1 <?xml version="1.0" encoding="utf-8"?><span>
\r
4 <name>System.Security.Cryptography.Algorithms</name>
\r
7 <member name="T:System.Security.Cryptography.PKCS1MaskGenerationMethod">
\r
8 <summary>Computes masks according to PKCS #1 for use by key exchange algorithms.</summary>
\r
10 <member name="M:System.Security.Cryptography.PKCS1MaskGenerationMethod.#ctor">
\r
11 <summary>Initializes a new instance of the <see cref="T:System.Security.Cryptography.PKCS1MaskGenerationMethod"></see> class.</summary>
\r
13 <member name="M:System.Security.Cryptography.PKCS1MaskGenerationMethod.GenerateMask(System.Byte[],System.Int32)">
\r
14 <summary>Generates and returns a mask from the specified random seed of the specified length.</summary>
\r
15 <param name="rgbSeed">The random seed to use for computing the mask.</param>
\r
16 <param name="cbReturn">The length of the generated mask in bytes.</param>
\r
17 <returns>A randomly generated mask whose length is equal to the <paramref name="cbReturn">cbReturn</paramref> parameter.</returns>
\r
19 <member name="P:System.Security.Cryptography.PKCS1MaskGenerationMethod.HashName">
\r
20 <summary>Gets or sets the name of the hash algorithm type to use for generating the mask.</summary>
\r
21 <returns>The name of the type that implements the hash algorithm to use for computing the mask.</returns>
\r
23 <member name="T:System.Security.Cryptography.RandomNumberGenerator">
\r
24 <summary>Represents the abstract class from which all implementations of cryptographic random number generators derive.</summary>
\r
26 <member name="M:System.Security.Cryptography.RandomNumberGenerator.#ctor">
\r
27 <summary>Initializes a new instance of <see cref="T:System.Security.Cryptography.RandomNumberGenerator"></see>.</summary>
\r
29 <member name="M:System.Security.Cryptography.RandomNumberGenerator.Create">
\r
30 <summary>Creates an instance of the default implementation of a cryptographic random number generator that can be used to generate random data.</summary>
\r
31 <returns>A new instance of a cryptographic random number generator.</returns>
\r
33 <member name="M:System.Security.Cryptography.RandomNumberGenerator.Create(System.String)">
\r
34 <summary>Creates an instance of the specified implementation of a cryptographic random number generator.</summary>
\r
35 <param name="rngName">The name of the random number generator implementation to use.</param>
\r
36 <returns>A new instance of a cryptographic random number generator.</returns>
\r
38 <member name="M:System.Security.Cryptography.RandomNumberGenerator.Dispose">
\r
39 <summary>When overridden in a derived class, releases all resources used by the current instance of the <see cref="T:System.Security.Cryptography.RandomNumberGenerator"></see> class.</summary>
\r
41 <member name="M:System.Security.Cryptography.RandomNumberGenerator.Dispose(System.Boolean)">
\r
42 <summary>When overridden in a derived class, releases the unmanaged resources used by the <see cref="T:System.Security.Cryptography.RandomNumberGenerator"></see> and optionally releases the managed resources.</summary>
\r
43 <param name="disposing">true to release both managed and unmanaged resources; false to release only unmanaged resources.</param>
\r
45 <member name="M:System.Security.Cryptography.RandomNumberGenerator.GetBytes(System.Byte[])">
\r
46 <summary>When overridden in a derived class, fills an array of bytes with a cryptographically strong random sequence of values.</summary>
\r
47 <param name="data">The array to fill with cryptographically strong random bytes.</param>
\r
49 <member name="M:System.Security.Cryptography.RandomNumberGenerator.GetBytes(System.Byte[],System.Int32,System.Int32)">
\r
50 <summary>Fills the specified byte array with a cryptographically strong random sequence of values.</summary>
\r
51 <param name="data">The array to fill with cryptographically strong random bytes.</param>
\r
52 <param name="offset">The index of the array to start the fill operation.</param>
\r
53 <param name="count">The number of bytes to fill.</param>
\r
54 <exception cref="T:System.ArgumentNullException"><paramref name="data">data</paramref> is null.</exception>
\r
55 <exception cref="T:System.ArgumentOutOfRangeException"><paramref name="offset">offset</paramref> or <paramref name="count">count</paramref> is less than 0</exception>
\r
56 <exception cref="T:System.ArgumentException"><paramref name="offset">offset</paramref> plus <paramref name="count">count</paramref> exceeds the length of <paramref name="data">data</paramref>.</exception>
\r
58 <member name="M:System.Security.Cryptography.RandomNumberGenerator.GetNonZeroBytes(System.Byte[])">
\r
59 <summary>When overridden in a derived class, fills an array of bytes with a cryptographically strong random sequence of nonzero values.</summary>
\r
60 <param name="data">The array to fill with cryptographically strong random nonzero bytes.</param>
\r
62 <member name="T:System.Security.Cryptography.RC2">
\r
63 <summary>Represents the base class from which all implementations of the <see cref="T:System.Security.Cryptography.RC2"></see> algorithm must derive.</summary>
\r
65 <member name="M:System.Security.Cryptography.RC2.#ctor">
\r
66 <summary>Initializes a new instance of <see cref="T:System.Security.Cryptography.RC2"></see>.</summary>
\r
68 <member name="M:System.Security.Cryptography.RC2.Create">
\r
69 <summary>Creates an instance of a cryptographic object to perform the <see cref="T:System.Security.Cryptography.RC2"></see> algorithm.</summary>
\r
70 <returns>An instance of a cryptographic object.</returns>
\r
71 <exception cref="T:System.Reflection.TargetInvocationException">The algorithm was used with Federal Information Processing Standards (FIPS) mode enabled, but is not FIPS compatible.</exception>
\r
73 <member name="M:System.Security.Cryptography.RC2.Create(System.String)">
\r
74 <summary>Creates an instance of a cryptographic object to perform the specified implementation of the <see cref="T:System.Security.Cryptography.RC2"></see> algorithm.</summary>
\r
75 <param name="AlgName">The name of the specific implementation of <see cref="T:System.Security.Cryptography.RC2"></see> to use.</param>
\r
76 <returns>An instance of a cryptographic object.</returns>
\r
77 <exception cref="T:System.Reflection.TargetInvocationException">The algorithm described by the <paramref name="algName">algName</paramref> parameter was used with Federal Information Processing Standards (FIPS) mode enabled, but is not FIPS compatible.</exception>
\r
79 <member name="P:System.Security.Cryptography.RC2.EffectiveKeySize">
\r
80 <summary>Gets or sets the effective size of the secret key used by the <see cref="T:System.Security.Cryptography.RC2"></see> algorithm in bits.</summary>
\r
81 <returns>The effective key size used by the <see cref="T:System.Security.Cryptography.RC2"></see> algorithm.</returns>
\r
82 <exception cref="T:System.Security.Cryptography.CryptographicException">The effective key size is invalid.</exception>
\r
84 <member name="F:System.Security.Cryptography.RC2.EffectiveKeySizeValue">
\r
85 <summary>Represents the effective size of the secret key used by the <see cref="T:System.Security.Cryptography.RC2"></see> algorithm in bits.</summary>
\r
88 <member name="P:System.Security.Cryptography.RC2.KeySize">
\r
89 <summary>Gets or sets the size of the secret key used by the <see cref="T:System.Security.Cryptography.RC2"></see> algorithm in bits.</summary>
\r
90 <returns>The size of the secret key used by the <see cref="T:System.Security.Cryptography.RC2"></see> algorithm.</returns>
\r
91 <exception cref="T:System.Security.Cryptography.CryptographicException">The value for the RC2 key size is less than the effective key size value.</exception>
\r
93 <member name="T:System.Security.Cryptography.Rfc2898DeriveBytes">
\r
94 <summary>Implements password-based key derivation functionality, PBKDF2, by using a pseudo-random number generator based on <see cref="T:System.Security.Cryptography.HMACSHA1"></see>.</summary>
\r
96 <member name="M:System.Security.Cryptography.Rfc2898DeriveBytes.#ctor(System.String,System.Byte[])">
\r
97 <summary>Initializes a new instance of the <see cref="T:System.Security.Cryptography.Rfc2898DeriveBytes"></see> class using a password and salt to derive the key.</summary>
\r
98 <param name="password">The password used to derive the key.</param>
\r
99 <param name="salt">The key salt used to derive the key.</param>
\r
100 <exception cref="T:System.ArgumentException">The specified salt size is smaller than 8 bytes or the iteration count is less than 1.</exception>
\r
101 <exception cref="T:System.ArgumentNullException">The password or salt is null.</exception>
\r
103 <member name="M:System.Security.Cryptography.Rfc2898DeriveBytes.#ctor(System.String,System.Int32)">
\r
104 <summary>Initializes a new instance of the <see cref="T:System.Security.Cryptography.Rfc2898DeriveBytes"></see> class using the password and salt size to derive the key.</summary>
\r
105 <param name="password">The password used to derive the key.</param>
\r
106 <param name="saltSize">The size of the random salt that you want the class to generate.</param>
\r
107 <exception cref="T:System.ArgumentException">The specified salt size is smaller than 8 bytes.</exception>
\r
108 <exception cref="T:System.ArgumentNullException">The password or salt is null.</exception>
\r
110 <member name="M:System.Security.Cryptography.Rfc2898DeriveBytes.#ctor(System.Byte[],System.Byte[],System.Int32)">
\r
111 <summary>Initializes a new instance of the <see cref="T:System.Security.Cryptography.Rfc2898DeriveBytes"></see> class using a password, a salt, and number of iterations to derive the key.</summary>
\r
112 <param name="password">The password used to derive the key.</param>
\r
113 <param name="salt">The key salt used to derive the key.</param>
\r
114 <param name="iterations">The number of iterations for the operation.</param>
\r
115 <exception cref="T:System.ArgumentException">The specified salt size is smaller than 8 bytes or the iteration count is less than 1.</exception>
\r
116 <exception cref="T:System.ArgumentNullException">The password or salt is null.</exception>
\r
118 <member name="M:System.Security.Cryptography.Rfc2898DeriveBytes.#ctor(System.String,System.Byte[],System.Int32)">
\r
119 <summary>Initializes a new instance of the <see cref="T:System.Security.Cryptography.Rfc2898DeriveBytes"></see> class using a password, a salt, and number of iterations to derive the key.</summary>
\r
120 <param name="password">The password used to derive the key.</param>
\r
121 <param name="salt">The key salt used to derive the key.</param>
\r
122 <param name="iterations">The number of iterations for the operation.</param>
\r
123 <exception cref="T:System.ArgumentException">The specified salt size is smaller than 8 bytes or the iteration count is less than 1.</exception>
\r
124 <exception cref="T:System.ArgumentNullException">The password or salt is null.</exception>
\r
126 <member name="M:System.Security.Cryptography.Rfc2898DeriveBytes.#ctor(System.String,System.Int32,System.Int32)">
\r
127 <summary>Initializes a new instance of the <see cref="T:System.Security.Cryptography.Rfc2898DeriveBytes"></see> class using a password, a salt size, and number of iterations to derive the key.</summary>
\r
128 <param name="password">The password used to derive the key.</param>
\r
129 <param name="saltSize">The size of the random salt that you want the class to generate.</param>
\r
130 <param name="iterations">The number of iterations for the operation.</param>
\r
131 <exception cref="T:System.ArgumentException">The specified salt size is smaller than 8 bytes or the iteration count is less than 1.</exception>
\r
132 <exception cref="T:System.ArgumentNullException">The password or salt is null.</exception>
\r
133 <exception cref="T:System.ArgumentOutOfRangeException"><paramref name="iterations">iterations</paramref> is out of range. This parameter requires a non-negative number.</exception>
\r
135 <member name="M:System.Security.Cryptography.Rfc2898DeriveBytes.#ctor(System.Byte[],System.Byte[],System.Int32,System.Security.Cryptography.HashAlgorithmName)">
\r
136 <param name="password"></param>
\r
137 <param name="salt"></param>
\r
138 <param name="iterations"></param>
\r
139 <param name="hashAlgorithm"></param>
\r
141 <member name="M:System.Security.Cryptography.Rfc2898DeriveBytes.#ctor(System.String,System.Byte[],System.Int32,System.Security.Cryptography.HashAlgorithmName)">
\r
142 <param name="password"></param>
\r
143 <param name="salt"></param>
\r
144 <param name="iterations"></param>
\r
145 <param name="hashAlgorithm"></param>
\r
147 <member name="M:System.Security.Cryptography.Rfc2898DeriveBytes.#ctor(System.String,System.Int32,System.Int32,System.Security.Cryptography.HashAlgorithmName)">
\r
148 <param name="password"></param>
\r
149 <param name="saltSize"></param>
\r
150 <param name="iterations"></param>
\r
151 <param name="hashAlgorithm"></param>
\r
153 <member name="M:System.Security.Cryptography.Rfc2898DeriveBytes.CryptDeriveKey(System.String,System.String,System.Int32,System.Byte[])">
\r
154 <summary>Derives a cryptographic key from the <see cref="T:System.Security.Cryptography.Rfc2898DeriveBytes"></see> object.</summary>
\r
155 <param name="algname">The algorithm name for which to derive the key.</param>
\r
156 <param name="alghashname">The hash algorithm name to use to derive the key.</param>
\r
157 <param name="keySize">The size of the key, in bits, to derive.</param>
\r
158 <param name="rgbIV">The initialization vector (IV) to use to derive the key.</param>
\r
159 <returns>The derived key.</returns>
\r
160 <exception cref="T:System.Security.Cryptography.CryptographicException">The <paramref name="keySize">keySize</paramref> parameter is incorrect. -or- The cryptographic service provider (CSP) cannot be acquired. -or- The <paramref name="algname">algname</paramref> parameter is not a valid algorithm name. -or- The <paramref name="alghashname">alghashname</paramref> parameter is not a valid hash algorithm name.</exception>
\r
162 <member name="M:System.Security.Cryptography.Rfc2898DeriveBytes.Dispose(System.Boolean)">
\r
163 <summary>Releases the unmanaged resources used by the <see cref="T:System.Security.Cryptography.Rfc2898DeriveBytes"></see> class and optionally releases the managed resources.</summary>
\r
164 <param name="disposing">true to release both managed and unmanaged resources; false to release only unmanaged resources.</param>
\r
166 <member name="M:System.Security.Cryptography.Rfc2898DeriveBytes.GetBytes(System.Int32)">
\r
167 <summary>Returns the pseudo-random key for this object.</summary>
\r
168 <param name="cb">The number of pseudo-random key bytes to generate.</param>
\r
169 <returns>A byte array filled with pseudo-random key bytes.</returns>
\r
170 <exception cref="T:System.ArgumentOutOfRangeException"><paramref name="cb">cb</paramref> is out of range. This parameter requires a non-negative number.</exception>
\r
172 <member name="P:System.Security.Cryptography.Rfc2898DeriveBytes.HashAlgorithm">
\r
173 <returns></returns>
\r
175 <member name="P:System.Security.Cryptography.Rfc2898DeriveBytes.IterationCount">
\r
176 <summary>Gets or sets the number of iterations for the operation.</summary>
\r
177 <returns>The number of iterations for the operation.</returns>
\r
178 <exception cref="T:System.ArgumentOutOfRangeException">The number of iterations is less than 1.</exception>
\r
180 <member name="M:System.Security.Cryptography.Rfc2898DeriveBytes.Reset">
\r
181 <summary>Resets the state of the operation.</summary>
\r
183 <member name="P:System.Security.Cryptography.Rfc2898DeriveBytes.Salt">
\r
184 <summary>Gets or sets the key salt value for the operation.</summary>
\r
185 <returns>The key salt value for the operation.</returns>
\r
186 <exception cref="T:System.ArgumentException">The specified salt size is smaller than 8 bytes.</exception>
\r
187 <exception cref="T:System.ArgumentNullException">The salt is null.</exception>
\r
189 <member name="T:System.Security.Cryptography.Rijndael">
\r
190 <summary>Represents the base class from which all implementations of the <see cref="T:System.Security.Cryptography.Rijndael"></see> symmetric encryption algorithm must inherit.</summary>
\r
192 <member name="M:System.Security.Cryptography.Rijndael.#ctor">
\r
193 <summary>Initializes a new instance of <see cref="T:System.Security.Cryptography.Rijndael"></see>.</summary>
\r
195 <member name="M:System.Security.Cryptography.Rijndael.Create">
\r
196 <summary>Creates a cryptographic object to perform the <see cref="T:System.Security.Cryptography.Rijndael"></see> algorithm.</summary>
\r
197 <returns>A cryptographic object.</returns>
\r
198 <exception cref="T:System.Reflection.TargetInvocationException">The algorithm was used with Federal Information Processing Standards (FIPS) mode enabled, but is not FIPS compatible.</exception>
\r
200 <member name="M:System.Security.Cryptography.Rijndael.Create(System.String)">
\r
201 <summary>Creates a cryptographic object to perform the specified implementation of the <see cref="T:System.Security.Cryptography.Rijndael"></see> algorithm.</summary>
\r
202 <param name="algName">The name of the specific implementation of <see cref="T:System.Security.Cryptography.Rijndael"></see> to create.</param>
\r
203 <returns>A cryptographic object.</returns>
\r
204 <exception cref="T:System.Reflection.TargetInvocationException">The algorithm described by the <paramref name="algName">algName</paramref> parameter was used with Federal Information Processing Standards (FIPS) mode enabled, but is not FIPS compatible.</exception>
\r
206 <member name="T:System.Security.Cryptography.RijndaelManaged">
\r
207 <summary>Accesses the managed version of the <see cref="T:System.Security.Cryptography.Rijndael"></see> algorithm. This class cannot be inherited.</summary>
\r
209 <member name="M:System.Security.Cryptography.RijndaelManaged.#ctor">
\r
210 <summary>Initializes a new instance of the <see cref="T:System.Security.Cryptography.RijndaelManaged"></see> class.</summary>
\r
211 <exception cref="T:System.InvalidOperationException">This class is not compliant with the FIPS algorithm.</exception>
\r
213 <member name="P:System.Security.Cryptography.RijndaelManaged.BlockSize">
\r
214 <returns></returns>
\r
216 <member name="M:System.Security.Cryptography.RijndaelManaged.CreateDecryptor">
\r
217 <returns></returns>
\r
219 <member name="M:System.Security.Cryptography.RijndaelManaged.CreateDecryptor(System.Byte[],System.Byte[])">
\r
220 <summary>Creates a symmetric <see cref="T:System.Security.Cryptography.Rijndael"></see> decryptor object with the specified <see cref="P:System.Security.Cryptography.SymmetricAlgorithm.Key"></see> and initialization vector (<see cref="P:System.Security.Cryptography.SymmetricAlgorithm.IV"></see>).</summary>
\r
221 <param name="rgbKey">The secret key to be used for the symmetric algorithm. The key size must be 128, 192, or 256 bits.</param>
\r
222 <param name="rgbIV">The IV to be used for the symmetric algorithm.</param>
\r
223 <returns>A symmetric <see cref="T:System.Security.Cryptography.Rijndael"></see> decryptor object.</returns>
\r
224 <exception cref="T:System.ArgumentNullException">The <paramref name="rgbKey">rgbKey</paramref> parameter is null. -or- The <paramref name="rgbIV">rgbIV</paramref> parameter is null.</exception>
\r
225 <exception cref="T:System.Security.Cryptography.CryptographicException">The value of the <see cref="P:System.Security.Cryptography.SymmetricAlgorithm.Mode"></see> property is not <see cref="F:System.Security.Cryptography.CipherMode.ECB"></see>, <see cref="F:System.Security.Cryptography.CipherMode.CBC"></see>, or <see cref="F:System.Security.Cryptography.CipherMode.CFB"></see>.</exception>
\r
227 <member name="M:System.Security.Cryptography.RijndaelManaged.CreateEncryptor">
\r
228 <returns></returns>
\r
230 <member name="M:System.Security.Cryptography.RijndaelManaged.CreateEncryptor(System.Byte[],System.Byte[])">
\r
231 <summary>Creates a symmetric <see cref="T:System.Security.Cryptography.Rijndael"></see> encryptor object with the specified <see cref="P:System.Security.Cryptography.SymmetricAlgorithm.Key"></see> and initialization vector (<see cref="P:System.Security.Cryptography.SymmetricAlgorithm.IV"></see>).</summary>
\r
232 <param name="rgbKey">The secret key to be used for the symmetric algorithm. The key size must be 128, 192, or 256 bits.</param>
\r
233 <param name="rgbIV">The IV to be used for the symmetric algorithm.</param>
\r
234 <returns>A symmetric <see cref="T:System.Security.Cryptography.Rijndael"></see> encryptor object.</returns>
\r
235 <exception cref="T:System.ArgumentNullException">The <paramref name="rgbKey">rgbKey</paramref> parameter is null. -or- The <paramref name="rgbIV">rgbIV</paramref> parameter is null.</exception>
\r
236 <exception cref="T:System.Security.Cryptography.CryptographicException">The value of the <see cref="P:System.Security.Cryptography.SymmetricAlgorithm.Mode"></see> property is not <see cref="F:System.Security.Cryptography.CipherMode.ECB"></see>, <see cref="F:System.Security.Cryptography.CipherMode.CBC"></see>, or <see cref="F:System.Security.Cryptography.CipherMode.CFB"></see>.</exception>
\r
238 <member name="M:System.Security.Cryptography.RijndaelManaged.GenerateIV">
\r
239 <summary>Generates a random initialization vector (<see cref="P:System.Security.Cryptography.SymmetricAlgorithm.IV"></see>) to be used for the algorithm.</summary>
\r
241 <member name="M:System.Security.Cryptography.RijndaelManaged.GenerateKey">
\r
242 <summary>Generates a random <see cref="P:System.Security.Cryptography.SymmetricAlgorithm.Key"></see> to be used for the algorithm.</summary>
\r
244 <member name="P:System.Security.Cryptography.RijndaelManaged.IV">
\r
245 <returns></returns>
\r
247 <member name="P:System.Security.Cryptography.RijndaelManaged.Key">
\r
248 <returns></returns>
\r
250 <member name="P:System.Security.Cryptography.RijndaelManaged.KeySize">
\r
251 <returns></returns>
\r
253 <member name="P:System.Security.Cryptography.RijndaelManaged.LegalKeySizes">
\r
254 <returns></returns>
\r
256 <member name="P:System.Security.Cryptography.RijndaelManaged.Mode">
\r
257 <returns></returns>
\r
259 <member name="P:System.Security.Cryptography.RijndaelManaged.Padding">
\r
260 <returns></returns>
\r
262 <member name="T:System.Security.Cryptography.RSA">
\r
263 <summary>Represents the base class from which all implementations of the <see cref="T:System.Security.Cryptography.RSA"></see> algorithm inherit.</summary>
\r
265 <member name="M:System.Security.Cryptography.RSA.#ctor">
\r
266 <summary>Initializes a new instance of the <see cref="T:System.Security.Cryptography.RSA"></see> class.</summary>
\r
268 <member name="M:System.Security.Cryptography.RSA.Create">
\r
269 <summary>Creates an instance of the default implementation of the <see cref="T:System.Security.Cryptography.RSA"></see> algorithm.</summary>
\r
270 <returns>A new instance of the default implementation of <see cref="T:System.Security.Cryptography.RSA"></see>.</returns>
\r
272 <member name="M:System.Security.Cryptography.RSA.Create(System.Int32)">
\r
273 <param name="keySizeInBits"></param>
\r
274 <returns></returns>
\r
276 <member name="M:System.Security.Cryptography.RSA.Create(System.Security.Cryptography.RSAParameters)">
\r
277 <param name="parameters"></param>
\r
278 <returns></returns>
\r
280 <member name="M:System.Security.Cryptography.RSA.Create(System.String)">
\r
281 <summary>Creates an instance of the specified implementation of <see cref="T:System.Security.Cryptography.RSA"></see>.</summary>
\r
282 <param name="algName">The name of the implementation of <see cref="T:System.Security.Cryptography.RSA"></see> to use.</param>
\r
283 <returns>A new instance of the specified implementation of <see cref="T:System.Security.Cryptography.RSA"></see>.</returns>
\r
285 <member name="M:System.Security.Cryptography.RSA.Decrypt(System.Byte[],System.Security.Cryptography.RSAEncryptionPadding)">
\r
286 <summary>When overridden in a derived class, decrypts the input data using the specified padding mode.</summary>
\r
287 <param name="data">The data to decrypt.</param>
\r
288 <param name="padding">The padding mode.</param>
\r
289 <returns>The decrypted data.</returns>
\r
290 <exception cref="T:System.NotImplementedException">A derived class must override this method.</exception>
\r
292 <member name="M:System.Security.Cryptography.RSA.DecryptValue(System.Byte[])">
\r
293 <summary>When overridden in a derived class, decrypts the input data using the private key.</summary>
\r
294 <param name="rgb">The cipher text to be decrypted.</param>
\r
295 <returns>The resulting decryption of the <paramref name="rgb">rgb</paramref> parameter in plain text.</returns>
\r
296 <exception cref="T:System.NotSupportedException">This method call is not supported. This exception is thrown starting with the .NET Framework 4.6.</exception>
\r
298 <member name="M:System.Security.Cryptography.RSA.Encrypt(System.Byte[],System.Security.Cryptography.RSAEncryptionPadding)">
\r
299 <summary>When overridden in a derived class, encrypts the input data using the specified padding mode.</summary>
\r
300 <param name="data">The data to encrypt.</param>
\r
301 <param name="padding">The padding mode.</param>
\r
302 <returns>The encrypted data.</returns>
\r
303 <exception cref="T:System.NotImplementedException">A derived class must override this method.</exception>
\r
305 <member name="M:System.Security.Cryptography.RSA.EncryptValue(System.Byte[])">
\r
306 <summary>When overridden in a derived class, encrypts the input data using the public key.</summary>
\r
307 <param name="rgb">The plain text to be encrypted.</param>
\r
308 <returns>The resulting encryption of the <paramref name="rgb">rgb</paramref> parameter as cipher text.</returns>
\r
309 <exception cref="T:System.NotSupportedException">This method call is not supported. This exception is thrown starting with the .NET Framework 4.6.</exception>
\r
311 <member name="M:System.Security.Cryptography.RSA.ExportParameters(System.Boolean)">
\r
312 <summary>When overridden in a derived class, exports the <see cref="T:System.Security.Cryptography.RSAParameters"></see>.</summary>
\r
313 <param name="includePrivateParameters">true to include private parameters; otherwise, false.</param>
\r
314 <returns>The parameters for <see cref="T:System.Security.Cryptography.DSA"></see>.</returns>
\r
316 <member name="M:System.Security.Cryptography.RSA.FromXmlString(System.String)">
\r
317 <summary>Initializes an <see cref="T:System.Security.Cryptography.RSA"></see> object from the key information from an XML string.</summary>
\r
318 <param name="xmlString">The XML string containing <see cref="T:System.Security.Cryptography.RSA"></see> key information.</param>
\r
319 <exception cref="T:System.ArgumentNullException">The <paramref name="xmlString">xmlString</paramref> parameter is null.</exception>
\r
320 <exception cref="T:System.Security.Cryptography.CryptographicException">The format of the <paramref name="xmlString">xmlString</paramref> parameter is not valid.</exception>
\r
322 <member name="M:System.Security.Cryptography.RSA.HashData(System.Byte[],System.Int32,System.Int32,System.Security.Cryptography.HashAlgorithmName)">
\r
323 <summary>When overridden in a derived class, computes the hash value of a specified portion of a byte array by using a specified hashing algorithm.</summary>
\r
324 <param name="data">The data to be hashed.</param>
\r
325 <param name="offset">The index of the first byte in data that is to be hashed.</param>
\r
326 <param name="count">The number of bytes to hash.</param>
\r
327 <param name="hashAlgorithm">The algorithm to use in hash the data.</param>
\r
328 <returns>The hashed data.</returns>
\r
329 <exception cref="T:System.NotImplementedException">A derived class must override this method.</exception>
\r
331 <member name="M:System.Security.Cryptography.RSA.HashData(System.IO.Stream,System.Security.Cryptography.HashAlgorithmName)">
\r
332 <summary>When overridden in a derived class, computes the hash value of a specified binary stream by using a specified hashing algorithm.</summary>
\r
333 <param name="data">The binary stream to hash.</param>
\r
334 <param name="hashAlgorithm">The hash algorithm.</param>
\r
335 <returns>The hashed data.</returns>
\r
336 <exception cref="T:System.NotImplementedException">A derived class must override this method.</exception>
\r
338 <member name="M:System.Security.Cryptography.RSA.ImportParameters(System.Security.Cryptography.RSAParameters)">
\r
339 <summary>When overridden in a derived class, imports the specified <see cref="T:System.Security.Cryptography.RSAParameters"></see>.</summary>
\r
340 <param name="parameters">The parameters for <see cref="T:System.Security.Cryptography.RSA"></see>.</param>
\r
342 <member name="P:System.Security.Cryptography.RSA.KeyExchangeAlgorithm">
\r
343 <summary>Gets the name of the key exchange algorithm available with this implementation of <see cref="T:System.Security.Cryptography.RSA"></see>.</summary>
\r
344 <returns>Returns "RSA".</returns>
\r
346 <member name="P:System.Security.Cryptography.RSA.SignatureAlgorithm">
\r
347 <summary>Gets the name of the signature algorithm available with this implementation of <see cref="T:System.Security.Cryptography.RSA"></see>.</summary>
\r
348 <returns>Returns "RSA".</returns>
\r
350 <member name="M:System.Security.Cryptography.RSA.SignData(System.Byte[],System.Security.Cryptography.HashAlgorithmName,System.Security.Cryptography.RSASignaturePadding)">
\r
351 <summary>Computes the hash value of the specified byte array using the specified hash algorithm and padding mode, and signs the resulting hash value.</summary>
\r
352 <param name="data">The input data for which to compute the hash.</param>
\r
353 <param name="hashAlgorithm">The hash algorithm to use to create the hash value.</param>
\r
354 <param name="padding">The padding mode.</param>
\r
355 <returns>The RSA signature for the specified data.</returns>
\r
356 <exception cref="T:System.ArgumentNullException"><paramref name="data">data</paramref> is null. -or- <paramref name="padding">padding</paramref> is null.</exception>
\r
357 <exception cref="T:System.ArgumentException"><paramref name="hashAlgorithm">hashAlgorithm</paramref>.<see cref="P:System.Security.Cryptography.HashAlgorithmName.Name"></see> is null or <see cref="F:System.String.Empty"></see>.</exception>
\r
359 <member name="M:System.Security.Cryptography.RSA.SignData(System.IO.Stream,System.Security.Cryptography.HashAlgorithmName,System.Security.Cryptography.RSASignaturePadding)">
\r
360 <summary>Computes the hash value of the specified stream using the specified hash algorithm and padding mode, and signs the resulting hash value.</summary>
\r
361 <param name="data">The input stream for which to compute the hash.</param>
\r
362 <param name="hashAlgorithm">The hash algorithm to use to create the hash value.</param>
\r
363 <param name="padding">The padding mode.</param>
\r
364 <returns>The RSA signature for the specified data.</returns>
\r
365 <exception cref="T:System.ArgumentNullException"><paramref name="data">data</paramref> is null. -or- <paramref name="padding">padding</paramref> is null.</exception>
\r
366 <exception cref="T:System.ArgumentException"><paramref name="hashAlgorithm">hashAlgorithm</paramref>.<see cref="P:System.Security.Cryptography.HashAlgorithmName.Name"></see> is null or <see cref="F:System.String.Empty"></see>.</exception>
\r
368 <member name="M:System.Security.Cryptography.RSA.SignData(System.Byte[],System.Int32,System.Int32,System.Security.Cryptography.HashAlgorithmName,System.Security.Cryptography.RSASignaturePadding)">
\r
369 <summary>Computes the hash value of a portion of the specified byte array using the specified hash algorithm and padding mode, and signs the resulting hash value.</summary>
\r
370 <param name="data">The input data for which to compute the hash.</param>
\r
371 <param name="offset">The offset into the array at which to begin using data.</param>
\r
372 <param name="count">The number of bytes in the array to use as data.</param>
\r
373 <param name="hashAlgorithm">The hash algorithm to use to create the hash value.</param>
\r
374 <param name="padding">The padding mode.</param>
\r
375 <returns>The RSA signature for the specified data.</returns>
\r
376 <exception cref="T:System.ArgumentNullException"><paramref name="data">data</paramref> is null. -or- <paramref name="padding">padding</paramref> is null.</exception>
\r
377 <exception cref="T:System.ArgumentException"><paramref name="hashAlgorithm">hashAlgorithm</paramref>.<see cref="P:System.Security.Cryptography.HashAlgorithmName.Name"></see> is null or <see cref="F:System.String.Empty"></see>.</exception>
\r
378 <exception cref="T:System.ArgumentOutOfRangeException"><paramref name="offset">offset</paramref> is less than zero. -or- <paramref name="count">count</paramref> is less than zero. -or- <paramref name="offset">offset</paramref> + <paramref name="count">count</paramref> – 1 results in an index that is beyond the upper bound of <paramref name="data">data</paramref>.</exception>
\r
380 <member name="M:System.Security.Cryptography.RSA.SignHash(System.Byte[],System.Security.Cryptography.HashAlgorithmName,System.Security.Cryptography.RSASignaturePadding)">
\r
381 <summary>When overridden in a derived class, computes the signature for the specified hash value by encrypting it with the private key using the specified padding.</summary>
\r
382 <param name="hash">The hash value of the data to be signed.</param>
\r
383 <param name="hashAlgorithm">The hash algorithm used to create the hash value of the data.</param>
\r
384 <param name="padding">The padding.</param>
\r
385 <returns>The RSA signature for the specified hash value.</returns>
\r
386 <exception cref="T:System.NotImplementedException">A derived class must override this method.</exception>
\r
388 <member name="M:System.Security.Cryptography.RSA.ToXmlString(System.Boolean)">
\r
389 <summary>Creates and returns an XML string containing the key of the current <see cref="T:System.Security.Cryptography.RSA"></see> object.</summary>
\r
390 <param name="includePrivateParameters">true to include a public and private RSA key; false to include only the public key.</param>
\r
391 <returns>An XML string containing the key of the current <see cref="T:System.Security.Cryptography.RSA"></see> object.</returns>
\r
393 <member name="M:System.Security.Cryptography.RSA.VerifyData(System.Byte[],System.Int32,System.Int32,System.Byte[],System.Security.Cryptography.HashAlgorithmName,System.Security.Cryptography.RSASignaturePadding)">
\r
394 <summary>Verifies that a digital signature is valid by calculating the hash value of the data in a portion of a byte array using the specified hash algorithm and padding, and comparing it to the provided signature.</summary>
\r
395 <param name="data">The signed data.</param>
\r
396 <param name="offset">The starting index at which to compute the hash.</param>
\r
397 <param name="count">The number of bytes to hash.</param>
\r
398 <param name="signature">The signature data to be verified.</param>
\r
399 <param name="hashAlgorithm">The hash algorithm used to create the hash value of the data.</param>
\r
400 <param name="padding">The padding mode.</param>
\r
401 <returns>true if the signature is valid; otherwise, false.</returns>
\r
402 <exception cref="T:System.ArgumentNullException"><paramref name="data">data</paramref> is null. -or- <paramref name="signature">signature</paramref> is null. -or- <paramref name="padding">padding</paramref> is null.</exception>
\r
403 <exception cref="T:System.ArgumentException"><paramref name="hashAlgorithm">hashAlgorithm</paramref>.<see cref="P:System.Security.Cryptography.HashAlgorithmName.Name"></see> is null or <see cref="F:System.String.Empty"></see>.</exception>
\r
404 <exception cref="T:System.ArgumentOutOfRangeException"><paramref name="offset">offset</paramref> is less than zero. -or- <paramref name="count">count</paramref> is less than zero. -or- <paramref name="offset">offset</paramref> + <paramref name="count">count</paramref> – 1 results in an index that is beyond the upper bound of <paramref name="data">data</paramref>.</exception>
\r
406 <member name="M:System.Security.Cryptography.RSA.VerifyData(System.Byte[],System.Byte[],System.Security.Cryptography.HashAlgorithmName,System.Security.Cryptography.RSASignaturePadding)">
\r
407 <summary>Verifies that a digital signature is valid by calculating the hash value of the specified data using the specified hash algorithm and padding, and comparing it to the provided signature.</summary>
\r
408 <param name="data">The signed data.</param>
\r
409 <param name="signature">The signature data to be verified.</param>
\r
410 <param name="hashAlgorithm">The hash algorithm used to create the hash value of the data.</param>
\r
411 <param name="padding">The padding mode.</param>
\r
412 <returns>true if the signature is valid; otherwise, false.</returns>
\r
413 <exception cref="T:System.ArgumentNullException"><paramref name="data">data</paramref> is null. -or- <paramref name="signature">signature</paramref> is null. -or- <paramref name="padding">padding</paramref> is null.</exception>
\r
414 <exception cref="T:System.ArgumentException"><paramref name="hashAlgorithm">hashAlgorithm</paramref>.<see cref="P:System.Security.Cryptography.HashAlgorithmName.Name"></see> is null or <see cref="F:System.String.Empty"></see>.</exception>
\r
416 <member name="M:System.Security.Cryptography.RSA.VerifyData(System.IO.Stream,System.Byte[],System.Security.Cryptography.HashAlgorithmName,System.Security.Cryptography.RSASignaturePadding)">
\r
417 <summary>Verifies that a digital signature is valid by calculating the hash value of the specified stream using the specified hash algorithm and padding, and comparing it to the provided signature.</summary>
\r
418 <param name="data">The signed data.</param>
\r
419 <param name="signature">The signature data to be verified.</param>
\r
420 <param name="hashAlgorithm">The hash algorithm used to create the hash value of the data.</param>
\r
421 <param name="padding">The padding mode.</param>
\r
422 <returns>true if the signature is valid; otherwise, false.</returns>
\r
423 <exception cref="T:System.ArgumentNullException"><paramref name="data">data</paramref> is null. -or- <paramref name="signature">signature</paramref> is null. -or- <paramref name="padding">padding</paramref> is null.</exception>
\r
424 <exception cref="T:System.ArgumentException"><paramref name="hashAlgorithm">hashAlgorithm</paramref>.<see cref="P:System.Security.Cryptography.HashAlgorithmName.Name"></see> is null or <see cref="F:System.String.Empty"></see>.</exception>
\r
426 <member name="M:System.Security.Cryptography.RSA.VerifyHash(System.Byte[],System.Byte[],System.Security.Cryptography.HashAlgorithmName,System.Security.Cryptography.RSASignaturePadding)">
\r
427 <summary>Verifies that a digital signature is valid by determining the hash value in the signature using the specified hash algorithm and padding, and comparing it to the provided hash value.</summary>
\r
428 <param name="hash">The hash value of the signed data.</param>
\r
429 <param name="signature">The signature data to be verified.</param>
\r
430 <param name="hashAlgorithm">The hash algorithm used to create the hash value.</param>
\r
431 <param name="padding">The padding mode.</param>
\r
432 <returns>true if the signature is valid; otherwise, false.</returns>
\r
433 <exception cref="T:System.NotImplementedException">A derived class must override this method.</exception>
\r
435 <member name="T:System.Security.Cryptography.RSAEncryptionPadding">
\r
436 <summary>Specifies the padding mode and parameters to use with RSA encryption or decryption operations.</summary>
\r
438 <member name="M:System.Security.Cryptography.RSAEncryptionPadding.CreateOaep(System.Security.Cryptography.HashAlgorithmName)">
\r
439 <summary>Creates a new <see cref="T:System.Security.Cryptography.RSAEncryptionPadding"></see> instance whose <see cref="P:System.Security.Cryptography.RSAEncryptionPadding.Mode"></see> is <see cref="F:System.Security.Cryptography.RSAEncryptionPaddingMode.Oaep"></see> with the given hash algorithm.</summary>
\r
440 <param name="hashAlgorithm">The hash algorithm.</param>
\r
441 <returns>An object whose mode is <see cref="P:System.Security.Cryptography.RSAEncryptionPadding.Mode"></see> is <see cref="F:System.Security.Cryptography.RSAEncryptionPaddingMode.Oaep"></see> with the hash algorithm specified by <paramref name="hashAlgorithm">hashAlgorithm</paramref>. .</returns>
\r
442 <exception cref="T:System.ArgumentException">The <see cref="P:System.Security.Cryptography.HashAlgorithmName.Name"></see> property of <paramref name="hashAlgorithm">hashAlgorithm</paramref> is either null or <see cref="F:System.String.Empty"></see>.</exception>
\r
444 <member name="M:System.Security.Cryptography.RSAEncryptionPadding.Equals(System.Object)">
\r
445 <summary>Determines whether the current instance is equal to the specified object.</summary>
\r
446 <param name="obj">The object to compare.</param>
\r
447 <returns>true if <paramref name="obj">obj</paramref> is equal to the current instance; otherwise, false.</returns>
\r
449 <member name="M:System.Security.Cryptography.RSAEncryptionPadding.Equals(System.Security.Cryptography.RSAEncryptionPadding)">
\r
450 <summary>Determines whether the current instance is equal to the specified <see cref="T:System.Security.Cryptography.RSAEncryptionPadding"></see> object.</summary>
\r
451 <param name="other">The object to compare.</param>
\r
452 <returns>true if <paramref name="other">other</paramref> is equal to the current instance; otherwise, false.</returns>
\r
454 <member name="M:System.Security.Cryptography.RSAEncryptionPadding.GetHashCode">
\r
455 <summary>Returns the hash code of this <see cref="T:System.Security.Cryptography.RSAEncryptionPadding"></see> object.</summary>
\r
456 <returns>The hash code of this instance.</returns>
\r
458 <member name="P:System.Security.Cryptography.RSAEncryptionPadding.Mode">
\r
459 <summary>Gets the padding mode represented by this <see cref="T:System.Security.Cryptography.RSAEncryptionPadding"></see> instance.</summary>
\r
460 <returns>A padding mode.</returns>
\r
462 <member name="P:System.Security.Cryptography.RSAEncryptionPadding.OaepHashAlgorithm">
\r
463 <summary>Gets the hash algorithm used in conjunction with the <see cref="F:System.Security.Cryptography.RSAEncryptionPaddingMode.Oaep"></see> padding mode. If the value of the <see cref="P:System.Security.Cryptography.RSAEncryptionPadding.Mode"></see> property is not <see cref="F:System.Security.Cryptography.RSAEncryptionPaddingMode.Oaep"></see>, <see cref="P:System.Security.Cryptography.HashAlgorithmName.Name"></see> is null.</summary>
\r
464 <returns>The hash algorithm.</returns>
\r
466 <member name="P:System.Security.Cryptography.RSAEncryptionPadding.OaepSHA1">
\r
467 <summary>Gets an object that represents the Optimal Asymmetric Encryption Padding (OAEP) encryption standard with a SHA1 hash algorithm.</summary>
\r
468 <returns>An object that represents the OAEP encryption standard with a SHA1 hash algorithm.</returns>
\r
470 <member name="P:System.Security.Cryptography.RSAEncryptionPadding.OaepSHA256">
\r
471 <summary>Gets an object that represents the Optimal Asymmetric Encryption Padding (OAEP) encryption standard with a SHA256 hash algorithm.</summary>
\r
472 <returns>An object that represents the OAEP encryption standard with a SHA256 hash algorithm.</returns>
\r
474 <member name="P:System.Security.Cryptography.RSAEncryptionPadding.OaepSHA384">
\r
475 <summary>Gets an object that represents the Optimal Asymmetric Encryption Padding (OAEP) encryption standard with a SHA-384 hash algorithm.</summary>
\r
476 <returns>An object that represents the OAEP encryption standard with a SHA384 hash algorithm.</returns>
\r
478 <member name="P:System.Security.Cryptography.RSAEncryptionPadding.OaepSHA512">
\r
479 <summary>Gets an object that represents the Optimal Asymmetric Encryption Padding (OAEP) encryption standard with a SHA512 hash algorithm.</summary>
\r
480 <returns>An object that represents the OAEP encryption standard with a SHA512 hash algorithm.</returns>
\r
482 <member name="M:System.Security.Cryptography.RSAEncryptionPadding.op_Equality(System.Security.Cryptography.RSAEncryptionPadding,System.Security.Cryptography.RSAEncryptionPadding)">
\r
483 <summary>Indicates whether two specified <see cref="T:System.Security.Cryptography.RSAEncryptionPadding"></see> objects are equal.</summary>
\r
484 <param name="left">The first object to compare.</param>
\r
485 <param name="right">The second object to compare.</param>
\r
486 <returns>true if left and right are equal; otherwise, false.</returns>
\r
488 <member name="M:System.Security.Cryptography.RSAEncryptionPadding.op_Inequality(System.Security.Cryptography.RSAEncryptionPadding,System.Security.Cryptography.RSAEncryptionPadding)">
\r
489 <summary>Indicates whether two specified <see cref="T:System.Security.Cryptography.RSAEncryptionPadding"></see> objects are unequal.</summary>
\r
490 <param name="left">The first object to compare.</param>
\r
491 <param name="right">The second object to compare.</param>
\r
492 <returns>true if left and right are not equal; otherwise, false.</returns>
\r
494 <member name="P:System.Security.Cryptography.RSAEncryptionPadding.Pkcs1">
\r
495 <summary>Gets an object that represents the PKCS #1 encryption standard.</summary>
\r
496 <returns>An object that represents the PKCS #1 encryption standard.</returns>
\r
498 <member name="M:System.Security.Cryptography.RSAEncryptionPadding.ToString">
\r
499 <summary>Returns the string representation of the current <see cref="T:System.Security.Cryptography.RSAEncryptionPadding"></see> instance.</summary>
\r
500 <returns>The string representation of the current object.</returns>
\r
502 <member name="T:System.Security.Cryptography.RSAEncryptionPaddingMode">
\r
503 <summary>Specifies the padding mode to use with RSA encryption or decryption operations.</summary>
\r
505 <member name="F:System.Security.Cryptography.RSAEncryptionPaddingMode.Oaep">
\r
506 <summary>Optimal Asymmetric Encryption Padding.</summary>
\r
507 <returns></returns>
\r
509 <member name="F:System.Security.Cryptography.RSAEncryptionPaddingMode.Pkcs1">
\r
510 <summary>PKCS #1 v1.5.</summary>
\r
511 <returns></returns>
\r
513 <member name="T:System.Security.Cryptography.RSAOAEPKeyExchangeDeformatter">
\r
514 <summary>Decrypts Optimal Asymmetric Encryption Padding (OAEP) key exchange data.</summary>
\r
516 <member name="M:System.Security.Cryptography.RSAOAEPKeyExchangeDeformatter.#ctor">
\r
517 <summary>Initializes a new instance of the <see cref="T:System.Security.Cryptography.RSAOAEPKeyExchangeDeformatter"></see> class.</summary>
\r
519 <member name="M:System.Security.Cryptography.RSAOAEPKeyExchangeDeformatter.#ctor(System.Security.Cryptography.AsymmetricAlgorithm)">
\r
520 <summary>Initializes a new instance of the <see cref="T:System.Security.Cryptography.RSAOAEPKeyExchangeDeformatter"></see> class with the specified key.</summary>
\r
521 <param name="key">The instance of the <see cref="T:System.Security.Cryptography.RSA"></see> algorithm that holds the private key.</param>
\r
522 <exception cref="T:System.ArgumentNullException"><paramref name="key">key</paramref> is null.</exception>
\r
524 <member name="M:System.Security.Cryptography.RSAOAEPKeyExchangeDeformatter.DecryptKeyExchange(System.Byte[])">
\r
525 <summary>Extracts secret information from the encrypted key exchange data.</summary>
\r
526 <param name="rgbData">The key exchange data within which the secret information is hidden.</param>
\r
527 <returns>The secret information derived from the key exchange data.</returns>
\r
528 <exception cref="T:System.Security.Cryptography.CryptographicException">The key exchange data verification has failed.</exception>
\r
529 <exception cref="T:System.Security.Cryptography.CryptographicUnexpectedOperationException">The key is missing.</exception>
\r
531 <member name="P:System.Security.Cryptography.RSAOAEPKeyExchangeDeformatter.Parameters">
\r
532 <summary>Gets the parameters for the Optimal Asymmetric Encryption Padding (OAEP) key exchange.</summary>
\r
533 <returns>An XML string containing the parameters of the OAEP key exchange operation.</returns>
\r
535 <member name="M:System.Security.Cryptography.RSAOAEPKeyExchangeDeformatter.SetKey(System.Security.Cryptography.AsymmetricAlgorithm)">
\r
536 <summary>Sets the private key to use for decrypting the secret information.</summary>
\r
537 <param name="key">The instance of the <see cref="T:System.Security.Cryptography.RSA"></see> algorithm that holds the private key.</param>
\r
538 <exception cref="T:System.ArgumentNullException"><paramref name="key">key</paramref> is null.</exception>
\r
540 <member name="T:System.Security.Cryptography.RSAOAEPKeyExchangeFormatter">
\r
541 <summary>Creates Optimal Asymmetric Encryption Padding (OAEP) key exchange data using <see cref="T:System.Security.Cryptography.RSA"></see>.</summary>
\r
543 <member name="M:System.Security.Cryptography.RSAOAEPKeyExchangeFormatter.#ctor">
\r
544 <summary>Initializes a new instance of the <see cref="T:System.Security.Cryptography.RSAOAEPKeyExchangeFormatter"></see> class.</summary>
\r
546 <member name="M:System.Security.Cryptography.RSAOAEPKeyExchangeFormatter.#ctor(System.Security.Cryptography.AsymmetricAlgorithm)">
\r
547 <summary>Initializes a new instance of the <see cref="T:System.Security.Cryptography.RSAOAEPKeyExchangeFormatter"></see> class with the specified key.</summary>
\r
548 <param name="key">The instance of the <see cref="T:System.Security.Cryptography.RSA"></see> algorithm that holds the public key.</param>
\r
549 <exception cref="T:System.ArgumentNullException"><paramref name="key">key</paramref> is null.</exception>
\r
551 <member name="M:System.Security.Cryptography.RSAOAEPKeyExchangeFormatter.CreateKeyExchange(System.Byte[])">
\r
552 <summary>Creates the encrypted key exchange data from the specified input data.</summary>
\r
553 <param name="rgbData">The secret information to be passed in the key exchange.</param>
\r
554 <returns>The encrypted key exchange data to be sent to the intended recipient.</returns>
\r
555 <exception cref="T:System.Security.Cryptography.CryptographicUnexpectedOperationException">The key is missing.</exception>
\r
557 <member name="M:System.Security.Cryptography.RSAOAEPKeyExchangeFormatter.CreateKeyExchange(System.Byte[],System.Type)">
\r
558 <summary>Creates the encrypted key exchange data from the specified input data.</summary>
\r
559 <param name="rgbData">The secret information to be passed in the key exchange.</param>
\r
560 <param name="symAlgType">This parameter is not used in the current version.</param>
\r
561 <returns>The encrypted key exchange data to be sent to the intended recipient.</returns>
\r
563 <member name="P:System.Security.Cryptography.RSAOAEPKeyExchangeFormatter.Parameter">
\r
564 <summary>Gets or sets the parameter used to create padding in the key exchange creation process.</summary>
\r
565 <returns>The parameter value.</returns>
\r
567 <member name="P:System.Security.Cryptography.RSAOAEPKeyExchangeFormatter.Parameters">
\r
568 <summary>Gets the parameters for the Optimal Asymmetric Encryption Padding (OAEP) key exchange.</summary>
\r
569 <returns>An XML string containing the parameters of the OAEP key exchange operation.</returns>
\r
571 <member name="P:System.Security.Cryptography.RSAOAEPKeyExchangeFormatter.Rng">
\r
572 <summary>Gets or sets the random number generator algorithm to use in the creation of the key exchange.</summary>
\r
573 <returns>The instance of a random number generator algorithm to use.</returns>
\r
575 <member name="M:System.Security.Cryptography.RSAOAEPKeyExchangeFormatter.SetKey(System.Security.Cryptography.AsymmetricAlgorithm)">
\r
576 <summary>Sets the public key to use for encrypting the key exchange data.</summary>
\r
577 <param name="key">The instance of the <see cref="T:System.Security.Cryptography.RSA"></see> algorithm that holds the public key.</param>
\r
578 <exception cref="T:System.ArgumentNullException"><paramref name="key">key</paramref> is null.</exception>
\r
580 <member name="T:System.Security.Cryptography.RSAParameters">
\r
581 <summary>Represents the standard parameters for the <see cref="T:System.Security.Cryptography.RSA"></see> algorithm.</summary>
\r
583 <member name="F:System.Security.Cryptography.RSAParameters.D">
\r
584 <summary>Represents the D parameter for the <see cref="T:System.Security.Cryptography.RSA"></see> algorithm.</summary>
\r
585 <returns></returns>
\r
587 <member name="F:System.Security.Cryptography.RSAParameters.DP">
\r
588 <summary>Represents the DP parameter for the <see cref="T:System.Security.Cryptography.RSA"></see> algorithm.</summary>
\r
589 <returns></returns>
\r
591 <member name="F:System.Security.Cryptography.RSAParameters.DQ">
\r
592 <summary>Represents the DQ parameter for the <see cref="T:System.Security.Cryptography.RSA"></see> algorithm.</summary>
\r
593 <returns></returns>
\r
595 <member name="F:System.Security.Cryptography.RSAParameters.Exponent">
\r
596 <summary>Represents the Exponent parameter for the <see cref="T:System.Security.Cryptography.RSA"></see> algorithm.</summary>
\r
597 <returns></returns>
\r
599 <member name="F:System.Security.Cryptography.RSAParameters.InverseQ">
\r
600 <summary>Represents the InverseQ parameter for the <see cref="T:System.Security.Cryptography.RSA"></see> algorithm.</summary>
\r
601 <returns></returns>
\r
603 <member name="F:System.Security.Cryptography.RSAParameters.Modulus">
\r
604 <summary>Represents the Modulus parameter for the <see cref="T:System.Security.Cryptography.RSA"></see> algorithm.</summary>
\r
605 <returns></returns>
\r
607 <member name="F:System.Security.Cryptography.RSAParameters.P">
\r
608 <summary>Represents the P parameter for the <see cref="T:System.Security.Cryptography.RSA"></see> algorithm.</summary>
\r
609 <returns></returns>
\r
611 <member name="F:System.Security.Cryptography.RSAParameters.Q">
\r
612 <summary>Represents the Q parameter for the <see cref="T:System.Security.Cryptography.RSA"></see> algorithm.</summary>
\r
613 <returns></returns>
\r
615 <member name="T:System.Security.Cryptography.RSAPKCS1KeyExchangeDeformatter">
\r
616 <summary>Decrypts the PKCS #1 key exchange data.</summary>
\r
618 <member name="M:System.Security.Cryptography.RSAPKCS1KeyExchangeDeformatter.#ctor">
\r
619 <summary>Initializes a new instance of the <see cref="T:System.Security.Cryptography.RSAPKCS1KeyExchangeDeformatter"></see> class.</summary>
\r
621 <member name="M:System.Security.Cryptography.RSAPKCS1KeyExchangeDeformatter.#ctor(System.Security.Cryptography.AsymmetricAlgorithm)">
\r
622 <summary>Initializes a new instance of the <see cref="T:System.Security.Cryptography.RSAPKCS1KeyExchangeDeformatter"></see> class with the specified key.</summary>
\r
623 <param name="key">The instance of the <see cref="T:System.Security.Cryptography.RSA"></see> algorithm that holds the private key.</param>
\r
624 <exception cref="T:System.ArgumentNullException"><paramref name="key">key</paramref> is null.</exception>
\r
626 <member name="M:System.Security.Cryptography.RSAPKCS1KeyExchangeDeformatter.DecryptKeyExchange(System.Byte[])">
\r
627 <summary>Extracts secret information from the encrypted key exchange data.</summary>
\r
628 <param name="rgbIn">The key exchange data within which the secret information is hidden.</param>
\r
629 <returns>The secret information derived from the key exchange data.</returns>
\r
630 <exception cref="T:System.Security.Cryptography.CryptographicUnexpectedOperationException">The key is missing.</exception>
\r
632 <member name="P:System.Security.Cryptography.RSAPKCS1KeyExchangeDeformatter.Parameters">
\r
633 <summary>Gets the parameters for the PKCS #1 key exchange.</summary>
\r
634 <returns>An XML string containing the parameters of the PKCS #1 key exchange operation.</returns>
\r
636 <member name="P:System.Security.Cryptography.RSAPKCS1KeyExchangeDeformatter.RNG">
\r
637 <summary>Gets or sets the random number generator algorithm to use in the creation of the key exchange.</summary>
\r
638 <returns>The instance of a random number generator algorithm to use.</returns>
\r
640 <member name="M:System.Security.Cryptography.RSAPKCS1KeyExchangeDeformatter.SetKey(System.Security.Cryptography.AsymmetricAlgorithm)">
\r
641 <summary>Sets the private key to use for decrypting the secret information.</summary>
\r
642 <param name="key">The instance of the <see cref="T:System.Security.Cryptography.RSA"></see> algorithm that holds the private key.</param>
\r
643 <exception cref="T:System.ArgumentNullException"><paramref name="key">key</paramref> is null.</exception>
\r
645 <member name="T:System.Security.Cryptography.RSAPKCS1KeyExchangeFormatter">
\r
646 <summary>Creates the PKCS#1 key exchange data using <see cref="T:System.Security.Cryptography.RSA"></see>.</summary>
\r
648 <member name="M:System.Security.Cryptography.RSAPKCS1KeyExchangeFormatter.#ctor">
\r
649 <summary>Initializes a new instance of the <see cref="T:System.Security.Cryptography.RSAPKCS1KeyExchangeFormatter"></see> class.</summary>
\r
651 <member name="M:System.Security.Cryptography.RSAPKCS1KeyExchangeFormatter.#ctor(System.Security.Cryptography.AsymmetricAlgorithm)">
\r
652 <summary>Initializes a new instance of the <see cref="T:System.Security.Cryptography.RSAPKCS1KeyExchangeFormatter"></see> class with the specified key.</summary>
\r
653 <param name="key">The instance of the <see cref="T:System.Security.Cryptography.RSA"></see> algorithm that holds the public key.</param>
\r
654 <exception cref="T:System.ArgumentNullException"><paramref name="key">key</paramref> is null.</exception>
\r
656 <member name="M:System.Security.Cryptography.RSAPKCS1KeyExchangeFormatter.CreateKeyExchange(System.Byte[])">
\r
657 <summary>Creates the encrypted key exchange data from the specified input data.</summary>
\r
658 <param name="rgbData">The secret information to be passed in the key exchange.</param>
\r
659 <returns>The encrypted key exchange data to be sent to the intended recipient.</returns>
\r
660 <exception cref="T:System.Security.Cryptography.CryptographicException"><paramref name="rgbData">rgbData</paramref> is too big.</exception>
\r
661 <exception cref="T:System.Security.Cryptography.CryptographicUnexpectedOperationException">The key is null.</exception>
\r
663 <member name="M:System.Security.Cryptography.RSAPKCS1KeyExchangeFormatter.CreateKeyExchange(System.Byte[],System.Type)">
\r
664 <summary>Creates the encrypted key exchange data from the specified input data.</summary>
\r
665 <param name="rgbData">The secret information to be passed in the key exchange.</param>
\r
666 <param name="symAlgType">This parameter is not used in the current version.</param>
\r
667 <returns>The encrypted key exchange data to be sent to the intended recipient.</returns>
\r
669 <member name="P:System.Security.Cryptography.RSAPKCS1KeyExchangeFormatter.Parameters">
\r
670 <summary>Gets the parameters for the PKCS #1 key exchange.</summary>
\r
671 <returns>An XML string containing the parameters of the PKCS #1 key exchange operation.</returns>
\r
673 <member name="P:System.Security.Cryptography.RSAPKCS1KeyExchangeFormatter.Rng">
\r
674 <summary>Gets or sets the random number generator algorithm to use in the creation of the key exchange.</summary>
\r
675 <returns>The instance of a random number generator algorithm to use.</returns>
\r
677 <member name="M:System.Security.Cryptography.RSAPKCS1KeyExchangeFormatter.SetKey(System.Security.Cryptography.AsymmetricAlgorithm)">
\r
678 <summary>Sets the public key to use for encrypting the key exchange data.</summary>
\r
679 <param name="key">The instance of the <see cref="T:System.Security.Cryptography.RSA"></see> algorithm that holds the public key.</param>
\r
680 <exception cref="T:System.ArgumentNullException"><paramref name="key">key</paramref> is null.</exception>
\r
682 <member name="T:System.Security.Cryptography.RSAPKCS1SignatureDeformatter">
\r
683 <summary>Verifies an <see cref="T:System.Security.Cryptography.RSA"></see> PKCS #1 version 1.5 signature.</summary>
\r
685 <member name="M:System.Security.Cryptography.RSAPKCS1SignatureDeformatter.#ctor">
\r
686 <summary>Initializes a new instance of the <see cref="T:System.Security.Cryptography.RSAPKCS1SignatureDeformatter"></see> class.</summary>
\r
688 <member name="M:System.Security.Cryptography.RSAPKCS1SignatureDeformatter.#ctor(System.Security.Cryptography.AsymmetricAlgorithm)">
\r
689 <summary>Initializes a new instance of the <see cref="T:System.Security.Cryptography.RSAPKCS1SignatureDeformatter"></see> class with the specified key.</summary>
\r
690 <param name="key">The instance of <see cref="T:System.Security.Cryptography.RSA"></see> that holds the public key.</param>
\r
691 <exception cref="T:System.ArgumentNullException"><paramref name="key">key</paramref> is null.</exception>
\r
693 <member name="M:System.Security.Cryptography.RSAPKCS1SignatureDeformatter.SetHashAlgorithm(System.String)">
\r
694 <summary>Sets the hash algorithm to use for verifying the signature.</summary>
\r
695 <param name="strName">The name of the hash algorithm to use for verifying the signature.</param>
\r
697 <member name="M:System.Security.Cryptography.RSAPKCS1SignatureDeformatter.SetKey(System.Security.Cryptography.AsymmetricAlgorithm)">
\r
698 <summary>Sets the public key to use for verifying the signature.</summary>
\r
699 <param name="key">The instance of <see cref="T:System.Security.Cryptography.RSA"></see> that holds the public key.</param>
\r
700 <exception cref="T:System.ArgumentNullException"><paramref name="key">key</paramref> is null.</exception>
\r
702 <member name="M:System.Security.Cryptography.RSAPKCS1SignatureDeformatter.VerifySignature(System.Byte[],System.Byte[])">
\r
703 <summary>Verifies the <see cref="T:System.Security.Cryptography.RSA"></see> PKCS#1 signature for the specified data.</summary>
\r
704 <param name="rgbHash">The data signed with rgbSignature.</param>
\r
705 <param name="rgbSignature">The signature to be verified for rgbHash.</param>
\r
706 <returns>true if <paramref name="rgbSignature">rgbSignature</paramref> matches the signature computed using the specified hash algorithm and key on <paramref name="rgbHash">rgbHash</paramref>; otherwise, false.</returns>
\r
707 <exception cref="T:System.Security.Cryptography.CryptographicUnexpectedOperationException">The key is null. -or- The hash algorithm is null.</exception>
\r
708 <exception cref="T:System.ArgumentNullException">The <paramref name="rgbHash">rgbHash</paramref> parameter is null. -or- The <paramref name="rgbSignature">rgbSignature</paramref> parameter is null.</exception>
\r
710 <member name="T:System.Security.Cryptography.RSAPKCS1SignatureFormatter">
\r
711 <summary>Creates an <see cref="T:System.Security.Cryptography.RSA"></see> PKCS #1 version 1.5 signature.</summary>
\r
713 <member name="M:System.Security.Cryptography.RSAPKCS1SignatureFormatter.#ctor">
\r
714 <summary>Initializes a new instance of the <see cref="T:System.Security.Cryptography.RSAPKCS1SignatureFormatter"></see> class.</summary>
\r
716 <member name="M:System.Security.Cryptography.RSAPKCS1SignatureFormatter.#ctor(System.Security.Cryptography.AsymmetricAlgorithm)">
\r
717 <summary>Initializes a new instance of the <see cref="T:System.Security.Cryptography.RSAPKCS1SignatureFormatter"></see> class with the specified key.</summary>
\r
718 <param name="key">The instance of the <see cref="T:System.Security.Cryptography.RSA"></see> algorithm that holds the private key.</param>
\r
719 <exception cref="T:System.ArgumentNullException"><paramref name="key">key</paramref> is null.</exception>
\r
721 <member name="M:System.Security.Cryptography.RSAPKCS1SignatureFormatter.CreateSignature(System.Byte[])">
\r
722 <summary>Creates the <see cref="T:System.Security.Cryptography.RSA"></see> PKCS #1 signature for the specified data.</summary>
\r
723 <param name="rgbHash">The data to be signed.</param>
\r
724 <returns>The digital signature for <paramref name="rgbHash">rgbHash</paramref>.</returns>
\r
725 <exception cref="T:System.Security.Cryptography.CryptographicUnexpectedOperationException">The key is null. -or- The hash algorithm is null.</exception>
\r
726 <exception cref="T:System.ArgumentNullException">The <paramref name="rgbHash">rgbHash</paramref> parameter is null.</exception>
\r
728 <member name="M:System.Security.Cryptography.RSAPKCS1SignatureFormatter.SetHashAlgorithm(System.String)">
\r
729 <summary>Sets the hash algorithm to use for creating the signature.</summary>
\r
730 <param name="strName">The name of the hash algorithm to use for creating the signature.</param>
\r
732 <member name="M:System.Security.Cryptography.RSAPKCS1SignatureFormatter.SetKey(System.Security.Cryptography.AsymmetricAlgorithm)">
\r
733 <summary>Sets the private key to use for creating the signature.</summary>
\r
734 <param name="key">The instance of the <see cref="T:System.Security.Cryptography.RSA"></see> algorithm that holds the private key.</param>
\r
735 <exception cref="T:System.ArgumentNullException"><paramref name="key">key</paramref> is null.</exception>
\r
737 <member name="T:System.Security.Cryptography.RSASignaturePadding">
\r
738 <summary>Specifies the padding mode and parameters to use with RSA signature creation or verification operations.</summary>
\r
740 <member name="M:System.Security.Cryptography.RSASignaturePadding.Equals(System.Object)">
\r
741 <summary>Returns a value that indicates whether this instance is equal to a specified object.</summary>
\r
742 <param name="obj">The object to compare with the current instance.</param>
\r
743 <returns>true if the specified object is equal to the current object; otherwise, false.</returns>
\r
745 <member name="M:System.Security.Cryptography.RSASignaturePadding.Equals(System.Security.Cryptography.RSASignaturePadding)">
\r
746 <summary>Returns a value that indicates whether this instance is equal to a specified <see cref="T:System.Security.Cryptography.RSASignaturePadding"></see> object.</summary>
\r
747 <param name="other">The object to compare with the current instance.</param>
\r
748 <returns>true if the specified object is equal to the current object; otherwise, false.</returns>
\r
750 <member name="M:System.Security.Cryptography.RSASignaturePadding.GetHashCode">
\r
751 <summary>Returns the hash code for this <see cref="T:System.Security.Cryptography.RSASignaturePadding"></see> instance.</summary>
\r
752 <returns>The hash code for this <see cref="T:System.Security.Cryptography.RSASignaturePadding"></see> instance.</returns>
\r
754 <member name="P:System.Security.Cryptography.RSASignaturePadding.Mode">
\r
755 <summary>Gets the padding mode of this <see cref="T:System.Security.Cryptography.RSASignaturePadding"></see> instance.</summary>
\r
756 <returns>The padding mode (either <see cref="F:System.Security.Cryptography.RSASignaturePaddingMode.Pkcs1"></see> or <see cref="F:System.Security.Cryptography.RSASignaturePaddingMode.Pss"></see>) of this instance.</returns>
\r
758 <member name="M:System.Security.Cryptography.RSASignaturePadding.op_Equality(System.Security.Cryptography.RSASignaturePadding,System.Security.Cryptography.RSASignaturePadding)">
\r
759 <summary>Indicates whether two specified <see cref="T:System.Security.Cryptography.RSASignaturePadding"></see> objects are equal.</summary>
\r
760 <param name="left">The first object to compare.</param>
\r
761 <param name="right">The second object to compare.</param>
\r
762 <returns>true if left and right are equal; otherwise, false.</returns>
\r
764 <member name="M:System.Security.Cryptography.RSASignaturePadding.op_Inequality(System.Security.Cryptography.RSASignaturePadding,System.Security.Cryptography.RSASignaturePadding)">
\r
765 <summary>Indicates whether two specified <see cref="T:System.Security.Cryptography.RSASignaturePadding"></see> objects are unequal.</summary>
\r
766 <param name="left">The first object to compare.</param>
\r
767 <param name="right">The second object to compare.</param>
\r
768 <returns>true if left and right are unequal; otherwise, false.</returns>
\r
770 <member name="P:System.Security.Cryptography.RSASignaturePadding.Pkcs1">
\r
771 <summary>Gets an object that uses the PKCS #1 v1.5 padding mode.</summary>
\r
772 <returns>An object that uses the <see cref="F:System.Security.Cryptography.RSASignaturePaddingMode.Pkcs1"></see> padding mode.</returns>
\r
774 <member name="P:System.Security.Cryptography.RSASignaturePadding.Pss">
\r
775 <summary>Gets an object that uses PSS padding mode.</summary>
\r
776 <returns>An object that uses the <see cref="F:System.Security.Cryptography.RSASignaturePaddingMode.Pss"></see> padding mode with the number of salt bytes equal to the size of the hash.</returns>
\r
778 <member name="M:System.Security.Cryptography.RSASignaturePadding.ToString">
\r
779 <summary>Returns the string representation of the current <see cref="T:System.Security.Cryptography.RSASignaturePadding"></see> instance.</summary>
\r
780 <returns>The string representation of the current object.</returns>
\r
782 <member name="T:System.Security.Cryptography.RSASignaturePaddingMode">
\r
783 <summary>Specifies the padding mode to use with RSA signature creation or verification operations.</summary>
\r
785 <member name="F:System.Security.Cryptography.RSASignaturePaddingMode.Pkcs1">
\r
786 <summary>PKCS #1 v1.5</summary>
\r
787 <returns></returns>
\r
789 <member name="F:System.Security.Cryptography.RSASignaturePaddingMode.Pss">
\r
790 <summary>Probabilistic Signature Scheme</summary>
\r
791 <returns></returns>
\r
793 <member name="T:System.Security.Cryptography.SHA1">
\r
794 <summary>Computes the <see cref="T:System.Security.Cryptography.SHA1"></see> hash for the input data.</summary>
\r
796 <member name="M:System.Security.Cryptography.SHA1.#ctor">
\r
797 <summary>Initializes a new instance of <see cref="T:System.Security.Cryptography.SHA1"></see>.</summary>
\r
798 <exception cref="T:System.InvalidOperationException">The policy on this object is not compliant with the FIPS algorithm.</exception>
\r
800 <member name="M:System.Security.Cryptography.SHA1.Create">
\r
801 <summary>Creates an instance of the default implementation of <see cref="T:System.Security.Cryptography.SHA1"></see>.</summary>
\r
802 <returns>A new instance of <see cref="T:System.Security.Cryptography.SHA1"></see>.</returns>
\r
804 <member name="M:System.Security.Cryptography.SHA1.Create(System.String)">
\r
805 <summary>Creates an instance of the specified implementation of <see cref="T:System.Security.Cryptography.SHA1"></see>.</summary>
\r
806 <param name="hashName">The name of the specific implementation of <see cref="T:System.Security.Cryptography.SHA1"></see> to be used.</param>
\r
807 <returns>A new instance of <see cref="T:System.Security.Cryptography.SHA1"></see> using the specified implementation.</returns>
\r
809 <member name="T:System.Security.Cryptography.SHA1Managed">
\r
810 <summary>Computes the <see cref="T:System.Security.Cryptography.SHA1"></see> hash for the input data using the managed library.</summary>
\r
812 <member name="M:System.Security.Cryptography.SHA1Managed.#ctor">
\r
813 <summary>Initializes a new instance of the <see cref="T:System.Security.Cryptography.SHA1Managed"></see> class.</summary>
\r
814 <exception cref="T:System.InvalidOperationException">This class is not compliant with the FIPS algorithm.</exception>
\r
816 <member name="M:System.Security.Cryptography.SHA1Managed.Dispose(System.Boolean)">
\r
817 <param name="disposing"></param>
\r
819 <member name="M:System.Security.Cryptography.SHA1Managed.HashCore(System.Byte[],System.Int32,System.Int32)">
\r
820 <summary>Routes data written to the object into the <see cref="T:System.Security.Cryptography.SHA1Managed"></see> hash algorithm for computing the hash.</summary>
\r
821 <param name="rgb">The input data.</param>
\r
822 <param name="ibStart">The offset into the byte array from which to begin using data.</param>
\r
823 <param name="cbSize">The number of bytes in the array to use as data.</param>
\r
825 <member name="M:System.Security.Cryptography.SHA1Managed.HashFinal">
\r
826 <summary>Returns the computed <see cref="T:System.Security.Cryptography.SHA1"></see> hash value after all data has been written to the object.</summary>
\r
827 <returns>The computed hash code.</returns>
\r
829 <member name="M:System.Security.Cryptography.SHA1Managed.Initialize">
\r
830 <summary>Initializes an instance of <see cref="T:System.Security.Cryptography.SHA1Managed"></see>.</summary>
\r
832 <member name="T:System.Security.Cryptography.SHA256">
\r
833 <summary>Computes the <see cref="T:System.Security.Cryptography.SHA256"></see> hash for the input data.</summary>
\r
835 <member name="M:System.Security.Cryptography.SHA256.#ctor">
\r
836 <summary>Initializes a new instance of <see cref="T:System.Security.Cryptography.SHA256"></see>.</summary>
\r
838 <member name="M:System.Security.Cryptography.SHA256.Create">
\r
839 <summary>Creates an instance of the default implementation of <see cref="T:System.Security.Cryptography.SHA256"></see>.</summary>
\r
840 <returns>A new instance of <see cref="T:System.Security.Cryptography.SHA256"></see>.</returns>
\r
841 <exception cref="T:System.Reflection.TargetInvocationException">The algorithm was used with Federal Information Processing Standards (FIPS) mode enabled, but is not FIPS compatible.</exception>
\r
843 <member name="M:System.Security.Cryptography.SHA256.Create(System.String)">
\r
844 <summary>Creates an instance of a specified implementation of <see cref="T:System.Security.Cryptography.SHA256"></see>.</summary>
\r
845 <param name="hashName">The name of the specific implementation of <see cref="T:System.Security.Cryptography.SHA256"></see> to be used.</param>
\r
846 <returns>A new instance of <see cref="T:System.Security.Cryptography.SHA256"></see> using the specified implementation.</returns>
\r
847 <exception cref="T:System.Reflection.TargetInvocationException">The algorithm described by the <paramref name="hashName">hashName</paramref> parameter was used with Federal Information Processing Standards (FIPS) mode enabled, but is not FIPS compatible.</exception>
\r
849 <member name="T:System.Security.Cryptography.SHA256Managed">
\r
850 <summary>Computes the <see cref="T:System.Security.Cryptography.SHA256"></see> hash for the input data using the managed library.</summary>
\r
852 <member name="M:System.Security.Cryptography.SHA256Managed.#ctor">
\r
853 <summary>Initializes a new instance of the <see cref="T:System.Security.Cryptography.SHA256Managed"></see> class using the managed library.</summary>
\r
854 <exception cref="T:System.InvalidOperationException">The Federal Information Processing Standards (FIPS) security setting is enabled. This implementation is not part of the Windows Platform FIPS-validated cryptographic algorithms.</exception>
\r
856 <member name="M:System.Security.Cryptography.SHA256Managed.Dispose(System.Boolean)">
\r
857 <param name="disposing"></param>
\r
859 <member name="M:System.Security.Cryptography.SHA256Managed.HashCore(System.Byte[],System.Int32,System.Int32)">
\r
860 <summary>When overridden in a derived class, routes data written to the object into the <see cref="T:System.Security.Cryptography.SHA256"></see> hash algorithm for computing the hash.</summary>
\r
861 <param name="rgb">The input data.</param>
\r
862 <param name="ibStart">The offset into the byte array from which to begin using data.</param>
\r
863 <param name="cbSize">The number of bytes in the array to use as data.</param>
\r
865 <member name="M:System.Security.Cryptography.SHA256Managed.HashFinal">
\r
866 <summary>When overridden in a derived class, finalizes the hash computation after the last data is processed by the cryptographic stream object.</summary>
\r
867 <returns>The computed hash code.</returns>
\r
869 <member name="M:System.Security.Cryptography.SHA256Managed.Initialize">
\r
870 <summary>Initializes an instance of <see cref="T:System.Security.Cryptography.SHA256Managed"></see>.</summary>
\r
872 <member name="T:System.Security.Cryptography.SHA384">
\r
873 <summary>Computes the <see cref="T:System.Security.Cryptography.SHA384"></see> hash for the input data.</summary>
\r
875 <member name="M:System.Security.Cryptography.SHA384.#ctor">
\r
876 <summary>Initializes a new instance of <see cref="T:System.Security.Cryptography.SHA384"></see>.</summary>
\r
878 <member name="M:System.Security.Cryptography.SHA384.Create">
\r
879 <summary>Creates an instance of the default implementation of <see cref="T:System.Security.Cryptography.SHA384"></see>.</summary>
\r
880 <returns>A new instance of <see cref="T:System.Security.Cryptography.SHA384"></see>.</returns>
\r
881 <exception cref="T:System.Reflection.TargetInvocationException">The algorithm was used with Federal Information Processing Standards (FIPS) mode enabled, but is not FIPS compatible.</exception>
\r
883 <member name="M:System.Security.Cryptography.SHA384.Create(System.String)">
\r
884 <summary>Creates an instance of a specified implementation of <see cref="T:System.Security.Cryptography.SHA384"></see>.</summary>
\r
885 <param name="hashName">The name of the specific implementation of <see cref="T:System.Security.Cryptography.SHA384"></see> to be used.</param>
\r
886 <returns>A new instance of <see cref="T:System.Security.Cryptography.SHA384"></see> using the specified implementation.</returns>
\r
887 <exception cref="T:System.Reflection.TargetInvocationException">The algorithm described by the <paramref name="hashName">hashName</paramref> parameter was used with Federal Information Processing Standards (FIPS) mode enabled, but is not FIPS compatible.</exception>
\r
889 <member name="T:System.Security.Cryptography.SHA384Managed">
\r
890 <summary>Computes the <see cref="T:System.Security.Cryptography.SHA384"></see> hash for the input data using the managed library.</summary>
\r
892 <member name="M:System.Security.Cryptography.SHA384Managed.#ctor">
\r
893 <summary>Initializes a new instance of the <see cref="T:System.Security.Cryptography.SHA384Managed"></see> class.</summary>
\r
894 <exception cref="T:System.InvalidOperationException">The Federal Information Processing Standards (FIPS) security setting is enabled. This implementation is not part of the Windows Platform FIPS-validated cryptographic algorithms.</exception>
\r
896 <member name="M:System.Security.Cryptography.SHA384Managed.Dispose(System.Boolean)">
\r
897 <param name="disposing"></param>
\r
899 <member name="M:System.Security.Cryptography.SHA384Managed.HashCore(System.Byte[],System.Int32,System.Int32)">
\r
900 <summary>When overridden in a derived class, routes data written to the object into the <see cref="T:System.Security.Cryptography.SHA384Managed"></see> hash algorithm for computing the hash.</summary>
\r
901 <param name="rgb">The input data.</param>
\r
902 <param name="ibStart">The offset into the byte array from which to begin using data.</param>
\r
903 <param name="cbSize">The number of bytes in the array to use as data.</param>
\r
905 <member name="M:System.Security.Cryptography.SHA384Managed.HashFinal">
\r
906 <summary>When overridden in a derived class, finalizes the hash computation after the last data is processed by the cryptographic stream object.</summary>
\r
907 <returns>The computed hash code.</returns>
\r
909 <member name="M:System.Security.Cryptography.SHA384Managed.Initialize">
\r
910 <summary>Initializes an instance of <see cref="T:System.Security.Cryptography.SHA384Managed"></see>.</summary>
\r
912 <member name="T:System.Security.Cryptography.SHA512">
\r
913 <summary>Computes the <see cref="T:System.Security.Cryptography.SHA512"></see> hash for the input data.</summary>
\r
915 <member name="M:System.Security.Cryptography.SHA512.#ctor">
\r
916 <summary>Initializes a new instance of <see cref="T:System.Security.Cryptography.SHA512"></see>.</summary>
\r
918 <member name="M:System.Security.Cryptography.SHA512.Create">
\r
919 <summary>Creates an instance of the default implementation of <see cref="T:System.Security.Cryptography.SHA512"></see>.</summary>
\r
920 <returns>A new instance of <see cref="T:System.Security.Cryptography.SHA512"></see>.</returns>
\r
921 <exception cref="T:System.Reflection.TargetInvocationException">The algorithm was used with Federal Information Processing Standards (FIPS) mode enabled, but is not FIPS compatible.</exception>
\r
923 <member name="M:System.Security.Cryptography.SHA512.Create(System.String)">
\r
924 <summary>Creates an instance of a specified implementation of <see cref="T:System.Security.Cryptography.SHA512"></see>.</summary>
\r
925 <param name="hashName">The name of the specific implementation of <see cref="T:System.Security.Cryptography.SHA512"></see> to be used.</param>
\r
926 <returns>A new instance of <see cref="T:System.Security.Cryptography.SHA512"></see> using the specified implementation.</returns>
\r
927 <exception cref="T:System.Reflection.TargetInvocationException">The algorithm described by the <paramref name="hashName">hashName</paramref> parameter was used with Federal Information Processing Standards (FIPS) mode enabled, but is not FIPS compatible.</exception>
\r
929 <member name="T:System.Security.Cryptography.SHA512Managed">
\r
930 <summary>Computes the <see cref="T:System.Security.Cryptography.SHA512"></see> hash algorithm for the input data using the managed library.</summary>
\r
932 <member name="M:System.Security.Cryptography.SHA512Managed.#ctor">
\r
933 <summary>Initializes a new instance of the <see cref="T:System.Security.Cryptography.SHA512Managed"></see> class.</summary>
\r
934 <exception cref="T:System.InvalidOperationException">The Federal Information Processing Standards (FIPS) security setting is enabled. This implementation is not part of the Windows Platform FIPS-validated cryptographic algorithms.</exception>
\r
936 <member name="M:System.Security.Cryptography.SHA512Managed.Dispose(System.Boolean)">
\r
937 <param name="disposing"></param>
\r
939 <member name="M:System.Security.Cryptography.SHA512Managed.HashCore(System.Byte[],System.Int32,System.Int32)">
\r
940 <summary>When overridden in a derived class, routes data written to the object into the <see cref="T:System.Security.Cryptography.SHA512Managed"></see> hash algorithm for computing the hash.</summary>
\r
941 <param name="rgb">The input data.</param>
\r
942 <param name="ibStart">The offset into the byte array from which to begin using data.</param>
\r
943 <param name="cbSize">The number of bytes in the array to use as data.</param>
\r
945 <member name="M:System.Security.Cryptography.SHA512Managed.HashFinal">
\r
946 <summary>When overridden in a derived class, finalizes the hash computation after the last data is processed by the cryptographic stream object.</summary>
\r
947 <returns>The computed hash code.</returns>
\r
949 <member name="M:System.Security.Cryptography.SHA512Managed.Initialize">
\r
950 <summary>Initializes an instance of the <see cref="T:System.Security.Cryptography.SHA512Managed"></see> class using the managed library.</summary>
\r
952 <member name="T:System.Security.Cryptography.SignatureDescription">
\r
953 <summary>Contains information about the properties of a digital signature.</summary>
\r
955 <member name="M:System.Security.Cryptography.SignatureDescription.#ctor">
\r
956 <summary>Initializes a new instance of the <see cref="T:System.Security.Cryptography.SignatureDescription"></see> class.</summary>
\r
958 <member name="M:System.Security.Cryptography.SignatureDescription.#ctor(System.Security.SecurityElement)">
\r
959 <summary>Initializes a new instance of the <see cref="T:System.Security.Cryptography.SignatureDescription"></see> class from the specified <see cref="T:System.Security.SecurityElement"></see>.</summary>
\r
960 <param name="el">The <see cref="T:System.Security.SecurityElement"></see> from which to get the algorithms for the signature description.</param>
\r
961 <exception cref="T:System.ArgumentNullException">The <paramref name="el">el</paramref> parameter is null.</exception>
\r
963 <member name="M:System.Security.Cryptography.SignatureDescription.CreateDeformatter(System.Security.Cryptography.AsymmetricAlgorithm)">
\r
964 <summary>Creates an <see cref="T:System.Security.Cryptography.AsymmetricSignatureDeformatter"></see> instance with the specified key using the <see cref="P:System.Security.Cryptography.SignatureDescription.DeformatterAlgorithm"></see> property.</summary>
\r
965 <param name="key">The key to use in the <see cref="T:System.Security.Cryptography.AsymmetricSignatureDeformatter"></see>.</param>
\r
966 <returns>The newly created <see cref="T:System.Security.Cryptography.AsymmetricSignatureDeformatter"></see> instance.</returns>
\r
968 <member name="M:System.Security.Cryptography.SignatureDescription.CreateDigest">
\r
969 <summary>Creates a <see cref="T:System.Security.Cryptography.HashAlgorithm"></see> instance using the <see cref="P:System.Security.Cryptography.SignatureDescription.DigestAlgorithm"></see> property.</summary>
\r
970 <returns>The newly created <see cref="T:System.Security.Cryptography.HashAlgorithm"></see> instance.</returns>
\r
972 <member name="M:System.Security.Cryptography.SignatureDescription.CreateFormatter(System.Security.Cryptography.AsymmetricAlgorithm)">
\r
973 <summary>Creates an <see cref="T:System.Security.Cryptography.AsymmetricSignatureFormatter"></see> instance with the specified key using the <see cref="P:System.Security.Cryptography.SignatureDescription.FormatterAlgorithm"></see> property.</summary>
\r
974 <param name="key">The key to use in the <see cref="T:System.Security.Cryptography.AsymmetricSignatureFormatter"></see>.</param>
\r
975 <returns>The newly created <see cref="T:System.Security.Cryptography.AsymmetricSignatureFormatter"></see> instance.</returns>
\r
977 <member name="P:System.Security.Cryptography.SignatureDescription.DeformatterAlgorithm">
\r
978 <summary>Gets or sets the deformatter algorithm for the signature description.</summary>
\r
979 <returns>The deformatter algorithm for the signature description.</returns>
\r
981 <member name="P:System.Security.Cryptography.SignatureDescription.DigestAlgorithm">
\r
982 <summary>Gets or sets the digest algorithm for the signature description.</summary>
\r
983 <returns>The digest algorithm for the signature description.</returns>
\r
985 <member name="P:System.Security.Cryptography.SignatureDescription.FormatterAlgorithm">
\r
986 <summary>Gets or sets the formatter algorithm for the signature description.</summary>
\r
987 <returns>The formatter algorithm for the signature description.</returns>
\r
989 <member name="P:System.Security.Cryptography.SignatureDescription.KeyAlgorithm">
\r
990 <summary>Gets or sets the key algorithm for the signature description.</summary>
\r
991 <returns>The key algorithm for the signature description.</returns>
\r
993 <member name="T:System.Security.Cryptography.TripleDES">
\r
994 <summary>Represents the base class for Triple Data Encryption Standard algorithms from which all <see cref="T:System.Security.Cryptography.TripleDES"></see> implementations must derive.</summary>
\r
996 <member name="M:System.Security.Cryptography.TripleDES.#ctor">
\r
997 <summary>Initializes a new instance of the <see cref="T:System.Security.Cryptography.TripleDES"></see> class.</summary>
\r
999 <member name="M:System.Security.Cryptography.TripleDES.Create">
\r
1000 <summary>Creates an instance of a cryptographic object to perform the <see cref="T:System.Security.Cryptography.TripleDES"></see> algorithm.</summary>
\r
1001 <returns>An instance of a cryptographic object.</returns>
\r
1003 <member name="M:System.Security.Cryptography.TripleDES.Create(System.String)">
\r
1004 <summary>Creates an instance of a cryptographic object to perform the specified implementation of the <see cref="T:System.Security.Cryptography.TripleDES"></see> algorithm.</summary>
\r
1005 <param name="str">The name of the specific implementation of <see cref="T:System.Security.Cryptography.TripleDES"></see> to use.</param>
\r
1006 <returns>An instance of a cryptographic object.</returns>
\r
1008 <member name="M:System.Security.Cryptography.TripleDES.IsWeakKey(System.Byte[])">
\r
1009 <summary>Determines whether the specified key is weak.</summary>
\r
1010 <param name="rgbKey">The secret key to test for weakness.</param>
\r
1011 <returns>true if the key is weak; otherwise, false.</returns>
\r
1012 <exception cref="T:System.Security.Cryptography.CryptographicException">The size of the <paramref name="rgbKey">rgbKey</paramref> parameter is not valid.</exception>
\r
1014 <member name="P:System.Security.Cryptography.TripleDES.Key">
\r
1015 <summary>Gets or sets the secret key for the <see cref="T:System.Security.Cryptography.TripleDES"></see> algorithm.</summary>
\r
1016 <returns>The secret key for the <see cref="T:System.Security.Cryptography.TripleDES"></see> algorithm.</returns>
\r
1017 <exception cref="T:System.ArgumentNullException">An attempt was made to set the key to null.</exception>
\r
1018 <exception cref="T:System.Security.Cryptography.CryptographicException">An attempt was made to set a key whose length is invalid. -or- An attempt was made to set a weak key (see <see cref="M:System.Security.Cryptography.TripleDES.IsWeakKey(System.Byte[])"></see>).</exception>
\r
1020 <member name="P:System.Security.Cryptography.TripleDES.LegalBlockSizes">
\r
1021 <returns></returns>
\r
1023 <member name="P:System.Security.Cryptography.TripleDES.LegalKeySizes">
\r
1024 <returns></returns>
\r
1026 <member name="T:System.Security.Cryptography.ECDiffieHellmanPublicKey">
\r
1027 <summary>Provides an abstract base class from which all <see cref="T:System.Security.Cryptography.ECDiffieHellmanCngPublicKey"></see> implementations must inherit.</summary>
\r
1029 <member name="M:System.Security.Cryptography.ECDiffieHellmanPublicKey.#ctor(System.Byte[])">
\r
1030 <summary>Initializes a new instance of the <see cref="T:System.Security.Cryptography.ECDiffieHellmanPublicKey"></see> class.</summary>
\r
1031 <param name="keyBlob">A byte array that represents an <see cref="T:System.Security.Cryptography.ECDiffieHellmanPublicKey"></see> object.</param>
\r
1032 <exception cref="T:System.ArgumentNullException"><paramref name="keyBlob">keyBlob</paramref> is null.</exception>
\r
1034 <member name="M:System.Security.Cryptography.ECDiffieHellmanPublicKey.Dispose">
\r
1035 <summary>Releases all resources used by the current instance of the <see cref="T:System.Security.Cryptography.ECDiffieHellman"></see> class.</summary>
\r
1037 <member name="M:System.Security.Cryptography.ECDiffieHellmanPublicKey.Dispose(System.Boolean)">
\r
1038 <summary>Releases the unmanaged resources used by the <see cref="T:System.Security.Cryptography.ECDiffieHellman"></see> class and optionally releases the managed resources.</summary>
\r
1039 <param name="disposing">true to release both managed and unmanaged resources; false to release only unmanaged resources.</param>
\r
1041 <member name="M:System.Security.Cryptography.ECDiffieHellmanPublicKey.ToByteArray">
\r
1042 <summary>Serializes the <see cref="T:System.Security.Cryptography.ECDiffieHellmanPublicKey"></see> key BLOB to a byte array.</summary>
\r
1043 <returns>A byte array that contains the serialized Elliptic Curve Diffie-Hellman (ECDH) public key.</returns>
\r
1045 <member name="M:System.Security.Cryptography.ECDiffieHellmanPublicKey.ToXmlString">
\r
1046 <summary>Serializes the <see cref="T:System.Security.Cryptography.ECDiffieHellmanPublicKey"></see> public key to an XML string.</summary>
\r
1047 <returns>An XML string that contains the serialized Elliptic Curve Diffie-Hellman (ECDH) public key.</returns>
\r
1049 <member name="T:System.Security.Cryptography.ECDsa">
\r
1050 <summary>Provides an abstract base class that encapsulates the Elliptic Curve Digital Signature Algorithm (ECDSA).</summary>
\r
1052 <member name="M:System.Security.Cryptography.ECDsa.#ctor">
\r
1053 <summary>Initializes a new instance of the <see cref="T:System.Security.Cryptography.ECDsa"></see> class.</summary>
\r
1055 <member name="M:System.Security.Cryptography.ECDsa.Create">
\r
1056 <summary>Creates a new instance of the default implementation of the Elliptic Curve Digital Signature Algorithm (ECDSA).</summary>
\r
1057 <returns>A new instance of the default implementation (<see cref="T:System.Security.Cryptography.ECDsaCng"></see>) of this class.</returns>
\r
1059 <member name="M:System.Security.Cryptography.ECDsa.Create(System.Security.Cryptography.ECCurve)">
\r
1060 <summary>Creates a new instance of the default implementation of the Elliptic Curve Digital Signature Algorithm (ECDSA) with a newly generated key over the specified curve.</summary>
\r
1061 <param name="curve">The curve to use for key generation.</param>
\r
1062 <returns>A new instance of the default implementation (<see cref="T:System.Security.Cryptography.ECDsaCng"></see>) of this class.</returns>
\r
1064 <member name="M:System.Security.Cryptography.ECDsa.Create(System.Security.Cryptography.ECParameters)">
\r
1065 <summary>Creates a new instance of the default implementation of the Elliptic Curve Digital Signature Algorithm (ECDSA) using the specified parameters as the key.</summary>
\r
1066 <param name="parameters">The parameters representing the key to use.</param>
\r
1067 <returns>A new instance of the default implementation (<see cref="T:System.Security.Cryptography.ECDsaCng"></see>) of this class.</returns>
\r
1069 <member name="M:System.Security.Cryptography.ECDsa.Create(System.String)">
\r
1070 <summary>Creates a new instance of the specified implementation of the Elliptic Curve Digital Signature Algorithm (ECDSA).</summary>
\r
1071 <param name="algorithm">The name of an ECDSA implementation. The following strings all refer to the same implementation, which is the only implementation currently supported in the .NET Framework: - "ECDsa" - "ECDsaCng" - "System.Security.Cryptography.ECDsaCng" You can also provide the name of a custom ECDSA implementation.</param>
\r
1072 <returns>A new instance of the specified implementation of this class. If the specified algorithm name does not map to an ECDSA implementation, this method returns null.</returns>
\r
1073 <exception cref="T:System.ArgumentNullException">The <paramref name="algorithm">algorithm</paramref> parameter is null.</exception>
\r
1075 <member name="M:System.Security.Cryptography.ECDsa.ExportExplicitParameters(System.Boolean)">
\r
1076 <summary>When overridden in a derived class, exports the explicit parameters for an elliptic curve.</summary>
\r
1077 <param name="includePrivateParameters">true to include private parameters; otherwise, false.</param>
\r
1078 <returns>The parameters representing the point on the curve for this key, using the explicit curve format.</returns>
\r
1079 <exception cref="T:System.NotSupportedException">A derived class must override this method.</exception>
\r
1081 <member name="M:System.Security.Cryptography.ECDsa.ExportParameters(System.Boolean)">
\r
1082 <summary>When overridden in a derived class, exports the named or explicit parameters for an elliptic curve. If the curve has a name, the <see cref="F:System.Security.Cryptography.ECParameters.Curve"></see> field contains named curve parameters, otherwise it contains explicit parameters.</summary>
\r
1083 <param name="includePrivateParameters">true to include private parameters; otherwise, false.</param>
\r
1084 <returns>The parameters representing the point on the curve for this key.</returns>
\r
1085 <exception cref="T:System.NotSupportedException">A derived class must override this method.</exception>
\r
1087 <member name="M:System.Security.Cryptography.ECDsa.FromXmlString(System.String)">
\r
1088 <param name="xmlString"></param>
\r
1090 <member name="M:System.Security.Cryptography.ECDsa.GenerateKey(System.Security.Cryptography.ECCurve)">
\r
1091 <summary>When overridden in a derived class, generates a new public/private key pair for the specified curve.</summary>
\r
1092 <param name="curve">The curve to use.</param>
\r
1093 <exception cref="T:System.NotSupportedException">A derived class must override this method.</exception>
\r
1095 <member name="M:System.Security.Cryptography.ECDsa.HashData(System.IO.Stream,System.Security.Cryptography.HashAlgorithmName)">
\r
1096 <summary>When overridden in a derived class, computes the hash value of the specified binary stream by using the specified hashing algorithm.</summary>
\r
1097 <param name="data">The binary stream to hash.</param>
\r
1098 <param name="hashAlgorithm">The algorithm to use to hash the data.</param>
\r
1099 <returns>The hashed data.</returns>
\r
1100 <exception cref="T:System.NotImplementedException">A derived class must override this method.</exception>
\r
1102 <member name="M:System.Security.Cryptography.ECDsa.HashData(System.Byte[],System.Int32,System.Int32,System.Security.Cryptography.HashAlgorithmName)">
\r
1103 <summary>When overridden in a derived class, computes the hash value of the specified portion of a byte array by using the specified hashing algorithm.</summary>
\r
1104 <param name="data">The data to be hashed.</param>
\r
1105 <param name="offset">The index of the first byte in data to be hashed.</param>
\r
1106 <param name="count">The number of bytes to hash.</param>
\r
1107 <param name="hashAlgorithm">The algorithm to use to hash the data.</param>
\r
1108 <returns>The hashed data.</returns>
\r
1109 <exception cref="T:System.NotImplementedException">A derived class must override this method.</exception>
\r
1111 <member name="M:System.Security.Cryptography.ECDsa.ImportParameters(System.Security.Cryptography.ECParameters)">
\r
1112 <summary>When overridden in a derived class, imports the specified parameters.</summary>
\r
1113 <param name="parameters">The curve parameters.</param>
\r
1114 <exception cref="T:System.NotSupportedException">A derived class must override this method.</exception>
\r
1116 <member name="P:System.Security.Cryptography.ECDsa.KeyExchangeAlgorithm">
\r
1117 <summary>Gets the name of the key exchange algorithm.</summary>
\r
1118 <returns>Always null.</returns>
\r
1120 <member name="P:System.Security.Cryptography.ECDsa.SignatureAlgorithm">
\r
1121 <summary>Gets the name of the signature algorithm.</summary>
\r
1122 <returns>The string "ECDsa".</returns>
\r
1124 <member name="M:System.Security.Cryptography.ECDsa.SignData(System.Byte[],System.Security.Cryptography.HashAlgorithmName)">
\r
1125 <summary>Computes the hash value of the specified byte array using the specified hash algorithm and signs the resulting hash value.</summary>
\r
1126 <param name="data">The input data for which to compute the hash.</param>
\r
1127 <param name="hashAlgorithm">The hash algorithm to use to create the hash value.</param>
\r
1128 <returns>The ECDSA signature for the specified data.</returns>
\r
1129 <exception cref="T:System.ArgumentNullException"><paramref name="data">data</paramref> is null.</exception>
\r
1130 <exception cref="T:System.ArgumentException"><paramref name="hashAlgorithm">hashAlgorithm</paramref>.<see cref="P:System.Security.Cryptography.HashAlgorithmName.Name"></see> is null or <see cref="F:System.String.Empty"></see>.</exception>
\r
1132 <member name="M:System.Security.Cryptography.ECDsa.SignData(System.IO.Stream,System.Security.Cryptography.HashAlgorithmName)">
\r
1133 <summary>Computes the hash value of the specified stream using the specified hash algorithm and signs the resulting hash value.</summary>
\r
1134 <param name="data">The input stream for which to compute the hash.</param>
\r
1135 <param name="hashAlgorithm">The hash algorithm to use to create the hash value.</param>
\r
1136 <returns>The ECDSA signature for the specified data.</returns>
\r
1137 <exception cref="T:System.ArgumentNullException"><paramref name="data">data</paramref> is null.</exception>
\r
1138 <exception cref="T:System.ArgumentException"><paramref name="hashAlgorithm">hashAlgorithm</paramref>.<see cref="P:System.Security.Cryptography.HashAlgorithmName.Name"></see> is null or <see cref="F:System.String.Empty"></see>.</exception>
\r
1140 <member name="M:System.Security.Cryptography.ECDsa.SignData(System.Byte[],System.Int32,System.Int32,System.Security.Cryptography.HashAlgorithmName)">
\r
1141 <summary>Computes the hash value of a portion of the specified byte array using the specified hash algorithm and signs the resulting hash value.</summary>
\r
1142 <param name="data">The input data for which to compute the hash.</param>
\r
1143 <param name="offset">The offset into the array at which to begin using data.</param>
\r
1144 <param name="count">The number of bytes in the array to use as data.</param>
\r
1145 <param name="hashAlgorithm">The hash algorithm to use to create the hash value.</param>
\r
1146 <returns>The ECDSA signature for the specified data.</returns>
\r
1147 <exception cref="T:System.ArgumentNullException"><paramref name="data">data</paramref> is null.</exception>
\r
1148 <exception cref="T:System.ArgumentException"><paramref name="hashAlgorithm">hashAlgorithm</paramref>.<see cref="P:System.Security.Cryptography.HashAlgorithmName.Name"></see> is null or <see cref="F:System.String.Empty"></see>.</exception>
\r
1149 <exception cref="T:System.ArgumentOutOfRangeException"><paramref name="offset">offset</paramref> is less than zero. -or- <paramref name="count">count</paramref> is less than zero. -or- <paramref name="offset">offset</paramref> + <paramref name="count">count</paramref> – 1 results in an index that is beyond the upper bound of <paramref name="data">data</paramref>.</exception>
\r
1151 <member name="M:System.Security.Cryptography.ECDsa.SignHash(System.Byte[])">
\r
1152 <summary>Generates a digital signature for the specified hash value.</summary>
\r
1153 <param name="hash">The hash value of the data that is being signed.</param>
\r
1154 <returns>A digital signature that consists of the given hash value encrypted with the private key.</returns>
\r
1155 <exception cref="T:System.ArgumentNullException">The <paramref name="hash">hash</paramref> parameter is null.</exception>
\r
1157 <member name="M:System.Security.Cryptography.ECDsa.ToXmlString(System.Boolean)">
\r
1158 <param name="includePrivateParameters"></param>
\r
1159 <returns></returns>
\r
1161 <member name="M:System.Security.Cryptography.ECDsa.VerifyData(System.Byte[],System.Byte[],System.Security.Cryptography.HashAlgorithmName)">
\r
1162 <summary>Verifies that a digital signature is valid by calculating the hash value of the specified data using the specified hash algorithm and comparing it to the provided signature.</summary>
\r
1163 <param name="data">The signed data.</param>
\r
1164 <param name="signature">The signature data to be verified.</param>
\r
1165 <param name="hashAlgorithm">The hash algorithm used to create the hash value of the data.</param>
\r
1166 <returns>true if the signature is valid; otherwise, false.</returns>
\r
1167 <exception cref="T:System.ArgumentNullException"><paramref name="data">data</paramref> is null. -or- <paramref name="signature">signature</paramref> is null.</exception>
\r
1168 <exception cref="T:System.ArgumentException"><paramref name="hashAlgorithm">hashAlgorithm</paramref>.<see cref="P:System.Security.Cryptography.HashAlgorithmName.Name"></see> is null or <see cref="F:System.String.Empty"></see>.</exception>
\r
1170 <member name="M:System.Security.Cryptography.ECDsa.VerifyData(System.IO.Stream,System.Byte[],System.Security.Cryptography.HashAlgorithmName)">
\r
1171 <summary>Verifies that a digital signature is valid by calculating the hash value of the specified stream using the specified hash algorithm and comparing it to the provided signature.</summary>
\r
1172 <param name="data">The signed data.</param>
\r
1173 <param name="signature">The signature data to be verified.</param>
\r
1174 <param name="hashAlgorithm">The hash algorithm used to create the hash value of the data.</param>
\r
1175 <returns>true if the signature is valid; otherwise, false.</returns>
\r
1176 <exception cref="T:System.ArgumentNullException"><paramref name="data">data</paramref> is null. -or- <paramref name="signature">signature</paramref> is null.</exception>
\r
1177 <exception cref="T:System.ArgumentException"><paramref name="hashAlgorithm">hashAlgorithm</paramref>.<see cref="P:System.Security.Cryptography.HashAlgorithmName.Name"></see> is null or <see cref="F:System.String.Empty"></see>.</exception>
\r
1179 <member name="M:System.Security.Cryptography.ECDsa.VerifyData(System.Byte[],System.Int32,System.Int32,System.Byte[],System.Security.Cryptography.HashAlgorithmName)">
\r
1180 <summary>Verifies that a digital signature is valid by calculating the hash value of the data in a portion of a byte array using the specified hash algorithm and comparing it to the provided signature.</summary>
\r
1181 <param name="data">The signed data.</param>
\r
1182 <param name="offset">The starting index at which to compute the hash.</param>
\r
1183 <param name="count">The number of bytes to hash.</param>
\r
1184 <param name="signature">The signature data to be verified.</param>
\r
1185 <param name="hashAlgorithm">The hash algorithm used to create the hash value of the data.</param>
\r
1186 <returns>true if the signature is valid; otherwise, false.</returns>
\r
1187 <exception cref="T:System.ArgumentNullException"><paramref name="data">data</paramref> is null. -or- <paramref name="signature">signature</paramref> is null.</exception>
\r
1188 <exception cref="T:System.ArgumentException"><paramref name="hashAlgorithm">hashAlgorithm</paramref>.<see cref="P:System.Security.Cryptography.HashAlgorithmName.Name"></see> is null or <see cref="F:System.String.Empty"></see>.</exception>
\r
1189 <exception cref="T:System.ArgumentOutOfRangeException"><paramref name="offset">offset</paramref> is less than zero. -or- <paramref name="count">count</paramref> is less than zero. -or- <paramref name="offset">offset</paramref> + <paramref name="count">count</paramref> – 1 results in an index that is beyond the upper bound of <paramref name="data">data</paramref>.</exception>
\r
1191 <member name="M:System.Security.Cryptography.ECDsa.VerifyHash(System.Byte[],System.Byte[])">
\r
1192 <summary>Verifies a digital signature against the specified hash value.</summary>
\r
1193 <param name="hash">The hash value of a block of data.</param>
\r
1194 <param name="signature">The digital signature to be verified.</param>
\r
1195 <returns>true if the hash value equals the decrypted signature; otherwise, false.</returns>
\r
1197 <member name="T:System.Security.Cryptography.ECParameters">
\r
1198 <summary>Represents the standard parameters for the elliptic curve cryptography (ECC) algorithm.</summary>
\r
1200 <member name="F:System.Security.Cryptography.ECParameters.Curve">
\r
1201 <summary>Represents the curve associated with the public key (<see cref="F:System.Security.Cryptography.ECParameters.Q"></see>) and the optional private key (<see cref="F:System.Security.Cryptography.ECParameters.D"></see>).</summary>
\r
1202 <returns></returns>
\r
1204 <member name="F:System.Security.Cryptography.ECParameters.D">
\r
1205 <summary>Represents the private key D for the elliptic curve cryptography (ECC) algorithm, stored in big-endian format.</summary>
\r
1206 <returns></returns>
\r
1208 <member name="F:System.Security.Cryptography.ECParameters.Q">
\r
1209 <summary>Represents the public key Q for the elliptic curve cryptography (ECC) algorithm.</summary>
\r
1210 <returns></returns>
\r
1212 <member name="M:System.Security.Cryptography.ECParameters.Validate">
\r
1213 <summary>Validates the current object.</summary>
\r
1214 <exception cref="T:System.Security.Cryptography.CryptographicException">The key or curve parameters are not valid for the current curve type.</exception>
\r
1216 <member name="T:System.Security.Cryptography.ECPoint">
\r
1217 <summary>Represents a (X,Y) coordinate pair for elliptic curve cryptography (ECC) structures.</summary>
\r
1219 <member name="F:System.Security.Cryptography.ECPoint.X">
\r
1220 <summary>Represents the X coordinate.</summary>
\r
1221 <returns></returns>
\r
1223 <member name="F:System.Security.Cryptography.ECPoint.Y">
\r
1224 <summary>Represents the Y coordinate.</summary>
\r
1225 <returns></returns>
\r
1227 <member name="T:System.Security.Cryptography.HMACMD5">
\r
1228 <summary>Computes a Hash-based Message Authentication Code (HMAC) by using the <see cref="T:System.Security.Cryptography.MD5"></see> hash function.</summary>
\r
1230 <member name="M:System.Security.Cryptography.HMACMD5.#ctor">
\r
1231 <summary>Initializes a new instance of the <see cref="T:System.Security.Cryptography.HMACMD5"></see> class by using a randomly generated key.</summary>
\r
1233 <member name="M:System.Security.Cryptography.HMACMD5.#ctor(System.Byte[])">
\r
1234 <summary>Initializes a new instance of the <see cref="T:System.Security.Cryptography.HMACMD5"></see> class by using the specified key.</summary>
\r
1235 <param name="key">The secret key for <see cref="T:System.Security.Cryptography.HMACMD5"></see> encryption. The key can be any length, but if it is more than 64 bytes long it will be hashed (using SHA-1) to derive a 64-byte key. Therefore, the recommended size of the secret key is 64 bytes.</param>
\r
1236 <exception cref="T:System.ArgumentNullException">The <paramref name="key">key</paramref> parameter is null.</exception>
\r
1238 <member name="M:System.Security.Cryptography.HMACMD5.Dispose(System.Boolean)">
\r
1239 <param name="disposing"></param>
\r
1241 <member name="M:System.Security.Cryptography.HMACMD5.HashCore(System.Byte[],System.Int32,System.Int32)">
\r
1242 <param name="rgb"></param>
\r
1243 <param name="ib"></param>
\r
1244 <param name="cb"></param>
\r
1246 <member name="M:System.Security.Cryptography.HMACMD5.HashFinal">
\r
1247 <returns></returns>
\r
1249 <member name="P:System.Security.Cryptography.HMACMD5.HashSize">
\r
1250 <returns></returns>
\r
1252 <member name="M:System.Security.Cryptography.HMACMD5.Initialize">
\r
1255 <member name="P:System.Security.Cryptography.HMACMD5.Key">
\r
1256 <returns></returns>
\r
1258 <member name="T:System.Security.Cryptography.HMACSHA1">
\r
1259 <summary>Computes a Hash-based Message Authentication Code (HMAC) using the <see cref="T:System.Security.Cryptography.SHA1"></see> hash function.</summary>
\r
1261 <member name="M:System.Security.Cryptography.HMACSHA1.#ctor">
\r
1262 <summary>Initializes a new instance of the <see cref="T:System.Security.Cryptography.HMACSHA1"></see> class with a randomly generated key.</summary>
\r
1264 <member name="M:System.Security.Cryptography.HMACSHA1.#ctor(System.Byte[])">
\r
1265 <summary>Initializes a new instance of the <see cref="T:System.Security.Cryptography.HMACSHA1"></see> class with the specified key data.</summary>
\r
1266 <param name="key">The secret key for <see cref="T:System.Security.Cryptography.HMACSHA1"></see> encryption. The key can be any length, but if it is more than 64 bytes long it is hashed (using SHA-1) to derive a 64-byte key. Therefore, the recommended size of the secret key is 64 bytes.</param>
\r
1267 <exception cref="T:System.ArgumentNullException">The <paramref name="key">key</paramref> parameter is null.</exception>
\r
1269 <member name="M:System.Security.Cryptography.HMACSHA1.#ctor(System.Byte[],System.Boolean)">
\r
1270 <summary>Initializes a new instance of the <see cref="T:System.Security.Cryptography.HMACSHA1"></see> class with the specified key data and a value that specifies whether to use the managed version of the SHA1 algorithm.</summary>
\r
1271 <param name="key">The secret key for <see cref="T:System.Security.Cryptography.HMACSHA1"></see> encryption. The key can be any length, but if it is more than 64 bytes long, it is hashed (using SHA-1) to derive a 64-byte key. Therefore, the recommended size of the secret key is 64 bytes.</param>
\r
1272 <param name="useManagedSha1">true to use the managed implementation of the SHA1 algorithm (the <see cref="T:System.Security.Cryptography.SHA1Managed"></see> class); false to use the unmanaged implementation (the <see cref="T:System.Security.Cryptography.SHA1CryptoServiceProvider"></see> class).</param>
\r
1274 <member name="M:System.Security.Cryptography.HMACSHA1.Dispose(System.Boolean)">
\r
1275 <param name="disposing"></param>
\r
1277 <member name="M:System.Security.Cryptography.HMACSHA1.HashCore(System.Byte[],System.Int32,System.Int32)">
\r
1278 <param name="rgb"></param>
\r
1279 <param name="ib"></param>
\r
1280 <param name="cb"></param>
\r
1282 <member name="M:System.Security.Cryptography.HMACSHA1.HashFinal">
\r
1283 <returns></returns>
\r
1285 <member name="P:System.Security.Cryptography.HMACSHA1.HashSize">
\r
1286 <returns></returns>
\r
1288 <member name="M:System.Security.Cryptography.HMACSHA1.Initialize">
\r
1291 <member name="P:System.Security.Cryptography.HMACSHA1.Key">
\r
1292 <returns></returns>
\r
1294 <member name="T:System.Security.Cryptography.HMACSHA256">
\r
1295 <summary>Computes a Hash-based Message Authentication Code (HMAC) by using the <see cref="T:System.Security.Cryptography.SHA256"></see> hash function.</summary>
\r
1297 <member name="M:System.Security.Cryptography.HMACSHA256.#ctor">
\r
1298 <summary>Initializes a new instance of the <see cref="T:System.Security.Cryptography.HMACSHA256"></see> class with a randomly generated key.</summary>
\r
1300 <member name="M:System.Security.Cryptography.HMACSHA256.#ctor(System.Byte[])">
\r
1301 <summary>Initializes a new instance of the <see cref="T:System.Security.Cryptography.HMACSHA256"></see> class with the specified key data.</summary>
\r
1302 <param name="key">The secret key for <see cref="T:System.Security.Cryptography.HMACSHA256"></see> encryption. The key can be any length. However, the recommended size is 64 bytes. If the key is more than 64 bytes long, it is hashed (using SHA-256) to derive a 64-byte key. If it is less than 64 bytes long, it is padded to 64 bytes.</param>
\r
1303 <exception cref="T:System.ArgumentNullException">The <paramref name="key">key</paramref> parameter is null.</exception>
\r
1305 <member name="M:System.Security.Cryptography.HMACSHA256.Dispose(System.Boolean)">
\r
1306 <param name="disposing"></param>
\r
1308 <member name="M:System.Security.Cryptography.HMACSHA256.HashCore(System.Byte[],System.Int32,System.Int32)">
\r
1309 <param name="rgb"></param>
\r
1310 <param name="ib"></param>
\r
1311 <param name="cb"></param>
\r
1313 <member name="M:System.Security.Cryptography.HMACSHA256.HashFinal">
\r
1314 <returns></returns>
\r
1316 <member name="P:System.Security.Cryptography.HMACSHA256.HashSize">
\r
1317 <returns></returns>
\r
1319 <member name="M:System.Security.Cryptography.HMACSHA256.Initialize">
\r
1322 <member name="P:System.Security.Cryptography.HMACSHA256.Key">
\r
1323 <returns></returns>
\r
1325 <member name="T:System.Security.Cryptography.HMACSHA384">
\r
1326 <summary>Computes a Hash-based Message Authentication Code (HMAC) using the <see cref="T:System.Security.Cryptography.SHA384"></see> hash function.</summary>
\r
1328 <member name="M:System.Security.Cryptography.HMACSHA384.#ctor">
\r
1329 <summary>Initializes a new instance of the <see cref="T:System.Security.Cryptography.HMACSHA384"></see> class by using a randomly generated key.</summary>
\r
1331 <member name="M:System.Security.Cryptography.HMACSHA384.#ctor(System.Byte[])">
\r
1332 <summary>Initializes a new instance of the <see cref="T:System.Security.Cryptography.HMACSHA384"></see> class by using the specified key data.</summary>
\r
1333 <param name="key">The secret key for <see cref="T:System.Security.Cryptography.HMACSHA384"></see> encryption. The key can be any length. However, the recommended size is 128 bytes. If the key is more than 128 bytes long, it is hashed (using SHA-384) to derive a 128-byte key. If it is less than 128 bytes long, it is padded to 128 bytes.</param>
\r
1334 <exception cref="T:System.ArgumentNullException">The <paramref name="key">key</paramref> parameter is null.</exception>
\r
1336 <member name="M:System.Security.Cryptography.HMACSHA384.Dispose(System.Boolean)">
\r
1337 <param name="disposing"></param>
\r
1339 <member name="M:System.Security.Cryptography.HMACSHA384.HashCore(System.Byte[],System.Int32,System.Int32)">
\r
1340 <param name="rgb"></param>
\r
1341 <param name="ib"></param>
\r
1342 <param name="cb"></param>
\r
1344 <member name="M:System.Security.Cryptography.HMACSHA384.HashFinal">
\r
1345 <returns></returns>
\r
1347 <member name="P:System.Security.Cryptography.HMACSHA384.HashSize">
\r
1348 <returns></returns>
\r
1350 <member name="M:System.Security.Cryptography.HMACSHA384.Initialize">
\r
1353 <member name="P:System.Security.Cryptography.HMACSHA384.Key">
\r
1354 <returns></returns>
\r
1356 <member name="P:System.Security.Cryptography.HMACSHA384.ProduceLegacyHmacValues">
\r
1357 <summary>Provides a workaround for the .NET Framework 2.0 implementation of the <see cref="T:System.Security.Cryptography.HMACSHA384"></see> algorithm, which is inconsistent with the .NET Framework 2.0 Service Pack 1 implementation of the algorithm.</summary>
\r
1358 <returns>true to enable .NET Framework 2.0 Service Pack 1 applications to interact with .NET Framework 2.0 applications; otherwise, false.</returns>
\r
1360 <member name="T:System.Security.Cryptography.HMACSHA512">
\r
1361 <summary>Computes a Hash-based Message Authentication Code (HMAC) using the <see cref="T:System.Security.Cryptography.SHA512"></see> hash function.</summary>
\r
1363 <member name="M:System.Security.Cryptography.HMACSHA512.#ctor">
\r
1364 <summary>Initializes a new instance of the <see cref="T:System.Security.Cryptography.HMACSHA512"></see> class with a randomly generated key.</summary>
\r
1366 <member name="M:System.Security.Cryptography.HMACSHA512.#ctor(System.Byte[])">
\r
1367 <summary>Initializes a new instance of the <see cref="T:System.Security.Cryptography.HMACSHA512"></see> class with the specified key data.</summary>
\r
1368 <param name="key">The secret key for <see cref="T:System.Security.Cryptography.HMACSHA512"></see> encryption. The key can be any length. However, the recommended size is 128 bytes. If the key is more than 128 bytes long, it is hashed (using SHA-512) to derive a 128-byte key. If it is less than 128 bytes long, it is padded to 128 bytes.</param>
\r
1369 <exception cref="T:System.ArgumentNullException">The <paramref name="key">key</paramref> parameter is null.</exception>
\r
1371 <member name="M:System.Security.Cryptography.HMACSHA512.Dispose(System.Boolean)">
\r
1372 <param name="disposing"></param>
\r
1374 <member name="M:System.Security.Cryptography.HMACSHA512.HashCore(System.Byte[],System.Int32,System.Int32)">
\r
1375 <param name="rgb"></param>
\r
1376 <param name="ib"></param>
\r
1377 <param name="cb"></param>
\r
1379 <member name="M:System.Security.Cryptography.HMACSHA512.HashFinal">
\r
1380 <returns></returns>
\r
1382 <member name="P:System.Security.Cryptography.HMACSHA512.HashSize">
\r
1383 <returns></returns>
\r
1385 <member name="M:System.Security.Cryptography.HMACSHA512.Initialize">
\r
1388 <member name="P:System.Security.Cryptography.HMACSHA512.Key">
\r
1389 <returns></returns>
\r
1391 <member name="P:System.Security.Cryptography.HMACSHA512.ProduceLegacyHmacValues">
\r
1392 <summary>Provides a workaround for the .NET Framework 2.0 implementation of the <see cref="T:System.Security.Cryptography.HMACSHA512"></see> algorithm, which is inconsistent with the .NET Framework 2.0 Service Pack 1 implementation.</summary>
\r
1393 <returns>true to enable .NET Framework 2.0 Service Pack 1 applications to interact with .NET Framework 2.0 applications; otherwise, false.</returns>
\r
1395 <member name="T:System.Security.Cryptography.IncrementalHash">
\r
1398 <member name="P:System.Security.Cryptography.IncrementalHash.AlgorithmName">
\r
1399 <returns></returns>
\r
1401 <member name="M:System.Security.Cryptography.IncrementalHash.AppendData(System.Byte[])">
\r
1402 <param name="data"></param>
\r
1404 <member name="M:System.Security.Cryptography.IncrementalHash.AppendData(System.Byte[],System.Int32,System.Int32)">
\r
1405 <param name="data"></param>
\r
1406 <param name="offset"></param>
\r
1407 <param name="count"></param>
\r
1409 <member name="M:System.Security.Cryptography.IncrementalHash.CreateHash(System.Security.Cryptography.HashAlgorithmName)">
\r
1410 <param name="hashAlgorithm"></param>
\r
1411 <returns></returns>
\r
1413 <member name="M:System.Security.Cryptography.IncrementalHash.CreateHMAC(System.Security.Cryptography.HashAlgorithmName,System.Byte[])">
\r
1414 <param name="hashAlgorithm"></param>
\r
1415 <param name="key"></param>
\r
1416 <returns></returns>
\r
1418 <member name="M:System.Security.Cryptography.IncrementalHash.Dispose">
\r
1421 <member name="M:System.Security.Cryptography.IncrementalHash.GetHashAndReset">
\r
1422 <returns></returns>
\r
1424 <member name="T:System.Security.Cryptography.MaskGenerationMethod">
\r
1425 <summary>Represents the abstract class from which all mask generator algorithms must derive.</summary>
\r
1427 <member name="M:System.Security.Cryptography.MaskGenerationMethod.#ctor">
\r
1428 <summary>Initializes a new instance of the <see cref="T:System.Security.Cryptography.MaskGenerationMethod"></see> class.</summary>
\r
1430 <member name="M:System.Security.Cryptography.MaskGenerationMethod.GenerateMask(System.Byte[],System.Int32)">
\r
1431 <summary>When overridden in a derived class, generates a mask with the specified length using the specified random seed.</summary>
\r
1432 <param name="rgbSeed">The random seed to use to compute the mask.</param>
\r
1433 <param name="cbReturn">The length of the generated mask in bytes.</param>
\r
1434 <returns>A randomly generated mask whose length is equal to the <paramref name="cbReturn">cbReturn</paramref> parameter.</returns>
\r
1436 <member name="T:System.Security.Cryptography.MD5">
\r
1437 <summary>Represents the abstract class from which all implementations of the <see cref="T:System.Security.Cryptography.MD5"></see> hash algorithm inherit.</summary>
\r
1439 <member name="M:System.Security.Cryptography.MD5.#ctor">
\r
1440 <summary>Initializes a new instance of <see cref="T:System.Security.Cryptography.MD5"></see>.</summary>
\r
1442 <member name="M:System.Security.Cryptography.MD5.Create">
\r
1443 <summary>Creates an instance of the default implementation of the <see cref="T:System.Security.Cryptography.MD5"></see> hash algorithm.</summary>
\r
1444 <returns>A new instance of the <see cref="T:System.Security.Cryptography.MD5"></see> hash algorithm.</returns>
\r
1445 <exception cref="T:System.Reflection.TargetInvocationException">The algorithm was used with Federal Information Processing Standards (FIPS) mode enabled, but is not FIPS compatible.</exception>
\r
1447 <member name="M:System.Security.Cryptography.MD5.Create(System.String)">
\r
1448 <summary>Creates an instance of the specified implementation of the <see cref="T:System.Security.Cryptography.MD5"></see> hash algorithm.</summary>
\r
1449 <param name="algName">The name of the specific implementation of <see cref="T:System.Security.Cryptography.MD5"></see> to use.</param>
\r
1450 <returns>A new instance of the specified implementation of <see cref="T:System.Security.Cryptography.MD5"></see>.</returns>
\r
1451 <exception cref="T:System.Reflection.TargetInvocationException">The algorithm described by the <paramref name="algName">algName</paramref> parameter was used with Federal Information Processing Standards (FIPS) mode enabled, but is not FIPS compatible.</exception>
\r
1453 <member name="T:System.Security.Cryptography.Aes">
\r
1454 <summary>Represents the abstract base class from which all implementations of the Advanced Encryption Standard (AES) must inherit.</summary>
\r
1456 <member name="M:System.Security.Cryptography.Aes.#ctor">
\r
1457 <summary>Initializes a new instance of the <see cref="T:System.Security.Cryptography.Aes"></see> class.</summary>
\r
1459 <member name="M:System.Security.Cryptography.Aes.Create">
\r
1460 <summary>Creates a cryptographic object that is used to perform the symmetric algorithm.</summary>
\r
1461 <returns>A cryptographic object that is used to perform the symmetric algorithm.</returns>
\r
1463 <member name="M:System.Security.Cryptography.Aes.Create(System.String)">
\r
1464 <summary>Creates a cryptographic object that specifies the implementation of AES to use to perform the symmetric algorithm.</summary>
\r
1465 <param name="algorithmName">The name of the specific implementation of AES to use.</param>
\r
1466 <returns>A cryptographic object that is used to perform the symmetric algorithm.</returns>
\r
1467 <exception cref="T:System.ArgumentNullException">The <paramref name="algorithmName">algorithmName</paramref> parameter is null.</exception>
\r
1469 <member name="P:System.Security.Cryptography.Aes.LegalBlockSizes">
\r
1470 <returns></returns>
\r
1472 <member name="P:System.Security.Cryptography.Aes.LegalKeySizes">
\r
1473 <returns></returns>
\r
1475 <member name="T:System.Security.Cryptography.AesManaged">
\r
1476 <summary>Provides a managed implementation of the Advanced Encryption Standard (AES) symmetric algorithm.</summary>
\r
1478 <member name="M:System.Security.Cryptography.AesManaged.#ctor">
\r
1479 <summary>Initializes a new instance of the <see cref="T:System.Security.Cryptography.AesManaged"></see> class.</summary>
\r
1480 <exception cref="T:System.Security.Cryptography.CryptographicException">The Windows security policy setting for FIPS is enabled.</exception>
\r
1481 <exception cref="T:System.InvalidOperationException">This implementation is not part of the Windows Platform FIPS-validated cryptographic algorithms.</exception>
\r
1483 <member name="P:System.Security.Cryptography.AesManaged.BlockSize">
\r
1484 <returns></returns>
\r
1486 <member name="M:System.Security.Cryptography.AesManaged.CreateDecryptor">
\r
1487 <summary>Creates a symmetric decryptor object using the current key and initialization vector (IV).</summary>
\r
1488 <returns>A symmetric decryptor object.</returns>
\r
1490 <member name="M:System.Security.Cryptography.AesManaged.CreateDecryptor(System.Byte[],System.Byte[])">
\r
1491 <summary>Creates a symmetric decryptor object using the specified key and initialization vector (IV).</summary>
\r
1492 <param name="key">The secret key to use for the symmetric algorithm.</param>
\r
1493 <param name="iv">The initialization vector to use for the symmetric algorithm.</param>
\r
1494 <returns>A symmetric decryptor object.</returns>
\r
1495 <exception cref="T:System.ArgumentNullException"><paramref name="key">key</paramref> or <paramref name="iv">iv</paramref> is null.</exception>
\r
1496 <exception cref="T:System.ArgumentException"><paramref name="key">key</paramref> is invalid.</exception>
\r
1498 <member name="M:System.Security.Cryptography.AesManaged.CreateEncryptor">
\r
1499 <summary>Creates a symmetric encryptor object using the current key and initialization vector (IV).</summary>
\r
1500 <returns>A symmetric encryptor object.</returns>
\r
1502 <member name="M:System.Security.Cryptography.AesManaged.CreateEncryptor(System.Byte[],System.Byte[])">
\r
1503 <summary>Creates a symmetric encryptor object using the specified key and initialization vector (IV).</summary>
\r
1504 <param name="key">The secret key to use for the symmetric algorithm.</param>
\r
1505 <param name="iv">The initialization vector to use for the symmetric algorithm.</param>
\r
1506 <returns>A symmetric encryptor object.</returns>
\r
1507 <exception cref="T:System.ArgumentNullException"><paramref name="key">key</paramref> or <paramref name="iv">iv</paramref> is null.</exception>
\r
1508 <exception cref="T:System.ArgumentException"><paramref name="key">key</paramref> is invalid.</exception>
\r
1510 <member name="P:System.Security.Cryptography.AesManaged.FeedbackSize">
\r
1511 <summary>Gets or sets the number of bits to use as feedback.</summary>
\r
1512 <returns>The feedback size, in bits.</returns>
\r
1514 <member name="M:System.Security.Cryptography.AesManaged.GenerateIV">
\r
1515 <summary>Generates a random initialization vector (IV) to use for the symmetric algorithm.</summary>
\r
1517 <member name="M:System.Security.Cryptography.AesManaged.GenerateKey">
\r
1518 <summary>Generates a random key to use for the symmetric algorithm.</summary>
\r
1520 <member name="P:System.Security.Cryptography.AesManaged.IV">
\r
1521 <summary>Gets or sets the initialization vector (IV) to use for the symmetric algorithm.</summary>
\r
1522 <returns>The initialization vector to use for the symmetric algorithm</returns>
\r
1524 <member name="P:System.Security.Cryptography.AesManaged.Key">
\r
1525 <summary>Gets or sets the secret key used for the symmetric algorithm.</summary>
\r
1526 <returns>The key for the symmetric algorithm.</returns>
\r
1528 <member name="P:System.Security.Cryptography.AesManaged.KeySize">
\r
1529 <summary>Gets or sets the size, in bits, of the secret key used for the symmetric algorithm.</summary>
\r
1530 <returns>The size, in bits, of the key used by the symmetric algorithm.</returns>
\r
1532 <member name="P:System.Security.Cryptography.AesManaged.LegalBlockSizes">
\r
1533 <returns></returns>
\r
1535 <member name="P:System.Security.Cryptography.AesManaged.LegalKeySizes">
\r
1536 <returns></returns>
\r
1538 <member name="P:System.Security.Cryptography.AesManaged.Mode">
\r
1539 <summary>Gets or sets the mode for operation of the symmetric algorithm.</summary>
\r
1540 <returns>One of the enumeration values that specifies the block cipher mode to use for encryption. The default is <see cref="F:System.Security.Cryptography.CipherMode.CBC"></see>.</returns>
\r
1541 <exception cref="T:System.Security.Cryptography.CryptographicException"><see cref="P:System.Security.Cryptography.AesManaged.Mode"></see> is set to <see cref="F:System.Security.Cryptography.CipherMode.CFB"></see> or <see cref="F:System.Security.Cryptography.CipherMode.OFB"></see>.</exception>
\r
1543 <member name="P:System.Security.Cryptography.AesManaged.Padding">
\r
1544 <summary>Gets or sets the padding mode used in the symmetric algorithm.</summary>
\r
1545 <returns>One of the enumeration values that specifies the type of padding to apply. The default is <see cref="F:System.Security.Cryptography.PaddingMode.PKCS7"></see>.</returns>
\r
1547 <member name="T:System.Security.Cryptography.AsymmetricKeyExchangeDeformatter">
\r
1548 <summary>Represents the base class from which all asymmetric key exchange deformatters derive.</summary>
\r
1550 <member name="M:System.Security.Cryptography.AsymmetricKeyExchangeDeformatter.#ctor">
\r
1551 <summary>Initializes a new instance of <see cref="T:System.Security.Cryptography.AsymmetricKeyExchangeDeformatter"></see>.</summary>
\r
1553 <member name="M:System.Security.Cryptography.AsymmetricKeyExchangeDeformatter.DecryptKeyExchange(System.Byte[])">
\r
1554 <summary>When overridden in a derived class, extracts secret information from the encrypted key exchange data.</summary>
\r
1555 <param name="rgb">The key exchange data within which the secret information is hidden.</param>
\r
1556 <returns>The secret information derived from the key exchange data.</returns>
\r
1558 <member name="P:System.Security.Cryptography.AsymmetricKeyExchangeDeformatter.Parameters">
\r
1559 <summary>When overridden in a derived class, gets or sets the parameters for the asymmetric key exchange.</summary>
\r
1560 <returns>A string in XML format containing the parameters of the asymmetric key exchange operation.</returns>
\r
1562 <member name="M:System.Security.Cryptography.AsymmetricKeyExchangeDeformatter.SetKey(System.Security.Cryptography.AsymmetricAlgorithm)">
\r
1563 <summary>When overridden in a derived class, sets the private key to use for decrypting the secret information.</summary>
\r
1564 <param name="key">The instance of the implementation of <see cref="T:System.Security.Cryptography.AsymmetricAlgorithm"></see> that holds the private key.</param>
\r
1566 <member name="T:System.Security.Cryptography.AsymmetricKeyExchangeFormatter">
\r
1567 <summary>Represents the base class from which all asymmetric key exchange formatters derive.</summary>
\r
1569 <member name="M:System.Security.Cryptography.AsymmetricKeyExchangeFormatter.#ctor">
\r
1570 <summary>Initializes a new instance of <see cref="T:System.Security.Cryptography.AsymmetricKeyExchangeFormatter"></see>.</summary>
\r
1572 <member name="M:System.Security.Cryptography.AsymmetricKeyExchangeFormatter.CreateKeyExchange(System.Byte[])">
\r
1573 <summary>When overridden in a derived class, creates the encrypted key exchange data from the specified input data.</summary>
\r
1574 <param name="data">The secret information to be passed in the key exchange.</param>
\r
1575 <returns>The encrypted key exchange data to be sent to the intended recipient.</returns>
\r
1577 <member name="M:System.Security.Cryptography.AsymmetricKeyExchangeFormatter.CreateKeyExchange(System.Byte[],System.Type)">
\r
1578 <summary>When overridden in a derived class, creates the encrypted key exchange data from the specified input data.</summary>
\r
1579 <param name="data">The secret information to be passed in the key exchange.</param>
\r
1580 <param name="symAlgType">This parameter is not used in the current version.</param>
\r
1581 <returns>The encrypted key exchange data to be sent to the intended recipient.</returns>
\r
1583 <member name="P:System.Security.Cryptography.AsymmetricKeyExchangeFormatter.Parameters">
\r
1584 <summary>When overridden in a derived class, gets the parameters for the asymmetric key exchange.</summary>
\r
1585 <returns>A string in XML format containing the parameters of the asymmetric key exchange operation.</returns>
\r
1587 <member name="M:System.Security.Cryptography.AsymmetricKeyExchangeFormatter.SetKey(System.Security.Cryptography.AsymmetricAlgorithm)">
\r
1588 <summary>When overridden in a derived class, sets the public key to use for encrypting the secret information.</summary>
\r
1589 <param name="key">The instance of the implementation of <see cref="T:System.Security.Cryptography.AsymmetricAlgorithm"></see> that holds the public key.</param>
\r
1591 <member name="T:System.Security.Cryptography.AsymmetricSignatureDeformatter">
\r
1592 <summary>Represents the abstract base class from which all implementations of asymmetric signature deformatters derive.</summary>
\r
1594 <member name="M:System.Security.Cryptography.AsymmetricSignatureDeformatter.#ctor">
\r
1595 <summary>Initializes a new instance of <see cref="T:System.Security.Cryptography.AsymmetricSignatureDeformatter"></see>.</summary>
\r
1597 <member name="M:System.Security.Cryptography.AsymmetricSignatureDeformatter.SetHashAlgorithm(System.String)">
\r
1598 <summary>When overridden in a derived class, sets the hash algorithm to use for verifying the signature.</summary>
\r
1599 <param name="strName">The name of the hash algorithm to use for verifying the signature.</param>
\r
1601 <member name="M:System.Security.Cryptography.AsymmetricSignatureDeformatter.SetKey(System.Security.Cryptography.AsymmetricAlgorithm)">
\r
1602 <summary>When overridden in a derived class, sets the public key to use for verifying the signature.</summary>
\r
1603 <param name="key">The instance of an implementation of <see cref="T:System.Security.Cryptography.AsymmetricAlgorithm"></see> that holds the public key.</param>
\r
1605 <member name="M:System.Security.Cryptography.AsymmetricSignatureDeformatter.VerifySignature(System.Byte[],System.Byte[])">
\r
1606 <summary>When overridden in a derived class, verifies the signature for the specified data.</summary>
\r
1607 <param name="rgbHash">The data signed with rgbSignature.</param>
\r
1608 <param name="rgbSignature">The signature to be verified for rgbHash.</param>
\r
1609 <returns>true if <paramref name="rgbSignature">rgbSignature</paramref> matches the signature computed using the specified hash algorithm and key on <paramref name="rgbHash">rgbHash</paramref>; otherwise, false.</returns>
\r
1611 <member name="M:System.Security.Cryptography.AsymmetricSignatureDeformatter.VerifySignature(System.Security.Cryptography.HashAlgorithm,System.Byte[])">
\r
1612 <summary>Verifies the signature from the specified hash value.</summary>
\r
1613 <param name="hash">The hash algorithm to use to verify the signature.</param>
\r
1614 <param name="rgbSignature">The signature to be verified.</param>
\r
1615 <returns>true if the signature is valid for the hash; otherwise, false.</returns>
\r
1616 <exception cref="T:System.ArgumentNullException">The <paramref name="hash">hash</paramref> parameter is null.</exception>
\r
1618 <member name="T:System.Security.Cryptography.AsymmetricSignatureFormatter">
\r
1619 <summary>Represents the base class from which all implementations of asymmetric signature formatters derive.</summary>
\r
1621 <member name="M:System.Security.Cryptography.AsymmetricSignatureFormatter.#ctor">
\r
1622 <summary>Initializes a new instance of <see cref="T:System.Security.Cryptography.AsymmetricSignatureFormatter"></see>.</summary>
\r
1624 <member name="M:System.Security.Cryptography.AsymmetricSignatureFormatter.CreateSignature(System.Byte[])">
\r
1625 <summary>When overridden in a derived class, creates the signature for the specified data.</summary>
\r
1626 <param name="rgbHash">The data to be signed.</param>
\r
1627 <returns>The digital signature for the <paramref name="rgbHash">rgbHash</paramref> parameter.</returns>
\r
1629 <member name="M:System.Security.Cryptography.AsymmetricSignatureFormatter.CreateSignature(System.Security.Cryptography.HashAlgorithm)">
\r
1630 <summary>Creates the signature from the specified hash value.</summary>
\r
1631 <param name="hash">The hash algorithm to use to create the signature.</param>
\r
1632 <returns>The signature for the specified hash value.</returns>
\r
1633 <exception cref="T:System.ArgumentNullException">The <paramref name="hash">hash</paramref> parameter is null.</exception>
\r
1635 <member name="M:System.Security.Cryptography.AsymmetricSignatureFormatter.SetHashAlgorithm(System.String)">
\r
1636 <summary>When overridden in a derived class, sets the hash algorithm to use for creating the signature.</summary>
\r
1637 <param name="strName">The name of the hash algorithm to use for creating the signature.</param>
\r
1639 <member name="M:System.Security.Cryptography.AsymmetricSignatureFormatter.SetKey(System.Security.Cryptography.AsymmetricAlgorithm)">
\r
1640 <summary>When overridden in a derived class, sets the asymmetric algorithm to use to create the signature.</summary>
\r
1641 <param name="key">The instance of the implementation of <see cref="T:System.Security.Cryptography.AsymmetricAlgorithm"></see> to use to create the signature.</param>
\r
1643 <member name="T:System.Security.Cryptography.CryptoConfig">
\r
1644 <summary>Accesses the cryptography configuration information.</summary>
\r
1646 <member name="M:System.Security.Cryptography.CryptoConfig.#ctor">
\r
1647 <summary>Initializes a new instance of the <see cref="T:System.Security.Cryptography.CryptoConfig"></see> class.</summary>
\r
1649 <member name="M:System.Security.Cryptography.CryptoConfig.AddAlgorithm(System.Type,System.String[])">
\r
1650 <summary>Adds a set of names to algorithm mappings to be used for the current application domain.</summary>
\r
1651 <param name="algorithm">The algorithm to map to.</param>
\r
1652 <param name="names">An array of names to map to the algorithm.</param>
\r
1653 <exception cref="T:System.ArgumentNullException">The <paramref name="algorithm">algorithm</paramref> or <paramref name="names">names</paramref> parameter is null.</exception>
\r
1654 <exception cref="T:System.ArgumentException"><paramref name="algorithm">algorithm</paramref> cannot be accessed from outside the assembly. -or- One of the entries in the <paramref name="names">names</paramref> parameter is empty or null.</exception>
\r
1656 <member name="M:System.Security.Cryptography.CryptoConfig.AddOID(System.String,System.String[])">
\r
1657 <summary>Adds a set of names to object identifier (OID) mappings to be used for the current application domain.</summary>
\r
1658 <param name="oid">The object identifier (OID) to map to.</param>
\r
1659 <param name="names">An array of names to map to the OID.</param>
\r
1660 <exception cref="T:System.ArgumentNullException">The <paramref name="oid">oid</paramref> or <paramref name="names">names</paramref> parameter is null.</exception>
\r
1661 <exception cref="T:System.ArgumentException">One of the entries in the <paramref name="names">names</paramref> parameter is empty or null.</exception>
\r
1663 <member name="P:System.Security.Cryptography.CryptoConfig.AllowOnlyFipsAlgorithms">
\r
1664 <summary>Indicates whether the runtime should enforce the policy to create only Federal Information Processing Standard (FIPS) certified algorithms.</summary>
\r
1665 <returns>true to enforce the policy; otherwise, false.</returns>
\r
1667 <member name="M:System.Security.Cryptography.CryptoConfig.CreateFromName(System.String)">
\r
1668 <summary>Creates a new instance of the specified cryptographic object.</summary>
\r
1669 <param name="name">The simple name of the cryptographic object of which to create an instance.</param>
\r
1670 <returns>A new instance of the specified cryptographic object.</returns>
\r
1671 <exception cref="T:System.ArgumentNullException">The <paramref name="name">name</paramref> parameter is null.</exception>
\r
1672 <exception cref="T:System.Reflection.TargetInvocationException">The algorithm described by the <paramref name="name">name</paramref> parameter was used with Federal Information Processing Standards (FIPS) mode enabled, but is not FIPS compatible.</exception>
\r
1674 <member name="M:System.Security.Cryptography.CryptoConfig.CreateFromName(System.String,System.Object[])">
\r
1675 <summary>Creates a new instance of the specified cryptographic object with the specified arguments.</summary>
\r
1676 <param name="name">The simple name of the cryptographic object of which to create an instance.</param>
\r
1677 <param name="args">The arguments used to create the specified cryptographic object.</param>
\r
1678 <returns>A new instance of the specified cryptographic object.</returns>
\r
1679 <exception cref="T:System.ArgumentNullException">The <paramref name="name">name</paramref> parameter is null.</exception>
\r
1680 <exception cref="T:System.Reflection.TargetInvocationException">The algorithm described by the <paramref name="name">name</paramref> parameter was used with Federal Information Processing Standards (FIPS) mode enabled, but is not FIPS compatible.</exception>
\r
1682 <member name="M:System.Security.Cryptography.CryptoConfig.EncodeOID(System.String)">
\r
1683 <summary>Encodes the specified object identifier (OID).</summary>
\r
1684 <param name="str">The OID to encode.</param>
\r
1685 <returns>A byte array containing the encoded OID.</returns>
\r
1686 <exception cref="T:System.ArgumentNullException">The <paramref name="str">str</paramref> parameter is null.</exception>
\r
1687 <exception cref="T:System.Security.Cryptography.CryptographicUnexpectedOperationException">An error occurred while encoding the OID.</exception>
\r
1689 <member name="M:System.Security.Cryptography.CryptoConfig.MapNameToOID(System.String)">
\r
1690 <summary>Gets the object identifier (OID) of the algorithm corresponding to the specified simple name.</summary>
\r
1691 <param name="name">The simple name of the algorithm for which to get the OID.</param>
\r
1692 <returns>The OID of the specified algorithm.</returns>
\r
1693 <exception cref="T:System.ArgumentNullException">The <paramref name="name">name</paramref> parameter is null.</exception>
\r
1695 <member name="T:System.Security.Cryptography.DeriveBytes">
\r
1696 <summary>Represents the abstract base class from which all classes that derive byte sequences of a specified length inherit.</summary>
\r
1698 <member name="M:System.Security.Cryptography.DeriveBytes.#ctor">
\r
1699 <summary>Initializes a new instance of the <see cref="T:System.Security.Cryptography.DeriveBytes"></see> class.</summary>
\r
1701 <member name="M:System.Security.Cryptography.DeriveBytes.Dispose">
\r
1702 <summary>When overridden in a derived class, releases all resources used by the current instance of the <see cref="T:System.Security.Cryptography.DeriveBytes"></see> class.</summary>
\r
1704 <member name="M:System.Security.Cryptography.DeriveBytes.Dispose(System.Boolean)">
\r
1705 <summary>When overridden in a derived class, releases the unmanaged resources used by the <see cref="T:System.Security.Cryptography.DeriveBytes"></see> class and optionally releases the managed resources.</summary>
\r
1706 <param name="disposing">true to release both managed and unmanaged resources; false to release only unmanaged resources.</param>
\r
1708 <member name="M:System.Security.Cryptography.DeriveBytes.GetBytes(System.Int32)">
\r
1709 <summary>When overridden in a derived class, returns pseudo-random key bytes.</summary>
\r
1710 <param name="cb">The number of pseudo-random key bytes to generate.</param>
\r
1711 <returns>A byte array filled with pseudo-random key bytes.</returns>
\r
1713 <member name="M:System.Security.Cryptography.DeriveBytes.Reset">
\r
1714 <summary>When overridden in a derived class, resets the state of the operation.</summary>
\r
1716 <member name="T:System.Security.Cryptography.DES">
\r
1717 <summary>Represents the base class for the Data Encryption Standard (DES) algorithm from which all <see cref="T:System.Security.Cryptography.DES"></see> implementations must derive.</summary>
\r
1719 <member name="M:System.Security.Cryptography.DES.#ctor">
\r
1720 <summary>Initializes a new instance of the <see cref="T:System.Security.Cryptography.DES"></see> class.</summary>
\r
1722 <member name="M:System.Security.Cryptography.DES.Create">
\r
1723 <summary>Creates an instance of a cryptographic object to perform the Data Encryption Standard (<see cref="T:System.Security.Cryptography.DES"></see>) algorithm.</summary>
\r
1724 <returns>A cryptographic object.</returns>
\r
1726 <member name="M:System.Security.Cryptography.DES.Create(System.String)">
\r
1727 <summary>Creates an instance of a cryptographic object to perform the specified implementation of the Data Encryption Standard (<see cref="T:System.Security.Cryptography.DES"></see>) algorithm.</summary>
\r
1728 <param name="algName">The name of the specific implementation of <see cref="T:System.Security.Cryptography.DES"></see> to use.</param>
\r
1729 <returns>A cryptographic object.</returns>
\r
1731 <member name="M:System.Security.Cryptography.DES.IsSemiWeakKey(System.Byte[])">
\r
1732 <summary>Determines whether the specified key is semi-weak.</summary>
\r
1733 <param name="rgbKey">The secret key to test for semi-weakness.</param>
\r
1734 <returns>true if the key is semi-weak; otherwise, false.</returns>
\r
1735 <exception cref="T:System.Security.Cryptography.CryptographicException">The size of the <paramref name="rgbKey">rgbKey</paramref> parameter is not valid.</exception>
\r
1737 <member name="M:System.Security.Cryptography.DES.IsWeakKey(System.Byte[])">
\r
1738 <summary>Determines whether the specified key is weak.</summary>
\r
1739 <param name="rgbKey">The secret key to test for weakness.</param>
\r
1740 <returns>true if the key is weak; otherwise, false.</returns>
\r
1741 <exception cref="T:System.Security.Cryptography.CryptographicException">The size of the <paramref name="rgbKey">rgbKey</paramref> parameter is not valid.</exception>
\r
1743 <member name="P:System.Security.Cryptography.DES.Key">
\r
1744 <summary>Gets or sets the secret key for the Data Encryption Standard (<see cref="T:System.Security.Cryptography.DES"></see>) algorithm.</summary>
\r
1745 <returns>The secret key for the <see cref="T:System.Security.Cryptography.DES"></see> algorithm.</returns>
\r
1746 <exception cref="T:System.ArgumentNullException">An attempt was made to set the key to null.</exception>
\r
1747 <exception cref="T:System.ArgumentException">An attempt was made to set a key whose length is not equal to <see cref="F:System.Security.Cryptography.SymmetricAlgorithm.BlockSizeValue"></see>.</exception>
\r
1748 <exception cref="T:System.Security.Cryptography.CryptographicException">An attempt was made to set a weak key (see <see cref="M:System.Security.Cryptography.DES.IsWeakKey(System.Byte[])"></see>) or a semi-weak key (see <see cref="M:System.Security.Cryptography.DES.IsSemiWeakKey(System.Byte[])"></see>).</exception>
\r
1750 <member name="T:System.Security.Cryptography.DSA">
\r
1751 <summary>Represents the abstract base class from which all implementations of the Digital Signature Algorithm (<see cref="T:System.Security.Cryptography.DSA"></see>) must inherit.</summary>
\r
1753 <member name="M:System.Security.Cryptography.DSA.#ctor">
\r
1754 <summary>Initializes a new instance of the <see cref="T:System.Security.Cryptography.DSA"></see> class.</summary>
\r
1756 <member name="M:System.Security.Cryptography.DSA.Create">
\r
1757 <summary>Creates the default cryptographic object used to perform the asymmetric algorithm.</summary>
\r
1758 <returns>A cryptographic object used to perform the asymmetric algorithm.</returns>
\r
1760 <member name="M:System.Security.Cryptography.DSA.Create(System.Int32)">
\r
1761 <param name="keySizeInBits"></param>
\r
1762 <returns></returns>
\r
1764 <member name="M:System.Security.Cryptography.DSA.Create(System.Security.Cryptography.DSAParameters)">
\r
1765 <param name="parameters"></param>
\r
1766 <returns></returns>
\r
1768 <member name="M:System.Security.Cryptography.DSA.Create(System.String)">
\r
1769 <summary>Creates the specified cryptographic object used to perform the asymmetric algorithm.</summary>
\r
1770 <param name="algName">The name of the specific implementation of <see cref="T:System.Security.Cryptography.DSA"></see> to use.</param>
\r
1771 <returns>A cryptographic object used to perform the asymmetric algorithm.</returns>
\r
1773 <member name="M:System.Security.Cryptography.DSA.CreateSignature(System.Byte[])">
\r
1774 <summary>When overridden in a derived class, creates the <see cref="T:System.Security.Cryptography.DSA"></see> signature for the specified data.</summary>
\r
1775 <param name="rgbHash">The data to be signed.</param>
\r
1776 <returns>The digital signature for the specified data.</returns>
\r
1778 <member name="M:System.Security.Cryptography.DSA.ExportParameters(System.Boolean)">
\r
1779 <summary>When overridden in a derived class, exports the <see cref="T:System.Security.Cryptography.DSAParameters"></see>.</summary>
\r
1780 <param name="includePrivateParameters">true to include private parameters; otherwise, false.</param>
\r
1781 <returns>The parameters for <see cref="T:System.Security.Cryptography.DSA"></see>.</returns>
\r
1783 <member name="M:System.Security.Cryptography.DSA.FromXmlString(System.String)">
\r
1784 <summary>Reconstructs a <see cref="T:System.Security.Cryptography.DSA"></see> object from an XML string.</summary>
\r
1785 <param name="xmlString">The XML string to use to reconstruct the <see cref="T:System.Security.Cryptography.DSA"></see> object.</param>
\r
1786 <exception cref="T:System.ArgumentNullException">The <paramref name="xmlString">xmlString</paramref> parameter is null.</exception>
\r
1787 <exception cref="T:System.Security.Cryptography.CryptographicException">The format of the <paramref name="xmlString">xmlString</paramref> parameter is not valid.</exception>
\r
1789 <member name="M:System.Security.Cryptography.DSA.HashData(System.Byte[],System.Int32,System.Int32,System.Security.Cryptography.HashAlgorithmName)">
\r
1790 <summary>When overridden in a derived class, computes the hash value of a specified portion of a byte array by using a specified hashing algorithm.</summary>
\r
1791 <param name="data">The data to be hashed.</param>
\r
1792 <param name="offset">The index of the first byte in data that is to be hashed.</param>
\r
1793 <param name="count">The number of bytes to hash.</param>
\r
1794 <param name="hashAlgorithm">The algorithm to use to hash the data.</param>
\r
1795 <returns>The hashed data.</returns>
\r
1796 <exception cref="T:System.NotImplementedException">A derived class must override this method.</exception>
\r
1798 <member name="M:System.Security.Cryptography.DSA.HashData(System.IO.Stream,System.Security.Cryptography.HashAlgorithmName)">
\r
1799 <summary>When overridden in a derived class, computes the hash value of a specified binary stream by using a specified hashing algorithm.</summary>
\r
1800 <param name="data">The binary stream to hash.</param>
\r
1801 <param name="hashAlgorithm">The algorithm to use to hash the data.</param>
\r
1802 <returns>The hashed data.</returns>
\r
1803 <exception cref="T:System.NotImplementedException">A derived class must override this method.</exception>
\r
1805 <member name="M:System.Security.Cryptography.DSA.ImportParameters(System.Security.Cryptography.DSAParameters)">
\r
1806 <summary>When overridden in a derived class, imports the specified <see cref="T:System.Security.Cryptography.DSAParameters"></see>.</summary>
\r
1807 <param name="parameters">The parameters for <see cref="T:System.Security.Cryptography.DSA"></see>.</param>
\r
1809 <member name="M:System.Security.Cryptography.DSA.SignData(System.Byte[],System.Security.Cryptography.HashAlgorithmName)">
\r
1810 <summary>Computes the hash value of the specified byte array using the specified hash algorithm and signs the resulting hash value.</summary>
\r
1811 <param name="data">The input data for which to compute the hash.</param>
\r
1812 <param name="hashAlgorithm">The hash algorithm to use to create the hash value.</param>
\r
1813 <returns>The DSA signature for the specified data.</returns>
\r
1814 <exception cref="T:System.ArgumentNullException"><paramref name="data">data</paramref> is null.</exception>
\r
1815 <exception cref="T:System.ArgumentException"><paramref name="hashAlgorithm">hashAlgorithm</paramref>.<see cref="P:System.Security.Cryptography.HashAlgorithmName.Name"></see> is null or <see cref="F:System.String.Empty"></see>.</exception>
\r
1817 <member name="M:System.Security.Cryptography.DSA.SignData(System.IO.Stream,System.Security.Cryptography.HashAlgorithmName)">
\r
1818 <summary>Computes the hash value of the specified stream using the specified hash algorithm and signs the resulting hash value.</summary>
\r
1819 <param name="data">The input stream for which to compute the hash.</param>
\r
1820 <param name="hashAlgorithm">The hash algorithm to use to create the hash value.</param>
\r
1821 <returns>The DSA signature for the specified data.</returns>
\r
1822 <exception cref="T:System.ArgumentNullException"><paramref name="data">data</paramref> is null.</exception>
\r
1823 <exception cref="T:System.ArgumentException"><paramref name="hashAlgorithm">hashAlgorithm</paramref>.<see cref="P:System.Security.Cryptography.HashAlgorithmName.Name"></see> is null or <see cref="F:System.String.Empty"></see>.</exception>
\r
1825 <member name="M:System.Security.Cryptography.DSA.SignData(System.Byte[],System.Int32,System.Int32,System.Security.Cryptography.HashAlgorithmName)">
\r
1826 <summary>Computes the hash value of a portion of the specified byte array using the specified hash algorithm and signs the resulting hash value.</summary>
\r
1827 <param name="data">The input data for which to compute the hash.</param>
\r
1828 <param name="offset">The offset into the array at which to begin using data.</param>
\r
1829 <param name="count">The number of bytes in the array to use as data.</param>
\r
1830 <param name="hashAlgorithm">The hash algorithm to use to create the hash value.</param>
\r
1831 <returns>The DSA signature for the specified data.</returns>
\r
1832 <exception cref="T:System.ArgumentNullException"><paramref name="data">data</paramref> is null.</exception>
\r
1833 <exception cref="T:System.ArgumentException"><paramref name="hashAlgorithm">hashAlgorithm</paramref>.<see cref="P:System.Security.Cryptography.HashAlgorithmName.Name"></see> is null or <see cref="F:System.String.Empty"></see>.</exception>
\r
1834 <exception cref="T:System.ArgumentOutOfRangeException"><paramref name="offset">offset</paramref> is less than zero. -or- <paramref name="count">count</paramref> is less than zero. -or- <paramref name="offset">offset</paramref> + <paramref name="count">count</paramref> – 1 results in an index that is beyond the upper bound of <paramref name="data">data</paramref>.</exception>
\r
1836 <member name="M:System.Security.Cryptography.DSA.ToXmlString(System.Boolean)">
\r
1837 <summary>Creates and returns an XML string representation of the current <see cref="T:System.Security.Cryptography.DSA"></see> object.</summary>
\r
1838 <param name="includePrivateParameters">true to include private parameters; otherwise, false.</param>
\r
1839 <returns>An XML string encoding of the current <see cref="T:System.Security.Cryptography.DSA"></see> object.</returns>
\r
1841 <member name="M:System.Security.Cryptography.DSA.VerifyData(System.Byte[],System.Int32,System.Int32,System.Byte[],System.Security.Cryptography.HashAlgorithmName)">
\r
1842 <summary>Verifies that a digital signature is valid by calculating the hash value of the data in a portion of a byte array using the specified hash algorithm and comparing it to the provided signature.</summary>
\r
1843 <param name="data">The signed data.</param>
\r
1844 <param name="offset">The starting index at which to compute the hash.</param>
\r
1845 <param name="count">The number of bytes to hash.</param>
\r
1846 <param name="signature">The signature data to be verified.</param>
\r
1847 <param name="hashAlgorithm">The hash algorithm used to create the hash value of the data.</param>
\r
1848 <returns>true if the digital signature is valid; otherwise, false.</returns>
\r
1849 <exception cref="T:System.ArgumentNullException"><paramref name="data">data</paramref> is null. -or- <paramref name="signature">signature</paramref> is null.</exception>
\r
1850 <exception cref="T:System.ArgumentException"><paramref name="hashAlgorithm">hashAlgorithm</paramref>.<see cref="P:System.Security.Cryptography.HashAlgorithmName.Name"></see> is null or <see cref="F:System.String.Empty"></see>.</exception>
\r
1851 <exception cref="T:System.ArgumentOutOfRangeException"><paramref name="offset">offset</paramref> is less than zero. -or- <paramref name="count">count</paramref> is less than zero. -or- <paramref name="offset">offset</paramref> + <paramref name="count">count</paramref> – 1 results in an index that is beyond the upper bound of <paramref name="data">data</paramref>.</exception>
\r
1853 <member name="M:System.Security.Cryptography.DSA.VerifyData(System.Byte[],System.Byte[],System.Security.Cryptography.HashAlgorithmName)">
\r
1854 <summary>Verifies that a digital signature is valid by calculating the hash value of the specified data using the specified hash algorithm and comparing it to the provided signature.</summary>
\r
1855 <param name="data">The signed data.</param>
\r
1856 <param name="signature">The signature data to be verified.</param>
\r
1857 <param name="hashAlgorithm">The hash algorithm used to create the hash value of the data.</param>
\r
1858 <returns>true if the digital signature is valid; otherwise, false.</returns>
\r
1859 <exception cref="T:System.ArgumentNullException"><paramref name="data">data</paramref> is null. -or- <paramref name="signature">signature</paramref> is null.</exception>
\r
1860 <exception cref="T:System.ArgumentException"><paramref name="hashAlgorithm">hashAlgorithm</paramref>.<see cref="P:System.Security.Cryptography.HashAlgorithmName.Name"></see> is null or <see cref="F:System.String.Empty"></see>.</exception>
\r
1862 <member name="M:System.Security.Cryptography.DSA.VerifyData(System.IO.Stream,System.Byte[],System.Security.Cryptography.HashAlgorithmName)">
\r
1863 <summary>Verifies that a digital signature is valid by calculating the hash value of the specified stream using the specified hash algorithm and comparing it to the provided signature.</summary>
\r
1864 <param name="data">The signed data.</param>
\r
1865 <param name="signature">The signature data to be verified.</param>
\r
1866 <param name="hashAlgorithm">The hash algorithm used to create the hash value of the data.</param>
\r
1867 <returns>true if the digital signature is valid; otherwise, false.</returns>
\r
1868 <exception cref="T:System.ArgumentNullException"><paramref name="data">data</paramref> is null. -or- <paramref name="signature">signature</paramref> is null.</exception>
\r
1869 <exception cref="T:System.ArgumentException"><paramref name="hashAlgorithm">hashAlgorithm</paramref>.<see cref="P:System.Security.Cryptography.HashAlgorithmName.Name"></see> is null or <see cref="F:System.String.Empty"></see>.</exception>
\r
1871 <member name="M:System.Security.Cryptography.DSA.VerifySignature(System.Byte[],System.Byte[])">
\r
1872 <summary>When overridden in a derived class, verifies the <see cref="T:System.Security.Cryptography.DSA"></see> signature for the specified data.</summary>
\r
1873 <param name="rgbHash">The hash of the data signed with rgbSignature.</param>
\r
1874 <param name="rgbSignature">The signature to be verified for rgbData.</param>
\r
1875 <returns>true if <paramref name="rgbSignature">rgbSignature</paramref> matches the signature computed using the specified hash algorithm and key on <paramref name="rgbHash">rgbHash</paramref>; otherwise, false.</returns>
\r
1877 <member name="T:System.Security.Cryptography.DSAParameters">
\r
1878 <summary>Contains the typical parameters for the <see cref="T:System.Security.Cryptography.DSA"></see> algorithm.</summary>
\r
1880 <member name="F:System.Security.Cryptography.DSAParameters.Counter">
\r
1881 <summary>Specifies the counter for the <see cref="T:System.Security.Cryptography.DSA"></see> algorithm.</summary>
\r
1882 <returns></returns>
\r
1884 <member name="F:System.Security.Cryptography.DSAParameters.G">
\r
1885 <summary>Specifies the G parameter for the <see cref="T:System.Security.Cryptography.DSA"></see> algorithm.</summary>
\r
1886 <returns></returns>
\r
1888 <member name="F:System.Security.Cryptography.DSAParameters.J">
\r
1889 <summary>Specifies the J parameter for the <see cref="T:System.Security.Cryptography.DSA"></see> algorithm.</summary>
\r
1890 <returns></returns>
\r
1892 <member name="F:System.Security.Cryptography.DSAParameters.P">
\r
1893 <summary>Specifies the P parameter for the <see cref="T:System.Security.Cryptography.DSA"></see> algorithm.</summary>
\r
1894 <returns></returns>
\r
1896 <member name="F:System.Security.Cryptography.DSAParameters.Q">
\r
1897 <summary>Specifies the Q parameter for the <see cref="T:System.Security.Cryptography.DSA"></see> algorithm.</summary>
\r
1898 <returns></returns>
\r
1900 <member name="F:System.Security.Cryptography.DSAParameters.Seed">
\r
1901 <summary>Specifies the seed for the <see cref="T:System.Security.Cryptography.DSA"></see> algorithm.</summary>
\r
1902 <returns></returns>
\r
1904 <member name="F:System.Security.Cryptography.DSAParameters.X">
\r
1905 <summary>Specifies the X parameter for the <see cref="T:System.Security.Cryptography.DSA"></see> algorithm.</summary>
\r
1906 <returns></returns>
\r
1908 <member name="F:System.Security.Cryptography.DSAParameters.Y">
\r
1909 <summary>Specifies the Y parameter for the <see cref="T:System.Security.Cryptography.DSA"></see> algorithm.</summary>
\r
1910 <returns></returns>
\r
1912 <member name="T:System.Security.Cryptography.DSASignatureDeformatter">
\r
1913 <summary>Verifies a Digital Signature Algorithm (<see cref="T:System.Security.Cryptography.DSA"></see>) PKCS#1 v1.5 signature.</summary>
\r
1915 <member name="M:System.Security.Cryptography.DSASignatureDeformatter.#ctor">
\r
1916 <summary>Initializes a new instance of the <see cref="T:System.Security.Cryptography.DSASignatureDeformatter"></see> class.</summary>
\r
1918 <member name="M:System.Security.Cryptography.DSASignatureDeformatter.#ctor(System.Security.Cryptography.AsymmetricAlgorithm)">
\r
1919 <summary>Initializes a new instance of the <see cref="T:System.Security.Cryptography.DSASignatureDeformatter"></see> class with the specified key.</summary>
\r
1920 <param name="key">The instance of Digital Signature Algorithm (<see cref="T:System.Security.Cryptography.DSA"></see>) that holds the key.</param>
\r
1921 <exception cref="T:System.ArgumentNullException"><paramref name="key">key</paramref> is null.</exception>
\r
1923 <member name="M:System.Security.Cryptography.DSASignatureDeformatter.SetHashAlgorithm(System.String)">
\r
1924 <summary>Specifies the hash algorithm for the Digital Signature Algorithm (<see cref="T:System.Security.Cryptography.DSA"></see>) signature deformatter.</summary>
\r
1925 <param name="strName">The name of the hash algorithm to use for the signature deformatter.</param>
\r
1926 <exception cref="T:System.Security.Cryptography.CryptographicUnexpectedOperationException">The <paramref name="strName">strName</paramref> parameter does not map to the <see cref="T:System.Security.Cryptography.SHA1"></see> hash algorithm.</exception>
\r
1928 <member name="M:System.Security.Cryptography.DSASignatureDeformatter.SetKey(System.Security.Cryptography.AsymmetricAlgorithm)">
\r
1929 <summary>Specifies the key to be used for the Digital Signature Algorithm (<see cref="T:System.Security.Cryptography.DSA"></see>) signature deformatter.</summary>
\r
1930 <param name="key">The instance of <see cref="T:System.Security.Cryptography.DSA"></see> that holds the key.</param>
\r
1931 <exception cref="T:System.ArgumentNullException"><paramref name="key">key</paramref> is null.</exception>
\r
1933 <member name="M:System.Security.Cryptography.DSASignatureDeformatter.VerifySignature(System.Byte[],System.Byte[])">
\r
1934 <summary>Verifies the Digital Signature Algorithm (<see cref="T:System.Security.Cryptography.DSA"></see>) signature on the data.</summary>
\r
1935 <param name="rgbHash">The data signed with rgbSignature.</param>
\r
1936 <param name="rgbSignature">The signature to be verified for rgbHash.</param>
\r
1937 <returns>true if the signature is valid for the data; otherwise, false.</returns>
\r
1938 <exception cref="T:System.ArgumentNullException"><paramref name="rgbHash">rgbHash</paramref> is null. -or- <paramref name="rgbSignature">rgbSignature</paramref> is null.</exception>
\r
1939 <exception cref="T:System.Security.Cryptography.CryptographicUnexpectedOperationException">The DSA key is missing.</exception>
\r
1941 <member name="T:System.Security.Cryptography.DSASignatureFormatter">
\r
1942 <summary>Creates a Digital Signature Algorithm (<see cref="T:System.Security.Cryptography.DSA"></see>) signature.</summary>
\r
1944 <member name="M:System.Security.Cryptography.DSASignatureFormatter.#ctor">
\r
1945 <summary>Initializes a new instance of the <see cref="T:System.Security.Cryptography.DSASignatureFormatter"></see> class.</summary>
\r
1947 <member name="M:System.Security.Cryptography.DSASignatureFormatter.#ctor(System.Security.Cryptography.AsymmetricAlgorithm)">
\r
1948 <summary>Initializes a new instance of the <see cref="T:System.Security.Cryptography.DSASignatureFormatter"></see> class with the specified key.</summary>
\r
1949 <param name="key">The instance of the Digital Signature Algorithm (<see cref="T:System.Security.Cryptography.DSA"></see>) that holds the key.</param>
\r
1950 <exception cref="T:System.ArgumentNullException"><paramref name="key">key</paramref> is null.</exception>
\r
1952 <member name="M:System.Security.Cryptography.DSASignatureFormatter.CreateSignature(System.Byte[])">
\r
1953 <summary>Creates the Digital Signature Algorithm (<see cref="T:System.Security.Cryptography.DSA"></see>) PKCS #1 signature for the specified data.</summary>
\r
1954 <param name="rgbHash">The data to be signed.</param>
\r
1955 <returns>The digital signature for the specified data.</returns>
\r
1956 <exception cref="T:System.ArgumentNullException"><paramref name="rgbHash">rgbHash</paramref> is null.</exception>
\r
1957 <exception cref="T:System.Security.Cryptography.CryptographicUnexpectedOperationException">The OID is null. -or- The DSA key is null.</exception>
\r
1959 <member name="M:System.Security.Cryptography.DSASignatureFormatter.SetHashAlgorithm(System.String)">
\r
1960 <summary>Specifies the hash algorithm for the Digital Signature Algorithm (<see cref="T:System.Security.Cryptography.DSA"></see>) signature formatter.</summary>
\r
1961 <param name="strName">The name of the hash algorithm to use for the signature formatter.</param>
\r
1962 <exception cref="T:System.Security.Cryptography.CryptographicUnexpectedOperationException">The <paramref name="strName">strName</paramref> parameter does not map to the <see cref="T:System.Security.Cryptography.SHA1"></see> hash algorithm.</exception>
\r
1964 <member name="M:System.Security.Cryptography.DSASignatureFormatter.SetKey(System.Security.Cryptography.AsymmetricAlgorithm)">
\r
1965 <summary>Specifies the key to be used for the Digital Signature Algorithm (<see cref="T:System.Security.Cryptography.DSA"></see>) signature formatter.</summary>
\r
1966 <param name="key">The instance of <see cref="T:System.Security.Cryptography.DSA"></see> that holds the key.</param>
\r
1967 <exception cref="T:System.ArgumentNullException"><paramref name="key">key</paramref> is null.</exception>
\r
1969 <member name="T:System.Security.Cryptography.ECCurve.ECCurveType">
\r
1970 <summary>Indicates how to interpret the data contained in an <see cref="T:System.Security.Cryptography.ECCurve"></see> object.</summary>
\r
1972 <member name="F:System.Security.Cryptography.ECCurve.ECCurveType.Characteristic2">
\r
1973 <summary>The curve parameters represent a characteristic 2 curve.</summary>
\r
1974 <returns></returns>
\r
1976 <member name="F:System.Security.Cryptography.ECCurve.ECCurveType.Implicit">
\r
1977 <summary>No curve data is interpreted. The caller is assumed to know what the curve is.</summary>
\r
1978 <returns></returns>
\r
1980 <member name="F:System.Security.Cryptography.ECCurve.ECCurveType.Named">
\r
1981 <summary>The curve parameters represent a named curve.</summary>
\r
1982 <returns></returns>
\r
1984 <member name="F:System.Security.Cryptography.ECCurve.ECCurveType.PrimeMontgomery">
\r
1985 <summary>The curve parameters represent a prime curve with the formula By^2 = x^3 + A\x^2 + x.</summary>
\r
1986 <returns></returns>
\r
1988 <member name="F:System.Security.Cryptography.ECCurve.ECCurveType.PrimeShortWeierstrass">
\r
1989 <summary>The curve parameters represent a prime curve with the formula y^2 = x^3 + A*x + B in the prime field P.</summary>
\r
1990 <returns></returns>
\r
1992 <member name="F:System.Security.Cryptography.ECCurve.ECCurveType.PrimeTwistedEdwards">
\r
1993 <summary>The curve parameters represent a prime curve with the formula Ax^2 + y^2 = 1 + B\x^2*y^2 in the prime field P.</summary>
\r
1994 <returns></returns>
\r
1996 <member name="T:System.Security.Cryptography.ECCurve.NamedCurves">
\r
1997 <summary>Represents a factory class for creating named curves.</summary>
\r
1999 <member name="P:System.Security.Cryptography.ECCurve.NamedCurves.brainpoolP160r1">
\r
2000 <summary>Gets a brainpoolP160r1 named curve.</summary>
\r
2001 <returns>A brainpoolP160r1 named curve.</returns>
\r
2003 <member name="P:System.Security.Cryptography.ECCurve.NamedCurves.brainpoolP160t1">
\r
2004 <summary>Gets a brainpoolP160t1 named curve.</summary>
\r
2005 <returns>A brainpoolP160t1 named curve.</returns>
\r
2007 <member name="P:System.Security.Cryptography.ECCurve.NamedCurves.brainpoolP192r1">
\r
2008 <summary>Gets a brainpoolP192r1 named curve.</summary>
\r
2009 <returns>A brainpoolP192r1 named curve.</returns>
\r
2011 <member name="P:System.Security.Cryptography.ECCurve.NamedCurves.brainpoolP192t1">
\r
2012 <summary>Gets a brainpoolP192t1 named curve.</summary>
\r
2013 <returns>A brainpoolP192t1 named curve.</returns>
\r
2015 <member name="P:System.Security.Cryptography.ECCurve.NamedCurves.brainpoolP224r1">
\r
2016 <summary>Gets a brainpoolP224r1 named curve.</summary>
\r
2017 <returns>A brainpoolP224r1 named curve.</returns>
\r
2019 <member name="P:System.Security.Cryptography.ECCurve.NamedCurves.brainpoolP224t1">
\r
2020 <summary>Gets a brainpoolP224t1 named curve.</summary>
\r
2021 <returns>A brainpoolP224t1 named curve.</returns>
\r
2023 <member name="P:System.Security.Cryptography.ECCurve.NamedCurves.brainpoolP256r1">
\r
2024 <summary>Gets a brainpoolP256r1 named curve.</summary>
\r
2025 <returns>A brainpoolP256r1 named curve.</returns>
\r
2027 <member name="P:System.Security.Cryptography.ECCurve.NamedCurves.brainpoolP256t1">
\r
2028 <summary>Gets a brainpoolP256t1 named curve.</summary>
\r
2029 <returns>A brainpoolP256t1 named curve.</returns>
\r
2031 <member name="P:System.Security.Cryptography.ECCurve.NamedCurves.brainpoolP320r1">
\r
2032 <summary>Gets a brainpoolP320r1 named curve.</summary>
\r
2033 <returns>A brainpoolP320r1 named curve.</returns>
\r
2035 <member name="P:System.Security.Cryptography.ECCurve.NamedCurves.brainpoolP320t1">
\r
2036 <summary>Gets a brainpoolP320t1 named curve.</summary>
\r
2037 <returns>A brainpoolP320t1 named curve.</returns>
\r
2039 <member name="P:System.Security.Cryptography.ECCurve.NamedCurves.brainpoolP384r1">
\r
2040 <summary>Gets a brainpoolP384r1 named curve.</summary>
\r
2041 <returns>A brainpoolP384r1 named curve.</returns>
\r
2043 <member name="P:System.Security.Cryptography.ECCurve.NamedCurves.brainpoolP384t1">
\r
2044 <summary>Gets a brainpoolP384t1 named curve.</summary>
\r
2045 <returns>A brainpoolP384t1 named curve.</returns>
\r
2047 <member name="P:System.Security.Cryptography.ECCurve.NamedCurves.brainpoolP512r1">
\r
2048 <summary>Gets a brainpoolP512r1 named curve.</summary>
\r
2049 <returns>A brainpoolP512r1 named curve.</returns>
\r
2051 <member name="P:System.Security.Cryptography.ECCurve.NamedCurves.brainpoolP512t1">
\r
2052 <summary>Gets a brainpoolP512t1 named curve.</summary>
\r
2053 <returns>A brainpoolP512t1 named curve.</returns>
\r
2055 <member name="P:System.Security.Cryptography.ECCurve.NamedCurves.nistP256">
\r
2056 <summary>Gets a nistP256 named curve.</summary>
\r
2057 <returns>A nistP256 named curve.</returns>
\r
2059 <member name="P:System.Security.Cryptography.ECCurve.NamedCurves.nistP384">
\r
2060 <summary>Gets a nistP384 named curve.</summary>
\r
2061 <returns>A nistP384 named curve.</returns>
\r
2063 <member name="P:System.Security.Cryptography.ECCurve.NamedCurves.nistP521">
\r
2064 <summary>Gets a nistP521 named curve.</summary>
\r
2065 <returns>A nistP521 named curve.</returns>
\r
2067 <member name="T:System.Security.Cryptography.ECCurve">
\r
2068 <summary>Represents an elliptic curve.</summary>
\r
2070 <member name="F:System.Security.Cryptography.ECCurve.A">
\r
2071 <summary>The first coefficient for an explicit curve. A for short Weierstrass, Montgomery, and Twisted Edwards curves.</summary>
\r
2072 <returns></returns>
\r
2074 <member name="F:System.Security.Cryptography.ECCurve.B">
\r
2075 <summary>The second coefficient for an explicit curve. B for short Weierstrass and d for Twisted Edwards curves.</summary>
\r
2076 <returns></returns>
\r
2078 <member name="F:System.Security.Cryptography.ECCurve.Cofactor">
\r
2079 <summary>The cofactor of the curve.</summary>
\r
2080 <returns></returns>
\r
2082 <member name="M:System.Security.Cryptography.ECCurve.CreateFromFriendlyName(System.String)">
\r
2083 <summary>Creates a named curve using the specified friendly name of the identifier.</summary>
\r
2084 <param name="oidFriendlyName">The friendly name of the identifier.</param>
\r
2085 <returns>An object representing the named curve.</returns>
\r
2086 <exception cref="T:System.ArgumentNullException"><paramref name="oidFriendlyName">oidFriendlyName</paramref> is null.</exception>
\r
2088 <member name="M:System.Security.Cryptography.ECCurve.CreateFromOid(System.Security.Cryptography.Oid)">
\r
2089 <summary>Creates a named curve using the specified <see cref="T:System.Security.Cryptography.Oid"></see> object.</summary>
\r
2090 <param name="curveOid">The object identifier to use.</param>
\r
2091 <returns>An object representing the named curve.</returns>
\r
2093 <member name="M:System.Security.Cryptography.ECCurve.CreateFromValue(System.String)">
\r
2094 <summary>Creates a named curve using the specified dotted-decimal representation of the identifier.</summary>
\r
2095 <param name="oidValue">The dotted number of the identifier.</param>
\r
2096 <returns>An object representing the named curve.</returns>
\r
2097 <exception cref="T:System.ArgumentNullException"><paramref name="oidValue">oidValue</paramref> is null.</exception>
\r
2099 <member name="F:System.Security.Cryptography.ECCurve.CurveType">
\r
2100 <summary>Identifies the composition of the <see cref="T:System.Security.Cryptography.ECCurve"></see> object.</summary>
\r
2101 <returns></returns>
\r
2103 <member name="F:System.Security.Cryptography.ECCurve.G">
\r
2104 <summary>The generator, or base point, for operations on the curve.</summary>
\r
2105 <returns></returns>
\r
2107 <member name="F:System.Security.Cryptography.ECCurve.Hash">
\r
2108 <summary>The name of the hash algorithm which was used to generate the curve coefficients (<see cref="F:System.Security.Cryptography.ECCurve.A"></see> and <see cref="F:System.Security.Cryptography.ECCurve.B"></see>) from the <see cref="F:System.Security.Cryptography.ECCurve.Seed"></see> under the ANSI X9.62 generation algorithm. Applies only to explicit curves.</summary>
\r
2109 <returns></returns>
\r
2111 <member name="P:System.Security.Cryptography.ECCurve.IsCharacteristic2">
\r
2112 <summary>Gets a value that indicates whether the curve type indicates an explicit characteristic 2 curve.</summary>
\r
2113 <returns>true if the curve is an explicit characteristic 2 curve; false if the curve is a named characteristic 2, prime, or implicit curve.</returns>
\r
2115 <member name="P:System.Security.Cryptography.ECCurve.IsExplicit">
\r
2116 <summary>Gets a value that indicates whether the curve type indicates an explicit curve (either prime or characteristic 2).</summary>
\r
2117 <returns>true if the curve is an explicit curve (either prime or characteristic 2); false if the curve is a named or implicit curve.</returns>
\r
2119 <member name="P:System.Security.Cryptography.ECCurve.IsNamed">
\r
2120 <summary>Gets a value that indicates whether the curve type indicates a named curve.</summary>
\r
2121 <returns>true if the curve is a named curve; false if the curve is an implict or an explicit curve (either prime or characteristic 2).</returns>
\r
2123 <member name="P:System.Security.Cryptography.ECCurve.IsPrime">
\r
2124 <summary>Gets a value that indicates whether the curve type indicates an explicit prime curve.</summary>
\r
2125 <returns>true if the curve is an explicit prime curve; false if the curve is a named prime, characteristic 2 or implicit curves.</returns>
\r
2127 <member name="P:System.Security.Cryptography.ECCurve.Oid">
\r
2128 <summary>Gets the identifier of a named curve.</summary>
\r
2129 <returns>The identifier of a named curve.</returns>
\r
2131 <member name="F:System.Security.Cryptography.ECCurve.Order">
\r
2132 <summary>The order of the curve. Applies only to explicit curves.</summary>
\r
2133 <returns></returns>
\r
2135 <member name="F:System.Security.Cryptography.ECCurve.Polynomial">
\r
2136 <summary>The curve polynomial. Applies only to characteristic 2 curves.</summary>
\r
2137 <returns></returns>
\r
2139 <member name="F:System.Security.Cryptography.ECCurve.Prime">
\r
2140 <summary>The prime specifying the base field. Applies only to prime curves.</summary>
\r
2141 <returns></returns>
\r
2143 <member name="F:System.Security.Cryptography.ECCurve.Seed">
\r
2144 <summary>The seed value for coefficient generation under the ANSI X9.62 generation algorithm. Applies only to explicit curves.</summary>
\r
2145 <returns></returns>
\r
2147 <member name="M:System.Security.Cryptography.ECCurve.Validate">
\r
2148 <summary>Validates the integrity of the current curve. Throws a <see cref="T:System.Security.Cryptography.CryptographicException"></see> exception if the structure is not valid.</summary>
\r
2149 <exception cref="T:System.Security.Cryptography.CryptographicException">The curve parameters are not valid for the current curve type.</exception>
\r