Specifies flags that modify the behavior of the cryptographic service providers (CSP).
This enumeration has a FlagsAttribute attribute that allows a bitwise combination of its member values.Namespace: System.Security.Cryptography
Assembly: mscorlib (in mscorlib.dll)
|Do not specify any settings.|
|Use key information from the computer's key store.|
|Use key information from the default key container.|
|Use key information that cannot be exported.|
|Use key information from the current key.|
|Allow a key to be exported for archival or recovery.|
|Notify the user through a dialog box or another method when certain actions are attempting to use a key. This flag is not compatible with the flag.|
|Prevent the CSP from displaying any user interface (UI) for this context.|
|Create a temporary key that is released when the associated Rivest-Shamir-Adleman (RSA) object is closed. Do not use this flag if you want your key to be independent of the RSA object.|
The flag provides temporary keys with more reliable cleanup. If this flag is not used, the common language runtime (CLR) generates a randomly named key when an RSA object is created. When the object is finalized or disposed of, the key is deleted. When impersonation is in effect, not explicitly calling Dispose can potentially create a problem. For example, if you use impersonation, create an RSA object, and do not dispose of it, the finalizer thread (which is not impersonating) can fail to delete the key, and then throws an exception. This exception is unhandled and can terminate the process. The resources allocated to the key are not recovered, resulting in a memory leak. The KeyContainerPermission demand is suppressed by this flag.
Windows 7, Windows Vista SP1 or later, Windows XP SP3, Windows XP SP2 x64 Edition, Windows Server 2008 (Server Core not supported), Windows Server 2008 R2 (Server Core supported with SP1 or later), Windows Server 2003 SP2