mscorlib(4.0.0.0) API with additions
|
Classes | |
class | Aes |
Represents the abstract base class from which all implementations of the Advanced Encryption Standard (AES) must inherit. More... | |
class | AesCng |
Provides a Cryptography Next Generation (CNG) implementation of the Advanced Encryption Standard (AES) algorithm. More... | |
class | AesCryptoServiceProvider |
Performs symmetric encryption and decryption using the Cryptographic Application Programming Interfaces (CAPI) implementation of the Advanced Encryption Standard (AES) algorithm. More... | |
class | AesManaged |
Provides a managed implementation of the Advanced Encryption Standard (AES) symmetric algorithm. More... | |
class | AsnEncodedData |
Represents Abstract Syntax Notation One (ASN.1)-encoded data. More... | |
class | AsnEncodedDataCollection |
Represents a collection of T:System.Security.Cryptography.AsnEncodedData objects. This class cannot be inherited. More... | |
class | AsnEncodedDataEnumerator |
Provides the ability to navigate through an T:System.Security.Cryptography.AsnEncodedDataCollection object. This class cannot be inherited. More... | |
class | AsymmetricAlgorithm |
Represents the abstract base class from which all implementations of asymmetric algorithms must inherit. More... | |
class | AsymmetricKeyExchangeDeformatter |
Represents the base class from which all asymmetric key exchange deformatters derive. More... | |
class | AsymmetricKeyExchangeFormatter |
Represents the base class from which all asymmetric key exchange formatters derive. More... | |
class | AsymmetricSignatureDeformatter |
Represents the abstract base class from which all implementations of asymmetric signature deformatters derive. More... | |
class | AsymmetricSignatureFormatter |
Represents the base class from which all implementations of asymmetric signature formatters derive. More... | |
class | CngAlgorithm |
Encapsulates the name of an encryption algorithm. More... | |
class | CngAlgorithmGroup |
Encapsulates the name of an encryption algorithm group. More... | |
class | CngKey |
Defines the core functionality for keys that are used with Cryptography Next Generation (CNG) objects. More... | |
class | CngKeyBlobFormat |
Specifies a key BLOB format for use with Microsoft Cryptography Next Generation (CNG) objects. More... | |
class | CngKeyCreationParameters |
Contains advanced properties for key creation. More... | |
struct | CngProperty |
Encapsulates a property of a Cryptography Next Generation (CNG) key or provider. More... | |
class | CngPropertyCollection |
Provides a strongly typed collection of Cryptography Next Generation (CNG) properties. More... | |
class | CngProvider |
Encapsulates the name of a key storage provider (KSP) for use with Cryptography Next Generation (CNG) objects. More... | |
class | CngUIPolicy |
Encapsulates optional configuration parameters for the user interface (UI) that Cryptography Next Generation (CNG) displays when you access a protected key. More... | |
class | CryptoAPITransform |
Performs a cryptographic transformation of data. This class cannot be inherited. More... | |
class | CryptoConfig |
Accesses the cryptography configuration information. More... | |
class | CryptographicException |
The exception that is thrown when an error occurs during a cryptographic operation. More... | |
class | CryptographicUnexpectedOperationException |
The exception that is thrown when an unexpected operation occurs during a cryptographic operation. More... | |
class | CryptoStream |
Defines a stream that links data streams to cryptographic transformations. More... | |
class | CspKeyContainerInfo |
Provides additional information about a cryptographic key pair. This class cannot be inherited. More... | |
class | CspParameters |
Contains parameters that are passed to the cryptographic service provider (CSP) that performs cryptographic computations. This class cannot be inherited. More... | |
class | DeriveBytes |
Represents the abstract base class from which all classes that derive byte sequences of a specified length inherit. More... | |
class | DES |
Represents the base class for the Data Encryption Standard (DES) algorithm from which all T:System.Security.Cryptography.DES implementations must derive. More... | |
class | DESCryptoServiceProvider |
Defines a wrapper object to access the cryptographic service provider (CSP) version of the Data Encryption Standard (T:System.Security.Cryptography.DES) algorithm. This class cannot be inherited. More... | |
class | DSA |
Represents the abstract base class from which all implementations of the Digital Signature Algorithm (T:System.Security.Cryptography.DSA) must inherit. More... | |
class | DSACng |
Provides a Cryptography Next Generation (CNG) implementation of the Digital Signature Algorithm (DSA). More... | |
class | DSACryptoServiceProvider |
Defines a wrapper object to access the cryptographic service provider (CSP) implementation of the T:System.Security.Cryptography.DSA algorithm. This class cannot be inherited. More... | |
struct | DSAParameters |
Contains the typical parameters for the T:System.Security.Cryptography.DSA algorithm. More... | |
class | DSASignatureDeformatter |
Verifies a Digital Signature Algorithm (T:System.Security.Cryptography.DSA) PKCS#1 v1.5 signature. More... | |
class | DSASignatureFormatter |
Creates a Digital Signature Algorithm (T:System.Security.Cryptography.DSA) signature. More... | |
struct | ECCurve |
Represents an elliptic curve. More... | |
class | ECDiffieHellman |
Provides an abstract base class that Elliptic Curve Diffie-Hellman (ECDH) algorithm implementations can derive from. This class provides the basic set of operations that all ECDH implementations must support. More... | |
class | ECDiffieHellmanCng |
Provides a Cryptography Next Generation (CNG) implementation of the Elliptic Curve Diffie-Hellman (ECDH) algorithm. This class is used to perform cryptographic operations. More... | |
class | ECDiffieHellmanCngPublicKey |
Specifies an Elliptic Curve Diffie-Hellman (ECDH) public key for use with the T:System.Security.Cryptography.ECDiffieHellmanCng class. More... | |
class | ECDiffieHellmanPublicKey |
Provides an abstract base class from which all T:System.Security.Cryptography.ECDiffieHellmanCngPublicKey implementations must inherit. More... | |
class | ECDsa |
Provides an abstract base class that encapsulates the Elliptic Curve Digital Signature Algorithm (ECDSA). More... | |
class | ECDsaCng |
Provides a Cryptography Next Generation (CNG) implementation of the Elliptic Curve Digital Signature Algorithm (ECDSA). More... | |
struct | ECParameters |
Represents the standard parameters for the elliptic curve cryptography (ECC) algorithm. More... | |
struct | ECPoint |
Represents a (X,Y) coordinate pair for elliptic curve cryptography (ECC) structures. More... | |
class | FromBase64Transform |
Converts a T:System.Security.Cryptography.CryptoStream from base 64. More... | |
class | HashAlgorithm |
Represents the base class from which all implementations of cryptographic hash algorithms must derive. More... | |
struct | HashAlgorithmName |
Specifies the name of a cryptographic hash algorithm. More... | |
class | HMAC |
Represents the abstract class from which all implementations of Hash-based Message Authentication Code (HMAC) must derive. More... | |
class | HMACMD5 |
Computes a Hash-based Message Authentication Code (HMAC) by using the T:System.Security.Cryptography.MD5 hash function. More... | |
class | HMACRIPEMD160 |
Computes a Hash-based Message Authentication Code (HMAC) by using the T:System.Security.Cryptography.RIPEMD160 hash function. More... | |
class | HMACSHA1 |
Computes a Hash-based Message Authentication Code (HMAC) using the T:System.Security.Cryptography.SHA1 hash function. More... | |
class | HMACSHA256 |
Computes a Hash-based Message Authentication Code (HMAC) by using the T:System.Security.Cryptography.SHA256 hash function. More... | |
class | HMACSHA384 |
Computes a Hash-based Message Authentication Code (HMAC) using the T:System.Security.Cryptography.SHA384 hash function. More... | |
class | HMACSHA512 |
Computes a Hash-based Message Authentication Code (HMAC) using the T:System.Security.Cryptography.SHA512 hash function. More... | |
interface | ICryptoTransform |
Defines the basic operations of cryptographic transformations. More... | |
interface | ICspAsymmetricAlgorithm |
Defines methods that allow an T:System.Security.Cryptography.AsymmetricAlgorithm class to enumerate key container information, and import and export Microsoft Cryptographic API (CAPI)–compatible key blobs. More... | |
class | IncrementalHash |
Provides support for computing a hash or Hash-based Message Authentication Code (HMAC) value incrementally across several segments. More... | |
class | KeyedHashAlgorithm |
Represents the abstract class from which all implementations of keyed hash algorithms must derive. More... | |
class | KeySizes |
Determines the set of valid key sizes for the symmetric cryptographic algorithms. More... | |
class | MACTripleDES |
Computes a Message Authentication Code (MAC) using T:System.Security.Cryptography.TripleDES for the input data T:System.Security.Cryptography.CryptoStream. More... | |
class | ManifestSignatureInformation |
Provides information for a manifest signature. More... | |
class | ManifestSignatureInformationCollection |
Represents a read-only collection of T:System.Security.Cryptography.ManifestSignatureInformation objects. More... | |
class | MaskGenerationMethod |
Represents the abstract class from which all mask generator algorithms must derive. More... | |
class | MD5 |
Represents the abstract class from which all implementations of the T:System.Security.Cryptography.MD5 hash algorithm inherit. More... | |
class | MD5Cng |
Provides a CNG (Cryptography Next Generation) implementation of the MD5 (Message Digest 5) 128-bit hashing algorithm. More... | |
class | MD5CryptoServiceProvider |
Computes the T:System.Security.Cryptography.MD5 hash value for the input data using the implementation provided by the cryptographic service provider (CSP). This class cannot be inherited. More... | |
class | Oid |
Represents a cryptographic object identifier. This class cannot be inherited. More... | |
class | OidCollection |
Represents a collection of T:System.Security.Cryptography.Oid objects. This class cannot be inherited. More... | |
class | OidEnumerator |
Provides the ability to navigate through an T:System.Security.Cryptography.OidCollection object. This class cannot be inherited. More... | |
class | PasswordDeriveBytes |
Derives a key from a password using an extension of the PBKDF1 algorithm. More... | |
class | PKCS1MaskGenerationMethod |
Computes masks according to PKCS #1 for use by key exchange algorithms. More... | |
class | RandomNumberGenerator |
Represents the abstract class from which all implementations of cryptographic random number generators derive. More... | |
class | RC2 |
Represents the base class from which all implementations of the T:System.Security.Cryptography.RC2 algorithm must derive. More... | |
class | RC2CryptoServiceProvider |
Defines a wrapper object to access the cryptographic service provider (CSP) implementation of the T:System.Security.Cryptography.RC2 algorithm. This class cannot be inherited. More... | |
class | Rfc2898DeriveBytes |
Implements password-based key derivation functionality, PBKDF2, by using a pseudo-random number generator based on T:System.Security.Cryptography.HMACSHA1. More... | |
class | Rijndael |
Represents the base class from which all implementations of the T:System.Security.Cryptography.Rijndael symmetric encryption algorithm must inherit. More... | |
class | RijndaelManaged |
Accesses the managed version of the T:System.Security.Cryptography.Rijndael algorithm. This class cannot be inherited. More... | |
class | RijndaelManagedTransform |
Performs a cryptographic transformation of data using the Rijndael algorithm. This class cannot be inherited. More... | |
class | RIPEMD160 |
Represents the abstract class from which all implementations of the MD160 hash algorithm inherit. More... | |
class | RIPEMD160Managed |
Computes the T:System.Security.Cryptography.RIPEMD160 hash for the input data using the managed library. More... | |
class | RNGCryptoServiceProvider |
Implements a cryptographic Random Number Generator (RNG) using the implementation provided by the cryptographic service provider (CSP). This class cannot be inherited. More... | |
class | RSA |
Represents the base class from which all implementations of the T:System.Security.Cryptography.RSA algorithm inherit. More... | |
class | RSACng |
Provides a Cryptography Next Generation (CNG) implementation of the RSA algorithm. More... | |
class | RSACryptoServiceProvider |
Performs asymmetric encryption and decryption using the implementation of the T:System.Security.Cryptography.RSA algorithm provided by the cryptographic service provider (CSP). This class cannot be inherited. More... | |
class | RSAEncryptionPadding |
Specifies the padding mode and parameters to use with RSA encryption or decryption operations. More... | |
class | RSAOAEPKeyExchangeDeformatter |
Decrypts Optimal Asymmetric Encryption Padding (OAEP) key exchange data. More... | |
class | RSAOAEPKeyExchangeFormatter |
Creates Optimal Asymmetric Encryption Padding (OAEP) key exchange data using T:System.Security.Cryptography.RSA. More... | |
struct | RSAParameters |
Represents the standard parameters for the T:System.Security.Cryptography.RSA algorithm. More... | |
class | RSAPKCS1KeyExchangeDeformatter |
Decrypts the PKCS #1 key exchange data. More... | |
class | RSAPKCS1KeyExchangeFormatter |
Creates the PKCS#1 key exchange data using T:System.Security.Cryptography.RSA. More... | |
class | RSAPKCS1SignatureDeformatter |
Verifies an T:System.Security.Cryptography.RSA PKCS #1 version 1.5 signature. More... | |
class | RSAPKCS1SignatureFormatter |
Creates an T:System.Security.Cryptography.RSA PKCS #1 version 1.5 signature. More... | |
class | RSASignaturePadding |
Specifies the padding mode and parameters to use with RSA signature creation or verification operations. More... | |
class | SHA1 |
Computes the T:System.Security.Cryptography.SHA1 hash for the input data. More... | |
class | SHA1Cng |
Provides a Cryptography Next Generation (CNG) implementation of the Secure Hash Algorithm (SHA). More... | |
class | SHA1CryptoServiceProvider |
Computes the T:System.Security.Cryptography.SHA1 hash value for the input data using the implementation provided by the cryptographic service provider (CSP). This class cannot be inherited. More... | |
class | SHA1Managed |
Computes the T:System.Security.Cryptography.SHA1 hash for the input data using the managed library. More... | |
class | SHA256 |
Computes the T:System.Security.Cryptography.SHA256 hash for the input data. More... | |
class | SHA256Cng |
Provides a Cryptography Next Generation (CNG) implementation of the Secure Hash Algorithm (SHA) for 256-bit hash values. More... | |
class | SHA256CryptoServiceProvider |
Defines a wrapper object to access the cryptographic service provider (CSP) implementation of the T:System.Security.Cryptography.SHA256 algorithm. More... | |
class | SHA256Managed |
Computes the T:System.Security.Cryptography.SHA256 hash for the input data using the managed library. More... | |
class | SHA384 |
Computes the T:System.Security.Cryptography.SHA384 hash for the input data. More... | |
class | SHA384Cng |
Provides a Cryptography Next Generation (CNG) implementation of the Secure Hash Algorithm (SHA) for 384-bit hash values. More... | |
class | SHA384CryptoServiceProvider |
Defines a wrapper object to access the cryptographic service provider (CSP) implementation of the T:System.Security.Cryptography.SHA384 algorithm. More... | |
class | SHA384Managed |
Computes the T:System.Security.Cryptography.SHA384 hash for the input data using the managed library. More... | |
class | SHA512 |
Computes the T:System.Security.Cryptography.SHA512 hash for the input data. More... | |
class | SHA512Cng |
Provides a Cryptography Next Generation (CNG) implementation of the Secure Hash Algorithm (SHA) for 512-bit hash values. More... | |
class | SHA512CryptoServiceProvider |
Defines a wrapper object to access the cryptographic service provider (CSP) implementation of the T:System.Security.Cryptography.SHA512 algorithm. More... | |
class | SHA512Managed |
Computes the T:System.Security.Cryptography.SHA512 hash algorithm for the input data using the managed library. More... | |
class | SignatureDescription |
Contains information about the properties of a digital signature. More... | |
class | StrongNameSignatureInformation |
Holds the strong name signature information for a manifest. More... | |
class | SymmetricAlgorithm |
Represents the abstract base class from which all implementations of symmetric algorithms must inherit. More... | |
class | ToBase64Transform |
Converts a T:System.Security.Cryptography.CryptoStream to base 64. More... | |
class | TripleDES |
Represents the base class for Triple Data Encryption Standard algorithms from which all T:System.Security.Cryptography.TripleDES implementations must derive. More... | |
class | TripleDESCng |
Provides a Cryptography Next Generation (CNG) implementation of the Triple Data Encryption Standard (3DES) algorithm. More... | |
class | TripleDESCryptoServiceProvider |
Defines a wrapper object to access the cryptographic service provider (CSP) version of the T:System.Security.Cryptography.TripleDES algorithm. This class cannot be inherited. More... | |
|
strong |
Specifies the block cipher mode to use for encryption.
Enumerator | |
---|---|
CBC | The Cipher Block Chaining ( |
ECB | The Electronic Codebook ( |
OFB | The Output Feedback ( |
CFB | The Cipher Feedback ( |
CTS | The Cipher Text Stealing ( |
Definition at line 8 of file CipherMode.cs.
|
strong |
Specifies the key export policies for a key.
Definition at line 5 of file CngExportPolicies.cs.
Specifies options used for key creation.
Enumerator | |
---|---|
None | No key creation options are used. |
MachineKey | A machine-wide key is created. |
OverwriteExistingKey | The existing key is overwritten during key creation. |
Definition at line 5 of file CngKeyCreationOptions.cs.
Specifies options for opening key handles.
Enumerator | |
---|---|
None | The key handle being opened does not specify an ephemeral key. |
EphemeralKey | The key handle being opened specifies an ephemeral key. |
Definition at line 5 of file CngKeyHandleOpenOptions.cs.
|
strong |
Specifies options for opening a key.
Definition at line 5 of file CngKeyOpenOptions.cs.
|
strong |
Specifies the cryptographic operations that a Cryptography Next Generation (CNG) key may be used with.
Definition at line 5 of file CngKeyUsages.cs.
|
strong |
Specifies Cryptography Next Generation (CNG) key property options.
Definition at line 5 of file CngPropertyOptions.cs.
Specifies the protection level for the key in user interface (UI) prompting scenarios.
Definition at line 5 of file CngUIProtectionLevels.cs.
|
strong |
Specifies the mode of a cryptographic stream.
Enumerator | |
---|---|
Read | Read access to a cryptographic stream. |
Write | Write access to a cryptographic stream. |
Definition at line 8 of file CryptoStreamMode.cs.
|
strong |
Specifies flags that modify the behavior of the cryptographic service providers (CSP).
Enumerator | |
---|---|
NoFlags | Do not specify any settings. |
UseMachineKeyStore | Use key information from the computer's key store. |
UseDefaultKeyContainer | Use key information from the default key container. |
UseNonExportableKey | Use key information that cannot be exported. |
UseExistingKey | Use key information from the current key. |
UseArchivableKey | Allow a key to be exported for archival or recovery. |
UseUserProtectedKey | Notify the user through a dialog box or another method when certain actions are attempting to use a key. This flag is not compatible with the F:System.Security.Cryptography.CspProviderFlags.NoPrompt flag. |
NoPrompt | Prevent the CSP from displaying any user interface (UI) for this context. |
CreateEphemeralKey | Create a temporary key that is released when the associated Rivest-Shamir-Adleman (RSA) object is closed. Do not use this flag if you want your key to be independent of the RSA object. |
Definition at line 9 of file CspProviderFlags.cs.
Specifies the key derivation function that the T:System.Security.Cryptography.ECDiffieHellmanCng class will use to convert secret agreements into key material.
Enumerator | |
---|---|
Hash | A hash algorithm is used to generate key material. The P:System.Security.Cryptography.ECDiffieHellmanCng.HashAlgorithm property specifies the name of the algorithm to use. If the algorithm name is not specified, T:System.Security.Cryptography.SHA256 is used as the default algorithm. |
Hmac | A Hash-based Message Authentication Code (HMAC) algorithm is used to generate key material. The P:System.Security.Cryptography.ECDiffieHellmanCng.HmacKey property specifies the key to use. Either this property must be set or the P:System.Security.Cryptography.ECDiffieHellmanCng.UseSecretAgreementAsHmacKey property must be set to |
Tls | The Transport Layer Security (TLS) protocol is used to generate key material. The P:System.Security.Cryptography.ECDiffieHellmanCng.Seed and P:System.Security.Cryptography.ECDiffieHellmanCng.Label properties must be set; otherwise, a T:System.Security.Cryptography.CryptographicException is thrown when you use F:System.Security.Cryptography.ECDiffieHellmanKeyDerivationFunction.Tls. |
Definition at line 4 of file ECDiffieHellmanKeyDerivationFunction.cs.
|
strong |
Defines XML serialization formats for elliptic curve keys.
Enumerator | |
---|---|
Rfc4050 | An XML serialization format described in RFC 4050, "Using the Elliptic Curve Signature Algorithm (ECDSA) for XML Digital Signatures." |
Definition at line 4 of file ECKeyXmlFormat.cs.
Specifies whether white space should be ignored in the base 64 transformation.
Enumerator | |
---|---|
IgnoreWhiteSpaces | White space should be ignored. |
DoNotIgnoreWhiteSpaces | White space should not be ignored. |
Definition at line 8 of file FromBase64TransformMode.cs.
|
strong |
Specifies whether to create an asymmetric signature key or an asymmetric exchange key.
Definition at line 8 of file KeyNumber.cs.
|
strong |
Identifies Windows cryptographic object identifier (OID) groups.
Definition at line 4 of file OidGroup.cs.
|
strong |
Specifies the type of padding to apply when the message data block is shorter than the full number of bytes needed for a cryptographic operation.
Definition at line 8 of file PaddingMode.cs.
Specifies the padding mode to use with RSA encryption or decryption operations.
Enumerator | |
---|---|
Pkcs1 | PKCS #1 v1.5. |
Oaep | Optimal Asymmetric Encryption Padding. |
Definition at line 4 of file RSAEncryptionPaddingMode.cs.
Specifies the padding mode to use with RSA signature creation or verification operations.
Enumerator | |
---|---|
Pkcs1 | PKCS #1 v1.5 |
Pss | Probabilistic Signature Scheme |
Definition at line 4 of file RSASignaturePaddingMode.cs.
Specifies most of the result codes for signature verification.
Definition at line 4 of file SignatureVerificationResult.cs.