Compatible Unicode Intrinsic Functions - ComputeHash Method

Calculate a hash value

Member of Compatible Unicode Intrinsic Functions (PRIM_LIBI.ICompatibleUnicodeIntrinsics)

Parameters

Name

Type

Data Type

Description

Result

*Result (Optional)

Unicode String

Resulting hash value

Usage

*Input

Enumeration

Specifies how the Hash is used

Algorithm

*Input

Enumeration

Hashing algorith to be used

Details

The ComputeHash method converts a string to a cryptographic hash value.

The Usage and Algorithmz parameters allow different hashing mechanisms to be used.

Usage Allowed Values

Enum Value

Description

Digest

The resulting hash will be used as a message digest, generally to verify the integrity of a message and detect accidental alterations to any part of the message

Password

A sequence of cryptographically secure random number (salt) will be added to the input before it gets hashed to protect the hash against lookup table attacks. You would generally store the resulting password hash in your user database table so it can be verified during the login process.

Algorithm Allowed Values

Enum Value

Description

PBKDF2

Password based key derivation function 2

MD5

Widely used hash function producing a 128-bit hash value

SCrypt

Password based key derivation function

SHA256

Hash function designed by the United States National Security Agency


See also

All Component Classes

Technical Reference