PWDTK 2.0.0.1

.NET Framework 3.5
There is a newer version of this package available.
See the version list below for details.
Install-Package PWDTK -Version 2.0.0.1
dotnet add package PWDTK --version 2.0.0.1
<PackageReference Include="PWDTK" Version="2.0.0.1" />
For projects that support PackageReference, copy this XML node into the project file to reference the package.
paket add PWDTK --version 2.0.0.1
The NuGet Team does not provide support for this client. Please contact its maintainers for support.
#r "nuget: PWDTK, 2.0.0.1"
#r directive can be used in F# Interactive, C# scripting and .NET Interactive. Copy this into the interactive tool or source code of the script to reference the package.
// Install PWDTK as a Cake Addin
#addin nuget:?package=PWDTK&version=2.0.0.1

// Install PWDTK as a Cake Tool
#tool nuget:?package=PWDTK&version=2.0.0.1
The NuGet Team does not provide support for this client. Please contact its maintainers for support.

PWDTK.NET (Password Toolkit) is a .NET API which easily allows you to create crypto random salt and generate password hashes using a HMAC-SHA512 based version of the PBKDF2 specification. It also contains an implementation of password policies which are enforced using regular expressions.

Product Versions
.NET Framework net35 net35-client net40 net40-client net403 net45 net451 net452 net46 net461 net462 net463 net47 net471 net472 net48
Compatible target framework(s)
Additional computed target framework(s)
Learn more about Target Frameworks and .NET Standard.

This package has no dependencies.

NuGet packages

This package is not used by any NuGet packages.

GitHub repositories

This package is not used by any popular GitHub repositories.

Version Downloads Last updated
2.0.0.2 168,491 12/24/2013
2.0.0.1 1,338 9/20/2013
2.0.0 2,358 5/9/2013

Added Max Password size of 1024 Bytes to stop a DOS attack happening from an attacker forcing big passwords to hash taking a long time and slowing the server down! This is due to this security article https://www.djangoproject.com/weblog/2013/sep/15/security/ whilst the user should enforce max password size on client side, I implemented a PasswordTooLong Exception which will be thrown if you don't stop passwords bigger than 1024 bytes client side!