KeyedHashAlgorithm Class

[This documentation is for preview only, and is subject to change in later releases. Blank topics are included as placeholders.]

Represents the abstract class from which all implementations of keyed hash algorithms must derive.

Namespace:  System.Security.Cryptography
Assembly:  System.Security (in System.Security.dll)

public class KeyedHashAlgorithm : HashAlgorithm

The KeyedHashAlgorithm type exposes the following members.

  NameDescription
Public methodKeyedHashAlgorithm(KeyedHashAlgorithmType, Session)Initializes a new instance of the KeyedHashAlgorithm class with the specified algorithm and session context.
Public methodKeyedHashAlgorithm(KeyedHashAlgorithmType, CryptoKey)Initializes a new instance of the KeyedHashAlgorithm class with the specified algorithm and key object.
Public methodKeyedHashAlgorithm(KeyedHashAlgorithmType, String)Initializes a new instance of the KeyedHashAlgorithm class with the specified algorithm and service provider.
Top

  NameDescription
Public propertyCanReuseTransformGets a value indicating whether the current transform can be reused. (Inherited from HashAlgorithm.)
Public propertyCanTransformMultipleBlocksWhen overridden in a derived class, gets a value indicating whether multiple blocks can be transformed. (Inherited from HashAlgorithm.)
Public propertyHashGets the value of the computed hash code. (Inherited from HashAlgorithm.)
Public propertyHashSizeGets the size, in bits, of the computed hash code. (Inherited from HashAlgorithm.)
Public propertyHashTypeGets the hash algorithm type. (Inherited from HashAlgorithm.)
Public propertyInputBlockSizeWhen overridden in a derived class, gets the input block size. (Inherited from HashAlgorithm.)
Public propertyIsDisposed (Inherited from SessionContainer.)
Public propertyKeyGets or sets the key to use in the hash algorithm.
Public propertyKeyedHashTypeGets the keyed hash algorithm type.
Public propertyOutputBlockSizeWhen overridden in a derived class, gets the output block size. (Inherited from HashAlgorithm.)
Public propertySession (Inherited from SessionContainer.)
Top

  NameDescription
Public methodClearReleases all resources used by the HashAlgorithm class. (Inherited from HashAlgorithm.)
Public methodComputeHash(array<Byte>[]()[][])Computes the hash value for the specified byte array. (Inherited from HashAlgorithm.)
Public methodComputeHash(Stream)Computes the hash value for the specified Stream object. (Inherited from HashAlgorithm.)
Public methodComputeHash(array<Byte>[]()[][], Int32, Int32)Computes the hash value for the specified region of the specified byte array. (Inherited from HashAlgorithm.)
Public methodDispose()()()() (Inherited from SessionContainer.)
Protected methodDispose(Boolean)Releases the unmanaged resources used by the KeyedHashAlgorithm and optionally releases the managed resources. (Overrides HashAlgorithm..::..Dispose(Boolean).)
Public methodEquals(Object)Determines whether the specified Object is equal to the current Object. (Inherited from Object.)
Protected methodFinalize (Inherited from SessionContainer.)
Public methodGetHashCodeServes as a hash function for a particular type. (Inherited from Object.)
Public methodGetTypeGets the Type of the current instance. (Inherited from Object.)
Public methodInitializeInitializes an implementation of the HashAlgorithm class. (Inherited from HashAlgorithm.)
Protected methodMemberwiseCloneCreates a shallow copy of the current Object. (Inherited from Object.)
Public methodToStringReturns a string that represents the current object. (Inherited from Object.)
Public methodTransformBlockComputes the hash value for the specified region of the input byte array and copies the specified region of the input byte array to the specified region of the output byte array. (Inherited from HashAlgorithm.)
Public methodTransformFinalBlockComputes the hash value for the specified region of the specified byte array. (Inherited from HashAlgorithm.)
Top

  NameDescription
Protected fieldHashValueRepresents the value of the computed hash code. (Inherited from HashAlgorithm.)
Protected fieldKeyValueThe key to use in the hash algorithm.
Protected fieldm_digestContains the digest. (Inherited from HashAlgorithm.)
Protected fieldm_hashSizeContains the hash size. (Inherited from HashAlgorithm.)
Protected fieldm_isDisposed (Inherited from SessionContainer.)
Protected fieldm_isSessionClosing (Inherited from SessionContainer.)
Protected fieldm_mechanismContains the mechanism. (Inherited from HashAlgorithm.)
Protected fieldm_ownsSession (Inherited from SessionContainer.)
Protected fieldm_session (Inherited from SessionContainer.)
Protected fieldOwnsKeyRepresents the value that indicates whether algorithm owns the key.
Protected fieldStateRepresents the state of the hash computation. (Inherited from HashAlgorithm.)
Top

Hash functions map binary strings of an arbitrary length to small binary strings of a fixed length. A cryptographic hash function has the property that it is computationally infeasible to find two distinct inputs that hash to the same value. Small changes to the data result in large, unpredictable changes in the hash.

A keyed hash algorithm is a key-dependent, one-way hash function used as a message authentication code. Only someone who knows the key can verify the hash. Keyed hash algorithms provide authenticity without secrecy.

Any public static (Shared in Visual Basic) members of this type are thread safe. Any instance members are not guaranteed to be thread safe.
Show: