AsymmetricKeyExchangeDeformatter Class
[ This article is for Windows Phone 8 developers. If you’re developing for Windows 10, see the latest documentation. ]
Represents the base class from which all asymmetric key exchange deformatters derive.
System.Security.Cryptography::AsymmetricKeyExchangeDeformatter
System.Security.Cryptography::RSAOAEPKeyExchangeDeformatter
System.Security.Cryptography::RSAPKCS1KeyExchangeDeformatter
Assembly: mscorlib (in mscorlib.dll)
The AsymmetricKeyExchangeDeformatter type exposes the following members.
| Name | Description | |
|---|---|---|
![]() | AsymmetricKeyExchangeDeformatter | Initializes a new instance of AsymmetricKeyExchangeDeformatter. |
| Name | Description | |
|---|---|---|
![]() | Parameters | When overridden in a derived class, gets or sets the parameters for the asymmetric key exchange. |
| Name | Description | |
|---|---|---|
![]() | DecryptKeyExchange | When overridden in a derived class, extracts secret information from the encrypted key exchange data. |
![]() | Equals(Object) | Determines whether the specified Object is equal to the current Object. (Inherited from Object.) |
![]() | Finalize | Allows an object to try to free resources and perform other cleanup operations before the Object is reclaimed by garbage collection. (Inherited from Object.) |
![]() | GetHashCode | Serves as a hash function for a particular type. (Inherited from Object.) |
![]() | GetType | Gets the Type of the current instance. (Inherited from Object.) |
![]() | MemberwiseClone | Creates a shallow copy of the current Object. (Inherited from Object.) |
![]() | SetKey | When overridden in a derived class, sets the private key to use for decrypting the secret information. |
![]() | ToString | Returns a string that represents the current object. (Inherited from Object.) |
Asymmetric key exchange deformatters decrypt key exchange data.
Key exchange allows a sender to create secret information, such as random data that can be used as a key in a symmetric encryption algorithm, and use encryption to send it to the intended recipient.
Caution: |
|---|
It is highly recommended that you not attempt to create your own key exchange method from the basic functionality provided, because many details of the operation must be performed carefully in order for the key exchange to be successful. |



Caution: