HexaEightASKClientLibrary 1.9.142
dotnet add package HexaEightASKClientLibrary --version 1.9.142
NuGet\Install-Package HexaEightASKClientLibrary -Version 1.9.142
<PackageReference Include="HexaEightASKClientLibrary" Version="1.9.142" />
<PackageVersion Include="HexaEightASKClientLibrary" Version="1.9.142" />
<PackageReference Include="HexaEightASKClientLibrary" />
paket add HexaEightASKClientLibrary --version 1.9.142
#r "nuget: HexaEightASKClientLibrary, 1.9.142"
#:package HexaEightASKClientLibrary@1.9.142
#addin nuget:?package=HexaEightASKClientLibrary&version=1.9.142
#tool nuget:?package=HexaEightASKClientLibrary&version=1.9.142
HexaEight ASK Client Library
How To Use The Library
Visit HexaEight For More Information
Breaking Changes - 1.9.6 and above - Support for Browsers
Code Sample
Initialize a new ASK Client
var HEClient = new ASKClient("HexaEight_LoginToken","Resource Name", "LoginToken_Password");
Set your Own Password for Session Encryption
HEClient.SetSafeKey("OwnPassword");
Set an API Key (RapidAPI)
HEClient.SetRapidAPIKey("APIKey");
Encrypt a Message For any Destination. (Destination should be a valid Email Address or Resource Provider)
var encryptedmessage = HEClient.EncryptMessageByKnownName("demo.hexaeight.com","Hello Demo");
Decrypt a Message Received
var decryptedmessage = HEClient.DecryptMessageByKnownName("demo.hexaeight.com",<Encrypted Message>);
Fetch Current Ephemeral Key for a Destination
var sharedkey = HEClient.GetSharedKeyByKnownName("<Valid Email Address or Resource Name");
Fetch an Old Ephemeral Key for a Destination - Added in 1.7.4
var sharedkey = HEClient.GetPreSharedKeyByKnownName("<Valid Email Address or Resource Name",UnixTimeStamp);
Decrypt a Message Using the Ephemeral Key - Added in 1.7.3
var decryptedmessage = HEClient.DecryptMessageUsingSharedKey(<Encrypted Message>,<sharedkey>);
Encrypt a Message Using the Ephemeral Key - Added in 1.7.6
var encryptedmessage = HEClient.EncryptMessageUsingSharedKey(<RecipientName>,<Encrypted Message>,<sharedkey>);
Encrypt a Message Using User Access Key (UAK) - Added in 1.7.9
var encryptedmessage = HEClient.EncryptMessageUsingUAK(<RecipientName>,<Encrypted Message>, <uak of user> <sharedkey of destination user resource>);
Decrypt a Message Encrypted Using UAK - Added in 1.7.9
var decryptedmessage = HEClient.DecryptMessageForUAK(<Encrypted Message>,<sharedkey of user>);
Added support for Binary Data Encryption and Decryption using Shared keys and User Access keys - Version 1.8.6
var encrypteddata = EncryptRaw(originaldata, Sharedkey);
var originaldata = DecryptRaw(encrypteddata, Sharedkey);
var encrypteddata = EncryptRawUsingUAK(originaldata, useraccesskey, sharedkey);
var originaldata = DecryptRawUsingUAK(encrypteddata, useraccesskey, sharedkey);
Added new capability for Fetching an Old Ephemeral Key for multiple Destinations - Useful for multi path traversal / multi message approvals
var sharedkey = HEClient.GetPreSharedKeyByKnownName("<Multiple Valid Email Address or Resource Name seperated by semicolons (;)",UnixTimeStamp);
| Product | Versions Compatible and additional computed target framework versions. |
|---|---|
| .NET | net5.0 was computed. net5.0-windows was computed. net6.0 was computed. net6.0-android was computed. net6.0-ios was computed. net6.0-maccatalyst was computed. net6.0-macos was computed. net6.0-tvos was computed. net6.0-windows was computed. net7.0 was computed. net7.0-android was computed. net7.0-ios was computed. net7.0-maccatalyst was computed. net7.0-macos was computed. net7.0-tvos was computed. net7.0-windows was computed. net8.0 was computed. net8.0-android was computed. net8.0-browser was computed. net8.0-ios was computed. net8.0-maccatalyst was computed. net8.0-macos was computed. net8.0-tvos was computed. net8.0-windows was computed. net9.0 was computed. net9.0-android was computed. net9.0-browser was computed. net9.0-ios was computed. net9.0-maccatalyst was computed. net9.0-macos was computed. net9.0-tvos was computed. net9.0-windows was computed. net10.0 was computed. net10.0-android was computed. net10.0-browser was computed. net10.0-ios was computed. net10.0-maccatalyst was computed. net10.0-macos was computed. net10.0-tvos was computed. net10.0-windows was computed. |
| .NET Core | netcoreapp3.0 was computed. netcoreapp3.1 was computed. |
| .NET Standard | netstandard2.1 is compatible. |
| MonoAndroid | monoandroid was computed. |
| MonoMac | monomac was computed. |
| MonoTouch | monotouch was computed. |
| Tizen | tizen60 was computed. |
| Xamarin.iOS | xamarinios was computed. |
| Xamarin.Mac | xamarinmac was computed. |
| Xamarin.TVOS | xamarintvos was computed. |
| Xamarin.WatchOS | xamarinwatchos was computed. |
-
.NETStandard 2.1
- BouncyCastle.Cryptography (>= 2.6.2)
- Microsoft.VisualBasic (>= 10.3.0)
- netcore.encrypt (>= 2.0.9)
NuGet packages (2)
Showing the top 2 NuGet packages that depend on HexaEightASKClientLibrary:
| Package | Downloads |
|---|---|
|
HexaEightJWTLibrary
Create and Validate HexaEight JWT Tokens using this Libarary. This Library provides helper functions to implement HexaEight authenticated encryption and decryption of messages. |
|
|
HexaEightAgent
Create And Assign Identities for AI Agents using this Library |
GitHub repositories
This package is not used by any popular GitHub repositories.
| Version | Downloads | Last Updated |
|---|---|---|
| 1.9.142 | 0 | 2/17/2026 |
| 1.9.141 | 188 | 1/16/2026 |
| 1.9.140 | 327 | 12/7/2025 |
| 1.9.139 | 194 | 12/5/2025 |
| 1.9.138 | 695 | 12/3/2025 |
| 1.9.137 | 685 | 12/3/2025 |
| 1.9.136 | 690 | 12/3/2025 |
| 1.9.135 | 141 | 11/29/2025 |
| 1.9.134 | 140 | 11/28/2025 |
| 1.9.133 | 166 | 11/28/2025 |
| 1.9.132 | 306 | 11/22/2025 |
| 1.9.131 | 234 | 11/22/2025 |
| 1.9.130 | 279 | 11/22/2025 |
| 1.9.129 | 333 | 11/21/2025 |
| 1.9.128 | 410 | 11/21/2025 |
| 1.9.127 | 502 | 11/20/2025 |
| 1.9.126 | 430 | 11/20/2025 |
| 1.9.125 | 436 | 11/20/2025 |
| 1.9.124 | 417 | 11/20/2025 |
| 1.9.123 | 466 | 11/20/2025 |