Was this page helpful?
Your feedback about this content is important. Let us know what you think.
Additional feedback?
1500 characters remaining
Export (0) Print
Expand All

ECDiffieHellmanCng Members

.NET Framework 3.5

Provides a Cryptography Next Generation (CNG) implementation of the Elliptic Curve Diffie-Hellman (ECDH) algorithm. This class is used to perform cryptographic operations.

The ECDiffieHellmanCng type exposes the following members.

  NameDescription
Public method ECDiffieHellmanCng Overloaded. Initializes a new instance of the ECDiffieHellmanCng class.
Top

  NameDescription
Public method Clear Releases all resources used by the AsymmetricAlgorithm class. (Inherited from AsymmetricAlgorithm.)
Public method DeriveKeyMaterial Overloaded. Derives the key material that is generated from the secret agreement between two parties.
Public method DeriveSecretAgreementHandle Overloaded. Gets a handle to the secret agreement generated between two parties.
Protected method Dispose When overridden in a derived class, releases the unmanaged resources used by the AsymmetricAlgorithm and optionally releases the managed resources. (Inherited from AsymmetricAlgorithm.)
Public method Equals Determines whether the specified Object is equal to the current Object. (Inherited from Object.)
Protected method Finalize Allows an object to try to free resources and perform other cleanup operations before it is reclaimed by garbage collection. (Inherited from Object.)
Public method FromXmlString Overloaded. Deserializes the key information from an XML string.
Public method GetHashCode Serves as a hash function for a particular type. (Inherited from Object.)
Public method GetType Gets the type of the current instance. (Inherited from Object.)
Protected method MemberwiseClone Creates a shallow copy of the current Object. (Inherited from Object.)
Public method ToString Returns a string that represents the current object. (Inherited from Object.)
Public method ToXmlString Overloaded. Serializes the key information to an XML string.
Top

  NameDescription
Protected field KeySizeValue Represents the size, in bits, of the key modulus used by the asymmetric algorithm. (Inherited from AsymmetricAlgorithm.)
Protected field LegalKeySizesValue Specifies the key sizes that are supported by the asymmetric algorithm. (Inherited from AsymmetricAlgorithm.)
Top

  NameDescription
Public property HashAlgorithm Gets or sets the hash algorithm to use when generating key material.
Public property HmacKey Gets or sets the Hash-based Message Authentication Code (HMAC) key to use when deriving key material.
Public property Key Specifies the CngKey that is used by the current object for cryptographic operations.
Public property KeyDerivationFunction Gets or sets the key derivation function for the ECDiffieHellmanCng class.
Public property KeyExchangeAlgorithm Gets the name of the key exchange algorithm. (Inherited from ECDiffieHellman.)
Public property KeySize Gets or sets the size, in bits, of the key modulus used by the asymmetric algorithm. (Inherited from AsymmetricAlgorithm.)
Public property Label Gets or sets the label value that is used for key derivation.
Public property LegalKeySizes Gets the key sizes that are supported by the asymmetric algorithm. (Inherited from AsymmetricAlgorithm.)
Public property PublicKey Gets the public key that can be used by another ECDiffieHellmanCng object to generate a shared secret agreement. (Overrides ECDiffieHellman.PublicKey.)
Public property SecretAppend Gets or sets a value that will be appended to the secret agreement when generating key material.
Public property SecretPrepend Gets or sets a value that will be added to the beginning of the secret agreement when deriving key material.
Public property Seed Gets or sets the seed value that will be used when deriving key material.
Public property SignatureAlgorithm Gets the name of the signature algorithm. (Inherited from ECDiffieHellman.)
Public property UseSecretAgreementAsHmacKey Gets a value that indicates whether the secret agreement is used as a Hash-based Message Authentication Code (HMAC) key to derive key material.
Top

  NameDescription
Explicit interface implemetation Private method IDisposable.Dispose Infrastructure. For a description of this member, see IDisposable.Dispose. (Inherited from AsymmetricAlgorithm.)
Top

Community Additions

ADD
Show:
© 2015 Microsoft