473,379 Members | 1,367 Online
Bytes | Software Development & Data Engineering Community
Post Job

Home Posts Topics Members FAQ

Join Bytes to post your question to a community of 473,379 software developers and data experts.

SHA1 Hash for Access/VBA

I've been looking for a SHA1 routine for an Access 2010 project. A Google search turns up quite a few for Visual Basic but not for current level vba.

This needs to be implemented entirely in Access vba - I'm trying not to call an external program (I can do it now with REST if I have to).

Can anyone point me to a source?

Thanks
Oct 21 '11 #1

✓ answered by patjones

I'm surprised that you did not find anything when you googled for SHA1 VBA. I recently updated from MD5 to SHA1 in one of my projects and I'm pretty sure I found it just by doing a google search. Maybe the one password-hash-function-for-excel-vba for instance...

12 20234
Rabbit
12,516 Expert Mod 8TB
Will SHA2 work? http://bytes.com/topic/access/insigh...m-vba-vbscript
Oct 21 '11 #2
patjones
931 Expert 512MB
Try this Insight article right here on our site: SHA2 Cryptographic Hash Algorithm for VBA and VBScript.
Oct 21 '11 #3
Thanks, guys, but in this environment I'm limited to SHA1.
Oct 21 '11 #4
NeoPa
32,556 Expert Mod 16PB
Great minds think alike it seems. I will avoid posting another link to the same article the others already have (They cross-posted so perfectly understandable they did).

What I would say though is that some VB code shouldn't be too complicated to translate into VBA. There are few real syntactic differences after all, even if available libraries may differ somewhat.
Oct 21 '11 #5
@NeoPa - you're right. I'm just a lazy SOB. ;)
Oct 21 '11 #6
Rabbit
12,516 Expert Mod 8TB
Well, SHA1 shares similarities with SHA2. I used the pseudocode from the wikipedia page to develop the VBS/VBA code in the article. You should be able to use the SHA1 pseudocode in the wikipedia page and do the same thing. And if you run into trouble, perhaps it's something I already handled in my SHA2 code. Or you could start with my SHA2 code and then transform it to SHA1.
Oct 21 '11 #7
@Rabbit. Thanks for the offer. I'll use REST for now, as I'm under time constraints. But when I have a gap, I'll give it a go and get back to you. J.
Oct 21 '11 #8
NeoPa
32,556 Expert Mod 16PB
RisoSystems:
@NeoPa - you're right. I'm just a lazy SOB. ;)
I can hardly argue with that sentiment. I believe {Insert your own term for creative power} gave me my intelligence primarily to help me avoid effort in life :-D
Oct 21 '11 #9
patjones
931 Expert 512MB
I'm surprised that you did not find anything when you googled for SHA1 VBA. I recently updated from MD5 to SHA1 in one of my projects and I'm pretty sure I found it just by doing a google search. Maybe the one password-hash-function-for-excel-vba for instance...
Oct 21 '11 #10
@zepp - Thanks! I'd found an earlier version of that which didn't work, and overlooked that one. Perfect.
Oct 21 '11 #11
ADezii
8,834 Expert 8TB
@RisoSystems:
Download the Attachment, and see if this is what you are looking for.
Attached Files
File Type: zip SHA1.zip (25.5 KB, 1631 views)
Oct 22 '11 #12
@ADezii - Thanks. Have already implemented the one Zepp suggested.
- as an aside - I've found this board more useful in 2 days than others I've looked at for months. I'm very appreciative.
Oct 22 '11 #13

Sign in to post your reply or Sign up for a free account.

Similar topics

2
by: Elmo Mäntynen | last post by:
I know how to make a hash(using mhash), but instead of encoded as hex I want it in base32 for use with the bitzi catalog. python-bitzi is useful but way too slow for just getting the hash of a...
2
by: Bryan Olson | last post by:
The current Python standard library provides two cryptographic hash functions: MD5 and SHA-1 . The authors of MD5 originally stated: It is conjectured that it is computationally infeasible to...
10
by: Clint | last post by:
Hey all - I'm having a really confusing problem concerning a web service. Right now, I have an application that needs to call a web service that does nothing but return "true" (this will...
5
by: Michael H | last post by:
Hi all, I guess I don't fully understand how a SHA1 hash value is calculated in C# / .NET for a large file... I'm trying to calculate SHA1 values for large files that are much larger than my...
0
by: Dil via .NET 247 | last post by:
Fresher to .NET Aiming to produce a resulting hash of length 24 CHARACTERS, using MD5 or SHA1 Algorithms. According to the Class Libraries, the hash size for the SHA1 algorithm is 160 bits, and...
8
by: Adam Carpenter | last post by:
Hello, I have my users passwords stored to my DB hashs created using SHA1CryptoServiceProvider, here is the function: Public Shared Function EncryptPassword(ByVal password As String) As Byte()...
2
by: johnnyG | last post by:
Greetings, I'm studying for the 70-330 Exam using the MS Press book by Tony Northrup and there are 2 side-by-side examples of using the SHA1CryptoServiceProvider to create a hash value from a...
2
by: amygdala | last post by:
Hi, Does anybody now of a custom crypt function that implements sha1? The thing I like about crypt is that I don't have to worry about (re)generating salt when querying the database. Or are...
7
by: php.developer2007 | last post by:
I want to know to decode sha1 encoded url into normal url. Example www.example.com/<sha1 code>/index1.htm I want this to www.example.com/index1.htm
6
by: LaundroMat | last post by:
Hi - I'm trying to calculate unique hash values for binary files, independent of their location and filename, and I was wondering whether I'm going in the right direction. Basically, the hash...
1
by: CloudSolutions | last post by:
Introduction: For many beginners and individual users, requiring a credit card and email registration may pose a barrier when starting to use cloud servers. However, some cloud server providers now...
0
by: Faith0G | last post by:
I am starting a new it consulting business and it's been a while since I setup a new website. Is wordpress still the best web based software for hosting a 5 page website? The webpages will be...
0
isladogs
by: isladogs | last post by:
The next Access Europe User Group meeting will be on Wednesday 3 Apr 2024 starting at 18:00 UK time (6PM UTC+1) and finishing by 19:30 (7.30PM). In this session, we are pleased to welcome former...
0
by: taylorcarr | last post by:
A Canon printer is a smart device known for being advanced, efficient, and reliable. It is designed for home, office, and hybrid workspace use and can also be used for a variety of purposes. However,...
0
by: ryjfgjl | last post by:
If we have dozens or hundreds of excel to import into the database, if we use the excel import function provided by database editors such as navicat, it will be extremely tedious and time-consuming...
0
by: emmanuelkatto | last post by:
Hi All, I am Emmanuel katto from Uganda. I want to ask what challenges you've faced while migrating a website to cloud. Please let me know. Thanks! Emmanuel
1
by: nemocccc | last post by:
hello, everyone, I want to develop a software for my android phone for daily needs, any suggestions?
1
by: Sonnysonu | last post by:
This is the data of csv file 1 2 3 1 2 3 1 2 3 1 2 3 2 3 2 3 3 the lengths should be different i have to store the data by column-wise with in the specific length. suppose the i have to...
0
by: Hystou | last post by:
There are some requirements for setting up RAID: 1. The motherboard and BIOS support RAID configuration. 2. The motherboard has 2 or more available SATA protocol SSD/HDD slots (including MSATA, M.2...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.