Creates Optimal Asymmetric Encryption Padding (OAEP) key exchange data using RSA.
Assembly: mscorlib.Extensions (in mscorlib.Extensions.dll)
Thetype exposes the following members.
|Parameter||Infrastructure. Gets or sets the parameter used to create padding in the key exchange creation process.|
|Parameters||Infrastructure. Gets the parameters for the Optimal Asymmetric Encryption Padding (OAEP) key exchange. (Overrides AsymmetricKeyExchangeFormatter.Parameters.)|
|Rng||Gets or sets the random number generator algorithm to use in the creation of the key exchange.|
|CreateKeyExchange(Byte())||Creates the encrypted key exchange data from the specified input data. (Overrides AsymmetricKeyExchangeFormatter.CreateKeyExchange(Byte()).)|
|CreateKeyExchange(Byte(), Type)||Creates the encrypted key exchange data from the specified input data. (Overrides AsymmetricKeyExchangeFormatter.CreateKeyExchange(Byte(), Type).)|
|Equals(Object)||Determines whether the specified Object is equal to the current Object. (Inherited from Object.)|
|Finalize||Allows an object to try to free resources and perform other cleanup operations before the Object is reclaimed by garbage collection. (Inherited from Object.)|
|GetHashCode||Serves as a hash function for a particular type. (Inherited from Object.)|
|GetType||Gets the Type of the current instance. (Inherited from Object.)|
|MemberwiseClone||Creates a shallow copy of the current Object. (Inherited from Object.)|
|SetKey||Sets the public key to use for encrypting the key exchange data. (Overrides AsymmetricKeyExchangeFormatter.SetKey(AsymmetricAlgorithm).)|
|ToString||Returns a string that represents the current object. (Inherited from Object.)|
Key exchange allows a sender to create secret information, for example, random data that can be used as a key in a symmetric encryption algorithm, and use encryption to send it to the intended recipient.
Use RSAOAEPKeyExchangeDeformatter to receive the key exchange and extract the secret information from it.
It is highly recommended that you not attempt to create your own key exchange method from the basic functionality provided, because many details of the operation must be performed carefully in order for the key exchange to be successful.
For a list of the operating systems and browsers that are supported by Silverlight, see Supported Operating Systems and Browsers.