Xceed .NET Libraries Documentation
Aes128GcmDataIntegrityAlgorithm Class Members
Fields  Properties  Methods 


Xceed.SSH.Protocols Assembly > Xceed.SSH.Protocols Namespace : Aes128GcmDataIntegrityAlgorithm Class

The following tables list the members exposed by Aes128GcmDataIntegrityAlgorithm.

Public Constructors
 NameDescription
Public ConstructorOverloaded.   
Top
Protected Fields
 NameDescription
Protected FieldRepresents the size, in bits, of the computed hash code. (Inherited from System.Security.Cryptography.HashAlgorithm)
Protected Internal FieldRepresents the value of the computed hash code. (Inherited from System.Security.Cryptography.HashAlgorithm)
Protected FieldThe key to use in the hash algorithm. (Inherited from System.Security.Cryptography.KeyedHashAlgorithm)
Protected FieldRepresents the state of the hash computation. (Inherited from System.Security.Cryptography.HashAlgorithm)
Top
Public Properties
 NameDescription
Public PropertyGets a value indicating whether the current transform can be reused. (Inherited from System.Security.Cryptography.HashAlgorithm)
Public PropertyWhen overridden in a derived class, gets a value indicating whether multiple blocks can be transformed. (Inherited from System.Security.Cryptography.HashAlgorithm)
Public Property (Inherited from Xceed.SSH.Protocols.NoDataIntegrityAlgorithm)
Public PropertyOverridden.   
Public PropertyGets the value of the computed hash code. (Inherited from System.Security.Cryptography.HashAlgorithm)
Public PropertyGets the size, in bits, of the computed hash code. (Inherited from System.Security.Cryptography.HashAlgorithm)
Public PropertyWhen overridden in a derived class, gets the input block size. (Inherited from System.Security.Cryptography.HashAlgorithm)
Public Property (Inherited from Xceed.SSH.Protocols.NoDataIntegrityAlgorithm)
Public Property (Inherited from Xceed.SSH.Protocols.NoDataIntegrityAlgorithm)
Public PropertyWhen overridden in a derived class, gets the output block size. (Inherited from System.Security.Cryptography.HashAlgorithm)
Top
Public Methods
 NameDescription
Public MethodReleases all resources used by the System.Security.Cryptography.HashAlgorithm class. (Inherited from System.Security.Cryptography.HashAlgorithm)
Public MethodOverloaded. Computes the hash value for the specified System.IO.Stream object. (Inherited from System.Security.Cryptography.HashAlgorithm)
Public MethodOverloaded. Releases the unmanaged resources used by the System.Security.Cryptography.KeyedHashAlgorithm and optionally releases the managed resources. (Inherited from System.Security.Cryptography.KeyedHashAlgorithm)
Public Method (Inherited from Xceed.SSH.Protocols.NoDataIntegrityAlgorithm)
Public Method (Inherited from Xceed.SSH.Protocols.NoDataIntegrityAlgorithm)
Public MethodComputes the hash value for the specified region of the input byte array and copies the specified region of the input byte array to the specified region of the output byte array. (Inherited from System.Security.Cryptography.HashAlgorithm)
Public MethodComputes the hash value for the specified region of the specified byte array. (Inherited from System.Security.Cryptography.HashAlgorithm)
Top
Protected Methods
See Also

Reference

Aes128GcmDataIntegrityAlgorithm Class
Xceed.SSH.Protocols Namespace