HashAlgorithm Class

[This documentation is for preview only, and is subject to change in later releases. Blank topics are included as placeholders.]

Represents the base class from which all implementations of cryptographic hash algorithms must derive.

Inheritance Hierarchy

System. . :: . .Object
  Microsoft.SPOT.Cryptoki. . :: . .SessionContainer
    System.Security.Cryptography..::..HashAlgorithm
      System.Security.Cryptography. . :: . .KeyedHashAlgorithm

Namespace:  System.Security.Cryptography
Assembly:  System.Security (in System.Security.dll)

Syntax

'Declaration
Public Class HashAlgorithm _
    Inherits SessionContainer _
    Implements ICryptoTransform, IDisposable
public class HashAlgorithm : SessionContainer, 
    ICryptoTransform, IDisposable
public ref class HashAlgorithm : public SessionContainer, 
    ICryptoTransform, IDisposable
type HashAlgorithm =  
    class
        inherit SessionContainer
        interface ICryptoTransform
        interface IDisposable
    end
public class HashAlgorithm extends SessionContainer implements ICryptoTransform, IDisposable

The HashAlgorithm type exposes the following members.

Constructors

  Name Description
Public method HashAlgorithm(HashAlgorithmType, Session) Initializes a new instance of the HashAlgorithm class with the specified algorithm and session context.
Public method HashAlgorithm(HashAlgorithmType, String) Initializes a new instance of the HashAlgorithm class with the specified algorithm and service provider.

Top

Properties

  Name Description
Public property CanReuseTransform Gets a value indicating whether the current transform can be reused.
Public property CanTransformMultipleBlocks When overridden in a derived class, gets a value indicating whether multiple blocks can be transformed.
Public property Hash Gets the value of the computed hash code.
Public property HashSize Gets the size, in bits, of the computed hash code.
Public property HashType Gets the hash algorithm type.
Public property InputBlockSize When overridden in a derived class, gets the input block size.
Public property IsDisposed (Inherited from SessionContainer.)
Public property OutputBlockSize When overridden in a derived class, gets the output block size.
Public property Session (Inherited from SessionContainer.)

Top

Methods

  Name Description
Public method Clear Releases all resources used by the HashAlgorithm class.
Public method ComputeHash(array<Byte> [] () [] []) Computes the hash value for the specified byte array.
Public method ComputeHash(Stream) Computes the hash value for the specified Stream object.
Public method ComputeHash(array<Byte> [] () [] [], Int32, Int32) Computes the hash value for the specified region of the specified byte array.
Public method Dispose() () () () (Inherited from SessionContainer.)
Protected method Dispose(Boolean) Releases the unmanaged resources used by the HashAlgorithm and optionally releases the managed resources. (Overrides SessionContainer. . :: . .Dispose(Boolean).)
Public method Equals(Object) Determines whether the specified Object is equal to the current Object. (Inherited from Object.)
Protected method Finalize (Inherited from SessionContainer.)
Public method GetHashCode Serves as a hash function for a particular type. (Inherited from Object.)
Public method GetType Gets the Type of the current instance. (Inherited from Object.)
Public method Initialize Initializes an implementation of the HashAlgorithm class.
Protected method MemberwiseClone Creates a shallow copy of the current Object. (Inherited from Object.)
Public method ToString Returns a string that represents the current object. (Inherited from Object.)
Public method TransformBlock Computes the hash value for the specified region of the input byte array and copies the specified region of the input byte array to the specified region of the output byte array.
Public method TransformFinalBlock Computes the hash value for the specified region of the specified byte array.

Top

Fields

  Name Description
Protected field HashValue Represents the value of the computed hash code.
Protected field m_digest Contains the digest.
Protected field m_hashSize Contains the hash size.
Protected field m_isDisposed (Inherited from SessionContainer.)
Protected field m_isSessionClosing (Inherited from SessionContainer.)
Protected field m_mechanism Contains the mechanism.
Protected field m_ownsSession (Inherited from SessionContainer.)
Protected field m_session (Inherited from SessionContainer.)
Protected field State Represents the state of the hash computation.

Top

Remarks

Hash functions are fundamental to modern cryptography. These functions map binary strings of an arbitrary length to small binary strings of a fixed length, known as hash values. A cryptographic hash function has the property that it is computationally infeasible to find two distinct inputs that hash to the same value. Hash functions are commonly used with digital signatures and for data integrity.

The hash is used as a unique value of fixed size representing a large amount of data. Hashes of two sets of data should match if the corresponding data also matches. Small changes to the data result in large unpredictable changes in the hash.

Thread Safety

Any public static (Shared in Visual Basic) members of this type are thread safe. Any instance members are not guaranteed to be thread safe.

See Also

Reference

System.Security.Cryptography Namespace