PC SOFT

WINDEVWEBDEV AND WINDEV MOBILE
ONLINE HELP

Home | Sign in | English UK
  • Availability of algorithms
  • HashCheckString and UNICODE
WINDEV
WindowsLinuxUniversal Windows 10 AppJavaReports and QueriesUser code (UMC)
WEBDEV
WindowsLinuxPHPWEBDEV - Browser code
WINDEV Mobile
AndroidAndroid Widget iPhone/iPadApple WatchUniversal Windows 10 AppWindows Mobile
Others
Stored procedures
HashCheckString (Function)
In french: HashVérifieChaîne
Checks the Hash of a character string for a specific type of algorithm. You have the ability to check:
  • a simple hash.
  • a hash with message authentication.
Reminder: Hashing is used to summarize a file or a character string. This summary is called Hash.
Example
Windows
// Check password:
// - Password typed in the "EDT_TypePassword" control
// - The password Hash is found in the "User.HashPassword" item
IF HashCheckString(HA_MD5_128, EDT_TypePassword, ...
User.HashPassword) = True THEN
Info("Password OK.")
// Rest of process
// ...
ELSE
Error("Wrong password.")
// Resume the input
ReturnToCapture(EDT_TypePassword)
END
Syntax

Checking a simple hash Hide the details

<Result> = HashCheckString(<Type of algorithm> , <String> , <Hash>)
<Result>: Boolean
  • True if the result when <String> was hashed by <Type of algorithm> corresponds to <Hash>,
  • False otherwise.
<Type of algorithm>: Integer constant
Indicates the type of algorithm used when hashing the <String>:
Versions 22 and later
DJB2 family (Bernstein)
New in version 22
DJB2 family (Bernstein)
DJB2 family (Bernstein)
  • Versions 22 and later
    HA_DJB2_32
    New in version 22
    HA_DJB2_32
    HA_DJB2_32
  • Versions 22 and later
    HA_DJB2_64
    New in version 22
    HA_DJB2_64
    HA_DJB2_64
Versions 25 and later
MD4 family
New in version 25
MD4 family
MD4 family
Versions 25 and later
HA_MD4
New in version 25
HA_MD4
HA_MD4
MD5 familyHA_MD5_128
Versions 24 and later
MURMUR family
New in version 24
MURMUR family
MURMUR family
  • Versions 24 and later
    HA_MURMUR_1: Murmur algorithm version 1: 32-bit hash result
    New in version 24
    HA_MURMUR_1: Murmur algorithm version 1: 32-bit hash result
    HA_MURMUR_1: Murmur algorithm version 1: 32-bit hash result
  • Versions 24 and later
    HA_MURMUR_2: Murmur algorithm version 2: 32-bit hash result
    New in version 24
    HA_MURMUR_2: Murmur algorithm version 2: 32-bit hash result
    HA_MURMUR_2: Murmur algorithm version 2: 32-bit hash result
  • Versions 24 and later
    HA_MURMUR_2_64A: Murmur algorithm version 2: 64-bit hash result optimized for 64-bit processors
    New in version 24
    HA_MURMUR_2_64A: Murmur algorithm version 2: 64-bit hash result optimized for 64-bit processors
    HA_MURMUR_2_64A: Murmur algorithm version 2: 64-bit hash result optimized for 64-bit processors
  • Versions 24 and later
    HA_MURMUR_2_64B: Murmur algorithm version 2: 64-bit hash result optimized for 32-bit processors
    New in version 24
    HA_MURMUR_2_64B: Murmur algorithm version 2: 64-bit hash result optimized for 32-bit processors
    HA_MURMUR_2_64B: Murmur algorithm version 2: 64-bit hash result optimized for 32-bit processors
  • Versions 24 and later
    HA_MURMUR_2_A: Incremental Murmur algorithm version 2: 32-bit hash result
    New in version 24
    HA_MURMUR_2_A: Incremental Murmur algorithm version 2: 32-bit hash result
    HA_MURMUR_2_A: Incremental Murmur algorithm version 2: 32-bit hash result
  • Versions 24 and later
    HA_MURMUR_2_BIG_ENDIAN: Murmur algorithm version 2 for big-endian machine: 32-bit hash result
    New in version 24
    HA_MURMUR_2_BIG_ENDIAN: Murmur algorithm version 2 for big-endian machine: 32-bit hash result
    HA_MURMUR_2_BIG_ENDIAN: Murmur algorithm version 2 for big-endian machine: 32-bit hash result
  • Versions 24 and later
    HA_MURMUR_2_ALIGNED: Murmur algorithm version 2 for aligned machine: 32-bit hash result
    New in version 24
    HA_MURMUR_2_ALIGNED: Murmur algorithm version 2 for aligned machine: 32-bit hash result
    HA_MURMUR_2_ALIGNED: Murmur algorithm version 2 for aligned machine: 32-bit hash result
  • Versions 24 and later
    HA_MURMUR_3_32: Murmur algorithm version 3: 32-bit hash result
    New in version 24
    HA_MURMUR_3_32: Murmur algorithm version 3: 32-bit hash result
    HA_MURMUR_3_32: Murmur algorithm version 3: 32-bit hash result
  • Versions 24 and later
    HA_MURMUR_3_128_X86: Murmur algorithm version 3: 128-bit hash result optimized for 32-bit processors
    New in version 24
    HA_MURMUR_3_128_X86: Murmur algorithm version 3: 128-bit hash result optimized for 32-bit processors
    HA_MURMUR_3_128_X86: Murmur algorithm version 3: 128-bit hash result optimized for 32-bit processors
  • Versions 24 and later
    HA_MURMUR_3_128_X64: Murmur algorithm version 3: 128-bit hash result optimized for 64-bit processors
    New in version 24
    HA_MURMUR_3_128_X64: Murmur algorithm version 3: 128-bit hash result optimized for 64-bit processors
    HA_MURMUR_3_128_X64: Murmur algorithm version 3: 128-bit hash result optimized for 64-bit processors
RIPEMD family
  • HA_RIPEMD_128
  • HA_RIPEMD_160
SHA-1 family
  • HA_SHA_160 (also called SHA-1)
  • HA_SHA_256 (FIPS PUB 198 specifications)
  • Versions 25 and later
    HA_SHA_256_DOUBLE
    New in version 25
    HA_SHA_256_DOUBLE
    HA_SHA_256_DOUBLE
  • HA_SHA_384
  • HA_SHA_512
Versions 23 and later
SHA-3 family
New in version 23
SHA-3 family
SHA-3 family
  • Versions 23 and later
    HA_SHA3_224
    New in version 23
    HA_SHA3_224
    HA_SHA3_224
  • Versions 23 and later
    HA_SHA3_256
    New in version 23
    HA_SHA3_256
    HA_SHA3_256
  • Versions 23 and later
    HA_SHA3_384
    New in version 23
    HA_SHA3_384
    HA_SHA3_384
  • Versions 23 and later
    HA_SHA3_512
    New in version 23
    HA_SHA3_512
    HA_SHA3_512
TIGER family
  • HA_TIGER_128
  • HA_TIGER_160
  • HA_TIGER_192
WHIRLPOOL familyHA_WHIRLPOOL
CKSUM family
  • HA_CKSUM_8
  • HA_CKSUM_16
  • HA_CKSUM_32
  • HA_CKSUM_64
  • MD4 / MD5 / SHA / RIPEMD algorithms: standard cryptographic hash functions.
  • TIGER/WHIRLPOOL algorithms: hash functions with high cryptographic properties optimized for the 64-bit mode (but can also be used in 32-bit mode).
  • CKSUM algorithms: hash functions with no cryptographic property, should be used to perform low-level checks or with hashing tables.
  • Versions 22 and later
    DJB2 algorithm (Bernstein): hash functions reserved to strings and with no cryptographic property, should be used to perform low-level checks or with hashing tables. Few risks to get an identical hash.
    New in version 22
    DJB2 algorithm (Bernstein): hash functions reserved to strings and with no cryptographic property, should be used to perform low-level checks or with hashing tables. Few risks to get an identical hash.
    DJB2 algorithm (Bernstein): hash functions reserved to strings and with no cryptographic property, should be used to perform low-level checks or with hashing tables. Few risks to get an identical hash.
  • Versions 24 and later
    MURMUR algorithm: very fast hash functions with no cryptographic properties. This algorithm is used by the "bloom filter" of bitcoin wallets.
    New in version 24
    MURMUR algorithm: very fast hash functions with no cryptographic properties. This algorithm is used by the "bloom filter" of bitcoin wallets.
    MURMUR algorithm: very fast hash functions with no cryptographic properties. This algorithm is used by the "bloom filter" of bitcoin wallets.
<String>: Character string (with quotes)
String for which the Hash will be checked.
<Hash>: Character string (with quotes)
Hash of string to check. This Hash must be the result of HashString previously called for <String> on <Type of algorithm>.

Checking a hash with message authentication (HMAC/MURMUR algorithm) Hide the details

<Result> = HashCheckString(<Type of algorithm> , <String> , <Hash> , <Secret key>)
<Result>: Boolean
  • True if the result when <String> was hashed by <Type of algorithm> corresponds to <Hash>,
  • False otherwise.
<Type of algorithm>: Integer constant
Indicates the type of algorithm (HMAC or MURMUR) used to hash the <String> string:
Versions 25 and later
MD4 family
New in version 25
MD4 family
MD4 family
Versions 25 and later
HA_HMAC_MD4
New in version 25
HA_HMAC_MD4
HA_HMAC_MD4
MD5 familyHA_HMAC_MD5_128
Versions 24 and later
MURMUR family
New in version 24
MURMUR family
MURMUR family
  • Versions 24 and later
    HA_MURMUR_1: Murmur algorithm version 1: 32-bit hash result
    New in version 24
    HA_MURMUR_1: Murmur algorithm version 1: 32-bit hash result
    HA_MURMUR_1: Murmur algorithm version 1: 32-bit hash result
  • Versions 24 and later
    HA_MURMUR_2: Murmur algorithm version 2: 32-bit hash result
    New in version 24
    HA_MURMUR_2: Murmur algorithm version 2: 32-bit hash result
    HA_MURMUR_2: Murmur algorithm version 2: 32-bit hash result
  • Versions 24 and later
    HA_MURMUR_2_64A: Murmur algorithm version 2: 64-bit hash result optimized for 64-bit processors
    New in version 24
    HA_MURMUR_2_64A: Murmur algorithm version 2: 64-bit hash result optimized for 64-bit processors
    HA_MURMUR_2_64A: Murmur algorithm version 2: 64-bit hash result optimized for 64-bit processors
  • Versions 24 and later
    HA_MURMUR_2_64B: Murmur algorithm version 2: 64-bit hash result optimized for 32-bit processors
    New in version 24
    HA_MURMUR_2_64B: Murmur algorithm version 2: 64-bit hash result optimized for 32-bit processors
    HA_MURMUR_2_64B: Murmur algorithm version 2: 64-bit hash result optimized for 32-bit processors
  • Versions 24 and later
    HA_MURMUR_2_A: Incremental Murmur algorithm version 2: 32-bit hash result
    New in version 24
    HA_MURMUR_2_A: Incremental Murmur algorithm version 2: 32-bit hash result
    HA_MURMUR_2_A: Incremental Murmur algorithm version 2: 32-bit hash result
  • Versions 24 and later
    HA_MURMUR_2_BIG_ENDIAN: Murmur algorithm version 2 for big-endian machine: 32-bit hash result
    New in version 24
    HA_MURMUR_2_BIG_ENDIAN: Murmur algorithm version 2 for big-endian machine: 32-bit hash result
    HA_MURMUR_2_BIG_ENDIAN: Murmur algorithm version 2 for big-endian machine: 32-bit hash result
  • Versions 24 and later
    HA_MURMUR_2_ALIGNED: Murmur algorithm version 2 for aligned machine: 32-bit hash result
    New in version 24
    HA_MURMUR_2_ALIGNED: Murmur algorithm version 2 for aligned machine: 32-bit hash result
    HA_MURMUR_2_ALIGNED: Murmur algorithm version 2 for aligned machine: 32-bit hash result
  • Versions 24 and later
    HA_MURMUR_3_32: Murmur algorithm version 3: 32-bit hash result
    New in version 24
    HA_MURMUR_3_32: Murmur algorithm version 3: 32-bit hash result
    HA_MURMUR_3_32: Murmur algorithm version 3: 32-bit hash result
  • Versions 24 and later
    HA_MURMUR_3_128_X86: Murmur algorithm version 3: 128-bit hash result optimized for 32-bit processors
    New in version 24
    HA_MURMUR_3_128_X86: Murmur algorithm version 3: 128-bit hash result optimized for 32-bit processors
    HA_MURMUR_3_128_X86: Murmur algorithm version 3: 128-bit hash result optimized for 32-bit processors
  • Versions 24 and later
    HA_MURMUR_3_128_X64: Murmur algorithm version 3: 128-bit hash result optimized for 64-bit processors
    New in version 24
    HA_MURMUR_3_128_X64: Murmur algorithm version 3: 128-bit hash result optimized for 64-bit processors
    HA_MURMUR_3_128_X64: Murmur algorithm version 3: 128-bit hash result optimized for 64-bit processors
RIPEMD family
  • HA_HMAC_RIPEMD_128
  • HA_HMAC_RIPEMD_160
SHA family
  • HA_HMAC_SHA_160
  • HA_HMAC_SHA_256
  • Versions 25 and later
    HA_HMAC_SHA_256_DOUBLE
    New in version 25
    HA_HMAC_SHA_256_DOUBLE
    HA_HMAC_SHA_256_DOUBLE
  • HA_HMAC_SHA_384
  • HA_HMAC_SHA_512
Versions 23 and later
SHA-3 family
New in version 23
SHA-3 family
SHA-3 family
  • Versions 23 and later
    HA_SHA3_224
    New in version 23
    HA_SHA3_224
    HA_SHA3_224
  • Versions 23 and later
    HA_SHA3_256
    New in version 23
    HA_SHA3_256
    HA_SHA3_256
  • Versions 23 and later
    HA_SHA3_384
    New in version 23
    HA_SHA3_384
    HA_SHA3_384
  • Versions 23 and later
    HA_SHA3_512
    New in version 23
    HA_SHA3_512
    HA_SHA3_512
TIGER family
  • HA_HMAC_TIGER_128
  • HA_HMAC_TIGER_160
  • HA_HMAC_TIGER_192
WHIRLPOOL familyHA_HMAC_WHIRLPOOL
  • MD4 / MD5 / SHA / RIPEMD algorithms: standard cryptographic hash functions.
  • TIGER/WHIRLPOOL algorithms: hash functions with high cryptographic properties optimized for the 64-bit mode (but can also be used in 32-bit mode).
    MURMUR algorithm: very fast hash functions with no cryptographic properties. This algorithm is used by the "bloom filter" of bitcoin wallets.
<String>: Character string (with quotes)
String for which the Hash will be checked.
<Hash>: Character string (with quotes)
Hash of string to check. This Hash must be the result of HashString previously called for <String> on <Type of algorithm>.
<Secret key>: Character string (between quotes) or Integer
Authentication key of message. This key must be identical to the one used to calculate the Hash.
Remarks

Availability of algorithms

HashCheckString and UNICODE

Multi-platform development: To use Hash of strings between several platforms (a hash generated in iOS and checked in Android or Windows for example), no Unicode string must be used. Indeed, the Unicode strings do not have the same format according to the platforms. In this case, we advise you to use strings in ANSI or UTF 8 format (and to convert the Unicode strings if necessary).
Business / UI classification : Business Logic
Component : wd250com.dll
Minimum version required
  • Version 11
This page is also available for…
Comments
Click [Add] to post a comment