Note
Access to this page requires authorization. You can try signing in or changing directories.
Access to this page requires authorization. You can try changing directories.
Include Protected Members
Include Inherited Members
| Retired Content |
|---|
This content is outdated and is no longer being maintained. It is provided as a courtesy for individuals who are still using these technologies. This page may contain URLs that were valid when originally published, but now link to sites or pages that no longer exist. |
The CryptographySettings type exposes the following members.
Constructors
| Name | Description | |
|---|---|---|
![]() |
CryptographySettings | Initialize a new instance of the CryptographySettings class. |
Methods
Properties
| Name | Description | |
|---|---|---|
![]() |
DefaultHashProviderName |
The instance name of the default IHashProvider instance.
|
![]() |
DefaultSymmetricCryptoProviderName |
The instance name of the default ISymmetricCryptoProvider instance.
|
![]() |
ElementInformation | (Inherited from ConfigurationElement.) |
![]() |
ElementProperty | (Inherited from ConfigurationElement.) |
![]() |
EvaluationContext | (Inherited from ConfigurationElement.) |
![]() |
HashProviders | Gets the HashProviders. |
![]() |
Item | Overloaded. |
![]() |
LockAllAttributesExcept | (Inherited from ConfigurationElement.) |
![]() |
LockAllElementsExcept | (Inherited from ConfigurationElement.) |
![]() |
LockAttributes | (Inherited from ConfigurationElement.) |
![]() |
LockElements | (Inherited from ConfigurationElement.) |
![]() |
LockItem | (Inherited from ConfigurationElement.) |
![]() |
Properties | (Inherited from ConfigurationElement.) |
![]() |
SectionInformation | (Inherited from ConfigurationSection.) |
![]() |
SymmetricCryptoProviders | Gets the HashProviders. |
See Also
Microsoft.Practices.EnterpriseLibrary.Security.Cryptography.Configuration Namespace
| Retired Content |
|---|
This content is outdated and is no longer being maintained. It is provided as a courtesy for individuals who are still using these technologies. This page may contain URLs that were valid when originally published, but now link to sites or pages that no longer exist. |
.gif)
.gif)
.gif)
.gif)