AsymmetricKeyExchangeFormatter Class
[ This article is for Windows Phone 8 developers. If you’re developing for Windows 10, see the latest documentation. ]
Represents the base class from which all asymmetric key exchange formatters derive.
System.Security.Cryptography::AsymmetricKeyExchangeFormatter
System.Security.Cryptography::RSAOAEPKeyExchangeFormatter
System.Security.Cryptography::RSAPKCS1KeyExchangeFormatter
Assembly: mscorlib (in mscorlib.dll)
The AsymmetricKeyExchangeFormatter type exposes the following members.
| Name | Description | |
|---|---|---|
![]() | AsymmetricKeyExchangeFormatter | Initializes a new instance of AsymmetricKeyExchangeFormatter. |
| Name | Description | |
|---|---|---|
![]() | Parameters | When overridden in a derived class, gets the parameters for the asymmetric key exchange. |
| Name | Description | |
|---|---|---|
![]() | CreateKeyExchange(array<Byte>) | When overridden in a derived class, creates the encrypted key exchange data from the specified input data. |
![]() | CreateKeyExchange(array<Byte>, Type) | When overridden in a derived class, creates the encrypted key exchange data from the specified input data. |
![]() | Equals(Object) | Determines whether the specified Object is equal to the current Object. (Inherited from Object.) |
![]() | Finalize | Allows an object to try to free resources and perform other cleanup operations before the Object is reclaimed by garbage collection. (Inherited from Object.) |
![]() | GetHashCode | Serves as a hash function for a particular type. (Inherited from Object.) |
![]() | GetType | Gets the Type of the current instance. (Inherited from Object.) |
![]() | MemberwiseClone | Creates a shallow copy of the current Object. (Inherited from Object.) |
![]() | SetKey | When overridden in a derived class, sets the public key to use for encrypting the secret information. |
![]() | ToString | Returns a string that represents the current object. (Inherited from Object.) |
Asymmetric key exchange formatters encrypt key exchange data.
Key exchange allows a sender to create secret information, such as random data that can be used as a key in a symmetric encryption algorithm, and use encryption to send it to the intended recipient.
Caution: |
|---|
It is highly recommended that you not attempt to create your own key exchange method from the basic functionality provided, because many details of the operation must be performed carefully in order for the key exchange to be successful. |



Caution: