a2256f5e38e63edf88552074f5a281d30449f657
[platform/core/dotnet/build-tools.git] /
1 <?xml version="1.0" encoding="utf-8"?><span>\r
2 <doc>\r
3   <assembly>\r
4     <name>System.Security.Cryptography.Algorithms</name>\r
5   </assembly>\r
6   <members>\r
7     <member name="T:System.Security.Cryptography.PKCS1MaskGenerationMethod">\r
8       <summary>Computes masks according to PKCS #1 for use by key exchange algorithms.</summary>\r
9     </member>\r
10     <member name="M:System.Security.Cryptography.PKCS1MaskGenerationMethod.#ctor">\r
11       <summary>Initializes a new instance of the <see cref="T:System.Security.Cryptography.PKCS1MaskGenerationMethod"></see> class.</summary>\r
12     </member>\r
13     <member name="M:System.Security.Cryptography.PKCS1MaskGenerationMethod.GenerateMask(System.Byte[],System.Int32)">\r
14       <summary>Generates and returns a mask from the specified random seed of the specified length.</summary>\r
15       <param name="rgbSeed">The random seed to use for computing the mask.</param>\r
16       <param name="cbReturn">The length of the generated mask in bytes.</param>\r
17       <returns>A randomly generated mask whose length is equal to the <paramref name="cbReturn">cbReturn</paramref> parameter.</returns>\r
18     </member>\r
19     <member name="P:System.Security.Cryptography.PKCS1MaskGenerationMethod.HashName">\r
20       <summary>Gets or sets the name of the hash algorithm type to use for generating the mask.</summary>\r
21       <returns>The name of the type that implements the hash algorithm to use for computing the mask.</returns>\r
22     </member>\r
23     <member name="T:System.Security.Cryptography.RandomNumberGenerator">\r
24       <summary>Represents the abstract class from which all implementations of cryptographic random number generators derive.</summary>\r
25     </member>\r
26     <member name="M:System.Security.Cryptography.RandomNumberGenerator.#ctor">\r
27       <summary>Initializes a new instance of <see cref="T:System.Security.Cryptography.RandomNumberGenerator"></see>.</summary>\r
28     </member>\r
29     <member name="M:System.Security.Cryptography.RandomNumberGenerator.Create">\r
30       <summary>Creates an instance of the default implementation of a cryptographic random number generator that can be used to generate random data.</summary>\r
31       <returns>A new instance of a cryptographic random number generator.</returns>\r
32     </member>\r
33     <member name="M:System.Security.Cryptography.RandomNumberGenerator.Create(System.String)">\r
34       <summary>Creates an instance of the specified implementation of a cryptographic random number generator.</summary>\r
35       <param name="rngName">The name of the random number generator implementation to use.</param>\r
36       <returns>A new instance of a cryptographic random number generator.</returns>\r
37     </member>\r
38     <member name="M:System.Security.Cryptography.RandomNumberGenerator.Dispose">\r
39       <summary>When overridden in a derived class, releases all resources used by the current instance of the <see cref="T:System.Security.Cryptography.RandomNumberGenerator"></see> class.</summary>\r
40     </member>\r
41     <member name="M:System.Security.Cryptography.RandomNumberGenerator.Dispose(System.Boolean)">\r
42       <summary>When overridden in a derived class, releases the unmanaged resources used by the <see cref="T:System.Security.Cryptography.RandomNumberGenerator"></see> and optionally releases the managed resources.</summary>\r
43       <param name="disposing">true to release both managed and unmanaged resources; false to release only unmanaged resources.</param>\r
44     </member>\r
45     <member name="M:System.Security.Cryptography.RandomNumberGenerator.GetBytes(System.Byte[])">\r
46       <summary>When overridden in a derived class, fills an array of bytes with a cryptographically strong random sequence of values.</summary>\r
47       <param name="data">The array to fill with cryptographically strong random bytes.</param>\r
48     </member>\r
49     <member name="M:System.Security.Cryptography.RandomNumberGenerator.GetBytes(System.Byte[],System.Int32,System.Int32)">\r
50       <summary>Fills the specified byte array with a cryptographically strong random sequence of values.</summary>\r
51       <param name="data">The array to fill with cryptographically strong random bytes.</param>\r
52       <param name="offset">The index of the array to start the fill operation.</param>\r
53       <param name="count">The number of bytes to fill.</param>\r
54       <exception cref="T:System.ArgumentNullException"><paramref name="data">data</paramref> is null.</exception>\r
55       <exception cref="T:System.ArgumentOutOfRangeException"><paramref name="offset">offset</paramref> or <paramref name="count">count</paramref> is less than 0</exception>\r
56       <exception cref="T:System.ArgumentException"><paramref name="offset">offset</paramref> plus <paramref name="count">count</paramref> exceeds the length of <paramref name="data">data</paramref>.</exception>\r
57     </member>\r
58     <member name="M:System.Security.Cryptography.RandomNumberGenerator.GetNonZeroBytes(System.Byte[])">\r
59       <summary>When overridden in a derived class, fills an array of bytes with a cryptographically strong random sequence of nonzero values.</summary>\r
60       <param name="data">The array to fill with cryptographically strong random nonzero bytes.</param>\r
61     </member>\r
62     <member name="T:System.Security.Cryptography.RC2">\r
63       <summary>Represents the base class from which all implementations of the <see cref="T:System.Security.Cryptography.RC2"></see> algorithm must derive.</summary>\r
64     </member>\r
65     <member name="M:System.Security.Cryptography.RC2.#ctor">\r
66       <summary>Initializes a new instance of <see cref="T:System.Security.Cryptography.RC2"></see>.</summary>\r
67     </member>\r
68     <member name="M:System.Security.Cryptography.RC2.Create">\r
69       <summary>Creates an instance of a cryptographic object to perform the <see cref="T:System.Security.Cryptography.RC2"></see> algorithm.</summary>\r
70       <returns>An instance of a cryptographic object.</returns>\r
71       <exception cref="T:System.Reflection.TargetInvocationException">The algorithm was used with Federal Information Processing Standards (FIPS) mode enabled, but is not FIPS compatible.</exception>\r
72     </member>\r
73     <member name="M:System.Security.Cryptography.RC2.Create(System.String)">\r
74       <summary>Creates an instance of a cryptographic object to perform the specified implementation of the <see cref="T:System.Security.Cryptography.RC2"></see> algorithm.</summary>\r
75       <param name="AlgName">The name of the specific implementation of <see cref="T:System.Security.Cryptography.RC2"></see> to use.</param>\r
76       <returns>An instance of a cryptographic object.</returns>\r
77       <exception cref="T:System.Reflection.TargetInvocationException">The algorithm described by the <paramref name="algName">algName</paramref> parameter was used with Federal Information Processing Standards (FIPS) mode enabled, but is not FIPS compatible.</exception>\r
78     </member>\r
79     <member name="P:System.Security.Cryptography.RC2.EffectiveKeySize">\r
80       <summary>Gets or sets the effective size of the secret key used by the <see cref="T:System.Security.Cryptography.RC2"></see> algorithm in bits.</summary>\r
81       <returns>The effective key size used by the <see cref="T:System.Security.Cryptography.RC2"></see> algorithm.</returns>\r
82       <exception cref="T:System.Security.Cryptography.CryptographicException">The effective key size is invalid.</exception>\r
83     </member>\r
84     <member name="F:System.Security.Cryptography.RC2.EffectiveKeySizeValue">\r
85       <summary>Represents the effective size of the secret key used by the <see cref="T:System.Security.Cryptography.RC2"></see> algorithm in bits.</summary>\r
86       <returns></returns>\r
87     </member>\r
88     <member name="P:System.Security.Cryptography.RC2.KeySize">\r
89       <summary>Gets or sets the size of the secret key used by the <see cref="T:System.Security.Cryptography.RC2"></see> algorithm in bits.</summary>\r
90       <returns>The size of the secret key used by the <see cref="T:System.Security.Cryptography.RC2"></see> algorithm.</returns>\r
91       <exception cref="T:System.Security.Cryptography.CryptographicException">The value for the RC2 key size is less than the effective key size value.</exception>\r
92     </member>\r
93     <member name="T:System.Security.Cryptography.Rfc2898DeriveBytes">\r
94       <summary>Implements password-based key derivation functionality, PBKDF2, by using a pseudo-random number generator based on <see cref="T:System.Security.Cryptography.HMACSHA1"></see>.</summary>\r
95     </member>\r
96     <member name="M:System.Security.Cryptography.Rfc2898DeriveBytes.#ctor(System.String,System.Byte[])">\r
97       <summary>Initializes a new instance of the <see cref="T:System.Security.Cryptography.Rfc2898DeriveBytes"></see> class using a password and salt to derive the key.</summary>\r
98       <param name="password">The password used to derive the key.</param>\r
99       <param name="salt">The key salt used to derive the key.</param>\r
100       <exception cref="T:System.ArgumentException">The specified salt size is smaller than 8 bytes or the iteration count is less than 1.</exception>\r
101       <exception cref="T:System.ArgumentNullException">The password or salt is null.</exception>\r
102     </member>\r
103     <member name="M:System.Security.Cryptography.Rfc2898DeriveBytes.#ctor(System.String,System.Int32)">\r
104       <summary>Initializes a new instance of the <see cref="T:System.Security.Cryptography.Rfc2898DeriveBytes"></see> class using the password and salt size to derive the key.</summary>\r
105       <param name="password">The password used to derive the key.</param>\r
106       <param name="saltSize">The size of the random salt that you want the class to generate.</param>\r
107       <exception cref="T:System.ArgumentException">The specified salt size is smaller than 8 bytes.</exception>\r
108       <exception cref="T:System.ArgumentNullException">The password or salt is null.</exception>\r
109     </member>\r
110     <member name="M:System.Security.Cryptography.Rfc2898DeriveBytes.#ctor(System.Byte[],System.Byte[],System.Int32)">\r
111       <summary>Initializes a new instance of the <see cref="T:System.Security.Cryptography.Rfc2898DeriveBytes"></see> class using a password, a salt, and number of iterations to derive the key.</summary>\r
112       <param name="password">The password used to derive the key.</param>\r
113       <param name="salt">The key salt used to derive the key.</param>\r
114       <param name="iterations">The number of iterations for the operation.</param>\r
115       <exception cref="T:System.ArgumentException">The specified salt size is smaller than 8 bytes or the iteration count is less than 1.</exception>\r
116       <exception cref="T:System.ArgumentNullException">The password or salt is null.</exception>\r
117     </member>\r
118     <member name="M:System.Security.Cryptography.Rfc2898DeriveBytes.#ctor(System.String,System.Byte[],System.Int32)">\r
119       <summary>Initializes a new instance of the <see cref="T:System.Security.Cryptography.Rfc2898DeriveBytes"></see> class using a password, a salt, and number of iterations to derive the key.</summary>\r
120       <param name="password">The password used to derive the key.</param>\r
121       <param name="salt">The key salt used to derive the key.</param>\r
122       <param name="iterations">The number of iterations for the operation.</param>\r
123       <exception cref="T:System.ArgumentException">The specified salt size is smaller than 8 bytes or the iteration count is less than 1.</exception>\r
124       <exception cref="T:System.ArgumentNullException">The password or salt is null.</exception>\r
125     </member>\r
126     <member name="M:System.Security.Cryptography.Rfc2898DeriveBytes.#ctor(System.String,System.Int32,System.Int32)">\r
127       <summary>Initializes a new instance of the <see cref="T:System.Security.Cryptography.Rfc2898DeriveBytes"></see> class using a password, a salt size, and number of iterations to derive the key.</summary>\r
128       <param name="password">The password used to derive the key.</param>\r
129       <param name="saltSize">The size of the random salt that you want the class to generate.</param>\r
130       <param name="iterations">The number of iterations for the operation.</param>\r
131       <exception cref="T:System.ArgumentException">The specified salt size is smaller than 8 bytes or the iteration count is less than 1.</exception>\r
132       <exception cref="T:System.ArgumentNullException">The password or salt is null.</exception>\r
133       <exception cref="T:System.ArgumentOutOfRangeException"><paramref name="iterations">iterations</paramref> is out of range. This parameter requires a non-negative number.</exception>\r
134     </member>\r
135     <member name="M:System.Security.Cryptography.Rfc2898DeriveBytes.#ctor(System.Byte[],System.Byte[],System.Int32,System.Security.Cryptography.HashAlgorithmName)">\r
136       <param name="password"></param>\r
137       <param name="salt"></param>\r
138       <param name="iterations"></param>\r
139       <param name="hashAlgorithm"></param>\r
140     </member>\r
141     <member name="M:System.Security.Cryptography.Rfc2898DeriveBytes.#ctor(System.String,System.Byte[],System.Int32,System.Security.Cryptography.HashAlgorithmName)">\r
142       <param name="password"></param>\r
143       <param name="salt"></param>\r
144       <param name="iterations"></param>\r
145       <param name="hashAlgorithm"></param>\r
146     </member>\r
147     <member name="M:System.Security.Cryptography.Rfc2898DeriveBytes.#ctor(System.String,System.Int32,System.Int32,System.Security.Cryptography.HashAlgorithmName)">\r
148       <param name="password"></param>\r
149       <param name="saltSize"></param>\r
150       <param name="iterations"></param>\r
151       <param name="hashAlgorithm"></param>\r
152     </member>\r
153     <member name="M:System.Security.Cryptography.Rfc2898DeriveBytes.CryptDeriveKey(System.String,System.String,System.Int32,System.Byte[])">\r
154       <summary>Derives a cryptographic key from the <see cref="T:System.Security.Cryptography.Rfc2898DeriveBytes"></see> object.</summary>\r
155       <param name="algname">The algorithm name for which to derive the key.</param>\r
156       <param name="alghashname">The hash algorithm name to use to derive the key.</param>\r
157       <param name="keySize">The size of the key, in bits, to derive.</param>\r
158       <param name="rgbIV">The initialization vector (IV) to use to derive the key.</param>\r
159       <returns>The derived key.</returns>\r
160       <exception cref="T:System.Security.Cryptography.CryptographicException">The <paramref name="keySize">keySize</paramref> parameter is incorrect.   -or-   The cryptographic service provider (CSP) cannot be acquired.   -or-   The <paramref name="algname">algname</paramref> parameter is not a valid algorithm name.   -or-   The <paramref name="alghashname">alghashname</paramref> parameter is not a valid hash algorithm name.</exception>\r
161     </member>\r
162     <member name="M:System.Security.Cryptography.Rfc2898DeriveBytes.Dispose(System.Boolean)">\r
163       <summary>Releases the unmanaged resources used by the <see cref="T:System.Security.Cryptography.Rfc2898DeriveBytes"></see> class and optionally releases the managed resources.</summary>\r
164       <param name="disposing">true to release both managed and unmanaged resources; false to release only unmanaged resources.</param>\r
165     </member>\r
166     <member name="M:System.Security.Cryptography.Rfc2898DeriveBytes.GetBytes(System.Int32)">\r
167       <summary>Returns the pseudo-random key for this object.</summary>\r
168       <param name="cb">The number of pseudo-random key bytes to generate.</param>\r
169       <returns>A byte array filled with pseudo-random key bytes.</returns>\r
170       <exception cref="T:System.ArgumentOutOfRangeException"><paramref name="cb">cb</paramref> is out of range. This parameter requires a non-negative number.</exception>\r
171     </member>\r
172     <member name="P:System.Security.Cryptography.Rfc2898DeriveBytes.HashAlgorithm">\r
173       <returns></returns>\r
174     </member>\r
175     <member name="P:System.Security.Cryptography.Rfc2898DeriveBytes.IterationCount">\r
176       <summary>Gets or sets the number of iterations for the operation.</summary>\r
177       <returns>The number of iterations for the operation.</returns>\r
178       <exception cref="T:System.ArgumentOutOfRangeException">The number of iterations is less than 1.</exception>\r
179     </member>\r
180     <member name="M:System.Security.Cryptography.Rfc2898DeriveBytes.Reset">\r
181       <summary>Resets the state of the operation.</summary>\r
182     </member>\r
183     <member name="P:System.Security.Cryptography.Rfc2898DeriveBytes.Salt">\r
184       <summary>Gets or sets the key salt value for the operation.</summary>\r
185       <returns>The key salt value for the operation.</returns>\r
186       <exception cref="T:System.ArgumentException">The specified salt size is smaller than 8 bytes.</exception>\r
187       <exception cref="T:System.ArgumentNullException">The salt is null.</exception>\r
188     </member>\r
189     <member name="T:System.Security.Cryptography.Rijndael">\r
190       <summary>Represents the base class from which all implementations of the <see cref="T:System.Security.Cryptography.Rijndael"></see> symmetric encryption algorithm must inherit.</summary>\r
191     </member>\r
192     <member name="M:System.Security.Cryptography.Rijndael.#ctor">\r
193       <summary>Initializes a new instance of <see cref="T:System.Security.Cryptography.Rijndael"></see>.</summary>\r
194     </member>\r
195     <member name="M:System.Security.Cryptography.Rijndael.Create">\r
196       <summary>Creates a cryptographic object to perform the <see cref="T:System.Security.Cryptography.Rijndael"></see> algorithm.</summary>\r
197       <returns>A cryptographic object.</returns>\r
198       <exception cref="T:System.Reflection.TargetInvocationException">The algorithm was used with Federal Information Processing Standards (FIPS) mode enabled, but is not FIPS compatible.</exception>\r
199     </member>\r
200     <member name="M:System.Security.Cryptography.Rijndael.Create(System.String)">\r
201       <summary>Creates a cryptographic object to perform the specified implementation of the <see cref="T:System.Security.Cryptography.Rijndael"></see> algorithm.</summary>\r
202       <param name="algName">The name of the specific implementation of <see cref="T:System.Security.Cryptography.Rijndael"></see> to create.</param>\r
203       <returns>A cryptographic object.</returns>\r
204       <exception cref="T:System.Reflection.TargetInvocationException">The algorithm described by the <paramref name="algName">algName</paramref> parameter was used with Federal Information Processing Standards (FIPS) mode enabled, but is not FIPS compatible.</exception>\r
205     </member>\r
206     <member name="T:System.Security.Cryptography.RijndaelManaged">\r
207       <summary>Accesses the managed version of the <see cref="T:System.Security.Cryptography.Rijndael"></see> algorithm. This class cannot be inherited.</summary>\r
208     </member>\r
209     <member name="M:System.Security.Cryptography.RijndaelManaged.#ctor">\r
210       <summary>Initializes a new instance of the <see cref="T:System.Security.Cryptography.RijndaelManaged"></see> class.</summary>\r
211       <exception cref="T:System.InvalidOperationException">This class is not compliant with the FIPS algorithm.</exception>\r
212     </member>\r
213     <member name="P:System.Security.Cryptography.RijndaelManaged.BlockSize">\r
214       <returns></returns>\r
215     </member>\r
216     <member name="M:System.Security.Cryptography.RijndaelManaged.CreateDecryptor">\r
217       <returns></returns>\r
218     </member>\r
219     <member name="M:System.Security.Cryptography.RijndaelManaged.CreateDecryptor(System.Byte[],System.Byte[])">\r
220       <summary>Creates a symmetric <see cref="T:System.Security.Cryptography.Rijndael"></see> decryptor object with the specified <see cref="P:System.Security.Cryptography.SymmetricAlgorithm.Key"></see> and initialization vector (<see cref="P:System.Security.Cryptography.SymmetricAlgorithm.IV"></see>).</summary>\r
221       <param name="rgbKey">The secret key to be used for the symmetric algorithm. The key size must be 128, 192, or 256 bits.</param>\r
222       <param name="rgbIV">The IV to be used for the symmetric algorithm.</param>\r
223       <returns>A symmetric <see cref="T:System.Security.Cryptography.Rijndael"></see> decryptor object.</returns>\r
224       <exception cref="T:System.ArgumentNullException">The <paramref name="rgbKey">rgbKey</paramref> parameter is null.   -or-   The <paramref name="rgbIV">rgbIV</paramref> parameter is null.</exception>\r
225       <exception cref="T:System.Security.Cryptography.CryptographicException">The value of the <see cref="P:System.Security.Cryptography.SymmetricAlgorithm.Mode"></see> property is not <see cref="F:System.Security.Cryptography.CipherMode.ECB"></see>, <see cref="F:System.Security.Cryptography.CipherMode.CBC"></see>, or <see cref="F:System.Security.Cryptography.CipherMode.CFB"></see>.</exception>\r
226     </member>\r
227     <member name="M:System.Security.Cryptography.RijndaelManaged.CreateEncryptor">\r
228       <returns></returns>\r
229     </member>\r
230     <member name="M:System.Security.Cryptography.RijndaelManaged.CreateEncryptor(System.Byte[],System.Byte[])">\r
231       <summary>Creates a symmetric <see cref="T:System.Security.Cryptography.Rijndael"></see> encryptor object with the specified <see cref="P:System.Security.Cryptography.SymmetricAlgorithm.Key"></see> and initialization vector (<see cref="P:System.Security.Cryptography.SymmetricAlgorithm.IV"></see>).</summary>\r
232       <param name="rgbKey">The secret key to be used for the symmetric algorithm. The key size must be 128, 192, or 256 bits.</param>\r
233       <param name="rgbIV">The IV to be used for the symmetric algorithm.</param>\r
234       <returns>A symmetric <see cref="T:System.Security.Cryptography.Rijndael"></see> encryptor object.</returns>\r
235       <exception cref="T:System.ArgumentNullException">The <paramref name="rgbKey">rgbKey</paramref> parameter is null.   -or-   The <paramref name="rgbIV">rgbIV</paramref> parameter is null.</exception>\r
236       <exception cref="T:System.Security.Cryptography.CryptographicException">The value of the <see cref="P:System.Security.Cryptography.SymmetricAlgorithm.Mode"></see> property is not <see cref="F:System.Security.Cryptography.CipherMode.ECB"></see>, <see cref="F:System.Security.Cryptography.CipherMode.CBC"></see>, or <see cref="F:System.Security.Cryptography.CipherMode.CFB"></see>.</exception>\r
237     </member>\r
238     <member name="M:System.Security.Cryptography.RijndaelManaged.GenerateIV">\r
239       <summary>Generates a random initialization vector (<see cref="P:System.Security.Cryptography.SymmetricAlgorithm.IV"></see>) to be used for the algorithm.</summary>\r
240     </member>\r
241     <member name="M:System.Security.Cryptography.RijndaelManaged.GenerateKey">\r
242       <summary>Generates a random <see cref="P:System.Security.Cryptography.SymmetricAlgorithm.Key"></see> to be used for the algorithm.</summary>\r
243     </member>\r
244     <member name="P:System.Security.Cryptography.RijndaelManaged.IV">\r
245       <returns></returns>\r
246     </member>\r
247     <member name="P:System.Security.Cryptography.RijndaelManaged.Key">\r
248       <returns></returns>\r
249     </member>\r
250     <member name="P:System.Security.Cryptography.RijndaelManaged.KeySize">\r
251       <returns></returns>\r
252     </member>\r
253     <member name="P:System.Security.Cryptography.RijndaelManaged.LegalKeySizes">\r
254       <returns></returns>\r
255     </member>\r
256     <member name="P:System.Security.Cryptography.RijndaelManaged.Mode">\r
257       <returns></returns>\r
258     </member>\r
259     <member name="P:System.Security.Cryptography.RijndaelManaged.Padding">\r
260       <returns></returns>\r
261     </member>\r
262     <member name="T:System.Security.Cryptography.RSA">\r
263       <summary>Represents the base class from which all implementations of the <see cref="T:System.Security.Cryptography.RSA"></see> algorithm inherit.</summary>\r
264     </member>\r
265     <member name="M:System.Security.Cryptography.RSA.#ctor">\r
266       <summary>Initializes a new instance of the <see cref="T:System.Security.Cryptography.RSA"></see> class.</summary>\r
267     </member>\r
268     <member name="M:System.Security.Cryptography.RSA.Create">\r
269       <summary>Creates an instance of the default implementation of the <see cref="T:System.Security.Cryptography.RSA"></see> algorithm.</summary>\r
270       <returns>A new instance of the default implementation of <see cref="T:System.Security.Cryptography.RSA"></see>.</returns>\r
271     </member>\r
272     <member name="M:System.Security.Cryptography.RSA.Create(System.Int32)">\r
273       <param name="keySizeInBits"></param>\r
274       <returns></returns>\r
275     </member>\r
276     <member name="M:System.Security.Cryptography.RSA.Create(System.Security.Cryptography.RSAParameters)">\r
277       <param name="parameters"></param>\r
278       <returns></returns>\r
279     </member>\r
280     <member name="M:System.Security.Cryptography.RSA.Create(System.String)">\r
281       <summary>Creates an instance of the specified implementation of <see cref="T:System.Security.Cryptography.RSA"></see>.</summary>\r
282       <param name="algName">The name of the implementation of <see cref="T:System.Security.Cryptography.RSA"></see> to use.</param>\r
283       <returns>A new instance of the specified implementation of <see cref="T:System.Security.Cryptography.RSA"></see>.</returns>\r
284     </member>\r
285     <member name="M:System.Security.Cryptography.RSA.Decrypt(System.Byte[],System.Security.Cryptography.RSAEncryptionPadding)">\r
286       <summary>When overridden in a derived class, decrypts the input data using the specified padding mode.</summary>\r
287       <param name="data">The data to decrypt.</param>\r
288       <param name="padding">The padding mode.</param>\r
289       <returns>The decrypted data.</returns>\r
290       <exception cref="T:System.NotImplementedException">A derived class must override this method.</exception>\r
291     </member>\r
292     <member name="M:System.Security.Cryptography.RSA.DecryptValue(System.Byte[])">\r
293       <summary>When overridden in a derived class, decrypts the input data using the private key.</summary>\r
294       <param name="rgb">The cipher text to be decrypted.</param>\r
295       <returns>The resulting decryption of the <paramref name="rgb">rgb</paramref> parameter in plain text.</returns>\r
296       <exception cref="T:System.NotSupportedException">This method call is not supported. This exception is thrown starting with the .NET Framework 4.6.</exception>\r
297     </member>\r
298     <member name="M:System.Security.Cryptography.RSA.Encrypt(System.Byte[],System.Security.Cryptography.RSAEncryptionPadding)">\r
299       <summary>When overridden in a derived class, encrypts the input data using the specified padding mode.</summary>\r
300       <param name="data">The data to encrypt.</param>\r
301       <param name="padding">The padding mode.</param>\r
302       <returns>The encrypted data.</returns>\r
303       <exception cref="T:System.NotImplementedException">A derived class must override this method.</exception>\r
304     </member>\r
305     <member name="M:System.Security.Cryptography.RSA.EncryptValue(System.Byte[])">\r
306       <summary>When overridden in a derived class, encrypts the input data using the public key.</summary>\r
307       <param name="rgb">The plain text to be encrypted.</param>\r
308       <returns>The resulting encryption of the <paramref name="rgb">rgb</paramref> parameter as cipher text.</returns>\r
309       <exception cref="T:System.NotSupportedException">This method call is not supported. This exception is thrown starting with the .NET Framework 4.6.</exception>\r
310     </member>\r
311     <member name="M:System.Security.Cryptography.RSA.ExportParameters(System.Boolean)">\r
312       <summary>When overridden in a derived class, exports the <see cref="T:System.Security.Cryptography.RSAParameters"></see>.</summary>\r
313       <param name="includePrivateParameters">true to include private parameters; otherwise, false.</param>\r
314       <returns>The parameters for <see cref="T:System.Security.Cryptography.DSA"></see>.</returns>\r
315     </member>\r
316     <member name="M:System.Security.Cryptography.RSA.FromXmlString(System.String)">\r
317       <summary>Initializes an <see cref="T:System.Security.Cryptography.RSA"></see> object from the key information from an XML string.</summary>\r
318       <param name="xmlString">The XML string containing <see cref="T:System.Security.Cryptography.RSA"></see> key information.</param>\r
319       <exception cref="T:System.ArgumentNullException">The <paramref name="xmlString">xmlString</paramref> parameter is null.</exception>\r
320       <exception cref="T:System.Security.Cryptography.CryptographicException">The format of the <paramref name="xmlString">xmlString</paramref> parameter is not valid.</exception>\r
321     </member>\r
322     <member name="M:System.Security.Cryptography.RSA.HashData(System.Byte[],System.Int32,System.Int32,System.Security.Cryptography.HashAlgorithmName)">\r
323       <summary>When overridden in a derived class, computes the hash value of a specified portion of a byte array by using a specified hashing algorithm.</summary>\r
324       <param name="data">The data to be hashed.</param>\r
325       <param name="offset">The index of the first byte in data that is to be hashed.</param>\r
326       <param name="count">The number of bytes to hash.</param>\r
327       <param name="hashAlgorithm">The algorithm to use in hash the data.</param>\r
328       <returns>The hashed data.</returns>\r
329       <exception cref="T:System.NotImplementedException">A derived class must override this method.</exception>\r
330     </member>\r
331     <member name="M:System.Security.Cryptography.RSA.HashData(System.IO.Stream,System.Security.Cryptography.HashAlgorithmName)">\r
332       <summary>When overridden in a derived class, computes the hash value of a specified binary stream by using a specified hashing algorithm.</summary>\r
333       <param name="data">The binary stream to hash.</param>\r
334       <param name="hashAlgorithm">The hash algorithm.</param>\r
335       <returns>The hashed data.</returns>\r
336       <exception cref="T:System.NotImplementedException">A derived class must override this method.</exception>\r
337     </member>\r
338     <member name="M:System.Security.Cryptography.RSA.ImportParameters(System.Security.Cryptography.RSAParameters)">\r
339       <summary>When overridden in a derived class, imports the specified <see cref="T:System.Security.Cryptography.RSAParameters"></see>.</summary>\r
340       <param name="parameters">The parameters for <see cref="T:System.Security.Cryptography.RSA"></see>.</param>\r
341     </member>\r
342     <member name="P:System.Security.Cryptography.RSA.KeyExchangeAlgorithm">\r
343       <summary>Gets the name of the key exchange algorithm available with this implementation of <see cref="T:System.Security.Cryptography.RSA"></see>.</summary>\r
344       <returns>Returns &quot;RSA&quot;.</returns>\r
345     </member>\r
346     <member name="P:System.Security.Cryptography.RSA.SignatureAlgorithm">\r
347       <summary>Gets the name of the signature algorithm available with this implementation of <see cref="T:System.Security.Cryptography.RSA"></see>.</summary>\r
348       <returns>Returns &quot;RSA&quot;.</returns>\r
349     </member>\r
350     <member name="M:System.Security.Cryptography.RSA.SignData(System.Byte[],System.Security.Cryptography.HashAlgorithmName,System.Security.Cryptography.RSASignaturePadding)">\r
351       <summary>Computes the hash value of the specified byte array using the specified hash algorithm and padding mode, and signs the resulting hash value.</summary>\r
352       <param name="data">The input data for which to compute the hash.</param>\r
353       <param name="hashAlgorithm">The hash algorithm to use to create the hash value.</param>\r
354       <param name="padding">The padding mode.</param>\r
355       <returns>The RSA signature for the specified data.</returns>\r
356       <exception cref="T:System.ArgumentNullException"><paramref name="data">data</paramref> is null.   -or-  <paramref name="padding">padding</paramref> is null.</exception>\r
357       <exception cref="T:System.ArgumentException"><paramref name="hashAlgorithm">hashAlgorithm</paramref>.<see cref="P:System.Security.Cryptography.HashAlgorithmName.Name"></see> is null or <see cref="F:System.String.Empty"></see>.</exception>\r
358     </member>\r
359     <member name="M:System.Security.Cryptography.RSA.SignData(System.IO.Stream,System.Security.Cryptography.HashAlgorithmName,System.Security.Cryptography.RSASignaturePadding)">\r
360       <summary>Computes the hash value of the specified stream using the specified hash algorithm and padding mode, and signs the resulting hash value.</summary>\r
361       <param name="data">The input stream for which to compute the hash.</param>\r
362       <param name="hashAlgorithm">The hash algorithm to use to create the hash value.</param>\r
363       <param name="padding">The padding mode.</param>\r
364       <returns>The RSA signature for the specified data.</returns>\r
365       <exception cref="T:System.ArgumentNullException"><paramref name="data">data</paramref> is null.   -or-  <paramref name="padding">padding</paramref> is null.</exception>\r
366       <exception cref="T:System.ArgumentException"><paramref name="hashAlgorithm">hashAlgorithm</paramref>.<see cref="P:System.Security.Cryptography.HashAlgorithmName.Name"></see> is null or <see cref="F:System.String.Empty"></see>.</exception>\r
367     </member>\r
368     <member name="M:System.Security.Cryptography.RSA.SignData(System.Byte[],System.Int32,System.Int32,System.Security.Cryptography.HashAlgorithmName,System.Security.Cryptography.RSASignaturePadding)">\r
369       <summary>Computes the hash value of a portion of the specified byte array using the specified hash algorithm and padding mode, and signs the resulting hash value.</summary>\r
370       <param name="data">The input data for which to compute the hash.</param>\r
371       <param name="offset">The offset into the array at which to begin using data.</param>\r
372       <param name="count">The number of bytes in the array to use as data.</param>\r
373       <param name="hashAlgorithm">The hash algorithm to use to create the hash value.</param>\r
374       <param name="padding">The padding mode.</param>\r
375       <returns>The RSA signature for the specified data.</returns>\r
376       <exception cref="T:System.ArgumentNullException"><paramref name="data">data</paramref> is null.   -or-  <paramref name="padding">padding</paramref> is null.</exception>\r
377       <exception cref="T:System.ArgumentException"><paramref name="hashAlgorithm">hashAlgorithm</paramref>.<see cref="P:System.Security.Cryptography.HashAlgorithmName.Name"></see> is null or <see cref="F:System.String.Empty"></see>.</exception>\r
378       <exception cref="T:System.ArgumentOutOfRangeException"><paramref name="offset">offset</paramref> is less than zero.   -or-  <paramref name="count">count</paramref> is less than zero.   -or-  <paramref name="offset">offset</paramref> + <paramref name="count">count</paramref> – 1 results in an index that is beyond the upper bound of <paramref name="data">data</paramref>.</exception>\r
379     </member>\r
380     <member name="M:System.Security.Cryptography.RSA.SignHash(System.Byte[],System.Security.Cryptography.HashAlgorithmName,System.Security.Cryptography.RSASignaturePadding)">\r
381       <summary>When overridden in a derived class, computes the signature for the specified hash value by encrypting it with the private key using the specified padding.</summary>\r
382       <param name="hash">The hash value of the data to be signed.</param>\r
383       <param name="hashAlgorithm">The hash algorithm used to create the hash value of the data.</param>\r
384       <param name="padding">The padding.</param>\r
385       <returns>The RSA signature for the specified hash value.</returns>\r
386       <exception cref="T:System.NotImplementedException">A derived class must override this method.</exception>\r
387     </member>\r
388     <member name="M:System.Security.Cryptography.RSA.ToXmlString(System.Boolean)">\r
389       <summary>Creates and returns an XML string containing the key of the current <see cref="T:System.Security.Cryptography.RSA"></see> object.</summary>\r
390       <param name="includePrivateParameters">true to include a public and private RSA key; false to include only the public key.</param>\r
391       <returns>An XML string containing the key of the current <see cref="T:System.Security.Cryptography.RSA"></see> object.</returns>\r
392     </member>\r
393     <member name="M:System.Security.Cryptography.RSA.VerifyData(System.Byte[],System.Int32,System.Int32,System.Byte[],System.Security.Cryptography.HashAlgorithmName,System.Security.Cryptography.RSASignaturePadding)">\r
394       <summary>Verifies that a digital signature is valid by calculating the hash value of the data in a portion of a byte array using the specified hash algorithm and padding, and comparing it to the provided signature.</summary>\r
395       <param name="data">The signed data.</param>\r
396       <param name="offset">The starting index at which to compute the hash.</param>\r
397       <param name="count">The number of bytes to hash.</param>\r
398       <param name="signature">The signature data to be verified.</param>\r
399       <param name="hashAlgorithm">The hash algorithm used to create the hash value of the data.</param>\r
400       <param name="padding">The padding mode.</param>\r
401       <returns>true if the signature is valid; otherwise, false.</returns>\r
402       <exception cref="T:System.ArgumentNullException"><paramref name="data">data</paramref> is null.   -or-  <paramref name="signature">signature</paramref> is null.   -or-  <paramref name="padding">padding</paramref> is null.</exception>\r
403       <exception cref="T:System.ArgumentException"><paramref name="hashAlgorithm">hashAlgorithm</paramref>.<see cref="P:System.Security.Cryptography.HashAlgorithmName.Name"></see> is null or <see cref="F:System.String.Empty"></see>.</exception>\r
404       <exception cref="T:System.ArgumentOutOfRangeException"><paramref name="offset">offset</paramref> is less than zero.   -or-  <paramref name="count">count</paramref> is less than zero.   -or-  <paramref name="offset">offset</paramref> + <paramref name="count">count</paramref> – 1 results in an index that is beyond the upper bound of <paramref name="data">data</paramref>.</exception>\r
405     </member>\r
406     <member name="M:System.Security.Cryptography.RSA.VerifyData(System.Byte[],System.Byte[],System.Security.Cryptography.HashAlgorithmName,System.Security.Cryptography.RSASignaturePadding)">\r
407       <summary>Verifies that a digital signature is valid by calculating the hash value of the specified data using the specified hash algorithm and padding, and comparing it to the provided signature.</summary>\r
408       <param name="data">The signed data.</param>\r
409       <param name="signature">The signature data to be verified.</param>\r
410       <param name="hashAlgorithm">The hash algorithm used to create the hash value of the data.</param>\r
411       <param name="padding">The padding mode.</param>\r
412       <returns>true if the signature is valid; otherwise, false.</returns>\r
413       <exception cref="T:System.ArgumentNullException"><paramref name="data">data</paramref> is null.   -or-  <paramref name="signature">signature</paramref> is null.   -or-  <paramref name="padding">padding</paramref> is null.</exception>\r
414       <exception cref="T:System.ArgumentException"><paramref name="hashAlgorithm">hashAlgorithm</paramref>.<see cref="P:System.Security.Cryptography.HashAlgorithmName.Name"></see> is null or <see cref="F:System.String.Empty"></see>.</exception>\r
415     </member>\r
416     <member name="M:System.Security.Cryptography.RSA.VerifyData(System.IO.Stream,System.Byte[],System.Security.Cryptography.HashAlgorithmName,System.Security.Cryptography.RSASignaturePadding)">\r
417       <summary>Verifies that a digital signature is valid by calculating the hash value of the specified stream using the specified hash algorithm and padding, and comparing it to the provided signature.</summary>\r
418       <param name="data">The signed data.</param>\r
419       <param name="signature">The signature data to be verified.</param>\r
420       <param name="hashAlgorithm">The hash algorithm used to create the hash value of the data.</param>\r
421       <param name="padding">The padding mode.</param>\r
422       <returns>true if the signature is valid; otherwise, false.</returns>\r
423       <exception cref="T:System.ArgumentNullException"><paramref name="data">data</paramref> is null.   -or-  <paramref name="signature">signature</paramref> is null.   -or-  <paramref name="padding">padding</paramref> is null.</exception>\r
424       <exception cref="T:System.ArgumentException"><paramref name="hashAlgorithm">hashAlgorithm</paramref>.<see cref="P:System.Security.Cryptography.HashAlgorithmName.Name"></see> is null or <see cref="F:System.String.Empty"></see>.</exception>\r
425     </member>\r
426     <member name="M:System.Security.Cryptography.RSA.VerifyHash(System.Byte[],System.Byte[],System.Security.Cryptography.HashAlgorithmName,System.Security.Cryptography.RSASignaturePadding)">\r
427       <summary>Verifies that a digital signature is valid by determining the hash value in the signature using the specified hash algorithm and padding, and comparing it to the provided hash value.</summary>\r
428       <param name="hash">The hash value of the signed data.</param>\r
429       <param name="signature">The signature data to be verified.</param>\r
430       <param name="hashAlgorithm">The hash algorithm used to create the hash value.</param>\r
431       <param name="padding">The padding mode.</param>\r
432       <returns>true if the signature is valid; otherwise, false.</returns>\r
433       <exception cref="T:System.NotImplementedException">A derived class must override this method.</exception>\r
434     </member>\r
435     <member name="T:System.Security.Cryptography.RSAEncryptionPadding">\r
436       <summary>Specifies the padding mode and parameters to use with RSA encryption or decryption operations.</summary>\r
437     </member>\r
438     <member name="M:System.Security.Cryptography.RSAEncryptionPadding.CreateOaep(System.Security.Cryptography.HashAlgorithmName)">\r
439       <summary>Creates a new <see cref="T:System.Security.Cryptography.RSAEncryptionPadding"></see> instance whose <see cref="P:System.Security.Cryptography.RSAEncryptionPadding.Mode"></see> is <see cref="F:System.Security.Cryptography.RSAEncryptionPaddingMode.Oaep"></see> with the given hash algorithm.</summary>\r
440       <param name="hashAlgorithm">The hash algorithm.</param>\r
441       <returns>An object whose mode is <see cref="P:System.Security.Cryptography.RSAEncryptionPadding.Mode"></see> is <see cref="F:System.Security.Cryptography.RSAEncryptionPaddingMode.Oaep"></see> with the hash algorithm specified by <paramref name="hashAlgorithm">hashAlgorithm</paramref>. .</returns>\r
442       <exception cref="T:System.ArgumentException">The <see cref="P:System.Security.Cryptography.HashAlgorithmName.Name"></see> property of <paramref name="hashAlgorithm">hashAlgorithm</paramref> is either null or <see cref="F:System.String.Empty"></see>.</exception>\r
443     </member>\r
444     <member name="M:System.Security.Cryptography.RSAEncryptionPadding.Equals(System.Object)">\r
445       <summary>Determines whether the current instance is equal to the specified object.</summary>\r
446       <param name="obj">The object to compare.</param>\r
447       <returns>true if <paramref name="obj">obj</paramref> is equal to the current instance; otherwise, false.</returns>\r
448     </member>\r
449     <member name="M:System.Security.Cryptography.RSAEncryptionPadding.Equals(System.Security.Cryptography.RSAEncryptionPadding)">\r
450       <summary>Determines whether the current instance is equal to the specified <see cref="T:System.Security.Cryptography.RSAEncryptionPadding"></see> object.</summary>\r
451       <param name="other">The object to compare.</param>\r
452       <returns>true if <paramref name="other">other</paramref> is equal to the current instance; otherwise, false.</returns>\r
453     </member>\r
454     <member name="M:System.Security.Cryptography.RSAEncryptionPadding.GetHashCode">\r
455       <summary>Returns the hash code of this <see cref="T:System.Security.Cryptography.RSAEncryptionPadding"></see> object.</summary>\r
456       <returns>The hash code of this instance.</returns>\r
457     </member>\r
458     <member name="P:System.Security.Cryptography.RSAEncryptionPadding.Mode">\r
459       <summary>Gets the padding mode represented by this <see cref="T:System.Security.Cryptography.RSAEncryptionPadding"></see> instance.</summary>\r
460       <returns>A padding mode.</returns>\r
461     </member>\r
462     <member name="P:System.Security.Cryptography.RSAEncryptionPadding.OaepHashAlgorithm">\r
463       <summary>Gets the hash algorithm used in conjunction with the <see cref="F:System.Security.Cryptography.RSAEncryptionPaddingMode.Oaep"></see> padding mode. If the value of the <see cref="P:System.Security.Cryptography.RSAEncryptionPadding.Mode"></see> property is not <see cref="F:System.Security.Cryptography.RSAEncryptionPaddingMode.Oaep"></see>, <see cref="P:System.Security.Cryptography.HashAlgorithmName.Name"></see> is null.</summary>\r
464       <returns>The hash algorithm.</returns>\r
465     </member>\r
466     <member name="P:System.Security.Cryptography.RSAEncryptionPadding.OaepSHA1">\r
467       <summary>Gets an object that represents the Optimal Asymmetric Encryption Padding (OAEP) encryption standard with a SHA1 hash algorithm.</summary>\r
468       <returns>An object that represents the OAEP encryption standard with a SHA1 hash algorithm.</returns>\r
469     </member>\r
470     <member name="P:System.Security.Cryptography.RSAEncryptionPadding.OaepSHA256">\r
471       <summary>Gets an object that represents the Optimal Asymmetric Encryption Padding (OAEP) encryption standard with a SHA256 hash algorithm.</summary>\r
472       <returns>An object that represents the OAEP encryption standard with a SHA256 hash algorithm.</returns>\r
473     </member>\r
474     <member name="P:System.Security.Cryptography.RSAEncryptionPadding.OaepSHA384">\r
475       <summary>Gets an object that represents the Optimal Asymmetric Encryption Padding (OAEP) encryption standard with a SHA-384 hash algorithm.</summary>\r
476       <returns>An object that represents the OAEP encryption standard with a SHA384 hash algorithm.</returns>\r
477     </member>\r
478     <member name="P:System.Security.Cryptography.RSAEncryptionPadding.OaepSHA512">\r
479       <summary>Gets an object that represents the Optimal Asymmetric Encryption Padding (OAEP) encryption standard with a SHA512 hash algorithm.</summary>\r
480       <returns>An object that represents the OAEP encryption standard with a SHA512 hash algorithm.</returns>\r
481     </member>\r
482     <member name="M:System.Security.Cryptography.RSAEncryptionPadding.op_Equality(System.Security.Cryptography.RSAEncryptionPadding,System.Security.Cryptography.RSAEncryptionPadding)">\r
483       <summary>Indicates whether two specified <see cref="T:System.Security.Cryptography.RSAEncryptionPadding"></see> objects are equal.</summary>\r
484       <param name="left">The first object to compare.</param>\r
485       <param name="right">The second object to compare.</param>\r
486       <returns>true if left and right are equal; otherwise, false.</returns>\r
487     </member>\r
488     <member name="M:System.Security.Cryptography.RSAEncryptionPadding.op_Inequality(System.Security.Cryptography.RSAEncryptionPadding,System.Security.Cryptography.RSAEncryptionPadding)">\r
489       <summary>Indicates whether two specified <see cref="T:System.Security.Cryptography.RSAEncryptionPadding"></see> objects are unequal.</summary>\r
490       <param name="left">The first object to compare.</param>\r
491       <param name="right">The second object to compare.</param>\r
492       <returns>true if left and right are not equal; otherwise, false.</returns>\r
493     </member>\r
494     <member name="P:System.Security.Cryptography.RSAEncryptionPadding.Pkcs1">\r
495       <summary>Gets an object that represents the PKCS #1 encryption standard.</summary>\r
496       <returns>An object that represents the PKCS #1 encryption standard.</returns>\r
497     </member>\r
498     <member name="M:System.Security.Cryptography.RSAEncryptionPadding.ToString">\r
499       <summary>Returns the string representation of the current <see cref="T:System.Security.Cryptography.RSAEncryptionPadding"></see> instance.</summary>\r
500       <returns>The string representation of the current object.</returns>\r
501     </member>\r
502     <member name="T:System.Security.Cryptography.RSAEncryptionPaddingMode">\r
503       <summary>Specifies the padding mode to use with RSA encryption or decryption operations.</summary>\r
504     </member>\r
505     <member name="F:System.Security.Cryptography.RSAEncryptionPaddingMode.Oaep">\r
506       <summary>Optimal Asymmetric Encryption Padding.</summary>\r
507       <returns></returns>\r
508     </member>\r
509     <member name="F:System.Security.Cryptography.RSAEncryptionPaddingMode.Pkcs1">\r
510       <summary>PKCS #1 v1.5.</summary>\r
511       <returns></returns>\r
512     </member>\r
513     <member name="T:System.Security.Cryptography.RSAOAEPKeyExchangeDeformatter">\r
514       <summary>Decrypts Optimal Asymmetric Encryption Padding (OAEP) key exchange data.</summary>\r
515     </member>\r
516     <member name="M:System.Security.Cryptography.RSAOAEPKeyExchangeDeformatter.#ctor">\r
517       <summary>Initializes a new instance of the <see cref="T:System.Security.Cryptography.RSAOAEPKeyExchangeDeformatter"></see> class.</summary>\r
518     </member>\r
519     <member name="M:System.Security.Cryptography.RSAOAEPKeyExchangeDeformatter.#ctor(System.Security.Cryptography.AsymmetricAlgorithm)">\r
520       <summary>Initializes a new instance of the <see cref="T:System.Security.Cryptography.RSAOAEPKeyExchangeDeformatter"></see> class with the specified key.</summary>\r
521       <param name="key">The instance of the <see cref="T:System.Security.Cryptography.RSA"></see> algorithm that holds the private key.</param>\r
522       <exception cref="T:System.ArgumentNullException"><paramref name="key">key</paramref> is null.</exception>\r
523     </member>\r
524     <member name="M:System.Security.Cryptography.RSAOAEPKeyExchangeDeformatter.DecryptKeyExchange(System.Byte[])">\r
525       <summary>Extracts secret information from the encrypted key exchange data.</summary>\r
526       <param name="rgbData">The key exchange data within which the secret information is hidden.</param>\r
527       <returns>The secret information derived from the key exchange data.</returns>\r
528       <exception cref="T:System.Security.Cryptography.CryptographicException">The key exchange data verification has failed.</exception>\r
529       <exception cref="T:System.Security.Cryptography.CryptographicUnexpectedOperationException">The key is missing.</exception>\r
530     </member>\r
531     <member name="P:System.Security.Cryptography.RSAOAEPKeyExchangeDeformatter.Parameters">\r
532       <summary>Gets the parameters for the Optimal Asymmetric Encryption Padding (OAEP) key exchange.</summary>\r
533       <returns>An XML string containing the parameters of the OAEP key exchange operation.</returns>\r
534     </member>\r
535     <member name="M:System.Security.Cryptography.RSAOAEPKeyExchangeDeformatter.SetKey(System.Security.Cryptography.AsymmetricAlgorithm)">\r
536       <summary>Sets the private key to use for decrypting the secret information.</summary>\r
537       <param name="key">The instance of the <see cref="T:System.Security.Cryptography.RSA"></see> algorithm that holds the private key.</param>\r
538       <exception cref="T:System.ArgumentNullException"><paramref name="key">key</paramref> is null.</exception>\r
539     </member>\r
540     <member name="T:System.Security.Cryptography.RSAOAEPKeyExchangeFormatter">\r
541       <summary>Creates Optimal Asymmetric Encryption Padding (OAEP) key exchange data using <see cref="T:System.Security.Cryptography.RSA"></see>.</summary>\r
542     </member>\r
543     <member name="M:System.Security.Cryptography.RSAOAEPKeyExchangeFormatter.#ctor">\r
544       <summary>Initializes a new instance of the <see cref="T:System.Security.Cryptography.RSAOAEPKeyExchangeFormatter"></see> class.</summary>\r
545     </member>\r
546     <member name="M:System.Security.Cryptography.RSAOAEPKeyExchangeFormatter.#ctor(System.Security.Cryptography.AsymmetricAlgorithm)">\r
547       <summary>Initializes a new instance of the <see cref="T:System.Security.Cryptography.RSAOAEPKeyExchangeFormatter"></see> class with the specified key.</summary>\r
548       <param name="key">The instance of the <see cref="T:System.Security.Cryptography.RSA"></see> algorithm that holds the public key.</param>\r
549       <exception cref="T:System.ArgumentNullException"><paramref name="key">key</paramref> is null.</exception>\r
550     </member>\r
551     <member name="M:System.Security.Cryptography.RSAOAEPKeyExchangeFormatter.CreateKeyExchange(System.Byte[])">\r
552       <summary>Creates the encrypted key exchange data from the specified input data.</summary>\r
553       <param name="rgbData">The secret information to be passed in the key exchange.</param>\r
554       <returns>The encrypted key exchange data to be sent to the intended recipient.</returns>\r
555       <exception cref="T:System.Security.Cryptography.CryptographicUnexpectedOperationException">The key is missing.</exception>\r
556     </member>\r
557     <member name="M:System.Security.Cryptography.RSAOAEPKeyExchangeFormatter.CreateKeyExchange(System.Byte[],System.Type)">\r
558       <summary>Creates the encrypted key exchange data from the specified input data.</summary>\r
559       <param name="rgbData">The secret information to be passed in the key exchange.</param>\r
560       <param name="symAlgType">This parameter is not used in the current version.</param>\r
561       <returns>The encrypted key exchange data to be sent to the intended recipient.</returns>\r
562     </member>\r
563     <member name="P:System.Security.Cryptography.RSAOAEPKeyExchangeFormatter.Parameter">\r
564       <summary>Gets or sets the parameter used to create padding in the key exchange creation process.</summary>\r
565       <returns>The parameter value.</returns>\r
566     </member>\r
567     <member name="P:System.Security.Cryptography.RSAOAEPKeyExchangeFormatter.Parameters">\r
568       <summary>Gets the parameters for the Optimal Asymmetric Encryption Padding (OAEP) key exchange.</summary>\r
569       <returns>An XML string containing the parameters of the OAEP key exchange operation.</returns>\r
570     </member>\r
571     <member name="P:System.Security.Cryptography.RSAOAEPKeyExchangeFormatter.Rng">\r
572       <summary>Gets or sets the random number generator algorithm to use in the creation of the key exchange.</summary>\r
573       <returns>The instance of a random number generator algorithm to use.</returns>\r
574     </member>\r
575     <member name="M:System.Security.Cryptography.RSAOAEPKeyExchangeFormatter.SetKey(System.Security.Cryptography.AsymmetricAlgorithm)">\r
576       <summary>Sets the public key to use for encrypting the key exchange data.</summary>\r
577       <param name="key">The instance of the <see cref="T:System.Security.Cryptography.RSA"></see> algorithm that holds the public key.</param>\r
578       <exception cref="T:System.ArgumentNullException"><paramref name="key">key</paramref> is null.</exception>\r
579     </member>\r
580     <member name="T:System.Security.Cryptography.RSAParameters">\r
581       <summary>Represents the standard parameters for the <see cref="T:System.Security.Cryptography.RSA"></see> algorithm.</summary>\r
582     </member>\r
583     <member name="F:System.Security.Cryptography.RSAParameters.D">\r
584       <summary>Represents the D parameter for the <see cref="T:System.Security.Cryptography.RSA"></see> algorithm.</summary>\r
585       <returns></returns>\r
586     </member>\r
587     <member name="F:System.Security.Cryptography.RSAParameters.DP">\r
588       <summary>Represents the DP parameter for the <see cref="T:System.Security.Cryptography.RSA"></see> algorithm.</summary>\r
589       <returns></returns>\r
590     </member>\r
591     <member name="F:System.Security.Cryptography.RSAParameters.DQ">\r
592       <summary>Represents the DQ parameter for the <see cref="T:System.Security.Cryptography.RSA"></see> algorithm.</summary>\r
593       <returns></returns>\r
594     </member>\r
595     <member name="F:System.Security.Cryptography.RSAParameters.Exponent">\r
596       <summary>Represents the Exponent parameter for the <see cref="T:System.Security.Cryptography.RSA"></see> algorithm.</summary>\r
597       <returns></returns>\r
598     </member>\r
599     <member name="F:System.Security.Cryptography.RSAParameters.InverseQ">\r
600       <summary>Represents the InverseQ parameter for the <see cref="T:System.Security.Cryptography.RSA"></see> algorithm.</summary>\r
601       <returns></returns>\r
602     </member>\r
603     <member name="F:System.Security.Cryptography.RSAParameters.Modulus">\r
604       <summary>Represents the Modulus parameter for the <see cref="T:System.Security.Cryptography.RSA"></see> algorithm.</summary>\r
605       <returns></returns>\r
606     </member>\r
607     <member name="F:System.Security.Cryptography.RSAParameters.P">\r
608       <summary>Represents the P parameter for the <see cref="T:System.Security.Cryptography.RSA"></see> algorithm.</summary>\r
609       <returns></returns>\r
610     </member>\r
611     <member name="F:System.Security.Cryptography.RSAParameters.Q">\r
612       <summary>Represents the Q parameter for the <see cref="T:System.Security.Cryptography.RSA"></see> algorithm.</summary>\r
613       <returns></returns>\r
614     </member>\r
615     <member name="T:System.Security.Cryptography.RSAPKCS1KeyExchangeDeformatter">\r
616       <summary>Decrypts the PKCS #1 key exchange data.</summary>\r
617     </member>\r
618     <member name="M:System.Security.Cryptography.RSAPKCS1KeyExchangeDeformatter.#ctor">\r
619       <summary>Initializes a new instance of the <see cref="T:System.Security.Cryptography.RSAPKCS1KeyExchangeDeformatter"></see> class.</summary>\r
620     </member>\r
621     <member name="M:System.Security.Cryptography.RSAPKCS1KeyExchangeDeformatter.#ctor(System.Security.Cryptography.AsymmetricAlgorithm)">\r
622       <summary>Initializes a new instance of the <see cref="T:System.Security.Cryptography.RSAPKCS1KeyExchangeDeformatter"></see> class with the specified key.</summary>\r
623       <param name="key">The instance of the <see cref="T:System.Security.Cryptography.RSA"></see> algorithm that holds the private key.</param>\r
624       <exception cref="T:System.ArgumentNullException"><paramref name="key">key</paramref> is null.</exception>\r
625     </member>\r
626     <member name="M:System.Security.Cryptography.RSAPKCS1KeyExchangeDeformatter.DecryptKeyExchange(System.Byte[])">\r
627       <summary>Extracts secret information from the encrypted key exchange data.</summary>\r
628       <param name="rgbIn">The key exchange data within which the secret information is hidden.</param>\r
629       <returns>The secret information derived from the key exchange data.</returns>\r
630       <exception cref="T:System.Security.Cryptography.CryptographicUnexpectedOperationException">The key is missing.</exception>\r
631     </member>\r
632     <member name="P:System.Security.Cryptography.RSAPKCS1KeyExchangeDeformatter.Parameters">\r
633       <summary>Gets the parameters for the PKCS #1 key exchange.</summary>\r
634       <returns>An XML string containing the parameters of the PKCS #1 key exchange operation.</returns>\r
635     </member>\r
636     <member name="P:System.Security.Cryptography.RSAPKCS1KeyExchangeDeformatter.RNG">\r
637       <summary>Gets or sets the random number generator algorithm to use in the creation of the key exchange.</summary>\r
638       <returns>The instance of a random number generator algorithm to use.</returns>\r
639     </member>\r
640     <member name="M:System.Security.Cryptography.RSAPKCS1KeyExchangeDeformatter.SetKey(System.Security.Cryptography.AsymmetricAlgorithm)">\r
641       <summary>Sets the private key to use for decrypting the secret information.</summary>\r
642       <param name="key">The instance of the <see cref="T:System.Security.Cryptography.RSA"></see> algorithm that holds the private key.</param>\r
643       <exception cref="T:System.ArgumentNullException"><paramref name="key">key</paramref> is null.</exception>\r
644     </member>\r
645     <member name="T:System.Security.Cryptography.RSAPKCS1KeyExchangeFormatter">\r
646       <summary>Creates the PKCS#1 key exchange data using <see cref="T:System.Security.Cryptography.RSA"></see>.</summary>\r
647     </member>\r
648     <member name="M:System.Security.Cryptography.RSAPKCS1KeyExchangeFormatter.#ctor">\r
649       <summary>Initializes a new instance of the <see cref="T:System.Security.Cryptography.RSAPKCS1KeyExchangeFormatter"></see> class.</summary>\r
650     </member>\r
651     <member name="M:System.Security.Cryptography.RSAPKCS1KeyExchangeFormatter.#ctor(System.Security.Cryptography.AsymmetricAlgorithm)">\r
652       <summary>Initializes a new instance of the <see cref="T:System.Security.Cryptography.RSAPKCS1KeyExchangeFormatter"></see> class with the specified key.</summary>\r
653       <param name="key">The instance of the <see cref="T:System.Security.Cryptography.RSA"></see> algorithm that holds the public key.</param>\r
654       <exception cref="T:System.ArgumentNullException"><paramref name="key">key</paramref> is null.</exception>\r
655     </member>\r
656     <member name="M:System.Security.Cryptography.RSAPKCS1KeyExchangeFormatter.CreateKeyExchange(System.Byte[])">\r
657       <summary>Creates the encrypted key exchange data from the specified input data.</summary>\r
658       <param name="rgbData">The secret information to be passed in the key exchange.</param>\r
659       <returns>The encrypted key exchange data to be sent to the intended recipient.</returns>\r
660       <exception cref="T:System.Security.Cryptography.CryptographicException"><paramref name="rgbData">rgbData</paramref> is too big.</exception>\r
661       <exception cref="T:System.Security.Cryptography.CryptographicUnexpectedOperationException">The key is null.</exception>\r
662     </member>\r
663     <member name="M:System.Security.Cryptography.RSAPKCS1KeyExchangeFormatter.CreateKeyExchange(System.Byte[],System.Type)">\r
664       <summary>Creates the encrypted key exchange data from the specified input data.</summary>\r
665       <param name="rgbData">The secret information to be passed in the key exchange.</param>\r
666       <param name="symAlgType">This parameter is not used in the current version.</param>\r
667       <returns>The encrypted key exchange data to be sent to the intended recipient.</returns>\r
668     </member>\r
669     <member name="P:System.Security.Cryptography.RSAPKCS1KeyExchangeFormatter.Parameters">\r
670       <summary>Gets the parameters for the PKCS #1 key exchange.</summary>\r
671       <returns>An XML string containing the parameters of the PKCS #1 key exchange operation.</returns>\r
672     </member>\r
673     <member name="P:System.Security.Cryptography.RSAPKCS1KeyExchangeFormatter.Rng">\r
674       <summary>Gets or sets the random number generator algorithm to use in the creation of the key exchange.</summary>\r
675       <returns>The instance of a random number generator algorithm to use.</returns>\r
676     </member>\r
677     <member name="M:System.Security.Cryptography.RSAPKCS1KeyExchangeFormatter.SetKey(System.Security.Cryptography.AsymmetricAlgorithm)">\r
678       <summary>Sets the public key to use for encrypting the key exchange data.</summary>\r
679       <param name="key">The instance of the <see cref="T:System.Security.Cryptography.RSA"></see> algorithm that holds the public key.</param>\r
680       <exception cref="T:System.ArgumentNullException"><paramref name="key">key</paramref> is null.</exception>\r
681     </member>\r
682     <member name="T:System.Security.Cryptography.RSAPKCS1SignatureDeformatter">\r
683       <summary>Verifies an <see cref="T:System.Security.Cryptography.RSA"></see> PKCS #1 version 1.5 signature.</summary>\r
684     </member>\r
685     <member name="M:System.Security.Cryptography.RSAPKCS1SignatureDeformatter.#ctor">\r
686       <summary>Initializes a new instance of the <see cref="T:System.Security.Cryptography.RSAPKCS1SignatureDeformatter"></see> class.</summary>\r
687     </member>\r
688     <member name="M:System.Security.Cryptography.RSAPKCS1SignatureDeformatter.#ctor(System.Security.Cryptography.AsymmetricAlgorithm)">\r
689       <summary>Initializes a new instance of the <see cref="T:System.Security.Cryptography.RSAPKCS1SignatureDeformatter"></see> class with the specified key.</summary>\r
690       <param name="key">The instance of <see cref="T:System.Security.Cryptography.RSA"></see> that holds the public key.</param>\r
691       <exception cref="T:System.ArgumentNullException"><paramref name="key">key</paramref> is null.</exception>\r
692     </member>\r
693     <member name="M:System.Security.Cryptography.RSAPKCS1SignatureDeformatter.SetHashAlgorithm(System.String)">\r
694       <summary>Sets the hash algorithm to use for verifying the signature.</summary>\r
695       <param name="strName">The name of the hash algorithm to use for verifying the signature.</param>\r
696     </member>\r
697     <member name="M:System.Security.Cryptography.RSAPKCS1SignatureDeformatter.SetKey(System.Security.Cryptography.AsymmetricAlgorithm)">\r
698       <summary>Sets the public key to use for verifying the signature.</summary>\r
699       <param name="key">The instance of <see cref="T:System.Security.Cryptography.RSA"></see> that holds the public key.</param>\r
700       <exception cref="T:System.ArgumentNullException"><paramref name="key">key</paramref> is null.</exception>\r
701     </member>\r
702     <member name="M:System.Security.Cryptography.RSAPKCS1SignatureDeformatter.VerifySignature(System.Byte[],System.Byte[])">\r
703       <summary>Verifies the <see cref="T:System.Security.Cryptography.RSA"></see> PKCS#1 signature for the specified data.</summary>\r
704       <param name="rgbHash">The data signed with rgbSignature.</param>\r
705       <param name="rgbSignature">The signature to be verified for rgbHash.</param>\r
706       <returns>true if <paramref name="rgbSignature">rgbSignature</paramref> matches the signature computed using the specified hash algorithm and key on <paramref name="rgbHash">rgbHash</paramref>; otherwise, false.</returns>\r
707       <exception cref="T:System.Security.Cryptography.CryptographicUnexpectedOperationException">The key is null.   -or-   The hash algorithm is null.</exception>\r
708       <exception cref="T:System.ArgumentNullException">The <paramref name="rgbHash">rgbHash</paramref> parameter is null.   -or-   The <paramref name="rgbSignature">rgbSignature</paramref> parameter is null.</exception>\r
709     </member>\r
710     <member name="T:System.Security.Cryptography.RSAPKCS1SignatureFormatter">\r
711       <summary>Creates an <see cref="T:System.Security.Cryptography.RSA"></see> PKCS #1 version 1.5 signature.</summary>\r
712     </member>\r
713     <member name="M:System.Security.Cryptography.RSAPKCS1SignatureFormatter.#ctor">\r
714       <summary>Initializes a new instance of the <see cref="T:System.Security.Cryptography.RSAPKCS1SignatureFormatter"></see> class.</summary>\r
715     </member>\r
716     <member name="M:System.Security.Cryptography.RSAPKCS1SignatureFormatter.#ctor(System.Security.Cryptography.AsymmetricAlgorithm)">\r
717       <summary>Initializes a new instance of the <see cref="T:System.Security.Cryptography.RSAPKCS1SignatureFormatter"></see> class with the specified key.</summary>\r
718       <param name="key">The instance of the <see cref="T:System.Security.Cryptography.RSA"></see> algorithm that holds the private key.</param>\r
719       <exception cref="T:System.ArgumentNullException"><paramref name="key">key</paramref> is null.</exception>\r
720     </member>\r
721     <member name="M:System.Security.Cryptography.RSAPKCS1SignatureFormatter.CreateSignature(System.Byte[])">\r
722       <summary>Creates the <see cref="T:System.Security.Cryptography.RSA"></see> PKCS #1 signature for the specified data.</summary>\r
723       <param name="rgbHash">The data to be signed.</param>\r
724       <returns>The digital signature for <paramref name="rgbHash">rgbHash</paramref>.</returns>\r
725       <exception cref="T:System.Security.Cryptography.CryptographicUnexpectedOperationException">The key is null.   -or-   The hash algorithm is null.</exception>\r
726       <exception cref="T:System.ArgumentNullException">The <paramref name="rgbHash">rgbHash</paramref> parameter is null.</exception>\r
727     </member>\r
728     <member name="M:System.Security.Cryptography.RSAPKCS1SignatureFormatter.SetHashAlgorithm(System.String)">\r
729       <summary>Sets the hash algorithm to use for creating the signature.</summary>\r
730       <param name="strName">The name of the hash algorithm to use for creating the signature.</param>\r
731     </member>\r
732     <member name="M:System.Security.Cryptography.RSAPKCS1SignatureFormatter.SetKey(System.Security.Cryptography.AsymmetricAlgorithm)">\r
733       <summary>Sets the private key to use for creating the signature.</summary>\r
734       <param name="key">The instance of the <see cref="T:System.Security.Cryptography.RSA"></see> algorithm that holds the private key.</param>\r
735       <exception cref="T:System.ArgumentNullException"><paramref name="key">key</paramref> is null.</exception>\r
736     </member>\r
737     <member name="T:System.Security.Cryptography.RSASignaturePadding">\r
738       <summary>Specifies the padding mode and parameters to use with RSA signature creation or verification operations.</summary>\r
739     </member>\r
740     <member name="M:System.Security.Cryptography.RSASignaturePadding.Equals(System.Object)">\r
741       <summary>Returns a value that indicates whether this instance is equal to a specified object.</summary>\r
742       <param name="obj">The object to compare with the current instance.</param>\r
743       <returns>true if the specified object is equal to the current object; otherwise, false.</returns>\r
744     </member>\r
745     <member name="M:System.Security.Cryptography.RSASignaturePadding.Equals(System.Security.Cryptography.RSASignaturePadding)">\r
746       <summary>Returns a value that indicates whether this instance is equal to a specified <see cref="T:System.Security.Cryptography.RSASignaturePadding"></see> object.</summary>\r
747       <param name="other">The object to compare with the current instance.</param>\r
748       <returns>true if the specified object is equal to the current object; otherwise, false.</returns>\r
749     </member>\r
750     <member name="M:System.Security.Cryptography.RSASignaturePadding.GetHashCode">\r
751       <summary>Returns the hash code for this <see cref="T:System.Security.Cryptography.RSASignaturePadding"></see> instance.</summary>\r
752       <returns>The hash code for this <see cref="T:System.Security.Cryptography.RSASignaturePadding"></see> instance.</returns>\r
753     </member>\r
754     <member name="P:System.Security.Cryptography.RSASignaturePadding.Mode">\r
755       <summary>Gets the padding mode of this <see cref="T:System.Security.Cryptography.RSASignaturePadding"></see> instance.</summary>\r
756       <returns>The padding mode (either <see cref="F:System.Security.Cryptography.RSASignaturePaddingMode.Pkcs1"></see> or <see cref="F:System.Security.Cryptography.RSASignaturePaddingMode.Pss"></see>) of this instance.</returns>\r
757     </member>\r
758     <member name="M:System.Security.Cryptography.RSASignaturePadding.op_Equality(System.Security.Cryptography.RSASignaturePadding,System.Security.Cryptography.RSASignaturePadding)">\r
759       <summary>Indicates whether two specified <see cref="T:System.Security.Cryptography.RSASignaturePadding"></see> objects are equal.</summary>\r
760       <param name="left">The first object to compare.</param>\r
761       <param name="right">The second object to compare.</param>\r
762       <returns>true if left and right are equal; otherwise, false.</returns>\r
763     </member>\r
764     <member name="M:System.Security.Cryptography.RSASignaturePadding.op_Inequality(System.Security.Cryptography.RSASignaturePadding,System.Security.Cryptography.RSASignaturePadding)">\r
765       <summary>Indicates whether two specified <see cref="T:System.Security.Cryptography.RSASignaturePadding"></see> objects are unequal.</summary>\r
766       <param name="left">The first object to compare.</param>\r
767       <param name="right">The second object to compare.</param>\r
768       <returns>true if left and right are unequal; otherwise, false.</returns>\r
769     </member>\r
770     <member name="P:System.Security.Cryptography.RSASignaturePadding.Pkcs1">\r
771       <summary>Gets an object that uses the PKCS #1 v1.5 padding mode.</summary>\r
772       <returns>An object that uses the <see cref="F:System.Security.Cryptography.RSASignaturePaddingMode.Pkcs1"></see> padding mode.</returns>\r
773     </member>\r
774     <member name="P:System.Security.Cryptography.RSASignaturePadding.Pss">\r
775       <summary>Gets an object that uses PSS padding mode.</summary>\r
776       <returns>An object that uses the <see cref="F:System.Security.Cryptography.RSASignaturePaddingMode.Pss"></see> padding mode with the number of salt bytes equal to the size of the hash.</returns>\r
777     </member>\r
778     <member name="M:System.Security.Cryptography.RSASignaturePadding.ToString">\r
779       <summary>Returns the string representation of the current <see cref="T:System.Security.Cryptography.RSASignaturePadding"></see> instance.</summary>\r
780       <returns>The string representation of the current object.</returns>\r
781     </member>\r
782     <member name="T:System.Security.Cryptography.RSASignaturePaddingMode">\r
783       <summary>Specifies the padding mode to use with RSA signature creation or verification operations.</summary>\r
784     </member>\r
785     <member name="F:System.Security.Cryptography.RSASignaturePaddingMode.Pkcs1">\r
786       <summary>PKCS #1 v1.5</summary>\r
787       <returns></returns>\r
788     </member>\r
789     <member name="F:System.Security.Cryptography.RSASignaturePaddingMode.Pss">\r
790       <summary>Probabilistic Signature Scheme</summary>\r
791       <returns></returns>\r
792     </member>\r
793     <member name="T:System.Security.Cryptography.SHA1">\r
794       <summary>Computes the <see cref="T:System.Security.Cryptography.SHA1"></see> hash for the input data.</summary>\r
795     </member>\r
796     <member name="M:System.Security.Cryptography.SHA1.#ctor">\r
797       <summary>Initializes a new instance of <see cref="T:System.Security.Cryptography.SHA1"></see>.</summary>\r
798       <exception cref="T:System.InvalidOperationException">The policy on this object is not compliant with the FIPS algorithm.</exception>\r
799     </member>\r
800     <member name="M:System.Security.Cryptography.SHA1.Create">\r
801       <summary>Creates an instance of the default implementation of <see cref="T:System.Security.Cryptography.SHA1"></see>.</summary>\r
802       <returns>A new instance of <see cref="T:System.Security.Cryptography.SHA1"></see>.</returns>\r
803     </member>\r
804     <member name="M:System.Security.Cryptography.SHA1.Create(System.String)">\r
805       <summary>Creates an instance of the specified implementation of <see cref="T:System.Security.Cryptography.SHA1"></see>.</summary>\r
806       <param name="hashName">The name of the specific implementation of <see cref="T:System.Security.Cryptography.SHA1"></see> to be used.</param>\r
807       <returns>A new instance of <see cref="T:System.Security.Cryptography.SHA1"></see> using the specified implementation.</returns>\r
808     </member>\r
809     <member name="T:System.Security.Cryptography.SHA1Managed">\r
810       <summary>Computes the <see cref="T:System.Security.Cryptography.SHA1"></see> hash for the input data using the managed library.</summary>\r
811     </member>\r
812     <member name="M:System.Security.Cryptography.SHA1Managed.#ctor">\r
813       <summary>Initializes a new instance of the <see cref="T:System.Security.Cryptography.SHA1Managed"></see> class.</summary>\r
814       <exception cref="T:System.InvalidOperationException">This class is not compliant with the FIPS algorithm.</exception>\r
815     </member>\r
816     <member name="M:System.Security.Cryptography.SHA1Managed.Dispose(System.Boolean)">\r
817       <param name="disposing"></param>\r
818     </member>\r
819     <member name="M:System.Security.Cryptography.SHA1Managed.HashCore(System.Byte[],System.Int32,System.Int32)">\r
820       <summary>Routes data written to the object into the <see cref="T:System.Security.Cryptography.SHA1Managed"></see> hash algorithm for computing the hash.</summary>\r
821       <param name="rgb">The input data.</param>\r
822       <param name="ibStart">The offset into the byte array from which to begin using data.</param>\r
823       <param name="cbSize">The number of bytes in the array to use as data.</param>\r
824     </member>\r
825     <member name="M:System.Security.Cryptography.SHA1Managed.HashFinal">\r
826       <summary>Returns the computed <see cref="T:System.Security.Cryptography.SHA1"></see> hash value after all data has been written to the object.</summary>\r
827       <returns>The computed hash code.</returns>\r
828     </member>\r
829     <member name="M:System.Security.Cryptography.SHA1Managed.Initialize">\r
830       <summary>Initializes an instance of <see cref="T:System.Security.Cryptography.SHA1Managed"></see>.</summary>\r
831     </member>\r
832     <member name="T:System.Security.Cryptography.SHA256">\r
833       <summary>Computes the <see cref="T:System.Security.Cryptography.SHA256"></see> hash for the input data.</summary>\r
834     </member>\r
835     <member name="M:System.Security.Cryptography.SHA256.#ctor">\r
836       <summary>Initializes a new instance of <see cref="T:System.Security.Cryptography.SHA256"></see>.</summary>\r
837     </member>\r
838     <member name="M:System.Security.Cryptography.SHA256.Create">\r
839       <summary>Creates an instance of the default implementation of <see cref="T:System.Security.Cryptography.SHA256"></see>.</summary>\r
840       <returns>A new instance of <see cref="T:System.Security.Cryptography.SHA256"></see>.</returns>\r
841       <exception cref="T:System.Reflection.TargetInvocationException">The algorithm was used with Federal Information Processing Standards (FIPS) mode enabled, but is not FIPS compatible.</exception>\r
842     </member>\r
843     <member name="M:System.Security.Cryptography.SHA256.Create(System.String)">\r
844       <summary>Creates an instance of a specified implementation of <see cref="T:System.Security.Cryptography.SHA256"></see>.</summary>\r
845       <param name="hashName">The name of the specific implementation of <see cref="T:System.Security.Cryptography.SHA256"></see> to be used.</param>\r
846       <returns>A new instance of <see cref="T:System.Security.Cryptography.SHA256"></see> using the specified implementation.</returns>\r
847       <exception cref="T:System.Reflection.TargetInvocationException">The algorithm described by the <paramref name="hashName">hashName</paramref> parameter was used with Federal Information Processing Standards (FIPS) mode enabled, but is not FIPS compatible.</exception>\r
848     </member>\r
849     <member name="T:System.Security.Cryptography.SHA256Managed">\r
850       <summary>Computes the <see cref="T:System.Security.Cryptography.SHA256"></see> hash for the input data using the managed library.</summary>\r
851     </member>\r
852     <member name="M:System.Security.Cryptography.SHA256Managed.#ctor">\r
853       <summary>Initializes a new instance of the <see cref="T:System.Security.Cryptography.SHA256Managed"></see> class using the managed library.</summary>\r
854       <exception cref="T:System.InvalidOperationException">The Federal Information Processing Standards (FIPS) security setting is enabled. This implementation is not part of the Windows Platform FIPS-validated cryptographic algorithms.</exception>\r
855     </member>\r
856     <member name="M:System.Security.Cryptography.SHA256Managed.Dispose(System.Boolean)">\r
857       <param name="disposing"></param>\r
858     </member>\r
859     <member name="M:System.Security.Cryptography.SHA256Managed.HashCore(System.Byte[],System.Int32,System.Int32)">\r
860       <summary>When overridden in a derived class, routes data written to the object into the <see cref="T:System.Security.Cryptography.SHA256"></see> hash algorithm for computing the hash.</summary>\r
861       <param name="rgb">The input data.</param>\r
862       <param name="ibStart">The offset into the byte array from which to begin using data.</param>\r
863       <param name="cbSize">The number of bytes in the array to use as data.</param>\r
864     </member>\r
865     <member name="M:System.Security.Cryptography.SHA256Managed.HashFinal">\r
866       <summary>When overridden in a derived class, finalizes the hash computation after the last data is processed by the cryptographic stream object.</summary>\r
867       <returns>The computed hash code.</returns>\r
868     </member>\r
869     <member name="M:System.Security.Cryptography.SHA256Managed.Initialize">\r
870       <summary>Initializes an instance of <see cref="T:System.Security.Cryptography.SHA256Managed"></see>.</summary>\r
871     </member>\r
872     <member name="T:System.Security.Cryptography.SHA384">\r
873       <summary>Computes the <see cref="T:System.Security.Cryptography.SHA384"></see> hash for the input data.</summary>\r
874     </member>\r
875     <member name="M:System.Security.Cryptography.SHA384.#ctor">\r
876       <summary>Initializes a new instance of <see cref="T:System.Security.Cryptography.SHA384"></see>.</summary>\r
877     </member>\r
878     <member name="M:System.Security.Cryptography.SHA384.Create">\r
879       <summary>Creates an instance of the default implementation of <see cref="T:System.Security.Cryptography.SHA384"></see>.</summary>\r
880       <returns>A new instance of <see cref="T:System.Security.Cryptography.SHA384"></see>.</returns>\r
881       <exception cref="T:System.Reflection.TargetInvocationException">The algorithm was used with Federal Information Processing Standards (FIPS) mode enabled, but is not FIPS compatible.</exception>\r
882     </member>\r
883     <member name="M:System.Security.Cryptography.SHA384.Create(System.String)">\r
884       <summary>Creates an instance of a specified implementation of <see cref="T:System.Security.Cryptography.SHA384"></see>.</summary>\r
885       <param name="hashName">The name of the specific implementation of <see cref="T:System.Security.Cryptography.SHA384"></see> to be used.</param>\r
886       <returns>A new instance of <see cref="T:System.Security.Cryptography.SHA384"></see> using the specified implementation.</returns>\r
887       <exception cref="T:System.Reflection.TargetInvocationException">The algorithm described by the <paramref name="hashName">hashName</paramref> parameter was used with Federal Information Processing Standards (FIPS) mode enabled, but is not FIPS compatible.</exception>\r
888     </member>\r
889     <member name="T:System.Security.Cryptography.SHA384Managed">\r
890       <summary>Computes the <see cref="T:System.Security.Cryptography.SHA384"></see> hash for the input data using the managed library.</summary>\r
891     </member>\r
892     <member name="M:System.Security.Cryptography.SHA384Managed.#ctor">\r
893       <summary>Initializes a new instance of the <see cref="T:System.Security.Cryptography.SHA384Managed"></see> class.</summary>\r
894       <exception cref="T:System.InvalidOperationException">The Federal Information Processing Standards (FIPS) security setting is enabled. This implementation is not part of the Windows Platform FIPS-validated cryptographic algorithms.</exception>\r
895     </member>\r
896     <member name="M:System.Security.Cryptography.SHA384Managed.Dispose(System.Boolean)">\r
897       <param name="disposing"></param>\r
898     </member>\r
899     <member name="M:System.Security.Cryptography.SHA384Managed.HashCore(System.Byte[],System.Int32,System.Int32)">\r
900       <summary>When overridden in a derived class, routes data written to the object into the <see cref="T:System.Security.Cryptography.SHA384Managed"></see> hash algorithm for computing the hash.</summary>\r
901       <param name="rgb">The input data.</param>\r
902       <param name="ibStart">The offset into the byte array from which to begin using data.</param>\r
903       <param name="cbSize">The number of bytes in the array to use as data.</param>\r
904     </member>\r
905     <member name="M:System.Security.Cryptography.SHA384Managed.HashFinal">\r
906       <summary>When overridden in a derived class, finalizes the hash computation after the last data is processed by the cryptographic stream object.</summary>\r
907       <returns>The computed hash code.</returns>\r
908     </member>\r
909     <member name="M:System.Security.Cryptography.SHA384Managed.Initialize">\r
910       <summary>Initializes an instance of <see cref="T:System.Security.Cryptography.SHA384Managed"></see>.</summary>\r
911     </member>\r
912     <member name="T:System.Security.Cryptography.SHA512">\r
913       <summary>Computes the <see cref="T:System.Security.Cryptography.SHA512"></see> hash for the input data.</summary>\r
914     </member>\r
915     <member name="M:System.Security.Cryptography.SHA512.#ctor">\r
916       <summary>Initializes a new instance of <see cref="T:System.Security.Cryptography.SHA512"></see>.</summary>\r
917     </member>\r
918     <member name="M:System.Security.Cryptography.SHA512.Create">\r
919       <summary>Creates an instance of the default implementation of <see cref="T:System.Security.Cryptography.SHA512"></see>.</summary>\r
920       <returns>A new instance of <see cref="T:System.Security.Cryptography.SHA512"></see>.</returns>\r
921       <exception cref="T:System.Reflection.TargetInvocationException">The algorithm was used with Federal Information Processing Standards (FIPS) mode enabled, but is not FIPS compatible.</exception>\r
922     </member>\r
923     <member name="M:System.Security.Cryptography.SHA512.Create(System.String)">\r
924       <summary>Creates an instance of a specified implementation of <see cref="T:System.Security.Cryptography.SHA512"></see>.</summary>\r
925       <param name="hashName">The name of the specific implementation of <see cref="T:System.Security.Cryptography.SHA512"></see> to be used.</param>\r
926       <returns>A new instance of <see cref="T:System.Security.Cryptography.SHA512"></see> using the specified implementation.</returns>\r
927       <exception cref="T:System.Reflection.TargetInvocationException">The algorithm described by the <paramref name="hashName">hashName</paramref> parameter was used with Federal Information Processing Standards (FIPS) mode enabled, but is not FIPS compatible.</exception>\r
928     </member>\r
929     <member name="T:System.Security.Cryptography.SHA512Managed">\r
930       <summary>Computes the <see cref="T:System.Security.Cryptography.SHA512"></see> hash algorithm for the input data using the managed library.</summary>\r
931     </member>\r
932     <member name="M:System.Security.Cryptography.SHA512Managed.#ctor">\r
933       <summary>Initializes a new instance of the <see cref="T:System.Security.Cryptography.SHA512Managed"></see> class.</summary>\r
934       <exception cref="T:System.InvalidOperationException">The Federal Information Processing Standards (FIPS) security setting is enabled. This implementation is not part of the Windows Platform FIPS-validated cryptographic algorithms.</exception>\r
935     </member>\r
936     <member name="M:System.Security.Cryptography.SHA512Managed.Dispose(System.Boolean)">\r
937       <param name="disposing"></param>\r
938     </member>\r
939     <member name="M:System.Security.Cryptography.SHA512Managed.HashCore(System.Byte[],System.Int32,System.Int32)">\r
940       <summary>When overridden in a derived class, routes data written to the object into the <see cref="T:System.Security.Cryptography.SHA512Managed"></see> hash algorithm for computing the hash.</summary>\r
941       <param name="rgb">The input data.</param>\r
942       <param name="ibStart">The offset into the byte array from which to begin using data.</param>\r
943       <param name="cbSize">The number of bytes in the array to use as data.</param>\r
944     </member>\r
945     <member name="M:System.Security.Cryptography.SHA512Managed.HashFinal">\r
946       <summary>When overridden in a derived class, finalizes the hash computation after the last data is processed by the cryptographic stream object.</summary>\r
947       <returns>The computed hash code.</returns>\r
948     </member>\r
949     <member name="M:System.Security.Cryptography.SHA512Managed.Initialize">\r
950       <summary>Initializes an instance of the <see cref="T:System.Security.Cryptography.SHA512Managed"></see> class using the managed library.</summary>\r
951     </member>\r
952     <member name="T:System.Security.Cryptography.SignatureDescription">\r
953       <summary>Contains information about the properties of a digital signature.</summary>\r
954     </member>\r
955     <member name="M:System.Security.Cryptography.SignatureDescription.#ctor">\r
956       <summary>Initializes a new instance of the <see cref="T:System.Security.Cryptography.SignatureDescription"></see> class.</summary>\r
957     </member>\r
958     <member name="M:System.Security.Cryptography.SignatureDescription.#ctor(System.Security.SecurityElement)">\r
959       <summary>Initializes a new instance of the <see cref="T:System.Security.Cryptography.SignatureDescription"></see> class from the specified <see cref="T:System.Security.SecurityElement"></see>.</summary>\r
960       <param name="el">The <see cref="T:System.Security.SecurityElement"></see> from which to get the algorithms for the signature description.</param>\r
961       <exception cref="T:System.ArgumentNullException">The <paramref name="el">el</paramref> parameter is null.</exception>\r
962     </member>\r
963     <member name="M:System.Security.Cryptography.SignatureDescription.CreateDeformatter(System.Security.Cryptography.AsymmetricAlgorithm)">\r
964       <summary>Creates an <see cref="T:System.Security.Cryptography.AsymmetricSignatureDeformatter"></see> instance with the specified key using the <see cref="P:System.Security.Cryptography.SignatureDescription.DeformatterAlgorithm"></see> property.</summary>\r
965       <param name="key">The key to use in the <see cref="T:System.Security.Cryptography.AsymmetricSignatureDeformatter"></see>.</param>\r
966       <returns>The newly created <see cref="T:System.Security.Cryptography.AsymmetricSignatureDeformatter"></see> instance.</returns>\r
967     </member>\r
968     <member name="M:System.Security.Cryptography.SignatureDescription.CreateDigest">\r
969       <summary>Creates a <see cref="T:System.Security.Cryptography.HashAlgorithm"></see> instance using the <see cref="P:System.Security.Cryptography.SignatureDescription.DigestAlgorithm"></see> property.</summary>\r
970       <returns>The newly created <see cref="T:System.Security.Cryptography.HashAlgorithm"></see> instance.</returns>\r
971     </member>\r
972     <member name="M:System.Security.Cryptography.SignatureDescription.CreateFormatter(System.Security.Cryptography.AsymmetricAlgorithm)">\r
973       <summary>Creates an <see cref="T:System.Security.Cryptography.AsymmetricSignatureFormatter"></see> instance with the specified key using the <see cref="P:System.Security.Cryptography.SignatureDescription.FormatterAlgorithm"></see> property.</summary>\r
974       <param name="key">The key to use in the <see cref="T:System.Security.Cryptography.AsymmetricSignatureFormatter"></see>.</param>\r
975       <returns>The newly created <see cref="T:System.Security.Cryptography.AsymmetricSignatureFormatter"></see> instance.</returns>\r
976     </member>\r
977     <member name="P:System.Security.Cryptography.SignatureDescription.DeformatterAlgorithm">\r
978       <summary>Gets or sets the deformatter algorithm for the signature description.</summary>\r
979       <returns>The deformatter algorithm for the signature description.</returns>\r
980     </member>\r
981     <member name="P:System.Security.Cryptography.SignatureDescription.DigestAlgorithm">\r
982       <summary>Gets or sets the digest algorithm for the signature description.</summary>\r
983       <returns>The digest algorithm for the signature description.</returns>\r
984     </member>\r
985     <member name="P:System.Security.Cryptography.SignatureDescription.FormatterAlgorithm">\r
986       <summary>Gets or sets the formatter algorithm for the signature description.</summary>\r
987       <returns>The formatter algorithm for the signature description.</returns>\r
988     </member>\r
989     <member name="P:System.Security.Cryptography.SignatureDescription.KeyAlgorithm">\r
990       <summary>Gets or sets the key algorithm for the signature description.</summary>\r
991       <returns>The key algorithm for the signature description.</returns>\r
992     </member>\r
993     <member name="T:System.Security.Cryptography.TripleDES">\r
994       <summary>Represents the base class for Triple Data Encryption Standard algorithms from which all <see cref="T:System.Security.Cryptography.TripleDES"></see> implementations must derive.</summary>\r
995     </member>\r
996     <member name="M:System.Security.Cryptography.TripleDES.#ctor">\r
997       <summary>Initializes a new instance of the <see cref="T:System.Security.Cryptography.TripleDES"></see> class.</summary>\r
998     </member>\r
999     <member name="M:System.Security.Cryptography.TripleDES.Create">\r
1000       <summary>Creates an instance of a cryptographic object to perform the <see cref="T:System.Security.Cryptography.TripleDES"></see> algorithm.</summary>\r
1001       <returns>An instance of a cryptographic object.</returns>\r
1002     </member>\r
1003     <member name="M:System.Security.Cryptography.TripleDES.Create(System.String)">\r
1004       <summary>Creates an instance of a cryptographic object to perform the specified implementation of the <see cref="T:System.Security.Cryptography.TripleDES"></see> algorithm.</summary>\r
1005       <param name="str">The name of the specific implementation of <see cref="T:System.Security.Cryptography.TripleDES"></see> to use.</param>\r
1006       <returns>An instance of a cryptographic object.</returns>\r
1007     </member>\r
1008     <member name="M:System.Security.Cryptography.TripleDES.IsWeakKey(System.Byte[])">\r
1009       <summary>Determines whether the specified key is weak.</summary>\r
1010       <param name="rgbKey">The secret key to test for weakness.</param>\r
1011       <returns>true if the key is weak; otherwise, false.</returns>\r
1012       <exception cref="T:System.Security.Cryptography.CryptographicException">The size of the <paramref name="rgbKey">rgbKey</paramref> parameter is not valid.</exception>\r
1013     </member>\r
1014     <member name="P:System.Security.Cryptography.TripleDES.Key">\r
1015       <summary>Gets or sets the secret key for the <see cref="T:System.Security.Cryptography.TripleDES"></see> algorithm.</summary>\r
1016       <returns>The secret key for the <see cref="T:System.Security.Cryptography.TripleDES"></see> algorithm.</returns>\r
1017       <exception cref="T:System.ArgumentNullException">An attempt was made to set the key to null.</exception>\r
1018       <exception cref="T:System.Security.Cryptography.CryptographicException">An attempt was made to set a key whose length is invalid.   -or-   An attempt was made to set a weak key (see <see cref="M:System.Security.Cryptography.TripleDES.IsWeakKey(System.Byte[])"></see>).</exception>\r
1019     </member>\r
1020     <member name="P:System.Security.Cryptography.TripleDES.LegalBlockSizes">\r
1021       <returns></returns>\r
1022     </member>\r
1023     <member name="P:System.Security.Cryptography.TripleDES.LegalKeySizes">\r
1024       <returns></returns>\r
1025     </member>\r
1026     <member name="T:System.Security.Cryptography.ECDiffieHellmanPublicKey">\r
1027       <summary>Provides an abstract base class from which all <see cref="T:System.Security.Cryptography.ECDiffieHellmanCngPublicKey"></see> implementations must inherit.</summary>\r
1028     </member>\r
1029     <member name="M:System.Security.Cryptography.ECDiffieHellmanPublicKey.#ctor(System.Byte[])">\r
1030       <summary>Initializes a new instance of the <see cref="T:System.Security.Cryptography.ECDiffieHellmanPublicKey"></see> class.</summary>\r
1031       <param name="keyBlob">A byte array that represents an <see cref="T:System.Security.Cryptography.ECDiffieHellmanPublicKey"></see> object.</param>\r
1032       <exception cref="T:System.ArgumentNullException"><paramref name="keyBlob">keyBlob</paramref> is null.</exception>\r
1033     </member>\r
1034     <member name="M:System.Security.Cryptography.ECDiffieHellmanPublicKey.Dispose">\r
1035       <summary>Releases all resources used by the current instance of the <see cref="T:System.Security.Cryptography.ECDiffieHellman"></see> class.</summary>\r
1036     </member>\r
1037     <member name="M:System.Security.Cryptography.ECDiffieHellmanPublicKey.Dispose(System.Boolean)">\r
1038       <summary>Releases the unmanaged resources used by the <see cref="T:System.Security.Cryptography.ECDiffieHellman"></see> class and optionally releases the managed resources.</summary>\r
1039       <param name="disposing">true to release both managed and unmanaged resources; false to release only unmanaged resources.</param>\r
1040     </member>\r
1041     <member name="M:System.Security.Cryptography.ECDiffieHellmanPublicKey.ToByteArray">\r
1042       <summary>Serializes the <see cref="T:System.Security.Cryptography.ECDiffieHellmanPublicKey"></see> key BLOB to a byte array.</summary>\r
1043       <returns>A byte array that contains the serialized Elliptic Curve Diffie-Hellman (ECDH) public key.</returns>\r
1044     </member>\r
1045     <member name="M:System.Security.Cryptography.ECDiffieHellmanPublicKey.ToXmlString">\r
1046       <summary>Serializes the <see cref="T:System.Security.Cryptography.ECDiffieHellmanPublicKey"></see> public key to an XML string.</summary>\r
1047       <returns>An XML string that contains the serialized Elliptic Curve Diffie-Hellman (ECDH) public key.</returns>\r
1048     </member>\r
1049     <member name="T:System.Security.Cryptography.ECDsa">\r
1050       <summary>Provides an abstract base class that encapsulates the Elliptic Curve Digital Signature Algorithm (ECDSA).</summary>\r
1051     </member>\r
1052     <member name="M:System.Security.Cryptography.ECDsa.#ctor">\r
1053       <summary>Initializes a new instance of the <see cref="T:System.Security.Cryptography.ECDsa"></see> class.</summary>\r
1054     </member>\r
1055     <member name="M:System.Security.Cryptography.ECDsa.Create">\r
1056       <summary>Creates a new instance of the default implementation of the Elliptic Curve Digital Signature Algorithm (ECDSA).</summary>\r
1057       <returns>A new instance of the default implementation (<see cref="T:System.Security.Cryptography.ECDsaCng"></see>) of this class.</returns>\r
1058     </member>\r
1059     <member name="M:System.Security.Cryptography.ECDsa.Create(System.Security.Cryptography.ECCurve)">\r
1060       <summary>Creates a new instance of the default implementation of the Elliptic Curve Digital Signature Algorithm (ECDSA) with a newly generated key over the specified curve.</summary>\r
1061       <param name="curve">The curve to use for key generation.</param>\r
1062       <returns>A new instance of the default implementation (<see cref="T:System.Security.Cryptography.ECDsaCng"></see>) of this class.</returns>\r
1063     </member>\r
1064     <member name="M:System.Security.Cryptography.ECDsa.Create(System.Security.Cryptography.ECParameters)">\r
1065       <summary>Creates a new instance of the default implementation of the Elliptic Curve Digital Signature Algorithm (ECDSA) using the specified parameters as the key.</summary>\r
1066       <param name="parameters">The parameters representing the key to use.</param>\r
1067       <returns>A new instance of the default implementation (<see cref="T:System.Security.Cryptography.ECDsaCng"></see>) of this class.</returns>\r
1068     </member>\r
1069     <member name="M:System.Security.Cryptography.ECDsa.Create(System.String)">\r
1070       <summary>Creates a new instance of the specified implementation of the Elliptic Curve Digital Signature Algorithm (ECDSA).</summary>\r
1071       <param name="algorithm">The name of an ECDSA implementation. The following strings all refer to the same implementation, which is the only implementation currently supported in the .NET Framework:   - &quot;ECDsa&quot;   - &quot;ECDsaCng&quot;   - &quot;System.Security.Cryptography.ECDsaCng&quot;   You can also provide the name of a custom ECDSA implementation.</param>\r
1072       <returns>A new instance of the specified implementation of this class. If the specified algorithm name does not map to an ECDSA implementation, this method returns null.</returns>\r
1073       <exception cref="T:System.ArgumentNullException">The <paramref name="algorithm">algorithm</paramref> parameter is null.</exception>\r
1074     </member>\r
1075     <member name="M:System.Security.Cryptography.ECDsa.ExportExplicitParameters(System.Boolean)">\r
1076       <summary>When overridden in a derived class, exports the explicit parameters for an elliptic curve.</summary>\r
1077       <param name="includePrivateParameters">true to include private parameters; otherwise, false.</param>\r
1078       <returns>The parameters representing the point on the curve for this key, using the explicit curve format.</returns>\r
1079       <exception cref="T:System.NotSupportedException">A derived class must override this method.</exception>\r
1080     </member>\r
1081     <member name="M:System.Security.Cryptography.ECDsa.ExportParameters(System.Boolean)">\r
1082       <summary>When overridden in a derived class, exports the named or explicit parameters for an elliptic curve. If the curve has a name, the <see cref="F:System.Security.Cryptography.ECParameters.Curve"></see> field contains named curve parameters, otherwise it         contains explicit parameters.</summary>\r
1083       <param name="includePrivateParameters">true to include private parameters; otherwise, false.</param>\r
1084       <returns>The parameters representing the point on the curve for this key.</returns>\r
1085       <exception cref="T:System.NotSupportedException">A derived class must override this method.</exception>\r
1086     </member>\r
1087     <member name="M:System.Security.Cryptography.ECDsa.FromXmlString(System.String)">\r
1088       <param name="xmlString"></param>\r
1089     </member>\r
1090     <member name="M:System.Security.Cryptography.ECDsa.GenerateKey(System.Security.Cryptography.ECCurve)">\r
1091       <summary>When overridden in a derived class, generates a new public/private key pair for the specified curve.</summary>\r
1092       <param name="curve">The curve to use.</param>\r
1093       <exception cref="T:System.NotSupportedException">A derived class must override this method.</exception>\r
1094     </member>\r
1095     <member name="M:System.Security.Cryptography.ECDsa.HashData(System.IO.Stream,System.Security.Cryptography.HashAlgorithmName)">\r
1096       <summary>When overridden in a derived class, computes the hash value of the specified binary stream by using the specified hashing algorithm.</summary>\r
1097       <param name="data">The binary stream to hash.</param>\r
1098       <param name="hashAlgorithm">The algorithm to use to hash the data.</param>\r
1099       <returns>The hashed data.</returns>\r
1100       <exception cref="T:System.NotImplementedException">A derived class must override this method.</exception>\r
1101     </member>\r
1102     <member name="M:System.Security.Cryptography.ECDsa.HashData(System.Byte[],System.Int32,System.Int32,System.Security.Cryptography.HashAlgorithmName)">\r
1103       <summary>When overridden in a derived class, computes the hash value of the specified portion of a byte array by using the specified hashing algorithm.</summary>\r
1104       <param name="data">The data to be hashed.</param>\r
1105       <param name="offset">The index of the first byte in data to be hashed.</param>\r
1106       <param name="count">The number of bytes to hash.</param>\r
1107       <param name="hashAlgorithm">The algorithm to use to hash the data.</param>\r
1108       <returns>The hashed data.</returns>\r
1109       <exception cref="T:System.NotImplementedException">A derived class must override this method.</exception>\r
1110     </member>\r
1111     <member name="M:System.Security.Cryptography.ECDsa.ImportParameters(System.Security.Cryptography.ECParameters)">\r
1112       <summary>When overridden in a derived class, imports the specified parameters.</summary>\r
1113       <param name="parameters">The curve parameters.</param>\r
1114       <exception cref="T:System.NotSupportedException">A derived class must override this method.</exception>\r
1115     </member>\r
1116     <member name="P:System.Security.Cryptography.ECDsa.KeyExchangeAlgorithm">\r
1117       <summary>Gets the name of the key exchange algorithm.</summary>\r
1118       <returns>Always null.</returns>\r
1119     </member>\r
1120     <member name="P:System.Security.Cryptography.ECDsa.SignatureAlgorithm">\r
1121       <summary>Gets the name of the signature algorithm.</summary>\r
1122       <returns>The string &quot;ECDsa&quot;.</returns>\r
1123     </member>\r
1124     <member name="M:System.Security.Cryptography.ECDsa.SignData(System.Byte[],System.Security.Cryptography.HashAlgorithmName)">\r
1125       <summary>Computes the hash value of the specified byte array using the specified hash algorithm and signs the resulting hash value.</summary>\r
1126       <param name="data">The input data for which to compute the hash.</param>\r
1127       <param name="hashAlgorithm">The hash algorithm to use to create the hash value.</param>\r
1128       <returns>The ECDSA signature for the specified data.</returns>\r
1129       <exception cref="T:System.ArgumentNullException"><paramref name="data">data</paramref> is null.</exception>\r
1130       <exception cref="T:System.ArgumentException"><paramref name="hashAlgorithm">hashAlgorithm</paramref>.<see cref="P:System.Security.Cryptography.HashAlgorithmName.Name"></see> is null or <see cref="F:System.String.Empty"></see>.</exception>\r
1131     </member>\r
1132     <member name="M:System.Security.Cryptography.ECDsa.SignData(System.IO.Stream,System.Security.Cryptography.HashAlgorithmName)">\r
1133       <summary>Computes the hash value of the specified stream using the specified hash algorithm and signs the resulting hash value.</summary>\r
1134       <param name="data">The input stream for which to compute the hash.</param>\r
1135       <param name="hashAlgorithm">The hash algorithm to use to create the hash value.</param>\r
1136       <returns>The ECDSA signature for the specified data.</returns>\r
1137       <exception cref="T:System.ArgumentNullException"><paramref name="data">data</paramref> is null.</exception>\r
1138       <exception cref="T:System.ArgumentException"><paramref name="hashAlgorithm">hashAlgorithm</paramref>.<see cref="P:System.Security.Cryptography.HashAlgorithmName.Name"></see> is null or <see cref="F:System.String.Empty"></see>.</exception>\r
1139     </member>\r
1140     <member name="M:System.Security.Cryptography.ECDsa.SignData(System.Byte[],System.Int32,System.Int32,System.Security.Cryptography.HashAlgorithmName)">\r
1141       <summary>Computes the hash value of a portion of the specified byte array using the specified hash algorithm and signs the resulting hash value.</summary>\r
1142       <param name="data">The input data for which to compute the hash.</param>\r
1143       <param name="offset">The offset into the array at which to begin using data.</param>\r
1144       <param name="count">The number of bytes in the array to use as data.</param>\r
1145       <param name="hashAlgorithm">The hash algorithm to use to create the hash value.</param>\r
1146       <returns>The ECDSA signature for the specified data.</returns>\r
1147       <exception cref="T:System.ArgumentNullException"><paramref name="data">data</paramref> is null.</exception>\r
1148       <exception cref="T:System.ArgumentException"><paramref name="hashAlgorithm">hashAlgorithm</paramref>.<see cref="P:System.Security.Cryptography.HashAlgorithmName.Name"></see> is null or <see cref="F:System.String.Empty"></see>.</exception>\r
1149       <exception cref="T:System.ArgumentOutOfRangeException"><paramref name="offset">offset</paramref> is less than zero.   -or-  <paramref name="count">count</paramref> is less than zero.   -or-  <paramref name="offset">offset</paramref> + <paramref name="count">count</paramref> – 1 results in an index that is beyond the upper bound of <paramref name="data">data</paramref>.</exception>\r
1150     </member>\r
1151     <member name="M:System.Security.Cryptography.ECDsa.SignHash(System.Byte[])">\r
1152       <summary>Generates a digital signature for the specified hash value.</summary>\r
1153       <param name="hash">The hash value of the data that is being signed.</param>\r
1154       <returns>A digital signature that consists of the given hash value encrypted with the private key.</returns>\r
1155       <exception cref="T:System.ArgumentNullException">The <paramref name="hash">hash</paramref> parameter is null.</exception>\r
1156     </member>\r
1157     <member name="M:System.Security.Cryptography.ECDsa.ToXmlString(System.Boolean)">\r
1158       <param name="includePrivateParameters"></param>\r
1159       <returns></returns>\r
1160     </member>\r
1161     <member name="M:System.Security.Cryptography.ECDsa.VerifyData(System.Byte[],System.Byte[],System.Security.Cryptography.HashAlgorithmName)">\r
1162       <summary>Verifies that a digital signature is valid by calculating the hash value of the specified data using the specified hash algorithm and comparing it to the provided signature.</summary>\r
1163       <param name="data">The signed data.</param>\r
1164       <param name="signature">The signature data to be verified.</param>\r
1165       <param name="hashAlgorithm">The hash algorithm used to create the hash value of the data.</param>\r
1166       <returns>true if the signature is valid; otherwise, false.</returns>\r
1167       <exception cref="T:System.ArgumentNullException"><paramref name="data">data</paramref> is null.   -or-  <paramref name="signature">signature</paramref> is null.</exception>\r
1168       <exception cref="T:System.ArgumentException"><paramref name="hashAlgorithm">hashAlgorithm</paramref>.<see cref="P:System.Security.Cryptography.HashAlgorithmName.Name"></see> is null or <see cref="F:System.String.Empty"></see>.</exception>\r
1169     </member>\r
1170     <member name="M:System.Security.Cryptography.ECDsa.VerifyData(System.IO.Stream,System.Byte[],System.Security.Cryptography.HashAlgorithmName)">\r
1171       <summary>Verifies that a digital signature is valid by calculating the hash value of the specified stream using the specified hash algorithm and comparing it to the provided signature.</summary>\r
1172       <param name="data">The signed data.</param>\r
1173       <param name="signature">The signature data to be verified.</param>\r
1174       <param name="hashAlgorithm">The hash algorithm used to create the hash value of the data.</param>\r
1175       <returns>true if the signature is valid; otherwise, false.</returns>\r
1176       <exception cref="T:System.ArgumentNullException"><paramref name="data">data</paramref> is null.   -or-  <paramref name="signature">signature</paramref> is null.</exception>\r
1177       <exception cref="T:System.ArgumentException"><paramref name="hashAlgorithm">hashAlgorithm</paramref>.<see cref="P:System.Security.Cryptography.HashAlgorithmName.Name"></see> is null or <see cref="F:System.String.Empty"></see>.</exception>\r
1178     </member>\r
1179     <member name="M:System.Security.Cryptography.ECDsa.VerifyData(System.Byte[],System.Int32,System.Int32,System.Byte[],System.Security.Cryptography.HashAlgorithmName)">\r
1180       <summary>Verifies that a digital signature is valid by calculating the hash value of the data in a portion of a byte array using the specified hash algorithm and comparing it to the provided signature.</summary>\r
1181       <param name="data">The signed data.</param>\r
1182       <param name="offset">The starting index at which to compute the hash.</param>\r
1183       <param name="count">The number of bytes to hash.</param>\r
1184       <param name="signature">The signature data to be verified.</param>\r
1185       <param name="hashAlgorithm">The hash algorithm used to create the hash value of the data.</param>\r
1186       <returns>true if the signature is valid; otherwise, false.</returns>\r
1187       <exception cref="T:System.ArgumentNullException"><paramref name="data">data</paramref> is null.   -or-  <paramref name="signature">signature</paramref> is null.</exception>\r
1188       <exception cref="T:System.ArgumentException"><paramref name="hashAlgorithm">hashAlgorithm</paramref>.<see cref="P:System.Security.Cryptography.HashAlgorithmName.Name"></see> is null or <see cref="F:System.String.Empty"></see>.</exception>\r
1189       <exception cref="T:System.ArgumentOutOfRangeException"><paramref name="offset">offset</paramref> is less than zero.   -or-  <paramref name="count">count</paramref> is less than zero.   -or-  <paramref name="offset">offset</paramref> + <paramref name="count">count</paramref> – 1 results in an index that is beyond the upper bound of <paramref name="data">data</paramref>.</exception>\r
1190     </member>\r
1191     <member name="M:System.Security.Cryptography.ECDsa.VerifyHash(System.Byte[],System.Byte[])">\r
1192       <summary>Verifies a digital signature against the specified hash value.</summary>\r
1193       <param name="hash">The hash value of a block of data.</param>\r
1194       <param name="signature">The digital signature to be verified.</param>\r
1195       <returns>true if the hash value equals the decrypted signature; otherwise, false.</returns>\r
1196     </member>\r
1197     <member name="T:System.Security.Cryptography.ECParameters">\r
1198       <summary>Represents the standard parameters for the elliptic curve cryptography (ECC) algorithm.</summary>\r
1199     </member>\r
1200     <member name="F:System.Security.Cryptography.ECParameters.Curve">\r
1201       <summary>Represents the curve associated with the public key (<see cref="F:System.Security.Cryptography.ECParameters.Q"></see>) and the optional private key (<see cref="F:System.Security.Cryptography.ECParameters.D"></see>).</summary>\r
1202       <returns></returns>\r
1203     </member>\r
1204     <member name="F:System.Security.Cryptography.ECParameters.D">\r
1205       <summary>Represents the private key D for the elliptic curve cryptography (ECC) algorithm, stored in big-endian format.</summary>\r
1206       <returns></returns>\r
1207     </member>\r
1208     <member name="F:System.Security.Cryptography.ECParameters.Q">\r
1209       <summary>Represents the public key Q for the elliptic curve cryptography (ECC) algorithm.</summary>\r
1210       <returns></returns>\r
1211     </member>\r
1212     <member name="M:System.Security.Cryptography.ECParameters.Validate">\r
1213       <summary>Validates the current object.</summary>\r
1214       <exception cref="T:System.Security.Cryptography.CryptographicException">The key or curve parameters are not valid for the current curve type.</exception>\r
1215     </member>\r
1216     <member name="T:System.Security.Cryptography.ECPoint">\r
1217       <summary>Represents a (X,Y) coordinate pair for elliptic curve cryptography (ECC) structures.</summary>\r
1218     </member>\r
1219     <member name="F:System.Security.Cryptography.ECPoint.X">\r
1220       <summary>Represents the X coordinate.</summary>\r
1221       <returns></returns>\r
1222     </member>\r
1223     <member name="F:System.Security.Cryptography.ECPoint.Y">\r
1224       <summary>Represents the Y coordinate.</summary>\r
1225       <returns></returns>\r
1226     </member>\r
1227     <member name="T:System.Security.Cryptography.HMACMD5">\r
1228       <summary>Computes a Hash-based Message Authentication Code (HMAC) by using the <see cref="T:System.Security.Cryptography.MD5"></see> hash function.</summary>\r
1229     </member>\r
1230     <member name="M:System.Security.Cryptography.HMACMD5.#ctor">\r
1231       <summary>Initializes a new instance of the <see cref="T:System.Security.Cryptography.HMACMD5"></see> class by using a randomly generated key.</summary>\r
1232     </member>\r
1233     <member name="M:System.Security.Cryptography.HMACMD5.#ctor(System.Byte[])">\r
1234       <summary>Initializes a new instance of the <see cref="T:System.Security.Cryptography.HMACMD5"></see> class by using the specified key.</summary>\r
1235       <param name="key">The secret key for <see cref="T:System.Security.Cryptography.HMACMD5"></see> encryption. The key can be any length, but if it is more than 64 bytes long it will be hashed (using SHA-1) to derive a 64-byte key. Therefore, the recommended size of the secret key is 64 bytes.</param>\r
1236       <exception cref="T:System.ArgumentNullException">The <paramref name="key">key</paramref> parameter is null.</exception>\r
1237     </member>\r
1238     <member name="M:System.Security.Cryptography.HMACMD5.Dispose(System.Boolean)">\r
1239       <param name="disposing"></param>\r
1240     </member>\r
1241     <member name="M:System.Security.Cryptography.HMACMD5.HashCore(System.Byte[],System.Int32,System.Int32)">\r
1242       <param name="rgb"></param>\r
1243       <param name="ib"></param>\r
1244       <param name="cb"></param>\r
1245     </member>\r
1246     <member name="M:System.Security.Cryptography.HMACMD5.HashFinal">\r
1247       <returns></returns>\r
1248     </member>\r
1249     <member name="P:System.Security.Cryptography.HMACMD5.HashSize">\r
1250       <returns></returns>\r
1251     </member>\r
1252     <member name="M:System.Security.Cryptography.HMACMD5.Initialize">\r
1253       \r
1254     </member>\r
1255     <member name="P:System.Security.Cryptography.HMACMD5.Key">\r
1256       <returns></returns>\r
1257     </member>\r
1258     <member name="T:System.Security.Cryptography.HMACSHA1">\r
1259       <summary>Computes a Hash-based Message Authentication Code (HMAC) using the <see cref="T:System.Security.Cryptography.SHA1"></see> hash function.</summary>\r
1260     </member>\r
1261     <member name="M:System.Security.Cryptography.HMACSHA1.#ctor">\r
1262       <summary>Initializes a new instance of the <see cref="T:System.Security.Cryptography.HMACSHA1"></see> class with a randomly generated key.</summary>\r
1263     </member>\r
1264     <member name="M:System.Security.Cryptography.HMACSHA1.#ctor(System.Byte[])">\r
1265       <summary>Initializes a new instance of the <see cref="T:System.Security.Cryptography.HMACSHA1"></see> class with the specified key data.</summary>\r
1266       <param name="key">The secret key for <see cref="T:System.Security.Cryptography.HMACSHA1"></see> encryption. The key can be any length, but if it is more than 64 bytes long it is hashed (using SHA-1) to derive a 64-byte key. Therefore, the recommended size of the secret key is 64 bytes.</param>\r
1267       <exception cref="T:System.ArgumentNullException">The <paramref name="key">key</paramref> parameter is null.</exception>\r
1268     </member>\r
1269     <member name="M:System.Security.Cryptography.HMACSHA1.#ctor(System.Byte[],System.Boolean)">\r
1270       <summary>Initializes a new instance of the <see cref="T:System.Security.Cryptography.HMACSHA1"></see> class with the specified key data and a value that specifies whether to use the managed version of the SHA1 algorithm.</summary>\r
1271       <param name="key">The secret key for <see cref="T:System.Security.Cryptography.HMACSHA1"></see> encryption. The key can be any length, but if it is more than 64 bytes long, it is hashed (using SHA-1) to derive a 64-byte key. Therefore, the recommended size of the secret key is 64 bytes.</param>\r
1272       <param name="useManagedSha1">true to use the managed implementation of the SHA1 algorithm (the <see cref="T:System.Security.Cryptography.SHA1Managed"></see> class); false to use the unmanaged implementation (the <see cref="T:System.Security.Cryptography.SHA1CryptoServiceProvider"></see> class).</param>\r
1273     </member>\r
1274     <member name="M:System.Security.Cryptography.HMACSHA1.Dispose(System.Boolean)">\r
1275       <param name="disposing"></param>\r
1276     </member>\r
1277     <member name="M:System.Security.Cryptography.HMACSHA1.HashCore(System.Byte[],System.Int32,System.Int32)">\r
1278       <param name="rgb"></param>\r
1279       <param name="ib"></param>\r
1280       <param name="cb"></param>\r
1281     </member>\r
1282     <member name="M:System.Security.Cryptography.HMACSHA1.HashFinal">\r
1283       <returns></returns>\r
1284     </member>\r
1285     <member name="P:System.Security.Cryptography.HMACSHA1.HashSize">\r
1286       <returns></returns>\r
1287     </member>\r
1288     <member name="M:System.Security.Cryptography.HMACSHA1.Initialize">\r
1289       \r
1290     </member>\r
1291     <member name="P:System.Security.Cryptography.HMACSHA1.Key">\r
1292       <returns></returns>\r
1293     </member>\r
1294     <member name="T:System.Security.Cryptography.HMACSHA256">\r
1295       <summary>Computes a Hash-based Message Authentication Code (HMAC) by using the <see cref="T:System.Security.Cryptography.SHA256"></see> hash function.</summary>\r
1296     </member>\r
1297     <member name="M:System.Security.Cryptography.HMACSHA256.#ctor">\r
1298       <summary>Initializes a new instance of the <see cref="T:System.Security.Cryptography.HMACSHA256"></see> class with a randomly generated key.</summary>\r
1299     </member>\r
1300     <member name="M:System.Security.Cryptography.HMACSHA256.#ctor(System.Byte[])">\r
1301       <summary>Initializes a new instance of the <see cref="T:System.Security.Cryptography.HMACSHA256"></see> class with the specified key data.</summary>\r
1302       <param name="key">The secret key for <see cref="T:System.Security.Cryptography.HMACSHA256"></see> encryption. The key can be any length. However, the recommended size is 64 bytes. If the key is more than 64 bytes long, it is hashed (using SHA-256) to derive a 64-byte key. If it is less than 64 bytes long, it is padded to 64 bytes.</param>\r
1303       <exception cref="T:System.ArgumentNullException">The <paramref name="key">key</paramref> parameter is null.</exception>\r
1304     </member>\r
1305     <member name="M:System.Security.Cryptography.HMACSHA256.Dispose(System.Boolean)">\r
1306       <param name="disposing"></param>\r
1307     </member>\r
1308     <member name="M:System.Security.Cryptography.HMACSHA256.HashCore(System.Byte[],System.Int32,System.Int32)">\r
1309       <param name="rgb"></param>\r
1310       <param name="ib"></param>\r
1311       <param name="cb"></param>\r
1312     </member>\r
1313     <member name="M:System.Security.Cryptography.HMACSHA256.HashFinal">\r
1314       <returns></returns>\r
1315     </member>\r
1316     <member name="P:System.Security.Cryptography.HMACSHA256.HashSize">\r
1317       <returns></returns>\r
1318     </member>\r
1319     <member name="M:System.Security.Cryptography.HMACSHA256.Initialize">\r
1320       \r
1321     </member>\r
1322     <member name="P:System.Security.Cryptography.HMACSHA256.Key">\r
1323       <returns></returns>\r
1324     </member>\r
1325     <member name="T:System.Security.Cryptography.HMACSHA384">\r
1326       <summary>Computes a Hash-based Message Authentication Code (HMAC) using the <see cref="T:System.Security.Cryptography.SHA384"></see> hash function.</summary>\r
1327     </member>\r
1328     <member name="M:System.Security.Cryptography.HMACSHA384.#ctor">\r
1329       <summary>Initializes a new instance of the <see cref="T:System.Security.Cryptography.HMACSHA384"></see> class by using a randomly generated key.</summary>\r
1330     </member>\r
1331     <member name="M:System.Security.Cryptography.HMACSHA384.#ctor(System.Byte[])">\r
1332       <summary>Initializes a new instance of the <see cref="T:System.Security.Cryptography.HMACSHA384"></see> class by using the specified key data.</summary>\r
1333       <param name="key">The secret key for <see cref="T:System.Security.Cryptography.HMACSHA384"></see> encryption. The key can be any length. However, the recommended size is 128 bytes. If the key is more than 128 bytes long, it is hashed (using SHA-384) to derive a 128-byte key. If it is less than 128 bytes long, it is padded to 128 bytes.</param>\r
1334       <exception cref="T:System.ArgumentNullException">The <paramref name="key">key</paramref> parameter is null.</exception>\r
1335     </member>\r
1336     <member name="M:System.Security.Cryptography.HMACSHA384.Dispose(System.Boolean)">\r
1337       <param name="disposing"></param>\r
1338     </member>\r
1339     <member name="M:System.Security.Cryptography.HMACSHA384.HashCore(System.Byte[],System.Int32,System.Int32)">\r
1340       <param name="rgb"></param>\r
1341       <param name="ib"></param>\r
1342       <param name="cb"></param>\r
1343     </member>\r
1344     <member name="M:System.Security.Cryptography.HMACSHA384.HashFinal">\r
1345       <returns></returns>\r
1346     </member>\r
1347     <member name="P:System.Security.Cryptography.HMACSHA384.HashSize">\r
1348       <returns></returns>\r
1349     </member>\r
1350     <member name="M:System.Security.Cryptography.HMACSHA384.Initialize">\r
1351       \r
1352     </member>\r
1353     <member name="P:System.Security.Cryptography.HMACSHA384.Key">\r
1354       <returns></returns>\r
1355     </member>\r
1356     <member name="P:System.Security.Cryptography.HMACSHA384.ProduceLegacyHmacValues">\r
1357       <summary>Provides a workaround for the .NET Framework 2.0 implementation of the <see cref="T:System.Security.Cryptography.HMACSHA384"></see> algorithm, which is inconsistent with the .NET Framework 2.0 Service Pack 1 implementation of the algorithm.</summary>\r
1358       <returns>true to enable .NET Framework 2.0 Service Pack 1 applications to interact with .NET Framework 2.0 applications; otherwise, false.</returns>\r
1359     </member>\r
1360     <member name="T:System.Security.Cryptography.HMACSHA512">\r
1361       <summary>Computes a Hash-based Message Authentication Code (HMAC) using the <see cref="T:System.Security.Cryptography.SHA512"></see> hash function.</summary>\r
1362     </member>\r
1363     <member name="M:System.Security.Cryptography.HMACSHA512.#ctor">\r
1364       <summary>Initializes a new instance of the <see cref="T:System.Security.Cryptography.HMACSHA512"></see> class with a randomly generated key.</summary>\r
1365     </member>\r
1366     <member name="M:System.Security.Cryptography.HMACSHA512.#ctor(System.Byte[])">\r
1367       <summary>Initializes a new instance of the <see cref="T:System.Security.Cryptography.HMACSHA512"></see> class with the specified key data.</summary>\r
1368       <param name="key">The secret key for <see cref="T:System.Security.Cryptography.HMACSHA512"></see> encryption. The key can be any length. However, the recommended size is 128 bytes. If the key is more than 128 bytes long, it is hashed (using SHA-512) to derive a 128-byte key. If it is less than 128 bytes long, it is padded to 128 bytes.</param>\r
1369       <exception cref="T:System.ArgumentNullException">The <paramref name="key">key</paramref> parameter is null.</exception>\r
1370     </member>\r
1371     <member name="M:System.Security.Cryptography.HMACSHA512.Dispose(System.Boolean)">\r
1372       <param name="disposing"></param>\r
1373     </member>\r
1374     <member name="M:System.Security.Cryptography.HMACSHA512.HashCore(System.Byte[],System.Int32,System.Int32)">\r
1375       <param name="rgb"></param>\r
1376       <param name="ib"></param>\r
1377       <param name="cb"></param>\r
1378     </member>\r
1379     <member name="M:System.Security.Cryptography.HMACSHA512.HashFinal">\r
1380       <returns></returns>\r
1381     </member>\r
1382     <member name="P:System.Security.Cryptography.HMACSHA512.HashSize">\r
1383       <returns></returns>\r
1384     </member>\r
1385     <member name="M:System.Security.Cryptography.HMACSHA512.Initialize">\r
1386       \r
1387     </member>\r
1388     <member name="P:System.Security.Cryptography.HMACSHA512.Key">\r
1389       <returns></returns>\r
1390     </member>\r
1391     <member name="P:System.Security.Cryptography.HMACSHA512.ProduceLegacyHmacValues">\r
1392       <summary>Provides a workaround for the .NET Framework 2.0 implementation of the <see cref="T:System.Security.Cryptography.HMACSHA512"></see> algorithm, which is inconsistent with the .NET Framework 2.0 Service Pack 1 implementation.</summary>\r
1393       <returns>true to enable .NET Framework 2.0 Service Pack 1 applications to interact with .NET Framework 2.0 applications; otherwise, false.</returns>\r
1394     </member>\r
1395     <member name="T:System.Security.Cryptography.IncrementalHash">\r
1396       \r
1397     </member>\r
1398     <member name="P:System.Security.Cryptography.IncrementalHash.AlgorithmName">\r
1399       <returns></returns>\r
1400     </member>\r
1401     <member name="M:System.Security.Cryptography.IncrementalHash.AppendData(System.Byte[])">\r
1402       <param name="data"></param>\r
1403     </member>\r
1404     <member name="M:System.Security.Cryptography.IncrementalHash.AppendData(System.Byte[],System.Int32,System.Int32)">\r
1405       <param name="data"></param>\r
1406       <param name="offset"></param>\r
1407       <param name="count"></param>\r
1408     </member>\r
1409     <member name="M:System.Security.Cryptography.IncrementalHash.CreateHash(System.Security.Cryptography.HashAlgorithmName)">\r
1410       <param name="hashAlgorithm"></param>\r
1411       <returns></returns>\r
1412     </member>\r
1413     <member name="M:System.Security.Cryptography.IncrementalHash.CreateHMAC(System.Security.Cryptography.HashAlgorithmName,System.Byte[])">\r
1414       <param name="hashAlgorithm"></param>\r
1415       <param name="key"></param>\r
1416       <returns></returns>\r
1417     </member>\r
1418     <member name="M:System.Security.Cryptography.IncrementalHash.Dispose">\r
1419       \r
1420     </member>\r
1421     <member name="M:System.Security.Cryptography.IncrementalHash.GetHashAndReset">\r
1422       <returns></returns>\r
1423     </member>\r
1424     <member name="T:System.Security.Cryptography.MaskGenerationMethod">\r
1425       <summary>Represents the abstract class from which all mask generator algorithms must derive.</summary>\r
1426     </member>\r
1427     <member name="M:System.Security.Cryptography.MaskGenerationMethod.#ctor">\r
1428       <summary>Initializes a new instance of the <see cref="T:System.Security.Cryptography.MaskGenerationMethod"></see> class.</summary>\r
1429     </member>\r
1430     <member name="M:System.Security.Cryptography.MaskGenerationMethod.GenerateMask(System.Byte[],System.Int32)">\r
1431       <summary>When overridden in a derived class, generates a mask with the specified length using the specified random seed.</summary>\r
1432       <param name="rgbSeed">The random seed to use to compute the mask.</param>\r
1433       <param name="cbReturn">The length of the generated mask in bytes.</param>\r
1434       <returns>A randomly generated mask whose length is equal to the <paramref name="cbReturn">cbReturn</paramref> parameter.</returns>\r
1435     </member>\r
1436     <member name="T:System.Security.Cryptography.MD5">\r
1437       <summary>Represents the abstract class from which all implementations of the <see cref="T:System.Security.Cryptography.MD5"></see> hash algorithm inherit.</summary>\r
1438     </member>\r
1439     <member name="M:System.Security.Cryptography.MD5.#ctor">\r
1440       <summary>Initializes a new instance of <see cref="T:System.Security.Cryptography.MD5"></see>.</summary>\r
1441     </member>\r
1442     <member name="M:System.Security.Cryptography.MD5.Create">\r
1443       <summary>Creates an instance of the default implementation of the <see cref="T:System.Security.Cryptography.MD5"></see> hash algorithm.</summary>\r
1444       <returns>A new instance of the <see cref="T:System.Security.Cryptography.MD5"></see> hash algorithm.</returns>\r
1445       <exception cref="T:System.Reflection.TargetInvocationException">The algorithm was used with Federal Information Processing Standards (FIPS) mode enabled, but is not FIPS compatible.</exception>\r
1446     </member>\r
1447     <member name="M:System.Security.Cryptography.MD5.Create(System.String)">\r
1448       <summary>Creates an instance of the specified implementation of the <see cref="T:System.Security.Cryptography.MD5"></see> hash algorithm.</summary>\r
1449       <param name="algName">The name of the specific implementation of <see cref="T:System.Security.Cryptography.MD5"></see> to use.</param>\r
1450       <returns>A new instance of the specified implementation of <see cref="T:System.Security.Cryptography.MD5"></see>.</returns>\r
1451       <exception cref="T:System.Reflection.TargetInvocationException">The algorithm described by the <paramref name="algName">algName</paramref> parameter was used with Federal Information Processing Standards (FIPS) mode enabled, but is not FIPS compatible.</exception>\r
1452     </member>\r
1453     <member name="T:System.Security.Cryptography.Aes">\r
1454       <summary>Represents the abstract base class from which all implementations of the Advanced Encryption Standard (AES) must inherit.</summary>\r
1455     </member>\r
1456     <member name="M:System.Security.Cryptography.Aes.#ctor">\r
1457       <summary>Initializes a new instance of the <see cref="T:System.Security.Cryptography.Aes"></see> class.</summary>\r
1458     </member>\r
1459     <member name="M:System.Security.Cryptography.Aes.Create">\r
1460       <summary>Creates a cryptographic object that is used to perform the symmetric algorithm.</summary>\r
1461       <returns>A cryptographic object that is used to perform the symmetric algorithm.</returns>\r
1462     </member>\r
1463     <member name="M:System.Security.Cryptography.Aes.Create(System.String)">\r
1464       <summary>Creates a cryptographic object that specifies the implementation of AES to use to perform the symmetric algorithm.</summary>\r
1465       <param name="algorithmName">The name of the specific implementation of AES to use.</param>\r
1466       <returns>A cryptographic object that is used to perform the symmetric algorithm.</returns>\r
1467       <exception cref="T:System.ArgumentNullException">The <paramref name="algorithmName">algorithmName</paramref> parameter is null.</exception>\r
1468     </member>\r
1469     <member name="P:System.Security.Cryptography.Aes.LegalBlockSizes">\r
1470       <returns></returns>\r
1471     </member>\r
1472     <member name="P:System.Security.Cryptography.Aes.LegalKeySizes">\r
1473       <returns></returns>\r
1474     </member>\r
1475     <member name="T:System.Security.Cryptography.AesManaged">\r
1476       <summary>Provides a managed implementation of the Advanced Encryption Standard (AES) symmetric algorithm.</summary>\r
1477     </member>\r
1478     <member name="M:System.Security.Cryptography.AesManaged.#ctor">\r
1479       <summary>Initializes a new instance of the <see cref="T:System.Security.Cryptography.AesManaged"></see> class.</summary>\r
1480       <exception cref="T:System.Security.Cryptography.CryptographicException">The Windows security policy setting for FIPS is enabled.</exception>\r
1481       <exception cref="T:System.InvalidOperationException">This implementation is not part of the Windows Platform FIPS-validated cryptographic algorithms.</exception>\r
1482     </member>\r
1483     <member name="P:System.Security.Cryptography.AesManaged.BlockSize">\r
1484       <returns></returns>\r
1485     </member>\r
1486     <member name="M:System.Security.Cryptography.AesManaged.CreateDecryptor">\r
1487       <summary>Creates a symmetric decryptor object using the current key and initialization vector (IV).</summary>\r
1488       <returns>A symmetric decryptor object.</returns>\r
1489     </member>\r
1490     <member name="M:System.Security.Cryptography.AesManaged.CreateDecryptor(System.Byte[],System.Byte[])">\r
1491       <summary>Creates a symmetric decryptor object using the specified key and initialization vector (IV).</summary>\r
1492       <param name="key">The secret key to use for the symmetric algorithm.</param>\r
1493       <param name="iv">The initialization vector to use for the symmetric algorithm.</param>\r
1494       <returns>A symmetric decryptor object.</returns>\r
1495       <exception cref="T:System.ArgumentNullException"><paramref name="key">key</paramref> or <paramref name="iv">iv</paramref> is null.</exception>\r
1496       <exception cref="T:System.ArgumentException"><paramref name="key">key</paramref> is invalid.</exception>\r
1497     </member>\r
1498     <member name="M:System.Security.Cryptography.AesManaged.CreateEncryptor">\r
1499       <summary>Creates a symmetric encryptor object using the current key and initialization vector (IV).</summary>\r
1500       <returns>A symmetric encryptor object.</returns>\r
1501     </member>\r
1502     <member name="M:System.Security.Cryptography.AesManaged.CreateEncryptor(System.Byte[],System.Byte[])">\r
1503       <summary>Creates a symmetric encryptor object using the specified key and initialization vector (IV).</summary>\r
1504       <param name="key">The secret key to use for the symmetric algorithm.</param>\r
1505       <param name="iv">The initialization vector to use for the symmetric algorithm.</param>\r
1506       <returns>A symmetric encryptor object.</returns>\r
1507       <exception cref="T:System.ArgumentNullException"><paramref name="key">key</paramref> or <paramref name="iv">iv</paramref> is null.</exception>\r
1508       <exception cref="T:System.ArgumentException"><paramref name="key">key</paramref> is invalid.</exception>\r
1509     </member>\r
1510     <member name="P:System.Security.Cryptography.AesManaged.FeedbackSize">\r
1511       <summary>Gets or sets the number of bits to use as feedback.</summary>\r
1512       <returns>The feedback size, in bits.</returns>\r
1513     </member>\r
1514     <member name="M:System.Security.Cryptography.AesManaged.GenerateIV">\r
1515       <summary>Generates a random initialization vector (IV) to use for the symmetric algorithm.</summary>\r
1516     </member>\r
1517     <member name="M:System.Security.Cryptography.AesManaged.GenerateKey">\r
1518       <summary>Generates a random key to use for the symmetric algorithm.</summary>\r
1519     </member>\r
1520     <member name="P:System.Security.Cryptography.AesManaged.IV">\r
1521       <summary>Gets or sets the initialization vector (IV) to use for the symmetric algorithm.</summary>\r
1522       <returns>The initialization vector to use for the symmetric algorithm</returns>\r
1523     </member>\r
1524     <member name="P:System.Security.Cryptography.AesManaged.Key">\r
1525       <summary>Gets or sets the secret key used for the symmetric algorithm.</summary>\r
1526       <returns>The key for the symmetric algorithm.</returns>\r
1527     </member>\r
1528     <member name="P:System.Security.Cryptography.AesManaged.KeySize">\r
1529       <summary>Gets or sets the size, in bits, of the secret key used for the symmetric algorithm.</summary>\r
1530       <returns>The size, in bits, of the key used by the symmetric algorithm.</returns>\r
1531     </member>\r
1532     <member name="P:System.Security.Cryptography.AesManaged.LegalBlockSizes">\r
1533       <returns></returns>\r
1534     </member>\r
1535     <member name="P:System.Security.Cryptography.AesManaged.LegalKeySizes">\r
1536       <returns></returns>\r
1537     </member>\r
1538     <member name="P:System.Security.Cryptography.AesManaged.Mode">\r
1539       <summary>Gets or sets the mode for operation of the symmetric algorithm.</summary>\r
1540       <returns>One of the enumeration values that specifies the block cipher mode to use for encryption. The default is <see cref="F:System.Security.Cryptography.CipherMode.CBC"></see>.</returns>\r
1541       <exception cref="T:System.Security.Cryptography.CryptographicException"><see cref="P:System.Security.Cryptography.AesManaged.Mode"></see> is set to <see cref="F:System.Security.Cryptography.CipherMode.CFB"></see> or <see cref="F:System.Security.Cryptography.CipherMode.OFB"></see>.</exception>\r
1542     </member>\r
1543     <member name="P:System.Security.Cryptography.AesManaged.Padding">\r
1544       <summary>Gets or sets the padding mode used in the symmetric algorithm.</summary>\r
1545       <returns>One of the enumeration values that specifies the type of padding to apply. The default is <see cref="F:System.Security.Cryptography.PaddingMode.PKCS7"></see>.</returns>\r
1546     </member>\r
1547     <member name="T:System.Security.Cryptography.AsymmetricKeyExchangeDeformatter">\r
1548       <summary>Represents the base class from which all asymmetric key exchange deformatters derive.</summary>\r
1549     </member>\r
1550     <member name="M:System.Security.Cryptography.AsymmetricKeyExchangeDeformatter.#ctor">\r
1551       <summary>Initializes a new instance of <see cref="T:System.Security.Cryptography.AsymmetricKeyExchangeDeformatter"></see>.</summary>\r
1552     </member>\r
1553     <member name="M:System.Security.Cryptography.AsymmetricKeyExchangeDeformatter.DecryptKeyExchange(System.Byte[])">\r
1554       <summary>When overridden in a derived class, extracts secret information from the encrypted key exchange data.</summary>\r
1555       <param name="rgb">The key exchange data within which the secret information is hidden.</param>\r
1556       <returns>The secret information derived from the key exchange data.</returns>\r
1557     </member>\r
1558     <member name="P:System.Security.Cryptography.AsymmetricKeyExchangeDeformatter.Parameters">\r
1559       <summary>When overridden in a derived class, gets or sets the parameters for the asymmetric key exchange.</summary>\r
1560       <returns>A string in XML format containing the parameters of the asymmetric key exchange operation.</returns>\r
1561     </member>\r
1562     <member name="M:System.Security.Cryptography.AsymmetricKeyExchangeDeformatter.SetKey(System.Security.Cryptography.AsymmetricAlgorithm)">\r
1563       <summary>When overridden in a derived class, sets the private key to use for decrypting the secret information.</summary>\r
1564       <param name="key">The instance of the implementation of <see cref="T:System.Security.Cryptography.AsymmetricAlgorithm"></see> that holds the private key.</param>\r
1565     </member>\r
1566     <member name="T:System.Security.Cryptography.AsymmetricKeyExchangeFormatter">\r
1567       <summary>Represents the base class from which all asymmetric key exchange formatters derive.</summary>\r
1568     </member>\r
1569     <member name="M:System.Security.Cryptography.AsymmetricKeyExchangeFormatter.#ctor">\r
1570       <summary>Initializes a new instance of <see cref="T:System.Security.Cryptography.AsymmetricKeyExchangeFormatter"></see>.</summary>\r
1571     </member>\r
1572     <member name="M:System.Security.Cryptography.AsymmetricKeyExchangeFormatter.CreateKeyExchange(System.Byte[])">\r
1573       <summary>When overridden in a derived class, creates the encrypted key exchange data from the specified input data.</summary>\r
1574       <param name="data">The secret information to be passed in the key exchange.</param>\r
1575       <returns>The encrypted key exchange data to be sent to the intended recipient.</returns>\r
1576     </member>\r
1577     <member name="M:System.Security.Cryptography.AsymmetricKeyExchangeFormatter.CreateKeyExchange(System.Byte[],System.Type)">\r
1578       <summary>When overridden in a derived class, creates the encrypted key exchange data from the specified input data.</summary>\r
1579       <param name="data">The secret information to be passed in the key exchange.</param>\r
1580       <param name="symAlgType">This parameter is not used in the current version.</param>\r
1581       <returns>The encrypted key exchange data to be sent to the intended recipient.</returns>\r
1582     </member>\r
1583     <member name="P:System.Security.Cryptography.AsymmetricKeyExchangeFormatter.Parameters">\r
1584       <summary>When overridden in a derived class, gets the parameters for the asymmetric key exchange.</summary>\r
1585       <returns>A string in XML format containing the parameters of the asymmetric key exchange operation.</returns>\r
1586     </member>\r
1587     <member name="M:System.Security.Cryptography.AsymmetricKeyExchangeFormatter.SetKey(System.Security.Cryptography.AsymmetricAlgorithm)">\r
1588       <summary>When overridden in a derived class, sets the public key to use for encrypting the secret information.</summary>\r
1589       <param name="key">The instance of the implementation of <see cref="T:System.Security.Cryptography.AsymmetricAlgorithm"></see> that holds the public key.</param>\r
1590     </member>\r
1591     <member name="T:System.Security.Cryptography.AsymmetricSignatureDeformatter">\r
1592       <summary>Represents the abstract base class from which all implementations of asymmetric signature deformatters derive.</summary>\r
1593     </member>\r
1594     <member name="M:System.Security.Cryptography.AsymmetricSignatureDeformatter.#ctor">\r
1595       <summary>Initializes a new instance of <see cref="T:System.Security.Cryptography.AsymmetricSignatureDeformatter"></see>.</summary>\r
1596     </member>\r
1597     <member name="M:System.Security.Cryptography.AsymmetricSignatureDeformatter.SetHashAlgorithm(System.String)">\r
1598       <summary>When overridden in a derived class, sets the hash algorithm to use for verifying the signature.</summary>\r
1599       <param name="strName">The name of the hash algorithm to use for verifying the signature.</param>\r
1600     </member>\r
1601     <member name="M:System.Security.Cryptography.AsymmetricSignatureDeformatter.SetKey(System.Security.Cryptography.AsymmetricAlgorithm)">\r
1602       <summary>When overridden in a derived class, sets the public key to use for verifying the signature.</summary>\r
1603       <param name="key">The instance of an implementation of <see cref="T:System.Security.Cryptography.AsymmetricAlgorithm"></see> that holds the public key.</param>\r
1604     </member>\r
1605     <member name="M:System.Security.Cryptography.AsymmetricSignatureDeformatter.VerifySignature(System.Byte[],System.Byte[])">\r
1606       <summary>When overridden in a derived class, verifies the signature for the specified data.</summary>\r
1607       <param name="rgbHash">The data signed with rgbSignature.</param>\r
1608       <param name="rgbSignature">The signature to be verified for rgbHash.</param>\r
1609       <returns>true if <paramref name="rgbSignature">rgbSignature</paramref> matches the signature computed using the specified hash algorithm and key on <paramref name="rgbHash">rgbHash</paramref>; otherwise, false.</returns>\r
1610     </member>\r
1611     <member name="M:System.Security.Cryptography.AsymmetricSignatureDeformatter.VerifySignature(System.Security.Cryptography.HashAlgorithm,System.Byte[])">\r
1612       <summary>Verifies the signature from the specified hash value.</summary>\r
1613       <param name="hash">The hash algorithm to use to verify the signature.</param>\r
1614       <param name="rgbSignature">The signature to be verified.</param>\r
1615       <returns>true if the signature is valid for the hash; otherwise, false.</returns>\r
1616       <exception cref="T:System.ArgumentNullException">The <paramref name="hash">hash</paramref> parameter is null.</exception>\r
1617     </member>\r
1618     <member name="T:System.Security.Cryptography.AsymmetricSignatureFormatter">\r
1619       <summary>Represents the base class from which all implementations of asymmetric signature formatters derive.</summary>\r
1620     </member>\r
1621     <member name="M:System.Security.Cryptography.AsymmetricSignatureFormatter.#ctor">\r
1622       <summary>Initializes a new instance of <see cref="T:System.Security.Cryptography.AsymmetricSignatureFormatter"></see>.</summary>\r
1623     </member>\r
1624     <member name="M:System.Security.Cryptography.AsymmetricSignatureFormatter.CreateSignature(System.Byte[])">\r
1625       <summary>When overridden in a derived class, creates the signature for the specified data.</summary>\r
1626       <param name="rgbHash">The data to be signed.</param>\r
1627       <returns>The digital signature for the <paramref name="rgbHash">rgbHash</paramref> parameter.</returns>\r
1628     </member>\r
1629     <member name="M:System.Security.Cryptography.AsymmetricSignatureFormatter.CreateSignature(System.Security.Cryptography.HashAlgorithm)">\r
1630       <summary>Creates the signature from the specified hash value.</summary>\r
1631       <param name="hash">The hash algorithm to use to create the signature.</param>\r
1632       <returns>The signature for the specified hash value.</returns>\r
1633       <exception cref="T:System.ArgumentNullException">The <paramref name="hash">hash</paramref> parameter is null.</exception>\r
1634     </member>\r
1635     <member name="M:System.Security.Cryptography.AsymmetricSignatureFormatter.SetHashAlgorithm(System.String)">\r
1636       <summary>When overridden in a derived class, sets the hash algorithm to use for creating the signature.</summary>\r
1637       <param name="strName">The name of the hash algorithm to use for creating the signature.</param>\r
1638     </member>\r
1639     <member name="M:System.Security.Cryptography.AsymmetricSignatureFormatter.SetKey(System.Security.Cryptography.AsymmetricAlgorithm)">\r
1640       <summary>When overridden in a derived class, sets the asymmetric algorithm to use to create the signature.</summary>\r
1641       <param name="key">The instance of the implementation of <see cref="T:System.Security.Cryptography.AsymmetricAlgorithm"></see> to use to create the signature.</param>\r
1642     </member>\r
1643     <member name="T:System.Security.Cryptography.CryptoConfig">\r
1644       <summary>Accesses the cryptography configuration information.</summary>\r
1645     </member>\r
1646     <member name="M:System.Security.Cryptography.CryptoConfig.#ctor">\r
1647       <summary>Initializes a new instance of the <see cref="T:System.Security.Cryptography.CryptoConfig"></see> class.</summary>\r
1648     </member>\r
1649     <member name="M:System.Security.Cryptography.CryptoConfig.AddAlgorithm(System.Type,System.String[])">\r
1650       <summary>Adds a set of names to algorithm mappings to be used for the current application domain.</summary>\r
1651       <param name="algorithm">The algorithm to map to.</param>\r
1652       <param name="names">An array of names to map to the algorithm.</param>\r
1653       <exception cref="T:System.ArgumentNullException">The <paramref name="algorithm">algorithm</paramref> or <paramref name="names">names</paramref> parameter is null.</exception>\r
1654       <exception cref="T:System.ArgumentException"><paramref name="algorithm">algorithm</paramref> cannot be accessed from outside the assembly.   -or-   One of the entries in the <paramref name="names">names</paramref> parameter is empty or null.</exception>\r
1655     </member>\r
1656     <member name="M:System.Security.Cryptography.CryptoConfig.AddOID(System.String,System.String[])">\r
1657       <summary>Adds a set of names to object identifier (OID) mappings to be used for the current application domain.</summary>\r
1658       <param name="oid">The object identifier (OID) to map to.</param>\r
1659       <param name="names">An array of names to map to the OID.</param>\r
1660       <exception cref="T:System.ArgumentNullException">The <paramref name="oid">oid</paramref> or <paramref name="names">names</paramref> parameter is null.</exception>\r
1661       <exception cref="T:System.ArgumentException">One of the entries in the <paramref name="names">names</paramref> parameter is empty or null.</exception>\r
1662     </member>\r
1663     <member name="P:System.Security.Cryptography.CryptoConfig.AllowOnlyFipsAlgorithms">\r
1664       <summary>Indicates whether the runtime should enforce the policy to create only Federal Information Processing Standard (FIPS) certified algorithms.</summary>\r
1665       <returns>true to enforce the policy; otherwise, false.</returns>\r
1666     </member>\r
1667     <member name="M:System.Security.Cryptography.CryptoConfig.CreateFromName(System.String)">\r
1668       <summary>Creates a new instance of the specified cryptographic object.</summary>\r
1669       <param name="name">The simple name of the cryptographic object of which to create an instance.</param>\r
1670       <returns>A new instance of the specified cryptographic object.</returns>\r
1671       <exception cref="T:System.ArgumentNullException">The <paramref name="name">name</paramref> parameter is null.</exception>\r
1672       <exception cref="T:System.Reflection.TargetInvocationException">The algorithm described by the <paramref name="name">name</paramref> parameter was used with Federal Information Processing Standards (FIPS) mode enabled, but is not FIPS compatible.</exception>\r
1673     </member>\r
1674     <member name="M:System.Security.Cryptography.CryptoConfig.CreateFromName(System.String,System.Object[])">\r
1675       <summary>Creates a new instance of the specified cryptographic object with the specified arguments.</summary>\r
1676       <param name="name">The simple name of the cryptographic object of which to create an instance.</param>\r
1677       <param name="args">The arguments used to create the specified cryptographic object.</param>\r
1678       <returns>A new instance of the specified cryptographic object.</returns>\r
1679       <exception cref="T:System.ArgumentNullException">The <paramref name="name">name</paramref> parameter is null.</exception>\r
1680       <exception cref="T:System.Reflection.TargetInvocationException">The algorithm described by the <paramref name="name">name</paramref> parameter was used with Federal Information Processing Standards (FIPS) mode enabled, but is not FIPS compatible.</exception>\r
1681     </member>\r
1682     <member name="M:System.Security.Cryptography.CryptoConfig.EncodeOID(System.String)">\r
1683       <summary>Encodes the specified object identifier (OID).</summary>\r
1684       <param name="str">The OID to encode.</param>\r
1685       <returns>A byte array containing the encoded OID.</returns>\r
1686       <exception cref="T:System.ArgumentNullException">The <paramref name="str">str</paramref> parameter is null.</exception>\r
1687       <exception cref="T:System.Security.Cryptography.CryptographicUnexpectedOperationException">An error occurred while encoding the OID.</exception>\r
1688     </member>\r
1689     <member name="M:System.Security.Cryptography.CryptoConfig.MapNameToOID(System.String)">\r
1690       <summary>Gets the object identifier (OID) of the algorithm corresponding to the specified simple name.</summary>\r
1691       <param name="name">The simple name of the algorithm for which to get the OID.</param>\r
1692       <returns>The OID of the specified algorithm.</returns>\r
1693       <exception cref="T:System.ArgumentNullException">The <paramref name="name">name</paramref> parameter is null.</exception>\r
1694     </member>\r
1695     <member name="T:System.Security.Cryptography.DeriveBytes">\r
1696       <summary>Represents the abstract base class from which all classes that derive byte sequences of a specified length inherit.</summary>\r
1697     </member>\r
1698     <member name="M:System.Security.Cryptography.DeriveBytes.#ctor">\r
1699       <summary>Initializes a new instance of the <see cref="T:System.Security.Cryptography.DeriveBytes"></see> class.</summary>\r
1700     </member>\r
1701     <member name="M:System.Security.Cryptography.DeriveBytes.Dispose">\r
1702       <summary>When overridden in a derived class, releases all resources used by the current instance of the <see cref="T:System.Security.Cryptography.DeriveBytes"></see> class.</summary>\r
1703     </member>\r
1704     <member name="M:System.Security.Cryptography.DeriveBytes.Dispose(System.Boolean)">\r
1705       <summary>When overridden in a derived class, releases the unmanaged resources used by the <see cref="T:System.Security.Cryptography.DeriveBytes"></see> class and optionally releases the managed resources.</summary>\r
1706       <param name="disposing">true to release both managed and unmanaged resources; false to release only unmanaged resources.</param>\r
1707     </member>\r
1708     <member name="M:System.Security.Cryptography.DeriveBytes.GetBytes(System.Int32)">\r
1709       <summary>When overridden in a derived class, returns pseudo-random key bytes.</summary>\r
1710       <param name="cb">The number of pseudo-random key bytes to generate.</param>\r
1711       <returns>A byte array filled with pseudo-random key bytes.</returns>\r
1712     </member>\r
1713     <member name="M:System.Security.Cryptography.DeriveBytes.Reset">\r
1714       <summary>When overridden in a derived class, resets the state of the operation.</summary>\r
1715     </member>\r
1716     <member name="T:System.Security.Cryptography.DES">\r
1717       <summary>Represents the base class for the Data Encryption Standard (DES) algorithm from which all <see cref="T:System.Security.Cryptography.DES"></see> implementations must derive.</summary>\r
1718     </member>\r
1719     <member name="M:System.Security.Cryptography.DES.#ctor">\r
1720       <summary>Initializes a new instance of the <see cref="T:System.Security.Cryptography.DES"></see> class.</summary>\r
1721     </member>\r
1722     <member name="M:System.Security.Cryptography.DES.Create">\r
1723       <summary>Creates an instance of a cryptographic object to perform the Data Encryption Standard (<see cref="T:System.Security.Cryptography.DES"></see>) algorithm.</summary>\r
1724       <returns>A cryptographic object.</returns>\r
1725     </member>\r
1726     <member name="M:System.Security.Cryptography.DES.Create(System.String)">\r
1727       <summary>Creates an instance of a cryptographic object to perform the specified implementation of the Data Encryption Standard (<see cref="T:System.Security.Cryptography.DES"></see>) algorithm.</summary>\r
1728       <param name="algName">The name of the specific implementation of <see cref="T:System.Security.Cryptography.DES"></see> to use.</param>\r
1729       <returns>A cryptographic object.</returns>\r
1730     </member>\r
1731     <member name="M:System.Security.Cryptography.DES.IsSemiWeakKey(System.Byte[])">\r
1732       <summary>Determines whether the specified key is semi-weak.</summary>\r
1733       <param name="rgbKey">The secret key to test for semi-weakness.</param>\r
1734       <returns>true if the key is semi-weak; otherwise, false.</returns>\r
1735       <exception cref="T:System.Security.Cryptography.CryptographicException">The size of the <paramref name="rgbKey">rgbKey</paramref> parameter is not valid.</exception>\r
1736     </member>\r
1737     <member name="M:System.Security.Cryptography.DES.IsWeakKey(System.Byte[])">\r
1738       <summary>Determines whether the specified key is weak.</summary>\r
1739       <param name="rgbKey">The secret key to test for weakness.</param>\r
1740       <returns>true if the key is weak; otherwise, false.</returns>\r
1741       <exception cref="T:System.Security.Cryptography.CryptographicException">The size of the <paramref name="rgbKey">rgbKey</paramref> parameter is not valid.</exception>\r
1742     </member>\r
1743     <member name="P:System.Security.Cryptography.DES.Key">\r
1744       <summary>Gets or sets the secret key for the Data Encryption Standard (<see cref="T:System.Security.Cryptography.DES"></see>) algorithm.</summary>\r
1745       <returns>The secret key for the <see cref="T:System.Security.Cryptography.DES"></see> algorithm.</returns>\r
1746       <exception cref="T:System.ArgumentNullException">An attempt was made to set the key to null.</exception>\r
1747       <exception cref="T:System.ArgumentException">An attempt was made to set a key whose length is not equal to <see cref="F:System.Security.Cryptography.SymmetricAlgorithm.BlockSizeValue"></see>.</exception>\r
1748       <exception cref="T:System.Security.Cryptography.CryptographicException">An attempt was made to set a weak key (see <see cref="M:System.Security.Cryptography.DES.IsWeakKey(System.Byte[])"></see>) or a semi-weak key (see <see cref="M:System.Security.Cryptography.DES.IsSemiWeakKey(System.Byte[])"></see>).</exception>\r
1749     </member>\r
1750     <member name="T:System.Security.Cryptography.DSA">\r
1751       <summary>Represents the abstract base class from which all implementations of the Digital Signature Algorithm (<see cref="T:System.Security.Cryptography.DSA"></see>) must inherit.</summary>\r
1752     </member>\r
1753     <member name="M:System.Security.Cryptography.DSA.#ctor">\r
1754       <summary>Initializes a new instance of the <see cref="T:System.Security.Cryptography.DSA"></see> class.</summary>\r
1755     </member>\r
1756     <member name="M:System.Security.Cryptography.DSA.Create">\r
1757       <summary>Creates the default cryptographic object used to perform the asymmetric algorithm.</summary>\r
1758       <returns>A cryptographic object used to perform the asymmetric algorithm.</returns>\r
1759     </member>\r
1760     <member name="M:System.Security.Cryptography.DSA.Create(System.Int32)">\r
1761       <param name="keySizeInBits"></param>\r
1762       <returns></returns>\r
1763     </member>\r
1764     <member name="M:System.Security.Cryptography.DSA.Create(System.Security.Cryptography.DSAParameters)">\r
1765       <param name="parameters"></param>\r
1766       <returns></returns>\r
1767     </member>\r
1768     <member name="M:System.Security.Cryptography.DSA.Create(System.String)">\r
1769       <summary>Creates the specified cryptographic object used to perform the asymmetric algorithm.</summary>\r
1770       <param name="algName">The name of the specific implementation of <see cref="T:System.Security.Cryptography.DSA"></see> to use.</param>\r
1771       <returns>A cryptographic object used to perform the asymmetric algorithm.</returns>\r
1772     </member>\r
1773     <member name="M:System.Security.Cryptography.DSA.CreateSignature(System.Byte[])">\r
1774       <summary>When overridden in a derived class, creates the <see cref="T:System.Security.Cryptography.DSA"></see> signature for the specified data.</summary>\r
1775       <param name="rgbHash">The data to be signed.</param>\r
1776       <returns>The digital signature for the specified data.</returns>\r
1777     </member>\r
1778     <member name="M:System.Security.Cryptography.DSA.ExportParameters(System.Boolean)">\r
1779       <summary>When overridden in a derived class, exports the <see cref="T:System.Security.Cryptography.DSAParameters"></see>.</summary>\r
1780       <param name="includePrivateParameters">true to include private parameters; otherwise, false.</param>\r
1781       <returns>The parameters for <see cref="T:System.Security.Cryptography.DSA"></see>.</returns>\r
1782     </member>\r
1783     <member name="M:System.Security.Cryptography.DSA.FromXmlString(System.String)">\r
1784       <summary>Reconstructs a <see cref="T:System.Security.Cryptography.DSA"></see> object from an XML string.</summary>\r
1785       <param name="xmlString">The XML string to use to reconstruct the <see cref="T:System.Security.Cryptography.DSA"></see> object.</param>\r
1786       <exception cref="T:System.ArgumentNullException">The <paramref name="xmlString">xmlString</paramref> parameter is null.</exception>\r
1787       <exception cref="T:System.Security.Cryptography.CryptographicException">The format of the <paramref name="xmlString">xmlString</paramref> parameter is not valid.</exception>\r
1788     </member>\r
1789     <member name="M:System.Security.Cryptography.DSA.HashData(System.Byte[],System.Int32,System.Int32,System.Security.Cryptography.HashAlgorithmName)">\r
1790       <summary>When overridden in a derived class, computes the hash value of a specified portion of a byte array by using a specified hashing algorithm.</summary>\r
1791       <param name="data">The data to be hashed.</param>\r
1792       <param name="offset">The index of the first byte in data that is to be hashed.</param>\r
1793       <param name="count">The number of bytes to hash.</param>\r
1794       <param name="hashAlgorithm">The algorithm to use to hash the data.</param>\r
1795       <returns>The hashed data.</returns>\r
1796       <exception cref="T:System.NotImplementedException">A derived class must override this method.</exception>\r
1797     </member>\r
1798     <member name="M:System.Security.Cryptography.DSA.HashData(System.IO.Stream,System.Security.Cryptography.HashAlgorithmName)">\r
1799       <summary>When overridden in a derived class, computes the hash value of a specified binary stream by using a specified hashing algorithm.</summary>\r
1800       <param name="data">The binary stream to hash.</param>\r
1801       <param name="hashAlgorithm">The algorithm to use to hash the data.</param>\r
1802       <returns>The hashed data.</returns>\r
1803       <exception cref="T:System.NotImplementedException">A derived class must override this method.</exception>\r
1804     </member>\r
1805     <member name="M:System.Security.Cryptography.DSA.ImportParameters(System.Security.Cryptography.DSAParameters)">\r
1806       <summary>When overridden in a derived class, imports the specified <see cref="T:System.Security.Cryptography.DSAParameters"></see>.</summary>\r
1807       <param name="parameters">The parameters for <see cref="T:System.Security.Cryptography.DSA"></see>.</param>\r
1808     </member>\r
1809     <member name="M:System.Security.Cryptography.DSA.SignData(System.Byte[],System.Security.Cryptography.HashAlgorithmName)">\r
1810       <summary>Computes the hash value of the specified byte array using the specified hash algorithm and signs the resulting hash value.</summary>\r
1811       <param name="data">The input data for which to compute the hash.</param>\r
1812       <param name="hashAlgorithm">The hash algorithm to use to create the hash value.</param>\r
1813       <returns>The DSA signature for the specified data.</returns>\r
1814       <exception cref="T:System.ArgumentNullException"><paramref name="data">data</paramref> is null.</exception>\r
1815       <exception cref="T:System.ArgumentException"><paramref name="hashAlgorithm">hashAlgorithm</paramref>.<see cref="P:System.Security.Cryptography.HashAlgorithmName.Name"></see> is null or <see cref="F:System.String.Empty"></see>.</exception>\r
1816     </member>\r
1817     <member name="M:System.Security.Cryptography.DSA.SignData(System.IO.Stream,System.Security.Cryptography.HashAlgorithmName)">\r
1818       <summary>Computes the hash value of the specified stream using the specified hash algorithm and signs the resulting hash value.</summary>\r
1819       <param name="data">The input stream for which to compute the hash.</param>\r
1820       <param name="hashAlgorithm">The hash algorithm to use to create the hash value.</param>\r
1821       <returns>The DSA signature for the specified data.</returns>\r
1822       <exception cref="T:System.ArgumentNullException"><paramref name="data">data</paramref> is null.</exception>\r
1823       <exception cref="T:System.ArgumentException"><paramref name="hashAlgorithm">hashAlgorithm</paramref>.<see cref="P:System.Security.Cryptography.HashAlgorithmName.Name"></see> is null or <see cref="F:System.String.Empty"></see>.</exception>\r
1824     </member>\r
1825     <member name="M:System.Security.Cryptography.DSA.SignData(System.Byte[],System.Int32,System.Int32,System.Security.Cryptography.HashAlgorithmName)">\r
1826       <summary>Computes the hash value of a portion of the specified byte array using the specified hash algorithm and signs the resulting hash value.</summary>\r
1827       <param name="data">The input data for which to compute the hash.</param>\r
1828       <param name="offset">The offset into the array at which to begin using data.</param>\r
1829       <param name="count">The number of bytes in the array to use as data.</param>\r
1830       <param name="hashAlgorithm">The hash algorithm to use to create the hash value.</param>\r
1831       <returns>The DSA signature for the specified data.</returns>\r
1832       <exception cref="T:System.ArgumentNullException"><paramref name="data">data</paramref> is null.</exception>\r
1833       <exception cref="T:System.ArgumentException"><paramref name="hashAlgorithm">hashAlgorithm</paramref>.<see cref="P:System.Security.Cryptography.HashAlgorithmName.Name"></see> is null or <see cref="F:System.String.Empty"></see>.</exception>\r
1834       <exception cref="T:System.ArgumentOutOfRangeException"><paramref name="offset">offset</paramref> is less than zero.   -or-  <paramref name="count">count</paramref> is less than zero.   -or-  <paramref name="offset">offset</paramref> + <paramref name="count">count</paramref> – 1 results in an index that is beyond the upper bound of <paramref name="data">data</paramref>.</exception>\r
1835     </member>\r
1836     <member name="M:System.Security.Cryptography.DSA.ToXmlString(System.Boolean)">\r
1837       <summary>Creates and returns an XML string representation of the current <see cref="T:System.Security.Cryptography.DSA"></see> object.</summary>\r
1838       <param name="includePrivateParameters">true to include private parameters; otherwise, false.</param>\r
1839       <returns>An XML string encoding of the current <see cref="T:System.Security.Cryptography.DSA"></see> object.</returns>\r
1840     </member>\r
1841     <member name="M:System.Security.Cryptography.DSA.VerifyData(System.Byte[],System.Int32,System.Int32,System.Byte[],System.Security.Cryptography.HashAlgorithmName)">\r
1842       <summary>Verifies that a digital signature is valid by calculating the hash value of the data in a portion of a byte array using the specified hash algorithm and comparing it to the provided signature.</summary>\r
1843       <param name="data">The signed data.</param>\r
1844       <param name="offset">The starting index at which to compute the hash.</param>\r
1845       <param name="count">The number of bytes to hash.</param>\r
1846       <param name="signature">The signature data to be verified.</param>\r
1847       <param name="hashAlgorithm">The hash algorithm used to create the hash value of the data.</param>\r
1848       <returns>true if the digital signature is valid; otherwise, false.</returns>\r
1849       <exception cref="T:System.ArgumentNullException"><paramref name="data">data</paramref> is null.   -or-  <paramref name="signature">signature</paramref> is null.</exception>\r
1850       <exception cref="T:System.ArgumentException"><paramref name="hashAlgorithm">hashAlgorithm</paramref>.<see cref="P:System.Security.Cryptography.HashAlgorithmName.Name"></see> is null or <see cref="F:System.String.Empty"></see>.</exception>\r
1851       <exception cref="T:System.ArgumentOutOfRangeException"><paramref name="offset">offset</paramref> is less than zero.   -or-  <paramref name="count">count</paramref> is less than zero.   -or-  <paramref name="offset">offset</paramref> + <paramref name="count">count</paramref> – 1 results in an index that is beyond the upper bound of <paramref name="data">data</paramref>.</exception>\r
1852     </member>\r
1853     <member name="M:System.Security.Cryptography.DSA.VerifyData(System.Byte[],System.Byte[],System.Security.Cryptography.HashAlgorithmName)">\r
1854       <summary>Verifies that a digital signature is valid by calculating the hash value of the specified data using the specified hash algorithm and comparing it to the provided signature.</summary>\r
1855       <param name="data">The signed data.</param>\r
1856       <param name="signature">The signature data to be verified.</param>\r
1857       <param name="hashAlgorithm">The hash algorithm used to create the hash value of the data.</param>\r
1858       <returns>true if the digital signature is valid; otherwise, false.</returns>\r
1859       <exception cref="T:System.ArgumentNullException"><paramref name="data">data</paramref> is null.   -or-  <paramref name="signature">signature</paramref> is null.</exception>\r
1860       <exception cref="T:System.ArgumentException"><paramref name="hashAlgorithm">hashAlgorithm</paramref>.<see cref="P:System.Security.Cryptography.HashAlgorithmName.Name"></see> is null or <see cref="F:System.String.Empty"></see>.</exception>\r
1861     </member>\r
1862     <member name="M:System.Security.Cryptography.DSA.VerifyData(System.IO.Stream,System.Byte[],System.Security.Cryptography.HashAlgorithmName)">\r
1863       <summary>Verifies that a digital signature is valid by calculating the hash value of the specified stream using the specified hash algorithm and comparing it to the provided signature.</summary>\r
1864       <param name="data">The signed data.</param>\r
1865       <param name="signature">The signature data to be verified.</param>\r
1866       <param name="hashAlgorithm">The hash algorithm used to create the hash value of the data.</param>\r
1867       <returns>true if the digital signature is valid; otherwise, false.</returns>\r
1868       <exception cref="T:System.ArgumentNullException"><paramref name="data">data</paramref> is null.   -or-  <paramref name="signature">signature</paramref> is null.</exception>\r
1869       <exception cref="T:System.ArgumentException"><paramref name="hashAlgorithm">hashAlgorithm</paramref>.<see cref="P:System.Security.Cryptography.HashAlgorithmName.Name"></see> is null or <see cref="F:System.String.Empty"></see>.</exception>\r
1870     </member>\r
1871     <member name="M:System.Security.Cryptography.DSA.VerifySignature(System.Byte[],System.Byte[])">\r
1872       <summary>When overridden in a derived class, verifies the <see cref="T:System.Security.Cryptography.DSA"></see> signature for the specified data.</summary>\r
1873       <param name="rgbHash">The hash of the data signed with rgbSignature.</param>\r
1874       <param name="rgbSignature">The signature to be verified for rgbData.</param>\r
1875       <returns>true if <paramref name="rgbSignature">rgbSignature</paramref> matches the signature computed using the specified hash algorithm and key on <paramref name="rgbHash">rgbHash</paramref>; otherwise, false.</returns>\r
1876     </member>\r
1877     <member name="T:System.Security.Cryptography.DSAParameters">\r
1878       <summary>Contains the typical parameters for the <see cref="T:System.Security.Cryptography.DSA"></see> algorithm.</summary>\r
1879     </member>\r
1880     <member name="F:System.Security.Cryptography.DSAParameters.Counter">\r
1881       <summary>Specifies the counter for the <see cref="T:System.Security.Cryptography.DSA"></see> algorithm.</summary>\r
1882       <returns></returns>\r
1883     </member>\r
1884     <member name="F:System.Security.Cryptography.DSAParameters.G">\r
1885       <summary>Specifies the G parameter for the <see cref="T:System.Security.Cryptography.DSA"></see> algorithm.</summary>\r
1886       <returns></returns>\r
1887     </member>\r
1888     <member name="F:System.Security.Cryptography.DSAParameters.J">\r
1889       <summary>Specifies the J parameter for the <see cref="T:System.Security.Cryptography.DSA"></see> algorithm.</summary>\r
1890       <returns></returns>\r
1891     </member>\r
1892     <member name="F:System.Security.Cryptography.DSAParameters.P">\r
1893       <summary>Specifies the P parameter for the <see cref="T:System.Security.Cryptography.DSA"></see> algorithm.</summary>\r
1894       <returns></returns>\r
1895     </member>\r
1896     <member name="F:System.Security.Cryptography.DSAParameters.Q">\r
1897       <summary>Specifies the Q parameter for the <see cref="T:System.Security.Cryptography.DSA"></see> algorithm.</summary>\r
1898       <returns></returns>\r
1899     </member>\r
1900     <member name="F:System.Security.Cryptography.DSAParameters.Seed">\r
1901       <summary>Specifies the seed for the <see cref="T:System.Security.Cryptography.DSA"></see> algorithm.</summary>\r
1902       <returns></returns>\r
1903     </member>\r
1904     <member name="F:System.Security.Cryptography.DSAParameters.X">\r
1905       <summary>Specifies the X parameter for the <see cref="T:System.Security.Cryptography.DSA"></see> algorithm.</summary>\r
1906       <returns></returns>\r
1907     </member>\r
1908     <member name="F:System.Security.Cryptography.DSAParameters.Y">\r
1909       <summary>Specifies the Y parameter for the <see cref="T:System.Security.Cryptography.DSA"></see> algorithm.</summary>\r
1910       <returns></returns>\r
1911     </member>\r
1912     <member name="T:System.Security.Cryptography.DSASignatureDeformatter">\r
1913       <summary>Verifies a Digital Signature Algorithm (<see cref="T:System.Security.Cryptography.DSA"></see>) PKCS#1 v1.5 signature.</summary>\r
1914     </member>\r
1915     <member name="M:System.Security.Cryptography.DSASignatureDeformatter.#ctor">\r
1916       <summary>Initializes a new instance of the <see cref="T:System.Security.Cryptography.DSASignatureDeformatter"></see> class.</summary>\r
1917     </member>\r
1918     <member name="M:System.Security.Cryptography.DSASignatureDeformatter.#ctor(System.Security.Cryptography.AsymmetricAlgorithm)">\r
1919       <summary>Initializes a new instance of the <see cref="T:System.Security.Cryptography.DSASignatureDeformatter"></see> class with the specified key.</summary>\r
1920       <param name="key">The instance of Digital Signature Algorithm (<see cref="T:System.Security.Cryptography.DSA"></see>) that holds the key.</param>\r
1921       <exception cref="T:System.ArgumentNullException"><paramref name="key">key</paramref> is null.</exception>\r
1922     </member>\r
1923     <member name="M:System.Security.Cryptography.DSASignatureDeformatter.SetHashAlgorithm(System.String)">\r
1924       <summary>Specifies the hash algorithm for the Digital Signature Algorithm (<see cref="T:System.Security.Cryptography.DSA"></see>) signature deformatter.</summary>\r
1925       <param name="strName">The name of the hash algorithm to use for the signature deformatter.</param>\r
1926       <exception cref="T:System.Security.Cryptography.CryptographicUnexpectedOperationException">The <paramref name="strName">strName</paramref> parameter does not map to the <see cref="T:System.Security.Cryptography.SHA1"></see> hash algorithm.</exception>\r
1927     </member>\r
1928     <member name="M:System.Security.Cryptography.DSASignatureDeformatter.SetKey(System.Security.Cryptography.AsymmetricAlgorithm)">\r
1929       <summary>Specifies the key to be used for the Digital Signature Algorithm (<see cref="T:System.Security.Cryptography.DSA"></see>) signature deformatter.</summary>\r
1930       <param name="key">The instance of <see cref="T:System.Security.Cryptography.DSA"></see> that holds the key.</param>\r
1931       <exception cref="T:System.ArgumentNullException"><paramref name="key">key</paramref> is null.</exception>\r
1932     </member>\r
1933     <member name="M:System.Security.Cryptography.DSASignatureDeformatter.VerifySignature(System.Byte[],System.Byte[])">\r
1934       <summary>Verifies the Digital Signature Algorithm (<see cref="T:System.Security.Cryptography.DSA"></see>) signature on the data.</summary>\r
1935       <param name="rgbHash">The data signed with rgbSignature.</param>\r
1936       <param name="rgbSignature">The signature to be verified for rgbHash.</param>\r
1937       <returns>true if the signature is valid for the data; otherwise, false.</returns>\r
1938       <exception cref="T:System.ArgumentNullException"><paramref name="rgbHash">rgbHash</paramref> is null.   -or-  <paramref name="rgbSignature">rgbSignature</paramref> is null.</exception>\r
1939       <exception cref="T:System.Security.Cryptography.CryptographicUnexpectedOperationException">The DSA key is missing.</exception>\r
1940     </member>\r
1941     <member name="T:System.Security.Cryptography.DSASignatureFormatter">\r
1942       <summary>Creates a Digital Signature Algorithm (<see cref="T:System.Security.Cryptography.DSA"></see>) signature.</summary>\r
1943     </member>\r
1944     <member name="M:System.Security.Cryptography.DSASignatureFormatter.#ctor">\r
1945       <summary>Initializes a new instance of the <see cref="T:System.Security.Cryptography.DSASignatureFormatter"></see> class.</summary>\r
1946     </member>\r
1947     <member name="M:System.Security.Cryptography.DSASignatureFormatter.#ctor(System.Security.Cryptography.AsymmetricAlgorithm)">\r
1948       <summary>Initializes a new instance of the <see cref="T:System.Security.Cryptography.DSASignatureFormatter"></see> class with the specified key.</summary>\r
1949       <param name="key">The instance of the Digital Signature Algorithm (<see cref="T:System.Security.Cryptography.DSA"></see>) that holds the key.</param>\r
1950       <exception cref="T:System.ArgumentNullException"><paramref name="key">key</paramref> is null.</exception>\r
1951     </member>\r
1952     <member name="M:System.Security.Cryptography.DSASignatureFormatter.CreateSignature(System.Byte[])">\r
1953       <summary>Creates the Digital Signature Algorithm (<see cref="T:System.Security.Cryptography.DSA"></see>) PKCS #1 signature for the specified data.</summary>\r
1954       <param name="rgbHash">The data to be signed.</param>\r
1955       <returns>The digital signature for the specified data.</returns>\r
1956       <exception cref="T:System.ArgumentNullException"><paramref name="rgbHash">rgbHash</paramref> is null.</exception>\r
1957       <exception cref="T:System.Security.Cryptography.CryptographicUnexpectedOperationException">The OID is null.   -or-   The DSA key is null.</exception>\r
1958     </member>\r
1959     <member name="M:System.Security.Cryptography.DSASignatureFormatter.SetHashAlgorithm(System.String)">\r
1960       <summary>Specifies the hash algorithm for the Digital Signature Algorithm (<see cref="T:System.Security.Cryptography.DSA"></see>) signature formatter.</summary>\r
1961       <param name="strName">The name of the hash algorithm to use for the signature formatter.</param>\r
1962       <exception cref="T:System.Security.Cryptography.CryptographicUnexpectedOperationException">The <paramref name="strName">strName</paramref> parameter does not map to the <see cref="T:System.Security.Cryptography.SHA1"></see> hash algorithm.</exception>\r
1963     </member>\r
1964     <member name="M:System.Security.Cryptography.DSASignatureFormatter.SetKey(System.Security.Cryptography.AsymmetricAlgorithm)">\r
1965       <summary>Specifies the key to be used for the Digital Signature Algorithm (<see cref="T:System.Security.Cryptography.DSA"></see>) signature formatter.</summary>\r
1966       <param name="key">The instance of <see cref="T:System.Security.Cryptography.DSA"></see> that holds the key.</param>\r
1967       <exception cref="T:System.ArgumentNullException"><paramref name="key">key</paramref> is null.</exception>\r
1968     </member>\r
1969     <member name="T:System.Security.Cryptography.ECCurve.ECCurveType">\r
1970       <summary>Indicates how to interpret the data contained in an <see cref="T:System.Security.Cryptography.ECCurve"></see> object.</summary>\r
1971     </member>\r
1972     <member name="F:System.Security.Cryptography.ECCurve.ECCurveType.Characteristic2">\r
1973       <summary>The curve parameters represent a characteristic 2 curve.</summary>\r
1974       <returns></returns>\r
1975     </member>\r
1976     <member name="F:System.Security.Cryptography.ECCurve.ECCurveType.Implicit">\r
1977       <summary>No curve data is interpreted. The caller is assumed to know what the curve is.</summary>\r
1978       <returns></returns>\r
1979     </member>\r
1980     <member name="F:System.Security.Cryptography.ECCurve.ECCurveType.Named">\r
1981       <summary>The curve parameters represent a named curve.</summary>\r
1982       <returns></returns>\r
1983     </member>\r
1984     <member name="F:System.Security.Cryptography.ECCurve.ECCurveType.PrimeMontgomery">\r
1985       <summary>The curve parameters represent a prime curve with the formula By^2 = x^3 + A\x^2 + x.</summary>\r
1986       <returns></returns>\r
1987     </member>\r
1988     <member name="F:System.Security.Cryptography.ECCurve.ECCurveType.PrimeShortWeierstrass">\r
1989       <summary>The curve parameters represent a prime curve with the formula y^2 = x^3 + A*x + B in the prime field P.</summary>\r
1990       <returns></returns>\r
1991     </member>\r
1992     <member name="F:System.Security.Cryptography.ECCurve.ECCurveType.PrimeTwistedEdwards">\r
1993       <summary>The curve parameters represent a prime curve with the formula Ax^2 + y^2 = 1 + B\x^2*y^2 in the prime field P.</summary>\r
1994       <returns></returns>\r
1995     </member>\r
1996     <member name="T:System.Security.Cryptography.ECCurve.NamedCurves">\r
1997       <summary>Represents a factory class for creating named curves.</summary>\r
1998     </member>\r
1999     <member name="P:System.Security.Cryptography.ECCurve.NamedCurves.brainpoolP160r1">\r
2000       <summary>Gets a brainpoolP160r1 named curve.</summary>\r
2001       <returns>A brainpoolP160r1 named curve.</returns>\r
2002     </member>\r
2003     <member name="P:System.Security.Cryptography.ECCurve.NamedCurves.brainpoolP160t1">\r
2004       <summary>Gets a brainpoolP160t1 named curve.</summary>\r
2005       <returns>A brainpoolP160t1 named curve.</returns>\r
2006     </member>\r
2007     <member name="P:System.Security.Cryptography.ECCurve.NamedCurves.brainpoolP192r1">\r
2008       <summary>Gets a brainpoolP192r1 named curve.</summary>\r
2009       <returns>A brainpoolP192r1 named curve.</returns>\r
2010     </member>\r
2011     <member name="P:System.Security.Cryptography.ECCurve.NamedCurves.brainpoolP192t1">\r
2012       <summary>Gets a brainpoolP192t1 named curve.</summary>\r
2013       <returns>A brainpoolP192t1 named curve.</returns>\r
2014     </member>\r
2015     <member name="P:System.Security.Cryptography.ECCurve.NamedCurves.brainpoolP224r1">\r
2016       <summary>Gets a brainpoolP224r1 named curve.</summary>\r
2017       <returns>A brainpoolP224r1 named curve.</returns>\r
2018     </member>\r
2019     <member name="P:System.Security.Cryptography.ECCurve.NamedCurves.brainpoolP224t1">\r
2020       <summary>Gets a brainpoolP224t1 named curve.</summary>\r
2021       <returns>A brainpoolP224t1 named curve.</returns>\r
2022     </member>\r
2023     <member name="P:System.Security.Cryptography.ECCurve.NamedCurves.brainpoolP256r1">\r
2024       <summary>Gets a brainpoolP256r1 named curve.</summary>\r
2025       <returns>A brainpoolP256r1 named curve.</returns>\r
2026     </member>\r
2027     <member name="P:System.Security.Cryptography.ECCurve.NamedCurves.brainpoolP256t1">\r
2028       <summary>Gets a brainpoolP256t1 named curve.</summary>\r
2029       <returns>A brainpoolP256t1 named curve.</returns>\r
2030     </member>\r
2031     <member name="P:System.Security.Cryptography.ECCurve.NamedCurves.brainpoolP320r1">\r
2032       <summary>Gets a brainpoolP320r1 named curve.</summary>\r
2033       <returns>A brainpoolP320r1 named curve.</returns>\r
2034     </member>\r
2035     <member name="P:System.Security.Cryptography.ECCurve.NamedCurves.brainpoolP320t1">\r
2036       <summary>Gets a brainpoolP320t1 named curve.</summary>\r
2037       <returns>A brainpoolP320t1 named curve.</returns>\r
2038     </member>\r
2039     <member name="P:System.Security.Cryptography.ECCurve.NamedCurves.brainpoolP384r1">\r
2040       <summary>Gets a brainpoolP384r1 named curve.</summary>\r
2041       <returns>A brainpoolP384r1 named curve.</returns>\r
2042     </member>\r
2043     <member name="P:System.Security.Cryptography.ECCurve.NamedCurves.brainpoolP384t1">\r
2044       <summary>Gets a brainpoolP384t1 named curve.</summary>\r
2045       <returns>A brainpoolP384t1 named curve.</returns>\r
2046     </member>\r
2047     <member name="P:System.Security.Cryptography.ECCurve.NamedCurves.brainpoolP512r1">\r
2048       <summary>Gets a brainpoolP512r1 named curve.</summary>\r
2049       <returns>A brainpoolP512r1 named curve.</returns>\r
2050     </member>\r
2051     <member name="P:System.Security.Cryptography.ECCurve.NamedCurves.brainpoolP512t1">\r
2052       <summary>Gets a brainpoolP512t1 named curve.</summary>\r
2053       <returns>A brainpoolP512t1 named curve.</returns>\r
2054     </member>\r
2055     <member name="P:System.Security.Cryptography.ECCurve.NamedCurves.nistP256">\r
2056       <summary>Gets a nistP256 named curve.</summary>\r
2057       <returns>A nistP256 named curve.</returns>\r
2058     </member>\r
2059     <member name="P:System.Security.Cryptography.ECCurve.NamedCurves.nistP384">\r
2060       <summary>Gets a nistP384 named curve.</summary>\r
2061       <returns>A nistP384 named curve.</returns>\r
2062     </member>\r
2063     <member name="P:System.Security.Cryptography.ECCurve.NamedCurves.nistP521">\r
2064       <summary>Gets a nistP521 named curve.</summary>\r
2065       <returns>A nistP521 named curve.</returns>\r
2066     </member>\r
2067     <member name="T:System.Security.Cryptography.ECCurve">\r
2068       <summary>Represents an elliptic curve.</summary>\r
2069     </member>\r
2070     <member name="F:System.Security.Cryptography.ECCurve.A">\r
2071       <summary>The first coefficient for an explicit curve. A for short Weierstrass, Montgomery, and Twisted Edwards curves.</summary>\r
2072       <returns></returns>\r
2073     </member>\r
2074     <member name="F:System.Security.Cryptography.ECCurve.B">\r
2075       <summary>The second coefficient for an explicit curve. B for short Weierstrass and d for Twisted Edwards curves.</summary>\r
2076       <returns></returns>\r
2077     </member>\r
2078     <member name="F:System.Security.Cryptography.ECCurve.Cofactor">\r
2079       <summary>The cofactor of the curve.</summary>\r
2080       <returns></returns>\r
2081     </member>\r
2082     <member name="M:System.Security.Cryptography.ECCurve.CreateFromFriendlyName(System.String)">\r
2083       <summary>Creates a named curve using the specified friendly name of the identifier.</summary>\r
2084       <param name="oidFriendlyName">The friendly name of the identifier.</param>\r
2085       <returns>An object representing the named curve.</returns>\r
2086       <exception cref="T:System.ArgumentNullException"><paramref name="oidFriendlyName">oidFriendlyName</paramref> is null.</exception>\r
2087     </member>\r
2088     <member name="M:System.Security.Cryptography.ECCurve.CreateFromOid(System.Security.Cryptography.Oid)">\r
2089       <summary>Creates a named curve using the specified <see cref="T:System.Security.Cryptography.Oid"></see> object.</summary>\r
2090       <param name="curveOid">The object identifier to use.</param>\r
2091       <returns>An object representing the named curve.</returns>\r
2092     </member>\r
2093     <member name="M:System.Security.Cryptography.ECCurve.CreateFromValue(System.String)">\r
2094       <summary>Creates a named curve using the specified dotted-decimal representation of the identifier.</summary>\r
2095       <param name="oidValue">The dotted number of the identifier.</param>\r
2096       <returns>An object representing the named curve.</returns>\r
2097       <exception cref="T:System.ArgumentNullException"><paramref name="oidValue">oidValue</paramref> is null.</exception>\r
2098     </member>\r
2099     <member name="F:System.Security.Cryptography.ECCurve.CurveType">\r
2100       <summary>Identifies the composition of the <see cref="T:System.Security.Cryptography.ECCurve"></see> object.</summary>\r
2101       <returns></returns>\r
2102     </member>\r
2103     <member name="F:System.Security.Cryptography.ECCurve.G">\r
2104       <summary>The generator, or base point, for operations on the curve.</summary>\r
2105       <returns></returns>\r
2106     </member>\r
2107     <member name="F:System.Security.Cryptography.ECCurve.Hash">\r
2108       <summary>The name of the hash algorithm which was used to generate the curve coefficients (<see cref="F:System.Security.Cryptography.ECCurve.A"></see> and <see cref="F:System.Security.Cryptography.ECCurve.B"></see>) from the <see cref="F:System.Security.Cryptography.ECCurve.Seed"></see> under the ANSI X9.62 generation algorithm. Applies only to explicit curves.</summary>\r
2109       <returns></returns>\r
2110     </member>\r
2111     <member name="P:System.Security.Cryptography.ECCurve.IsCharacteristic2">\r
2112       <summary>Gets a value that indicates whether the curve type indicates an explicit characteristic 2 curve.</summary>\r
2113       <returns>true if the curve is an explicit characteristic 2 curve; false if the curve is a named characteristic 2, prime, or implicit curve.</returns>\r
2114     </member>\r
2115     <member name="P:System.Security.Cryptography.ECCurve.IsExplicit">\r
2116       <summary>Gets a value that indicates whether the curve type indicates an explicit curve (either prime or characteristic 2).</summary>\r
2117       <returns>true if the curve is an explicit curve (either prime or characteristic 2); false if the curve is a named or implicit curve.</returns>\r
2118     </member>\r
2119     <member name="P:System.Security.Cryptography.ECCurve.IsNamed">\r
2120       <summary>Gets a value that indicates whether the curve type indicates a named curve.</summary>\r
2121       <returns>true if the curve is a named curve; false if the curve is an implict or an  explicit curve (either prime or characteristic 2).</returns>\r
2122     </member>\r
2123     <member name="P:System.Security.Cryptography.ECCurve.IsPrime">\r
2124       <summary>Gets a value that indicates whether the curve type indicates an explicit prime curve.</summary>\r
2125       <returns>true if the curve is an explicit prime curve; false if the curve is a named prime, characteristic 2 or implicit curves.</returns>\r
2126     </member>\r
2127     <member name="P:System.Security.Cryptography.ECCurve.Oid">\r
2128       <summary>Gets the identifier of a named curve.</summary>\r
2129       <returns>The identifier of a named curve.</returns>\r
2130     </member>\r
2131     <member name="F:System.Security.Cryptography.ECCurve.Order">\r
2132       <summary>The order of the curve. Applies only to explicit curves.</summary>\r
2133       <returns></returns>\r
2134     </member>\r
2135     <member name="F:System.Security.Cryptography.ECCurve.Polynomial">\r
2136       <summary>The curve polynomial. Applies only to characteristic 2 curves.</summary>\r
2137       <returns></returns>\r
2138     </member>\r
2139     <member name="F:System.Security.Cryptography.ECCurve.Prime">\r
2140       <summary>The prime specifying the base field. Applies only to prime curves.</summary>\r
2141       <returns></returns>\r
2142     </member>\r
2143     <member name="F:System.Security.Cryptography.ECCurve.Seed">\r
2144       <summary>The seed value for coefficient generation under the ANSI X9.62 generation algorithm. Applies only to explicit curves.</summary>\r
2145       <returns></returns>\r
2146     </member>\r
2147     <member name="M:System.Security.Cryptography.ECCurve.Validate">\r
2148       <summary>Validates the integrity of the current curve. Throws a <see cref="T:System.Security.Cryptography.CryptographicException"></see> exception if the structure is not valid.</summary>\r
2149       <exception cref="T:System.Security.Cryptography.CryptographicException">The curve parameters are not valid for the current curve type.</exception>\r
2150     </member>\r
2151   </members>\r
2152 </doc></span>