PWDTK 2.0.0.1

There is a newer version of this package available.
See the version list below for details.
dotnet add package PWDTK --version 2.0.0.1
NuGet\Install-Package PWDTK -Version 2.0.0.1
This command is intended to be used within the Package Manager Console in Visual Studio, as it uses the NuGet module's version of Install-Package.
<PackageReference Include="PWDTK" Version="2.0.0.1" />
For projects that support PackageReference, copy this XML node into the project file to reference the package.
paket add PWDTK --version 2.0.0.1
#r "nuget: PWDTK, 2.0.0.1"
#r directive can be used in F# Interactive and Polyglot Notebooks. Copy this into the interactive tool or source code of the script to reference the package.
// Install PWDTK as a Cake Addin
#addin nuget:?package=PWDTK&version=2.0.0.1

// Install PWDTK as a Cake Tool
#tool nuget:?package=PWDTK&version=2.0.0.1

PWDTK.NET (Password Toolkit) is a .NET API which easily allows you to create crypto random salt and generate password hashes using a HMAC-SHA512 based version of the PBKDF2 specification. It also contains an implementation of password policies which are enforced using regular expressions.

Product Compatible and additional computed target framework versions.
.NET Framework net35 is compatible.  net35-client is compatible.  net40 is compatible.  net40-client is compatible.  net403 was computed.  net45 is compatible.  net451 is compatible.  net452 was computed.  net46 was computed.  net461 was computed.  net462 was computed.  net463 was computed.  net47 was computed.  net471 was computed.  net472 was computed.  net48 was computed.  net481 was computed. 
Compatible target framework(s)
Included target framework(s) (in package)
Learn more about Target Frameworks and .NET Standard.

This package has no dependencies.

NuGet packages

This package is not used by any NuGet packages.

GitHub repositories

This package is not used by any popular GitHub repositories.

Version Downloads Last updated
2.0.0.2 229,941 12/24/2013
2.0.0.1 2,110 9/20/2013
2.0.0 4,261 5/9/2013

Added Max Password size of 1024 Bytes to stop a DOS attack happening from an attacker forcing big passwords to hash taking a long time and slowing the server down! This is due to this security article https://www.djangoproject.com/weblog/2013/sep/15/security/ whilst the user should enforce max password size on client side, I implemented a PasswordTooLong Exception which will be thrown if you don't stop passwords bigger than 1024 bytes client side!