Export (0) Print
Expand All

ECDsa Members

.NET Framework 3.5

Provides an abstract base class that encapsulates the Elliptic Curve Digital Signature Algorithm (ECDSA).

The ECDsa type exposes the following members.

  NameDescription
Protected method ECDsa Initializes a new instance of the ECDsa class.
Top

  NameDescription
Public method Clear Releases all resources used by the AsymmetricAlgorithm class. (Inherited from AsymmetricAlgorithm.)
Public method Static member Create Overloaded. Creates a new instance of an implementation of the Elliptic Curve Digital Signature Algorithm (ECDSA).
Protected method Dispose When overridden in a derived class, releases the unmanaged resources used by the AsymmetricAlgorithm and optionally releases the managed resources. (Inherited from AsymmetricAlgorithm.)
Public method Equals Determines whether the specified Object is equal to the current Object. (Inherited from Object.)
Protected method Finalize Allows an object to try to free resources and perform other cleanup operations before it is reclaimed by garbage collection. (Inherited from Object.)
Public method FromXmlString When overridden in a derived class, reconstructs an AsymmetricAlgorithm object from an XML string. (Inherited from AsymmetricAlgorithm.)
Public method GetHashCode Serves as a hash function for a particular type. (Inherited from Object.)
Public method GetType Gets the type of the current instance. (Inherited from Object.)
Protected method MemberwiseClone Creates a shallow copy of the current Object. (Inherited from Object.)
Public method SignHash Generates a digital signature for the specified hash value.
Public method ToString Returns a string that represents the current object. (Inherited from Object.)
Public method ToXmlString When overridden in a derived class, creates and returns an XML string representation of the current AsymmetricAlgorithm object. (Inherited from AsymmetricAlgorithm.)
Public method VerifyHash Verifies a digital signature against the specified hash value.
Top

  NameDescription
Protected field KeySizeValue Represents the size, in bits, of the key modulus used by the asymmetric algorithm. (Inherited from AsymmetricAlgorithm.)
Protected field LegalKeySizesValue Specifies the key sizes that are supported by the asymmetric algorithm. (Inherited from AsymmetricAlgorithm.)
Top

  NameDescription
Public property KeyExchangeAlgorithm Gets the name of the key exchange algorithm. (Overrides AsymmetricAlgorithm.KeyExchangeAlgorithm.)
Public property KeySize Gets or sets the size, in bits, of the key modulus used by the asymmetric algorithm. (Inherited from AsymmetricAlgorithm.)
Public property LegalKeySizes Gets the key sizes that are supported by the asymmetric algorithm. (Inherited from AsymmetricAlgorithm.)
Public property SignatureAlgorithm Gets the name of the signature algorithm. (Overrides AsymmetricAlgorithm.SignatureAlgorithm.)
Top

  NameDescription
Explicit interface implemetation Private method IDisposable.Dispose Infrastructure. For a description of this member, see IDisposable.Dispose. (Inherited from AsymmetricAlgorithm.)
Top

Community Additions

ADD
Show:
© 2014 Microsoft