Actions90
- Sessions Actions
- Messages - Sending Actions
- Chats Actions
- Messages - Actions Actions
- Groups Actions
- List Groups
- Group Info
- Get Invite Link
- Revoke Invite Link
- Join via Link
- Preview via Link
- Create Group
- Delete Group
- Update Group Description
- Toggle Announcement Mode
- List Participants
- Add Participants
- Remove Participants
- Demote Participants
- Approve Join Request
- Reject Join Request
- List Join Requests
- Get Group Picture
- Set Group Picture
- Delete Group Picture
- Leave Group
- Update Group Name
- Lock Group Edits
- Promote Participants
- Profile Actions
- Server Actions
- Miscellaneous Actions
Overview
This node operation computes a cryptographic hash of a given input string using a specified algorithm and output encoding. It is useful for generating secure hash values for data integrity verification, password storage, or digital signatures. For example, you can hash a password before storing it or verify file integrity by comparing hash values.
Use Case Examples
- Hashing a password string using SHA-256 with hex output.
- Generating a base64-encoded SHA-1 hash of a message for data integrity checks.
Properties
| Name | Meaning |
|---|---|
| Input | The input string to be hashed, required for the operation. |
| Algorithm | The cryptographic hash algorithm to use, e.g., sha256, sha1, etc. |
| Output Encoding | The encoding format of the hash output, such as hex or base64. |
Output
JSON
json- The resulting hash value of the input string according to the specified algorithm and encoding.
Dependencies
- Requires an API key credential for the WARest WhatsApp REST API to perform the operation.
Troubleshooting
- Ensure the input string is not empty as it is required for hashing.
- Verify the algorithm name is supported and correctly spelled; unsupported algorithms will cause errors.
- Check that the output encoding is either 'hex' or 'base64' as other values are not supported.
- If the API request fails, confirm that the API key credential is valid and the base URL is correctly configured.
Links
- Cryptographic Hash Function - Wikipedia - General information about cryptographic hash functions and their uses.
