Using Win32 functions in Visual FoxPro Image Gallery
Code examples:
Reading and setting system access privileges for the current process
Using Month Calendar Control (VFP9, Comctl32.dll)
GDI+: creating a gradient
How to retrieve the number of print jobs queued for the printer
Creating irregularly shaped FoxPro form using transparency color key
How to display advanced Task Dialog (Vista)
Subclassing CommandButton control to create BackColor property
Attaching menu to a top-level form
How to control Adobe Reader 9.0 (SDI mode) from VFP application
How to display Windows On-Screen Keyboard
How to print FoxPro form
Vertical Label control
Winsock: retrieving directory listing from an FTP server using passive data connection (FTP, port 21)
How to print FoxPro form -- II
Retrieving the name of the default printer for the current user on the local computer (Win NT/XP)
Creating a clipping region from the path selected into the device context of a form
Enumerating raw input devices attached to the system (keyboard, mouse, human interface device)
How to view icons stored in executable files (Icon Viewer) - II
Using Common Controls: the Header Control
Using File Mapping for enumerating files opened by Visual FoxPro
Verifying a file using the Authenticode policy provider
How to check whether the system is 32-bit or 64-bit
Playing WAV files on InteractiveChange
Pocket PC: custom RAPI class for operating with the System Registry
How to create MD-5 and SHA-1 hash values from a string

User rating: 0/10 (0 votes)
Rate this code sample:
  • ~
More code examples    Listed functions    Add comment     W32 Constants      Translate this page Printer friendly version of this code sample
Versions:
click to open
Before you begin:
Test the presented class as follows:
obj = CREATEOBJECT("TheHash")

? obj.CreateSHA1("test string")

* returns 661295C9CBF9D6B2F6428414504A8DEED3020641

? obj.CreateMD5("test string")
* returns 6F8DB599DE986FAB7A21625B7916589C

See also:
  • Simple class that encrypts and decrypts files using Cryptography API Functions
  • CryptoAPI: Collection of Providers class
  • WinINet function CreateMD5SSOHash
  •  
      Members area. Log in to view this example.
     
      User name:
      Password:
     
     
      Forgot your password?
     
      Sign up for
    the Membership
     
     


    User rating: 0/10 (0 votes)
    Rate this code sample:
    • ~
    3548 bytes  
    Created: 2005-03-07 15:21:11  
    Modified: 2016-02-25 09:23:01  
    Visits in 7 days: 102  
    Listed functions:
    CryptAcquireContext
    CryptCreateHash
    CryptDestroyHash
    CryptGetHashParam
    CryptHashData
    CryptReleaseContext
    GetLastError
    Printer friendly API declarations
    My comment:
    Transact-SQL HASHBYTES() function computes MD5 and SHA1 hashes identical to those produced by VFP and C# code samples above.



    * * *
    One-way hash functions can be used for creating a fingerprint for a block of data.

    Also hash functions can be used to evaluate passwords. In Users table of your FoxPro application you store not passwords but their hash values.

    It is extremely difficult, if ever possible, to find the original string for a given hash value -- depends on the hash algorithm as well as computer power and methodology you have.

    * * *
    Message Digest: The representation of text in the form of a single string of digits, created using a formula called a one-way hash function.

    One-Way Hash Function: An algorithm that turns messages or text into a fixed string of digits, usually for security or data management purposes. The "one way" means that it is nearly impossible to derive the original text from the string.

    Hash Collision: More than one input message producing identical hash output.

    * * *
    Secure Hash Algorithm, a hash function developed by the NSA for use with NIST Digital Signature Standard (DSS). NSA almost immediately developed a minor change known as SHA-1. Both SHA and SHA-1 produce a 160-bit digest. SHA-1 is used in SSL.

    * * *
    MD-5 is a one-way message-digest hash function. The algorithm processes input text and creates a 128-bit message digest which is unique to the message and can be used to verify data integrity.

    MD-5 was developed by Ron Rivest and is intended to be used in digital signatures applications. Earlier message digest algorithms include obsolete MD-2 and MD-4.

    See also:
  • RFC 1321 - The MD5 Message-Digest Algorithm
  • What are MD2, MD4, and MD5?
  • Example C Program: Creating an MD-5 Hash From File Content.
  • MD5 Online Cracking using Rainbow Tables
  • RFC 3174 - US Secure Hash Algorithm 1 (SHA1)
  • More on Newly Broken SHA1 on Alex Feldstein"s blog
  • Hash Collisions Q&A
  • Word Index links for this example:
    Translate this page:
      Spanish    Portuguese    German    French    Italian  
    FreeTranslation.com offers instant, free translations of text or web pages.
    User Contributed Notes:
    Malcolm Greene | 2005-04-06 00:16:27
    Are there any Windows version (or service pack) dependencies with this code (advapi32.dll)? I've been burned trying to get the FFC _Crypto class to work across different versions of Windows, re: different flavors of rsaenh.dll. (I noticed that rsaenh.dll is not referenced in above code, but I'm still concerned about the same problem version dependencies).

    Thoughts?
    Malcolm

    Copyright 2001-2017 News2News, Inc. Before reproducing or distributing any data from this site please ask for an approval from its owner. Unless otherwise specified, this page is for your personal and non-commercial use. The information on this page is presented AS IS, meaning that you may use it at your own risk. Microsoft Visual FoxPro and Windows are trade marks of Microsoft Corp. All other trademarks are the property of their respective owners. 

    Privacy policy
    Credits: PHP (4.4.9), an HTML-embedded scripting language, MySQL (5.6.37), the Open Source standard SQL database, AceHTML Freeware Version 4, freeware HTML Editor of choice.   Hosted by Korax Online Inc.
    Last Topics Visited (54.162.154.91)
    20 sec.Function: 'Escape'
    Function group: 'Printing and Print Spooler'
    37 sec.Example: 'Dragging files from Explorer window and dropping them on FoxPro control (requires VFP9)'
    55 sec.Function: 'GlobalSize'
    Function group: 'Memory Management'
    1.22 min.
    Function group: 'Window Procedure'
    1.52 min.Function: 'SendMessage'
    1.83 min.Function: 'MAPISendDocuments'
    Function group: 'Simple MAPI'
    2.15 min.Function: 'CryptCreateHash'
    2.45 min.Example: 'Enumerating the subkeys of a user-specific key'
    2.8 min.Function: 'NetServerGetInfo'
    Function group: 'Network Management'
    3.08 min.Examples
    Page 3
    Google
    Advertise here!