AsymmetricAlgorithm Methods

The methods of the AsymmetricAlgorithm class are listed here. For a complete list of AsymmetricAlgorithm class members, see the AsymmetricAlgorithm Members topic.

Public Methods

public methodClear Releases all resources used by the AsymmetricAlgorithm.
public methodstatic (Shared in Visual Basic)Create Overloaded. Creates an instance of a cryptographic object used to perform the asymmetric algorithm.
public methodEquals (inherited from Object) Overloaded. Determines whether two Object instances are equal.
public methodFromXmlString When overridden in a derived class, reconstructs an AsymmetricAlgorithm object from an XML string.
public methodGetHashCode (inherited from Object) Serves as a hash function for a particular type, suitable for use in hashing algorithms and data structures like a hash table.
public methodGetType (inherited from Object) Gets the Type of the current instance.
public methodToString (inherited from Object) Returns a String that represents the current Object.
public methodToXmlString When overridden in a derived class, creates and returns an XML string representation of the current AsymmetricAlgorithm object.

Protected Methods

protected methodDispose When overridden in a derived class, releases the unmanaged resources used by the AsymmetricAlgorithm and optionally releases the managed resources.
protected methodFinalize (inherited from Object) Overridden. Allows an Object to attempt to free resources and perform other cleanup operations before the Object is reclaimed by garbage collection.

In C# and C++, finalizers are expressed using destructor syntax.

protected methodMemberwiseClone (inherited from Object) Creates a shallow copy of the current Object.

See Also

AsymmetricAlgorithm Class | System.Security.Cryptography Namespace

© 2016 Microsoft