.Key = pdb.CryptDeriveKey("TripleDES", "SHA1", 192, tdes.IV);
Console.WriteLine("Operation complete.");
}
catch (Exception e)
{
Console.WriteLine(e.Message);
}
finally
{
// Clear the buffers
ClearBytes(pwd);
ClearBytes(salt);
// Clear the key.
tdes.Clear();
}
Console.ReadLine();
}
//////////////////////////////////////////////////////////
// Helper methods:
// CreateRandomSalt: Generates a random salt value of the
// specified length.
//
// ClearBytes: Clear the bytes in a buffer so they can't
// later be read from memory.
//////////////////////////////////////////////////////////
public static byte[] CreateRandomSalt(int length)
{
// Create a buffer
byte[] randBytes;
if (length >= 1)
{
randBytes = new byte[length];
}
else
{
randBytes = new byte[1];
}
// Create a new RNGCryptoServiceProvider.
RNGCryptoServiceProvider rand = new RNGCryptoServiceProvider();
// Fill the buffer with random bytes.
rand.GetBytes(randBytes);
// return the bytes.
return randBytes;
}
public static void ClearBytes(byte[] buffer)
{
// Check arguments.
if (buffer == null)
{
throw new ArgumentException("buffer");
}
// Set each byte in the buffer to 0.
for (int x = 0; x < buffer.Length; x++)
{
buffer[x] = 0;
}
}
}
Imports System.Security.Cryptography
Imports System.Text
Module PasswordDerivedBytesExample
Sub Main(ByVal args() As String)
' Get a password from the user.
Console.WriteLine("Enter a password to produce a key:")
Dim pwd As Byte() = Encoding.Unicode.GetBytes(Console.ReadLine())
Dim salt As Byte() = CreateRandomSalt(7)
' Create a TripleDESCryptoServiceProvider object.
Dim tdes As New TripleDESCryptoServiceProvider()
Try
Console.WriteLine("Creating a key with PasswordDeriveBytes...")
' Create a PasswordDeriveBytes object and then create
' a TripleDES key from the password and salt.
Dim pdb As New PasswordDeriveBytes(pwd, salt)
' Create the key and set it to the Key property
' of the TripleDESCryptoServiceProvider object.
' This example uses the SHA1 algorithm.
' Due to collision problems with SHA1, Microsoft recommends SHA256 or better.
tdes.Key = pdb.CryptDeriveKey("TripleDES", "SHA1", 192, tdes.IV)
Console.WriteLine("Operation complete.")
Catch e As Exception
Console.WriteLine(e.Message)
Finally
' Clear the buffers
ClearBytes(pwd)
ClearBytes(salt)
' Clear the key.
tdes.Clear()
End Try
Console.ReadLine()
End Sub
'********************************************************
'* Helper methods:
'* createRandomSalt: Generates a random salt value of the
'* specified length.
'*
'* clearBytes: Clear the bytes in a buffer so they can't
'* later be read from memory.
'********************************************************
Function CreateRandomSalt(ByVal length As Integer) As Byte()
' Create a buffer
Dim randBytes() As Byte
If length >= 1 Then
randBytes = New Byte(length) {}
Else
randBytes = New Byte(0) {}
End If
' Create a new RNGCryptoServiceProvider.
Dim rand As New RNGCryptoServiceProvider()
' Fill the buffer with random bytes.
rand.GetBytes(randBytes)
' return the bytes.
Return randBytes
End Function
Sub ClearBytes(ByVal buffer() As Byte)
' Check arguments.
If buffer Is Nothing Then
Throw New ArgumentException("buffer")
End If
' Set each byte in the buffer to 0.
Dim x As Integer
For x = 0 To buffer.Length - 1
buffer(x) = 0
Next x
End Sub
End Module
備註
重要
絕對不要在原始程式碼內硬式編碼密碼。 硬式編碼的密碼可以使用 Ildasm.exe (IL 反組譯程式) l、十六進位編輯器或直接在文本編輯器中開啟元件,例如 Notepad.exe 來擷取元件。
另請參閱
適用於
PasswordDeriveBytes(String, Byte[], CspParameters)
使用用來衍生金鑰的密碼、金鑰 Salt 和密碼編譯服務提供者 (CSP),初始化 PasswordDeriveBytes 類別的新執行個體。
public:
PasswordDeriveBytes(System::String ^ strPassword, cli::array <System::Byte> ^ rgbSalt, System::Security::Cryptography::CspParameters ^ cspParams);
public PasswordDeriveBytes (string strPassword, byte[]? rgbSalt, System.Security.Cryptography.CspParameters? cspParams);
public PasswordDeriveBytes (string strPassword, byte[] rgbSalt, System.Security.Cryptography.CspParameters cspParams);
new System.Security.Cryptography.PasswordDeriveBytes : string * byte[] * System.Security.Cryptography.CspParameters -> System.Security.Cryptography.PasswordDeriveBytes
Public Sub New (strPassword As String, rgbSalt As Byte(), cspParams As CspParameters)
參數
- strPassword
- String
用來衍生金鑰的密碼。
- rgbSalt
- Byte[]
用來衍生金鑰的金鑰 Salt。
- cspParams
- CspParameters
用於操作的 CSP 參數。
備註
重要
絕對不要在原始程式碼中硬式編碼密碼。 硬式編碼密碼可以從元件擷取,方法是使用 Ildasm.exe (IL 反組譯程式) 工具、十六進位編輯器,或在文本編輯器中開啟元件,例如 notepad.exe。
另請參閱
適用於
PasswordDeriveBytes(Byte[], Byte[], String, Int32)
指定用來衍生金鑰的密碼、金鑰 Salt、雜湊名稱和反覆運算,初始化 PasswordDeriveBytes 類別的新執行個體。
public:
PasswordDeriveBytes(cli::array <System::Byte> ^ password, cli::array <System::Byte> ^ salt, System::String ^ hashName, int iterations);
public PasswordDeriveBytes (byte[] password, byte[]? salt, string hashName, int iterations);
public PasswordDeriveBytes (byte[] password, byte[] salt, string hashName, int iterations);
new System.Security.Cryptography.PasswordDeriveBytes : byte[] * byte[] * string * int -> System.Security.Cryptography.PasswordDeriveBytes
Public Sub New (password As Byte(), salt As Byte(), hashName As String, iterations As Integer)
參數
- password
- Byte[]
用來衍生金鑰的密碼。
- salt
- Byte[]
用來衍生金鑰的金鑰 Salt。
- hashName
- String
要用來衍生金鑰的雜湊演算法。
- iterations
- Int32
用來衍生金鑰的反覆計數。
備註
重要
絕對不要在原始程式碼內硬式編碼密碼。 硬式編碼的密碼可以使用 Ildasm.exe (IL 反組譯程式) 、十六進位編輯器,或直接在文本編輯器中開啟元件,例如 Notepad.exe 來擷取元件。
如需哈希演算法名稱的清單,請參閱 CryptoConfig 類別。
另請參閱
適用於
PasswordDeriveBytes(String, Byte[], String, Int32)
使用用來衍生金鑰的密碼、金鑰 Salt、雜湊名稱和重複次數,初始化 PasswordDeriveBytes 類別的新執行個體。
public:
PasswordDeriveBytes(System::String ^ strPassword, cli::array <System::Byte> ^ rgbSalt, System::String ^ strHashName, int iterations);
public PasswordDeriveBytes (string strPassword, byte[]? rgbSalt, string strHashName, int iterations);
public PasswordDeriveBytes (string strPassword, byte[] rgbSalt, string strHashName, int iterations);
new System.Security.Cryptography.PasswordDeriveBytes : string * byte[] * string * int -> System.Security.Cryptography.PasswordDeriveBytes
Public Sub New (strPassword As String, rgbSalt As Byte(), strHashName As String, iterations As Integer)
參數
- strPassword
- String
用來衍生金鑰的密碼。
- rgbSalt
- Byte[]
用來衍生金鑰的金鑰 Salt。
- strHashName
- String
用於操作的雜湊演算法名稱。
- iterations
- Int32
操作的重複次數。
備註
重要
絕對不要在原始程式碼中硬式編碼密碼。 硬式編碼密碼可以從元件擷取,方法是使用 Ildasm.exe (IL 反組譯程式) 工具、十六進位編輯器,或在文本編輯器中開啟元件,例如 notepad.exe。
如需哈希演算法名稱的清單,請參閱 CryptoConfig 類別。
另請參閱
適用於
PasswordDeriveBytes(Byte[], Byte[], String, Int32, CspParameters)
指定用來衍生金鑰的密碼、金鑰 Salt、雜湊名稱、反覆運算和密碼編譯服務提供者 (CSP),初始化 PasswordDeriveBytes 類別的新執行個體。
public:
PasswordDeriveBytes(cli::array <System::Byte> ^ password, cli::array <System::Byte> ^ salt, System::String ^ hashName, int iterations, System::Security::Cryptography::CspParameters ^ cspParams);
public PasswordDeriveBytes (byte[] password, byte[]? salt, string hashName, int iterations, System.Security.Cryptography.CspParameters? cspParams);
public PasswordDeriveBytes (byte[] password, byte[] salt, string hashName, int iterations, System.Security.Cryptography.CspParameters cspParams);
new System.Security.Cryptography.PasswordDeriveBytes : byte[] * byte[] * string * int * System.Security.Cryptography.CspParameters -> System.Security.Cryptography.PasswordDeriveBytes
Public Sub New (password As Byte(), salt As Byte(), hashName As String, iterations As Integer, cspParams As CspParameters)
參數
- password
- Byte[]
用來衍生金鑰的密碼。
- salt
- Byte[]
用來衍生金鑰的金鑰 Salt。
- hashName
- String
要用來衍生金鑰的雜湊演算法。
- iterations
- Int32
用來衍生金鑰的反覆計數。
- cspParams
- CspParameters
作業的密碼編譯服務提供者 (CSP) 參數。
備註
重要
絕對不要在原始程式碼內硬式編碼密碼。 硬式編碼的密碼可以使用 Ildasm.exe (IL 反組譯程式) 、十六進位編輯器,或直接在文本編輯器中開啟元件,例如 Notepad.exe 來擷取元件。
如需哈希演算法名稱的清單,請參閱 CryptoConfig 類別。
另請參閱
適用於
PasswordDeriveBytes(String, Byte[], String, Int32, CspParameters)
使用用來衍生金鑰的密碼、金鑰 Salt、雜湊名稱、重複次數和密碼編譯服務提供者 (CSP),初始化 PasswordDeriveBytes 類別的新執行個體。
public:
PasswordDeriveBytes(System::String ^ strPassword, cli::array <System::Byte> ^ rgbSalt, System::String ^ strHashName, int iterations, System::Security::Cryptography::CspParameters ^ cspParams);
public PasswordDeriveBytes (string strPassword, byte[]? rgbSalt, string strHashName, int iterations, System.Security.Cryptography.CspParameters? cspParams);
public PasswordDeriveBytes (string strPassword, byte[] rgbSalt, string strHashName, int iterations, System.Security.Cryptography.CspParameters cspParams);
new System.Security.Cryptography.PasswordDeriveBytes : string * byte[] * string * int * System.Security.Cryptography.CspParameters -> System.Security.Cryptography.PasswordDeriveBytes
Public Sub New (strPassword As String, rgbSalt As Byte(), strHashName As String, iterations As Integer, cspParams As CspParameters)
參數
- strPassword
- String
用來衍生金鑰的密碼。
- rgbSalt
- Byte[]
用來衍生金鑰的金鑰 Salt。
- strHashName
- String
用於操作的雜湊演算法名稱。
- iterations
- Int32
操作的重複次數。
- cspParams
- CspParameters
用於操作的 CSP 參數。
備註
重要
絕對不要在原始程式碼中硬式編碼密碼。 硬式編碼密碼可以從元件擷取,方法是使用 Ildasm.exe (IL 反組譯程式) 工具、十六進位編輯器,或在文本編輯器中開啟元件,例如 notepad.exe。
如需哈希演算法名稱的清單,請參閱 CryptoConfig 類別。