BouncyCastle.Crypto.xml 1.7 MB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788899091929394959697989910010110210310410510610710810911011111211311411511611711811912012112212312412512612712812913013113213313413513613713813914014114214314414514614714814915015115215315415515615715815916016116216316416516616716816917017117217317417517617717817918018118218318418518618718818919019119219319419519619719819920020120220320420520620720820921021121221321421521621721821922022122222322422522622722822923023123223323423523623723823924024124224324424524624724824925025125225325425525625725825926026126226326426526626726826927027127227327427527627727827928028128228328428528628728828929029129229329429529629729829930030130230330430530630730830931031131231331431531631731831932032132232332432532632732832933033133233333433533633733833934034134234334434534634734834935035135235335435535635735835936036136236336436536636736836937037137237337437537637737837938038138238338438538638738838939039139239339439539639739839940040140240340440540640740840941041141241341441541641741841942042142242342442542642742842943043143243343443543643743843944044144244344444544644744844945045145245345445545645745845946046146246346446546646746846947047147247347447547647747847948048148248348448548648748848949049149249349449549649749849950050150250350450550650750850951051151251351451551651751851952052152252352452552652752852953053153253353453553653753853954054154254354454554654754854955055155255355455555655755855956056156256356456556656756856957057157257357457557657757857958058158258358458558658758858959059159259359459559659759859960060160260360460560660760860961061161261361461561661761861962062162262362462562662762862963063163263363463563663763863964064164264364464564664764864965065165265365465565665765865966066166266366466566666766866967067167267367467567667767867968068168268368468568668768868969069169269369469569669769869970070170270370470570670770870971071171271371471571671771871972072172272372472572672772872973073173273373473573673773873974074174274374474574674774874975075175275375475575675775875976076176276376476576676776876977077177277377477577677777877978078178278378478578678778878979079179279379479579679779879980080180280380480580680780880981081181281381481581681781881982082182282382482582682782882983083183283383483583683783883984084184284384484584684784884985085185285385485585685785885986086186286386486586686786886987087187287387487587687787887988088188288388488588688788888989089189289389489589689789889990090190290390490590690790890991091191291391491591691791891992092192292392492592692792892993093193293393493593693793893994094194294394494594694794894995095195295395495595695795895996096196296396496596696796896997097197297397497597697797897998098198298398498598698798898999099199299399499599699799899910001001100210031004100510061007100810091010101110121013101410151016101710181019102010211022102310241025102610271028102910301031103210331034103510361037103810391040104110421043104410451046104710481049105010511052105310541055105610571058105910601061106210631064106510661067106810691070107110721073107410751076107710781079108010811082108310841085108610871088108910901091109210931094109510961097109810991100110111021103110411051106110711081109111011111112111311141115111611171118111911201121112211231124112511261127112811291130113111321133113411351136113711381139114011411142114311441145114611471148114911501151115211531154115511561157115811591160116111621163116411651166116711681169117011711172117311741175117611771178117911801181118211831184118511861187118811891190119111921193119411951196119711981199120012011202120312041205120612071208120912101211121212131214121512161217121812191220122112221223122412251226122712281229123012311232123312341235123612371238123912401241124212431244124512461247124812491250125112521253125412551256125712581259126012611262126312641265126612671268126912701271127212731274127512761277127812791280128112821283128412851286128712881289129012911292129312941295129612971298129913001301130213031304130513061307130813091310131113121313131413151316131713181319132013211322132313241325132613271328132913301331133213331334133513361337133813391340134113421343134413451346134713481349135013511352135313541355135613571358135913601361136213631364136513661367136813691370137113721373137413751376137713781379138013811382138313841385138613871388138913901391139213931394139513961397139813991400140114021403140414051406140714081409141014111412141314141415141614171418141914201421142214231424142514261427142814291430143114321433143414351436143714381439144014411442144314441445144614471448144914501451145214531454145514561457145814591460146114621463146414651466146714681469147014711472147314741475147614771478147914801481148214831484148514861487148814891490149114921493149414951496149714981499150015011502150315041505150615071508150915101511151215131514151515161517151815191520152115221523152415251526152715281529153015311532153315341535153615371538153915401541154215431544154515461547154815491550155115521553155415551556155715581559156015611562156315641565156615671568156915701571157215731574157515761577157815791580158115821583158415851586158715881589159015911592159315941595159615971598159916001601160216031604160516061607160816091610161116121613161416151616161716181619162016211622162316241625162616271628162916301631163216331634163516361637163816391640164116421643164416451646164716481649165016511652165316541655165616571658165916601661166216631664166516661667166816691670167116721673167416751676167716781679168016811682168316841685168616871688168916901691169216931694169516961697169816991700170117021703170417051706170717081709171017111712171317141715171617171718171917201721172217231724172517261727172817291730173117321733173417351736173717381739174017411742174317441745174617471748174917501751175217531754175517561757175817591760176117621763176417651766176717681769177017711772177317741775177617771778177917801781178217831784178517861787178817891790179117921793179417951796179717981799180018011802180318041805180618071808180918101811181218131814181518161817181818191820182118221823182418251826182718281829183018311832183318341835183618371838183918401841184218431844184518461847184818491850185118521853185418551856185718581859186018611862186318641865186618671868186918701871187218731874187518761877187818791880188118821883188418851886188718881889189018911892189318941895189618971898189919001901190219031904190519061907190819091910191119121913191419151916191719181919192019211922192319241925192619271928192919301931193219331934193519361937193819391940194119421943194419451946194719481949195019511952195319541955195619571958195919601961196219631964196519661967196819691970197119721973197419751976197719781979198019811982198319841985198619871988198919901991199219931994199519961997199819992000200120022003200420052006200720082009201020112012201320142015201620172018201920202021202220232024202520262027202820292030203120322033203420352036203720382039204020412042204320442045204620472048204920502051205220532054205520562057205820592060206120622063206420652066206720682069207020712072207320742075207620772078207920802081208220832084208520862087208820892090209120922093209420952096209720982099210021012102210321042105210621072108210921102111211221132114211521162117211821192120212121222123212421252126212721282129213021312132213321342135213621372138213921402141214221432144214521462147214821492150215121522153215421552156215721582159216021612162216321642165216621672168216921702171217221732174217521762177217821792180218121822183218421852186218721882189219021912192219321942195219621972198219922002201220222032204220522062207220822092210221122122213221422152216221722182219222022212222222322242225222622272228222922302231223222332234223522362237223822392240224122422243224422452246224722482249225022512252225322542255225622572258225922602261226222632264226522662267226822692270227122722273227422752276227722782279228022812282228322842285228622872288228922902291229222932294229522962297229822992300230123022303230423052306230723082309231023112312231323142315231623172318231923202321232223232324232523262327232823292330233123322333233423352336233723382339234023412342234323442345234623472348234923502351235223532354235523562357235823592360236123622363236423652366236723682369237023712372237323742375237623772378237923802381238223832384238523862387238823892390239123922393239423952396239723982399240024012402240324042405240624072408240924102411241224132414241524162417241824192420242124222423242424252426242724282429243024312432243324342435243624372438243924402441244224432444244524462447244824492450245124522453245424552456245724582459246024612462246324642465246624672468246924702471247224732474247524762477247824792480248124822483248424852486248724882489249024912492249324942495249624972498249925002501250225032504250525062507250825092510251125122513251425152516251725182519252025212522252325242525252625272528252925302531253225332534253525362537253825392540254125422543254425452546254725482549255025512552255325542555255625572558255925602561256225632564256525662567256825692570257125722573257425752576257725782579258025812582258325842585258625872588258925902591259225932594259525962597259825992600260126022603260426052606260726082609261026112612261326142615261626172618261926202621262226232624262526262627262826292630263126322633263426352636263726382639264026412642264326442645264626472648264926502651265226532654265526562657265826592660266126622663266426652666266726682669267026712672267326742675267626772678267926802681268226832684268526862687268826892690269126922693269426952696269726982699270027012702270327042705270627072708270927102711271227132714271527162717271827192720272127222723272427252726272727282729273027312732273327342735273627372738273927402741274227432744274527462747274827492750275127522753275427552756275727582759276027612762276327642765276627672768276927702771277227732774277527762777277827792780278127822783278427852786278727882789279027912792279327942795279627972798279928002801280228032804280528062807280828092810281128122813281428152816281728182819282028212822282328242825282628272828282928302831283228332834283528362837283828392840284128422843284428452846284728482849285028512852285328542855285628572858285928602861286228632864286528662867286828692870287128722873287428752876287728782879288028812882288328842885288628872888288928902891289228932894289528962897289828992900290129022903290429052906290729082909291029112912291329142915291629172918291929202921292229232924292529262927292829292930293129322933293429352936293729382939294029412942294329442945294629472948294929502951295229532954295529562957295829592960296129622963296429652966296729682969297029712972297329742975297629772978297929802981298229832984298529862987298829892990299129922993299429952996299729982999300030013002300330043005300630073008300930103011301230133014301530163017301830193020302130223023302430253026302730283029303030313032303330343035303630373038303930403041304230433044304530463047304830493050305130523053305430553056305730583059306030613062306330643065306630673068306930703071307230733074307530763077307830793080308130823083308430853086308730883089309030913092309330943095309630973098309931003101310231033104310531063107310831093110311131123113311431153116311731183119312031213122312331243125312631273128312931303131313231333134313531363137313831393140314131423143314431453146314731483149315031513152315331543155315631573158315931603161316231633164316531663167316831693170317131723173317431753176317731783179318031813182318331843185318631873188318931903191319231933194319531963197319831993200320132023203320432053206320732083209321032113212321332143215321632173218321932203221322232233224322532263227322832293230323132323233323432353236323732383239324032413242324332443245324632473248324932503251325232533254325532563257325832593260326132623263326432653266326732683269327032713272327332743275327632773278327932803281328232833284328532863287328832893290329132923293329432953296329732983299330033013302330333043305330633073308330933103311331233133314331533163317331833193320332133223323332433253326332733283329333033313332333333343335333633373338333933403341334233433344334533463347334833493350335133523353335433553356335733583359336033613362336333643365336633673368336933703371337233733374337533763377337833793380338133823383338433853386338733883389339033913392339333943395339633973398339934003401340234033404340534063407340834093410341134123413341434153416341734183419342034213422342334243425342634273428342934303431343234333434343534363437343834393440344134423443344434453446344734483449345034513452345334543455345634573458345934603461346234633464346534663467346834693470347134723473347434753476347734783479348034813482348334843485348634873488348934903491349234933494349534963497349834993500350135023503350435053506350735083509351035113512351335143515351635173518351935203521352235233524352535263527352835293530353135323533353435353536353735383539354035413542354335443545354635473548354935503551355235533554355535563557355835593560356135623563356435653566356735683569357035713572357335743575357635773578357935803581358235833584358535863587358835893590359135923593359435953596359735983599360036013602360336043605360636073608360936103611361236133614361536163617361836193620362136223623362436253626362736283629363036313632363336343635363636373638363936403641364236433644364536463647364836493650365136523653365436553656365736583659366036613662366336643665366636673668366936703671367236733674367536763677367836793680368136823683368436853686368736883689369036913692369336943695369636973698369937003701370237033704370537063707370837093710371137123713371437153716371737183719372037213722372337243725372637273728372937303731373237333734373537363737373837393740374137423743374437453746374737483749375037513752375337543755375637573758375937603761376237633764376537663767376837693770377137723773377437753776377737783779378037813782378337843785378637873788378937903791379237933794379537963797379837993800380138023803380438053806380738083809381038113812381338143815381638173818381938203821382238233824382538263827382838293830383138323833383438353836383738383839384038413842384338443845384638473848384938503851385238533854385538563857385838593860386138623863386438653866386738683869387038713872387338743875387638773878387938803881388238833884388538863887388838893890389138923893389438953896389738983899390039013902390339043905390639073908390939103911391239133914391539163917391839193920392139223923392439253926392739283929393039313932393339343935393639373938393939403941394239433944394539463947394839493950395139523953395439553956395739583959396039613962396339643965396639673968396939703971397239733974397539763977397839793980398139823983398439853986398739883989399039913992399339943995399639973998399940004001400240034004400540064007400840094010401140124013401440154016401740184019402040214022402340244025402640274028402940304031403240334034403540364037403840394040404140424043404440454046404740484049405040514052405340544055405640574058405940604061406240634064406540664067406840694070407140724073407440754076407740784079408040814082408340844085408640874088408940904091409240934094409540964097409840994100410141024103410441054106410741084109411041114112411341144115411641174118411941204121412241234124412541264127412841294130413141324133413441354136413741384139414041414142414341444145414641474148414941504151415241534154415541564157415841594160416141624163416441654166416741684169417041714172417341744175417641774178417941804181418241834184418541864187418841894190419141924193419441954196419741984199420042014202420342044205420642074208420942104211421242134214421542164217421842194220422142224223422442254226422742284229423042314232423342344235423642374238423942404241424242434244424542464247424842494250425142524253425442554256425742584259426042614262426342644265426642674268426942704271427242734274427542764277427842794280428142824283428442854286428742884289429042914292429342944295429642974298429943004301430243034304430543064307430843094310431143124313431443154316431743184319432043214322432343244325432643274328432943304331433243334334433543364337433843394340434143424343434443454346434743484349435043514352435343544355435643574358435943604361436243634364436543664367436843694370437143724373437443754376437743784379438043814382438343844385438643874388438943904391439243934394439543964397439843994400440144024403440444054406440744084409441044114412441344144415441644174418441944204421442244234424442544264427442844294430443144324433443444354436443744384439444044414442444344444445444644474448444944504451445244534454445544564457445844594460446144624463446444654466446744684469447044714472447344744475447644774478447944804481448244834484448544864487448844894490449144924493449444954496449744984499450045014502450345044505450645074508450945104511451245134514451545164517451845194520452145224523452445254526452745284529453045314532453345344535453645374538453945404541454245434544454545464547454845494550455145524553455445554556455745584559456045614562456345644565456645674568456945704571457245734574457545764577457845794580458145824583458445854586458745884589459045914592459345944595459645974598459946004601460246034604460546064607460846094610461146124613461446154616461746184619462046214622462346244625462646274628462946304631463246334634463546364637463846394640464146424643464446454646464746484649465046514652465346544655465646574658465946604661466246634664466546664667466846694670467146724673467446754676467746784679468046814682468346844685468646874688468946904691469246934694469546964697469846994700470147024703470447054706470747084709471047114712471347144715471647174718471947204721472247234724472547264727472847294730473147324733473447354736473747384739474047414742474347444745474647474748474947504751475247534754475547564757475847594760476147624763476447654766476747684769477047714772477347744775477647774778477947804781478247834784478547864787478847894790479147924793479447954796479747984799480048014802480348044805480648074808480948104811481248134814481548164817481848194820482148224823482448254826482748284829483048314832483348344835483648374838483948404841484248434844484548464847484848494850485148524853485448554856485748584859486048614862486348644865486648674868486948704871487248734874487548764877487848794880488148824883488448854886488748884889489048914892489348944895489648974898489949004901490249034904490549064907490849094910491149124913491449154916491749184919492049214922492349244925492649274928492949304931493249334934493549364937493849394940494149424943494449454946494749484949495049514952495349544955495649574958495949604961496249634964496549664967496849694970497149724973497449754976497749784979498049814982498349844985498649874988498949904991499249934994499549964997499849995000500150025003500450055006500750085009501050115012501350145015501650175018501950205021502250235024502550265027502850295030503150325033503450355036503750385039504050415042504350445045504650475048504950505051505250535054505550565057505850595060506150625063506450655066506750685069507050715072507350745075507650775078507950805081508250835084508550865087508850895090509150925093509450955096509750985099510051015102510351045105510651075108510951105111511251135114511551165117511851195120512151225123512451255126512751285129513051315132513351345135513651375138513951405141514251435144514551465147514851495150515151525153515451555156515751585159516051615162516351645165516651675168516951705171517251735174517551765177517851795180518151825183518451855186518751885189519051915192519351945195519651975198519952005201520252035204520552065207520852095210521152125213521452155216521752185219522052215222522352245225522652275228522952305231523252335234523552365237523852395240524152425243524452455246524752485249525052515252525352545255525652575258525952605261526252635264526552665267526852695270527152725273527452755276527752785279528052815282528352845285528652875288528952905291529252935294529552965297529852995300530153025303530453055306530753085309531053115312531353145315531653175318531953205321532253235324532553265327532853295330533153325333533453355336533753385339534053415342534353445345534653475348534953505351535253535354535553565357535853595360536153625363536453655366536753685369537053715372537353745375537653775378537953805381538253835384538553865387538853895390539153925393539453955396539753985399540054015402540354045405540654075408540954105411541254135414541554165417541854195420542154225423542454255426542754285429543054315432543354345435543654375438543954405441544254435444544554465447544854495450545154525453545454555456545754585459546054615462546354645465546654675468546954705471547254735474547554765477547854795480548154825483548454855486548754885489549054915492549354945495549654975498549955005501550255035504550555065507550855095510551155125513551455155516551755185519552055215522552355245525552655275528552955305531553255335534553555365537553855395540554155425543554455455546554755485549555055515552555355545555555655575558555955605561556255635564556555665567556855695570557155725573557455755576557755785579558055815582558355845585558655875588558955905591559255935594559555965597559855995600560156025603560456055606560756085609561056115612561356145615561656175618561956205621562256235624562556265627562856295630563156325633563456355636563756385639564056415642564356445645564656475648564956505651565256535654565556565657565856595660566156625663566456655666566756685669567056715672567356745675567656775678567956805681568256835684568556865687568856895690569156925693569456955696569756985699570057015702570357045705570657075708570957105711571257135714571557165717571857195720572157225723572457255726572757285729573057315732573357345735573657375738573957405741574257435744574557465747574857495750575157525753575457555756575757585759576057615762576357645765576657675768576957705771577257735774577557765777577857795780578157825783578457855786578757885789579057915792579357945795579657975798579958005801580258035804580558065807580858095810581158125813581458155816581758185819582058215822582358245825582658275828582958305831583258335834583558365837583858395840584158425843584458455846584758485849585058515852585358545855585658575858585958605861586258635864586558665867586858695870587158725873587458755876587758785879588058815882588358845885588658875888588958905891589258935894589558965897589858995900590159025903590459055906590759085909591059115912591359145915591659175918591959205921592259235924592559265927592859295930593159325933593459355936593759385939594059415942594359445945594659475948594959505951595259535954595559565957595859595960596159625963596459655966596759685969597059715972597359745975597659775978597959805981598259835984598559865987598859895990599159925993599459955996599759985999600060016002600360046005600660076008600960106011601260136014601560166017601860196020602160226023602460256026602760286029603060316032603360346035603660376038603960406041604260436044604560466047604860496050605160526053605460556056605760586059606060616062606360646065606660676068606960706071607260736074607560766077607860796080608160826083608460856086608760886089609060916092609360946095609660976098609961006101610261036104610561066107610861096110611161126113611461156116611761186119612061216122612361246125612661276128612961306131613261336134613561366137613861396140614161426143614461456146614761486149615061516152615361546155615661576158615961606161616261636164616561666167616861696170617161726173617461756176617761786179618061816182618361846185618661876188618961906191619261936194619561966197619861996200620162026203620462056206620762086209621062116212621362146215621662176218621962206221622262236224622562266227622862296230623162326233623462356236623762386239624062416242624362446245624662476248624962506251625262536254625562566257625862596260626162626263626462656266626762686269627062716272627362746275627662776278627962806281628262836284628562866287628862896290629162926293629462956296629762986299630063016302630363046305630663076308630963106311631263136314631563166317631863196320632163226323632463256326632763286329633063316332633363346335633663376338633963406341634263436344634563466347634863496350635163526353635463556356635763586359636063616362636363646365636663676368636963706371637263736374637563766377637863796380638163826383638463856386638763886389639063916392639363946395639663976398639964006401640264036404640564066407640864096410641164126413641464156416641764186419642064216422642364246425642664276428642964306431643264336434643564366437643864396440644164426443644464456446644764486449645064516452645364546455645664576458645964606461646264636464646564666467646864696470647164726473647464756476647764786479648064816482648364846485648664876488648964906491649264936494649564966497649864996500650165026503650465056506650765086509651065116512651365146515651665176518651965206521652265236524652565266527652865296530653165326533653465356536653765386539654065416542654365446545654665476548654965506551655265536554655565566557655865596560656165626563656465656566656765686569657065716572657365746575657665776578657965806581658265836584658565866587658865896590659165926593659465956596659765986599660066016602660366046605660666076608660966106611661266136614661566166617661866196620662166226623662466256626662766286629663066316632663366346635663666376638663966406641664266436644664566466647664866496650665166526653665466556656665766586659666066616662666366646665666666676668666966706671667266736674667566766677667866796680668166826683668466856686668766886689669066916692669366946695669666976698669967006701670267036704670567066707670867096710671167126713671467156716671767186719672067216722672367246725672667276728672967306731673267336734673567366737673867396740674167426743674467456746674767486749675067516752675367546755675667576758675967606761676267636764676567666767676867696770677167726773677467756776677767786779678067816782678367846785678667876788678967906791679267936794679567966797679867996800680168026803680468056806680768086809681068116812681368146815681668176818681968206821682268236824682568266827682868296830683168326833683468356836683768386839684068416842684368446845684668476848684968506851685268536854685568566857685868596860686168626863686468656866686768686869687068716872687368746875687668776878687968806881688268836884688568866887688868896890689168926893689468956896689768986899690069016902690369046905690669076908690969106911691269136914691569166917691869196920692169226923692469256926692769286929693069316932693369346935693669376938693969406941694269436944694569466947694869496950695169526953695469556956695769586959696069616962696369646965696669676968696969706971697269736974697569766977697869796980698169826983698469856986698769886989699069916992699369946995699669976998699970007001700270037004700570067007700870097010701170127013701470157016701770187019702070217022702370247025702670277028702970307031703270337034703570367037703870397040704170427043704470457046704770487049705070517052705370547055705670577058705970607061706270637064706570667067706870697070707170727073707470757076707770787079708070817082708370847085708670877088708970907091709270937094709570967097709870997100710171027103710471057106710771087109711071117112711371147115711671177118711971207121712271237124712571267127712871297130713171327133713471357136713771387139714071417142714371447145714671477148714971507151715271537154715571567157715871597160716171627163716471657166716771687169717071717172717371747175717671777178717971807181718271837184718571867187718871897190719171927193719471957196719771987199720072017202720372047205720672077208720972107211721272137214721572167217721872197220722172227223722472257226722772287229723072317232723372347235723672377238723972407241724272437244724572467247724872497250725172527253725472557256725772587259726072617262726372647265726672677268726972707271727272737274727572767277727872797280728172827283728472857286728772887289729072917292729372947295729672977298729973007301730273037304730573067307730873097310731173127313731473157316731773187319732073217322732373247325732673277328732973307331733273337334733573367337733873397340734173427343734473457346734773487349735073517352735373547355735673577358735973607361736273637364736573667367736873697370737173727373737473757376737773787379738073817382738373847385738673877388738973907391739273937394739573967397739873997400740174027403740474057406740774087409741074117412741374147415741674177418741974207421742274237424742574267427742874297430743174327433743474357436743774387439744074417442744374447445744674477448744974507451745274537454745574567457745874597460746174627463746474657466746774687469747074717472747374747475747674777478747974807481748274837484748574867487748874897490749174927493749474957496749774987499750075017502750375047505750675077508750975107511751275137514751575167517751875197520752175227523752475257526752775287529753075317532753375347535753675377538753975407541754275437544754575467547754875497550755175527553755475557556755775587559756075617562756375647565756675677568756975707571757275737574757575767577757875797580758175827583758475857586758775887589759075917592759375947595759675977598759976007601760276037604760576067607760876097610761176127613761476157616761776187619762076217622762376247625762676277628762976307631763276337634763576367637763876397640764176427643764476457646764776487649765076517652765376547655765676577658765976607661766276637664766576667667766876697670767176727673767476757676767776787679768076817682768376847685768676877688768976907691769276937694769576967697769876997700770177027703770477057706770777087709771077117712771377147715771677177718771977207721772277237724772577267727772877297730773177327733773477357736773777387739774077417742774377447745774677477748774977507751775277537754775577567757775877597760776177627763776477657766776777687769777077717772777377747775777677777778777977807781778277837784778577867787778877897790779177927793779477957796779777987799780078017802780378047805780678077808780978107811781278137814781578167817781878197820782178227823782478257826782778287829783078317832783378347835783678377838783978407841784278437844784578467847784878497850785178527853785478557856785778587859786078617862786378647865786678677868786978707871787278737874787578767877787878797880788178827883788478857886788778887889789078917892789378947895789678977898789979007901790279037904790579067907790879097910791179127913791479157916791779187919792079217922792379247925792679277928792979307931793279337934793579367937793879397940794179427943794479457946794779487949795079517952795379547955795679577958795979607961796279637964796579667967796879697970797179727973797479757976797779787979798079817982798379847985798679877988798979907991799279937994799579967997799879998000800180028003800480058006800780088009801080118012801380148015801680178018801980208021802280238024802580268027802880298030803180328033803480358036803780388039804080418042804380448045804680478048804980508051805280538054805580568057805880598060806180628063806480658066806780688069807080718072807380748075807680778078807980808081808280838084808580868087808880898090809180928093809480958096809780988099810081018102810381048105810681078108810981108111811281138114811581168117811881198120812181228123812481258126812781288129813081318132813381348135813681378138813981408141814281438144814581468147814881498150815181528153815481558156815781588159816081618162816381648165816681678168816981708171817281738174817581768177817881798180818181828183818481858186818781888189819081918192819381948195819681978198819982008201820282038204820582068207820882098210821182128213821482158216821782188219822082218222822382248225822682278228822982308231823282338234823582368237823882398240824182428243824482458246824782488249825082518252825382548255825682578258825982608261826282638264826582668267826882698270827182728273827482758276827782788279828082818282828382848285828682878288828982908291829282938294829582968297829882998300830183028303830483058306830783088309831083118312831383148315831683178318831983208321832283238324832583268327832883298330833183328333833483358336833783388339834083418342834383448345834683478348834983508351835283538354835583568357835883598360836183628363836483658366836783688369837083718372837383748375837683778378837983808381838283838384838583868387838883898390839183928393839483958396839783988399840084018402840384048405840684078408840984108411841284138414841584168417841884198420842184228423842484258426842784288429843084318432843384348435843684378438843984408441844284438444844584468447844884498450845184528453845484558456845784588459846084618462846384648465846684678468846984708471847284738474847584768477847884798480848184828483848484858486848784888489849084918492849384948495849684978498849985008501850285038504850585068507850885098510851185128513851485158516851785188519852085218522852385248525852685278528852985308531853285338534853585368537853885398540854185428543854485458546854785488549855085518552855385548555855685578558855985608561856285638564856585668567856885698570857185728573857485758576857785788579858085818582858385848585858685878588858985908591859285938594859585968597859885998600860186028603860486058606860786088609861086118612861386148615861686178618861986208621862286238624862586268627862886298630863186328633863486358636863786388639864086418642864386448645864686478648864986508651865286538654865586568657865886598660866186628663866486658666866786688669867086718672867386748675867686778678867986808681868286838684868586868687868886898690869186928693869486958696869786988699870087018702870387048705870687078708870987108711871287138714871587168717871887198720872187228723872487258726872787288729873087318732873387348735873687378738873987408741874287438744874587468747874887498750875187528753875487558756875787588759876087618762876387648765876687678768876987708771877287738774877587768777877887798780878187828783878487858786878787888789879087918792879387948795879687978798879988008801880288038804880588068807880888098810881188128813881488158816881788188819882088218822882388248825882688278828882988308831883288338834883588368837883888398840884188428843884488458846884788488849885088518852885388548855885688578858885988608861886288638864886588668867886888698870887188728873887488758876887788788879888088818882888388848885888688878888888988908891889288938894889588968897889888998900890189028903890489058906890789088909891089118912891389148915891689178918891989208921892289238924892589268927892889298930893189328933893489358936893789388939894089418942894389448945894689478948894989508951895289538954895589568957895889598960896189628963896489658966896789688969897089718972897389748975897689778978897989808981898289838984898589868987898889898990899189928993899489958996899789988999900090019002900390049005900690079008900990109011901290139014901590169017901890199020902190229023902490259026902790289029903090319032903390349035903690379038903990409041904290439044904590469047904890499050905190529053905490559056905790589059906090619062906390649065906690679068906990709071907290739074907590769077907890799080908190829083908490859086908790889089909090919092909390949095909690979098909991009101910291039104910591069107910891099110911191129113911491159116911791189119912091219122912391249125912691279128912991309131913291339134913591369137913891399140914191429143914491459146914791489149915091519152915391549155915691579158915991609161916291639164916591669167916891699170917191729173917491759176917791789179918091819182918391849185918691879188918991909191919291939194919591969197919891999200920192029203920492059206920792089209921092119212921392149215921692179218921992209221922292239224922592269227922892299230923192329233923492359236923792389239924092419242924392449245924692479248924992509251925292539254925592569257925892599260926192629263926492659266926792689269927092719272927392749275927692779278927992809281928292839284928592869287928892899290929192929293929492959296929792989299930093019302930393049305930693079308930993109311931293139314931593169317931893199320932193229323932493259326932793289329933093319332933393349335933693379338933993409341934293439344934593469347934893499350935193529353935493559356935793589359936093619362936393649365936693679368936993709371937293739374937593769377937893799380938193829383938493859386938793889389939093919392939393949395939693979398939994009401940294039404940594069407940894099410941194129413941494159416941794189419942094219422942394249425942694279428942994309431943294339434943594369437943894399440944194429443944494459446944794489449945094519452945394549455945694579458945994609461946294639464946594669467946894699470947194729473947494759476947794789479948094819482948394849485948694879488948994909491949294939494949594969497949894999500950195029503950495059506950795089509951095119512951395149515951695179518951995209521952295239524952595269527952895299530953195329533953495359536953795389539954095419542954395449545954695479548954995509551955295539554955595569557955895599560956195629563956495659566956795689569957095719572957395749575957695779578957995809581958295839584958595869587958895899590959195929593959495959596959795989599960096019602960396049605960696079608960996109611961296139614961596169617961896199620962196229623962496259626962796289629963096319632963396349635963696379638963996409641964296439644964596469647964896499650965196529653965496559656965796589659966096619662966396649665966696679668966996709671967296739674967596769677967896799680968196829683968496859686968796889689969096919692969396949695969696979698969997009701970297039704970597069707970897099710971197129713971497159716971797189719972097219722972397249725972697279728972997309731973297339734973597369737973897399740974197429743974497459746974797489749975097519752975397549755975697579758975997609761976297639764976597669767976897699770977197729773977497759776977797789779978097819782978397849785978697879788978997909791979297939794979597969797979897999800980198029803980498059806980798089809981098119812981398149815981698179818981998209821982298239824982598269827982898299830983198329833983498359836983798389839984098419842984398449845984698479848984998509851985298539854985598569857985898599860986198629863986498659866986798689869987098719872987398749875987698779878987998809881988298839884988598869887988898899890989198929893989498959896989798989899990099019902990399049905990699079908990999109911991299139914991599169917991899199920992199229923992499259926992799289929993099319932993399349935993699379938993999409941994299439944994599469947994899499950995199529953995499559956995799589959996099619962996399649965996699679968996999709971997299739974997599769977997899799980998199829983998499859986998799889989999099919992999399949995999699979998999910000100011000210003100041000510006100071000810009100101001110012100131001410015100161001710018100191002010021100221002310024100251002610027100281002910030100311003210033100341003510036100371003810039100401004110042100431004410045100461004710048100491005010051100521005310054100551005610057100581005910060100611006210063100641006510066100671006810069100701007110072100731007410075100761007710078100791008010081100821008310084100851008610087100881008910090100911009210093100941009510096100971009810099101001010110102101031010410105101061010710108101091011010111101121011310114101151011610117101181011910120101211012210123101241012510126101271012810129101301013110132101331013410135101361013710138101391014010141101421014310144101451014610147101481014910150101511015210153101541015510156101571015810159101601016110162101631016410165101661016710168101691017010171101721017310174101751017610177101781017910180101811018210183101841018510186101871018810189101901019110192101931019410195101961019710198101991020010201102021020310204102051020610207102081020910210102111021210213102141021510216102171021810219102201022110222102231022410225102261022710228102291023010231102321023310234102351023610237102381023910240102411024210243102441024510246102471024810249102501025110252102531025410255102561025710258102591026010261102621026310264102651026610267102681026910270102711027210273102741027510276102771027810279102801028110282102831028410285102861028710288102891029010291102921029310294102951029610297102981029910300103011030210303103041030510306103071030810309103101031110312103131031410315103161031710318103191032010321103221032310324103251032610327103281032910330103311033210333103341033510336103371033810339103401034110342103431034410345103461034710348103491035010351103521035310354103551035610357103581035910360103611036210363103641036510366103671036810369103701037110372103731037410375103761037710378103791038010381103821038310384103851038610387103881038910390103911039210393103941039510396103971039810399104001040110402104031040410405104061040710408104091041010411104121041310414104151041610417104181041910420104211042210423104241042510426104271042810429104301043110432104331043410435104361043710438104391044010441104421044310444104451044610447104481044910450104511045210453104541045510456104571045810459104601046110462104631046410465104661046710468104691047010471104721047310474104751047610477104781047910480104811048210483104841048510486104871048810489104901049110492104931049410495104961049710498104991050010501105021050310504105051050610507105081050910510105111051210513105141051510516105171051810519105201052110522105231052410525105261052710528105291053010531105321053310534105351053610537105381053910540105411054210543105441054510546105471054810549105501055110552105531055410555105561055710558105591056010561105621056310564105651056610567105681056910570105711057210573105741057510576105771057810579105801058110582105831058410585105861058710588105891059010591105921059310594105951059610597105981059910600106011060210603106041060510606106071060810609106101061110612106131061410615106161061710618106191062010621106221062310624106251062610627106281062910630106311063210633106341063510636106371063810639106401064110642106431064410645106461064710648106491065010651106521065310654106551065610657106581065910660106611066210663106641066510666106671066810669106701067110672106731067410675106761067710678106791068010681106821068310684106851068610687106881068910690106911069210693106941069510696106971069810699107001070110702107031070410705107061070710708107091071010711107121071310714107151071610717107181071910720107211072210723107241072510726107271072810729107301073110732107331073410735107361073710738107391074010741107421074310744107451074610747107481074910750107511075210753107541075510756107571075810759107601076110762107631076410765107661076710768107691077010771107721077310774107751077610777107781077910780107811078210783107841078510786107871078810789107901079110792107931079410795107961079710798107991080010801108021080310804108051080610807108081080910810108111081210813108141081510816108171081810819108201082110822108231082410825108261082710828108291083010831108321083310834108351083610837108381083910840108411084210843108441084510846108471084810849108501085110852108531085410855108561085710858108591086010861108621086310864108651086610867108681086910870108711087210873108741087510876108771087810879108801088110882108831088410885108861088710888108891089010891108921089310894108951089610897108981089910900109011090210903109041090510906109071090810909109101091110912109131091410915109161091710918109191092010921109221092310924109251092610927109281092910930109311093210933109341093510936109371093810939109401094110942109431094410945109461094710948109491095010951109521095310954109551095610957109581095910960109611096210963109641096510966109671096810969109701097110972109731097410975109761097710978109791098010981109821098310984109851098610987109881098910990109911099210993109941099510996109971099810999110001100111002110031100411005110061100711008110091101011011110121101311014110151101611017110181101911020110211102211023110241102511026110271102811029110301103111032110331103411035110361103711038110391104011041110421104311044110451104611047110481104911050110511105211053110541105511056110571105811059110601106111062110631106411065110661106711068110691107011071110721107311074110751107611077110781107911080110811108211083110841108511086110871108811089110901109111092110931109411095110961109711098110991110011101111021110311104111051110611107111081110911110111111111211113111141111511116111171111811119111201112111122111231112411125111261112711128111291113011131111321113311134111351113611137111381113911140111411114211143111441114511146111471114811149111501115111152111531115411155111561115711158111591116011161111621116311164111651116611167111681116911170111711117211173111741117511176111771117811179111801118111182111831118411185111861118711188111891119011191111921119311194111951119611197111981119911200112011120211203112041120511206112071120811209112101121111212112131121411215112161121711218112191122011221112221122311224112251122611227112281122911230112311123211233112341123511236112371123811239112401124111242112431124411245112461124711248112491125011251112521125311254112551125611257112581125911260112611126211263112641126511266112671126811269112701127111272112731127411275112761127711278112791128011281112821128311284112851128611287112881128911290112911129211293112941129511296112971129811299113001130111302113031130411305113061130711308113091131011311113121131311314113151131611317113181131911320113211132211323113241132511326113271132811329113301133111332113331133411335113361133711338113391134011341113421134311344113451134611347113481134911350113511135211353113541135511356113571135811359113601136111362113631136411365113661136711368113691137011371113721137311374113751137611377113781137911380113811138211383113841138511386113871138811389113901139111392113931139411395113961139711398113991140011401114021140311404114051140611407114081140911410114111141211413114141141511416114171141811419114201142111422114231142411425114261142711428114291143011431114321143311434114351143611437114381143911440114411144211443114441144511446114471144811449114501145111452114531145411455114561145711458114591146011461114621146311464114651146611467114681146911470114711147211473114741147511476114771147811479114801148111482114831148411485114861148711488114891149011491114921149311494114951149611497114981149911500115011150211503115041150511506115071150811509115101151111512115131151411515115161151711518115191152011521115221152311524115251152611527115281152911530115311153211533115341153511536115371153811539115401154111542115431154411545115461154711548115491155011551115521155311554115551155611557115581155911560115611156211563115641156511566115671156811569115701157111572115731157411575115761157711578115791158011581115821158311584115851158611587115881158911590115911159211593115941159511596115971159811599116001160111602116031160411605116061160711608116091161011611116121161311614116151161611617116181161911620116211162211623116241162511626116271162811629116301163111632116331163411635116361163711638116391164011641116421164311644116451164611647116481164911650116511165211653116541165511656116571165811659116601166111662116631166411665116661166711668116691167011671116721167311674116751167611677116781167911680116811168211683116841168511686116871168811689116901169111692116931169411695116961169711698116991170011701117021170311704117051170611707117081170911710117111171211713117141171511716117171171811719117201172111722117231172411725117261172711728117291173011731117321173311734117351173611737117381173911740117411174211743117441174511746117471174811749117501175111752117531175411755117561175711758117591176011761117621176311764117651176611767117681176911770117711177211773117741177511776117771177811779117801178111782117831178411785117861178711788117891179011791117921179311794117951179611797117981179911800118011180211803118041180511806118071180811809118101181111812118131181411815118161181711818118191182011821118221182311824118251182611827118281182911830118311183211833118341183511836118371183811839118401184111842118431184411845118461184711848118491185011851118521185311854118551185611857118581185911860118611186211863118641186511866118671186811869118701187111872118731187411875118761187711878118791188011881118821188311884118851188611887118881188911890118911189211893118941189511896118971189811899119001190111902119031190411905119061190711908119091191011911119121191311914119151191611917119181191911920119211192211923119241192511926119271192811929119301193111932119331193411935119361193711938119391194011941119421194311944119451194611947119481194911950119511195211953119541195511956119571195811959119601196111962119631196411965119661196711968119691197011971119721197311974119751197611977119781197911980119811198211983119841198511986119871198811989119901199111992119931199411995119961199711998119991200012001120021200312004120051200612007120081200912010120111201212013120141201512016120171201812019120201202112022120231202412025120261202712028120291203012031120321203312034120351203612037120381203912040120411204212043120441204512046120471204812049120501205112052120531205412055120561205712058120591206012061120621206312064120651206612067120681206912070120711207212073120741207512076120771207812079120801208112082120831208412085120861208712088120891209012091120921209312094120951209612097120981209912100121011210212103121041210512106121071210812109121101211112112121131211412115121161211712118121191212012121121221212312124121251212612127121281212912130121311213212133121341213512136121371213812139121401214112142121431214412145121461214712148121491215012151121521215312154121551215612157121581215912160121611216212163121641216512166121671216812169121701217112172121731217412175121761217712178121791218012181121821218312184121851218612187121881218912190121911219212193121941219512196121971219812199122001220112202122031220412205122061220712208122091221012211122121221312214122151221612217122181221912220122211222212223122241222512226122271222812229122301223112232122331223412235122361223712238122391224012241122421224312244122451224612247122481224912250122511225212253122541225512256122571225812259122601226112262122631226412265122661226712268122691227012271122721227312274122751227612277122781227912280122811228212283122841228512286122871228812289122901229112292122931229412295122961229712298122991230012301123021230312304123051230612307123081230912310123111231212313123141231512316123171231812319123201232112322123231232412325123261232712328123291233012331123321233312334123351233612337123381233912340123411234212343123441234512346123471234812349123501235112352123531235412355123561235712358123591236012361123621236312364123651236612367123681236912370123711237212373123741237512376123771237812379123801238112382123831238412385123861238712388123891239012391123921239312394123951239612397123981239912400124011240212403124041240512406124071240812409124101241112412124131241412415124161241712418124191242012421124221242312424124251242612427124281242912430124311243212433124341243512436124371243812439124401244112442124431244412445124461244712448124491245012451124521245312454124551245612457124581245912460124611246212463124641246512466124671246812469124701247112472124731247412475124761247712478124791248012481124821248312484124851248612487124881248912490124911249212493124941249512496124971249812499125001250112502125031250412505125061250712508125091251012511125121251312514125151251612517125181251912520125211252212523125241252512526125271252812529125301253112532125331253412535125361253712538125391254012541125421254312544125451254612547125481254912550125511255212553125541255512556125571255812559125601256112562125631256412565125661256712568125691257012571125721257312574125751257612577125781257912580125811258212583125841258512586125871258812589125901259112592125931259412595125961259712598125991260012601126021260312604126051260612607126081260912610126111261212613126141261512616126171261812619126201262112622126231262412625126261262712628126291263012631126321263312634126351263612637126381263912640126411264212643126441264512646126471264812649126501265112652126531265412655126561265712658126591266012661126621266312664126651266612667126681266912670126711267212673126741267512676126771267812679126801268112682126831268412685126861268712688126891269012691126921269312694126951269612697126981269912700127011270212703127041270512706127071270812709127101271112712127131271412715127161271712718127191272012721127221272312724127251272612727127281272912730127311273212733127341273512736127371273812739127401274112742127431274412745127461274712748127491275012751127521275312754127551275612757127581275912760127611276212763127641276512766127671276812769127701277112772127731277412775127761277712778127791278012781127821278312784127851278612787127881278912790127911279212793127941279512796127971279812799128001280112802128031280412805128061280712808128091281012811128121281312814128151281612817128181281912820128211282212823128241282512826128271282812829128301283112832128331283412835128361283712838128391284012841128421284312844128451284612847128481284912850128511285212853128541285512856128571285812859128601286112862128631286412865128661286712868128691287012871128721287312874128751287612877128781287912880128811288212883128841288512886128871288812889128901289112892128931289412895128961289712898128991290012901129021290312904129051290612907129081290912910129111291212913129141291512916129171291812919129201292112922129231292412925129261292712928129291293012931129321293312934129351293612937129381293912940129411294212943129441294512946129471294812949129501295112952129531295412955129561295712958129591296012961129621296312964129651296612967129681296912970129711297212973129741297512976129771297812979129801298112982129831298412985129861298712988129891299012991129921299312994129951299612997129981299913000130011300213003130041300513006130071300813009130101301113012130131301413015130161301713018130191302013021130221302313024130251302613027130281302913030130311303213033130341303513036130371303813039130401304113042130431304413045130461304713048130491305013051130521305313054130551305613057130581305913060130611306213063130641306513066130671306813069130701307113072130731307413075130761307713078130791308013081130821308313084130851308613087130881308913090130911309213093130941309513096130971309813099131001310113102131031310413105131061310713108131091311013111131121311313114131151311613117131181311913120131211312213123131241312513126131271312813129131301313113132131331313413135131361313713138131391314013141131421314313144131451314613147131481314913150131511315213153131541315513156131571315813159131601316113162131631316413165131661316713168131691317013171131721317313174131751317613177131781317913180131811318213183131841318513186131871318813189131901319113192131931319413195131961319713198131991320013201132021320313204132051320613207132081320913210132111321213213132141321513216132171321813219132201322113222132231322413225132261322713228132291323013231132321323313234132351323613237132381323913240132411324213243132441324513246132471324813249132501325113252132531325413255132561325713258132591326013261132621326313264132651326613267132681326913270132711327213273132741327513276132771327813279132801328113282132831328413285132861328713288132891329013291132921329313294132951329613297132981329913300133011330213303133041330513306133071330813309133101331113312133131331413315133161331713318133191332013321133221332313324133251332613327133281332913330133311333213333133341333513336133371333813339133401334113342133431334413345133461334713348133491335013351133521335313354133551335613357133581335913360133611336213363133641336513366133671336813369133701337113372133731337413375133761337713378133791338013381133821338313384133851338613387133881338913390133911339213393133941339513396133971339813399134001340113402134031340413405134061340713408134091341013411134121341313414134151341613417134181341913420134211342213423134241342513426134271342813429134301343113432134331343413435134361343713438134391344013441134421344313444134451344613447134481344913450134511345213453134541345513456134571345813459134601346113462134631346413465134661346713468134691347013471134721347313474134751347613477134781347913480134811348213483134841348513486134871348813489134901349113492134931349413495134961349713498134991350013501135021350313504135051350613507135081350913510135111351213513135141351513516135171351813519135201352113522135231352413525135261352713528135291353013531135321353313534135351353613537135381353913540135411354213543135441354513546135471354813549135501355113552135531355413555135561355713558135591356013561135621356313564135651356613567135681356913570135711357213573135741357513576135771357813579135801358113582135831358413585135861358713588135891359013591135921359313594135951359613597135981359913600136011360213603136041360513606136071360813609136101361113612136131361413615136161361713618136191362013621136221362313624136251362613627136281362913630136311363213633136341363513636136371363813639136401364113642136431364413645136461364713648136491365013651136521365313654136551365613657136581365913660136611366213663136641366513666136671366813669136701367113672136731367413675136761367713678136791368013681136821368313684136851368613687136881368913690136911369213693136941369513696136971369813699137001370113702137031370413705137061370713708137091371013711137121371313714137151371613717137181371913720137211372213723137241372513726137271372813729137301373113732137331373413735137361373713738137391374013741137421374313744137451374613747137481374913750137511375213753137541375513756137571375813759137601376113762137631376413765137661376713768137691377013771137721377313774137751377613777137781377913780137811378213783137841378513786137871378813789137901379113792137931379413795137961379713798137991380013801138021380313804138051380613807138081380913810138111381213813138141381513816138171381813819138201382113822138231382413825138261382713828138291383013831138321383313834138351383613837138381383913840138411384213843138441384513846138471384813849138501385113852138531385413855138561385713858138591386013861138621386313864138651386613867138681386913870138711387213873138741387513876138771387813879138801388113882138831388413885138861388713888138891389013891138921389313894138951389613897138981389913900139011390213903139041390513906139071390813909139101391113912139131391413915139161391713918139191392013921139221392313924139251392613927139281392913930139311393213933139341393513936139371393813939139401394113942139431394413945139461394713948139491395013951139521395313954139551395613957139581395913960139611396213963139641396513966139671396813969139701397113972139731397413975139761397713978139791398013981139821398313984139851398613987139881398913990139911399213993139941399513996139971399813999140001400114002140031400414005140061400714008140091401014011140121401314014140151401614017140181401914020140211402214023140241402514026140271402814029140301403114032140331403414035140361403714038140391404014041140421404314044140451404614047140481404914050140511405214053140541405514056140571405814059140601406114062140631406414065140661406714068140691407014071140721407314074140751407614077140781407914080140811408214083140841408514086140871408814089140901409114092140931409414095140961409714098140991410014101141021410314104141051410614107141081410914110141111411214113141141411514116141171411814119141201412114122141231412414125141261412714128141291413014131141321413314134141351413614137141381413914140141411414214143141441414514146141471414814149141501415114152141531415414155141561415714158141591416014161141621416314164141651416614167141681416914170141711417214173141741417514176141771417814179141801418114182141831418414185141861418714188141891419014191141921419314194141951419614197141981419914200142011420214203142041420514206142071420814209142101421114212142131421414215142161421714218142191422014221142221422314224142251422614227142281422914230142311423214233142341423514236142371423814239142401424114242142431424414245142461424714248142491425014251142521425314254142551425614257142581425914260142611426214263142641426514266142671426814269142701427114272142731427414275142761427714278142791428014281142821428314284142851428614287142881428914290142911429214293142941429514296142971429814299143001430114302143031430414305143061430714308143091431014311143121431314314143151431614317143181431914320143211432214323143241432514326143271432814329143301433114332143331433414335143361433714338143391434014341143421434314344143451434614347143481434914350143511435214353143541435514356143571435814359143601436114362143631436414365143661436714368143691437014371143721437314374143751437614377143781437914380143811438214383143841438514386143871438814389143901439114392143931439414395143961439714398143991440014401144021440314404144051440614407144081440914410144111441214413144141441514416144171441814419144201442114422144231442414425144261442714428144291443014431144321443314434144351443614437144381443914440144411444214443144441444514446144471444814449144501445114452144531445414455144561445714458144591446014461144621446314464144651446614467144681446914470144711447214473144741447514476144771447814479144801448114482144831448414485144861448714488144891449014491144921449314494144951449614497144981449914500145011450214503145041450514506145071450814509145101451114512145131451414515145161451714518145191452014521145221452314524145251452614527145281452914530145311453214533145341453514536145371453814539145401454114542145431454414545145461454714548145491455014551145521455314554145551455614557145581455914560145611456214563145641456514566145671456814569145701457114572145731457414575145761457714578145791458014581145821458314584145851458614587145881458914590145911459214593145941459514596145971459814599146001460114602146031460414605146061460714608146091461014611146121461314614146151461614617146181461914620146211462214623146241462514626146271462814629146301463114632146331463414635146361463714638146391464014641146421464314644146451464614647146481464914650146511465214653146541465514656146571465814659146601466114662146631466414665146661466714668146691467014671146721467314674146751467614677146781467914680146811468214683146841468514686146871468814689146901469114692146931469414695146961469714698146991470014701147021470314704147051470614707147081470914710147111471214713147141471514716147171471814719147201472114722147231472414725147261472714728147291473014731147321473314734147351473614737147381473914740147411474214743147441474514746147471474814749147501475114752147531475414755147561475714758147591476014761147621476314764147651476614767147681476914770147711477214773147741477514776147771477814779147801478114782147831478414785147861478714788147891479014791147921479314794147951479614797147981479914800148011480214803148041480514806148071480814809148101481114812148131481414815148161481714818148191482014821148221482314824148251482614827148281482914830148311483214833148341483514836148371483814839148401484114842148431484414845148461484714848148491485014851148521485314854148551485614857148581485914860148611486214863148641486514866148671486814869148701487114872148731487414875148761487714878148791488014881148821488314884148851488614887148881488914890148911489214893148941489514896148971489814899149001490114902149031490414905149061490714908149091491014911149121491314914149151491614917149181491914920149211492214923149241492514926149271492814929149301493114932149331493414935149361493714938149391494014941149421494314944149451494614947149481494914950149511495214953149541495514956149571495814959149601496114962149631496414965149661496714968149691497014971149721497314974149751497614977149781497914980149811498214983149841498514986149871498814989149901499114992149931499414995149961499714998149991500015001150021500315004150051500615007150081500915010150111501215013150141501515016150171501815019150201502115022150231502415025150261502715028150291503015031150321503315034150351503615037150381503915040150411504215043150441504515046150471504815049150501505115052150531505415055150561505715058150591506015061150621506315064150651506615067150681506915070150711507215073150741507515076150771507815079150801508115082150831508415085150861508715088150891509015091150921509315094150951509615097150981509915100151011510215103151041510515106151071510815109151101511115112151131511415115151161511715118151191512015121151221512315124151251512615127151281512915130151311513215133151341513515136151371513815139151401514115142151431514415145151461514715148151491515015151151521515315154151551515615157151581515915160151611516215163151641516515166151671516815169151701517115172151731517415175151761517715178151791518015181151821518315184151851518615187151881518915190151911519215193151941519515196151971519815199152001520115202152031520415205152061520715208152091521015211152121521315214152151521615217152181521915220152211522215223152241522515226152271522815229152301523115232152331523415235152361523715238152391524015241152421524315244152451524615247152481524915250152511525215253152541525515256152571525815259152601526115262152631526415265152661526715268152691527015271152721527315274152751527615277152781527915280152811528215283152841528515286152871528815289152901529115292152931529415295152961529715298152991530015301153021530315304153051530615307153081530915310153111531215313153141531515316153171531815319153201532115322153231532415325153261532715328153291533015331153321533315334153351533615337153381533915340153411534215343153441534515346153471534815349153501535115352153531535415355153561535715358153591536015361153621536315364153651536615367153681536915370153711537215373153741537515376153771537815379153801538115382153831538415385153861538715388153891539015391153921539315394153951539615397153981539915400154011540215403154041540515406154071540815409154101541115412154131541415415154161541715418154191542015421154221542315424154251542615427154281542915430154311543215433154341543515436154371543815439154401544115442154431544415445154461544715448154491545015451154521545315454154551545615457154581545915460154611546215463154641546515466154671546815469154701547115472154731547415475154761547715478154791548015481154821548315484154851548615487154881548915490154911549215493154941549515496154971549815499155001550115502155031550415505155061550715508155091551015511155121551315514155151551615517155181551915520155211552215523155241552515526155271552815529155301553115532155331553415535155361553715538155391554015541155421554315544155451554615547155481554915550155511555215553155541555515556155571555815559155601556115562155631556415565155661556715568155691557015571155721557315574155751557615577155781557915580155811558215583155841558515586155871558815589155901559115592155931559415595155961559715598155991560015601156021560315604156051560615607156081560915610156111561215613156141561515616156171561815619156201562115622156231562415625156261562715628156291563015631156321563315634156351563615637156381563915640156411564215643156441564515646156471564815649156501565115652156531565415655156561565715658156591566015661156621566315664156651566615667156681566915670156711567215673156741567515676156771567815679156801568115682156831568415685156861568715688156891569015691156921569315694156951569615697156981569915700157011570215703157041570515706157071570815709157101571115712157131571415715157161571715718157191572015721157221572315724157251572615727157281572915730157311573215733157341573515736157371573815739157401574115742157431574415745157461574715748157491575015751157521575315754157551575615757157581575915760157611576215763157641576515766157671576815769157701577115772157731577415775157761577715778157791578015781157821578315784157851578615787157881578915790157911579215793157941579515796157971579815799158001580115802158031580415805158061580715808158091581015811158121581315814158151581615817158181581915820158211582215823158241582515826158271582815829158301583115832158331583415835158361583715838158391584015841158421584315844158451584615847158481584915850158511585215853158541585515856158571585815859158601586115862158631586415865158661586715868158691587015871158721587315874158751587615877158781587915880158811588215883158841588515886158871588815889158901589115892158931589415895158961589715898158991590015901159021590315904159051590615907159081590915910159111591215913159141591515916159171591815919159201592115922159231592415925159261592715928159291593015931159321593315934159351593615937159381593915940159411594215943159441594515946159471594815949159501595115952159531595415955159561595715958159591596015961159621596315964159651596615967159681596915970159711597215973159741597515976159771597815979159801598115982159831598415985159861598715988159891599015991159921599315994159951599615997159981599916000160011600216003160041600516006160071600816009160101601116012160131601416015160161601716018160191602016021160221602316024160251602616027160281602916030160311603216033160341603516036160371603816039160401604116042160431604416045160461604716048160491605016051160521605316054160551605616057160581605916060160611606216063160641606516066160671606816069160701607116072160731607416075160761607716078160791608016081160821608316084160851608616087160881608916090160911609216093160941609516096160971609816099161001610116102161031610416105161061610716108161091611016111161121611316114161151611616117161181611916120161211612216123161241612516126161271612816129161301613116132161331613416135161361613716138161391614016141161421614316144161451614616147161481614916150161511615216153161541615516156161571615816159161601616116162161631616416165161661616716168161691617016171161721617316174161751617616177161781617916180161811618216183161841618516186161871618816189161901619116192161931619416195161961619716198161991620016201162021620316204162051620616207162081620916210162111621216213162141621516216162171621816219162201622116222162231622416225162261622716228162291623016231162321623316234162351623616237162381623916240162411624216243162441624516246162471624816249162501625116252162531625416255162561625716258162591626016261162621626316264162651626616267162681626916270162711627216273162741627516276162771627816279162801628116282162831628416285162861628716288162891629016291162921629316294162951629616297162981629916300163011630216303163041630516306163071630816309163101631116312163131631416315163161631716318163191632016321163221632316324163251632616327163281632916330163311633216333163341633516336163371633816339163401634116342163431634416345163461634716348163491635016351163521635316354163551635616357163581635916360163611636216363163641636516366163671636816369163701637116372163731637416375163761637716378163791638016381163821638316384163851638616387163881638916390163911639216393163941639516396163971639816399164001640116402164031640416405164061640716408164091641016411164121641316414164151641616417164181641916420164211642216423164241642516426164271642816429164301643116432164331643416435164361643716438164391644016441164421644316444164451644616447164481644916450164511645216453164541645516456164571645816459164601646116462164631646416465164661646716468164691647016471164721647316474164751647616477164781647916480164811648216483164841648516486164871648816489164901649116492164931649416495164961649716498164991650016501165021650316504165051650616507165081650916510165111651216513165141651516516165171651816519165201652116522165231652416525165261652716528165291653016531165321653316534165351653616537165381653916540165411654216543165441654516546165471654816549165501655116552165531655416555165561655716558165591656016561165621656316564165651656616567165681656916570165711657216573165741657516576165771657816579165801658116582165831658416585165861658716588165891659016591165921659316594165951659616597165981659916600166011660216603166041660516606166071660816609166101661116612166131661416615166161661716618166191662016621166221662316624166251662616627166281662916630166311663216633166341663516636166371663816639166401664116642166431664416645166461664716648166491665016651166521665316654166551665616657166581665916660166611666216663166641666516666166671666816669166701667116672166731667416675166761667716678166791668016681166821668316684166851668616687166881668916690166911669216693166941669516696166971669816699167001670116702167031670416705167061670716708167091671016711167121671316714167151671616717167181671916720167211672216723167241672516726167271672816729167301673116732167331673416735167361673716738167391674016741167421674316744167451674616747167481674916750167511675216753167541675516756167571675816759167601676116762167631676416765167661676716768167691677016771167721677316774167751677616777167781677916780167811678216783167841678516786167871678816789167901679116792167931679416795167961679716798167991680016801168021680316804168051680616807168081680916810168111681216813168141681516816168171681816819168201682116822168231682416825168261682716828168291683016831168321683316834168351683616837168381683916840168411684216843168441684516846168471684816849168501685116852168531685416855168561685716858168591686016861168621686316864168651686616867168681686916870168711687216873168741687516876168771687816879168801688116882168831688416885168861688716888168891689016891168921689316894168951689616897168981689916900169011690216903169041690516906169071690816909169101691116912169131691416915169161691716918169191692016921169221692316924169251692616927169281692916930169311693216933169341693516936169371693816939169401694116942169431694416945169461694716948169491695016951169521695316954169551695616957169581695916960169611696216963169641696516966169671696816969169701697116972169731697416975169761697716978169791698016981169821698316984169851698616987169881698916990169911699216993169941699516996169971699816999170001700117002170031700417005170061700717008170091701017011170121701317014170151701617017170181701917020170211702217023170241702517026170271702817029170301703117032170331703417035170361703717038170391704017041170421704317044170451704617047170481704917050170511705217053170541705517056170571705817059170601706117062170631706417065170661706717068170691707017071170721707317074170751707617077170781707917080170811708217083170841708517086170871708817089170901709117092170931709417095170961709717098170991710017101171021710317104171051710617107171081710917110171111711217113171141711517116171171711817119171201712117122171231712417125171261712717128171291713017131171321713317134171351713617137171381713917140171411714217143171441714517146171471714817149171501715117152171531715417155171561715717158171591716017161171621716317164171651716617167171681716917170171711717217173171741717517176171771717817179171801718117182171831718417185171861718717188171891719017191171921719317194171951719617197171981719917200172011720217203172041720517206172071720817209172101721117212172131721417215172161721717218172191722017221172221722317224172251722617227172281722917230172311723217233172341723517236172371723817239172401724117242172431724417245172461724717248172491725017251172521725317254172551725617257172581725917260172611726217263172641726517266172671726817269172701727117272172731727417275172761727717278172791728017281172821728317284172851728617287172881728917290172911729217293172941729517296172971729817299173001730117302173031730417305173061730717308173091731017311173121731317314173151731617317173181731917320173211732217323173241732517326173271732817329173301733117332173331733417335173361733717338173391734017341173421734317344173451734617347173481734917350173511735217353173541735517356173571735817359173601736117362173631736417365173661736717368173691737017371173721737317374173751737617377173781737917380173811738217383173841738517386173871738817389173901739117392173931739417395173961739717398173991740017401174021740317404174051740617407174081740917410174111741217413174141741517416174171741817419174201742117422174231742417425174261742717428174291743017431174321743317434174351743617437174381743917440174411744217443174441744517446174471744817449174501745117452174531745417455174561745717458174591746017461174621746317464174651746617467174681746917470174711747217473174741747517476174771747817479174801748117482174831748417485174861748717488174891749017491174921749317494174951749617497174981749917500175011750217503175041750517506175071750817509175101751117512175131751417515175161751717518175191752017521175221752317524175251752617527175281752917530175311753217533175341753517536175371753817539175401754117542175431754417545175461754717548175491755017551175521755317554175551755617557175581755917560175611756217563175641756517566175671756817569175701757117572175731757417575175761757717578175791758017581175821758317584175851758617587175881758917590175911759217593175941759517596175971759817599176001760117602176031760417605176061760717608176091761017611176121761317614176151761617617176181761917620176211762217623176241762517626176271762817629176301763117632176331763417635176361763717638176391764017641176421764317644176451764617647176481764917650176511765217653176541765517656176571765817659176601766117662176631766417665176661766717668176691767017671176721767317674176751767617677176781767917680176811768217683176841768517686176871768817689176901769117692176931769417695176961769717698176991770017701177021770317704177051770617707177081770917710177111771217713177141771517716177171771817719177201772117722177231772417725177261772717728177291773017731177321773317734177351773617737177381773917740177411774217743177441774517746177471774817749177501775117752177531775417755177561775717758177591776017761177621776317764177651776617767177681776917770177711777217773177741777517776177771777817779177801778117782177831778417785177861778717788177891779017791177921779317794177951779617797177981779917800178011780217803178041780517806178071780817809178101781117812178131781417815178161781717818178191782017821178221782317824178251782617827178281782917830178311783217833178341783517836178371783817839178401784117842178431784417845178461784717848178491785017851178521785317854178551785617857178581785917860178611786217863178641786517866178671786817869178701787117872178731787417875178761787717878178791788017881178821788317884178851788617887178881788917890178911789217893178941789517896178971789817899179001790117902179031790417905179061790717908179091791017911179121791317914179151791617917179181791917920179211792217923179241792517926179271792817929179301793117932179331793417935179361793717938179391794017941179421794317944179451794617947179481794917950179511795217953179541795517956179571795817959179601796117962179631796417965179661796717968179691797017971179721797317974179751797617977179781797917980179811798217983179841798517986179871798817989179901799117992179931799417995179961799717998179991800018001180021800318004180051800618007180081800918010180111801218013180141801518016180171801818019180201802118022180231802418025180261802718028180291803018031180321803318034180351803618037180381803918040180411804218043180441804518046180471804818049180501805118052180531805418055180561805718058180591806018061180621806318064180651806618067180681806918070180711807218073180741807518076180771807818079180801808118082180831808418085180861808718088180891809018091180921809318094180951809618097180981809918100181011810218103181041810518106181071810818109181101811118112181131811418115181161811718118181191812018121181221812318124181251812618127181281812918130181311813218133181341813518136181371813818139181401814118142181431814418145181461814718148181491815018151181521815318154181551815618157181581815918160181611816218163181641816518166181671816818169181701817118172181731817418175181761817718178181791818018181181821818318184181851818618187181881818918190181911819218193181941819518196181971819818199182001820118202182031820418205182061820718208182091821018211182121821318214182151821618217182181821918220182211822218223182241822518226182271822818229182301823118232182331823418235182361823718238182391824018241182421824318244182451824618247182481824918250182511825218253182541825518256182571825818259182601826118262182631826418265182661826718268182691827018271182721827318274182751827618277182781827918280182811828218283182841828518286182871828818289182901829118292182931829418295182961829718298182991830018301183021830318304183051830618307183081830918310183111831218313183141831518316183171831818319183201832118322183231832418325183261832718328183291833018331183321833318334183351833618337183381833918340183411834218343183441834518346183471834818349183501835118352183531835418355183561835718358183591836018361183621836318364183651836618367183681836918370183711837218373183741837518376183771837818379183801838118382183831838418385183861838718388183891839018391183921839318394183951839618397183981839918400184011840218403184041840518406184071840818409184101841118412184131841418415184161841718418184191842018421184221842318424184251842618427184281842918430184311843218433184341843518436184371843818439184401844118442184431844418445184461844718448184491845018451184521845318454184551845618457184581845918460184611846218463184641846518466184671846818469184701847118472184731847418475184761847718478184791848018481184821848318484184851848618487184881848918490184911849218493184941849518496184971849818499185001850118502185031850418505185061850718508185091851018511185121851318514185151851618517185181851918520185211852218523185241852518526185271852818529185301853118532185331853418535185361853718538185391854018541185421854318544185451854618547185481854918550185511855218553185541855518556185571855818559185601856118562185631856418565185661856718568185691857018571185721857318574185751857618577185781857918580185811858218583185841858518586185871858818589185901859118592185931859418595185961859718598185991860018601186021860318604186051860618607186081860918610186111861218613186141861518616186171861818619186201862118622186231862418625186261862718628186291863018631186321863318634186351863618637186381863918640186411864218643186441864518646186471864818649186501865118652186531865418655186561865718658186591866018661186621866318664186651866618667186681866918670186711867218673186741867518676186771867818679186801868118682186831868418685186861868718688186891869018691186921869318694186951869618697186981869918700187011870218703187041870518706187071870818709187101871118712187131871418715187161871718718187191872018721187221872318724187251872618727187281872918730187311873218733187341873518736187371873818739187401874118742187431874418745187461874718748187491875018751187521875318754187551875618757187581875918760187611876218763187641876518766187671876818769187701877118772187731877418775187761877718778187791878018781187821878318784187851878618787187881878918790187911879218793187941879518796187971879818799188001880118802188031880418805188061880718808188091881018811188121881318814188151881618817188181881918820188211882218823188241882518826188271882818829188301883118832188331883418835188361883718838188391884018841188421884318844188451884618847188481884918850188511885218853188541885518856188571885818859188601886118862188631886418865188661886718868188691887018871188721887318874188751887618877188781887918880188811888218883188841888518886188871888818889188901889118892188931889418895188961889718898188991890018901189021890318904189051890618907189081890918910189111891218913189141891518916189171891818919189201892118922189231892418925189261892718928189291893018931189321893318934189351893618937189381893918940189411894218943189441894518946189471894818949189501895118952189531895418955189561895718958189591896018961189621896318964189651896618967189681896918970189711897218973189741897518976189771897818979189801898118982189831898418985189861898718988189891899018991189921899318994189951899618997189981899919000190011900219003190041900519006190071900819009190101901119012190131901419015190161901719018190191902019021190221902319024190251902619027190281902919030190311903219033190341903519036190371903819039190401904119042190431904419045190461904719048190491905019051190521905319054190551905619057190581905919060190611906219063190641906519066190671906819069190701907119072190731907419075190761907719078190791908019081190821908319084190851908619087190881908919090190911909219093190941909519096190971909819099191001910119102191031910419105191061910719108191091911019111191121911319114191151911619117191181911919120191211912219123191241912519126191271912819129191301913119132191331913419135191361913719138191391914019141191421914319144191451914619147191481914919150191511915219153191541915519156191571915819159191601916119162191631916419165191661916719168191691917019171191721917319174191751917619177191781917919180191811918219183191841918519186191871918819189191901919119192191931919419195191961919719198191991920019201192021920319204192051920619207192081920919210192111921219213192141921519216192171921819219192201922119222192231922419225192261922719228192291923019231192321923319234192351923619237192381923919240192411924219243192441924519246192471924819249192501925119252192531925419255192561925719258192591926019261192621926319264192651926619267192681926919270192711927219273192741927519276192771927819279192801928119282192831928419285192861928719288192891929019291192921929319294192951929619297192981929919300193011930219303193041930519306193071930819309193101931119312193131931419315193161931719318193191932019321193221932319324193251932619327193281932919330193311933219333193341933519336193371933819339193401934119342193431934419345193461934719348193491935019351193521935319354193551935619357193581935919360193611936219363193641936519366193671936819369193701937119372193731937419375193761937719378193791938019381193821938319384193851938619387193881938919390193911939219393193941939519396193971939819399194001940119402194031940419405194061940719408194091941019411194121941319414194151941619417194181941919420194211942219423194241942519426194271942819429194301943119432194331943419435194361943719438194391944019441194421944319444194451944619447194481944919450194511945219453194541945519456194571945819459194601946119462194631946419465194661946719468194691947019471194721947319474194751947619477194781947919480194811948219483194841948519486194871948819489194901949119492194931949419495194961949719498194991950019501195021950319504195051950619507195081950919510195111951219513195141951519516195171951819519195201952119522195231952419525195261952719528195291953019531195321953319534195351953619537195381953919540195411954219543195441954519546195471954819549195501955119552195531955419555195561955719558195591956019561195621956319564195651956619567195681956919570195711957219573195741957519576195771957819579195801958119582195831958419585195861958719588195891959019591195921959319594195951959619597195981959919600196011960219603196041960519606196071960819609196101961119612196131961419615196161961719618196191962019621196221962319624196251962619627196281962919630196311963219633196341963519636196371963819639196401964119642196431964419645196461964719648196491965019651196521965319654196551965619657196581965919660196611966219663196641966519666196671966819669196701967119672196731967419675196761967719678196791968019681196821968319684196851968619687196881968919690196911969219693196941969519696196971969819699197001970119702197031970419705197061970719708197091971019711197121971319714197151971619717197181971919720197211972219723197241972519726197271972819729197301973119732197331973419735197361973719738197391974019741197421974319744197451974619747197481974919750197511975219753197541975519756197571975819759197601976119762197631976419765197661976719768197691977019771197721977319774197751977619777197781977919780197811978219783197841978519786197871978819789197901979119792197931979419795197961979719798197991980019801198021980319804198051980619807198081980919810198111981219813198141981519816198171981819819198201982119822198231982419825198261982719828198291983019831198321983319834198351983619837198381983919840198411984219843198441984519846198471984819849198501985119852198531985419855198561985719858198591986019861198621986319864198651986619867198681986919870198711987219873198741987519876198771987819879198801988119882198831988419885198861988719888198891989019891198921989319894198951989619897198981989919900199011990219903199041990519906199071990819909199101991119912199131991419915199161991719918199191992019921199221992319924199251992619927199281992919930199311993219933199341993519936199371993819939199401994119942199431994419945199461994719948199491995019951199521995319954199551995619957199581995919960199611996219963199641996519966199671996819969199701997119972199731997419975199761997719978199791998019981199821998319984199851998619987199881998919990199911999219993199941999519996199971999819999200002000120002200032000420005200062000720008200092001020011200122001320014200152001620017200182001920020200212002220023200242002520026200272002820029200302003120032200332003420035200362003720038200392004020041200422004320044200452004620047200482004920050200512005220053200542005520056200572005820059200602006120062200632006420065200662006720068200692007020071200722007320074200752007620077200782007920080200812008220083200842008520086200872008820089200902009120092200932009420095200962009720098200992010020101201022010320104201052010620107201082010920110201112011220113201142011520116201172011820119201202012120122201232012420125201262012720128201292013020131201322013320134201352013620137201382013920140201412014220143201442014520146201472014820149201502015120152201532015420155201562015720158201592016020161201622016320164201652016620167201682016920170201712017220173201742017520176201772017820179201802018120182201832018420185201862018720188201892019020191201922019320194201952019620197201982019920200202012020220203202042020520206202072020820209202102021120212202132021420215202162021720218202192022020221202222022320224202252022620227202282022920230202312023220233202342023520236202372023820239202402024120242202432024420245202462024720248202492025020251202522025320254202552025620257202582025920260202612026220263202642026520266202672026820269202702027120272202732027420275202762027720278202792028020281202822028320284202852028620287202882028920290202912029220293202942029520296202972029820299203002030120302203032030420305203062030720308203092031020311203122031320314203152031620317203182031920320203212032220323203242032520326203272032820329203302033120332203332033420335203362033720338203392034020341203422034320344203452034620347203482034920350203512035220353203542035520356203572035820359203602036120362203632036420365203662036720368203692037020371203722037320374203752037620377203782037920380203812038220383203842038520386203872038820389203902039120392203932039420395203962039720398203992040020401204022040320404204052040620407204082040920410204112041220413204142041520416204172041820419204202042120422204232042420425204262042720428204292043020431204322043320434204352043620437204382043920440204412044220443204442044520446204472044820449204502045120452204532045420455204562045720458204592046020461204622046320464204652046620467204682046920470204712047220473204742047520476204772047820479204802048120482204832048420485204862048720488204892049020491204922049320494204952049620497204982049920500205012050220503205042050520506205072050820509205102051120512205132051420515205162051720518205192052020521205222052320524205252052620527205282052920530205312053220533205342053520536205372053820539205402054120542205432054420545205462054720548205492055020551205522055320554205552055620557205582055920560205612056220563205642056520566205672056820569205702057120572205732057420575205762057720578205792058020581205822058320584205852058620587205882058920590205912059220593205942059520596205972059820599206002060120602206032060420605206062060720608206092061020611206122061320614206152061620617206182061920620206212062220623206242062520626206272062820629206302063120632206332063420635206362063720638206392064020641206422064320644206452064620647206482064920650206512065220653206542065520656206572065820659206602066120662206632066420665206662066720668206692067020671206722067320674206752067620677206782067920680206812068220683206842068520686206872068820689206902069120692206932069420695206962069720698206992070020701207022070320704207052070620707207082070920710207112071220713207142071520716207172071820719207202072120722207232072420725207262072720728207292073020731207322073320734207352073620737207382073920740207412074220743207442074520746207472074820749207502075120752207532075420755207562075720758207592076020761207622076320764207652076620767207682076920770207712077220773207742077520776207772077820779207802078120782207832078420785207862078720788207892079020791207922079320794207952079620797207982079920800208012080220803208042080520806208072080820809208102081120812208132081420815208162081720818208192082020821208222082320824208252082620827208282082920830208312083220833208342083520836208372083820839208402084120842208432084420845208462084720848208492085020851208522085320854208552085620857208582085920860208612086220863208642086520866208672086820869208702087120872208732087420875208762087720878208792088020881208822088320884208852088620887208882088920890208912089220893208942089520896208972089820899209002090120902209032090420905209062090720908209092091020911209122091320914209152091620917209182091920920209212092220923209242092520926209272092820929209302093120932209332093420935209362093720938209392094020941209422094320944209452094620947209482094920950209512095220953209542095520956209572095820959209602096120962209632096420965209662096720968209692097020971209722097320974209752097620977209782097920980209812098220983209842098520986209872098820989209902099120992209932099420995209962099720998209992100021001210022100321004210052100621007210082100921010210112101221013210142101521016210172101821019210202102121022210232102421025210262102721028210292103021031210322103321034210352103621037210382103921040210412104221043210442104521046210472104821049210502105121052210532105421055210562105721058210592106021061210622106321064210652106621067210682106921070210712107221073210742107521076210772107821079210802108121082210832108421085210862108721088210892109021091210922109321094210952109621097210982109921100211012110221103211042110521106211072110821109211102111121112211132111421115211162111721118211192112021121211222112321124211252112621127211282112921130211312113221133211342113521136211372113821139211402114121142211432114421145211462114721148211492115021151211522115321154211552115621157211582115921160211612116221163211642116521166211672116821169211702117121172211732117421175211762117721178211792118021181211822118321184211852118621187211882118921190211912119221193211942119521196211972119821199212002120121202212032120421205212062120721208212092121021211212122121321214212152121621217212182121921220212212122221223212242122521226212272122821229212302123121232212332123421235212362123721238212392124021241212422124321244212452124621247212482124921250212512125221253212542125521256212572125821259212602126121262212632126421265212662126721268212692127021271212722127321274212752127621277212782127921280212812128221283212842128521286212872128821289212902129121292212932129421295212962129721298212992130021301213022130321304213052130621307213082130921310213112131221313213142131521316213172131821319213202132121322213232132421325213262132721328213292133021331213322133321334213352133621337213382133921340213412134221343213442134521346213472134821349213502135121352213532135421355213562135721358213592136021361213622136321364213652136621367213682136921370213712137221373213742137521376213772137821379213802138121382213832138421385213862138721388213892139021391213922139321394213952139621397213982139921400214012140221403214042140521406214072140821409214102141121412214132141421415214162141721418214192142021421214222142321424214252142621427214282142921430214312143221433214342143521436214372143821439214402144121442214432144421445214462144721448214492145021451214522145321454214552145621457214582145921460214612146221463214642146521466214672146821469214702147121472214732147421475214762147721478214792148021481214822148321484214852148621487214882148921490214912149221493214942149521496214972149821499215002150121502215032150421505215062150721508215092151021511215122151321514215152151621517215182151921520215212152221523215242152521526215272152821529215302153121532215332153421535215362153721538215392154021541215422154321544215452154621547215482154921550215512155221553215542155521556215572155821559215602156121562215632156421565215662156721568215692157021571215722157321574215752157621577215782157921580215812158221583215842158521586215872158821589215902159121592215932159421595215962159721598215992160021601216022160321604216052160621607216082160921610216112161221613216142161521616216172161821619216202162121622216232162421625216262162721628216292163021631216322163321634216352163621637216382163921640216412164221643216442164521646216472164821649216502165121652216532165421655216562165721658216592166021661216622166321664216652166621667216682166921670216712167221673216742167521676216772167821679216802168121682216832168421685216862168721688216892169021691216922169321694216952169621697216982169921700217012170221703217042170521706217072170821709217102171121712217132171421715217162171721718217192172021721217222172321724217252172621727217282172921730217312173221733217342173521736217372173821739217402174121742217432174421745217462174721748217492175021751217522175321754217552175621757217582175921760217612176221763217642176521766217672176821769217702177121772217732177421775217762177721778217792178021781217822178321784217852178621787217882178921790217912179221793217942179521796217972179821799218002180121802218032180421805218062180721808218092181021811218122181321814218152181621817218182181921820218212182221823218242182521826218272182821829218302183121832218332183421835218362183721838218392184021841218422184321844218452184621847218482184921850218512185221853218542185521856218572185821859218602186121862218632186421865218662186721868218692187021871218722187321874218752187621877218782187921880218812188221883218842188521886218872188821889218902189121892218932189421895218962189721898218992190021901219022190321904219052190621907219082190921910219112191221913219142191521916219172191821919219202192121922219232192421925219262192721928219292193021931219322193321934219352193621937219382193921940219412194221943219442194521946219472194821949219502195121952219532195421955219562195721958219592196021961219622196321964219652196621967219682196921970219712197221973219742197521976219772197821979219802198121982219832198421985219862198721988219892199021991219922199321994219952199621997219982199922000220012200222003220042200522006220072200822009220102201122012220132201422015220162201722018220192202022021220222202322024220252202622027220282202922030220312203222033220342203522036220372203822039220402204122042220432204422045220462204722048220492205022051220522205322054220552205622057220582205922060220612206222063220642206522066220672206822069220702207122072220732207422075220762207722078220792208022081220822208322084220852208622087220882208922090220912209222093220942209522096220972209822099221002210122102221032210422105221062210722108221092211022111221122211322114221152211622117221182211922120221212212222123221242212522126221272212822129221302213122132221332213422135221362213722138221392214022141221422214322144221452214622147221482214922150221512215222153221542215522156221572215822159221602216122162221632216422165221662216722168221692217022171221722217322174221752217622177221782217922180221812218222183221842218522186221872218822189221902219122192221932219422195221962219722198221992220022201222022220322204222052220622207222082220922210222112221222213222142221522216222172221822219222202222122222222232222422225222262222722228222292223022231222322223322234222352223622237222382223922240222412224222243222442224522246222472224822249222502225122252222532225422255222562225722258222592226022261222622226322264222652226622267222682226922270222712227222273222742227522276222772227822279222802228122282222832228422285222862228722288222892229022291222922229322294222952229622297222982229922300223012230222303223042230522306223072230822309223102231122312223132231422315223162231722318223192232022321223222232322324223252232622327223282232922330223312233222333223342233522336223372233822339223402234122342223432234422345223462234722348223492235022351223522235322354223552235622357223582235922360223612236222363223642236522366223672236822369223702237122372223732237422375223762237722378223792238022381223822238322384223852238622387223882238922390223912239222393223942239522396223972239822399224002240122402224032240422405224062240722408224092241022411224122241322414224152241622417224182241922420224212242222423224242242522426224272242822429224302243122432224332243422435224362243722438224392244022441224422244322444224452244622447224482244922450224512245222453224542245522456224572245822459224602246122462224632246422465224662246722468224692247022471224722247322474224752247622477224782247922480224812248222483224842248522486224872248822489224902249122492224932249422495224962249722498224992250022501225022250322504225052250622507225082250922510225112251222513225142251522516225172251822519225202252122522225232252422525225262252722528225292253022531225322253322534225352253622537225382253922540225412254222543225442254522546225472254822549225502255122552225532255422555225562255722558225592256022561225622256322564225652256622567225682256922570225712257222573225742257522576225772257822579225802258122582225832258422585225862258722588225892259022591225922259322594225952259622597225982259922600226012260222603226042260522606226072260822609226102261122612226132261422615226162261722618226192262022621226222262322624226252262622627226282262922630226312263222633226342263522636226372263822639226402264122642226432264422645226462264722648226492265022651226522265322654226552265622657226582265922660226612266222663226642266522666226672266822669226702267122672226732267422675226762267722678226792268022681226822268322684226852268622687226882268922690226912269222693226942269522696226972269822699227002270122702227032270422705227062270722708227092271022711227122271322714227152271622717227182271922720227212272222723227242272522726227272272822729227302273122732227332273422735227362273722738227392274022741227422274322744227452274622747227482274922750227512275222753227542275522756227572275822759227602276122762227632276422765227662276722768227692277022771227722277322774227752277622777227782277922780227812278222783227842278522786227872278822789227902279122792227932279422795227962279722798227992280022801228022280322804228052280622807228082280922810228112281222813228142281522816228172281822819228202282122822228232282422825228262282722828228292283022831228322283322834228352283622837228382283922840228412284222843228442284522846228472284822849228502285122852228532285422855228562285722858228592286022861228622286322864228652286622867228682286922870228712287222873228742287522876228772287822879228802288122882228832288422885228862288722888228892289022891228922289322894228952289622897228982289922900229012290222903229042290522906229072290822909229102291122912229132291422915229162291722918229192292022921229222292322924229252292622927229282292922930229312293222933229342293522936229372293822939229402294122942229432294422945229462294722948229492295022951229522295322954229552295622957229582295922960229612296222963229642296522966229672296822969229702297122972229732297422975229762297722978229792298022981229822298322984229852298622987229882298922990229912299222993229942299522996229972299822999230002300123002230032300423005230062300723008230092301023011230122301323014230152301623017230182301923020230212302223023230242302523026230272302823029230302303123032230332303423035230362303723038230392304023041230422304323044230452304623047230482304923050230512305223053230542305523056230572305823059230602306123062230632306423065230662306723068230692307023071230722307323074230752307623077230782307923080230812308223083230842308523086230872308823089230902309123092230932309423095230962309723098230992310023101231022310323104231052310623107231082310923110231112311223113231142311523116231172311823119231202312123122231232312423125231262312723128231292313023131231322313323134231352313623137231382313923140231412314223143231442314523146231472314823149231502315123152231532315423155231562315723158231592316023161231622316323164231652316623167231682316923170231712317223173231742317523176231772317823179231802318123182231832318423185231862318723188231892319023191231922319323194231952319623197231982319923200232012320223203232042320523206232072320823209232102321123212232132321423215232162321723218232192322023221232222322323224232252322623227232282322923230232312323223233232342323523236232372323823239232402324123242232432324423245232462324723248232492325023251232522325323254232552325623257232582325923260232612326223263232642326523266232672326823269232702327123272232732327423275232762327723278232792328023281232822328323284232852328623287232882328923290232912329223293232942329523296232972329823299233002330123302233032330423305233062330723308233092331023311233122331323314233152331623317233182331923320233212332223323233242332523326233272332823329233302333123332233332333423335233362333723338233392334023341233422334323344233452334623347233482334923350233512335223353233542335523356233572335823359233602336123362233632336423365233662336723368233692337023371233722337323374233752337623377233782337923380233812338223383233842338523386233872338823389233902339123392233932339423395233962339723398233992340023401234022340323404234052340623407234082340923410234112341223413234142341523416234172341823419234202342123422234232342423425234262342723428234292343023431234322343323434234352343623437234382343923440234412344223443234442344523446234472344823449234502345123452234532345423455234562345723458234592346023461234622346323464234652346623467234682346923470234712347223473234742347523476234772347823479234802348123482234832348423485234862348723488234892349023491234922349323494234952349623497234982349923500235012350223503235042350523506235072350823509235102351123512235132351423515235162351723518235192352023521235222352323524235252352623527235282352923530235312353223533235342353523536235372353823539235402354123542235432354423545235462354723548235492355023551235522355323554235552355623557235582355923560235612356223563235642356523566235672356823569235702357123572235732357423575235762357723578235792358023581235822358323584235852358623587235882358923590235912359223593235942359523596235972359823599236002360123602236032360423605236062360723608236092361023611236122361323614236152361623617236182361923620236212362223623236242362523626236272362823629236302363123632236332363423635236362363723638236392364023641236422364323644236452364623647236482364923650236512365223653236542365523656236572365823659236602366123662236632366423665236662366723668236692367023671236722367323674236752367623677236782367923680236812368223683236842368523686236872368823689236902369123692236932369423695236962369723698236992370023701237022370323704237052370623707237082370923710237112371223713237142371523716237172371823719237202372123722237232372423725237262372723728237292373023731237322373323734237352373623737237382373923740237412374223743237442374523746237472374823749237502375123752237532375423755237562375723758237592376023761237622376323764237652376623767237682376923770237712377223773237742377523776237772377823779237802378123782237832378423785237862378723788237892379023791237922379323794237952379623797237982379923800238012380223803238042380523806238072380823809238102381123812238132381423815238162381723818238192382023821238222382323824238252382623827238282382923830238312383223833238342383523836238372383823839238402384123842238432384423845238462384723848238492385023851238522385323854238552385623857238582385923860238612386223863238642386523866238672386823869238702387123872238732387423875238762387723878238792388023881238822388323884238852388623887238882388923890238912389223893238942389523896238972389823899239002390123902239032390423905239062390723908239092391023911239122391323914239152391623917239182391923920239212392223923239242392523926239272392823929239302393123932239332393423935239362393723938239392394023941239422394323944239452394623947239482394923950239512395223953239542395523956239572395823959239602396123962239632396423965239662396723968239692397023971239722397323974239752397623977239782397923980239812398223983239842398523986239872398823989239902399123992239932399423995239962399723998239992400024001240022400324004240052400624007240082400924010240112401224013240142401524016240172401824019240202402124022240232402424025240262402724028240292403024031240322403324034240352403624037240382403924040240412404224043240442404524046240472404824049240502405124052240532405424055240562405724058240592406024061240622406324064240652406624067240682406924070240712407224073240742407524076240772407824079240802408124082240832408424085240862408724088240892409024091240922409324094240952409624097240982409924100241012410224103241042410524106241072410824109241102411124112241132411424115241162411724118241192412024121241222412324124241252412624127241282412924130241312413224133241342413524136241372413824139241402414124142241432414424145241462414724148241492415024151241522415324154241552415624157241582415924160241612416224163241642416524166241672416824169241702417124172241732417424175241762417724178241792418024181241822418324184241852418624187241882418924190241912419224193241942419524196241972419824199242002420124202242032420424205242062420724208242092421024211242122421324214242152421624217242182421924220242212422224223242242422524226242272422824229242302423124232242332423424235242362423724238242392424024241242422424324244242452424624247242482424924250242512425224253242542425524256242572425824259242602426124262242632426424265242662426724268242692427024271242722427324274242752427624277242782427924280242812428224283242842428524286242872428824289242902429124292242932429424295242962429724298242992430024301243022430324304243052430624307243082430924310243112431224313243142431524316243172431824319243202432124322243232432424325243262432724328243292433024331243322433324334243352433624337243382433924340243412434224343243442434524346243472434824349243502435124352243532435424355243562435724358243592436024361243622436324364243652436624367243682436924370243712437224373243742437524376243772437824379243802438124382243832438424385243862438724388243892439024391243922439324394243952439624397243982439924400244012440224403244042440524406244072440824409244102441124412244132441424415244162441724418244192442024421244222442324424244252442624427244282442924430244312443224433244342443524436244372443824439244402444124442244432444424445244462444724448244492445024451244522445324454244552445624457244582445924460244612446224463244642446524466244672446824469244702447124472244732447424475244762447724478244792448024481244822448324484244852448624487244882448924490244912449224493244942449524496244972449824499245002450124502245032450424505245062450724508245092451024511245122451324514245152451624517245182451924520245212452224523245242452524526245272452824529245302453124532245332453424535245362453724538245392454024541245422454324544245452454624547245482454924550245512455224553245542455524556245572455824559245602456124562245632456424565245662456724568245692457024571245722457324574245752457624577245782457924580245812458224583245842458524586245872458824589245902459124592245932459424595245962459724598245992460024601246022460324604246052460624607246082460924610246112461224613246142461524616246172461824619246202462124622246232462424625246262462724628246292463024631246322463324634246352463624637246382463924640246412464224643246442464524646246472464824649246502465124652246532465424655246562465724658246592466024661246622466324664246652466624667246682466924670246712467224673246742467524676246772467824679246802468124682246832468424685246862468724688246892469024691246922469324694246952469624697246982469924700247012470224703247042470524706247072470824709247102471124712247132471424715247162471724718247192472024721247222472324724247252472624727247282472924730247312473224733247342473524736247372473824739247402474124742247432474424745247462474724748247492475024751247522475324754247552475624757247582475924760247612476224763247642476524766247672476824769247702477124772247732477424775247762477724778247792478024781247822478324784247852478624787247882478924790247912479224793247942479524796247972479824799248002480124802248032480424805248062480724808248092481024811248122481324814248152481624817248182481924820248212482224823248242482524826248272482824829248302483124832248332483424835248362483724838248392484024841248422484324844248452484624847248482484924850248512485224853248542485524856248572485824859248602486124862248632486424865248662486724868248692487024871248722487324874248752487624877248782487924880248812488224883248842488524886248872488824889248902489124892248932489424895248962489724898248992490024901249022490324904249052490624907249082490924910249112491224913249142491524916249172491824919249202492124922249232492424925249262492724928249292493024931249322493324934249352493624937249382493924940249412494224943249442494524946249472494824949249502495124952249532495424955249562495724958249592496024961249622496324964249652496624967249682496924970249712497224973249742497524976249772497824979249802498124982249832498424985249862498724988249892499024991249922499324994249952499624997249982499925000250012500225003250042500525006250072500825009250102501125012250132501425015250162501725018250192502025021250222502325024250252502625027250282502925030250312503225033250342503525036250372503825039250402504125042250432504425045250462504725048250492505025051250522505325054250552505625057250582505925060250612506225063250642506525066250672506825069250702507125072250732507425075250762507725078250792508025081250822508325084250852508625087250882508925090250912509225093250942509525096250972509825099251002510125102251032510425105251062510725108251092511025111251122511325114251152511625117251182511925120251212512225123251242512525126251272512825129251302513125132251332513425135251362513725138251392514025141251422514325144251452514625147251482514925150251512515225153251542515525156251572515825159251602516125162251632516425165251662516725168251692517025171251722517325174251752517625177251782517925180251812518225183251842518525186251872518825189251902519125192251932519425195251962519725198251992520025201252022520325204252052520625207252082520925210252112521225213252142521525216252172521825219252202522125222252232522425225252262522725228252292523025231252322523325234252352523625237252382523925240252412524225243252442524525246252472524825249252502525125252252532525425255252562525725258252592526025261252622526325264252652526625267252682526925270252712527225273252742527525276252772527825279252802528125282252832528425285252862528725288252892529025291252922529325294252952529625297252982529925300253012530225303253042530525306253072530825309253102531125312253132531425315253162531725318253192532025321253222532325324253252532625327253282532925330253312533225333253342533525336253372533825339253402534125342253432534425345253462534725348253492535025351253522535325354253552535625357253582535925360253612536225363253642536525366253672536825369253702537125372253732537425375253762537725378253792538025381253822538325384253852538625387253882538925390253912539225393253942539525396253972539825399254002540125402254032540425405254062540725408254092541025411254122541325414254152541625417254182541925420254212542225423254242542525426254272542825429254302543125432254332543425435254362543725438254392544025441254422544325444254452544625447254482544925450254512545225453254542545525456254572545825459254602546125462254632546425465254662546725468254692547025471254722547325474254752547625477254782547925480254812548225483254842548525486254872548825489254902549125492254932549425495254962549725498254992550025501255022550325504255052550625507255082550925510255112551225513255142551525516255172551825519255202552125522255232552425525255262552725528255292553025531255322553325534255352553625537255382553925540255412554225543255442554525546255472554825549255502555125552255532555425555255562555725558255592556025561255622556325564255652556625567255682556925570255712557225573255742557525576255772557825579255802558125582255832558425585255862558725588255892559025591255922559325594255952559625597255982559925600256012560225603256042560525606256072560825609256102561125612256132561425615256162561725618256192562025621256222562325624256252562625627256282562925630256312563225633256342563525636256372563825639256402564125642256432564425645256462564725648256492565025651256522565325654256552565625657256582565925660256612566225663256642566525666256672566825669256702567125672256732567425675256762567725678256792568025681256822568325684256852568625687256882568925690256912569225693256942569525696256972569825699257002570125702257032570425705257062570725708257092571025711257122571325714257152571625717257182571925720257212572225723257242572525726257272572825729257302573125732257332573425735257362573725738257392574025741257422574325744257452574625747257482574925750257512575225753257542575525756257572575825759257602576125762257632576425765257662576725768257692577025771257722577325774257752577625777257782577925780257812578225783257842578525786257872578825789257902579125792257932579425795257962579725798257992580025801258022580325804258052580625807258082580925810258112581225813258142581525816258172581825819258202582125822258232582425825258262582725828258292583025831258322583325834258352583625837258382583925840258412584225843258442584525846258472584825849258502585125852258532585425855258562585725858258592586025861258622586325864258652586625867258682586925870258712587225873258742587525876258772587825879258802588125882258832588425885258862588725888258892589025891258922589325894258952589625897258982589925900259012590225903259042590525906259072590825909259102591125912259132591425915259162591725918259192592025921259222592325924259252592625927259282592925930259312593225933259342593525936259372593825939259402594125942259432594425945259462594725948259492595025951259522595325954259552595625957259582595925960259612596225963259642596525966259672596825969259702597125972259732597425975259762597725978259792598025981259822598325984259852598625987259882598925990259912599225993259942599525996259972599825999260002600126002260032600426005260062600726008260092601026011260122601326014260152601626017260182601926020260212602226023260242602526026260272602826029260302603126032260332603426035260362603726038260392604026041260422604326044260452604626047260482604926050260512605226053260542605526056260572605826059260602606126062260632606426065260662606726068260692607026071260722607326074260752607626077260782607926080260812608226083260842608526086260872608826089260902609126092260932609426095260962609726098260992610026101261022610326104261052610626107261082610926110261112611226113261142611526116261172611826119261202612126122261232612426125261262612726128261292613026131261322613326134261352613626137261382613926140261412614226143261442614526146261472614826149261502615126152261532615426155261562615726158261592616026161261622616326164261652616626167261682616926170261712617226173261742617526176261772617826179261802618126182261832618426185261862618726188261892619026191261922619326194261952619626197261982619926200262012620226203262042620526206262072620826209262102621126212262132621426215262162621726218262192622026221262222622326224262252622626227262282622926230262312623226233262342623526236262372623826239262402624126242262432624426245262462624726248262492625026251262522625326254262552625626257262582625926260262612626226263262642626526266262672626826269262702627126272262732627426275262762627726278262792628026281262822628326284262852628626287262882628926290262912629226293262942629526296262972629826299263002630126302263032630426305263062630726308263092631026311263122631326314263152631626317263182631926320263212632226323263242632526326263272632826329263302633126332263332633426335263362633726338263392634026341263422634326344263452634626347263482634926350263512635226353263542635526356263572635826359263602636126362263632636426365263662636726368263692637026371263722637326374263752637626377263782637926380263812638226383263842638526386263872638826389263902639126392263932639426395263962639726398263992640026401264022640326404264052640626407264082640926410264112641226413264142641526416264172641826419264202642126422264232642426425264262642726428264292643026431264322643326434264352643626437264382643926440264412644226443264442644526446264472644826449264502645126452264532645426455264562645726458264592646026461264622646326464264652646626467264682646926470264712647226473264742647526476264772647826479264802648126482264832648426485264862648726488264892649026491264922649326494264952649626497264982649926500265012650226503265042650526506265072650826509265102651126512265132651426515265162651726518265192652026521265222652326524265252652626527265282652926530265312653226533265342653526536265372653826539265402654126542265432654426545265462654726548265492655026551265522655326554265552655626557265582655926560265612656226563265642656526566265672656826569265702657126572265732657426575265762657726578265792658026581265822658326584265852658626587265882658926590265912659226593265942659526596265972659826599266002660126602266032660426605266062660726608266092661026611266122661326614266152661626617266182661926620266212662226623266242662526626266272662826629266302663126632266332663426635266362663726638266392664026641266422664326644266452664626647266482664926650266512665226653266542665526656266572665826659266602666126662266632666426665266662666726668266692667026671266722667326674266752667626677266782667926680266812668226683266842668526686266872668826689266902669126692266932669426695266962669726698266992670026701267022670326704267052670626707267082670926710267112671226713267142671526716267172671826719267202672126722267232672426725267262672726728267292673026731267322673326734267352673626737267382673926740267412674226743267442674526746267472674826749267502675126752267532675426755267562675726758267592676026761267622676326764267652676626767267682676926770267712677226773267742677526776267772677826779267802678126782267832678426785267862678726788267892679026791267922679326794267952679626797267982679926800268012680226803268042680526806268072680826809268102681126812268132681426815268162681726818268192682026821268222682326824268252682626827268282682926830268312683226833268342683526836268372683826839268402684126842268432684426845268462684726848268492685026851268522685326854268552685626857268582685926860268612686226863268642686526866268672686826869268702687126872268732687426875268762687726878268792688026881268822688326884268852688626887268882688926890268912689226893268942689526896268972689826899269002690126902269032690426905269062690726908269092691026911269122691326914269152691626917269182691926920269212692226923269242692526926269272692826929269302693126932269332693426935269362693726938269392694026941269422694326944269452694626947269482694926950269512695226953269542695526956269572695826959269602696126962269632696426965269662696726968269692697026971269722697326974269752697626977269782697926980269812698226983269842698526986269872698826989269902699126992269932699426995269962699726998269992700027001270022700327004270052700627007270082700927010270112701227013270142701527016270172701827019270202702127022270232702427025270262702727028270292703027031270322703327034270352703627037270382703927040270412704227043270442704527046270472704827049270502705127052270532705427055270562705727058270592706027061270622706327064270652706627067270682706927070270712707227073270742707527076270772707827079270802708127082270832708427085270862708727088270892709027091270922709327094270952709627097270982709927100271012710227103271042710527106271072710827109271102711127112271132711427115271162711727118271192712027121271222712327124271252712627127271282712927130271312713227133271342713527136271372713827139271402714127142271432714427145271462714727148271492715027151271522715327154271552715627157271582715927160271612716227163271642716527166271672716827169271702717127172271732717427175271762717727178271792718027181271822718327184271852718627187271882718927190271912719227193271942719527196271972719827199272002720127202272032720427205272062720727208272092721027211272122721327214272152721627217272182721927220272212722227223272242722527226272272722827229272302723127232272332723427235272362723727238272392724027241272422724327244272452724627247272482724927250272512725227253272542725527256272572725827259272602726127262272632726427265272662726727268272692727027271272722727327274272752727627277272782727927280272812728227283272842728527286272872728827289272902729127292272932729427295272962729727298272992730027301273022730327304273052730627307273082730927310273112731227313273142731527316273172731827319273202732127322273232732427325273262732727328273292733027331273322733327334273352733627337273382733927340273412734227343273442734527346273472734827349273502735127352273532735427355273562735727358273592736027361273622736327364273652736627367273682736927370273712737227373273742737527376273772737827379273802738127382273832738427385273862738727388273892739027391273922739327394273952739627397273982739927400274012740227403274042740527406274072740827409274102741127412274132741427415274162741727418274192742027421274222742327424274252742627427274282742927430274312743227433274342743527436274372743827439274402744127442274432744427445274462744727448274492745027451274522745327454274552745627457274582745927460274612746227463274642746527466274672746827469274702747127472274732747427475274762747727478274792748027481274822748327484274852748627487274882748927490274912749227493274942749527496274972749827499275002750127502275032750427505275062750727508275092751027511275122751327514275152751627517275182751927520275212752227523275242752527526275272752827529275302753127532275332753427535275362753727538275392754027541275422754327544275452754627547275482754927550275512755227553275542755527556275572755827559275602756127562275632756427565275662756727568275692757027571275722757327574275752757627577275782757927580275812758227583275842758527586275872758827589275902759127592275932759427595275962759727598275992760027601276022760327604276052760627607276082760927610276112761227613276142761527616276172761827619276202762127622276232762427625276262762727628276292763027631276322763327634276352763627637276382763927640276412764227643276442764527646276472764827649276502765127652276532765427655276562765727658276592766027661276622766327664276652766627667276682766927670276712767227673276742767527676276772767827679276802768127682276832768427685276862768727688276892769027691276922769327694276952769627697276982769927700277012770227703277042770527706277072770827709277102771127712277132771427715277162771727718277192772027721277222772327724277252772627727277282772927730277312773227733277342773527736277372773827739277402774127742277432774427745277462774727748277492775027751277522775327754277552775627757277582775927760277612776227763277642776527766277672776827769277702777127772277732777427775277762777727778277792778027781277822778327784277852778627787277882778927790277912779227793277942779527796277972779827799278002780127802278032780427805278062780727808278092781027811278122781327814278152781627817278182781927820278212782227823278242782527826278272782827829278302783127832278332783427835278362783727838278392784027841278422784327844278452784627847278482784927850278512785227853278542785527856278572785827859278602786127862278632786427865278662786727868278692787027871278722787327874278752787627877278782787927880278812788227883278842788527886278872788827889278902789127892278932789427895278962789727898278992790027901279022790327904279052790627907279082790927910279112791227913279142791527916279172791827919279202792127922279232792427925279262792727928279292793027931279322793327934279352793627937279382793927940279412794227943279442794527946279472794827949279502795127952279532795427955279562795727958279592796027961279622796327964279652796627967279682796927970279712797227973279742797527976279772797827979279802798127982279832798427985279862798727988279892799027991279922799327994279952799627997279982799928000280012800228003280042800528006280072800828009280102801128012280132801428015280162801728018280192802028021280222802328024280252802628027280282802928030280312803228033280342803528036280372803828039280402804128042280432804428045280462804728048280492805028051280522805328054280552805628057280582805928060280612806228063280642806528066280672806828069280702807128072280732807428075280762807728078280792808028081280822808328084280852808628087280882808928090280912809228093280942809528096280972809828099281002810128102281032810428105281062810728108281092811028111281122811328114281152811628117281182811928120281212812228123281242812528126281272812828129281302813128132281332813428135281362813728138281392814028141281422814328144281452814628147281482814928150281512815228153281542815528156281572815828159281602816128162281632816428165281662816728168281692817028171281722817328174281752817628177281782817928180281812818228183281842818528186281872818828189281902819128192281932819428195281962819728198281992820028201282022820328204282052820628207282082820928210282112821228213282142821528216282172821828219282202822128222282232822428225282262822728228282292823028231282322823328234282352823628237282382823928240282412824228243282442824528246282472824828249282502825128252282532825428255282562825728258282592826028261282622826328264282652826628267282682826928270282712827228273282742827528276282772827828279282802828128282282832828428285282862828728288282892829028291282922829328294282952829628297282982829928300283012830228303283042830528306283072830828309283102831128312283132831428315283162831728318283192832028321283222832328324283252832628327283282832928330283312833228333283342833528336283372833828339283402834128342283432834428345283462834728348283492835028351283522835328354283552835628357283582835928360283612836228363283642836528366283672836828369283702837128372283732837428375283762837728378283792838028381283822838328384283852838628387283882838928390283912839228393283942839528396283972839828399284002840128402284032840428405284062840728408284092841028411284122841328414284152841628417284182841928420284212842228423284242842528426284272842828429284302843128432284332843428435284362843728438284392844028441284422844328444284452844628447284482844928450284512845228453284542845528456284572845828459284602846128462284632846428465284662846728468284692847028471284722847328474284752847628477284782847928480284812848228483284842848528486284872848828489284902849128492284932849428495284962849728498284992850028501285022850328504285052850628507285082850928510285112851228513285142851528516285172851828519285202852128522285232852428525285262852728528285292853028531285322853328534285352853628537285382853928540285412854228543285442854528546285472854828549285502855128552285532855428555285562855728558285592856028561285622856328564285652856628567285682856928570285712857228573285742857528576285772857828579285802858128582285832858428585285862858728588285892859028591285922859328594285952859628597285982859928600286012860228603286042860528606286072860828609286102861128612286132861428615286162861728618286192862028621286222862328624286252862628627286282862928630286312863228633286342863528636286372863828639286402864128642286432864428645286462864728648286492865028651286522865328654286552865628657286582865928660286612866228663286642866528666286672866828669286702867128672286732867428675286762867728678286792868028681286822868328684286852868628687286882868928690286912869228693286942869528696286972869828699287002870128702287032870428705287062870728708287092871028711287122871328714287152871628717287182871928720287212872228723287242872528726287272872828729287302873128732287332873428735287362873728738287392874028741287422874328744287452874628747287482874928750287512875228753287542875528756287572875828759287602876128762287632876428765287662876728768287692877028771287722877328774287752877628777287782877928780287812878228783287842878528786287872878828789287902879128792287932879428795287962879728798287992880028801288022880328804288052880628807288082880928810288112881228813288142881528816288172881828819288202882128822288232882428825288262882728828288292883028831288322883328834288352883628837288382883928840288412884228843288442884528846288472884828849288502885128852288532885428855288562885728858288592886028861288622886328864288652886628867288682886928870288712887228873288742887528876288772887828879288802888128882288832888428885288862888728888288892889028891288922889328894288952889628897288982889928900289012890228903289042890528906289072890828909289102891128912289132891428915289162891728918289192892028921289222892328924289252892628927289282892928930289312893228933289342893528936289372893828939289402894128942289432894428945289462894728948289492895028951289522895328954289552895628957289582895928960289612896228963289642896528966289672896828969289702897128972289732897428975289762897728978289792898028981289822898328984289852898628987289882898928990289912899228993289942899528996289972899828999290002900129002290032900429005290062900729008290092901029011290122901329014290152901629017290182901929020290212902229023290242902529026290272902829029290302903129032290332903429035290362903729038290392904029041290422904329044290452904629047290482904929050290512905229053290542905529056290572905829059290602906129062290632906429065290662906729068290692907029071290722907329074290752907629077290782907929080290812908229083290842908529086290872908829089290902909129092290932909429095290962909729098290992910029101291022910329104291052910629107291082910929110291112911229113291142911529116291172911829119291202912129122291232912429125291262912729128291292913029131291322913329134291352913629137291382913929140291412914229143291442914529146291472914829149291502915129152291532915429155291562915729158291592916029161291622916329164291652916629167291682916929170291712917229173291742917529176291772917829179291802918129182291832918429185291862918729188291892919029191291922919329194291952919629197291982919929200292012920229203292042920529206292072920829209292102921129212292132921429215292162921729218292192922029221292222922329224292252922629227292282922929230292312923229233292342923529236292372923829239292402924129242292432924429245292462924729248292492925029251292522925329254292552925629257292582925929260292612926229263292642926529266292672926829269292702927129272292732927429275292762927729278292792928029281292822928329284292852928629287292882928929290292912929229293292942929529296292972929829299293002930129302293032930429305293062930729308293092931029311293122931329314293152931629317293182931929320293212932229323293242932529326293272932829329293302933129332293332933429335293362933729338293392934029341293422934329344293452934629347293482934929350293512935229353293542935529356293572935829359293602936129362293632936429365293662936729368293692937029371293722937329374293752937629377293782937929380293812938229383293842938529386293872938829389293902939129392293932939429395293962939729398293992940029401294022940329404294052940629407294082940929410294112941229413294142941529416294172941829419294202942129422294232942429425294262942729428294292943029431294322943329434294352943629437294382943929440294412944229443294442944529446294472944829449294502945129452294532945429455294562945729458294592946029461294622946329464294652946629467294682946929470294712947229473294742947529476294772947829479294802948129482294832948429485294862948729488294892949029491294922949329494294952949629497294982949929500295012950229503295042950529506295072950829509295102951129512295132951429515295162951729518295192952029521295222952329524295252952629527295282952929530295312953229533295342953529536295372953829539295402954129542295432954429545295462954729548295492955029551295522955329554295552955629557295582955929560295612956229563295642956529566295672956829569295702957129572295732957429575295762957729578295792958029581295822958329584295852958629587295882958929590295912959229593295942959529596295972959829599296002960129602296032960429605296062960729608296092961029611296122961329614296152961629617296182961929620296212962229623296242962529626296272962829629296302963129632296332963429635296362963729638296392964029641296422964329644296452964629647296482964929650296512965229653296542965529656296572965829659296602966129662296632966429665296662966729668296692967029671296722967329674296752967629677296782967929680296812968229683296842968529686296872968829689296902969129692296932969429695296962969729698296992970029701297022970329704297052970629707297082970929710297112971229713297142971529716297172971829719297202972129722297232972429725297262972729728297292973029731297322973329734297352973629737297382973929740297412974229743297442974529746297472974829749297502975129752297532975429755297562975729758297592976029761297622976329764297652976629767297682976929770297712977229773297742977529776297772977829779297802978129782297832978429785297862978729788297892979029791297922979329794297952979629797297982979929800298012980229803298042980529806298072980829809298102981129812298132981429815298162981729818298192982029821298222982329824298252982629827298282982929830298312983229833298342983529836298372983829839298402984129842298432984429845298462984729848298492985029851298522985329854298552985629857298582985929860298612986229863298642986529866298672986829869298702987129872298732987429875298762987729878298792988029881298822988329884298852988629887298882988929890298912989229893298942989529896298972989829899299002990129902299032990429905299062990729908299092991029911299122991329914299152991629917299182991929920299212992229923299242992529926299272992829929299302993129932299332993429935299362993729938299392994029941299422994329944299452994629947299482994929950299512995229953299542995529956299572995829959299602996129962299632996429965299662996729968299692997029971299722997329974299752997629977299782997929980299812998229983299842998529986299872998829989299902999129992299932999429995299962999729998299993000030001300023000330004300053000630007300083000930010300113001230013300143001530016300173001830019300203002130022300233002430025300263002730028300293003030031300323003330034300353003630037300383003930040300413004230043300443004530046300473004830049300503005130052300533005430055300563005730058300593006030061300623006330064300653006630067300683006930070300713007230073300743007530076300773007830079300803008130082300833008430085300863008730088300893009030091300923009330094300953009630097300983009930100301013010230103301043010530106301073010830109301103011130112301133011430115301163011730118301193012030121301223012330124301253012630127301283012930130301313013230133301343013530136301373013830139301403014130142301433014430145301463014730148301493015030151301523015330154301553015630157301583015930160301613016230163301643016530166301673016830169301703017130172301733017430175301763017730178301793018030181301823018330184301853018630187301883018930190301913019230193301943019530196301973019830199302003020130202302033020430205302063020730208302093021030211302123021330214302153021630217302183021930220302213022230223302243022530226302273022830229302303023130232302333023430235302363023730238302393024030241302423024330244302453024630247302483024930250302513025230253302543025530256302573025830259302603026130262302633026430265302663026730268302693027030271302723027330274302753027630277302783027930280302813028230283302843028530286302873028830289302903029130292302933029430295302963029730298302993030030301303023030330304303053030630307303083030930310303113031230313303143031530316303173031830319303203032130322303233032430325303263032730328303293033030331303323033330334303353033630337303383033930340303413034230343303443034530346303473034830349303503035130352303533035430355303563035730358303593036030361303623036330364303653036630367303683036930370303713037230373303743037530376303773037830379303803038130382303833038430385303863038730388303893039030391303923039330394303953039630397303983039930400304013040230403304043040530406304073040830409304103041130412304133041430415304163041730418304193042030421304223042330424304253042630427304283042930430304313043230433304343043530436304373043830439304403044130442304433044430445304463044730448304493045030451304523045330454304553045630457304583045930460304613046230463304643046530466304673046830469304703047130472304733047430475304763047730478304793048030481304823048330484304853048630487304883048930490304913049230493304943049530496304973049830499305003050130502305033050430505305063050730508305093051030511305123051330514305153051630517305183051930520305213052230523305243052530526305273052830529305303053130532305333053430535305363053730538305393054030541305423054330544305453054630547305483054930550305513055230553305543055530556305573055830559305603056130562305633056430565305663056730568305693057030571305723057330574305753057630577305783057930580305813058230583305843058530586305873058830589305903059130592
  1. <?xml version="1.0"?>
  2. <doc>
  3. <assembly>
  4. <name>BouncyCastle.Crypto</name>
  5. </assembly>
  6. <members>
  7. <member name="M:Org.BouncyCastle.Asn1.Anssi.AnssiNamedCurves.GetByOid(Org.BouncyCastle.Asn1.DerObjectIdentifier)">
  8. return the X9ECParameters object for the named curve represented by
  9. the passed in object identifier. Null if the curve isn't present.
  10. @param oid an object identifier representing a named curve, if present.
  11. </member>
  12. <member name="M:Org.BouncyCastle.Asn1.Anssi.AnssiNamedCurves.GetOid(System.String)">
  13. return the object identifier signified by the passed in name. Null
  14. if there is no object identifier associated with name.
  15. @return the object identifier associated with name, if present.
  16. </member>
  17. <member name="M:Org.BouncyCastle.Asn1.Anssi.AnssiNamedCurves.GetName(Org.BouncyCastle.Asn1.DerObjectIdentifier)">
  18. return the named curve name represented by the given object identifier.
  19. </member>
  20. <member name="P:Org.BouncyCastle.Asn1.Anssi.AnssiNamedCurves.Names">
  21. returns an enumeration containing the name strings for curves
  22. contained in this structure.
  23. </member>
  24. <member name="M:Org.BouncyCastle.Asn1.Asn1Encodable.GetDerEncoded">
  25. Return the DER encoding of the object, null if the DER encoding can not be made.
  26. @return a DER byte array, null otherwise.
  27. </member>
  28. <member name="T:Org.BouncyCastle.Asn1.Asn1EncodableVector">
  29. Mutable class for building ASN.1 constructed objects such as SETs or SEQUENCEs.
  30. </member>
  31. <member name="T:Org.BouncyCastle.Asn1.Asn1InputStream">
  32. a general purpose ASN.1 decoder - note: this class differs from the
  33. others in that it returns null after it has read the last object in
  34. the stream. If an ASN.1 Null is encountered a Der/BER Null object is
  35. returned.
  36. </member>
  37. <member name="M:Org.BouncyCastle.Asn1.Asn1InputStream.#ctor(System.Byte[])">
  38. Create an ASN1InputStream based on the input byte array. The length of DER objects in
  39. the stream is automatically limited to the length of the input array.
  40. @param input array containing ASN.1 encoded data.
  41. </member>
  42. <member name="M:Org.BouncyCastle.Asn1.Asn1InputStream.#ctor(System.IO.Stream,System.Int32)">
  43. Create an ASN1InputStream where no DER object will be longer than limit.
  44. @param input stream containing ASN.1 encoded data.
  45. @param limit maximum size of a DER encoded object.
  46. </member>
  47. <member name="M:Org.BouncyCastle.Asn1.Asn1InputStream.BuildObject(System.Int32,System.Int32,System.Int32)">
  48. build an object given its tag and the number of bytes to construct it from.
  49. </member>
  50. <member name="T:Org.BouncyCastle.Asn1.Asn1Null">
  51. A Null object.
  52. </member>
  53. <member name="M:Org.BouncyCastle.Asn1.Asn1Object.FromByteArray(System.Byte[])">
  54. <summary>Create a base ASN.1 object from a byte array.</summary>
  55. <param name="data">The byte array to parse.</param>
  56. <returns>The base ASN.1 object represented by the byte array.</returns>
  57. <exception cref="T:System.IO.IOException">
  58. If there is a problem parsing the data, or parsing an object did not exhaust the available data.
  59. </exception>
  60. </member>
  61. <member name="M:Org.BouncyCastle.Asn1.Asn1Object.FromStream(System.IO.Stream)">
  62. <summary>Read a base ASN.1 object from a stream.</summary>
  63. <param name="inStr">The stream to parse.</param>
  64. <returns>The base ASN.1 object represented by the byte array.</returns>
  65. <exception cref="T:System.IO.IOException">If there is a problem parsing the data.</exception>
  66. </member>
  67. <member name="M:Org.BouncyCastle.Asn1.Asn1OctetString.GetInstance(Org.BouncyCastle.Asn1.Asn1TaggedObject,System.Boolean)">
  68. return an Octet string from a tagged object.
  69. @param obj the tagged object holding the object we want.
  70. @param explicitly true if the object is meant to be explicitly
  71. tagged false otherwise.
  72. @exception ArgumentException if the tagged object cannot
  73. be converted.
  74. </member>
  75. <member name="M:Org.BouncyCastle.Asn1.Asn1OctetString.GetInstance(System.Object)">
  76. return an Octet string from the given object.
  77. @param obj the object we want converted.
  78. @exception ArgumentException if the object cannot be converted.
  79. </member>
  80. <member name="M:Org.BouncyCastle.Asn1.Asn1OctetString.#ctor(System.Byte[])">
  81. @param string the octets making up the octet string.
  82. </member>
  83. <member name="M:Org.BouncyCastle.Asn1.Asn1Sequence.GetInstance(System.Object)">
  84. return an Asn1Sequence from the given object.
  85. @param obj the object we want converted.
  86. @exception ArgumentException if the object cannot be converted.
  87. </member>
  88. <member name="M:Org.BouncyCastle.Asn1.Asn1Sequence.GetInstance(Org.BouncyCastle.Asn1.Asn1TaggedObject,System.Boolean)">
  89. Return an ASN1 sequence from a tagged object. There is a special
  90. case here, if an object appears to have been explicitly tagged on
  91. reading but we were expecting it to be implicitly tagged in the
  92. normal course of events it indicates that we lost the surrounding
  93. sequence - so we need to add it back (this will happen if the tagged
  94. object is a sequence that contains other sequences). If you are
  95. dealing with implicitly tagged sequences you really <b>should</b>
  96. be using this method.
  97. @param obj the tagged object.
  98. @param explicitly true if the object is meant to be explicitly tagged,
  99. false otherwise.
  100. @exception ArgumentException if the tagged object cannot
  101. be converted.
  102. </member>
  103. <member name="P:Org.BouncyCastle.Asn1.Asn1Sequence.Item(System.Int32)">
  104. return the object at the sequence position indicated by index.
  105. @param index the sequence number (starting at zero) of the object
  106. @return the object at the sequence position indicated by index.
  107. </member>
  108. <member name="M:Org.BouncyCastle.Asn1.Asn1Set.GetInstance(System.Object)">
  109. return an ASN1Set from the given object.
  110. @param obj the object we want converted.
  111. @exception ArgumentException if the object cannot be converted.
  112. </member>
  113. <member name="M:Org.BouncyCastle.Asn1.Asn1Set.GetInstance(Org.BouncyCastle.Asn1.Asn1TaggedObject,System.Boolean)">
  114. Return an ASN1 set from a tagged object. There is a special
  115. case here, if an object appears to have been explicitly tagged on
  116. reading but we were expecting it to be implicitly tagged in the
  117. normal course of events it indicates that we lost the surrounding
  118. set - so we need to add it back (this will happen if the tagged
  119. object is a sequence that contains other sequences). If you are
  120. dealing with implicitly tagged sets you really <b>should</b>
  121. be using this method.
  122. @param obj the tagged object.
  123. @param explicitly true if the object is meant to be explicitly tagged
  124. false otherwise.
  125. @exception ArgumentException if the tagged object cannot
  126. be converted.
  127. </member>
  128. <member name="P:Org.BouncyCastle.Asn1.Asn1Set.Item(System.Int32)">
  129. return the object at the set position indicated by index.
  130. @param index the set number (starting at zero) of the object
  131. @return the object at the set position indicated by index.
  132. </member>
  133. <member name="T:Org.BouncyCastle.Asn1.Asn1TaggedObject">
  134. ASN.1 TaggedObject - in ASN.1 notation this is any object preceded by
  135. a [n] where n is some number - these are assumed to follow the construction
  136. rules (as with sequences).
  137. </member>
  138. <member name="M:Org.BouncyCastle.Asn1.Asn1TaggedObject.#ctor(System.Int32,Org.BouncyCastle.Asn1.Asn1Encodable)">
  139. @param tagNo the tag number for this object.
  140. @param obj the tagged object.
  141. </member>
  142. <member name="M:Org.BouncyCastle.Asn1.Asn1TaggedObject.#ctor(System.Boolean,System.Int32,Org.BouncyCastle.Asn1.Asn1Encodable)">
  143. @param explicitly true if the object is explicitly tagged.
  144. @param tagNo the tag number for this object.
  145. @param obj the tagged object.
  146. </member>
  147. <member name="M:Org.BouncyCastle.Asn1.Asn1TaggedObject.IsExplicit">
  148. return whether or not the object may be explicitly tagged.
  149. <p>
  150. Note: if the object has been read from an input stream, the only
  151. time you can be sure if isExplicit is returning the true state of
  152. affairs is if it returns false. An implicitly tagged object may appear
  153. to be explicitly tagged, so you need to understand the context under
  154. which the reading was done as well, see GetObject below.</p>
  155. </member>
  156. <member name="M:Org.BouncyCastle.Asn1.Asn1TaggedObject.GetObject">
  157. return whatever was following the tag.
  158. <p>
  159. Note: tagged objects are generally context dependent if you're
  160. trying to extract a tagged object you should be going via the
  161. appropriate GetInstance method.</p>
  162. </member>
  163. <member name="M:Org.BouncyCastle.Asn1.Asn1TaggedObject.GetObjectParser(System.Int32,System.Boolean)">
  164. Return the object held in this tagged object as a parser assuming it has
  165. the type of the passed in tag. If the object doesn't have a parser
  166. associated with it, the base object is returned.
  167. </member>
  168. <member name="F:Org.BouncyCastle.Asn1.BC.BCObjectIdentifiers.bc">
  169. iso.org.dod.internet.private.enterprise.legion-of-the-bouncy-castle
  170. <p>1.3.6.1.4.1.22554</p>
  171. </member>
  172. <member name="F:Org.BouncyCastle.Asn1.BC.BCObjectIdentifiers.bc_pbe">
  173. pbe(1) algorithms
  174. <p>1.3.6.1.4.1.22554.1</p>
  175. </member>
  176. <member name="F:Org.BouncyCastle.Asn1.BC.BCObjectIdentifiers.bc_pbe_sha1">
  177. SHA-1(1)
  178. <p>1.3.6.1.4.1.22554.1.1</p>
  179. </member>
  180. <member name="F:Org.BouncyCastle.Asn1.BC.BCObjectIdentifiers.bc_pbe_sha256">
  181. SHA-2.SHA-256; 1.3.6.1.4.1.22554.1.2.1
  182. </member>
  183. <member name="F:Org.BouncyCastle.Asn1.BC.BCObjectIdentifiers.bc_pbe_sha384">
  184. SHA-2.SHA-384; 1.3.6.1.4.1.22554.1.2.2
  185. </member>
  186. <member name="F:Org.BouncyCastle.Asn1.BC.BCObjectIdentifiers.bc_pbe_sha512">
  187. SHA-2.SHA-512; 1.3.6.1.4.1.22554.1.2.3
  188. </member>
  189. <member name="F:Org.BouncyCastle.Asn1.BC.BCObjectIdentifiers.bc_pbe_sha224">
  190. SHA-2.SHA-224; 1.3.6.1.4.1.22554.1.2.4
  191. </member>
  192. <member name="F:Org.BouncyCastle.Asn1.BC.BCObjectIdentifiers.bc_pbe_sha1_pkcs5">
  193. PKCS-5(1)|PKCS-12(2)
  194. SHA-1.PKCS5; 1.3.6.1.4.1.22554.1.1.1
  195. </member>
  196. <member name="F:Org.BouncyCastle.Asn1.BC.BCObjectIdentifiers.bc_pbe_sha1_pkcs12">
  197. SHA-1.PKCS12; 1.3.6.1.4.1.22554.1.1.2
  198. </member>
  199. <member name="F:Org.BouncyCastle.Asn1.BC.BCObjectIdentifiers.bc_pbe_sha256_pkcs5">
  200. SHA-256.PKCS12; 1.3.6.1.4.1.22554.1.2.1.1
  201. </member>
  202. <member name="F:Org.BouncyCastle.Asn1.BC.BCObjectIdentifiers.bc_pbe_sha256_pkcs12">
  203. SHA-256.PKCS12; 1.3.6.1.4.1.22554.1.2.1.2
  204. </member>
  205. <member name="F:Org.BouncyCastle.Asn1.BC.BCObjectIdentifiers.bc_pbe_sha1_pkcs12_aes128_cbc">
  206. AES(1) . (CBC-128(2)|CBC-192(22)|CBC-256(42))
  207. 1.3.6.1.4.1.22554.1.1.2.1.2
  208. </member>
  209. <member name="F:Org.BouncyCastle.Asn1.BC.BCObjectIdentifiers.bc_pbe_sha1_pkcs12_aes192_cbc">
  210. 1.3.6.1.4.1.22554.1.1.2.1.22
  211. </member>
  212. <member name="F:Org.BouncyCastle.Asn1.BC.BCObjectIdentifiers.bc_pbe_sha1_pkcs12_aes256_cbc">
  213. 1.3.6.1.4.1.22554.1.1.2.1.42
  214. </member>
  215. <member name="F:Org.BouncyCastle.Asn1.BC.BCObjectIdentifiers.bc_pbe_sha256_pkcs12_aes128_cbc">
  216. 1.3.6.1.4.1.22554.1.1.2.2.2
  217. </member>
  218. <member name="F:Org.BouncyCastle.Asn1.BC.BCObjectIdentifiers.bc_pbe_sha256_pkcs12_aes192_cbc">
  219. 1.3.6.1.4.1.22554.1.1.2.2.22
  220. </member>
  221. <member name="F:Org.BouncyCastle.Asn1.BC.BCObjectIdentifiers.bc_pbe_sha256_pkcs12_aes256_cbc">
  222. 1.3.6.1.4.1.22554.1.1.2.2.42
  223. </member>
  224. <member name="F:Org.BouncyCastle.Asn1.BC.BCObjectIdentifiers.bc_sig">
  225. signature(2) algorithms
  226. </member>
  227. <member name="F:Org.BouncyCastle.Asn1.BC.BCObjectIdentifiers.sphincs256">
  228. Sphincs-256
  229. </member>
  230. <member name="F:Org.BouncyCastle.Asn1.BC.BCObjectIdentifiers.xmss">
  231. XMSS
  232. </member>
  233. <member name="F:Org.BouncyCastle.Asn1.BC.BCObjectIdentifiers.xmss_mt">
  234. XMSS^MT
  235. </member>
  236. <member name="F:Org.BouncyCastle.Asn1.BC.BCObjectIdentifiers.bc_exch">
  237. key_exchange(3) algorithms
  238. </member>
  239. <member name="F:Org.BouncyCastle.Asn1.BC.BCObjectIdentifiers.newHope">
  240. NewHope
  241. </member>
  242. <!-- Badly formed XML comment ignored for member "F:Org.BouncyCastle.Asn1.BC.BCObjectIdentifiers.bc_ext" -->
  243. <member name="T:Org.BouncyCastle.Asn1.BC.LinkedCertificate">
  244. Extension to tie an alternate certificate to the containing certificate.
  245. <pre>
  246. LinkedCertificate := SEQUENCE {
  247. digest DigestInfo, -- digest of PQC certificate
  248. certLocation GeneralName, -- location of PQC certificate
  249. certIssuer [0] Name OPTIONAL, -- issuer of PQC cert (if different from current certificate)
  250. cACerts [1] GeneralNames OPTIONAL, -- CA certificates for PQC cert (one of more locations)
  251. }
  252. </pre>
  253. </member>
  254. <member name="T:Org.BouncyCastle.Asn1.BerNull">
  255. A BER Null object.
  256. </member>
  257. <member name="M:Org.BouncyCastle.Asn1.BerOctetString.GetEnumerator">
  258. return the DER octets that make up this string.
  259. </member>
  260. <member name="M:Org.BouncyCastle.Asn1.BerSequence.#ctor">
  261. create an empty sequence
  262. </member>
  263. <member name="M:Org.BouncyCastle.Asn1.BerSequence.#ctor(Org.BouncyCastle.Asn1.Asn1Encodable)">
  264. create a sequence containing one object
  265. </member>
  266. <member name="M:Org.BouncyCastle.Asn1.BerSequence.#ctor(Org.BouncyCastle.Asn1.Asn1EncodableVector)">
  267. create a sequence containing a vector of objects.
  268. </member>
  269. <member name="M:Org.BouncyCastle.Asn1.BerSet.#ctor">
  270. create an empty sequence
  271. </member>
  272. <member name="M:Org.BouncyCastle.Asn1.BerSet.#ctor(Org.BouncyCastle.Asn1.Asn1Encodable)">
  273. create a set containing one object
  274. </member>
  275. <member name="M:Org.BouncyCastle.Asn1.BerSet.#ctor(Org.BouncyCastle.Asn1.Asn1EncodableVector)">
  276. create a set containing a vector of objects.
  277. </member>
  278. <member name="T:Org.BouncyCastle.Asn1.BerTaggedObject">
  279. BER TaggedObject - in ASN.1 notation this is any object preceded by
  280. a [n] where n is some number - these are assumed to follow the construction
  281. rules (as with sequences).
  282. </member>
  283. <member name="M:Org.BouncyCastle.Asn1.BerTaggedObject.#ctor(System.Int32,Org.BouncyCastle.Asn1.Asn1Encodable)">
  284. @param tagNo the tag number for this object.
  285. @param obj the tagged object.
  286. </member>
  287. <member name="M:Org.BouncyCastle.Asn1.BerTaggedObject.#ctor(System.Boolean,System.Int32,Org.BouncyCastle.Asn1.Asn1Encodable)">
  288. @param explicitly true if an explicitly tagged object.
  289. @param tagNo the tag number for this object.
  290. @param obj the tagged object.
  291. </member>
  292. <member name="M:Org.BouncyCastle.Asn1.BerTaggedObject.#ctor(System.Int32)">
  293. create an implicitly tagged object that contains a zero
  294. length sequence.
  295. </member>
  296. <member name="T:Org.BouncyCastle.Asn1.Bsi.BsiObjectIdentifiers">
  297. <remarks>See https://www.bsi.bund.de/cae/servlet/contentblob/471398/publicationFile/30615/BSI-TR-03111_pdf.pdf</remarks>
  298. </member>
  299. <member name="F:Org.BouncyCastle.Asn1.Bsi.BsiObjectIdentifiers.algorithm">
  300. 0.4.0.127.0.7.1
  301. </member>
  302. <member name="F:Org.BouncyCastle.Asn1.Bsi.BsiObjectIdentifiers.ecka_eg_X963kdf">
  303. ElGamal Elliptic Curve Key Agreement and Key Derivation according to X963 OID: 0.4.0.127.0.7.1.1.5.1.1
  304. </member>
  305. <member name="F:Org.BouncyCastle.Asn1.Bsi.BsiObjectIdentifiers.ecka_eg_X963kdf_SHA1">
  306. ElGamal Elliptic Curve Key Agreement and Key Derivation according to X963
  307. with hash function SHA-1
  308. OID: 0.4.0.127.0.7.1.1.5.1.1.1
  309. </member>
  310. <member name="F:Org.BouncyCastle.Asn1.Bsi.BsiObjectIdentifiers.ecka_eg_X963kdf_SHA224">
  311. ElGamal Elliptic Curve Key Agreement and Key Derivation according to X963
  312. with hash function SHA224
  313. OID: 0.4.0.127.0.7.1.1.5.1.1.2
  314. </member>
  315. <member name="F:Org.BouncyCastle.Asn1.Bsi.BsiObjectIdentifiers.ecka_eg_X963kdf_SHA256">
  316. ElGamal Elliptic Curve Key Agreement and Key Derivation according to X963
  317. with hash function SHA256
  318. OID: 0.4.0.127.0.7.1.1.5.1.1.3
  319. </member>
  320. <member name="F:Org.BouncyCastle.Asn1.Bsi.BsiObjectIdentifiers.ecka_eg_X963kdf_SHA384">
  321. ElGamal Elliptic Curve Key Agreement and Key Derivation according to X963
  322. with hash function SHA384
  323. OID: 0.4.0.127.0.7.1.1.5.1.1.4
  324. </member>
  325. <member name="F:Org.BouncyCastle.Asn1.Bsi.BsiObjectIdentifiers.ecka_eg_X963kdf_SHA512">
  326. ElGamal Elliptic Curve Key Agreement and Key Derivation according to X963
  327. with hash function SHA512
  328. OID: 0.4.0.127.0.7.1.1.5.1.1.5
  329. </member>
  330. <member name="F:Org.BouncyCastle.Asn1.Bsi.BsiObjectIdentifiers.ecka_eg_X963kdf_RIPEMD160">
  331. ElGamal Elliptic Curve Key Agreement and Key Derivation according to X963
  332. with hash function RIPEMD160
  333. OID: 0.4.0.127.0.7.1.1.5.1.1.6
  334. </member>
  335. <member name="F:Org.BouncyCastle.Asn1.Bsi.BsiObjectIdentifiers.ecka_eg_SessionKDF">
  336. Key Derivation Function for Session Keys
  337. </member>
  338. <member name="M:Org.BouncyCastle.Asn1.Cmp.CAKeyUpdAnnContent.ToAsn1Object">
  339. <pre>
  340. CAKeyUpdAnnContent ::= SEQUENCE {
  341. oldWithNew CmpCertificate, -- old pub signed with new priv
  342. newWithOld CmpCertificate, -- new pub signed with old priv
  343. newWithNew CmpCertificate -- new pub signed with new priv
  344. }
  345. </pre>
  346. @return a basic ASN.1 object representation.
  347. </member>
  348. <member name="M:Org.BouncyCastle.Asn1.Cmp.CertConfirmContent.ToAsn1Object">
  349. <pre>
  350. CertConfirmContent ::= SEQUENCE OF CertStatus
  351. </pre>
  352. @return a basic ASN.1 object representation.
  353. </member>
  354. <member name="M:Org.BouncyCastle.Asn1.Cmp.CertifiedKeyPair.ToAsn1Object">
  355. <pre>
  356. CertifiedKeyPair ::= SEQUENCE {
  357. certOrEncCert CertOrEncCert,
  358. privateKey [0] EncryptedValue OPTIONAL,
  359. -- see [CRMF] for comment on encoding
  360. publicationInfo [1] PKIPublicationInfo OPTIONAL
  361. }
  362. </pre>
  363. @return a basic ASN.1 object representation.
  364. </member>
  365. <member name="M:Org.BouncyCastle.Asn1.Cmp.CertOrEncCert.ToAsn1Object">
  366. <pre>
  367. CertOrEncCert ::= CHOICE {
  368. certificate [0] CMPCertificate,
  369. encryptedCert [1] EncryptedValue
  370. }
  371. </pre>
  372. @return a basic ASN.1 object representation.
  373. </member>
  374. <member name="M:Org.BouncyCastle.Asn1.Cmp.CertRepMessage.ToAsn1Object">
  375. <pre>
  376. CertRepMessage ::= SEQUENCE {
  377. caPubs [1] SEQUENCE SIZE (1..MAX) OF CMPCertificate
  378. OPTIONAL,
  379. response SEQUENCE OF CertResponse
  380. }
  381. </pre>
  382. @return a basic ASN.1 object representation.
  383. </member>
  384. <member name="M:Org.BouncyCastle.Asn1.Cmp.CertResponse.ToAsn1Object">
  385. <pre>
  386. CertResponse ::= SEQUENCE {
  387. certReqId INTEGER,
  388. -- to match this response with corresponding request (a value
  389. -- of -1 is to be used if certReqId is not specified in the
  390. -- corresponding request)
  391. status PKIStatusInfo,
  392. certifiedKeyPair CertifiedKeyPair OPTIONAL,
  393. rspInfo OCTET STRING OPTIONAL
  394. -- analogous to the id-regInfo-utf8Pairs string defined
  395. -- for regInfo in CertReqMsg [CRMF]
  396. }
  397. </pre>
  398. @return a basic ASN.1 object representation.
  399. </member>
  400. <member name="M:Org.BouncyCastle.Asn1.Cmp.CertStatus.ToAsn1Object">
  401. <pre>
  402. CertStatus ::= SEQUENCE {
  403. certHash OCTET STRING,
  404. -- the hash of the certificate, using the same hash algorithm
  405. -- as is used to create and verify the certificate signature
  406. certReqId INTEGER,
  407. -- to match this confirmation with the corresponding req/rep
  408. statusInfo PKIStatusInfo OPTIONAL
  409. }
  410. </pre>
  411. @return a basic ASN.1 object representation.
  412. </member>
  413. <member name="M:Org.BouncyCastle.Asn1.Cmp.Challenge.ToAsn1Object">
  414. <pre>
  415. Challenge ::= SEQUENCE {
  416. owf AlgorithmIdentifier OPTIONAL,
  417. -- MUST be present in the first Challenge; MAY be omitted in
  418. -- any subsequent Challenge in POPODecKeyChallContent (if
  419. -- omitted, then the owf used in the immediately preceding
  420. -- Challenge is to be used).
  421. witness OCTET STRING,
  422. -- the result of applying the one-way function (owf) to a
  423. -- randomly-generated INTEGER, A. [Note that a different
  424. -- INTEGER MUST be used for each Challenge.]
  425. challenge OCTET STRING
  426. -- the encryption (under the public key for which the cert.
  427. -- request is being made) of Rand, where Rand is specified as
  428. -- Rand ::= SEQUENCE {
  429. -- int INTEGER,
  430. -- - the randomly-generated INTEGER A (above)
  431. -- sender GeneralName
  432. -- - the sender's name (as included in PKIHeader)
  433. -- }
  434. }
  435. </pre>
  436. @return a basic ASN.1 object representation.
  437. </member>
  438. <member name="M:Org.BouncyCastle.Asn1.Cmp.CmpCertificate.#ctor(Org.BouncyCastle.Asn1.X509.AttributeCertificate)">
  439. Note: the addition of attribute certificates is a BC extension.
  440. </member>
  441. <member name="M:Org.BouncyCastle.Asn1.Cmp.CmpCertificate.ToAsn1Object">
  442. <pre>
  443. CMPCertificate ::= CHOICE {
  444. x509v3PKCert Certificate
  445. x509v2AttrCert [1] AttributeCertificate
  446. }
  447. </pre>
  448. Note: the addition of attribute certificates is a BC extension.
  449. @return a basic ASN.1 object representation.
  450. </member>
  451. <member name="M:Org.BouncyCastle.Asn1.Cmp.CrlAnnContent.ToAsn1Object">
  452. <pre>
  453. CrlAnnContent ::= SEQUENCE OF CertificateList
  454. </pre>
  455. @return a basic ASN.1 object representation.
  456. </member>
  457. <member name="M:Org.BouncyCastle.Asn1.Cmp.ErrorMsgContent.ToAsn1Object">
  458. <pre>
  459. ErrorMsgContent ::= SEQUENCE {
  460. pKIStatusInfo PKIStatusInfo,
  461. errorCode INTEGER OPTIONAL,
  462. -- implementation-specific error codes
  463. errorDetails PKIFreeText OPTIONAL
  464. -- implementation-specific error details
  465. }
  466. </pre>
  467. @return a basic ASN.1 object representation.
  468. </member>
  469. <member name="M:Org.BouncyCastle.Asn1.Cmp.GenMsgContent.ToAsn1Object">
  470. <pre>
  471. GenMsgContent ::= SEQUENCE OF InfoTypeAndValue
  472. </pre>
  473. @return a basic ASN.1 object representation.
  474. </member>
  475. <member name="M:Org.BouncyCastle.Asn1.Cmp.GenRepContent.ToAsn1Object">
  476. <pre>
  477. GenRepContent ::= SEQUENCE OF InfoTypeAndValue
  478. </pre>
  479. @return a basic ASN.1 object representation.
  480. </member>
  481. <member name="T:Org.BouncyCastle.Asn1.Cmp.InfoTypeAndValue">
  482. Example InfoTypeAndValue contents include, but are not limited
  483. to, the following (un-comment in this ASN.1 module and use as
  484. appropriate for a given environment):
  485. <pre>
  486. id-it-caProtEncCert OBJECT IDENTIFIER ::= {id-it 1}
  487. CAProtEncCertValue ::= CMPCertificate
  488. id-it-signKeyPairTypes OBJECT IDENTIFIER ::= {id-it 2}
  489. SignKeyPairTypesValue ::= SEQUENCE OF AlgorithmIdentifier
  490. id-it-encKeyPairTypes OBJECT IDENTIFIER ::= {id-it 3}
  491. EncKeyPairTypesValue ::= SEQUENCE OF AlgorithmIdentifier
  492. id-it-preferredSymmAlg OBJECT IDENTIFIER ::= {id-it 4}
  493. PreferredSymmAlgValue ::= AlgorithmIdentifier
  494. id-it-caKeyUpdateInfo OBJECT IDENTIFIER ::= {id-it 5}
  495. CAKeyUpdateInfoValue ::= CAKeyUpdAnnContent
  496. id-it-currentCRL OBJECT IDENTIFIER ::= {id-it 6}
  497. CurrentCRLValue ::= CertificateList
  498. id-it-unsupportedOIDs OBJECT IDENTIFIER ::= {id-it 7}
  499. UnsupportedOIDsValue ::= SEQUENCE OF OBJECT IDENTIFIER
  500. id-it-keyPairParamReq OBJECT IDENTIFIER ::= {id-it 10}
  501. KeyPairParamReqValue ::= OBJECT IDENTIFIER
  502. id-it-keyPairParamRep OBJECT IDENTIFIER ::= {id-it 11}
  503. KeyPairParamRepValue ::= AlgorithmIdentifer
  504. id-it-revPassphrase OBJECT IDENTIFIER ::= {id-it 12}
  505. RevPassphraseValue ::= EncryptedValue
  506. id-it-implicitConfirm OBJECT IDENTIFIER ::= {id-it 13}
  507. ImplicitConfirmValue ::= NULL
  508. id-it-confirmWaitTime OBJECT IDENTIFIER ::= {id-it 14}
  509. ConfirmWaitTimeValue ::= GeneralizedTime
  510. id-it-origPKIMessage OBJECT IDENTIFIER ::= {id-it 15}
  511. OrigPKIMessageValue ::= PKIMessages
  512. id-it-suppLangTags OBJECT IDENTIFIER ::= {id-it 16}
  513. SuppLangTagsValue ::= SEQUENCE OF UTF8String
  514. where
  515. id-pkix OBJECT IDENTIFIER ::= {
  516. iso(1) identified-organization(3)
  517. dod(6) internet(1) security(5) mechanisms(5) pkix(7)}
  518. and
  519. id-it OBJECT IDENTIFIER ::= {id-pkix 4}
  520. </pre>
  521. </member>
  522. <member name="M:Org.BouncyCastle.Asn1.Cmp.InfoTypeAndValue.ToAsn1Object">
  523. <pre>
  524. InfoTypeAndValue ::= SEQUENCE {
  525. infoType OBJECT IDENTIFIER,
  526. infoValue ANY DEFINED BY infoType OPTIONAL
  527. }
  528. </pre>
  529. @return a basic ASN.1 object representation.
  530. </member>
  531. <member name="M:Org.BouncyCastle.Asn1.Cmp.KeyRecRepContent.ToAsn1Object">
  532. <pre>
  533. KeyRecRepContent ::= SEQUENCE {
  534. status PKIStatusInfo,
  535. newSigCert [0] CMPCertificate OPTIONAL,
  536. caCerts [1] SEQUENCE SIZE (1..MAX) OF
  537. CMPCertificate OPTIONAL,
  538. keyPairHist [2] SEQUENCE SIZE (1..MAX) OF
  539. CertifiedKeyPair OPTIONAL
  540. }
  541. </pre>
  542. @return a basic ASN.1 object representation.
  543. </member>
  544. <member name="M:Org.BouncyCastle.Asn1.Cmp.OobCertHash.ToAsn1Object">
  545. <pre>
  546. OobCertHash ::= SEQUENCE {
  547. hashAlg [0] AlgorithmIdentifier OPTIONAL,
  548. certId [1] CertId OPTIONAL,
  549. hashVal BIT STRING
  550. -- hashVal is calculated over the Der encoding of the
  551. -- self-signed certificate with the identifier certID.
  552. }
  553. </pre>
  554. @return a basic ASN.1 object representation.
  555. </member>
  556. <member name="M:Org.BouncyCastle.Asn1.Cmp.PbmParameter.ToAsn1Object">
  557. <pre>
  558. PbmParameter ::= SEQUENCE {
  559. salt OCTET STRING,
  560. -- note: implementations MAY wish to limit acceptable sizes
  561. -- of this string to values appropriate for their environment
  562. -- in order to reduce the risk of denial-of-service attacks
  563. owf AlgorithmIdentifier,
  564. -- AlgId for a One-Way Function (SHA-1 recommended)
  565. iterationCount INTEGER,
  566. -- number of times the OWF is applied
  567. -- note: implementations MAY wish to limit acceptable sizes
  568. -- of this integer to values appropriate for their environment
  569. -- in order to reduce the risk of denial-of-service attacks
  570. mac AlgorithmIdentifier
  571. -- the MAC AlgId (e.g., DES-MAC, Triple-DES-MAC [PKCS11],
  572. } -- or HMAC [RFC2104, RFC2202])
  573. </pre>
  574. @return a basic ASN.1 object representation.
  575. </member>
  576. <member name="M:Org.BouncyCastle.Asn1.Cmp.PkiBody.#ctor(System.Int32,Org.BouncyCastle.Asn1.Asn1Encodable)">
  577. Creates a new PkiBody.
  578. @param type one of the TYPE_* constants
  579. @param content message content
  580. </member>
  581. <member name="M:Org.BouncyCastle.Asn1.Cmp.PkiBody.ToAsn1Object">
  582. <pre>
  583. PkiBody ::= CHOICE { -- message-specific body elements
  584. ir [0] CertReqMessages, --Initialization Request
  585. ip [1] CertRepMessage, --Initialization Response
  586. cr [2] CertReqMessages, --Certification Request
  587. cp [3] CertRepMessage, --Certification Response
  588. p10cr [4] CertificationRequest, --imported from [PKCS10]
  589. popdecc [5] POPODecKeyChallContent, --pop Challenge
  590. popdecr [6] POPODecKeyRespContent, --pop Response
  591. kur [7] CertReqMessages, --Key Update Request
  592. kup [8] CertRepMessage, --Key Update Response
  593. krr [9] CertReqMessages, --Key Recovery Request
  594. krp [10] KeyRecRepContent, --Key Recovery Response
  595. rr [11] RevReqContent, --Revocation Request
  596. rp [12] RevRepContent, --Revocation Response
  597. ccr [13] CertReqMessages, --Cross-Cert. Request
  598. ccp [14] CertRepMessage, --Cross-Cert. Response
  599. ckuann [15] CAKeyUpdAnnContent, --CA Key Update Ann.
  600. cann [16] CertAnnContent, --Certificate Ann.
  601. rann [17] RevAnnContent, --Revocation Ann.
  602. crlann [18] CRLAnnContent, --CRL Announcement
  603. pkiconf [19] PKIConfirmContent, --Confirmation
  604. nested [20] NestedMessageContent, --Nested Message
  605. genm [21] GenMsgContent, --General Message
  606. genp [22] GenRepContent, --General Response
  607. error [23] ErrorMsgContent, --Error Message
  608. certConf [24] CertConfirmContent, --Certificate confirm
  609. pollReq [25] PollReqContent, --Polling request
  610. pollRep [26] PollRepContent --Polling response
  611. }
  612. </pre>
  613. @return a basic ASN.1 object representation.
  614. </member>
  615. <member name="M:Org.BouncyCastle.Asn1.Cmp.PkiConfirmContent.ToAsn1Object">
  616. <pre>
  617. PkiConfirmContent ::= NULL
  618. </pre>
  619. @return a basic ASN.1 object representation.
  620. </member>
  621. <member name="T:Org.BouncyCastle.Asn1.Cmp.PkiFailureInfo">
  622. <pre>
  623. PKIFailureInfo ::= BIT STRING {
  624. badAlg (0),
  625. -- unrecognized or unsupported Algorithm Identifier
  626. badMessageCheck (1), -- integrity check failed (e.g., signature did not verify)
  627. badRequest (2),
  628. -- transaction not permitted or supported
  629. badTime (3), -- messageTime was not sufficiently close to the system time, as defined by local policy
  630. badCertId (4), -- no certificate could be found matching the provided criteria
  631. badDataFormat (5),
  632. -- the data submitted has the wrong format
  633. wrongAuthority (6), -- the authority indicated in the request is different from the one creating the response token
  634. incorrectData (7), -- the requester's data is incorrect (for notary services)
  635. missingTimeStamp (8), -- when the timestamp is missing but should be there (by policy)
  636. badPOP (9) -- the proof-of-possession failed
  637. certRevoked (10),
  638. certConfirmed (11),
  639. wrongIntegrity (12),
  640. badRecipientNonce (13),
  641. timeNotAvailable (14),
  642. -- the TSA's time source is not available
  643. unacceptedPolicy (15),
  644. -- the requested TSA policy is not supported by the TSA
  645. unacceptedExtension (16),
  646. -- the requested extension is not supported by the TSA
  647. addInfoNotAvailable (17)
  648. -- the additional information requested could not be understood
  649. -- or is not available
  650. badSenderNonce (18),
  651. badCertTemplate (19),
  652. signerNotTrusted (20),
  653. transactionIdInUse (21),
  654. unsupportedVersion (22),
  655. notAuthorized (23),
  656. systemUnavail (24),
  657. systemFailure (25),
  658. -- the request cannot be handled due to system failure
  659. duplicateCertReq (26)
  660. </pre>
  661. </member>
  662. <member name="M:Org.BouncyCastle.Asn1.Cmp.PkiFailureInfo.#ctor(System.Int32)">
  663. Basic constructor.
  664. </member>
  665. <member name="P:Org.BouncyCastle.Asn1.Cmp.PkiFreeText.Size">
  666. Return the number of string elements present.
  667. @return number of elements present.
  668. </member>
  669. <member name="P:Org.BouncyCastle.Asn1.Cmp.PkiFreeText.Item(System.Int32)">
  670. Return the UTF8STRING at index.
  671. @param index index of the string of interest
  672. @return the string at index.
  673. </member>
  674. <member name="M:Org.BouncyCastle.Asn1.Cmp.PkiFreeText.ToAsn1Object">
  675. <pre>
  676. PkiFreeText ::= SEQUENCE SIZE (1..MAX) OF UTF8String
  677. </pre>
  678. </member>
  679. <member name="F:Org.BouncyCastle.Asn1.Cmp.PkiHeader.NULL_NAME">
  680. Value for a "null" recipient or sender.
  681. </member>
  682. <member name="M:Org.BouncyCastle.Asn1.Cmp.PkiHeader.ToAsn1Object">
  683. <pre>
  684. PkiHeader ::= SEQUENCE {
  685. pvno INTEGER { cmp1999(1), cmp2000(2) },
  686. sender GeneralName,
  687. -- identifies the sender
  688. recipient GeneralName,
  689. -- identifies the intended recipient
  690. messageTime [0] GeneralizedTime OPTIONAL,
  691. -- time of production of this message (used when sender
  692. -- believes that the transport will be "suitable"; i.e.,
  693. -- that the time will still be meaningful upon receipt)
  694. protectionAlg [1] AlgorithmIdentifier OPTIONAL,
  695. -- algorithm used for calculation of protection bits
  696. senderKID [2] KeyIdentifier OPTIONAL,
  697. recipKID [3] KeyIdentifier OPTIONAL,
  698. -- to identify specific keys used for protection
  699. transactionID [4] OCTET STRING OPTIONAL,
  700. -- identifies the transaction; i.e., this will be the same in
  701. -- corresponding request, response, certConf, and PKIConf
  702. -- messages
  703. senderNonce [5] OCTET STRING OPTIONAL,
  704. recipNonce [6] OCTET STRING OPTIONAL,
  705. -- nonces used to provide replay protection, senderNonce
  706. -- is inserted by the creator of this message; recipNonce
  707. -- is a nonce previously inserted in a related message by
  708. -- the intended recipient of this message
  709. freeText [7] PKIFreeText OPTIONAL,
  710. -- this may be used to indicate context-specific instructions
  711. -- (this field is intended for human consumption)
  712. generalInfo [8] SEQUENCE SIZE (1..MAX) OF
  713. InfoTypeAndValue OPTIONAL
  714. -- this may be used to convey context-specific information
  715. -- (this field not primarily intended for human consumption)
  716. }
  717. </pre>
  718. @return a basic ASN.1 object representation.
  719. </member>
  720. <member name="M:Org.BouncyCastle.Asn1.Cmp.PkiHeaderBuilder.Build">
  721. <pre>
  722. PKIHeader ::= SEQUENCE {
  723. pvno INTEGER { cmp1999(1), cmp2000(2) },
  724. sender GeneralName,
  725. -- identifies the sender
  726. recipient GeneralName,
  727. -- identifies the intended recipient
  728. messageTime [0] GeneralizedTime OPTIONAL,
  729. -- time of production of this message (used when sender
  730. -- believes that the transport will be "suitable"; i.e.,
  731. -- that the time will still be meaningful upon receipt)
  732. protectionAlg [1] AlgorithmIdentifier OPTIONAL,
  733. -- algorithm used for calculation of protection bits
  734. senderKID [2] KeyIdentifier OPTIONAL,
  735. recipKID [3] KeyIdentifier OPTIONAL,
  736. -- to identify specific keys used for protection
  737. transactionID [4] OCTET STRING OPTIONAL,
  738. -- identifies the transaction; i.e., this will be the same in
  739. -- corresponding request, response, certConf, and PKIConf
  740. -- messages
  741. senderNonce [5] OCTET STRING OPTIONAL,
  742. recipNonce [6] OCTET STRING OPTIONAL,
  743. -- nonces used to provide replay protection, senderNonce
  744. -- is inserted by the creator of this message; recipNonce
  745. -- is a nonce previously inserted in a related message by
  746. -- the intended recipient of this message
  747. freeText [7] PKIFreeText OPTIONAL,
  748. -- this may be used to indicate context-specific instructions
  749. -- (this field is intended for human consumption)
  750. generalInfo [8] SEQUENCE SIZE (1..MAX) OF
  751. InfoTypeAndValue OPTIONAL
  752. -- this may be used to convey context-specific information
  753. -- (this field not primarily intended for human consumption)
  754. }
  755. </pre>
  756. @return a basic ASN.1 object representation.
  757. </member>
  758. <member name="M:Org.BouncyCastle.Asn1.Cmp.PkiMessage.#ctor(Org.BouncyCastle.Asn1.Cmp.PkiHeader,Org.BouncyCastle.Asn1.Cmp.PkiBody,Org.BouncyCastle.Asn1.DerBitString,Org.BouncyCastle.Asn1.Cmp.CmpCertificate[])">
  759. Creates a new PkiMessage.
  760. @param header message header
  761. @param body message body
  762. @param protection message protection (may be null)
  763. @param extraCerts extra certificates (may be null)
  764. </member>
  765. <member name="M:Org.BouncyCastle.Asn1.Cmp.PkiMessage.ToAsn1Object">
  766. <pre>
  767. PkiMessage ::= SEQUENCE {
  768. header PKIHeader,
  769. body PKIBody,
  770. protection [0] PKIProtection OPTIONAL,
  771. extraCerts [1] SEQUENCE SIZE (1..MAX) OF CMPCertificate
  772. OPTIONAL
  773. }
  774. </pre>
  775. @return a basic ASN.1 object representation.
  776. </member>
  777. <member name="M:Org.BouncyCastle.Asn1.Cmp.PkiMessages.ToAsn1Object">
  778. <pre>
  779. PkiMessages ::= SEQUENCE SIZE (1..MAX) OF PkiMessage
  780. </pre>
  781. @return a basic ASN.1 object representation.
  782. </member>
  783. <member name="M:Org.BouncyCastle.Asn1.Cmp.PkiStatusInfo.#ctor(System.Int32)">
  784. @param status
  785. </member>
  786. <member name="M:Org.BouncyCastle.Asn1.Cmp.PkiStatusInfo.#ctor(System.Int32,Org.BouncyCastle.Asn1.Cmp.PkiFreeText)">
  787. @param status
  788. @param statusString
  789. </member>
  790. <member name="M:Org.BouncyCastle.Asn1.Cmp.PkiStatusInfo.ToAsn1Object">
  791. <pre>
  792. PkiStatusInfo ::= SEQUENCE {
  793. status PKIStatus, (INTEGER)
  794. statusString PkiFreeText OPTIONAL,
  795. failInfo PkiFailureInfo OPTIONAL (BIT STRING)
  796. }
  797. PKIStatus:
  798. granted (0), -- you got exactly what you asked for
  799. grantedWithMods (1), -- you got something like what you asked for
  800. rejection (2), -- you don't get it, more information elsewhere in the message
  801. waiting (3), -- the request body part has not yet been processed, expect to hear more later
  802. revocationWarning (4), -- this message contains a warning that a revocation is imminent
  803. revocationNotification (5), -- notification that a revocation has occurred
  804. keyUpdateWarning (6) -- update already done for the oldCertId specified in CertReqMsg
  805. PkiFailureInfo:
  806. badAlg (0), -- unrecognized or unsupported Algorithm Identifier
  807. badMessageCheck (1), -- integrity check failed (e.g., signature did not verify)
  808. badRequest (2), -- transaction not permitted or supported
  809. badTime (3), -- messageTime was not sufficiently close to the system time, as defined by local policy
  810. badCertId (4), -- no certificate could be found matching the provided criteria
  811. badDataFormat (5), -- the data submitted has the wrong format
  812. wrongAuthority (6), -- the authority indicated in the request is different from the one creating the response token
  813. incorrectData (7), -- the requester's data is incorrect (for notary services)
  814. missingTimeStamp (8), -- when the timestamp is missing but should be there (by policy)
  815. badPOP (9) -- the proof-of-possession failed
  816. </pre>
  817. </member>
  818. <member name="M:Org.BouncyCastle.Asn1.Cmp.PollRepContent.ToAsn1Object">
  819. <pre>
  820. PollRepContent ::= SEQUENCE OF SEQUENCE {
  821. certReqId INTEGER,
  822. checkAfter INTEGER, -- time in seconds
  823. reason PKIFreeText OPTIONAL
  824. }
  825. </pre>
  826. @return a basic ASN.1 object representation.
  827. </member>
  828. <member name="M:Org.BouncyCastle.Asn1.Cmp.PollReqContent.ToAsn1Object">
  829. <pre>
  830. PollReqContent ::= SEQUENCE OF SEQUENCE {
  831. certReqId INTEGER
  832. }
  833. </pre>
  834. @return a basic ASN.1 object representation.
  835. </member>
  836. <member name="M:Org.BouncyCastle.Asn1.Cmp.PopoDecKeyChallContent.ToAsn1Object">
  837. <pre>
  838. PopoDecKeyChallContent ::= SEQUENCE OF Challenge
  839. </pre>
  840. @return a basic ASN.1 object representation.
  841. </member>
  842. <member name="M:Org.BouncyCastle.Asn1.Cmp.PopoDecKeyRespContent.ToAsn1Object">
  843. <pre>
  844. PopoDecKeyRespContent ::= SEQUENCE OF INTEGER
  845. </pre>
  846. @return a basic ASN.1 object representation.
  847. </member>
  848. <member name="M:Org.BouncyCastle.Asn1.Cmp.ProtectedPart.ToAsn1Object">
  849. <pre>
  850. ProtectedPart ::= SEQUENCE {
  851. header PKIHeader,
  852. body PKIBody
  853. }
  854. </pre>
  855. @return a basic ASN.1 object representation.
  856. </member>
  857. <member name="M:Org.BouncyCastle.Asn1.Cmp.RevAnnContent.ToAsn1Object">
  858. <pre>
  859. RevAnnContent ::= SEQUENCE {
  860. status PKIStatus,
  861. certId CertId,
  862. willBeRevokedAt GeneralizedTime,
  863. badSinceDate GeneralizedTime,
  864. crlDetails Extensions OPTIONAL
  865. -- extra CRL details (e.g., crl number, reason, location, etc.)
  866. }
  867. </pre>
  868. @return a basic ASN.1 object representation.
  869. </member>
  870. <member name="M:Org.BouncyCastle.Asn1.Cmp.RevDetails.ToAsn1Object">
  871. <pre>
  872. RevDetails ::= SEQUENCE {
  873. certDetails CertTemplate,
  874. -- allows requester to specify as much as they can about
  875. -- the cert. for which revocation is requested
  876. -- (e.g., for cases in which serialNumber is not available)
  877. crlEntryDetails Extensions OPTIONAL
  878. -- requested crlEntryExtensions
  879. }
  880. </pre>
  881. @return a basic ASN.1 object representation.
  882. </member>
  883. <member name="M:Org.BouncyCastle.Asn1.Cmp.RevRepContent.ToAsn1Object">
  884. <pre>
  885. RevRepContent ::= SEQUENCE {
  886. status SEQUENCE SIZE (1..MAX) OF PKIStatusInfo,
  887. -- in same order as was sent in RevReqContent
  888. revCerts [0] SEQUENCE SIZE (1..MAX) OF CertId OPTIONAL,
  889. -- IDs for which revocation was requested
  890. -- (same order as status)
  891. crls [1] SEQUENCE SIZE (1..MAX) OF CertificateList OPTIONAL
  892. -- the resulting CRLs (there may be more than one)
  893. }
  894. </pre>
  895. @return a basic ASN.1 object representation.
  896. </member>
  897. <member name="M:Org.BouncyCastle.Asn1.Cmp.RevReqContent.ToAsn1Object">
  898. <pre>
  899. RevReqContent ::= SEQUENCE OF RevDetails
  900. </pre>
  901. @return a basic ASN.1 object representation.
  902. </member>
  903. <member name="M:Org.BouncyCastle.Asn1.Cms.Attribute.GetInstance(System.Object)">
  904. return an Attribute object from the given object.
  905. @param o the object we want converted.
  906. @exception ArgumentException if the object cannot be converted.
  907. </member>
  908. <member name="M:Org.BouncyCastle.Asn1.Cms.Attribute.ToAsn1Object">
  909. Produce an object suitable for an Asn1OutputStream.
  910. <pre>
  911. Attribute ::= SEQUENCE {
  912. attrType OBJECT IDENTIFIER,
  913. attrValues SET OF AttributeValue
  914. }
  915. </pre>
  916. </member>
  917. <member name="M:Org.BouncyCastle.Asn1.Cms.Attributes.ToAsn1Object">
  918. <pre>
  919. Attributes ::=
  920. SET SIZE(1..MAX) OF Attribute -- according to RFC 5652
  921. </pre>
  922. @return
  923. </member>
  924. <member name="P:Org.BouncyCastle.Asn1.Cms.AttributeTable.Item(Org.BouncyCastle.Asn1.DerObjectIdentifier)">
  925. <summary>Return the first attribute matching the given OBJECT IDENTIFIER</summary>
  926. </member>
  927. <member name="M:Org.BouncyCastle.Asn1.Cms.AttributeTable.GetAll(Org.BouncyCastle.Asn1.DerObjectIdentifier)">
  928. Return all the attributes matching the OBJECT IDENTIFIER oid. The vector will be
  929. empty if there are no attributes of the required type present.
  930. @param oid type of attribute required.
  931. @return a vector of all the attributes found of type oid.
  932. </member>
  933. <member name="M:Org.BouncyCastle.Asn1.Cms.AttributeTable.Add(Org.BouncyCastle.Asn1.DerObjectIdentifier,Org.BouncyCastle.Asn1.Asn1Encodable)">
  934. Return a new table with the passed in attribute added.
  935. @param attrType
  936. @param attrValue
  937. @return
  938. </member>
  939. <member name="M:Org.BouncyCastle.Asn1.Cms.AuthenticatedData.GetInstance(Org.BouncyCastle.Asn1.Asn1TaggedObject,System.Boolean)">
  940. return an AuthenticatedData object from a tagged object.
  941. @param obj the tagged object holding the object we want.
  942. @param isExplicit true if the object is meant to be explicitly
  943. tagged false otherwise.
  944. @throws ArgumentException if the object held by the
  945. tagged object cannot be converted.
  946. </member>
  947. <member name="M:Org.BouncyCastle.Asn1.Cms.AuthenticatedData.GetInstance(System.Object)">
  948. return an AuthenticatedData object from the given object.
  949. @param obj the object we want converted.
  950. @throws ArgumentException if the object cannot be converted.
  951. </member>
  952. <member name="M:Org.BouncyCastle.Asn1.Cms.AuthenticatedData.ToAsn1Object">
  953. Produce an object suitable for an Asn1OutputStream.
  954. <pre>
  955. AuthenticatedData ::= SEQUENCE {
  956. version CMSVersion,
  957. originatorInfo [0] IMPLICIT OriginatorInfo OPTIONAL,
  958. recipientInfos RecipientInfos,
  959. macAlgorithm MessageAuthenticationCodeAlgorithm,
  960. digestAlgorithm [1] DigestAlgorithmIdentifier OPTIONAL,
  961. encapContentInfo EncapsulatedContentInfo,
  962. authAttrs [2] IMPLICIT AuthAttributes OPTIONAL,
  963. mac MessageAuthenticationCode,
  964. unauthAttrs [3] IMPLICIT UnauthAttributes OPTIONAL }
  965. AuthAttributes ::= SET SIZE (1..MAX) OF Attribute
  966. UnauthAttributes ::= SET SIZE (1..MAX) OF Attribute
  967. MessageAuthenticationCode ::= OCTET STRING
  968. </pre>
  969. </member>
  970. <member name="T:Org.BouncyCastle.Asn1.Cms.AuthenticatedDataParser">
  971. Produce an object suitable for an Asn1OutputStream.
  972. <pre>
  973. AuthenticatedData ::= SEQUENCE {
  974. version CMSVersion,
  975. originatorInfo [0] IMPLICIT OriginatorInfo OPTIONAL,
  976. recipientInfos RecipientInfos,
  977. macAlgorithm MessageAuthenticationCodeAlgorithm,
  978. digestAlgorithm [1] DigestAlgorithmIdentifier OPTIONAL,
  979. encapContentInfo EncapsulatedContentInfo,
  980. authAttrs [2] IMPLICIT AuthAttributes OPTIONAL,
  981. mac MessageAuthenticationCode,
  982. unauthAttrs [3] IMPLICIT UnauthAttributes OPTIONAL }
  983. AuthAttributes ::= SET SIZE (1..MAX) OF Attribute
  984. UnauthAttributes ::= SET SIZE (1..MAX) OF Attribute
  985. MessageAuthenticationCode ::= OCTET STRING
  986. </pre>
  987. </member>
  988. <member name="M:Org.BouncyCastle.Asn1.Cms.AuthEnvelopedData.GetInstance(Org.BouncyCastle.Asn1.Asn1TaggedObject,System.Boolean)">
  989. return an AuthEnvelopedData object from a tagged object.
  990. @param obj the tagged object holding the object we want.
  991. @param isExplicit true if the object is meant to be explicitly
  992. tagged false otherwise.
  993. @throws ArgumentException if the object held by the
  994. tagged object cannot be converted.
  995. </member>
  996. <member name="M:Org.BouncyCastle.Asn1.Cms.AuthEnvelopedData.GetInstance(System.Object)">
  997. return an AuthEnvelopedData object from the given object.
  998. @param obj the object we want converted.
  999. @throws ArgumentException if the object cannot be converted.
  1000. </member>
  1001. <member name="M:Org.BouncyCastle.Asn1.Cms.AuthEnvelopedData.ToAsn1Object">
  1002. Produce an object suitable for an Asn1OutputStream.
  1003. <pre>
  1004. AuthEnvelopedData ::= SEQUENCE {
  1005. version CMSVersion,
  1006. originatorInfo [0] IMPLICIT OriginatorInfo OPTIONAL,
  1007. recipientInfos RecipientInfos,
  1008. authEncryptedContentInfo EncryptedContentInfo,
  1009. authAttrs [1] IMPLICIT AuthAttributes OPTIONAL,
  1010. mac MessageAuthenticationCode,
  1011. unauthAttrs [2] IMPLICIT UnauthAttributes OPTIONAL }
  1012. </pre>
  1013. </member>
  1014. <member name="T:Org.BouncyCastle.Asn1.Cms.AuthEnvelopedDataParser">
  1015. Produce an object suitable for an Asn1OutputStream.
  1016. <pre>
  1017. AuthEnvelopedData ::= SEQUENCE {
  1018. version CMSVersion,
  1019. originatorInfo [0] IMPLICIT OriginatorInfo OPTIONAL,
  1020. recipientInfos RecipientInfos,
  1021. authEncryptedContentInfo EncryptedContentInfo,
  1022. authAttrs [1] IMPLICIT AuthAttributes OPTIONAL,
  1023. mac MessageAuthenticationCode,
  1024. unauthAttrs [2] IMPLICIT UnauthAttributes OPTIONAL }
  1025. </pre>
  1026. </member>
  1027. <member name="F:Org.BouncyCastle.Asn1.Cms.CmsObjectIdentifiers.id_ri">
  1028. The other Revocation Info arc
  1029. id-ri OBJECT IDENTIFIER ::= { iso(1) identified-organization(3)
  1030. dod(6) internet(1) security(5) mechanisms(5) pkix(7) ri(16) }
  1031. </member>
  1032. <member name="T:Org.BouncyCastle.Asn1.Cms.CompressedData">
  1033. RFC 3274 - CMS Compressed Data.
  1034. <pre>
  1035. CompressedData ::= Sequence {
  1036. version CMSVersion,
  1037. compressionAlgorithm CompressionAlgorithmIdentifier,
  1038. encapContentInfo EncapsulatedContentInfo
  1039. }
  1040. </pre>
  1041. </member>
  1042. <member name="M:Org.BouncyCastle.Asn1.Cms.CompressedData.GetInstance(Org.BouncyCastle.Asn1.Asn1TaggedObject,System.Boolean)">
  1043. return a CompressedData object from a tagged object.
  1044. @param ato the tagged object holding the object we want.
  1045. @param explicitly true if the object is meant to be explicitly
  1046. tagged false otherwise.
  1047. @exception ArgumentException if the object held by the
  1048. tagged object cannot be converted.
  1049. </member>
  1050. <member name="M:Org.BouncyCastle.Asn1.Cms.CompressedData.GetInstance(System.Object)">
  1051. return a CompressedData object from the given object.
  1052. @param _obj the object we want converted.
  1053. @exception ArgumentException if the object cannot be converted.
  1054. </member>
  1055. <member name="T:Org.BouncyCastle.Asn1.Cms.CompressedDataParser">
  1056. RFC 3274 - CMS Compressed Data.
  1057. <pre>
  1058. CompressedData ::= SEQUENCE {
  1059. version CMSVersion,
  1060. compressionAlgorithm CompressionAlgorithmIdentifier,
  1061. encapContentInfo EncapsulatedContentInfo
  1062. }
  1063. </pre>
  1064. </member>
  1065. <member name="M:Org.BouncyCastle.Asn1.Cms.ContentInfo.ToAsn1Object">
  1066. Produce an object suitable for an Asn1OutputStream.
  1067. <pre>
  1068. ContentInfo ::= Sequence {
  1069. contentType ContentType,
  1070. content
  1071. [0] EXPLICIT ANY DEFINED BY contentType OPTIONAL }
  1072. </pre>
  1073. </member>
  1074. <member name="T:Org.BouncyCastle.Asn1.Cms.ContentInfoParser">
  1075. Produce an object suitable for an Asn1OutputStream.
  1076. <pre>
  1077. ContentInfo ::= SEQUENCE {
  1078. contentType ContentType,
  1079. content
  1080. [0] EXPLICIT ANY DEFINED BY contentType OPTIONAL }
  1081. </pre>
  1082. </member>
  1083. <member name="M:Org.BouncyCastle.Asn1.Cms.Ecc.MQVuserKeyingMaterial.GetInstance(Org.BouncyCastle.Asn1.Asn1TaggedObject,System.Boolean)">
  1084. return an AuthEnvelopedData object from a tagged object.
  1085. @param obj the tagged object holding the object we want.
  1086. @param isExplicit true if the object is meant to be explicitly
  1087. tagged false otherwise.
  1088. @throws ArgumentException if the object held by the
  1089. tagged object cannot be converted.
  1090. </member>
  1091. <member name="M:Org.BouncyCastle.Asn1.Cms.Ecc.MQVuserKeyingMaterial.GetInstance(System.Object)">
  1092. return an AuthEnvelopedData object from the given object.
  1093. @param obj the object we want converted.
  1094. @throws ArgumentException if the object cannot be converted.
  1095. </member>
  1096. <member name="M:Org.BouncyCastle.Asn1.Cms.Ecc.MQVuserKeyingMaterial.ToAsn1Object">
  1097. Produce an object suitable for an Asn1OutputStream.
  1098. <pre>
  1099. MQVuserKeyingMaterial ::= SEQUENCE {
  1100. ephemeralPublicKey OriginatorPublicKey,
  1101. addedukm [0] EXPLICIT UserKeyingMaterial OPTIONAL }
  1102. </pre>
  1103. </member>
  1104. <member name="M:Org.BouncyCastle.Asn1.Cms.EncryptedContentInfo.GetInstance(System.Object)">
  1105. return an EncryptedContentInfo object from the given object.
  1106. @param obj the object we want converted.
  1107. @exception ArgumentException if the object cannot be converted.
  1108. </member>
  1109. <member name="M:Org.BouncyCastle.Asn1.Cms.EncryptedContentInfo.ToAsn1Object">
  1110. Produce an object suitable for an Asn1OutputStream.
  1111. <pre>
  1112. EncryptedContentInfo ::= Sequence {
  1113. contentType ContentType,
  1114. contentEncryptionAlgorithm ContentEncryptionAlgorithmIdentifier,
  1115. encryptedContent [0] IMPLICIT EncryptedContent OPTIONAL
  1116. }
  1117. </pre>
  1118. </member>
  1119. <member name="T:Org.BouncyCastle.Asn1.Cms.EncryptedContentInfoParser">
  1120. <pre>
  1121. EncryptedContentInfo ::= SEQUENCE {
  1122. contentType ContentType,
  1123. contentEncryptionAlgorithm ContentEncryptionAlgorithmIdentifier,
  1124. encryptedContent [0] IMPLICIT EncryptedContent OPTIONAL
  1125. }
  1126. </pre>
  1127. </member>
  1128. <member name="M:Org.BouncyCastle.Asn1.Cms.EncryptedData.ToAsn1Object">
  1129. <pre>
  1130. EncryptedData ::= SEQUENCE {
  1131. version CMSVersion,
  1132. encryptedContentInfo EncryptedContentInfo,
  1133. unprotectedAttrs [1] IMPLICIT UnprotectedAttributes OPTIONAL }
  1134. </pre>
  1135. @return a basic ASN.1 object representation.
  1136. </member>
  1137. <member name="M:Org.BouncyCastle.Asn1.Cms.EnvelopedData.GetInstance(Org.BouncyCastle.Asn1.Asn1TaggedObject,System.Boolean)">
  1138. return an EnvelopedData object from a tagged object.
  1139. @param obj the tagged object holding the object we want.
  1140. @param explicitly true if the object is meant to be explicitly
  1141. tagged false otherwise.
  1142. @exception ArgumentException if the object held by the
  1143. tagged object cannot be converted.
  1144. </member>
  1145. <member name="M:Org.BouncyCastle.Asn1.Cms.EnvelopedData.GetInstance(System.Object)">
  1146. return an EnvelopedData object from the given object.
  1147. @param obj the object we want converted.
  1148. @exception ArgumentException if the object cannot be converted.
  1149. </member>
  1150. <member name="M:Org.BouncyCastle.Asn1.Cms.EnvelopedData.ToAsn1Object">
  1151. Produce an object suitable for an Asn1OutputStream.
  1152. <pre>
  1153. EnvelopedData ::= Sequence {
  1154. version CMSVersion,
  1155. originatorInfo [0] IMPLICIT OriginatorInfo OPTIONAL,
  1156. recipientInfos RecipientInfos,
  1157. encryptedContentInfo EncryptedContentInfo,
  1158. unprotectedAttrs [1] IMPLICIT UnprotectedAttributes OPTIONAL
  1159. }
  1160. </pre>
  1161. </member>
  1162. <member name="T:Org.BouncyCastle.Asn1.Cms.EnvelopedDataParser">
  1163. Produce an object suitable for an Asn1OutputStream.
  1164. <pre>
  1165. EnvelopedData ::= SEQUENCE {
  1166. version CMSVersion,
  1167. originatorInfo [0] IMPLICIT OriginatorInfo OPTIONAL,
  1168. recipientInfos RecipientInfos,
  1169. encryptedContentInfo EncryptedContentInfo,
  1170. unprotectedAttrs [1] IMPLICIT UnprotectedAttributes OPTIONAL
  1171. }
  1172. </pre>
  1173. </member>
  1174. <member name="M:Org.BouncyCastle.Asn1.Cms.KekIdentifier.GetInstance(Org.BouncyCastle.Asn1.Asn1TaggedObject,System.Boolean)">
  1175. return a KekIdentifier object from a tagged object.
  1176. @param obj the tagged object holding the object we want.
  1177. @param explicitly true if the object is meant to be explicitly
  1178. tagged false otherwise.
  1179. @exception ArgumentException if the object held by the
  1180. tagged object cannot be converted.
  1181. </member>
  1182. <member name="M:Org.BouncyCastle.Asn1.Cms.KekIdentifier.GetInstance(System.Object)">
  1183. return a KekIdentifier object from the given object.
  1184. @param obj the object we want converted.
  1185. @exception ArgumentException if the object cannot be converted.
  1186. </member>
  1187. <member name="M:Org.BouncyCastle.Asn1.Cms.KekIdentifier.ToAsn1Object">
  1188. Produce an object suitable for an Asn1OutputStream.
  1189. <pre>
  1190. KekIdentifier ::= Sequence {
  1191. keyIdentifier OCTET STRING,
  1192. date GeneralizedTime OPTIONAL,
  1193. other OtherKeyAttribute OPTIONAL
  1194. }
  1195. </pre>
  1196. </member>
  1197. <member name="M:Org.BouncyCastle.Asn1.Cms.KekRecipientInfo.GetInstance(Org.BouncyCastle.Asn1.Asn1TaggedObject,System.Boolean)">
  1198. return a KekRecipientInfo object from a tagged object.
  1199. @param obj the tagged object holding the object we want.
  1200. @param explicitly true if the object is meant to be explicitly
  1201. tagged false otherwise.
  1202. @exception ArgumentException if the object held by the
  1203. tagged object cannot be converted.
  1204. </member>
  1205. <member name="M:Org.BouncyCastle.Asn1.Cms.KekRecipientInfo.GetInstance(System.Object)">
  1206. return a KekRecipientInfo object from the given object.
  1207. @param obj the object we want converted.
  1208. @exception ArgumentException if the object cannot be converted.
  1209. </member>
  1210. <member name="M:Org.BouncyCastle.Asn1.Cms.KekRecipientInfo.ToAsn1Object">
  1211. Produce an object suitable for an Asn1OutputStream.
  1212. <pre>
  1213. KekRecipientInfo ::= Sequence {
  1214. version CMSVersion, -- always set to 4
  1215. kekID KekIdentifier,
  1216. keyEncryptionAlgorithm KeyEncryptionAlgorithmIdentifier,
  1217. encryptedKey EncryptedKey
  1218. }
  1219. </pre>
  1220. </member>
  1221. <member name="M:Org.BouncyCastle.Asn1.Cms.KeyAgreeRecipientIdentifier.GetInstance(Org.BouncyCastle.Asn1.Asn1TaggedObject,System.Boolean)">
  1222. return an KeyAgreeRecipientIdentifier object from a tagged object.
  1223. @param obj the tagged object holding the object we want.
  1224. @param isExplicit true if the object is meant to be explicitly
  1225. tagged false otherwise.
  1226. @exception ArgumentException if the object held by the
  1227. tagged object cannot be converted.
  1228. </member>
  1229. <member name="M:Org.BouncyCastle.Asn1.Cms.KeyAgreeRecipientIdentifier.GetInstance(System.Object)">
  1230. return an KeyAgreeRecipientIdentifier object from the given object.
  1231. @param obj the object we want converted.
  1232. @exception ArgumentException if the object cannot be converted.
  1233. </member>
  1234. <member name="M:Org.BouncyCastle.Asn1.Cms.KeyAgreeRecipientIdentifier.ToAsn1Object">
  1235. Produce an object suitable for an Asn1OutputStream.
  1236. <pre>
  1237. KeyAgreeRecipientIdentifier ::= CHOICE {
  1238. issuerAndSerialNumber IssuerAndSerialNumber,
  1239. rKeyId [0] IMPLICIT RecipientKeyIdentifier
  1240. }
  1241. </pre>
  1242. </member>
  1243. <member name="M:Org.BouncyCastle.Asn1.Cms.KeyAgreeRecipientInfo.GetInstance(Org.BouncyCastle.Asn1.Asn1TaggedObject,System.Boolean)">
  1244. return a KeyAgreeRecipientInfo object from a tagged object.
  1245. @param obj the tagged object holding the object we want.
  1246. @param explicitly true if the object is meant to be explicitly
  1247. tagged false otherwise.
  1248. @exception ArgumentException if the object held by the
  1249. tagged object cannot be converted.
  1250. </member>
  1251. <member name="M:Org.BouncyCastle.Asn1.Cms.KeyAgreeRecipientInfo.GetInstance(System.Object)">
  1252. return a KeyAgreeRecipientInfo object from the given object.
  1253. @param obj the object we want converted.
  1254. @exception ArgumentException if the object cannot be converted.
  1255. </member>
  1256. <member name="M:Org.BouncyCastle.Asn1.Cms.KeyAgreeRecipientInfo.ToAsn1Object">
  1257. * Produce an object suitable for an Asn1OutputStream.
  1258. * <pre>
  1259. * KeyAgreeRecipientInfo ::= Sequence {
  1260. * version CMSVersion, -- always set to 3
  1261. * originator [0] EXPLICIT OriginatorIdentifierOrKey,
  1262. * ukm [1] EXPLICIT UserKeyingMaterial OPTIONAL,
  1263. * keyEncryptionAlgorithm KeyEncryptionAlgorithmIdentifier,
  1264. * recipientEncryptedKeys RecipientEncryptedKeys
  1265. * }
  1266. *
  1267. * UserKeyingMaterial ::= OCTET STRING
  1268. * </pre>
  1269. </member>
  1270. <member name="M:Org.BouncyCastle.Asn1.Cms.KeyTransRecipientInfo.GetInstance(System.Object)">
  1271. return a KeyTransRecipientInfo object from the given object.
  1272. @param obj the object we want converted.
  1273. @exception ArgumentException if the object cannot be converted.
  1274. </member>
  1275. <member name="M:Org.BouncyCastle.Asn1.Cms.KeyTransRecipientInfo.ToAsn1Object">
  1276. Produce an object suitable for an Asn1OutputStream.
  1277. <pre>
  1278. KeyTransRecipientInfo ::= Sequence {
  1279. version CMSVersion, -- always set to 0 or 2
  1280. rid RecipientIdentifier,
  1281. keyEncryptionAlgorithm KeyEncryptionAlgorithmIdentifier,
  1282. encryptedKey EncryptedKey
  1283. }
  1284. </pre>
  1285. </member>
  1286. <member name="M:Org.BouncyCastle.Asn1.Cms.MetaData.ToAsn1Object">
  1287. <pre>
  1288. MetaData ::= SEQUENCE {
  1289. hashProtected BOOLEAN,
  1290. fileName UTF8String OPTIONAL,
  1291. mediaType IA5String OPTIONAL,
  1292. otherMetaData Attributes OPTIONAL
  1293. }
  1294. </pre>
  1295. @return
  1296. </member>
  1297. <member name="M:Org.BouncyCastle.Asn1.Cms.OriginatorIdentifierOrKey.GetInstance(Org.BouncyCastle.Asn1.Asn1TaggedObject,System.Boolean)">
  1298. return an OriginatorIdentifierOrKey object from a tagged object.
  1299. @param o the tagged object holding the object we want.
  1300. @param explicitly true if the object is meant to be explicitly
  1301. tagged false otherwise.
  1302. @exception ArgumentException if the object held by the
  1303. tagged object cannot be converted.
  1304. </member>
  1305. <member name="M:Org.BouncyCastle.Asn1.Cms.OriginatorIdentifierOrKey.GetInstance(System.Object)">
  1306. return an OriginatorIdentifierOrKey object from the given object.
  1307. @param o the object we want converted.
  1308. @exception ArgumentException if the object cannot be converted.
  1309. </member>
  1310. <member name="M:Org.BouncyCastle.Asn1.Cms.OriginatorIdentifierOrKey.ToAsn1Object">
  1311. Produce an object suitable for an Asn1OutputStream.
  1312. <pre>
  1313. OriginatorIdentifierOrKey ::= CHOICE {
  1314. issuerAndSerialNumber IssuerAndSerialNumber,
  1315. subjectKeyIdentifier [0] SubjectKeyIdentifier,
  1316. originatorKey [1] OriginatorPublicKey
  1317. }
  1318. SubjectKeyIdentifier ::= OCTET STRING
  1319. </pre>
  1320. </member>
  1321. <member name="M:Org.BouncyCastle.Asn1.Cms.OriginatorInfo.GetInstance(Org.BouncyCastle.Asn1.Asn1TaggedObject,System.Boolean)">
  1322. return an OriginatorInfo object from a tagged object.
  1323. @param obj the tagged object holding the object we want.
  1324. @param explicitly true if the object is meant to be explicitly
  1325. tagged false otherwise.
  1326. @exception ArgumentException if the object held by the
  1327. tagged object cannot be converted.
  1328. </member>
  1329. <member name="M:Org.BouncyCastle.Asn1.Cms.OriginatorInfo.GetInstance(System.Object)">
  1330. return an OriginatorInfo object from the given object.
  1331. @param obj the object we want converted.
  1332. @exception ArgumentException if the object cannot be converted.
  1333. </member>
  1334. <member name="M:Org.BouncyCastle.Asn1.Cms.OriginatorInfo.ToAsn1Object">
  1335. Produce an object suitable for an Asn1OutputStream.
  1336. <pre>
  1337. OriginatorInfo ::= Sequence {
  1338. certs [0] IMPLICIT CertificateSet OPTIONAL,
  1339. crls [1] IMPLICIT CertificateRevocationLists OPTIONAL
  1340. }
  1341. </pre>
  1342. </member>
  1343. <member name="M:Org.BouncyCastle.Asn1.Cms.OriginatorPublicKey.GetInstance(Org.BouncyCastle.Asn1.Asn1TaggedObject,System.Boolean)">
  1344. return an OriginatorPublicKey object from a tagged object.
  1345. @param obj the tagged object holding the object we want.
  1346. @param explicitly true if the object is meant to be explicitly
  1347. tagged false otherwise.
  1348. @exception ArgumentException if the object held by the
  1349. tagged object cannot be converted.
  1350. </member>
  1351. <member name="M:Org.BouncyCastle.Asn1.Cms.OriginatorPublicKey.GetInstance(System.Object)">
  1352. return an OriginatorPublicKey object from the given object.
  1353. @param obj the object we want converted.
  1354. @exception ArgumentException if the object cannot be converted.
  1355. </member>
  1356. <member name="M:Org.BouncyCastle.Asn1.Cms.OriginatorPublicKey.ToAsn1Object">
  1357. Produce an object suitable for an Asn1OutputStream.
  1358. <pre>
  1359. OriginatorPublicKey ::= Sequence {
  1360. algorithm AlgorithmIdentifier,
  1361. publicKey BIT STRING
  1362. }
  1363. </pre>
  1364. </member>
  1365. <member name="M:Org.BouncyCastle.Asn1.Cms.OtherKeyAttribute.GetInstance(System.Object)">
  1366. return an OtherKeyAttribute object from the given object.
  1367. @param o the object we want converted.
  1368. @exception ArgumentException if the object cannot be converted.
  1369. </member>
  1370. <member name="M:Org.BouncyCastle.Asn1.Cms.OtherKeyAttribute.ToAsn1Object">
  1371. Produce an object suitable for an Asn1OutputStream.
  1372. <pre>
  1373. OtherKeyAttribute ::= Sequence {
  1374. keyAttrId OBJECT IDENTIFIER,
  1375. keyAttr ANY DEFINED BY keyAttrId OPTIONAL
  1376. }
  1377. </pre>
  1378. </member>
  1379. <member name="M:Org.BouncyCastle.Asn1.Cms.OtherRecipientInfo.GetInstance(Org.BouncyCastle.Asn1.Asn1TaggedObject,System.Boolean)">
  1380. return a OtherRecipientInfo object from a tagged object.
  1381. @param obj the tagged object holding the object we want.
  1382. @param explicitly true if the object is meant to be explicitly
  1383. tagged false otherwise.
  1384. @exception ArgumentException if the object held by the
  1385. tagged object cannot be converted.
  1386. </member>
  1387. <member name="M:Org.BouncyCastle.Asn1.Cms.OtherRecipientInfo.GetInstance(System.Object)">
  1388. return a OtherRecipientInfo object from the given object.
  1389. @param obj the object we want converted.
  1390. @exception ArgumentException if the object cannot be converted.
  1391. </member>
  1392. <member name="M:Org.BouncyCastle.Asn1.Cms.OtherRecipientInfo.ToAsn1Object">
  1393. Produce an object suitable for an Asn1OutputStream.
  1394. <pre>
  1395. OtherRecipientInfo ::= Sequence {
  1396. oriType OBJECT IDENTIFIER,
  1397. oriValue ANY DEFINED BY oriType }
  1398. </pre>
  1399. </member>
  1400. <member name="M:Org.BouncyCastle.Asn1.Cms.OtherRevocationInfoFormat.GetInstance(Org.BouncyCastle.Asn1.Asn1TaggedObject,System.Boolean)">
  1401. return a OtherRevocationInfoFormat object from a tagged object.
  1402. @param obj the tagged object holding the object we want.
  1403. @param explicit true if the object is meant to be explicitly
  1404. tagged false otherwise.
  1405. @exception IllegalArgumentException if the object held by the
  1406. tagged object cannot be converted.
  1407. </member>
  1408. <member name="M:Org.BouncyCastle.Asn1.Cms.OtherRevocationInfoFormat.GetInstance(System.Object)">
  1409. return a OtherRevocationInfoFormat object from the given object.
  1410. @param obj the object we want converted.
  1411. @exception IllegalArgumentException if the object cannot be converted.
  1412. </member>
  1413. <member name="M:Org.BouncyCastle.Asn1.Cms.OtherRevocationInfoFormat.ToAsn1Object">
  1414. Produce an object suitable for an ASN1OutputStream.
  1415. <pre>
  1416. OtherRevocationInfoFormat ::= SEQUENCE {
  1417. otherRevInfoFormat OBJECT IDENTIFIER,
  1418. otherRevInfo ANY DEFINED BY otherRevInfoFormat }
  1419. </pre>
  1420. </member>
  1421. <member name="M:Org.BouncyCastle.Asn1.Cms.PasswordRecipientInfo.GetInstance(Org.BouncyCastle.Asn1.Asn1TaggedObject,System.Boolean)">
  1422. return a PasswordRecipientInfo object from a tagged object.
  1423. @param obj the tagged object holding the object we want.
  1424. @param explicitly true if the object is meant to be explicitly
  1425. tagged false otherwise.
  1426. @exception ArgumentException if the object held by the
  1427. tagged object cannot be converted.
  1428. </member>
  1429. <member name="M:Org.BouncyCastle.Asn1.Cms.PasswordRecipientInfo.GetInstance(System.Object)">
  1430. return a PasswordRecipientInfo object from the given object.
  1431. @param obj the object we want converted.
  1432. @exception ArgumentException if the object cannot be converted.
  1433. </member>
  1434. <member name="M:Org.BouncyCastle.Asn1.Cms.PasswordRecipientInfo.ToAsn1Object">
  1435. Produce an object suitable for an Asn1OutputStream.
  1436. <pre>
  1437. PasswordRecipientInfo ::= Sequence {
  1438. version CMSVersion, -- Always set to 0
  1439. keyDerivationAlgorithm [0] KeyDerivationAlgorithmIdentifier
  1440. OPTIONAL,
  1441. keyEncryptionAlgorithm KeyEncryptionAlgorithmIdentifier,
  1442. encryptedKey EncryptedKey }
  1443. </pre>
  1444. </member>
  1445. <member name="M:Org.BouncyCastle.Asn1.Cms.RecipientEncryptedKey.GetInstance(Org.BouncyCastle.Asn1.Asn1TaggedObject,System.Boolean)">
  1446. return an RecipientEncryptedKey object from a tagged object.
  1447. @param obj the tagged object holding the object we want.
  1448. @param isExplicit true if the object is meant to be explicitly
  1449. tagged false otherwise.
  1450. @exception ArgumentException if the object held by the
  1451. tagged object cannot be converted.
  1452. </member>
  1453. <member name="M:Org.BouncyCastle.Asn1.Cms.RecipientEncryptedKey.GetInstance(System.Object)">
  1454. return a RecipientEncryptedKey object from the given object.
  1455. @param obj the object we want converted.
  1456. @exception ArgumentException if the object cannot be converted.
  1457. </member>
  1458. <member name="M:Org.BouncyCastle.Asn1.Cms.RecipientEncryptedKey.ToAsn1Object">
  1459. Produce an object suitable for an Asn1OutputStream.
  1460. <pre>
  1461. RecipientEncryptedKey ::= SEQUENCE {
  1462. rid KeyAgreeRecipientIdentifier,
  1463. encryptedKey EncryptedKey
  1464. }
  1465. </pre>
  1466. </member>
  1467. <member name="M:Org.BouncyCastle.Asn1.Cms.RecipientIdentifier.GetInstance(System.Object)">
  1468. return a RecipientIdentifier object from the given object.
  1469. @param o the object we want converted.
  1470. @exception ArgumentException if the object cannot be converted.
  1471. </member>
  1472. <member name="M:Org.BouncyCastle.Asn1.Cms.RecipientIdentifier.ToAsn1Object">
  1473. Produce an object suitable for an Asn1OutputStream.
  1474. <pre>
  1475. RecipientIdentifier ::= CHOICE {
  1476. issuerAndSerialNumber IssuerAndSerialNumber,
  1477. subjectKeyIdentifier [0] SubjectKeyIdentifier
  1478. }
  1479. SubjectKeyIdentifier ::= OCTET STRING
  1480. </pre>
  1481. </member>
  1482. <member name="M:Org.BouncyCastle.Asn1.Cms.RecipientInfo.ToAsn1Object">
  1483. Produce an object suitable for an Asn1OutputStream.
  1484. <pre>
  1485. RecipientInfo ::= CHOICE {
  1486. ktri KeyTransRecipientInfo,
  1487. kari [1] KeyAgreeRecipientInfo,
  1488. kekri [2] KekRecipientInfo,
  1489. pwri [3] PasswordRecipientInfo,
  1490. ori [4] OtherRecipientInfo }
  1491. </pre>
  1492. </member>
  1493. <member name="M:Org.BouncyCastle.Asn1.Cms.RecipientKeyIdentifier.GetInstance(Org.BouncyCastle.Asn1.Asn1TaggedObject,System.Boolean)">
  1494. return a RecipientKeyIdentifier object from a tagged object.
  1495. @param _ato the tagged object holding the object we want.
  1496. @param _explicit true if the object is meant to be explicitly
  1497. tagged false otherwise.
  1498. @exception ArgumentException if the object held by the
  1499. tagged object cannot be converted.
  1500. </member>
  1501. <member name="M:Org.BouncyCastle.Asn1.Cms.RecipientKeyIdentifier.GetInstance(System.Object)">
  1502. return a RecipientKeyIdentifier object from the given object.
  1503. @param _obj the object we want converted.
  1504. @exception ArgumentException if the object cannot be converted.
  1505. </member>
  1506. <member name="M:Org.BouncyCastle.Asn1.Cms.RecipientKeyIdentifier.ToAsn1Object">
  1507. Produce an object suitable for an Asn1OutputStream.
  1508. <pre>
  1509. RecipientKeyIdentifier ::= Sequence {
  1510. subjectKeyIdentifier SubjectKeyIdentifier,
  1511. date GeneralizedTime OPTIONAL,
  1512. other OtherKeyAttribute OPTIONAL
  1513. }
  1514. SubjectKeyIdentifier ::= OCTET STRING
  1515. </pre>
  1516. </member>
  1517. <member name="M:Org.BouncyCastle.Asn1.Cms.ScvpReqRes.ToAsn1Object">
  1518. <pre>
  1519. ScvpReqRes ::= SEQUENCE {
  1520. request [0] EXPLICIT ContentInfo OPTIONAL,
  1521. response ContentInfo }
  1522. </pre>
  1523. @return the ASN.1 primitive representation.
  1524. </member>
  1525. <member name="T:Org.BouncyCastle.Asn1.Cms.SignedData">
  1526. a signed data object.
  1527. </member>
  1528. <member name="M:Org.BouncyCastle.Asn1.Cms.SignedData.ToAsn1Object">
  1529. Produce an object suitable for an Asn1OutputStream.
  1530. <pre>
  1531. SignedData ::= Sequence {
  1532. version CMSVersion,
  1533. digestAlgorithms DigestAlgorithmIdentifiers,
  1534. encapContentInfo EncapsulatedContentInfo,
  1535. certificates [0] IMPLICIT CertificateSet OPTIONAL,
  1536. crls [1] IMPLICIT CertificateRevocationLists OPTIONAL,
  1537. signerInfos SignerInfos
  1538. }
  1539. </pre>
  1540. </member>
  1541. <member name="T:Org.BouncyCastle.Asn1.Cms.SignedDataParser">
  1542. <pre>
  1543. SignedData ::= SEQUENCE {
  1544. version CMSVersion,
  1545. digestAlgorithms DigestAlgorithmIdentifiers,
  1546. encapContentInfo EncapsulatedContentInfo,
  1547. certificates [0] IMPLICIT CertificateSet OPTIONAL,
  1548. crls [1] IMPLICIT CertificateRevocationLists OPTIONAL,
  1549. signerInfos SignerInfos
  1550. }
  1551. </pre>
  1552. </member>
  1553. <member name="M:Org.BouncyCastle.Asn1.Cms.SignerIdentifier.GetInstance(System.Object)">
  1554. return a SignerIdentifier object from the given object.
  1555. @param o the object we want converted.
  1556. @exception ArgumentException if the object cannot be converted.
  1557. </member>
  1558. <member name="M:Org.BouncyCastle.Asn1.Cms.SignerIdentifier.ToAsn1Object">
  1559. Produce an object suitable for an Asn1OutputStream.
  1560. <pre>
  1561. SignerIdentifier ::= CHOICE {
  1562. issuerAndSerialNumber IssuerAndSerialNumber,
  1563. subjectKeyIdentifier [0] SubjectKeyIdentifier
  1564. }
  1565. SubjectKeyIdentifier ::= OCTET STRING
  1566. </pre>
  1567. </member>
  1568. <member name="M:Org.BouncyCastle.Asn1.Cms.SignerInfo.ToAsn1Object">
  1569. Produce an object suitable for an Asn1OutputStream.
  1570. <pre>
  1571. SignerInfo ::= Sequence {
  1572. version Version,
  1573. SignerIdentifier sid,
  1574. digestAlgorithm DigestAlgorithmIdentifier,
  1575. authenticatedAttributes [0] IMPLICIT Attributes OPTIONAL,
  1576. digestEncryptionAlgorithm DigestEncryptionAlgorithmIdentifier,
  1577. encryptedDigest EncryptedDigest,
  1578. unauthenticatedAttributes [1] IMPLICIT Attributes OPTIONAL
  1579. }
  1580. EncryptedDigest ::= OCTET STRING
  1581. DigestAlgorithmIdentifier ::= AlgorithmIdentifier
  1582. DigestEncryptionAlgorithmIdentifier ::= AlgorithmIdentifier
  1583. </pre>
  1584. </member>
  1585. <member name="M:Org.BouncyCastle.Asn1.Cms.Time.#ctor(System.DateTime)">
  1586. creates a time object from a given date - if the date is between 1950
  1587. and 2049 a UTCTime object is Generated, otherwise a GeneralizedTime
  1588. is used.
  1589. </member>
  1590. <member name="M:Org.BouncyCastle.Asn1.Cms.Time.ToAsn1Object">
  1591. Produce an object suitable for an Asn1OutputStream.
  1592. <pre>
  1593. Time ::= CHOICE {
  1594. utcTime UTCTime,
  1595. generalTime GeneralizedTime }
  1596. </pre>
  1597. </member>
  1598. <member name="M:Org.BouncyCastle.Asn1.Cms.TimeStampAndCrl.ToAsn1Object">
  1599. <pre>
  1600. TimeStampAndCRL ::= SEQUENCE {
  1601. timeStamp TimeStampToken, -- according to RFC 3161
  1602. crl CertificateList OPTIONAL -- according to RFC 5280
  1603. }
  1604. </pre>
  1605. @return
  1606. </member>
  1607. <member name="M:Org.BouncyCastle.Asn1.Cms.TimeStampedData.ToAsn1Object">
  1608. <pre>
  1609. TimeStampedData ::= SEQUENCE {
  1610. version INTEGER { v1(1) },
  1611. dataUri IA5String OPTIONAL,
  1612. metaData MetaData OPTIONAL,
  1613. content OCTET STRING OPTIONAL,
  1614. temporalEvidence Evidence
  1615. }
  1616. </pre>
  1617. @return
  1618. </member>
  1619. <member name="M:Org.BouncyCastle.Asn1.Cms.TimeStampTokenEvidence.ToAsn1Object">
  1620. <pre>
  1621. TimeStampTokenEvidence ::=
  1622. SEQUENCE SIZE(1..MAX) OF TimeStampAndCrl
  1623. </pre>
  1624. @return
  1625. </member>
  1626. <member name="M:Org.BouncyCastle.Asn1.Crmf.AttributeTypeAndValue.ToAsn1Object">
  1627. <pre>
  1628. AttributeTypeAndValue ::= SEQUENCE {
  1629. type OBJECT IDENTIFIER,
  1630. value ANY DEFINED BY type }
  1631. </pre>
  1632. @return a basic ASN.1 object representation.
  1633. </member>
  1634. <member name="M:Org.BouncyCastle.Asn1.Crmf.CertId.ToAsn1Object">
  1635. <pre>
  1636. CertId ::= SEQUENCE {
  1637. issuer GeneralName,
  1638. serialNumber INTEGER }
  1639. </pre>
  1640. @return a basic ASN.1 object representation.
  1641. </member>
  1642. <member name="M:Org.BouncyCastle.Asn1.Crmf.CertReqMessages.ToAsn1Object">
  1643. <pre>
  1644. CertReqMessages ::= SEQUENCE SIZE (1..MAX) OF CertReqMsg
  1645. </pre>
  1646. @return a basic ASN.1 object representation.
  1647. </member>
  1648. <member name="M:Org.BouncyCastle.Asn1.Crmf.CertReqMsg.#ctor(Org.BouncyCastle.Asn1.Crmf.CertRequest,Org.BouncyCastle.Asn1.Crmf.ProofOfPossession,Org.BouncyCastle.Asn1.Crmf.AttributeTypeAndValue[])">
  1649. Creates a new CertReqMsg.
  1650. @param certReq CertRequest
  1651. @param popo may be null
  1652. @param regInfo may be null
  1653. </member>
  1654. <member name="M:Org.BouncyCastle.Asn1.Crmf.CertReqMsg.ToAsn1Object">
  1655. <pre>
  1656. CertReqMsg ::= SEQUENCE {
  1657. certReq CertRequest,
  1658. pop ProofOfPossession OPTIONAL,
  1659. -- content depends upon key type
  1660. regInfo SEQUENCE SIZE(1..MAX) OF AttributeTypeAndValue OPTIONAL }
  1661. </pre>
  1662. @return a basic ASN.1 object representation.
  1663. </member>
  1664. <member name="M:Org.BouncyCastle.Asn1.Crmf.CertRequest.ToAsn1Object">
  1665. <pre>
  1666. CertRequest ::= SEQUENCE {
  1667. certReqId INTEGER, -- ID for matching request and reply
  1668. certTemplate CertTemplate, -- Selected fields of cert to be issued
  1669. controls Controls OPTIONAL } -- Attributes affecting issuance
  1670. </pre>
  1671. @return a basic ASN.1 object representation.
  1672. </member>
  1673. <member name="M:Org.BouncyCastle.Asn1.Crmf.CertTemplate.ToAsn1Object">
  1674. <pre>
  1675. CertTemplate ::= SEQUENCE {
  1676. version [0] Version OPTIONAL,
  1677. serialNumber [1] INTEGER OPTIONAL,
  1678. signingAlg [2] AlgorithmIdentifier OPTIONAL,
  1679. issuer [3] Name OPTIONAL,
  1680. validity [4] OptionalValidity OPTIONAL,
  1681. subject [5] Name OPTIONAL,
  1682. publicKey [6] SubjectPublicKeyInfo OPTIONAL,
  1683. issuerUID [7] UniqueIdentifier OPTIONAL,
  1684. subjectUID [8] UniqueIdentifier OPTIONAL,
  1685. extensions [9] Extensions OPTIONAL }
  1686. </pre>
  1687. @return a basic ASN.1 object representation.
  1688. </member>
  1689. <member name="M:Org.BouncyCastle.Asn1.Crmf.CertTemplateBuilder.SetVersion(System.Int32)">
  1690. Sets the X.509 version. Note: for X509v3, use 2 here.
  1691. </member>
  1692. <member name="M:Org.BouncyCastle.Asn1.Crmf.CertTemplateBuilder.SetIssuerUID(Org.BouncyCastle.Asn1.DerBitString)">
  1693. Sets the issuer unique ID (deprecated in X.509v3)
  1694. </member>
  1695. <member name="M:Org.BouncyCastle.Asn1.Crmf.CertTemplateBuilder.SetSubjectUID(Org.BouncyCastle.Asn1.DerBitString)">
  1696. Sets the subject unique ID (deprecated in X.509v3)
  1697. </member>
  1698. <member name="M:Org.BouncyCastle.Asn1.Crmf.CertTemplateBuilder.Build">
  1699. <pre>
  1700. CertTemplate ::= SEQUENCE {
  1701. version [0] Version OPTIONAL,
  1702. serialNumber [1] INTEGER OPTIONAL,
  1703. signingAlg [2] AlgorithmIdentifier OPTIONAL,
  1704. issuer [3] Name OPTIONAL,
  1705. validity [4] OptionalValidity OPTIONAL,
  1706. subject [5] Name OPTIONAL,
  1707. publicKey [6] SubjectPublicKeyInfo OPTIONAL,
  1708. issuerUID [7] UniqueIdentifier OPTIONAL,
  1709. subjectUID [8] UniqueIdentifier OPTIONAL,
  1710. extensions [9] Extensions OPTIONAL }
  1711. </pre>
  1712. @return a basic ASN.1 object representation.
  1713. </member>
  1714. <member name="M:Org.BouncyCastle.Asn1.Crmf.Controls.ToAsn1Object">
  1715. <pre>
  1716. Controls ::= SEQUENCE SIZE(1..MAX) OF AttributeTypeAndValue
  1717. </pre>
  1718. @return a basic ASN.1 object representation.
  1719. </member>
  1720. <member name="M:Org.BouncyCastle.Asn1.Crmf.EncKeyWithID.ToAsn1Object">
  1721. <pre>
  1722. EncKeyWithID ::= SEQUENCE {
  1723. privateKey PrivateKeyInfo,
  1724. identifier CHOICE {
  1725. string UTF8String,
  1726. generalName GeneralName
  1727. } OPTIONAL
  1728. }
  1729. </pre>
  1730. @return
  1731. </member>
  1732. <member name="M:Org.BouncyCastle.Asn1.Crmf.EncryptedKey.ToAsn1Object">
  1733. <pre>
  1734. EncryptedKey ::= CHOICE {
  1735. encryptedValue EncryptedValue, -- deprecated
  1736. envelopedData [0] EnvelopedData }
  1737. -- The encrypted private key MUST be placed in the envelopedData
  1738. -- encryptedContentInfo encryptedContent OCTET STRING.
  1739. </pre>
  1740. </member>
  1741. <member name="M:Org.BouncyCastle.Asn1.Crmf.EncryptedValue.ToAsn1Object">
  1742. <pre>
  1743. EncryptedValue ::= SEQUENCE {
  1744. intendedAlg [0] AlgorithmIdentifier OPTIONAL,
  1745. -- the intended algorithm for which the value will be used
  1746. symmAlg [1] AlgorithmIdentifier OPTIONAL,
  1747. -- the symmetric algorithm used to encrypt the value
  1748. encSymmKey [2] BIT STRING OPTIONAL,
  1749. -- the (encrypted) symmetric key used to encrypt the value
  1750. keyAlg [3] AlgorithmIdentifier OPTIONAL,
  1751. -- algorithm used to encrypt the symmetric key
  1752. valueHint [4] OCTET STRING OPTIONAL,
  1753. -- a brief description or identifier of the encValue content
  1754. -- (may be meaningful only to the sending entity, and used only
  1755. -- if EncryptedValue might be re-examined by the sending entity
  1756. -- in the future)
  1757. encValue BIT STRING }
  1758. -- the encrypted value itself
  1759. </pre>
  1760. @return a basic ASN.1 object representation.
  1761. </member>
  1762. <member name="M:Org.BouncyCastle.Asn1.Crmf.OptionalValidity.ToAsn1Object">
  1763. <pre>
  1764. OptionalValidity ::= SEQUENCE {
  1765. notBefore [0] Time OPTIONAL,
  1766. notAfter [1] Time OPTIONAL } --at least one MUST be present
  1767. </pre>
  1768. @return a basic ASN.1 object representation.
  1769. </member>
  1770. <member name="M:Org.BouncyCastle.Asn1.Crmf.PkiArchiveOptions.ToAsn1Object">
  1771. <pre>
  1772. PkiArchiveOptions ::= CHOICE {
  1773. encryptedPrivKey [0] EncryptedKey,
  1774. -- the actual value of the private key
  1775. keyGenParameters [1] KeyGenParameters,
  1776. -- parameters which allow the private key to be re-generated
  1777. archiveRemGenPrivKey [2] BOOLEAN }
  1778. -- set to TRUE if sender wishes receiver to archive the private
  1779. -- key of a key pair that the receiver generates in response to
  1780. -- this request; set to FALSE if no archival is desired.
  1781. </pre>
  1782. </member>
  1783. <member name="M:Org.BouncyCastle.Asn1.Crmf.PkiPublicationInfo.ToAsn1Object">
  1784. <pre>
  1785. PkiPublicationInfo ::= SEQUENCE {
  1786. action INTEGER {
  1787. dontPublish (0),
  1788. pleasePublish (1) },
  1789. pubInfos SEQUENCE SIZE (1..MAX) OF SinglePubInfo OPTIONAL }
  1790. -- pubInfos MUST NOT be present if action is "dontPublish"
  1791. -- (if action is "pleasePublish" and pubInfos is omitted,
  1792. -- "dontCare" is assumed)
  1793. </pre>
  1794. @return a basic ASN.1 object representation.
  1795. </member>
  1796. <member name="T:Org.BouncyCastle.Asn1.Crmf.PKMacValue">
  1797. Password-based MAC value for use with POPOSigningKeyInput.
  1798. </member>
  1799. <member name="M:Org.BouncyCastle.Asn1.Crmf.PKMacValue.#ctor(Org.BouncyCastle.Asn1.Cmp.PbmParameter,Org.BouncyCastle.Asn1.DerBitString)">
  1800. Creates a new PKMACValue.
  1801. @param params parameters for password-based MAC
  1802. @param value MAC of the DER-encoded SubjectPublicKeyInfo
  1803. </member>
  1804. <member name="M:Org.BouncyCastle.Asn1.Crmf.PKMacValue.#ctor(Org.BouncyCastle.Asn1.X509.AlgorithmIdentifier,Org.BouncyCastle.Asn1.DerBitString)">
  1805. Creates a new PKMACValue.
  1806. @param aid CMPObjectIdentifiers.passwordBasedMAC, with PBMParameter
  1807. @param value MAC of the DER-encoded SubjectPublicKeyInfo
  1808. </member>
  1809. <member name="M:Org.BouncyCastle.Asn1.Crmf.PKMacValue.ToAsn1Object">
  1810. <pre>
  1811. PKMACValue ::= SEQUENCE {
  1812. algId AlgorithmIdentifier,
  1813. -- algorithm value shall be PasswordBasedMac 1.2.840.113533.7.66.13
  1814. -- parameter value is PBMParameter
  1815. value BIT STRING }
  1816. </pre>
  1817. @return a basic ASN.1 object representation.
  1818. </member>
  1819. <member name="M:Org.BouncyCastle.Asn1.Crmf.PopoPrivKey.ToAsn1Object">
  1820. <pre>
  1821. PopoPrivKey ::= CHOICE {
  1822. thisMessage [0] BIT STRING, -- Deprecated
  1823. -- possession is proven in this message (which contains the private
  1824. -- key itself (encrypted for the CA))
  1825. subsequentMessage [1] SubsequentMessage,
  1826. -- possession will be proven in a subsequent message
  1827. dhMAC [2] BIT STRING, -- Deprecated
  1828. agreeMAC [3] PKMACValue,
  1829. encryptedKey [4] EnvelopedData }
  1830. </pre>
  1831. </member>
  1832. <member name="M:Org.BouncyCastle.Asn1.Crmf.PopoSigningKey.#ctor(Org.BouncyCastle.Asn1.Crmf.PopoSigningKeyInput,Org.BouncyCastle.Asn1.X509.AlgorithmIdentifier,Org.BouncyCastle.Asn1.DerBitString)">
  1833. Creates a new Proof of Possession object for a signing key.
  1834. @param poposkIn the PopoSigningKeyInput structure, or null if the
  1835. CertTemplate includes both subject and publicKey values.
  1836. @param aid the AlgorithmIdentifier used to sign the proof of possession.
  1837. @param signature a signature over the DER-encoded value of poposkIn,
  1838. or the DER-encoded value of certReq if poposkIn is null.
  1839. </member>
  1840. <member name="M:Org.BouncyCastle.Asn1.Crmf.PopoSigningKey.ToAsn1Object">
  1841. <pre>
  1842. PopoSigningKey ::= SEQUENCE {
  1843. poposkInput [0] PopoSigningKeyInput OPTIONAL,
  1844. algorithmIdentifier AlgorithmIdentifier,
  1845. signature BIT STRING }
  1846. -- The signature (using "algorithmIdentifier") is on the
  1847. -- DER-encoded value of poposkInput. NOTE: If the CertReqMsg
  1848. -- certReq CertTemplate contains the subject and publicKey values,
  1849. -- then poposkInput MUST be omitted and the signature MUST be
  1850. -- computed on the DER-encoded value of CertReqMsg certReq. If
  1851. -- the CertReqMsg certReq CertTemplate does not contain the public
  1852. -- key and subject values, then poposkInput MUST be present and
  1853. -- MUST be signed. This strategy ensures that the public key is
  1854. -- not present in both the poposkInput and CertReqMsg certReq
  1855. -- CertTemplate fields.
  1856. </pre>
  1857. @return a basic ASN.1 object representation.
  1858. </member>
  1859. <member name="M:Org.BouncyCastle.Asn1.Crmf.PopoSigningKeyInput.#ctor(Org.BouncyCastle.Asn1.X509.GeneralName,Org.BouncyCastle.Asn1.X509.SubjectPublicKeyInfo)">
  1860. Creates a new PopoSigningKeyInput with sender name as authInfo.
  1861. </member>
  1862. <member name="M:Org.BouncyCastle.Asn1.Crmf.PopoSigningKeyInput.#ctor(Org.BouncyCastle.Asn1.Crmf.PKMacValue,Org.BouncyCastle.Asn1.X509.SubjectPublicKeyInfo)">
  1863. Creates a new PopoSigningKeyInput using password-based MAC.
  1864. </member>
  1865. <member name="P:Org.BouncyCastle.Asn1.Crmf.PopoSigningKeyInput.Sender">
  1866. Returns the sender field, or null if authInfo is publicKeyMac
  1867. </member>
  1868. <member name="P:Org.BouncyCastle.Asn1.Crmf.PopoSigningKeyInput.PublicKeyMac">
  1869. Returns the publicKeyMac field, or null if authInfo is sender
  1870. </member>
  1871. <member name="M:Org.BouncyCastle.Asn1.Crmf.PopoSigningKeyInput.ToAsn1Object">
  1872. <pre>
  1873. PopoSigningKeyInput ::= SEQUENCE {
  1874. authInfo CHOICE {
  1875. sender [0] GeneralName,
  1876. -- used only if an authenticated identity has been
  1877. -- established for the sender (e.g., a DN from a
  1878. -- previously-issued and currently-valid certificate
  1879. publicKeyMac PKMacValue },
  1880. -- used if no authenticated GeneralName currently exists for
  1881. -- the sender; publicKeyMac contains a password-based MAC
  1882. -- on the DER-encoded value of publicKey
  1883. publicKey SubjectPublicKeyInfo } -- from CertTemplate
  1884. </pre>
  1885. @return a basic ASN.1 object representation.
  1886. </member>
  1887. <member name="M:Org.BouncyCastle.Asn1.Crmf.ProofOfPossession.#ctor">
  1888. Creates a ProofOfPossession with type raVerified.
  1889. </member>
  1890. <member name="M:Org.BouncyCastle.Asn1.Crmf.ProofOfPossession.#ctor(Org.BouncyCastle.Asn1.Crmf.PopoSigningKey)">
  1891. Creates a ProofOfPossession for a signing key.
  1892. </member>
  1893. <member name="M:Org.BouncyCastle.Asn1.Crmf.ProofOfPossession.#ctor(System.Int32,Org.BouncyCastle.Asn1.Crmf.PopoPrivKey)">
  1894. Creates a ProofOfPossession for key encipherment or agreement.
  1895. @param type one of TYPE_KEY_ENCIPHERMENT or TYPE_KEY_AGREEMENT
  1896. </member>
  1897. <member name="M:Org.BouncyCastle.Asn1.Crmf.ProofOfPossession.ToAsn1Object">
  1898. <pre>
  1899. ProofOfPossession ::= CHOICE {
  1900. raVerified [0] NULL,
  1901. -- used if the RA has already verified that the requester is in
  1902. -- possession of the private key
  1903. signature [1] PopoSigningKey,
  1904. keyEncipherment [2] PopoPrivKey,
  1905. keyAgreement [3] PopoPrivKey }
  1906. </pre>
  1907. @return a basic ASN.1 object representation.
  1908. </member>
  1909. <member name="M:Org.BouncyCastle.Asn1.Crmf.SinglePubInfo.ToAsn1Object">
  1910. <pre>
  1911. SinglePubInfo ::= SEQUENCE {
  1912. pubMethod INTEGER {
  1913. dontCare (0),
  1914. x500 (1),
  1915. web (2),
  1916. ldap (3) },
  1917. pubLocation GeneralName OPTIONAL }
  1918. </pre>
  1919. @return a basic ASN.1 object representation.
  1920. </member>
  1921. <member name="T:Org.BouncyCastle.Asn1.CryptoPro.ECGost3410NamedCurves">
  1922. <summary>
  1923. Table of the available named parameters for GOST 3410-2001 / 2012.
  1924. </summary>
  1925. </member>
  1926. <member name="M:Org.BouncyCastle.Asn1.CryptoPro.ECGost3410NamedCurves.GetByOid(Org.BouncyCastle.Asn1.DerObjectIdentifier)">
  1927. return the ECDomainParameters object for the given OID, null if it
  1928. isn't present.
  1929. @param oid an object identifier representing a named parameters, if present.
  1930. </member>
  1931. <member name="P:Org.BouncyCastle.Asn1.CryptoPro.ECGost3410NamedCurves.Names">
  1932. returns an enumeration containing the name strings for curves
  1933. contained in this structure.
  1934. </member>
  1935. <member name="M:Org.BouncyCastle.Asn1.CryptoPro.ECGost3410NamedCurves.GetName(Org.BouncyCastle.Asn1.DerObjectIdentifier)">
  1936. return the named curve name represented by the given object identifier.
  1937. </member>
  1938. <member name="M:Org.BouncyCastle.Asn1.CryptoPro.Gost28147Parameters.ToAsn1Object">
  1939. <pre>
  1940. Gost28147-89-Parameters ::=
  1941. SEQUENCE {
  1942. iv Gost28147-89-IV,
  1943. encryptionParamSet OBJECT IDENTIFIER
  1944. }
  1945. Gost28147-89-IV ::= OCTET STRING (SIZE (8))
  1946. </pre>
  1947. </member>
  1948. <member name="T:Org.BouncyCastle.Asn1.CryptoPro.Gost3410NamedParameters">
  1949. table of the available named parameters for GOST 3410-94.
  1950. </member>
  1951. <member name="M:Org.BouncyCastle.Asn1.CryptoPro.Gost3410NamedParameters.GetByOid(Org.BouncyCastle.Asn1.DerObjectIdentifier)">
  1952. return the GOST3410ParamSetParameters object for the given OID, null if it
  1953. isn't present.
  1954. @param oid an object identifier representing a named parameters, if present.
  1955. </member>
  1956. <member name="P:Org.BouncyCastle.Asn1.CryptoPro.Gost3410NamedParameters.Names">
  1957. returns an enumeration containing the name strings for parameters
  1958. contained in this structure.
  1959. </member>
  1960. <member name="T:Org.BouncyCastle.Asn1.DerApplicationSpecific">
  1961. Base class for an application specific object
  1962. </member>
  1963. <member name="M:Org.BouncyCastle.Asn1.DerApplicationSpecific.GetObject">
  1964. Return the enclosed object assuming explicit tagging.
  1965. @return the resulting object
  1966. @throws IOException if reconstruction fails.
  1967. </member>
  1968. <member name="M:Org.BouncyCastle.Asn1.DerApplicationSpecific.GetObject(System.Int32)">
  1969. Return the enclosed object assuming implicit tagging.
  1970. @param derTagNo the type tag that should be applied to the object's contents.
  1971. @return the resulting object
  1972. @throws IOException if reconstruction fails.
  1973. </member>
  1974. <member name="M:Org.BouncyCastle.Asn1.DerBitString.GetInstance(System.Object)">
  1975. return a Bit string from the passed in object
  1976. @exception ArgumentException if the object cannot be converted.
  1977. </member>
  1978. <member name="M:Org.BouncyCastle.Asn1.DerBitString.GetInstance(Org.BouncyCastle.Asn1.Asn1TaggedObject,System.Boolean)">
  1979. return a Bit string from a tagged object.
  1980. @param obj the tagged object holding the object we want
  1981. @param explicitly true if the object is meant to be explicitly
  1982. tagged false otherwise.
  1983. @exception ArgumentException if the tagged object cannot
  1984. be converted.
  1985. </member>
  1986. <member name="M:Org.BouncyCastle.Asn1.DerBitString.#ctor(System.Byte[],System.Int32)">
  1987. @param data the octets making up the bit string.
  1988. @param padBits the number of extra bits at the end of the string.
  1989. </member>
  1990. <member name="M:Org.BouncyCastle.Asn1.DerBitString.GetOctets">
  1991. Return the octets contained in this BIT STRING, checking that this BIT STRING really
  1992. does represent an octet aligned string. Only use this method when the standard you are
  1993. following dictates that the BIT STRING will be octet aligned.
  1994. @return a copy of the octet aligned data.
  1995. </member>
  1996. <member name="P:Org.BouncyCastle.Asn1.DerBitString.IntValue">
  1997. @return the value of the bit string as an int (truncating if necessary)
  1998. </member>
  1999. <member name="T:Org.BouncyCastle.Asn1.DerBmpString">
  2000. Der BMPString object.
  2001. </member>
  2002. <member name="M:Org.BouncyCastle.Asn1.DerBmpString.GetInstance(System.Object)">
  2003. return a BMP string from the given object.
  2004. @param obj the object we want converted.
  2005. @exception ArgumentException if the object cannot be converted.
  2006. </member>
  2007. <member name="M:Org.BouncyCastle.Asn1.DerBmpString.GetInstance(Org.BouncyCastle.Asn1.Asn1TaggedObject,System.Boolean)">
  2008. return a BMP string from a tagged object.
  2009. @param obj the tagged object holding the object we want
  2010. @param explicitly true if the object is meant to be explicitly
  2011. tagged false otherwise.
  2012. @exception ArgumentException if the tagged object cannot
  2013. be converted.
  2014. </member>
  2015. <member name="M:Org.BouncyCastle.Asn1.DerBmpString.#ctor(System.Byte[])">
  2016. basic constructor - byte encoded string.
  2017. </member>
  2018. <member name="M:Org.BouncyCastle.Asn1.DerBmpString.#ctor(System.String)">
  2019. basic constructor
  2020. </member>
  2021. <member name="M:Org.BouncyCastle.Asn1.DerBoolean.GetInstance(System.Object)">
  2022. return a bool from the passed in object.
  2023. @exception ArgumentException if the object cannot be converted.
  2024. </member>
  2025. <member name="M:Org.BouncyCastle.Asn1.DerBoolean.GetInstance(System.Boolean)">
  2026. return a DerBoolean from the passed in bool.
  2027. </member>
  2028. <member name="M:Org.BouncyCastle.Asn1.DerBoolean.GetInstance(Org.BouncyCastle.Asn1.Asn1TaggedObject,System.Boolean)">
  2029. return a Boolean from a tagged object.
  2030. @param obj the tagged object holding the object we want
  2031. @param explicitly true if the object is meant to be explicitly
  2032. tagged false otherwise.
  2033. @exception ArgumentException if the tagged object cannot
  2034. be converted.
  2035. </member>
  2036. <member name="M:Org.BouncyCastle.Asn1.DerEnumerated.GetInstance(System.Object)">
  2037. return an integer from the passed in object
  2038. @exception ArgumentException if the object cannot be converted.
  2039. </member>
  2040. <member name="M:Org.BouncyCastle.Asn1.DerEnumerated.GetInstance(Org.BouncyCastle.Asn1.Asn1TaggedObject,System.Boolean)">
  2041. return an Enumerated from a tagged object.
  2042. @param obj the tagged object holding the object we want
  2043. @param explicitly true if the object is meant to be explicitly
  2044. tagged false otherwise.
  2045. @exception ArgumentException if the tagged object cannot
  2046. be converted.
  2047. </member>
  2048. <member name="T:Org.BouncyCastle.Asn1.DerExternal">
  2049. Class representing the DER-type External
  2050. </member>
  2051. <member name="M:Org.BouncyCastle.Asn1.DerExternal.#ctor(Org.BouncyCastle.Asn1.DerObjectIdentifier,Org.BouncyCastle.Asn1.DerInteger,Org.BouncyCastle.Asn1.Asn1Object,Org.BouncyCastle.Asn1.DerTaggedObject)">
  2052. Creates a new instance of DerExternal
  2053. See X.690 for more informations about the meaning of these parameters
  2054. @param directReference The direct reference or <code>null</code> if not set.
  2055. @param indirectReference The indirect reference or <code>null</code> if not set.
  2056. @param dataValueDescriptor The data value descriptor or <code>null</code> if not set.
  2057. @param externalData The external data in its encoded form.
  2058. </member>
  2059. <member name="M:Org.BouncyCastle.Asn1.DerExternal.#ctor(Org.BouncyCastle.Asn1.DerObjectIdentifier,Org.BouncyCastle.Asn1.DerInteger,Org.BouncyCastle.Asn1.Asn1Object,System.Int32,Org.BouncyCastle.Asn1.Asn1Object)">
  2060. Creates a new instance of DerExternal.
  2061. See X.690 for more informations about the meaning of these parameters
  2062. @param directReference The direct reference or <code>null</code> if not set.
  2063. @param indirectReference The indirect reference or <code>null</code> if not set.
  2064. @param dataValueDescriptor The data value descriptor or <code>null</code> if not set.
  2065. @param encoding The encoding to be used for the external data
  2066. @param externalData The external data
  2067. </member>
  2068. <member name="P:Org.BouncyCastle.Asn1.DerExternal.Encoding">
  2069. The encoding of the content. Valid values are
  2070. <ul>
  2071. <li><code>0</code> single-ASN1-type</li>
  2072. <li><code>1</code> OCTET STRING</li>
  2073. <li><code>2</code> BIT STRING</li>
  2074. </ul>
  2075. </member>
  2076. <member name="T:Org.BouncyCastle.Asn1.DerGeneralizedTime">
  2077. Generalized time object.
  2078. </member>
  2079. <member name="M:Org.BouncyCastle.Asn1.DerGeneralizedTime.GetInstance(System.Object)">
  2080. return a generalized time from the passed in object
  2081. @exception ArgumentException if the object cannot be converted.
  2082. </member>
  2083. <member name="M:Org.BouncyCastle.Asn1.DerGeneralizedTime.GetInstance(Org.BouncyCastle.Asn1.Asn1TaggedObject,System.Boolean)">
  2084. return a Generalized Time object from a tagged object.
  2085. @param obj the tagged object holding the object we want
  2086. @param explicitly true if the object is meant to be explicitly
  2087. tagged false otherwise.
  2088. @exception ArgumentException if the tagged object cannot
  2089. be converted.
  2090. </member>
  2091. <member name="M:Org.BouncyCastle.Asn1.DerGeneralizedTime.#ctor(System.String)">
  2092. The correct format for this is YYYYMMDDHHMMSS[.f]Z, or without the Z
  2093. for local time, or Z+-HHMM on the end, for difference between local
  2094. time and UTC time. The fractional second amount f must consist of at
  2095. least one number with trailing zeroes removed.
  2096. @param time the time string.
  2097. @exception ArgumentException if string is an illegal format.
  2098. </member>
  2099. <member name="M:Org.BouncyCastle.Asn1.DerGeneralizedTime.#ctor(System.DateTime)">
  2100. base constructor from a local time object
  2101. </member>
  2102. <member name="P:Org.BouncyCastle.Asn1.DerGeneralizedTime.TimeString">
  2103. Return the time.
  2104. @return The time string as it appeared in the encoded object.
  2105. </member>
  2106. <member name="M:Org.BouncyCastle.Asn1.DerGeneralizedTime.GetTime">
  2107. return the time - always in the form of
  2108. YYYYMMDDhhmmssGMT(+hh:mm|-hh:mm).
  2109. <p>
  2110. Normally in a certificate we would expect "Z" rather than "GMT",
  2111. however adding the "GMT" means we can just use:
  2112. <pre>
  2113. dateF = new SimpleDateFormat("yyyyMMddHHmmssz");
  2114. </pre>
  2115. To read in the time and Get a date which is compatible with our local
  2116. time zone.</p>
  2117. </member>
  2118. <member name="M:Org.BouncyCastle.Asn1.DerGraphicString.GetInstance(System.Object)">
  2119. return a Graphic String from the passed in object
  2120. @param obj a DerGraphicString or an object that can be converted into one.
  2121. @exception IllegalArgumentException if the object cannot be converted.
  2122. @return a DerGraphicString instance, or null.
  2123. </member>
  2124. <member name="M:Org.BouncyCastle.Asn1.DerGraphicString.GetInstance(Org.BouncyCastle.Asn1.Asn1TaggedObject,System.Boolean)">
  2125. return a Graphic String from a tagged object.
  2126. @param obj the tagged object holding the object we want
  2127. @param explicit true if the object is meant to be explicitly
  2128. tagged false otherwise.
  2129. @exception IllegalArgumentException if the tagged object cannot
  2130. be converted.
  2131. @return a DerGraphicString instance, or null.
  2132. </member>
  2133. <member name="M:Org.BouncyCastle.Asn1.DerGraphicString.#ctor(System.Byte[])">
  2134. basic constructor - with bytes.
  2135. @param string the byte encoding of the characters making up the string.
  2136. </member>
  2137. <member name="T:Org.BouncyCastle.Asn1.DerIA5String">
  2138. Der IA5String object - this is an ascii string.
  2139. </member>
  2140. <member name="M:Org.BouncyCastle.Asn1.DerIA5String.GetInstance(System.Object)">
  2141. return a IA5 string from the passed in object
  2142. @exception ArgumentException if the object cannot be converted.
  2143. </member>
  2144. <member name="M:Org.BouncyCastle.Asn1.DerIA5String.GetInstance(Org.BouncyCastle.Asn1.Asn1TaggedObject,System.Boolean)">
  2145. return an IA5 string from a tagged object.
  2146. @param obj the tagged object holding the object we want
  2147. @param explicitly true if the object is meant to be explicitly
  2148. tagged false otherwise.
  2149. @exception ArgumentException if the tagged object cannot
  2150. be converted.
  2151. </member>
  2152. <member name="M:Org.BouncyCastle.Asn1.DerIA5String.#ctor(System.Byte[])">
  2153. basic constructor - with bytes.
  2154. </member>
  2155. <member name="M:Org.BouncyCastle.Asn1.DerIA5String.#ctor(System.String)">
  2156. basic constructor - without validation.
  2157. </member>
  2158. <member name="M:Org.BouncyCastle.Asn1.DerIA5String.#ctor(System.String,System.Boolean)">
  2159. Constructor with optional validation.
  2160. @param string the base string to wrap.
  2161. @param validate whether or not to check the string.
  2162. @throws ArgumentException if validate is true and the string
  2163. contains characters that should not be in an IA5String.
  2164. </member>
  2165. <member name="M:Org.BouncyCastle.Asn1.DerIA5String.IsIA5String(System.String)">
  2166. return true if the passed in String can be represented without
  2167. loss as an IA5String, false otherwise.
  2168. @return true if in printable set, false otherwise.
  2169. </member>
  2170. <member name="M:Org.BouncyCastle.Asn1.DerInteger.GetInstance(System.Object)">
  2171. return an integer from the passed in object
  2172. @exception ArgumentException if the object cannot be converted.
  2173. </member>
  2174. <member name="M:Org.BouncyCastle.Asn1.DerInteger.GetInstance(Org.BouncyCastle.Asn1.Asn1TaggedObject,System.Boolean)">
  2175. return an Integer from a tagged object.
  2176. @param obj the tagged object holding the object we want
  2177. @param isExplicit true if the object is meant to be explicitly
  2178. tagged false otherwise.
  2179. @exception ArgumentException if the tagged object cannot
  2180. be converted.
  2181. </member>
  2182. <member name="P:Org.BouncyCastle.Asn1.DerInteger.PositiveValue">
  2183. in some cases positive values Get crammed into a space,
  2184. that's not quite big enough...
  2185. </member>
  2186. <member name="M:Org.BouncyCastle.Asn1.DerInteger.IsMalformed(System.Byte[])">
  2187. Apply the correct validation for an INTEGER primitive following the BER rules.
  2188. @param bytes The raw encoding of the integer.
  2189. @return true if the (in)put fails this validation.
  2190. </member>
  2191. <member name="T:Org.BouncyCastle.Asn1.DerNull">
  2192. A Null object.
  2193. </member>
  2194. <member name="T:Org.BouncyCastle.Asn1.DerNumericString">
  2195. Der NumericString object - this is an ascii string of characters {0,1,2,3,4,5,6,7,8,9, }.
  2196. </member>
  2197. <member name="M:Org.BouncyCastle.Asn1.DerNumericString.GetInstance(System.Object)">
  2198. return a Numeric string from the passed in object
  2199. @exception ArgumentException if the object cannot be converted.
  2200. </member>
  2201. <member name="M:Org.BouncyCastle.Asn1.DerNumericString.GetInstance(Org.BouncyCastle.Asn1.Asn1TaggedObject,System.Boolean)">
  2202. return an Numeric string from a tagged object.
  2203. @param obj the tagged object holding the object we want
  2204. @param explicitly true if the object is meant to be explicitly
  2205. tagged false otherwise.
  2206. @exception ArgumentException if the tagged object cannot
  2207. be converted.
  2208. </member>
  2209. <member name="M:Org.BouncyCastle.Asn1.DerNumericString.#ctor(System.Byte[])">
  2210. basic constructor - with bytes.
  2211. </member>
  2212. <member name="M:Org.BouncyCastle.Asn1.DerNumericString.#ctor(System.String)">
  2213. basic constructor - without validation..
  2214. </member>
  2215. <member name="M:Org.BouncyCastle.Asn1.DerNumericString.#ctor(System.String,System.Boolean)">
  2216. Constructor with optional validation.
  2217. @param string the base string to wrap.
  2218. @param validate whether or not to check the string.
  2219. @throws ArgumentException if validate is true and the string
  2220. contains characters that should not be in a NumericString.
  2221. </member>
  2222. <member name="M:Org.BouncyCastle.Asn1.DerNumericString.IsNumericString(System.String)">
  2223. Return true if the string can be represented as a NumericString ('0'..'9', ' ')
  2224. @param str string to validate.
  2225. @return true if numeric, fale otherwise.
  2226. </member>
  2227. <member name="M:Org.BouncyCastle.Asn1.DerObjectIdentifier.GetInstance(System.Object)">
  2228. return an Oid from the passed in object
  2229. @exception ArgumentException if the object cannot be converted.
  2230. </member>
  2231. <member name="M:Org.BouncyCastle.Asn1.DerObjectIdentifier.GetInstance(Org.BouncyCastle.Asn1.Asn1TaggedObject,System.Boolean)">
  2232. return an object Identifier from a tagged object.
  2233. @param obj the tagged object holding the object we want
  2234. @param explicitly true if the object is meant to be explicitly
  2235. tagged false otherwise.
  2236. @exception ArgumentException if the tagged object cannot
  2237. be converted.
  2238. </member>
  2239. <member name="M:Org.BouncyCastle.Asn1.DerObjectIdentifier.On(Org.BouncyCastle.Asn1.DerObjectIdentifier)">
  2240. Return true if this oid is an extension of the passed in branch, stem.
  2241. @param stem the arc or branch that is a possible parent.
  2242. @return true if the branch is on the passed in stem, false otherwise.
  2243. </member>
  2244. <member name="M:Org.BouncyCastle.Asn1.DerOctetString.#ctor(System.Byte[])">
  2245. <param name="str">The octets making up the octet string.</param>
  2246. </member>
  2247. <member name="T:Org.BouncyCastle.Asn1.DerPrintableString">
  2248. Der PrintableString object.
  2249. </member>
  2250. <member name="M:Org.BouncyCastle.Asn1.DerPrintableString.GetInstance(System.Object)">
  2251. return a printable string from the passed in object.
  2252. @exception ArgumentException if the object cannot be converted.
  2253. </member>
  2254. <member name="M:Org.BouncyCastle.Asn1.DerPrintableString.GetInstance(Org.BouncyCastle.Asn1.Asn1TaggedObject,System.Boolean)">
  2255. return a Printable string from a tagged object.
  2256. @param obj the tagged object holding the object we want
  2257. @param explicitly true if the object is meant to be explicitly
  2258. tagged false otherwise.
  2259. @exception ArgumentException if the tagged object cannot
  2260. be converted.
  2261. </member>
  2262. <member name="M:Org.BouncyCastle.Asn1.DerPrintableString.#ctor(System.Byte[])">
  2263. basic constructor - byte encoded string.
  2264. </member>
  2265. <member name="M:Org.BouncyCastle.Asn1.DerPrintableString.#ctor(System.String)">
  2266. basic constructor - this does not validate the string
  2267. </member>
  2268. <member name="M:Org.BouncyCastle.Asn1.DerPrintableString.#ctor(System.String,System.Boolean)">
  2269. Constructor with optional validation.
  2270. @param string the base string to wrap.
  2271. @param validate whether or not to check the string.
  2272. @throws ArgumentException if validate is true and the string
  2273. contains characters that should not be in a PrintableString.
  2274. </member>
  2275. <member name="M:Org.BouncyCastle.Asn1.DerPrintableString.IsPrintableString(System.String)">
  2276. return true if the passed in String can be represented without
  2277. loss as a PrintableString, false otherwise.
  2278. @return true if in printable set, false otherwise.
  2279. </member>
  2280. <member name="M:Org.BouncyCastle.Asn1.DerSequence.#ctor">
  2281. create an empty sequence
  2282. </member>
  2283. <member name="M:Org.BouncyCastle.Asn1.DerSequence.#ctor(Org.BouncyCastle.Asn1.Asn1Encodable)">
  2284. create a sequence containing one object
  2285. </member>
  2286. <member name="M:Org.BouncyCastle.Asn1.DerSequence.#ctor(Org.BouncyCastle.Asn1.Asn1EncodableVector)">
  2287. create a sequence containing a vector of objects.
  2288. </member>
  2289. <member name="T:Org.BouncyCastle.Asn1.DerSet">
  2290. A Der encoded set object
  2291. </member>
  2292. <member name="M:Org.BouncyCastle.Asn1.DerSet.#ctor">
  2293. create an empty set
  2294. </member>
  2295. <member name="M:Org.BouncyCastle.Asn1.DerSet.#ctor(Org.BouncyCastle.Asn1.Asn1Encodable)">
  2296. @param obj - a single object that makes up the set.
  2297. </member>
  2298. <member name="M:Org.BouncyCastle.Asn1.DerSet.#ctor(Org.BouncyCastle.Asn1.Asn1EncodableVector)">
  2299. @param v - a vector of objects making up the set.
  2300. </member>
  2301. <member name="T:Org.BouncyCastle.Asn1.DerT61String">
  2302. Der T61String (also the teletex string) - 8-bit characters
  2303. </member>
  2304. <member name="M:Org.BouncyCastle.Asn1.DerT61String.GetInstance(System.Object)">
  2305. return a T61 string from the passed in object.
  2306. @exception ArgumentException if the object cannot be converted.
  2307. </member>
  2308. <member name="M:Org.BouncyCastle.Asn1.DerT61String.GetInstance(Org.BouncyCastle.Asn1.Asn1TaggedObject,System.Boolean)">
  2309. return an T61 string from a tagged object.
  2310. @param obj the tagged object holding the object we want
  2311. @param explicitly true if the object is meant to be explicitly
  2312. tagged false otherwise.
  2313. @exception ArgumentException if the tagged object cannot
  2314. be converted.
  2315. </member>
  2316. <member name="M:Org.BouncyCastle.Asn1.DerT61String.#ctor(System.Byte[])">
  2317. basic constructor - with bytes.
  2318. </member>
  2319. <member name="M:Org.BouncyCastle.Asn1.DerT61String.#ctor(System.String)">
  2320. basic constructor - with string.
  2321. </member>
  2322. <member name="T:Org.BouncyCastle.Asn1.DerTaggedObject">
  2323. DER TaggedObject - in ASN.1 notation this is any object preceded by
  2324. a [n] where n is some number - these are assumed to follow the construction
  2325. rules (as with sequences).
  2326. </member>
  2327. <member name="M:Org.BouncyCastle.Asn1.DerTaggedObject.#ctor(System.Int32,Org.BouncyCastle.Asn1.Asn1Encodable)">
  2328. @param tagNo the tag number for this object.
  2329. @param obj the tagged object.
  2330. </member>
  2331. <member name="M:Org.BouncyCastle.Asn1.DerTaggedObject.#ctor(System.Boolean,System.Int32,Org.BouncyCastle.Asn1.Asn1Encodable)">
  2332. @param explicitly true if an explicitly tagged object.
  2333. @param tagNo the tag number for this object.
  2334. @param obj the tagged object.
  2335. </member>
  2336. <member name="M:Org.BouncyCastle.Asn1.DerTaggedObject.#ctor(System.Int32)">
  2337. create an implicitly tagged object that contains a zero
  2338. length sequence.
  2339. </member>
  2340. <member name="T:Org.BouncyCastle.Asn1.DerUniversalString">
  2341. Der UniversalString object.
  2342. </member>
  2343. <member name="M:Org.BouncyCastle.Asn1.DerUniversalString.GetInstance(System.Object)">
  2344. return a Universal string from the passed in object.
  2345. @exception ArgumentException if the object cannot be converted.
  2346. </member>
  2347. <member name="M:Org.BouncyCastle.Asn1.DerUniversalString.GetInstance(Org.BouncyCastle.Asn1.Asn1TaggedObject,System.Boolean)">
  2348. return a Universal string from a tagged object.
  2349. @param obj the tagged object holding the object we want
  2350. @param explicitly true if the object is meant to be explicitly
  2351. tagged false otherwise.
  2352. @exception ArgumentException if the tagged object cannot
  2353. be converted.
  2354. </member>
  2355. <member name="M:Org.BouncyCastle.Asn1.DerUniversalString.#ctor(System.Byte[])">
  2356. basic constructor - byte encoded string.
  2357. </member>
  2358. <member name="T:Org.BouncyCastle.Asn1.DerUtcTime">
  2359. UTC time object.
  2360. </member>
  2361. <member name="M:Org.BouncyCastle.Asn1.DerUtcTime.GetInstance(System.Object)">
  2362. return an UTC Time from the passed in object.
  2363. @exception ArgumentException if the object cannot be converted.
  2364. </member>
  2365. <member name="M:Org.BouncyCastle.Asn1.DerUtcTime.GetInstance(Org.BouncyCastle.Asn1.Asn1TaggedObject,System.Boolean)">
  2366. return an UTC Time from a tagged object.
  2367. @param obj the tagged object holding the object we want
  2368. @param explicitly true if the object is meant to be explicitly
  2369. tagged false otherwise.
  2370. @exception ArgumentException if the tagged object cannot
  2371. be converted.
  2372. </member>
  2373. <member name="M:Org.BouncyCastle.Asn1.DerUtcTime.#ctor(System.String)">
  2374. The correct format for this is YYMMDDHHMMSSZ (it used to be that seconds were
  2375. never encoded. When you're creating one of these objects from scratch, that's
  2376. what you want to use, otherwise we'll try to deal with whatever Gets read from
  2377. the input stream... (this is why the input format is different from the GetTime()
  2378. method output).
  2379. <p>
  2380. @param time the time string.</p>
  2381. </member>
  2382. <member name="M:Org.BouncyCastle.Asn1.DerUtcTime.#ctor(System.DateTime)">
  2383. base constructor from a DateTime object
  2384. </member>
  2385. <member name="M:Org.BouncyCastle.Asn1.DerUtcTime.ToDateTime">
  2386. return the time as a date based on whatever a 2 digit year will return. For
  2387. standardised processing use ToAdjustedDateTime().
  2388. @return the resulting date
  2389. @exception ParseException if the date string cannot be parsed.
  2390. </member>
  2391. <member name="M:Org.BouncyCastle.Asn1.DerUtcTime.ToAdjustedDateTime">
  2392. return the time as an adjusted date
  2393. in the range of 1950 - 2049.
  2394. @return a date in the range of 1950 to 2049.
  2395. @exception ParseException if the date string cannot be parsed.
  2396. </member>
  2397. <member name="P:Org.BouncyCastle.Asn1.DerUtcTime.TimeString">
  2398. return the time - always in the form of
  2399. YYMMDDhhmmssGMT(+hh:mm|-hh:mm).
  2400. <p>
  2401. Normally in a certificate we would expect "Z" rather than "GMT",
  2402. however adding the "GMT" means we can just use:
  2403. <pre>
  2404. dateF = new SimpleDateFormat("yyMMddHHmmssz");
  2405. </pre>
  2406. To read in the time and Get a date which is compatible with our local
  2407. time zone.</p>
  2408. <p>
  2409. <b>Note:</b> In some cases, due to the local date processing, this
  2410. may lead to unexpected results. If you want to stick the normal
  2411. convention of 1950 to 2049 use the GetAdjustedTime() method.</p>
  2412. </member>
  2413. <member name="P:Org.BouncyCastle.Asn1.DerUtcTime.AdjustedTimeString">
  2414. <summary>
  2415. Return a time string as an adjusted date with a 4 digit year.
  2416. This goes in the range of 1950 - 2049.
  2417. </summary>
  2418. </member>
  2419. <member name="T:Org.BouncyCastle.Asn1.DerUtf8String">
  2420. Der UTF8String object.
  2421. </member>
  2422. <member name="M:Org.BouncyCastle.Asn1.DerUtf8String.GetInstance(System.Object)">
  2423. return an UTF8 string from the passed in object.
  2424. @exception ArgumentException if the object cannot be converted.
  2425. </member>
  2426. <member name="M:Org.BouncyCastle.Asn1.DerUtf8String.GetInstance(Org.BouncyCastle.Asn1.Asn1TaggedObject,System.Boolean)">
  2427. return an UTF8 string from a tagged object.
  2428. @param obj the tagged object holding the object we want
  2429. @param explicitly true if the object is meant to be explicitly
  2430. tagged false otherwise.
  2431. @exception ArgumentException if the tagged object cannot
  2432. be converted.
  2433. </member>
  2434. <member name="M:Org.BouncyCastle.Asn1.DerUtf8String.#ctor(System.Byte[])">
  2435. basic constructor - byte encoded string.
  2436. </member>
  2437. <member name="M:Org.BouncyCastle.Asn1.DerUtf8String.#ctor(System.String)">
  2438. basic constructor
  2439. </member>
  2440. <member name="M:Org.BouncyCastle.Asn1.DerVideotexString.GetInstance(System.Object)">
  2441. return a Videotex String from the passed in object
  2442. @param obj a DERVideotexString or an object that can be converted into one.
  2443. @exception IllegalArgumentException if the object cannot be converted.
  2444. @return a DERVideotexString instance, or null.
  2445. </member>
  2446. <member name="M:Org.BouncyCastle.Asn1.DerVideotexString.GetInstance(Org.BouncyCastle.Asn1.Asn1TaggedObject,System.Boolean)">
  2447. return a Videotex String from a tagged object.
  2448. @param obj the tagged object holding the object we want
  2449. @param explicit true if the object is meant to be explicitly
  2450. tagged false otherwise.
  2451. @exception IllegalArgumentException if the tagged object cannot
  2452. be converted.
  2453. @return a DERVideotexString instance, or null.
  2454. </member>
  2455. <member name="M:Org.BouncyCastle.Asn1.DerVideotexString.#ctor(System.Byte[])">
  2456. basic constructor - with bytes.
  2457. @param string the byte encoding of the characters making up the string.
  2458. </member>
  2459. <member name="T:Org.BouncyCastle.Asn1.DerVisibleString">
  2460. Der VisibleString object.
  2461. </member>
  2462. <member name="M:Org.BouncyCastle.Asn1.DerVisibleString.GetInstance(System.Object)">
  2463. return a Visible string from the passed in object.
  2464. @exception ArgumentException if the object cannot be converted.
  2465. </member>
  2466. <member name="M:Org.BouncyCastle.Asn1.DerVisibleString.GetInstance(Org.BouncyCastle.Asn1.Asn1TaggedObject,System.Boolean)">
  2467. return a Visible string from a tagged object.
  2468. @param obj the tagged object holding the object we want
  2469. @param explicitly true if the object is meant to be explicitly
  2470. tagged false otherwise.
  2471. @exception ArgumentException if the tagged object cannot
  2472. be converted.
  2473. </member>
  2474. <member name="M:Org.BouncyCastle.Asn1.DerVisibleString.#ctor(System.Byte[])">
  2475. basic constructor - byte encoded string.
  2476. </member>
  2477. <member name="M:Org.BouncyCastle.Asn1.DerVisibleString.#ctor(System.String)">
  2478. basic constructor
  2479. </member>
  2480. <member name="T:Org.BouncyCastle.Asn1.EdEC.EdECObjectIdentifiers">
  2481. Edwards Elliptic Curve Object Identifiers (RFC 8410)
  2482. </member>
  2483. <member name="T:Org.BouncyCastle.Asn1.Esf.CertificateValues">
  2484. <remarks>
  2485. RFC 3126: 4.3.1 Certificate Values Attribute Definition
  2486. <code>
  2487. CertificateValues ::= SEQUENCE OF Certificate
  2488. </code>
  2489. </remarks>
  2490. </member>
  2491. <member name="M:Org.BouncyCastle.Asn1.Esf.CommitmentTypeIndication.ToAsn1Object">
  2492. <pre>
  2493. CommitmentTypeIndication ::= SEQUENCE {
  2494. commitmentTypeId CommitmentTypeIdentifier,
  2495. commitmentTypeQualifier SEQUENCE SIZE (1..MAX) OF
  2496. CommitmentTypeQualifier OPTIONAL }
  2497. </pre>
  2498. </member>
  2499. <member name="T:Org.BouncyCastle.Asn1.Esf.CommitmentTypeQualifier">
  2500. Commitment type qualifiers, used in the Commitment-Type-Indication attribute (RFC3126).
  2501. <pre>
  2502. CommitmentTypeQualifier ::= SEQUENCE {
  2503. commitmentTypeIdentifier CommitmentTypeIdentifier,
  2504. qualifier ANY DEFINED BY commitmentTypeIdentifier OPTIONAL }
  2505. </pre>
  2506. </member>
  2507. <member name="M:Org.BouncyCastle.Asn1.Esf.CommitmentTypeQualifier.#ctor(Org.BouncyCastle.Asn1.DerObjectIdentifier)">
  2508. Creates a new <code>CommitmentTypeQualifier</code> instance.
  2509. @param commitmentTypeIdentifier a <code>CommitmentTypeIdentifier</code> value
  2510. </member>
  2511. <member name="M:Org.BouncyCastle.Asn1.Esf.CommitmentTypeQualifier.#ctor(Org.BouncyCastle.Asn1.DerObjectIdentifier,Org.BouncyCastle.Asn1.Asn1Encodable)">
  2512. Creates a new <code>CommitmentTypeQualifier</code> instance.
  2513. @param commitmentTypeIdentifier a <code>CommitmentTypeIdentifier</code> value
  2514. @param qualifier the qualifier, defined by the above field.
  2515. </member>
  2516. <member name="M:Org.BouncyCastle.Asn1.Esf.CommitmentTypeQualifier.#ctor(Org.BouncyCastle.Asn1.Asn1Sequence)">
  2517. Creates a new <code>CommitmentTypeQualifier</code> instance.
  2518. @param as <code>CommitmentTypeQualifier</code> structure
  2519. encoded as an Asn1Sequence.
  2520. </member>
  2521. <member name="M:Org.BouncyCastle.Asn1.Esf.CommitmentTypeQualifier.ToAsn1Object">
  2522. Returns a DER-encodable representation of this instance.
  2523. @return a <code>Asn1Object</code> value
  2524. </member>
  2525. <member name="T:Org.BouncyCastle.Asn1.Esf.CompleteCertificateRefs">
  2526. <remarks>
  2527. RFC 3126: 4.2.1 Complete Certificate Refs Attribute Definition
  2528. <code>
  2529. CompleteCertificateRefs ::= SEQUENCE OF OtherCertID
  2530. </code>
  2531. </remarks>
  2532. </member>
  2533. <member name="T:Org.BouncyCastle.Asn1.Esf.CompleteRevocationRefs">
  2534. <remarks>
  2535. RFC 3126: 4.2.2 Complete Revocation Refs Attribute Definition
  2536. <code>
  2537. CompleteRevocationRefs ::= SEQUENCE OF CrlOcspRef
  2538. </code>
  2539. </remarks>
  2540. </member>
  2541. <member name="T:Org.BouncyCastle.Asn1.Esf.CrlIdentifier">
  2542. <remarks>
  2543. RFC 3126: 4.2.2 Complete Revocation Refs Attribute Definition
  2544. <code>
  2545. CrlIdentifier ::= SEQUENCE
  2546. {
  2547. crlissuer Name,
  2548. crlIssuedTime UTCTime,
  2549. crlNumber INTEGER OPTIONAL
  2550. }
  2551. </code>
  2552. </remarks>
  2553. </member>
  2554. <member name="T:Org.BouncyCastle.Asn1.Esf.CrlListID">
  2555. <remarks>
  2556. RFC 3126: 4.2.2 Complete Revocation Refs Attribute Definition
  2557. <code>
  2558. CRLListID ::= SEQUENCE
  2559. {
  2560. crls SEQUENCE OF CrlValidatedID
  2561. }
  2562. </code>
  2563. </remarks>
  2564. </member>
  2565. <member name="T:Org.BouncyCastle.Asn1.Esf.CrlOcspRef">
  2566. <remarks>
  2567. RFC 3126: 4.2.2 Complete Revocation Refs Attribute Definition
  2568. <code>
  2569. CrlOcspRef ::= SEQUENCE {
  2570. crlids [0] CRLListID OPTIONAL,
  2571. ocspids [1] OcspListID OPTIONAL,
  2572. otherRev [2] OtherRevRefs OPTIONAL
  2573. }
  2574. </code>
  2575. </remarks>
  2576. </member>
  2577. <member name="T:Org.BouncyCastle.Asn1.Esf.CrlValidatedID">
  2578. <remarks>
  2579. RFC 3126: 4.2.2 Complete Revocation Refs Attribute Definition
  2580. <code>
  2581. CrlValidatedID ::= SEQUENCE {
  2582. crlHash OtherHash,
  2583. crlIdentifier CrlIdentifier OPTIONAL}
  2584. </code>
  2585. </remarks>
  2586. </member>
  2587. <member name="T:Org.BouncyCastle.Asn1.Esf.OcspIdentifier">
  2588. <remarks>
  2589. RFC 3126: 4.2.2 Complete Revocation Refs Attribute Definition
  2590. <code>
  2591. OcspIdentifier ::= SEQUENCE {
  2592. ocspResponderID ResponderID,
  2593. -- As in OCSP response data
  2594. producedAt GeneralizedTime
  2595. -- As in OCSP response data
  2596. }
  2597. </code>
  2598. </remarks>
  2599. </member>
  2600. <member name="T:Org.BouncyCastle.Asn1.Esf.OcspListID">
  2601. <remarks>
  2602. RFC 3126: 4.2.2 Complete Revocation Refs Attribute Definition
  2603. <code>
  2604. OcspListID ::= SEQUENCE {
  2605. ocspResponses SEQUENCE OF OcspResponsesID
  2606. }
  2607. </code>
  2608. </remarks>
  2609. </member>
  2610. <member name="T:Org.BouncyCastle.Asn1.Esf.OcspResponsesID">
  2611. <remarks>
  2612. RFC 3126: 4.2.2 Complete Revocation Refs Attribute Definition
  2613. <code>
  2614. OcspResponsesID ::= SEQUENCE {
  2615. ocspIdentifier OcspIdentifier,
  2616. ocspRepHash OtherHash OPTIONAL
  2617. }
  2618. </code>
  2619. </remarks>
  2620. </member>
  2621. <member name="T:Org.BouncyCastle.Asn1.Esf.OtherCertID">
  2622. <remarks>
  2623. <code>
  2624. OtherCertID ::= SEQUENCE {
  2625. otherCertHash OtherHash,
  2626. issuerSerial IssuerSerial OPTIONAL
  2627. }
  2628. </code>
  2629. </remarks>
  2630. </member>
  2631. <member name="T:Org.BouncyCastle.Asn1.Esf.OtherHash">
  2632. <remarks>
  2633. <code>
  2634. OtherHash ::= CHOICE {
  2635. sha1Hash OtherHashValue, -- This contains a SHA-1 hash
  2636. otherHash OtherHashAlgAndValue
  2637. }
  2638. OtherHashValue ::= OCTET STRING
  2639. </code>
  2640. </remarks>
  2641. </member>
  2642. <member name="T:Org.BouncyCastle.Asn1.Esf.OtherHashAlgAndValue">
  2643. <summary>
  2644. Summary description for OtherHashAlgAndValue.
  2645. </summary>
  2646. <remarks>
  2647. <code>
  2648. OtherHashAlgAndValue ::= SEQUENCE {
  2649. hashAlgorithm AlgorithmIdentifier,
  2650. hashValue OtherHashValue
  2651. }
  2652. OtherHashValue ::= OCTET STRING
  2653. </code>
  2654. </remarks>
  2655. </member>
  2656. <member name="T:Org.BouncyCastle.Asn1.Esf.OtherRevRefs">
  2657. <remarks>
  2658. RFC 3126: 4.2.2 Complete Revocation Refs Attribute Definition
  2659. <code>
  2660. OtherRevRefs ::= SEQUENCE
  2661. {
  2662. otherRevRefType OtherRevRefType,
  2663. otherRevRefs ANY DEFINED BY otherRevRefType
  2664. }
  2665. OtherRevRefType ::= OBJECT IDENTIFIER
  2666. </code>
  2667. </remarks>
  2668. </member>
  2669. <member name="T:Org.BouncyCastle.Asn1.Esf.OtherRevVals">
  2670. <remarks>
  2671. RFC 3126: 4.3.2 Revocation Values Attribute Definition
  2672. <code>
  2673. OtherRevVals ::= SEQUENCE
  2674. {
  2675. otherRevValType OtherRevValType,
  2676. otherRevVals ANY DEFINED BY otherRevValType
  2677. }
  2678. OtherRevValType ::= OBJECT IDENTIFIER
  2679. </code>
  2680. </remarks>
  2681. </member>
  2682. <member name="T:Org.BouncyCastle.Asn1.Esf.OtherSigningCertificate">
  2683. <remarks>
  2684. <code>
  2685. OtherSigningCertificate ::= SEQUENCE {
  2686. certs SEQUENCE OF OtherCertID,
  2687. policies SEQUENCE OF PolicyInformation OPTIONAL
  2688. }
  2689. </code>
  2690. </remarks>
  2691. </member>
  2692. <member name="T:Org.BouncyCastle.Asn1.Esf.RevocationValues">
  2693. <remarks>
  2694. RFC 5126: 6.3.4. revocation-values Attribute Definition
  2695. <code>
  2696. RevocationValues ::= SEQUENCE {
  2697. crlVals [0] SEQUENCE OF CertificateList OPTIONAL,
  2698. ocspVals [1] SEQUENCE OF BasicOCSPResponse OPTIONAL,
  2699. otherRevVals [2] OtherRevVals OPTIONAL
  2700. }
  2701. </code>
  2702. </remarks>
  2703. </member>
  2704. <member name="T:Org.BouncyCastle.Asn1.Esf.SignaturePolicyId">
  2705. <remarks>
  2706. <code>
  2707. SignaturePolicyId ::= SEQUENCE {
  2708. sigPolicyIdentifier SigPolicyId,
  2709. sigPolicyHash SigPolicyHash,
  2710. sigPolicyQualifiers SEQUENCE SIZE (1..MAX) OF SigPolicyQualifierInfo OPTIONAL
  2711. }
  2712. SigPolicyId ::= OBJECT IDENTIFIER
  2713. SigPolicyHash ::= OtherHashAlgAndValue
  2714. </code>
  2715. </remarks>
  2716. </member>
  2717. <member name="T:Org.BouncyCastle.Asn1.Esf.SignaturePolicyIdentifier">
  2718. <remarks>
  2719. <code>
  2720. SignaturePolicyIdentifier ::= CHOICE {
  2721. SignaturePolicyId SignaturePolicyId,
  2722. SignaturePolicyImplied SignaturePolicyImplied
  2723. }
  2724. SignaturePolicyImplied ::= NULL
  2725. </code>
  2726. </remarks>
  2727. </member>
  2728. <member name="M:Org.BouncyCastle.Asn1.Esf.SignerAttribute.ToAsn1Object">
  2729. <pre>
  2730. SignerAttribute ::= SEQUENCE OF CHOICE {
  2731. claimedAttributes [0] ClaimedAttributes,
  2732. certifiedAttributes [1] CertifiedAttributes }
  2733. ClaimedAttributes ::= SEQUENCE OF Attribute
  2734. CertifiedAttributes ::= AttributeCertificate -- as defined in RFC 3281: see clause 4.1.
  2735. </pre>
  2736. </member>
  2737. <member name="T:Org.BouncyCastle.Asn1.Esf.SignerLocation">
  2738. Signer-Location attribute (RFC3126).
  2739. <pre>
  2740. SignerLocation ::= SEQUENCE {
  2741. countryName [0] DirectoryString OPTIONAL,
  2742. localityName [1] DirectoryString OPTIONAL,
  2743. postalAddress [2] PostalAddress OPTIONAL }
  2744. PostalAddress ::= SEQUENCE SIZE(1..6) OF DirectoryString
  2745. </pre>
  2746. </member>
  2747. <member name="M:Org.BouncyCastle.Asn1.Esf.SignerLocation.ToAsn1Object">
  2748. <pre>
  2749. SignerLocation ::= SEQUENCE {
  2750. countryName [0] DirectoryString OPTIONAL,
  2751. localityName [1] DirectoryString OPTIONAL,
  2752. postalAddress [2] PostalAddress OPTIONAL }
  2753. PostalAddress ::= SEQUENCE SIZE(1..6) OF DirectoryString
  2754. DirectoryString ::= CHOICE {
  2755. teletexString TeletexString (SIZE (1..MAX)),
  2756. printableString PrintableString (SIZE (1..MAX)),
  2757. universalString UniversalString (SIZE (1..MAX)),
  2758. utf8String UTF8String (SIZE (1.. MAX)),
  2759. bmpString BMPString (SIZE (1..MAX)) }
  2760. </pre>
  2761. </member>
  2762. <member name="T:Org.BouncyCastle.Asn1.Esf.SigPolicyQualifierInfo">
  2763. <remarks>
  2764. <code>
  2765. SigPolicyQualifierInfo ::= SEQUENCE {
  2766. sigPolicyQualifierId SigPolicyQualifierId,
  2767. sigQualifier ANY DEFINED BY sigPolicyQualifierId
  2768. }
  2769. SigPolicyQualifierId ::= OBJECT IDENTIFIER
  2770. </code>
  2771. </remarks>
  2772. </member>
  2773. <member name="M:Org.BouncyCastle.Asn1.Ess.ContentHints.#ctor(Org.BouncyCastle.Asn1.Asn1Sequence)">
  2774. constructor
  2775. </member>
  2776. <member name="M:Org.BouncyCastle.Asn1.Ess.ContentHints.ToAsn1Object">
  2777. <pre>
  2778. ContentHints ::= SEQUENCE {
  2779. contentDescription UTF8String (SIZE (1..MAX)) OPTIONAL,
  2780. contentType ContentType }
  2781. </pre>
  2782. </member>
  2783. <member name="M:Org.BouncyCastle.Asn1.Ess.ContentIdentifier.#ctor(Org.BouncyCastle.Asn1.Asn1OctetString)">
  2784. Create from OCTET STRING whose octets represent the identifier.
  2785. </member>
  2786. <member name="M:Org.BouncyCastle.Asn1.Ess.ContentIdentifier.#ctor(System.Byte[])">
  2787. Create from byte array representing the identifier.
  2788. </member>
  2789. <member name="M:Org.BouncyCastle.Asn1.Ess.ContentIdentifier.ToAsn1Object">
  2790. The definition of ContentIdentifier is
  2791. <pre>
  2792. ContentIdentifier ::= OCTET STRING
  2793. </pre>
  2794. id-aa-contentIdentifier OBJECT IDENTIFIER ::= { iso(1)
  2795. member-body(2) us(840) rsadsi(113549) pkcs(1) pkcs9(9)
  2796. smime(16) id-aa(2) 7 }
  2797. </member>
  2798. <member name="M:Org.BouncyCastle.Asn1.Ess.EssCertID.#ctor(Org.BouncyCastle.Asn1.Asn1Sequence)">
  2799. constructor
  2800. </member>
  2801. <member name="M:Org.BouncyCastle.Asn1.Ess.EssCertID.ToAsn1Object">
  2802. <pre>
  2803. EssCertID ::= SEQUENCE {
  2804. certHash Hash,
  2805. issuerSerial IssuerSerial OPTIONAL }
  2806. </pre>
  2807. </member>
  2808. <member name="M:Org.BouncyCastle.Asn1.Ess.EssCertIDv2.ToAsn1Object">
  2809. <pre>
  2810. EssCertIDv2 ::= SEQUENCE {
  2811. hashAlgorithm AlgorithmIdentifier
  2812. DEFAULT {algorithm id-sha256},
  2813. certHash Hash,
  2814. issuerSerial IssuerSerial OPTIONAL
  2815. }
  2816. Hash ::= OCTET STRING
  2817. IssuerSerial ::= SEQUENCE {
  2818. issuer GeneralNames,
  2819. serialNumber CertificateSerialNumber
  2820. }
  2821. </pre>
  2822. </member>
  2823. <member name="M:Org.BouncyCastle.Asn1.Ess.OtherCertID.#ctor(Org.BouncyCastle.Asn1.Asn1Sequence)">
  2824. constructor
  2825. </member>
  2826. <member name="M:Org.BouncyCastle.Asn1.Ess.OtherCertID.ToAsn1Object">
  2827. <pre>
  2828. OtherCertID ::= SEQUENCE {
  2829. otherCertHash OtherHash,
  2830. issuerSerial IssuerSerial OPTIONAL }
  2831. OtherHash ::= CHOICE {
  2832. sha1Hash OCTET STRING,
  2833. otherHash OtherHashAlgAndValue }
  2834. OtherHashAlgAndValue ::= SEQUENCE {
  2835. hashAlgorithm AlgorithmIdentifier,
  2836. hashValue OCTET STRING }
  2837. </pre>
  2838. </member>
  2839. <member name="M:Org.BouncyCastle.Asn1.Ess.OtherSigningCertificate.#ctor(Org.BouncyCastle.Asn1.Asn1Sequence)">
  2840. constructors
  2841. </member>
  2842. <member name="M:Org.BouncyCastle.Asn1.Ess.OtherSigningCertificate.ToAsn1Object">
  2843. The definition of OtherSigningCertificate is
  2844. <pre>
  2845. OtherSigningCertificate ::= SEQUENCE {
  2846. certs SEQUENCE OF OtherCertID,
  2847. policies SEQUENCE OF PolicyInformation OPTIONAL
  2848. }
  2849. </pre>
  2850. id-aa-ets-otherSigCert OBJECT IDENTIFIER ::= { iso(1)
  2851. member-body(2) us(840) rsadsi(113549) pkcs(1) pkcs9(9)
  2852. smime(16) id-aa(2) 19 }
  2853. </member>
  2854. <member name="M:Org.BouncyCastle.Asn1.Ess.SigningCertificate.#ctor(Org.BouncyCastle.Asn1.Asn1Sequence)">
  2855. constructors
  2856. </member>
  2857. <member name="M:Org.BouncyCastle.Asn1.Ess.SigningCertificate.ToAsn1Object">
  2858. The definition of SigningCertificate is
  2859. <pre>
  2860. SigningCertificate ::= SEQUENCE {
  2861. certs SEQUENCE OF EssCertID,
  2862. policies SEQUENCE OF PolicyInformation OPTIONAL
  2863. }
  2864. </pre>
  2865. id-aa-signingCertificate OBJECT IDENTIFIER ::= { iso(1)
  2866. member-body(2) us(840) rsadsi(113549) pkcs(1) pkcs9(9)
  2867. smime(16) id-aa(2) 12 }
  2868. </member>
  2869. <member name="M:Org.BouncyCastle.Asn1.Ess.SigningCertificateV2.ToAsn1Object">
  2870. The definition of SigningCertificateV2 is
  2871. <pre>
  2872. SigningCertificateV2 ::= SEQUENCE {
  2873. certs SEQUENCE OF EssCertIDv2,
  2874. policies SEQUENCE OF PolicyInformation OPTIONAL
  2875. }
  2876. </pre>
  2877. id-aa-signingCertificateV2 OBJECT IDENTIFIER ::= { iso(1)
  2878. member-body(2) us(840) rsadsi(113549) pkcs(1) pkcs9(9)
  2879. smime(16) id-aa(2) 47 }
  2880. </member>
  2881. <member name="M:Org.BouncyCastle.Asn1.GM.GMNamedCurves.GetByOid(Org.BouncyCastle.Asn1.DerObjectIdentifier)">
  2882. return the X9ECParameters object for the named curve represented by
  2883. the passed in object identifier. Null if the curve isn't present.
  2884. @param oid an object identifier representing a named curve, if present.
  2885. </member>
  2886. <member name="M:Org.BouncyCastle.Asn1.GM.GMNamedCurves.GetOid(System.String)">
  2887. return the object identifier signified by the passed in name. Null
  2888. if there is no object identifier associated with name.
  2889. @return the object identifier associated with name, if present.
  2890. </member>
  2891. <member name="M:Org.BouncyCastle.Asn1.GM.GMNamedCurves.GetName(Org.BouncyCastle.Asn1.DerObjectIdentifier)">
  2892. return the named curve name represented by the given object identifier.
  2893. </member>
  2894. <member name="P:Org.BouncyCastle.Asn1.GM.GMNamedCurves.Names">
  2895. returns an enumeration containing the name strings for curves
  2896. contained in this structure.
  2897. </member>
  2898. <member name="F:Org.BouncyCastle.Asn1.Gnu.GnuObjectIdentifiers.EllipticCurve">
  2899. 1.3.6.1.4.1.11591.15 - ellipticCurve
  2900. </member>
  2901. <member name="T:Org.BouncyCastle.Asn1.IAsn1Choice">
  2902. Marker interface for CHOICE objects - if you implement this in a roll-your-own
  2903. object, any attempt to tag the object implicitly will convert the tag to an
  2904. explicit one as the encoding rules require.
  2905. <p>
  2906. If you use this interface your class should also implement the getInstance
  2907. pattern which takes a tag object and the tagging mode used.
  2908. </p>
  2909. </member>
  2910. <member name="T:Org.BouncyCastle.Asn1.IAsn1String">
  2911. basic interface for Der string objects.
  2912. </member>
  2913. <member name="T:Org.BouncyCastle.Asn1.Icao.CscaMasterList">
  2914. The CscaMasterList object. This object can be wrapped in a
  2915. CMSSignedData to be published in LDAP.
  2916. <pre>
  2917. CscaMasterList ::= SEQUENCE {
  2918. version CscaMasterListVersion,
  2919. certList SET OF Certificate }
  2920. CscaMasterListVersion :: INTEGER {v0(0)}
  2921. </pre>
  2922. </member>
  2923. <member name="T:Org.BouncyCastle.Asn1.Icao.DataGroupHash">
  2924. The DataGroupHash object.
  2925. <pre>
  2926. DataGroupHash ::= SEQUENCE {
  2927. dataGroupNumber DataGroupNumber,
  2928. dataGroupHashValue OCTET STRING }
  2929. DataGroupNumber ::= INTEGER {
  2930. dataGroup1 (1),
  2931. dataGroup1 (2),
  2932. dataGroup1 (3),
  2933. dataGroup1 (4),
  2934. dataGroup1 (5),
  2935. dataGroup1 (6),
  2936. dataGroup1 (7),
  2937. dataGroup1 (8),
  2938. dataGroup1 (9),
  2939. dataGroup1 (10),
  2940. dataGroup1 (11),
  2941. dataGroup1 (12),
  2942. dataGroup1 (13),
  2943. dataGroup1 (14),
  2944. dataGroup1 (15),
  2945. dataGroup1 (16) }
  2946. </pre>
  2947. </member>
  2948. <member name="T:Org.BouncyCastle.Asn1.Icao.LdsSecurityObject">
  2949. The LDSSecurityObject object (V1.8).
  2950. <pre>
  2951. LDSSecurityObject ::= SEQUENCE {
  2952. version LDSSecurityObjectVersion,
  2953. hashAlgorithm DigestAlgorithmIdentifier,
  2954. dataGroupHashValues SEQUENCE SIZE (2..ub-DataGroups) OF DataHashGroup,
  2955. ldsVersionInfo LDSVersionInfo OPTIONAL
  2956. -- if present, version MUST be v1 }
  2957. DigestAlgorithmIdentifier ::= AlgorithmIdentifier,
  2958. LDSSecurityObjectVersion :: INTEGER {V0(0)}
  2959. </pre>
  2960. </member>
  2961. <member name="M:Org.BouncyCastle.Asn1.Icao.LdsVersionInfo.ToAsn1Object">
  2962. <pre>
  2963. LDSVersionInfo ::= SEQUENCE {
  2964. ldsVersion PRINTABLE STRING
  2965. unicodeVersion PRINTABLE STRING
  2966. }
  2967. </pre>
  2968. @return
  2969. </member>
  2970. <member name="F:Org.BouncyCastle.Asn1.IsisMtt.IsisMttObjectIdentifiers.IdIsisMttCPAccredited">
  2971. The id-isismtt-cp-accredited OID indicates that the certificate is a
  2972. qualified certificate according to Directive 1999/93/EC of the European
  2973. Parliament and of the Council of 13 December 1999 on a Community
  2974. Framework for Electronic Signatures, which additionally conforms the
  2975. special requirements of the SigG and has been issued by an accredited CA.
  2976. </member>
  2977. <member name="F:Org.BouncyCastle.Asn1.IsisMtt.IsisMttObjectIdentifiers.IdIsisMttATDateOfCertGen">
  2978. Certificate extensionDate of certificate generation
  2979. <pre>
  2980. DateOfCertGenSyntax ::= GeneralizedTime
  2981. </pre>
  2982. </member>
  2983. <member name="F:Org.BouncyCastle.Asn1.IsisMtt.IsisMttObjectIdentifiers.IdIsisMttATProcuration">
  2984. Attribute to indicate that the certificate holder may sign in the name of
  2985. a third person. May also be used as extension in a certificate.
  2986. </member>
  2987. <member name="F:Org.BouncyCastle.Asn1.IsisMtt.IsisMttObjectIdentifiers.IdIsisMttATAdmission">
  2988. Attribute to indicate admissions to certain professions. May be used as
  2989. attribute in attribute certificate or as extension in a certificate
  2990. </member>
  2991. <member name="F:Org.BouncyCastle.Asn1.IsisMtt.IsisMttObjectIdentifiers.IdIsisMttATMonetaryLimit">
  2992. Monetary limit for transactions. The QcEuMonetaryLimit QC statement MUST
  2993. be used in new certificates in place of the extension/attribute
  2994. MonetaryLimit since January 1, 2004. For the sake of backward
  2995. compatibility with certificates already in use, SigG conforming
  2996. components MUST support MonetaryLimit (as well as QcEuLimitValue).
  2997. </member>
  2998. <member name="F:Org.BouncyCastle.Asn1.IsisMtt.IsisMttObjectIdentifiers.IdIsisMttATDeclarationOfMajority">
  2999. A declaration of majority. May be used as attribute in attribute
  3000. certificate or as extension in a certificate
  3001. </member>
  3002. <member name="F:Org.BouncyCastle.Asn1.IsisMtt.IsisMttObjectIdentifiers.IdIsisMttATIccsn">
  3003. Serial number of the smart card containing the corresponding private key
  3004. <pre>
  3005. ICCSNSyntax ::= OCTET STRING (SIZE(8..20))
  3006. </pre>
  3007. </member>
  3008. <member name="F:Org.BouncyCastle.Asn1.IsisMtt.IsisMttObjectIdentifiers.IdIsisMttATPKReference">
  3009. Reference for a file of a smartcard that stores the public key of this
  3010. certificate and that is used as �security anchor�.
  3011. <pre>
  3012. PKReferenceSyntax ::= OCTET STRING (SIZE(20))
  3013. </pre>
  3014. </member>
  3015. <member name="F:Org.BouncyCastle.Asn1.IsisMtt.IsisMttObjectIdentifiers.IdIsisMttATRestriction">
  3016. Some other restriction regarding the usage of this certificate. May be
  3017. used as attribute in attribute certificate or as extension in a
  3018. certificate.
  3019. <pre>
  3020. RestrictionSyntax ::= DirectoryString (SIZE(1..1024))
  3021. </pre>
  3022. @see Org.BouncyCastle.Asn1.IsisMtt.X509.Restriction
  3023. </member>
  3024. <member name="F:Org.BouncyCastle.Asn1.IsisMtt.IsisMttObjectIdentifiers.IdIsisMttATRetrieveIfAllowed">
  3025. (Single)Request extension: Clients may include this extension in a
  3026. (single) Request to request the responder to send the certificate in the
  3027. response message along with the status information. Besides the LDAP
  3028. service, this extension provides another mechanism for the distribution
  3029. of certificates, which MAY optionally be provided by certificate
  3030. repositories.
  3031. <pre>
  3032. RetrieveIfAllowed ::= BOOLEAN
  3033. </pre>
  3034. </member>
  3035. <member name="F:Org.BouncyCastle.Asn1.IsisMtt.IsisMttObjectIdentifiers.IdIsisMttATRequestedCertificate">
  3036. SingleOCSPResponse extension: The certificate requested by the client by
  3037. inserting the RetrieveIfAllowed extension in the request, will be
  3038. returned in this extension.
  3039. @see Org.BouncyCastle.Asn1.IsisMtt.Ocsp.RequestedCertificate
  3040. </member>
  3041. <member name="F:Org.BouncyCastle.Asn1.IsisMtt.IsisMttObjectIdentifiers.IdIsisMttATNamingAuthorities">
  3042. Base ObjectIdentifier for naming authorities
  3043. </member>
  3044. <member name="F:Org.BouncyCastle.Asn1.IsisMtt.IsisMttObjectIdentifiers.IdIsisMttATCertInDirSince">
  3045. SingleOCSPResponse extension: Date, when certificate has been published
  3046. in the directory and status information has become available. Currently,
  3047. accrediting authorities enforce that SigG-conforming OCSP servers include
  3048. this extension in the responses.
  3049. <pre>
  3050. CertInDirSince ::= GeneralizedTime
  3051. </pre>
  3052. </member>
  3053. <member name="F:Org.BouncyCastle.Asn1.IsisMtt.IsisMttObjectIdentifiers.IdIsisMttATCertHash">
  3054. Hash of a certificate in OCSP.
  3055. @see Org.BouncyCastle.Asn1.IsisMtt.Ocsp.CertHash
  3056. </member>
  3057. <member name="F:Org.BouncyCastle.Asn1.IsisMtt.IsisMttObjectIdentifiers.IdIsisMttATNameAtBirth">
  3058. <pre>
  3059. NameAtBirth ::= DirectoryString(SIZE(1..64)
  3060. </pre>
  3061. Used in
  3062. {@link Org.BouncyCastle.Asn1.X509.SubjectDirectoryAttributes SubjectDirectoryAttributes}
  3063. </member>
  3064. <member name="F:Org.BouncyCastle.Asn1.IsisMtt.IsisMttObjectIdentifiers.IdIsisMttATAdditionalInformation">
  3065. Some other information of non-restrictive nature regarding the usage of
  3066. this certificate. May be used as attribute in atribute certificate or as
  3067. extension in a certificate.
  3068. <pre>
  3069. AdditionalInformationSyntax ::= DirectoryString (SIZE(1..2048))
  3070. </pre>
  3071. @see Org.BouncyCastle.Asn1.IsisMtt.X509.AdditionalInformationSyntax
  3072. </member>
  3073. <member name="F:Org.BouncyCastle.Asn1.IsisMtt.IsisMttObjectIdentifiers.IdIsisMttATLiabilityLimitationFlag">
  3074. Indicates that an attribute certificate exists, which limits the
  3075. usability of this public key certificate. Whenever verifying a signature
  3076. with the help of this certificate, the content of the corresponding
  3077. attribute certificate should be concerned. This extension MUST be
  3078. included in a PKC, if a corresponding attribute certificate (having the
  3079. PKC as base certificate) contains some attribute that restricts the
  3080. usability of the PKC too. Attribute certificates with restricting content
  3081. MUST always be included in the signed document.
  3082. <pre>
  3083. LiabilityLimitationFlagSyntax ::= BOOLEAN
  3084. </pre>
  3085. </member>
  3086. <member name="T:Org.BouncyCastle.Asn1.IsisMtt.Ocsp.CertHash">
  3087. ISIS-MTT PROFILE: The responder may include this extension in a response to
  3088. send the hash of the requested certificate to the responder. This hash is
  3089. cryptographically bound to the certificate and serves as evidence that the
  3090. certificate is known to the responder (i.e. it has been issued and is present
  3091. in the directory). Hence, this extension is a means to provide a positive
  3092. statement of availability as described in T8.[8]. As explained in T13.[1],
  3093. clients may rely on this information to be able to validate signatures after
  3094. the expiry of the corresponding certificate. Hence, clients MUST support this
  3095. extension. If a positive statement of availability is to be delivered, this
  3096. extension syntax and OID MUST be used.
  3097. <p/>
  3098. <p/>
  3099. <pre>
  3100. CertHash ::= SEQUENCE {
  3101. hashAlgorithm AlgorithmIdentifier,
  3102. certificateHash OCTET STRING
  3103. }
  3104. </pre>
  3105. </member>
  3106. <member name="M:Org.BouncyCastle.Asn1.IsisMtt.Ocsp.CertHash.#ctor(Org.BouncyCastle.Asn1.Asn1Sequence)">
  3107. Constructor from Asn1Sequence.
  3108. <p/>
  3109. The sequence is of type CertHash:
  3110. <p/>
  3111. <pre>
  3112. CertHash ::= SEQUENCE {
  3113. hashAlgorithm AlgorithmIdentifier,
  3114. certificateHash OCTET STRING
  3115. }
  3116. </pre>
  3117. @param seq The ASN.1 sequence.
  3118. </member>
  3119. <member name="M:Org.BouncyCastle.Asn1.IsisMtt.Ocsp.CertHash.#ctor(Org.BouncyCastle.Asn1.X509.AlgorithmIdentifier,System.Byte[])">
  3120. Constructor from a given details.
  3121. @param hashAlgorithm The hash algorithm identifier.
  3122. @param certificateHash The hash of the whole DER encoding of the certificate.
  3123. </member>
  3124. <member name="M:Org.BouncyCastle.Asn1.IsisMtt.Ocsp.CertHash.ToAsn1Object">
  3125. Produce an object suitable for an Asn1OutputStream.
  3126. <p/>
  3127. Returns:
  3128. <p/>
  3129. <pre>
  3130. CertHash ::= SEQUENCE {
  3131. hashAlgorithm AlgorithmIdentifier,
  3132. certificateHash OCTET STRING
  3133. }
  3134. </pre>
  3135. @return an Asn1Object
  3136. </member>
  3137. <member name="T:Org.BouncyCastle.Asn1.IsisMtt.Ocsp.RequestedCertificate">
  3138. ISIS-MTT-Optional: The certificate requested by the client by inserting the
  3139. RetrieveIfAllowed extension in the request, will be returned in this
  3140. extension.
  3141. <p/>
  3142. ISIS-MTT-SigG: The signature act allows publishing certificates only then,
  3143. when the certificate owner gives his isExplicit permission. Accordingly, there
  3144. may be �nondownloadable� certificates, about which the responder must provide
  3145. status information, but MUST NOT include them in the response. Clients may
  3146. get therefore the following three kind of answers on a single request
  3147. including the RetrieveIfAllowed extension:
  3148. <ul>
  3149. <li> a) the responder supports the extension and is allowed to publish the
  3150. certificate: RequestedCertificate returned including the requested
  3151. certificate</li>
  3152. <li>b) the responder supports the extension but is NOT allowed to publish
  3153. the certificate: RequestedCertificate returned including an empty OCTET
  3154. STRING</li>
  3155. <li>c) the responder does not support the extension: RequestedCertificate is
  3156. not included in the response</li>
  3157. </ul>
  3158. Clients requesting RetrieveIfAllowed MUST be able to handle these cases. If
  3159. any of the OCTET STRING options is used, it MUST contain the DER encoding of
  3160. the requested certificate.
  3161. <p/>
  3162. <pre>
  3163. RequestedCertificate ::= CHOICE {
  3164. Certificate Certificate,
  3165. publicKeyCertificate [0] EXPLICIT OCTET STRING,
  3166. attributeCertificate [1] EXPLICIT OCTET STRING
  3167. }
  3168. </pre>
  3169. </member>
  3170. <member name="M:Org.BouncyCastle.Asn1.IsisMtt.Ocsp.RequestedCertificate.#ctor(Org.BouncyCastle.Asn1.X509.X509CertificateStructure)">
  3171. Constructor from a given details.
  3172. <p/>
  3173. Only one parameter can be given. All other must be <code>null</code>.
  3174. @param certificate Given as Certificate
  3175. </member>
  3176. <member name="M:Org.BouncyCastle.Asn1.IsisMtt.Ocsp.RequestedCertificate.ToAsn1Object">
  3177. Produce an object suitable for an Asn1OutputStream.
  3178. <p/>
  3179. Returns:
  3180. <p/>
  3181. <pre>
  3182. RequestedCertificate ::= CHOICE {
  3183. Certificate Certificate,
  3184. publicKeyCertificate [0] EXPLICIT OCTET STRING,
  3185. attributeCertificate [1] EXPLICIT OCTET STRING
  3186. }
  3187. </pre>
  3188. @return an Asn1Object
  3189. </member>
  3190. <member name="T:Org.BouncyCastle.Asn1.IsisMtt.X509.AdditionalInformationSyntax">
  3191. Some other information of non-restrictive nature regarding the usage of this
  3192. certificate.
  3193. <pre>
  3194. AdditionalInformationSyntax ::= DirectoryString (SIZE(1..2048))
  3195. </pre>
  3196. </member>
  3197. <member name="M:Org.BouncyCastle.Asn1.IsisMtt.X509.AdditionalInformationSyntax.#ctor(System.String)">
  3198. Constructor from a given details.
  3199. @param information The describtion of the information.
  3200. </member>
  3201. <member name="M:Org.BouncyCastle.Asn1.IsisMtt.X509.AdditionalInformationSyntax.ToAsn1Object">
  3202. Produce an object suitable for an Asn1OutputStream.
  3203. <p/>
  3204. Returns:
  3205. <p/>
  3206. <pre>
  3207. AdditionalInformationSyntax ::= DirectoryString (SIZE(1..2048))
  3208. </pre>
  3209. @return an Asn1Object
  3210. </member>
  3211. <member name="T:Org.BouncyCastle.Asn1.IsisMtt.X509.Admissions">
  3212. An Admissions structure.
  3213. <p/>
  3214. <pre>
  3215. Admissions ::= SEQUENCE
  3216. {
  3217. admissionAuthority [0] EXPLICIT GeneralName OPTIONAL
  3218. namingAuthority [1] EXPLICIT NamingAuthority OPTIONAL
  3219. professionInfos SEQUENCE OF ProfessionInfo
  3220. }
  3221. <p/>
  3222. </pre>
  3223. @see Org.BouncyCastle.Asn1.IsisMtt.X509.AdmissionSyntax
  3224. @see Org.BouncyCastle.Asn1.IsisMtt.X509.ProfessionInfo
  3225. @see Org.BouncyCastle.Asn1.IsisMtt.X509.NamingAuthority
  3226. </member>
  3227. <member name="M:Org.BouncyCastle.Asn1.IsisMtt.X509.Admissions.#ctor(Org.BouncyCastle.Asn1.Asn1Sequence)">
  3228. Constructor from Asn1Sequence.
  3229. <p/>
  3230. The sequence is of type ProcurationSyntax:
  3231. <p/>
  3232. <pre>
  3233. Admissions ::= SEQUENCE
  3234. {
  3235. admissionAuthority [0] EXPLICIT GeneralName OPTIONAL
  3236. namingAuthority [1] EXPLICIT NamingAuthority OPTIONAL
  3237. professionInfos SEQUENCE OF ProfessionInfo
  3238. }
  3239. </pre>
  3240. @param seq The ASN.1 sequence.
  3241. </member>
  3242. <member name="M:Org.BouncyCastle.Asn1.IsisMtt.X509.Admissions.#ctor(Org.BouncyCastle.Asn1.X509.GeneralName,Org.BouncyCastle.Asn1.IsisMtt.X509.NamingAuthority,Org.BouncyCastle.Asn1.IsisMtt.X509.ProfessionInfo[])">
  3243. Constructor from a given details.
  3244. <p/>
  3245. Parameter <code>professionInfos</code> is mandatory.
  3246. @param admissionAuthority The admission authority.
  3247. @param namingAuthority The naming authority.
  3248. @param professionInfos The profession infos.
  3249. </member>
  3250. <member name="M:Org.BouncyCastle.Asn1.IsisMtt.X509.Admissions.ToAsn1Object">
  3251. Produce an object suitable for an Asn1OutputStream.
  3252. <p/>
  3253. Returns:
  3254. <p/>
  3255. <pre>
  3256. Admissions ::= SEQUENCE
  3257. {
  3258. admissionAuthority [0] EXPLICIT GeneralName OPTIONAL
  3259. namingAuthority [1] EXPLICIT NamingAuthority OPTIONAL
  3260. professionInfos SEQUENCE OF ProfessionInfo
  3261. }
  3262. <p/>
  3263. </pre>
  3264. @return an Asn1Object
  3265. </member>
  3266. <member name="T:Org.BouncyCastle.Asn1.IsisMtt.X509.AdmissionSyntax">
  3267. Attribute to indicate admissions to certain professions.
  3268. <p/>
  3269. <pre>
  3270. AdmissionSyntax ::= SEQUENCE
  3271. {
  3272. admissionAuthority GeneralName OPTIONAL,
  3273. contentsOfAdmissions SEQUENCE OF Admissions
  3274. }
  3275. <p/>
  3276. Admissions ::= SEQUENCE
  3277. {
  3278. admissionAuthority [0] EXPLICIT GeneralName OPTIONAL
  3279. namingAuthority [1] EXPLICIT NamingAuthority OPTIONAL
  3280. professionInfos SEQUENCE OF ProfessionInfo
  3281. }
  3282. <p/>
  3283. NamingAuthority ::= SEQUENCE
  3284. {
  3285. namingAuthorityId OBJECT IDENTIFIER OPTIONAL,
  3286. namingAuthorityUrl IA5String OPTIONAL,
  3287. namingAuthorityText DirectoryString(SIZE(1..128)) OPTIONAL
  3288. }
  3289. <p/>
  3290. ProfessionInfo ::= SEQUENCE
  3291. {
  3292. namingAuthority [0] EXPLICIT NamingAuthority OPTIONAL,
  3293. professionItems SEQUENCE OF DirectoryString (SIZE(1..128)),
  3294. professionOIDs SEQUENCE OF OBJECT IDENTIFIER OPTIONAL,
  3295. registrationNumber PrintableString(SIZE(1..128)) OPTIONAL,
  3296. addProfessionInfo OCTET STRING OPTIONAL
  3297. }
  3298. </pre>
  3299. <p/>
  3300. <p/>
  3301. ISIS-MTT PROFILE: The relatively complex structure of AdmissionSyntax
  3302. supports the following concepts and requirements:
  3303. <ul>
  3304. <li> External institutions (e.g. professional associations, chambers, unions,
  3305. administrative bodies, companies, etc.), which are responsible for granting
  3306. and verifying professional admissions, are indicated by means of the data
  3307. field admissionAuthority. An admission authority is indicated by a
  3308. GeneralName object. Here an X.501 directory name (distinguished name) can be
  3309. indicated in the field directoryName, a URL address can be indicated in the
  3310. field uniformResourceIdentifier, and an object identifier can be indicated in
  3311. the field registeredId.</li>
  3312. <li> The names of authorities which are responsible for the administration of
  3313. title registers are indicated in the data field namingAuthority. The name of
  3314. the authority can be identified by an object identifier in the field
  3315. namingAuthorityId, by means of a text string in the field
  3316. namingAuthorityText, by means of a URL address in the field
  3317. namingAuthorityUrl, or by a combination of them. For example, the text string
  3318. can contain the name of the authority, the country and the name of the title
  3319. register. The URL-option refers to a web page which contains lists with
  3320. officially registered professions (text and possibly OID) as well as
  3321. further information on these professions. Object identifiers for the
  3322. component namingAuthorityId are grouped under the OID-branch
  3323. id-isis-at-namingAuthorities and must be applied for.</li>
  3324. <li>See http://www.teletrust.de/anwend.asp?Id=30200&amp;Sprache=E_&amp;HomePG=0
  3325. for an application form and http://www.teletrust.de/links.asp?id=30220,11
  3326. for an overview of registered naming authorities.</li>
  3327. <li> By means of the data type ProfessionInfo certain professions,
  3328. specializations, disciplines, fields of activity, etc. are identified. A
  3329. profession is represented by one or more text strings, resp. profession OIDs
  3330. in the fields professionItems and professionOIDs and by a registration number
  3331. in the field registrationNumber. An indication in text form must always be
  3332. present, whereas the other indications are optional. The component
  3333. addProfessionInfo may contain additional applicationspecific information in
  3334. DER-encoded form.</li>
  3335. </ul>
  3336. <p/>
  3337. By means of different namingAuthority-OIDs or profession OIDs hierarchies of
  3338. professions, specializations, disciplines, fields of activity, etc. can be
  3339. expressed. The issuing admission authority should always be indicated (field
  3340. admissionAuthority), whenever a registration number is presented. Still,
  3341. information on admissions can be given without indicating an admission or a
  3342. naming authority by the exclusive use of the component professionItems. In
  3343. this case the certification authority is responsible for the verification of
  3344. the admission information.
  3345. <p/>
  3346. <p/>
  3347. <p/>
  3348. This attribute is single-valued. Still, several admissions can be captured in
  3349. the sequence structure of the component contentsOfAdmissions of
  3350. AdmissionSyntax or in the component professionInfos of Admissions. The
  3351. component admissionAuthority of AdmissionSyntax serves as default value for
  3352. the component admissionAuthority of Admissions. Within the latter component
  3353. the default value can be overwritten, in case that another authority is
  3354. responsible. The component namingAuthority of Admissions serves as a default
  3355. value for the component namingAuthority of ProfessionInfo. Within the latter
  3356. component the default value can be overwritten, in case that another naming
  3357. authority needs to be recorded.
  3358. <p/>
  3359. The length of the string objects is limited to 128 characters. It is
  3360. recommended to indicate a namingAuthorityURL in all issued attribute
  3361. certificates. If a namingAuthorityURL is indicated, the field professionItems
  3362. of ProfessionInfo should contain only registered titles. If the field
  3363. professionOIDs exists, it has to contain the OIDs of the professions listed
  3364. in professionItems in the same order. In general, the field professionInfos
  3365. should contain only one entry, unless the admissions that are to be listed
  3366. are logically connected (e.g. they have been issued under the same admission
  3367. number).
  3368. @see Org.BouncyCastle.Asn1.IsisMtt.X509.Admissions
  3369. @see Org.BouncyCastle.Asn1.IsisMtt.X509.ProfessionInfo
  3370. @see Org.BouncyCastle.Asn1.IsisMtt.X509.NamingAuthority
  3371. </member>
  3372. <member name="M:Org.BouncyCastle.Asn1.IsisMtt.X509.AdmissionSyntax.#ctor(Org.BouncyCastle.Asn1.Asn1Sequence)">
  3373. Constructor from Asn1Sequence.
  3374. <p/>
  3375. The sequence is of type ProcurationSyntax:
  3376. <p/>
  3377. <pre>
  3378. AdmissionSyntax ::= SEQUENCE
  3379. {
  3380. admissionAuthority GeneralName OPTIONAL,
  3381. contentsOfAdmissions SEQUENCE OF Admissions
  3382. }
  3383. <p/>
  3384. Admissions ::= SEQUENCE
  3385. {
  3386. admissionAuthority [0] EXPLICIT GeneralName OPTIONAL
  3387. namingAuthority [1] EXPLICIT NamingAuthority OPTIONAL
  3388. professionInfos SEQUENCE OF ProfessionInfo
  3389. }
  3390. <p/>
  3391. NamingAuthority ::= SEQUENCE
  3392. {
  3393. namingAuthorityId OBJECT IDENTIFIER OPTIONAL,
  3394. namingAuthorityUrl IA5String OPTIONAL,
  3395. namingAuthorityText DirectoryString(SIZE(1..128)) OPTIONAL
  3396. }
  3397. <p/>
  3398. ProfessionInfo ::= SEQUENCE
  3399. {
  3400. namingAuthority [0] EXPLICIT NamingAuthority OPTIONAL,
  3401. professionItems SEQUENCE OF DirectoryString (SIZE(1..128)),
  3402. professionOIDs SEQUENCE OF OBJECT IDENTIFIER OPTIONAL,
  3403. registrationNumber PrintableString(SIZE(1..128)) OPTIONAL,
  3404. addProfessionInfo OCTET STRING OPTIONAL
  3405. }
  3406. </pre>
  3407. @param seq The ASN.1 sequence.
  3408. </member>
  3409. <member name="M:Org.BouncyCastle.Asn1.IsisMtt.X509.AdmissionSyntax.#ctor(Org.BouncyCastle.Asn1.X509.GeneralName,Org.BouncyCastle.Asn1.Asn1Sequence)">
  3410. Constructor from given details.
  3411. @param admissionAuthority The admission authority.
  3412. @param contentsOfAdmissions The admissions.
  3413. </member>
  3414. <member name="M:Org.BouncyCastle.Asn1.IsisMtt.X509.AdmissionSyntax.ToAsn1Object">
  3415. Produce an object suitable for an Asn1OutputStream.
  3416. <p/>
  3417. Returns:
  3418. <p/>
  3419. <pre>
  3420. AdmissionSyntax ::= SEQUENCE
  3421. {
  3422. admissionAuthority GeneralName OPTIONAL,
  3423. contentsOfAdmissions SEQUENCE OF Admissions
  3424. }
  3425. <p/>
  3426. Admissions ::= SEQUENCE
  3427. {
  3428. admissionAuthority [0] EXPLICIT GeneralName OPTIONAL
  3429. namingAuthority [1] EXPLICIT NamingAuthority OPTIONAL
  3430. professionInfos SEQUENCE OF ProfessionInfo
  3431. }
  3432. <p/>
  3433. NamingAuthority ::= SEQUENCE
  3434. {
  3435. namingAuthorityId OBJECT IDENTIFIER OPTIONAL,
  3436. namingAuthorityUrl IA5String OPTIONAL,
  3437. namingAuthorityText DirectoryString(SIZE(1..128)) OPTIONAL
  3438. }
  3439. <p/>
  3440. ProfessionInfo ::= SEQUENCE
  3441. {
  3442. namingAuthority [0] EXPLICIT NamingAuthority OPTIONAL,
  3443. professionItems SEQUENCE OF DirectoryString (SIZE(1..128)),
  3444. professionOIDs SEQUENCE OF OBJECT IDENTIFIER OPTIONAL,
  3445. registrationNumber PrintableString(SIZE(1..128)) OPTIONAL,
  3446. addProfessionInfo OCTET STRING OPTIONAL
  3447. }
  3448. </pre>
  3449. @return an Asn1Object
  3450. </member>
  3451. <member name="P:Org.BouncyCastle.Asn1.IsisMtt.X509.AdmissionSyntax.AdmissionAuthority">
  3452. @return Returns the admissionAuthority if present, null otherwise.
  3453. </member>
  3454. <member name="M:Org.BouncyCastle.Asn1.IsisMtt.X509.AdmissionSyntax.GetContentsOfAdmissions">
  3455. @return Returns the contentsOfAdmissions.
  3456. </member>
  3457. <member name="T:Org.BouncyCastle.Asn1.IsisMtt.X509.DeclarationOfMajority">
  3458. A declaration of majority.
  3459. <p/>
  3460. <pre>
  3461. DeclarationOfMajoritySyntax ::= CHOICE
  3462. {
  3463. notYoungerThan [0] IMPLICIT INTEGER,
  3464. fullAgeAtCountry [1] IMPLICIT SEQUENCE
  3465. {
  3466. fullAge BOOLEAN DEFAULT TRUE,
  3467. country PrintableString (SIZE(2))
  3468. }
  3469. dateOfBirth [2] IMPLICIT GeneralizedTime
  3470. }
  3471. </pre>
  3472. <p/>
  3473. fullAgeAtCountry indicates the majority of the owner with respect to the laws
  3474. of a specific country.
  3475. </member>
  3476. <member name="M:Org.BouncyCastle.Asn1.IsisMtt.X509.DeclarationOfMajority.ToAsn1Object">
  3477. Produce an object suitable for an Asn1OutputStream.
  3478. <p/>
  3479. Returns:
  3480. <p/>
  3481. <pre>
  3482. DeclarationOfMajoritySyntax ::= CHOICE
  3483. {
  3484. notYoungerThan [0] IMPLICIT INTEGER,
  3485. fullAgeAtCountry [1] IMPLICIT SEQUENCE
  3486. {
  3487. fullAge BOOLEAN DEFAULT TRUE,
  3488. country PrintableString (SIZE(2))
  3489. }
  3490. dateOfBirth [2] IMPLICIT GeneralizedTime
  3491. }
  3492. </pre>
  3493. @return an Asn1Object
  3494. </member>
  3495. <member name="P:Org.BouncyCastle.Asn1.IsisMtt.X509.DeclarationOfMajority.NotYoungerThan">
  3496. @return notYoungerThan if that's what we are, -1 otherwise
  3497. </member>
  3498. <member name="T:Org.BouncyCastle.Asn1.IsisMtt.X509.MonetaryLimit">
  3499. Monetary limit for transactions. The QcEuMonetaryLimit QC statement MUST be
  3500. used in new certificates in place of the extension/attribute MonetaryLimit
  3501. since January 1, 2004. For the sake of backward compatibility with
  3502. certificates already in use, components SHOULD support MonetaryLimit (as well
  3503. as QcEuLimitValue).
  3504. <p/>
  3505. Indicates a monetary limit within which the certificate holder is authorized
  3506. to act. (This value DOES NOT express a limit on the liability of the
  3507. certification authority).
  3508. <p/>
  3509. <pre>
  3510. MonetaryLimitSyntax ::= SEQUENCE
  3511. {
  3512. currency PrintableString (SIZE(3)),
  3513. amount INTEGER,
  3514. exponent INTEGER
  3515. }
  3516. </pre>
  3517. <p/>
  3518. currency must be the ISO code.
  3519. <p/>
  3520. value = amount�10*exponent
  3521. </member>
  3522. <member name="M:Org.BouncyCastle.Asn1.IsisMtt.X509.MonetaryLimit.#ctor(System.String,System.Int32,System.Int32)">
  3523. Constructor from a given details.
  3524. <p/>
  3525. <p/>
  3526. value = amount�10^exponent
  3527. @param currency The currency. Must be the ISO code.
  3528. @param amount The amount
  3529. @param exponent The exponent
  3530. </member>
  3531. <member name="M:Org.BouncyCastle.Asn1.IsisMtt.X509.MonetaryLimit.ToAsn1Object">
  3532. Produce an object suitable for an Asn1OutputStream.
  3533. <p/>
  3534. Returns:
  3535. <p/>
  3536. <pre>
  3537. MonetaryLimitSyntax ::= SEQUENCE
  3538. {
  3539. currency PrintableString (SIZE(3)),
  3540. amount INTEGER,
  3541. exponent INTEGER
  3542. }
  3543. </pre>
  3544. @return an Asn1Object
  3545. </member>
  3546. <member name="T:Org.BouncyCastle.Asn1.IsisMtt.X509.NamingAuthority">
  3547. Names of authorities which are responsible for the administration of title
  3548. registers.
  3549. <pre>
  3550. NamingAuthority ::= SEQUENCE
  3551. {
  3552. namingAuthorityID OBJECT IDENTIFIER OPTIONAL,
  3553. namingAuthorityUrl IA5String OPTIONAL,
  3554. namingAuthorityText DirectoryString(SIZE(1..128)) OPTIONAL
  3555. }
  3556. </pre>
  3557. @see Org.BouncyCastle.Asn1.IsisMtt.X509.AdmissionSyntax
  3558. </member>
  3559. <member name="F:Org.BouncyCastle.Asn1.IsisMtt.X509.NamingAuthority.IdIsisMttATNamingAuthoritiesRechtWirtschaftSteuern">
  3560. Profession OIDs should always be defined under the OID branch of the
  3561. responsible naming authority. At the time of this writing, the work group
  3562. �Recht, Wirtschaft, Steuern� (�Law, Economy, Taxes�) is registered as the
  3563. first naming authority under the OID id-isismtt-at-namingAuthorities.
  3564. </member>
  3565. <member name="M:Org.BouncyCastle.Asn1.IsisMtt.X509.NamingAuthority.#ctor(Org.BouncyCastle.Asn1.Asn1Sequence)">
  3566. Constructor from Asn1Sequence.
  3567. <p/>
  3568. <p/>
  3569. <pre>
  3570. NamingAuthority ::= SEQUENCE
  3571. {
  3572. namingAuthorityID OBJECT IDENTIFIER OPTIONAL,
  3573. namingAuthorityUrl IA5String OPTIONAL,
  3574. namingAuthorityText DirectoryString(SIZE(1..128)) OPTIONAL
  3575. }
  3576. </pre>
  3577. @param seq The ASN.1 sequence.
  3578. </member>
  3579. <member name="P:Org.BouncyCastle.Asn1.IsisMtt.X509.NamingAuthority.NamingAuthorityID">
  3580. @return Returns the namingAuthorityID.
  3581. </member>
  3582. <member name="P:Org.BouncyCastle.Asn1.IsisMtt.X509.NamingAuthority.NamingAuthorityText">
  3583. @return Returns the namingAuthorityText.
  3584. </member>
  3585. <member name="P:Org.BouncyCastle.Asn1.IsisMtt.X509.NamingAuthority.NamingAuthorityUrl">
  3586. @return Returns the namingAuthorityUrl.
  3587. </member>
  3588. <member name="M:Org.BouncyCastle.Asn1.IsisMtt.X509.NamingAuthority.#ctor(Org.BouncyCastle.Asn1.DerObjectIdentifier,System.String,Org.BouncyCastle.Asn1.X500.DirectoryString)">
  3589. Constructor from given details.
  3590. <p/>
  3591. All parameters can be combined.
  3592. @param namingAuthorityID ObjectIdentifier for naming authority.
  3593. @param namingAuthorityUrl URL for naming authority.
  3594. @param namingAuthorityText Textual representation of naming authority.
  3595. </member>
  3596. <member name="M:Org.BouncyCastle.Asn1.IsisMtt.X509.NamingAuthority.ToAsn1Object">
  3597. Produce an object suitable for an Asn1OutputStream.
  3598. <p/>
  3599. Returns:
  3600. <p/>
  3601. <pre>
  3602. NamingAuthority ::= SEQUENCE
  3603. {
  3604. namingAuthorityID OBJECT IDENTIFIER OPTIONAL,
  3605. namingAuthorityUrl IA5String OPTIONAL,
  3606. namingAuthorityText DirectoryString(SIZE(1..128)) OPTIONAL
  3607. }
  3608. </pre>
  3609. @return an Asn1Object
  3610. </member>
  3611. <member name="T:Org.BouncyCastle.Asn1.IsisMtt.X509.ProcurationSyntax">
  3612. Attribute to indicate that the certificate holder may sign in the name of a
  3613. third person.
  3614. <p>
  3615. ISIS-MTT PROFILE: The corresponding ProcurationSyntax contains either the
  3616. name of the person who is represented (subcomponent thirdPerson) or a
  3617. reference to his/her base certificate (in the component signingFor,
  3618. subcomponent certRef), furthermore the optional components country and
  3619. typeSubstitution to indicate the country whose laws apply, and respectively
  3620. the type of procuration (e.g. manager, procuration, custody).
  3621. </p>
  3622. <p>
  3623. ISIS-MTT PROFILE: The GeneralName MUST be of type directoryName and MAY only
  3624. contain: - RFC3039 attributes, except pseudonym (countryName, commonName,
  3625. surname, givenName, serialNumber, organizationName, organizationalUnitName,
  3626. stateOrProvincename, localityName, postalAddress) and - SubjectDirectoryName
  3627. attributes (title, dateOfBirth, placeOfBirth, gender, countryOfCitizenship,
  3628. countryOfResidence and NameAtBirth).
  3629. </p>
  3630. <pre>
  3631. ProcurationSyntax ::= SEQUENCE {
  3632. country [1] EXPLICIT PrintableString(SIZE(2)) OPTIONAL,
  3633. typeOfSubstitution [2] EXPLICIT DirectoryString (SIZE(1..128)) OPTIONAL,
  3634. signingFor [3] EXPLICIT SigningFor
  3635. }
  3636. SigningFor ::= CHOICE
  3637. {
  3638. thirdPerson GeneralName,
  3639. certRef IssuerSerial
  3640. }
  3641. </pre>
  3642. </member>
  3643. <member name="M:Org.BouncyCastle.Asn1.IsisMtt.X509.ProcurationSyntax.#ctor(Org.BouncyCastle.Asn1.Asn1Sequence)">
  3644. Constructor from Asn1Sequence.
  3645. <p/>
  3646. The sequence is of type ProcurationSyntax:
  3647. <p/>
  3648. <pre>
  3649. ProcurationSyntax ::= SEQUENCE {
  3650. country [1] EXPLICIT PrintableString(SIZE(2)) OPTIONAL,
  3651. typeOfSubstitution [2] EXPLICIT DirectoryString (SIZE(1..128)) OPTIONAL,
  3652. signingFor [3] EXPLICIT SigningFor
  3653. }
  3654. <p/>
  3655. SigningFor ::= CHOICE
  3656. {
  3657. thirdPerson GeneralName,
  3658. certRef IssuerSerial
  3659. }
  3660. </pre>
  3661. @param seq The ASN.1 sequence.
  3662. </member>
  3663. <member name="M:Org.BouncyCastle.Asn1.IsisMtt.X509.ProcurationSyntax.#ctor(System.String,Org.BouncyCastle.Asn1.X500.DirectoryString,Org.BouncyCastle.Asn1.X509.IssuerSerial)">
  3664. Constructor from a given details.
  3665. <p/>
  3666. <p/>
  3667. Either <code>generalName</code> or <code>certRef</code> MUST be
  3668. <code>null</code>.
  3669. @param country The country code whose laws apply.
  3670. @param typeOfSubstitution The type of procuration.
  3671. @param certRef Reference to certificate of the person who is represented.
  3672. </member>
  3673. <member name="M:Org.BouncyCastle.Asn1.IsisMtt.X509.ProcurationSyntax.#ctor(System.String,Org.BouncyCastle.Asn1.X500.DirectoryString,Org.BouncyCastle.Asn1.X509.GeneralName)">
  3674. Constructor from a given details.
  3675. <p/>
  3676. <p/>
  3677. Either <code>generalName</code> or <code>certRef</code> MUST be
  3678. <code>null</code>.
  3679. @param country The country code whose laws apply.
  3680. @param typeOfSubstitution The type of procuration.
  3681. @param thirdPerson The GeneralName of the person who is represented.
  3682. </member>
  3683. <member name="M:Org.BouncyCastle.Asn1.IsisMtt.X509.ProcurationSyntax.ToAsn1Object">
  3684. Produce an object suitable for an Asn1OutputStream.
  3685. <p/>
  3686. Returns:
  3687. <p/>
  3688. <pre>
  3689. ProcurationSyntax ::= SEQUENCE {
  3690. country [1] EXPLICIT PrintableString(SIZE(2)) OPTIONAL,
  3691. typeOfSubstitution [2] EXPLICIT DirectoryString (SIZE(1..128)) OPTIONAL,
  3692. signingFor [3] EXPLICIT SigningFor
  3693. }
  3694. <p/>
  3695. SigningFor ::= CHOICE
  3696. {
  3697. thirdPerson GeneralName,
  3698. certRef IssuerSerial
  3699. }
  3700. </pre>
  3701. @return an Asn1Object
  3702. </member>
  3703. <member name="T:Org.BouncyCastle.Asn1.IsisMtt.X509.ProfessionInfo">
  3704. Professions, specializations, disciplines, fields of activity, etc.
  3705. <pre>
  3706. ProfessionInfo ::= SEQUENCE
  3707. {
  3708. namingAuthority [0] EXPLICIT NamingAuthority OPTIONAL,
  3709. professionItems SEQUENCE OF DirectoryString (SIZE(1..128)),
  3710. professionOids SEQUENCE OF OBJECT IDENTIFIER OPTIONAL,
  3711. registrationNumber PrintableString(SIZE(1..128)) OPTIONAL,
  3712. addProfessionInfo OCTET STRING OPTIONAL
  3713. }
  3714. </pre>
  3715. @see Org.BouncyCastle.Asn1.IsisMtt.X509.AdmissionSyntax
  3716. </member>
  3717. <member name="F:Org.BouncyCastle.Asn1.IsisMtt.X509.ProfessionInfo.Rechtsanwltin">
  3718. Rechtsanw�ltin
  3719. </member>
  3720. <member name="F:Org.BouncyCastle.Asn1.IsisMtt.X509.ProfessionInfo.Rechtsanwalt">
  3721. Rechtsanwalt
  3722. </member>
  3723. <member name="F:Org.BouncyCastle.Asn1.IsisMtt.X509.ProfessionInfo.Rechtsbeistand">
  3724. Rechtsbeistand
  3725. </member>
  3726. <member name="F:Org.BouncyCastle.Asn1.IsisMtt.X509.ProfessionInfo.Steuerberaterin">
  3727. Steuerberaterin
  3728. </member>
  3729. <member name="F:Org.BouncyCastle.Asn1.IsisMtt.X509.ProfessionInfo.Steuerberater">
  3730. Steuerberater
  3731. </member>
  3732. <member name="F:Org.BouncyCastle.Asn1.IsisMtt.X509.ProfessionInfo.Steuerbevollmchtigte">
  3733. Steuerbevollm�chtigte
  3734. </member>
  3735. <member name="F:Org.BouncyCastle.Asn1.IsisMtt.X509.ProfessionInfo.Steuerbevollmchtigter">
  3736. Steuerbevollm�chtigter
  3737. </member>
  3738. <member name="F:Org.BouncyCastle.Asn1.IsisMtt.X509.ProfessionInfo.Notarin">
  3739. Notarin
  3740. </member>
  3741. <member name="F:Org.BouncyCastle.Asn1.IsisMtt.X509.ProfessionInfo.Notar">
  3742. Notar
  3743. </member>
  3744. <member name="F:Org.BouncyCastle.Asn1.IsisMtt.X509.ProfessionInfo.Notarvertreterin">
  3745. Notarvertreterin
  3746. </member>
  3747. <member name="F:Org.BouncyCastle.Asn1.IsisMtt.X509.ProfessionInfo.Notarvertreter">
  3748. Notarvertreter
  3749. </member>
  3750. <member name="F:Org.BouncyCastle.Asn1.IsisMtt.X509.ProfessionInfo.Notariatsverwalterin">
  3751. Notariatsverwalterin
  3752. </member>
  3753. <member name="F:Org.BouncyCastle.Asn1.IsisMtt.X509.ProfessionInfo.Notariatsverwalter">
  3754. Notariatsverwalter
  3755. </member>
  3756. <member name="F:Org.BouncyCastle.Asn1.IsisMtt.X509.ProfessionInfo.Wirtschaftsprferin">
  3757. Wirtschaftspr�ferin
  3758. </member>
  3759. <member name="F:Org.BouncyCastle.Asn1.IsisMtt.X509.ProfessionInfo.Wirtschaftsprfer">
  3760. Wirtschaftspr�fer
  3761. </member>
  3762. <member name="F:Org.BouncyCastle.Asn1.IsisMtt.X509.ProfessionInfo.VereidigteBuchprferin">
  3763. Vereidigte Buchpr�ferin
  3764. </member>
  3765. <member name="F:Org.BouncyCastle.Asn1.IsisMtt.X509.ProfessionInfo.VereidigterBuchprfer">
  3766. Vereidigter Buchpr�fer
  3767. </member>
  3768. <member name="F:Org.BouncyCastle.Asn1.IsisMtt.X509.ProfessionInfo.Patentanwltin">
  3769. Patentanw�ltin
  3770. </member>
  3771. <member name="F:Org.BouncyCastle.Asn1.IsisMtt.X509.ProfessionInfo.Patentanwalt">
  3772. Patentanwalt
  3773. </member>
  3774. <member name="M:Org.BouncyCastle.Asn1.IsisMtt.X509.ProfessionInfo.#ctor(Org.BouncyCastle.Asn1.Asn1Sequence)">
  3775. Constructor from Asn1Sequence.
  3776. <p/>
  3777. <p/>
  3778. <pre>
  3779. ProfessionInfo ::= SEQUENCE
  3780. {
  3781. namingAuthority [0] EXPLICIT NamingAuthority OPTIONAL,
  3782. professionItems SEQUENCE OF DirectoryString (SIZE(1..128)),
  3783. professionOids SEQUENCE OF OBJECT IDENTIFIER OPTIONAL,
  3784. registrationNumber PrintableString(SIZE(1..128)) OPTIONAL,
  3785. addProfessionInfo OCTET STRING OPTIONAL
  3786. }
  3787. </pre>
  3788. @param seq The ASN.1 sequence.
  3789. </member>
  3790. <member name="M:Org.BouncyCastle.Asn1.IsisMtt.X509.ProfessionInfo.#ctor(Org.BouncyCastle.Asn1.IsisMtt.X509.NamingAuthority,Org.BouncyCastle.Asn1.X500.DirectoryString[],Org.BouncyCastle.Asn1.DerObjectIdentifier[],System.String,Org.BouncyCastle.Asn1.Asn1OctetString)">
  3791. Constructor from given details.
  3792. <p/>
  3793. <code>professionItems</code> is mandatory, all other parameters are
  3794. optional.
  3795. @param namingAuthority The naming authority.
  3796. @param professionItems Directory strings of the profession.
  3797. @param professionOids DERObjectIdentfier objects for the
  3798. profession.
  3799. @param registrationNumber Registration number.
  3800. @param addProfessionInfo Additional infos in encoded form.
  3801. </member>
  3802. <member name="M:Org.BouncyCastle.Asn1.IsisMtt.X509.ProfessionInfo.ToAsn1Object">
  3803. Produce an object suitable for an Asn1OutputStream.
  3804. <p/>
  3805. Returns:
  3806. <p/>
  3807. <pre>
  3808. ProfessionInfo ::= SEQUENCE
  3809. {
  3810. namingAuthority [0] EXPLICIT NamingAuthority OPTIONAL,
  3811. professionItems SEQUENCE OF DirectoryString (SIZE(1..128)),
  3812. professionOids SEQUENCE OF OBJECT IDENTIFIER OPTIONAL,
  3813. registrationNumber PrintableString(SIZE(1..128)) OPTIONAL,
  3814. addProfessionInfo OCTET STRING OPTIONAL
  3815. }
  3816. </pre>
  3817. @return an Asn1Object
  3818. </member>
  3819. <member name="P:Org.BouncyCastle.Asn1.IsisMtt.X509.ProfessionInfo.AddProfessionInfo">
  3820. @return Returns the addProfessionInfo.
  3821. </member>
  3822. <member name="P:Org.BouncyCastle.Asn1.IsisMtt.X509.ProfessionInfo.NamingAuthority">
  3823. @return Returns the namingAuthority.
  3824. </member>
  3825. <member name="M:Org.BouncyCastle.Asn1.IsisMtt.X509.ProfessionInfo.GetProfessionItems">
  3826. @return Returns the professionItems.
  3827. </member>
  3828. <member name="M:Org.BouncyCastle.Asn1.IsisMtt.X509.ProfessionInfo.GetProfessionOids">
  3829. @return Returns the professionOids.
  3830. </member>
  3831. <member name="P:Org.BouncyCastle.Asn1.IsisMtt.X509.ProfessionInfo.RegistrationNumber">
  3832. @return Returns the registrationNumber.
  3833. </member>
  3834. <member name="T:Org.BouncyCastle.Asn1.IsisMtt.X509.Restriction">
  3835. Some other restriction regarding the usage of this certificate.
  3836. <p/>
  3837. <pre>
  3838. RestrictionSyntax ::= DirectoryString (SIZE(1..1024))
  3839. </pre>
  3840. </member>
  3841. <member name="M:Org.BouncyCastle.Asn1.IsisMtt.X509.Restriction.#ctor(Org.BouncyCastle.Asn1.X500.DirectoryString)">
  3842. Constructor from DirectoryString.
  3843. <p/>
  3844. The DirectoryString is of type RestrictionSyntax:
  3845. <p/>
  3846. <pre>
  3847. RestrictionSyntax ::= DirectoryString (SIZE(1..1024))
  3848. </pre>
  3849. @param restriction A IAsn1String.
  3850. </member>
  3851. <member name="M:Org.BouncyCastle.Asn1.IsisMtt.X509.Restriction.#ctor(System.String)">
  3852. Constructor from a given details.
  3853. @param restriction The description of the restriction.
  3854. </member>
  3855. <member name="M:Org.BouncyCastle.Asn1.IsisMtt.X509.Restriction.ToAsn1Object">
  3856. Produce an object suitable for an Asn1OutputStream.
  3857. <p/>
  3858. Returns:
  3859. <p/>
  3860. <pre>
  3861. RestrictionSyntax ::= DirectoryString (SIZE(1..1024))
  3862. <p/>
  3863. </pre>
  3864. @return an Asn1Object
  3865. </member>
  3866. <member name="M:Org.BouncyCastle.Asn1.Misc.Cast5CbcParameters.ToAsn1Object">
  3867. Produce an object suitable for an Asn1OutputStream.
  3868. <pre>
  3869. cast5CBCParameters ::= Sequence {
  3870. iv OCTET STRING DEFAULT 0,
  3871. -- Initialization vector
  3872. keyLength Integer
  3873. -- Key length, in bits
  3874. }
  3875. </pre>
  3876. </member>
  3877. <member name="M:Org.BouncyCastle.Asn1.Misc.IdeaCbcPar.ToAsn1Object">
  3878. Produce an object suitable for an Asn1OutputStream.
  3879. <pre>
  3880. IDEA-CBCPar ::= Sequence {
  3881. iv OCTET STRING OPTIONAL -- exactly 8 octets
  3882. }
  3883. </pre>
  3884. </member>
  3885. <member name="T:Org.BouncyCastle.Asn1.Misc.NetscapeCertType">
  3886. The NetscapeCertType object.
  3887. <pre>
  3888. NetscapeCertType ::= BIT STRING {
  3889. SSLClient (0),
  3890. SSLServer (1),
  3891. S/MIME (2),
  3892. Object Signing (3),
  3893. Reserved (4),
  3894. SSL CA (5),
  3895. S/MIME CA (6),
  3896. Object Signing CA (7) }
  3897. </pre>
  3898. </member>
  3899. <member name="M:Org.BouncyCastle.Asn1.Misc.NetscapeCertType.#ctor(System.Int32)">
  3900. Basic constructor.
  3901. @param usage - the bitwise OR of the Key Usage flags giving the
  3902. allowed uses for the key.
  3903. e.g. (X509NetscapeCertType.sslCA | X509NetscapeCertType.smimeCA)
  3904. </member>
  3905. <member name="T:Org.BouncyCastle.Asn1.Mozilla.PublicKeyAndChallenge">
  3906. This is designed to parse
  3907. the PublicKeyAndChallenge created by the KEYGEN tag included by
  3908. Mozilla based browsers.
  3909. <pre>
  3910. PublicKeyAndChallenge ::= SEQUENCE {
  3911. spki SubjectPublicKeyInfo,
  3912. challenge IA5STRING
  3913. }
  3914. </pre>
  3915. </member>
  3916. <member name="T:Org.BouncyCastle.Asn1.Nist.KMacWithShake128Params">
  3917. <summary>
  3918. KMACwithSHAKE128-params ::= SEQUENCE {
  3919. kMACOutputLength INTEGER DEFAULT 256, -- Output length in bits
  3920. customizationString OCTET STRING DEFAULT ''H
  3921. }
  3922. </summary>
  3923. </member>
  3924. <member name="T:Org.BouncyCastle.Asn1.Nist.KMacWithShake256Params">
  3925. <summary>
  3926. KMACwithSHAKE256-params ::= SEQUENCE {
  3927. kMACOutputLength INTEGER DEFAULT 512, -- Output length in bits
  3928. customizationString OCTET STRING DEFAULT ''H
  3929. }
  3930. </summary>
  3931. </member>
  3932. <member name="T:Org.BouncyCastle.Asn1.Nist.NistNamedCurves">
  3933. Utility class for fetching curves using their NIST names as published in FIPS-PUB 186-3
  3934. </member>
  3935. <member name="M:Org.BouncyCastle.Asn1.Nist.NistNamedCurves.GetByOid(Org.BouncyCastle.Asn1.DerObjectIdentifier)">
  3936. return the X9ECParameters object for the named curve represented by
  3937. the passed in object identifier. Null if the curve isn't present.
  3938. @param oid an object identifier representing a named curve, if present.
  3939. </member>
  3940. <member name="M:Org.BouncyCastle.Asn1.Nist.NistNamedCurves.GetOid(System.String)">
  3941. return the object identifier signified by the passed in name. Null
  3942. if there is no object identifier associated with name.
  3943. @return the object identifier associated with name, if present.
  3944. </member>
  3945. <member name="M:Org.BouncyCastle.Asn1.Nist.NistNamedCurves.GetName(Org.BouncyCastle.Asn1.DerObjectIdentifier)">
  3946. return the named curve name represented by the given object identifier.
  3947. </member>
  3948. <member name="P:Org.BouncyCastle.Asn1.Nist.NistNamedCurves.Names">
  3949. returns an enumeration containing the name strings for curves
  3950. contained in this structure.
  3951. </member>
  3952. <member name="F:Org.BouncyCastle.Asn1.Nist.NistObjectIdentifiers.IdDsaWithSha3_224">
  3953. 2.16.840.1.101.3.4.3.5
  3954. </member>
  3955. <member name="F:Org.BouncyCastle.Asn1.Nist.NistObjectIdentifiers.IdDsaWithSha3_256">
  3956. 2.16.840.1.101.3.4.3.6
  3957. </member>
  3958. <member name="F:Org.BouncyCastle.Asn1.Nist.NistObjectIdentifiers.IdDsaWithSha3_384">
  3959. 2.16.840.1.101.3.4.3.7
  3960. </member>
  3961. <member name="F:Org.BouncyCastle.Asn1.Nist.NistObjectIdentifiers.IdDsaWithSha3_512">
  3962. 2.16.840.1.101.3.4.3.8
  3963. </member>
  3964. <member name="F:Org.BouncyCastle.Asn1.Nist.NistObjectIdentifiers.IdEcdsaWithSha3_224">
  3965. 2.16.840.1.101.3.4.3.9
  3966. </member>
  3967. <member name="F:Org.BouncyCastle.Asn1.Nist.NistObjectIdentifiers.IdEcdsaWithSha3_256">
  3968. 2.16.840.1.101.3.4.3.10
  3969. </member>
  3970. <member name="F:Org.BouncyCastle.Asn1.Nist.NistObjectIdentifiers.IdEcdsaWithSha3_384">
  3971. 2.16.840.1.101.3.4.3.11
  3972. </member>
  3973. <member name="F:Org.BouncyCastle.Asn1.Nist.NistObjectIdentifiers.IdEcdsaWithSha3_512">
  3974. 2.16.840.1.101.3.4.3.12
  3975. </member>
  3976. <member name="F:Org.BouncyCastle.Asn1.Nist.NistObjectIdentifiers.IdRsassaPkcs1V15WithSha3_224">
  3977. 2.16.840.1.101.3.4.3.9
  3978. </member>
  3979. <member name="F:Org.BouncyCastle.Asn1.Nist.NistObjectIdentifiers.IdRsassaPkcs1V15WithSha3_256">
  3980. 2.16.840.1.101.3.4.3.10
  3981. </member>
  3982. <member name="F:Org.BouncyCastle.Asn1.Nist.NistObjectIdentifiers.IdRsassaPkcs1V15WithSha3_384">
  3983. 2.16.840.1.101.3.4.3.11
  3984. </member>
  3985. <member name="F:Org.BouncyCastle.Asn1.Nist.NistObjectIdentifiers.IdRsassaPkcs1V15WithSha3_512">
  3986. 2.16.840.1.101.3.4.3.12
  3987. </member>
  3988. <member name="T:Org.BouncyCastle.Asn1.Ntt.NttObjectIdentifiers">
  3989. <summary>From RFC 3657</summary>
  3990. </member>
  3991. <member name="M:Org.BouncyCastle.Asn1.Ocsp.BasicOcspResponse.ToAsn1Object">
  3992. Produce an object suitable for an Asn1OutputStream.
  3993. <pre>
  3994. BasicOcspResponse ::= Sequence {
  3995. tbsResponseData ResponseData,
  3996. signatureAlgorithm AlgorithmIdentifier,
  3997. signature BIT STRING,
  3998. certs [0] EXPLICIT Sequence OF Certificate OPTIONAL }
  3999. </pre>
  4000. </member>
  4001. <member name="M:Org.BouncyCastle.Asn1.Ocsp.CertID.ToAsn1Object">
  4002. Produce an object suitable for an Asn1OutputStream.
  4003. <pre>
  4004. CertID ::= Sequence {
  4005. hashAlgorithm AlgorithmIdentifier,
  4006. issuerNameHash OCTET STRING, -- Hash of Issuer's DN
  4007. issuerKeyHash OCTET STRING, -- Hash of Issuers public key
  4008. serialNumber CertificateSerialNumber }
  4009. </pre>
  4010. </member>
  4011. <member name="M:Org.BouncyCastle.Asn1.Ocsp.CertStatus.#ctor">
  4012. create a CertStatus object with a tag of zero.
  4013. </member>
  4014. <member name="M:Org.BouncyCastle.Asn1.Ocsp.CertStatus.ToAsn1Object">
  4015. Produce an object suitable for an Asn1OutputStream.
  4016. <pre>
  4017. CertStatus ::= CHOICE {
  4018. good [0] IMPLICIT Null,
  4019. revoked [1] IMPLICIT RevokedInfo,
  4020. unknown [2] IMPLICIT UnknownInfo }
  4021. </pre>
  4022. </member>
  4023. <member name="M:Org.BouncyCastle.Asn1.Ocsp.CrlID.ToAsn1Object">
  4024. Produce an object suitable for an Asn1OutputStream.
  4025. <pre>
  4026. CrlID ::= Sequence {
  4027. crlUrl [0] EXPLICIT IA5String OPTIONAL,
  4028. crlNum [1] EXPLICIT Integer OPTIONAL,
  4029. crlTime [2] EXPLICIT GeneralizedTime OPTIONAL }
  4030. </pre>
  4031. </member>
  4032. <member name="M:Org.BouncyCastle.Asn1.Ocsp.OcspRequest.ToAsn1Object">
  4033. Produce an object suitable for an Asn1OutputStream.
  4034. <pre>
  4035. OcspRequest ::= Sequence {
  4036. tbsRequest TBSRequest,
  4037. optionalSignature [0] EXPLICIT Signature OPTIONAL }
  4038. </pre>
  4039. </member>
  4040. <member name="M:Org.BouncyCastle.Asn1.Ocsp.OcspResponse.ToAsn1Object">
  4041. Produce an object suitable for an Asn1OutputStream.
  4042. <pre>
  4043. OcspResponse ::= Sequence {
  4044. responseStatus OcspResponseStatus,
  4045. responseBytes [0] EXPLICIT ResponseBytes OPTIONAL }
  4046. </pre>
  4047. </member>
  4048. <member name="M:Org.BouncyCastle.Asn1.Ocsp.OcspResponseStatus.#ctor(System.Int32)">
  4049. The OcspResponseStatus enumeration.
  4050. <pre>
  4051. OcspResponseStatus ::= Enumerated {
  4052. successful (0), --Response has valid confirmations
  4053. malformedRequest (1), --Illegal confirmation request
  4054. internalError (2), --Internal error in issuer
  4055. tryLater (3), --Try again later
  4056. --(4) is not used
  4057. sigRequired (5), --Must sign the request
  4058. unauthorized (6) --Request unauthorized
  4059. }
  4060. </pre>
  4061. </member>
  4062. <member name="M:Org.BouncyCastle.Asn1.Ocsp.Request.ToAsn1Object">
  4063. Produce an object suitable for an Asn1OutputStream.
  4064. <pre>
  4065. Request ::= Sequence {
  4066. reqCert CertID,
  4067. singleRequestExtensions [0] EXPLICIT Extensions OPTIONAL }
  4068. </pre>
  4069. </member>
  4070. <member name="M:Org.BouncyCastle.Asn1.Ocsp.ResponderID.ToAsn1Object">
  4071. Produce an object suitable for an Asn1OutputStream.
  4072. <pre>
  4073. ResponderID ::= CHOICE {
  4074. byName [1] Name,
  4075. byKey [2] KeyHash }
  4076. </pre>
  4077. </member>
  4078. <member name="M:Org.BouncyCastle.Asn1.Ocsp.ResponseBytes.ToAsn1Object">
  4079. Produce an object suitable for an Asn1OutputStream.
  4080. <pre>
  4081. ResponseBytes ::= Sequence {
  4082. responseType OBJECT IDENTIFIER,
  4083. response OCTET STRING }
  4084. </pre>
  4085. </member>
  4086. <member name="M:Org.BouncyCastle.Asn1.Ocsp.ResponseData.ToAsn1Object">
  4087. Produce an object suitable for an Asn1OutputStream.
  4088. <pre>
  4089. ResponseData ::= Sequence {
  4090. version [0] EXPLICIT Version DEFAULT v1,
  4091. responderID ResponderID,
  4092. producedAt GeneralizedTime,
  4093. responses Sequence OF SingleResponse,
  4094. responseExtensions [1] EXPLICIT Extensions OPTIONAL }
  4095. </pre>
  4096. </member>
  4097. <member name="M:Org.BouncyCastle.Asn1.Ocsp.RevokedInfo.ToAsn1Object">
  4098. Produce an object suitable for an Asn1OutputStream.
  4099. <pre>
  4100. RevokedInfo ::= Sequence {
  4101. revocationTime GeneralizedTime,
  4102. revocationReason [0] EXPLICIT CRLReason OPTIONAL }
  4103. </pre>
  4104. </member>
  4105. <member name="M:Org.BouncyCastle.Asn1.Ocsp.ServiceLocator.ToAsn1Object">
  4106. Produce an object suitable for an Asn1OutputStream.
  4107. <pre>
  4108. ServiceLocator ::= Sequence {
  4109. issuer Name,
  4110. locator AuthorityInfoAccessSyntax OPTIONAL }
  4111. </pre>
  4112. </member>
  4113. <member name="M:Org.BouncyCastle.Asn1.Ocsp.Signature.ToAsn1Object">
  4114. Produce an object suitable for an Asn1OutputStream.
  4115. <pre>
  4116. Signature ::= Sequence {
  4117. signatureAlgorithm AlgorithmIdentifier,
  4118. signature BIT STRING,
  4119. certs [0] EXPLICIT Sequence OF Certificate OPTIONAL}
  4120. </pre>
  4121. </member>
  4122. <member name="M:Org.BouncyCastle.Asn1.Ocsp.SingleResponse.ToAsn1Object">
  4123. Produce an object suitable for an Asn1OutputStream.
  4124. <pre>
  4125. SingleResponse ::= Sequence {
  4126. certID CertID,
  4127. certStatus CertStatus,
  4128. thisUpdate GeneralizedTime,
  4129. nextUpdate [0] EXPLICIT GeneralizedTime OPTIONAL,
  4130. singleExtensions [1] EXPLICIT Extensions OPTIONAL }
  4131. </pre>
  4132. </member>
  4133. <member name="M:Org.BouncyCastle.Asn1.Ocsp.TbsRequest.ToAsn1Object">
  4134. Produce an object suitable for an Asn1OutputStream.
  4135. <pre>
  4136. TBSRequest ::= Sequence {
  4137. version [0] EXPLICIT Version DEFAULT v1,
  4138. requestorName [1] EXPLICIT GeneralName OPTIONAL,
  4139. requestList Sequence OF Request,
  4140. requestExtensions [2] EXPLICIT Extensions OPTIONAL }
  4141. </pre>
  4142. </member>
  4143. <member name="T:Org.BouncyCastle.Asn1.OidTokenizer">
  4144. class for breaking up an Oid into it's component tokens, ala
  4145. java.util.StringTokenizer. We need this class as some of the
  4146. lightweight Java environment don't support classes like
  4147. StringTokenizer.
  4148. </member>
  4149. <member name="M:Org.BouncyCastle.Asn1.Pkcs.AttributePkcs.GetInstance(System.Object)">
  4150. return an Attribute object from the given object.
  4151. @param o the object we want converted.
  4152. @exception ArgumentException if the object cannot be converted.
  4153. </member>
  4154. <member name="M:Org.BouncyCastle.Asn1.Pkcs.AttributePkcs.ToAsn1Object">
  4155. Produce an object suitable for an Asn1OutputStream.
  4156. <pre>
  4157. Attr ::= Sequence {
  4158. attrType OBJECT IDENTIFIER,
  4159. attrValues Set OF AttributeValue
  4160. }
  4161. </pre>
  4162. </member>
  4163. <member name="T:Org.BouncyCastle.Asn1.Pkcs.CertificationRequest">
  4164. Pkcs10 Certfication request object.
  4165. <pre>
  4166. CertificationRequest ::= Sequence {
  4167. certificationRequestInfo CertificationRequestInfo,
  4168. signatureAlgorithm AlgorithmIdentifier{{ SignatureAlgorithms }},
  4169. signature BIT STRING
  4170. }
  4171. </pre>
  4172. </member>
  4173. <member name="T:Org.BouncyCastle.Asn1.Pkcs.CertificationRequestInfo">
  4174. Pkcs10 CertificationRequestInfo object.
  4175. <pre>
  4176. CertificationRequestInfo ::= Sequence {
  4177. version Integer { v1(0) } (v1,...),
  4178. subject Name,
  4179. subjectPKInfo SubjectPublicKeyInfo{{ PKInfoAlgorithms }},
  4180. attributes [0] Attributes{{ CRIAttributes }}
  4181. }
  4182. Attributes { ATTRIBUTE:IOSet } ::= Set OF Attr{{ IOSet }}
  4183. Attr { ATTRIBUTE:IOSet } ::= Sequence {
  4184. type ATTRIBUTE.&amp;id({IOSet}),
  4185. values Set SIZE(1..MAX) OF ATTRIBUTE.&amp;Type({IOSet}{\@type})
  4186. }
  4187. </pre>
  4188. </member>
  4189. <member name="M:Org.BouncyCastle.Asn1.Pkcs.ContentInfo.ToAsn1Object">
  4190. Produce an object suitable for an Asn1OutputStream.
  4191. <pre>
  4192. ContentInfo ::= Sequence {
  4193. contentType ContentType,
  4194. content
  4195. [0] EXPLICIT ANY DEFINED BY contentType OPTIONAL }
  4196. </pre>
  4197. </member>
  4198. <member name="T:Org.BouncyCastle.Asn1.Pkcs.EncryptedData">
  4199. The EncryptedData object.
  4200. <pre>
  4201. EncryptedData ::= Sequence {
  4202. version Version,
  4203. encryptedContentInfo EncryptedContentInfo
  4204. }
  4205. EncryptedContentInfo ::= Sequence {
  4206. contentType ContentType,
  4207. contentEncryptionAlgorithm ContentEncryptionAlgorithmIdentifier,
  4208. encryptedContent [0] IMPLICIT EncryptedContent OPTIONAL
  4209. }
  4210. EncryptedContent ::= OCTET STRING
  4211. </pre>
  4212. </member>
  4213. <member name="M:Org.BouncyCastle.Asn1.Pkcs.EncryptedPrivateKeyInfo.ToAsn1Object">
  4214. Produce an object suitable for an Asn1OutputStream.
  4215. <pre>
  4216. EncryptedPrivateKeyInfo ::= Sequence {
  4217. encryptionAlgorithm AlgorithmIdentifier {{KeyEncryptionAlgorithms}},
  4218. encryptedData EncryptedData
  4219. }
  4220. EncryptedData ::= OCTET STRING
  4221. KeyEncryptionAlgorithms ALGORITHM-IDENTIFIER ::= {
  4222. ... -- For local profiles
  4223. }
  4224. </pre>
  4225. </member>
  4226. <member name="M:Org.BouncyCastle.Asn1.Pkcs.MacData.ToAsn1Object">
  4227. <pre>
  4228. MacData ::= SEQUENCE {
  4229. mac DigestInfo,
  4230. macSalt OCTET STRING,
  4231. iterations INTEGER DEFAULT 1
  4232. -- Note: The default is for historic reasons and its use is deprecated. A
  4233. -- higher value, like 1024 is recommended.
  4234. </pre>
  4235. @return the basic DERObject construction.
  4236. </member>
  4237. <member name="T:Org.BouncyCastle.Asn1.Pkcs.Pfx">
  4238. the infamous Pfx from Pkcs12
  4239. </member>
  4240. <member name="F:Org.BouncyCastle.Asn1.Pkcs.PkcsObjectIdentifiers.Sha512_224WithRSAEncryption">
  4241. PKCS#1: 1.2.840.113549.1.1.15
  4242. </member>
  4243. <member name="F:Org.BouncyCastle.Asn1.Pkcs.PkcsObjectIdentifiers.Sha512_256WithRSAEncryption">
  4244. PKCS#1: 1.2.840.113549.1.1.16
  4245. </member>
  4246. <member name="F:Org.BouncyCastle.Asn1.Pkcs.PkcsObjectIdentifiers.IdAlgAeadChaCha20Poly1305">
  4247. <pre>
  4248. id-alg-AEADChaCha20Poly1305 OBJECT IDENTIFIER ::=
  4249. { iso(1) member-body(2) us(840) rsadsi(113549) pkcs(1)
  4250. pkcs9(9) smime(16) alg(3) 18 }
  4251. AEADChaCha20Poly1305Nonce ::= OCTET STRING (SIZE(12))
  4252. </pre>
  4253. </member>
  4254. <member name="F:Org.BouncyCastle.Asn1.Pkcs.PkcsObjectIdentifiers.IdAADecryptKeyID">
  4255. PKCS#9: 1.2.840.113549.1.9.16.2.37 - <a href="https://tools.ietf.org/html/rfc4108#section-2.2.5">RFC 4108</a>
  4256. </member>
  4257. <member name="F:Org.BouncyCastle.Asn1.Pkcs.PkcsObjectIdentifiers.IdAAImplCryptoAlgs">
  4258. PKCS#9: 1.2.840.113549.1.9.16.2.38 - <a href="https://tools.ietf.org/html/rfc4108#section-2.2.6">RFC 4108</a>
  4259. </member>
  4260. <member name="F:Org.BouncyCastle.Asn1.Pkcs.PkcsObjectIdentifiers.IdAAAsymmDecryptKeyID">
  4261. PKCS#9: 1.2.840.113549.1.9.16.2.54 <a href="https://tools.ietf.org/html/rfc7030">RFC7030</a>
  4262. </member>
  4263. <member name="F:Org.BouncyCastle.Asn1.Pkcs.PkcsObjectIdentifiers.IdAAImplCompressAlgs">
  4264. PKCS#9: 1.2.840.113549.1.9.16.2.43 <a href="https://tools.ietf.org/html/rfc7030">RFC7030</a>
  4265. </member>
  4266. <member name="F:Org.BouncyCastle.Asn1.Pkcs.PkcsObjectIdentifiers.IdAACommunityIdentifiers">
  4267. PKCS#9: 1.2.840.113549.1.9.16.2.40 <a href="https://tools.ietf.org/html/rfc7030">RFC7030</a>
  4268. </member>
  4269. <member name="T:Org.BouncyCastle.Asn1.Pkcs.PrivateKeyInfo">
  4270. RFC 5958
  4271. <pre>
  4272. [IMPLICIT TAGS]
  4273. OneAsymmetricKey ::= SEQUENCE {
  4274. version Version,
  4275. privateKeyAlgorithm PrivateKeyAlgorithmIdentifier,
  4276. privateKey PrivateKey,
  4277. attributes [0] Attributes OPTIONAL,
  4278. ...,
  4279. [[2: publicKey [1] PublicKey OPTIONAL ]],
  4280. ...
  4281. }
  4282. PrivateKeyInfo ::= OneAsymmetricKey
  4283. Version ::= INTEGER { v1(0), v2(1) } (v1, ..., v2)
  4284. PrivateKeyAlgorithmIdentifier ::= AlgorithmIdentifier
  4285. { PUBLIC-KEY,
  4286. { PrivateKeyAlgorithms } }
  4287. PrivateKey ::= OCTET STRING
  4288. -- Content varies based on type of key. The
  4289. -- algorithm identifier dictates the format of
  4290. -- the key.
  4291. PublicKey ::= BIT STRING
  4292. -- Content varies based on type of key. The
  4293. -- algorithm identifier dictates the format of
  4294. -- the key.
  4295. Attributes ::= SET OF Attribute { { OneAsymmetricKeyAttributes } }
  4296. </pre>
  4297. </member>
  4298. <member name="P:Org.BouncyCastle.Asn1.Pkcs.PrivateKeyInfo.HasPublicKey">
  4299. <summary>Return true if a public key is present, false otherwise.</summary>
  4300. </member>
  4301. <member name="M:Org.BouncyCastle.Asn1.Pkcs.PrivateKeyInfo.ParsePublicKey">
  4302. <summary>For when the public key is an ASN.1 encoding.</summary>
  4303. </member>
  4304. <member name="P:Org.BouncyCastle.Asn1.Pkcs.PrivateKeyInfo.PublicKeyData">
  4305. <summary>Return the public key as a raw bit string.</summary>
  4306. </member>
  4307. <member name="M:Org.BouncyCastle.Asn1.Pkcs.RsaesOaepParameters.#ctor">
  4308. The default version
  4309. </member>
  4310. <member name="M:Org.BouncyCastle.Asn1.Pkcs.RsaesOaepParameters.ToAsn1Object">
  4311. <pre>
  4312. RSAES-OAEP-params ::= SEQUENCE {
  4313. hashAlgorithm [0] OAEP-PSSDigestAlgorithms DEFAULT sha1,
  4314. maskGenAlgorithm [1] PKCS1MGFAlgorithms DEFAULT mgf1SHA1,
  4315. pSourceAlgorithm [2] PKCS1PSourceAlgorithms DEFAULT pSpecifiedEmpty
  4316. }
  4317. OAEP-PSSDigestAlgorithms ALGORITHM-IDENTIFIER ::= {
  4318. { OID id-sha1 PARAMETERS NULL }|
  4319. { OID id-sha256 PARAMETERS NULL }|
  4320. { OID id-sha384 PARAMETERS NULL }|
  4321. { OID id-sha512 PARAMETERS NULL },
  4322. ... -- Allows for future expansion --
  4323. }
  4324. PKCS1MGFAlgorithms ALGORITHM-IDENTIFIER ::= {
  4325. { OID id-mgf1 PARAMETERS OAEP-PSSDigestAlgorithms },
  4326. ... -- Allows for future expansion --
  4327. }
  4328. PKCS1PSourceAlgorithms ALGORITHM-IDENTIFIER ::= {
  4329. { OID id-pSpecified PARAMETERS OCTET STRING },
  4330. ... -- Allows for future expansion --
  4331. }
  4332. </pre>
  4333. @return the asn1 primitive representing the parameters.
  4334. </member>
  4335. <member name="M:Org.BouncyCastle.Asn1.Pkcs.RsaPrivateKeyStructure.ToAsn1Object">
  4336. This outputs the key in Pkcs1v2 format.
  4337. <pre>
  4338. RsaPrivateKey ::= Sequence {
  4339. version Version,
  4340. modulus Integer, -- n
  4341. publicExponent Integer, -- e
  4342. privateExponent Integer, -- d
  4343. prime1 Integer, -- p
  4344. prime2 Integer, -- q
  4345. exponent1 Integer, -- d mod (p-1)
  4346. exponent2 Integer, -- d mod (q-1)
  4347. coefficient Integer -- (inverse of q) mod p
  4348. }
  4349. Version ::= Integer
  4350. </pre>
  4351. <p>This routine is written to output Pkcs1 version 0, private keys.</p>
  4352. </member>
  4353. <member name="M:Org.BouncyCastle.Asn1.Pkcs.RsassaPssParameters.#ctor">
  4354. The default version
  4355. </member>
  4356. <member name="M:Org.BouncyCastle.Asn1.Pkcs.RsassaPssParameters.ToAsn1Object">
  4357. <pre>
  4358. RSASSA-PSS-params ::= SEQUENCE {
  4359. hashAlgorithm [0] OAEP-PSSDigestAlgorithms DEFAULT sha1,
  4360. maskGenAlgorithm [1] PKCS1MGFAlgorithms DEFAULT mgf1SHA1,
  4361. saltLength [2] INTEGER DEFAULT 20,
  4362. trailerField [3] TrailerField DEFAULT trailerFieldBC
  4363. }
  4364. OAEP-PSSDigestAlgorithms ALGORITHM-IDENTIFIER ::= {
  4365. { OID id-sha1 PARAMETERS NULL }|
  4366. { OID id-sha256 PARAMETERS NULL }|
  4367. { OID id-sha384 PARAMETERS NULL }|
  4368. { OID id-sha512 PARAMETERS NULL },
  4369. ... -- Allows for future expansion --
  4370. }
  4371. PKCS1MGFAlgorithms ALGORITHM-IDENTIFIER ::= {
  4372. { OID id-mgf1 PARAMETERS OAEP-PSSDigestAlgorithms },
  4373. ... -- Allows for future expansion --
  4374. }
  4375. TrailerField ::= INTEGER { trailerFieldBC(1) }
  4376. </pre>
  4377. @return the asn1 primitive representing the parameters.
  4378. </member>
  4379. <member name="T:Org.BouncyCastle.Asn1.Pkcs.SignedData">
  4380. a Pkcs#7 signed data object.
  4381. </member>
  4382. <member name="M:Org.BouncyCastle.Asn1.Pkcs.SignedData.ToAsn1Object">
  4383. Produce an object suitable for an Asn1OutputStream.
  4384. <pre>
  4385. SignedData ::= Sequence {
  4386. version Version,
  4387. digestAlgorithms DigestAlgorithmIdentifiers,
  4388. contentInfo ContentInfo,
  4389. certificates
  4390. [0] IMPLICIT ExtendedCertificatesAndCertificates
  4391. OPTIONAL,
  4392. crls
  4393. [1] IMPLICIT CertificateRevocationLists OPTIONAL,
  4394. signerInfos SignerInfos }
  4395. </pre>
  4396. </member>
  4397. <member name="T:Org.BouncyCastle.Asn1.Pkcs.SignerInfo">
  4398. a Pkcs#7 signer info object.
  4399. </member>
  4400. <member name="M:Org.BouncyCastle.Asn1.Pkcs.SignerInfo.ToAsn1Object">
  4401. Produce an object suitable for an Asn1OutputStream.
  4402. <pre>
  4403. SignerInfo ::= Sequence {
  4404. version Version,
  4405. issuerAndSerialNumber IssuerAndSerialNumber,
  4406. digestAlgorithm DigestAlgorithmIdentifier,
  4407. authenticatedAttributes [0] IMPLICIT Attributes OPTIONAL,
  4408. digestEncryptionAlgorithm DigestEncryptionAlgorithmIdentifier,
  4409. encryptedDigest EncryptedDigest,
  4410. unauthenticatedAttributes [1] IMPLICIT Attributes OPTIONAL
  4411. }
  4412. EncryptedDigest ::= OCTET STRING
  4413. DigestAlgorithmIdentifier ::= AlgorithmIdentifier
  4414. DigestEncryptionAlgorithmIdentifier ::= AlgorithmIdentifier
  4415. </pre>
  4416. </member>
  4417. <member name="T:Org.BouncyCastle.Asn1.Sec.ECPrivateKeyStructure">
  4418. the elliptic curve private key object from SEC 1
  4419. </member>
  4420. <member name="M:Org.BouncyCastle.Asn1.Sec.ECPrivateKeyStructure.ToAsn1Object">
  4421. ECPrivateKey ::= SEQUENCE {
  4422. version INTEGER { ecPrivkeyVer1(1) } (ecPrivkeyVer1),
  4423. privateKey OCTET STRING,
  4424. parameters [0] Parameters OPTIONAL,
  4425. publicKey [1] BIT STRING OPTIONAL }
  4426. </member>
  4427. <member name="M:Org.BouncyCastle.Asn1.Sec.SecNamedCurves.GetByOid(Org.BouncyCastle.Asn1.DerObjectIdentifier)">
  4428. return the X9ECParameters object for the named curve represented by
  4429. the passed in object identifier. Null if the curve isn't present.
  4430. @param oid an object identifier representing a named curve, if present.
  4431. </member>
  4432. <member name="M:Org.BouncyCastle.Asn1.Sec.SecNamedCurves.GetOid(System.String)">
  4433. return the object identifier signified by the passed in name. Null
  4434. if there is no object identifier associated with name.
  4435. @return the object identifier associated with name, if present.
  4436. </member>
  4437. <member name="M:Org.BouncyCastle.Asn1.Sec.SecNamedCurves.GetName(Org.BouncyCastle.Asn1.DerObjectIdentifier)">
  4438. return the named curve name represented by the given object identifier.
  4439. </member>
  4440. <member name="P:Org.BouncyCastle.Asn1.Sec.SecNamedCurves.Names">
  4441. returns an enumeration containing the name strings for curves
  4442. contained in this structure.
  4443. </member>
  4444. <member name="F:Org.BouncyCastle.Asn1.Sec.SecObjectIdentifiers.EllipticCurve">
  4445. EllipticCurve OBJECT IDENTIFIER ::= {
  4446. iso(1) identified-organization(3) certicom(132) curve(0)
  4447. }
  4448. </member>
  4449. <member name="T:Org.BouncyCastle.Asn1.Smime.SmimeCapabilities">
  4450. Handler class for dealing with S/MIME Capabilities
  4451. </member>
  4452. <member name="F:Org.BouncyCastle.Asn1.Smime.SmimeCapabilities.PreferSignedData">
  4453. general preferences
  4454. </member>
  4455. <member name="F:Org.BouncyCastle.Asn1.Smime.SmimeCapabilities.Aes256Cbc">
  4456. encryption algorithms preferences
  4457. </member>
  4458. <member name="M:Org.BouncyCastle.Asn1.Smime.SmimeCapabilities.GetInstance(System.Object)">
  4459. return an Attr object from the given object.
  4460. @param o the object we want converted.
  4461. @exception ArgumentException if the object cannot be converted.
  4462. </member>
  4463. <member name="M:Org.BouncyCastle.Asn1.Smime.SmimeCapabilities.GetCapabilitiesForOid(Org.BouncyCastle.Asn1.DerObjectIdentifier)">
  4464. returns an ArrayList with 0 or more objects of all the capabilities
  4465. matching the passed in capability Oid. If the Oid passed is null the
  4466. entire set is returned.
  4467. </member>
  4468. <member name="M:Org.BouncyCastle.Asn1.Smime.SmimeCapabilities.ToAsn1Object">
  4469. Produce an object suitable for an Asn1OutputStream.
  4470. <pre>
  4471. SMIMECapabilities ::= Sequence OF SMIMECapability
  4472. </pre>
  4473. </member>
  4474. <member name="F:Org.BouncyCastle.Asn1.Smime.SmimeCapability.PreferSignedData">
  4475. general preferences
  4476. </member>
  4477. <member name="F:Org.BouncyCastle.Asn1.Smime.SmimeCapability.DesCbc">
  4478. encryption algorithms preferences
  4479. </member>
  4480. <member name="M:Org.BouncyCastle.Asn1.Smime.SmimeCapability.ToAsn1Object">
  4481. Produce an object suitable for an Asn1OutputStream.
  4482. <pre>
  4483. SMIMECapability ::= Sequence {
  4484. capabilityID OBJECT IDENTIFIER,
  4485. parameters ANY DEFINED BY capabilityID OPTIONAL
  4486. }
  4487. </pre>
  4488. </member>
  4489. <member name="T:Org.BouncyCastle.Asn1.Smime.SmimeCapabilityVector">
  4490. Handler for creating a vector S/MIME Capabilities
  4491. </member>
  4492. <member name="T:Org.BouncyCastle.Asn1.Smime.SmimeEncryptionKeyPreferenceAttribute">
  4493. The SmimeEncryptionKeyPreference object.
  4494. <pre>
  4495. SmimeEncryptionKeyPreference ::= CHOICE {
  4496. issuerAndSerialNumber [0] IssuerAndSerialNumber,
  4497. receipentKeyId [1] RecipientKeyIdentifier,
  4498. subjectAltKeyIdentifier [2] SubjectKeyIdentifier
  4499. }
  4500. </pre>
  4501. </member>
  4502. <member name="M:Org.BouncyCastle.Asn1.Smime.SmimeEncryptionKeyPreferenceAttribute.#ctor(Org.BouncyCastle.Asn1.Asn1OctetString)">
  4503. @param sKeyId the subjectKeyIdentifier value (normally the X.509 one)
  4504. </member>
  4505. <member name="T:Org.BouncyCastle.Asn1.TeleTrust.TeleTrusTNamedCurves">
  4506. elliptic curves defined in "ECC Brainpool Standard Curves and Curve Generation"
  4507. http://www.ecc-brainpool.org/download/draft_pkix_additional_ecc_dp.txt
  4508. </member>
  4509. <member name="M:Org.BouncyCastle.Asn1.TeleTrust.TeleTrusTNamedCurves.GetByOid(Org.BouncyCastle.Asn1.DerObjectIdentifier)">
  4510. return the X9ECParameters object for the named curve represented by
  4511. the passed in object identifier. Null if the curve isn't present.
  4512. @param oid an object identifier representing a named curve, if present.
  4513. </member>
  4514. <member name="M:Org.BouncyCastle.Asn1.TeleTrust.TeleTrusTNamedCurves.GetOid(System.String)">
  4515. return the object identifier signified by the passed in name. Null
  4516. if there is no object identifier associated with name.
  4517. @return the object identifier associated with name, if present.
  4518. </member>
  4519. <member name="M:Org.BouncyCastle.Asn1.TeleTrust.TeleTrusTNamedCurves.GetName(Org.BouncyCastle.Asn1.DerObjectIdentifier)">
  4520. return the named curve name represented by the given object identifier.
  4521. </member>
  4522. <member name="P:Org.BouncyCastle.Asn1.TeleTrust.TeleTrusTNamedCurves.Names">
  4523. returns an enumeration containing the name strings for curves
  4524. contained in this structure.
  4525. </member>
  4526. <member name="M:Org.BouncyCastle.Asn1.Tsp.Accuracy.ToAsn1Object">
  4527. <pre>
  4528. Accuracy ::= SEQUENCE {
  4529. seconds INTEGER OPTIONAL,
  4530. millis [0] INTEGER (1..999) OPTIONAL,
  4531. micros [1] INTEGER (1..999) OPTIONAL
  4532. }
  4533. </pre>
  4534. </member>
  4535. <member name="M:Org.BouncyCastle.Asn1.Tsp.MessageImprint.ToAsn1Object">
  4536. <pre>
  4537. MessageImprint ::= SEQUENCE {
  4538. hashAlgorithm AlgorithmIdentifier,
  4539. hashedMessage OCTET STRING }
  4540. </pre>
  4541. </member>
  4542. <member name="M:Org.BouncyCastle.Asn1.Tsp.TimeStampReq.ToAsn1Object">
  4543. <pre>
  4544. TimeStampReq ::= SEQUENCE {
  4545. version INTEGER { v1(1) },
  4546. messageImprint MessageImprint,
  4547. --a hash algorithm OID and the hash value of the data to be
  4548. --time-stamped
  4549. reqPolicy TSAPolicyId OPTIONAL,
  4550. nonce INTEGER OPTIONAL,
  4551. certReq BOOLEAN DEFAULT FALSE,
  4552. extensions [0] IMPLICIT Extensions OPTIONAL
  4553. }
  4554. </pre>
  4555. </member>
  4556. <member name="M:Org.BouncyCastle.Asn1.Tsp.TimeStampResp.ToAsn1Object">
  4557. <pre>
  4558. TimeStampResp ::= SEQUENCE {
  4559. status PkiStatusInfo,
  4560. timeStampToken TimeStampToken OPTIONAL }
  4561. </pre>
  4562. </member>
  4563. <member name="M:Org.BouncyCastle.Asn1.Tsp.TstInfo.ToAsn1Object">
  4564. <pre>
  4565. TstInfo ::= SEQUENCE {
  4566. version INTEGER { v1(1) },
  4567. policy TSAPolicyId,
  4568. messageImprint MessageImprint,
  4569. -- MUST have the same value as the similar field in
  4570. -- TimeStampReq
  4571. serialNumber INTEGER,
  4572. -- Time-Stamping users MUST be ready to accommodate integers
  4573. -- up to 160 bits.
  4574. genTime GeneralizedTime,
  4575. accuracy Accuracy OPTIONAL,
  4576. ordering BOOLEAN DEFAULT FALSE,
  4577. nonce INTEGER OPTIONAL,
  4578. -- MUST be present if the similar field was present
  4579. -- in TimeStampReq. In that case it MUST have the same value.
  4580. tsa [0] GeneralName OPTIONAL,
  4581. extensions [1] IMPLICIT Extensions OPTIONAL }
  4582. </pre>
  4583. </member>
  4584. <!-- Badly formed XML comment ignored for member "T:Org.BouncyCastle.Asn1.UA.UAObjectIdentifiers" -->
  4585. <member name="F:Org.BouncyCastle.Asn1.UA.UAObjectIdentifiers.UaOid">
  4586. Base OID: 1.2.804.2.1.1.1
  4587. </member>
  4588. <member name="F:Org.BouncyCastle.Asn1.UA.UAObjectIdentifiers.dstu4145le">
  4589. DSTU4145 Little Endian presentation. OID: 1.2.804.2.1.1.1.1.3.1.1
  4590. </member>
  4591. <member name="F:Org.BouncyCastle.Asn1.UA.UAObjectIdentifiers.dstu4145be">
  4592. DSTU4145 Big Endian presentation. OID: 1.2.804.2.1.1.1.1.3.1.1.1
  4593. </member>
  4594. <member name="F:Org.BouncyCastle.Asn1.UA.UAObjectIdentifiers.dstu7564digest_256">
  4595. DSTU7564 256-bit digest presentation.
  4596. </member>
  4597. <member name="F:Org.BouncyCastle.Asn1.UA.UAObjectIdentifiers.dstu7564digest_384">
  4598. DSTU7564 384-bit digest presentation.
  4599. </member>
  4600. <member name="F:Org.BouncyCastle.Asn1.UA.UAObjectIdentifiers.dstu7564digest_512">
  4601. DSTU7564 512-bit digest presentation.
  4602. </member>
  4603. <member name="F:Org.BouncyCastle.Asn1.UA.UAObjectIdentifiers.dstu7564mac_256">
  4604. DSTU7564 256-bit mac presentation.
  4605. </member>
  4606. <member name="F:Org.BouncyCastle.Asn1.UA.UAObjectIdentifiers.dstu7564mac_384">
  4607. DSTU7564 384-bit mac presentation.
  4608. </member>
  4609. <member name="F:Org.BouncyCastle.Asn1.UA.UAObjectIdentifiers.dstu7564mac_512">
  4610. DSTU7564 512-bit mac presentation.
  4611. </member>
  4612. <member name="F:Org.BouncyCastle.Asn1.UA.UAObjectIdentifiers.dstu7624ecb_128">
  4613. DSTU7624 in ECB mode with 128 bit block/key presentation
  4614. </member>
  4615. <member name="F:Org.BouncyCastle.Asn1.UA.UAObjectIdentifiers.dstu7624ecb_256">
  4616. DSTU7624 in ECB mode with 256 bit block/key presentation
  4617. </member>
  4618. <member name="F:Org.BouncyCastle.Asn1.UA.UAObjectIdentifiers.dstu7624ecb_512">
  4619. DSTU7624 in ECB mode with 512 bit block/key presentation
  4620. </member>
  4621. <member name="F:Org.BouncyCastle.Asn1.UA.UAObjectIdentifiers.dstu7624ctr_128">
  4622. DSTU7624 in CTR mode with 128 bit block/key presentation
  4623. </member>
  4624. <member name="F:Org.BouncyCastle.Asn1.UA.UAObjectIdentifiers.dstu7624ctr_256">
  4625. DSTU7624 in CTR mode with 256 bit block/key presentation
  4626. </member>
  4627. <member name="F:Org.BouncyCastle.Asn1.UA.UAObjectIdentifiers.dstu7624ctr_512">
  4628. DSTU7624 in CTR mode with 512 bit block/key presentation
  4629. </member>
  4630. <member name="F:Org.BouncyCastle.Asn1.UA.UAObjectIdentifiers.dstu7624cfb_128">
  4631. DSTU7624 in CFB mode with 128 bit block/key presentation
  4632. </member>
  4633. <member name="F:Org.BouncyCastle.Asn1.UA.UAObjectIdentifiers.dstu7624cfb_256">
  4634. DSTU7624 in CFB mode with 256 bit block/key presentation
  4635. </member>
  4636. <member name="F:Org.BouncyCastle.Asn1.UA.UAObjectIdentifiers.dstu7624cfb_512">
  4637. DSTU7624 in CFB mode with 512 bit block/key presentation
  4638. </member>
  4639. <member name="F:Org.BouncyCastle.Asn1.UA.UAObjectIdentifiers.dstu7624cmac_128">
  4640. DSTU7624 in MAC mode with 128 bit block/key presentation
  4641. </member>
  4642. <member name="F:Org.BouncyCastle.Asn1.UA.UAObjectIdentifiers.dstu7624cmac_256">
  4643. DSTU7624 in MAC mode with 256 bit block/key presentation
  4644. </member>
  4645. <member name="F:Org.BouncyCastle.Asn1.UA.UAObjectIdentifiers.dstu7624cmac_512">
  4646. DSTU7624 in MAC mode with 512 bit block/key presentation
  4647. </member>
  4648. <member name="F:Org.BouncyCastle.Asn1.UA.UAObjectIdentifiers.dstu7624cbc_128">
  4649. DSTU7624 in CBC mode with 128 bit block/key presentation
  4650. </member>
  4651. <member name="F:Org.BouncyCastle.Asn1.UA.UAObjectIdentifiers.dstu7624cbc_256">
  4652. DSTU7624 in CBC mode with 256 bit block/key presentation
  4653. </member>
  4654. <member name="F:Org.BouncyCastle.Asn1.UA.UAObjectIdentifiers.dstu7624cbc_512">
  4655. DSTU7624 in CBC mode with 512 bit block/key presentation
  4656. </member>
  4657. <member name="F:Org.BouncyCastle.Asn1.UA.UAObjectIdentifiers.dstu7624ofb_128">
  4658. DSTU7624 in OFB mode with 128 bit block/key presentation
  4659. </member>
  4660. <member name="F:Org.BouncyCastle.Asn1.UA.UAObjectIdentifiers.dstu7624ofb_256">
  4661. DSTU7624 in OFB mode with 256 bit block/key presentation
  4662. </member>
  4663. <member name="F:Org.BouncyCastle.Asn1.UA.UAObjectIdentifiers.dstu7624ofb_512">
  4664. DSTU7624 in OFB mode with 512 bit block/key presentation
  4665. </member>
  4666. <member name="F:Org.BouncyCastle.Asn1.UA.UAObjectIdentifiers.dstu7624gmac_128">
  4667. DSTU7624 in GMAC (GCM witout encryption) mode with 128 bit block/key presentation
  4668. </member>
  4669. <member name="F:Org.BouncyCastle.Asn1.UA.UAObjectIdentifiers.dstu7624gmac_256">
  4670. DSTU7624 in GMAC (GCM witout encryption) mode with 256 bit block/key presentation
  4671. </member>
  4672. <member name="F:Org.BouncyCastle.Asn1.UA.UAObjectIdentifiers.dstu7624gmac_512">
  4673. DSTU7624 in GMAC (GCM witout encryption) mode with 512 bit block/key presentation
  4674. </member>
  4675. <member name="F:Org.BouncyCastle.Asn1.UA.UAObjectIdentifiers.dstu7624ccm_128">
  4676. DSTU7624 in CCM mode with 128 bit block/key presentation
  4677. </member>
  4678. <member name="F:Org.BouncyCastle.Asn1.UA.UAObjectIdentifiers.dstu7624ccm_256">
  4679. DSTU7624 in CCM mode with 256 bit block/key presentation
  4680. </member>
  4681. <member name="F:Org.BouncyCastle.Asn1.UA.UAObjectIdentifiers.dstu7624ccm_512">
  4682. DSTU7624 in CCM mode with 512 bit block/key presentation
  4683. </member>
  4684. <member name="F:Org.BouncyCastle.Asn1.UA.UAObjectIdentifiers.dstu7624xts_128">
  4685. DSTU7624 in XTS mode with 128 bit block/key presentation
  4686. </member>
  4687. <member name="F:Org.BouncyCastle.Asn1.UA.UAObjectIdentifiers.dstu7624xts_256">
  4688. DSTU7624 in XTS mode with 256 bit block/key presentation
  4689. </member>
  4690. <member name="F:Org.BouncyCastle.Asn1.UA.UAObjectIdentifiers.dstu7624xts_512">
  4691. DSTU7624 in XTS mode with 512 bit block/key presentation
  4692. </member>
  4693. <member name="F:Org.BouncyCastle.Asn1.UA.UAObjectIdentifiers.dstu7624kw_128">
  4694. DSTU7624 in key wrap (KW) mode with 128 bit block/key presentation
  4695. </member>
  4696. <member name="F:Org.BouncyCastle.Asn1.UA.UAObjectIdentifiers.dstu7624kw_256">
  4697. DSTU7624 in key wrap (KW) mode with 256 bit block/key presentation
  4698. </member>
  4699. <member name="F:Org.BouncyCastle.Asn1.UA.UAObjectIdentifiers.dstu7624kw_512">
  4700. DSTU7624 in key wrap (KW) mode with 512 bit block/key presentation
  4701. </member>
  4702. <member name="M:Org.BouncyCastle.Asn1.Utilities.Asn1Dump.AsString(System.String,System.Boolean,Org.BouncyCastle.Asn1.Asn1Object,System.Text.StringBuilder)">
  4703. dump a Der object as a formatted string with indentation
  4704. @param obj the Asn1Object to be dumped out.
  4705. </member>
  4706. <member name="M:Org.BouncyCastle.Asn1.Utilities.Asn1Dump.DumpAsString(Org.BouncyCastle.Asn1.Asn1Encodable)">
  4707. dump out a DER object as a formatted string, in non-verbose mode
  4708. @param obj the Asn1Encodable to be dumped out.
  4709. @return the resulting string.
  4710. </member>
  4711. <member name="M:Org.BouncyCastle.Asn1.Utilities.Asn1Dump.DumpAsString(Org.BouncyCastle.Asn1.Asn1Encodable,System.Boolean)">
  4712. Dump out the object as a string
  4713. @param obj the Asn1Encodable to be dumped out.
  4714. @param verbose if true, dump out the contents of octet and bit strings.
  4715. @return the resulting string.
  4716. </member>
  4717. <member name="T:Org.BouncyCastle.Asn1.X500.AttributeTypeAndValue">
  4718. Holding class for the AttributeTypeAndValue structures that make up an RDN.
  4719. </member>
  4720. <member name="M:Org.BouncyCastle.Asn1.X500.AttributeTypeAndValue.ToAsn1Object">
  4721. <pre>
  4722. AttributeTypeAndValue ::= SEQUENCE {
  4723. type OBJECT IDENTIFIER,
  4724. value ANY DEFINED BY type }
  4725. </pre>
  4726. @return a basic ASN.1 object representation.
  4727. </member>
  4728. <member name="M:Org.BouncyCastle.Asn1.X500.DirectoryString.ToAsn1Object">
  4729. <pre>
  4730. DirectoryString ::= CHOICE {
  4731. teletexString TeletexString (SIZE (1..MAX)),
  4732. printableString PrintableString (SIZE (1..MAX)),
  4733. universalString UniversalString (SIZE (1..MAX)),
  4734. utf8String UTF8String (SIZE (1..MAX)),
  4735. bmpString BMPString (SIZE (1..MAX)) }
  4736. </pre>
  4737. </member>
  4738. <member name="T:Org.BouncyCastle.Asn1.X500.Rdn">
  4739. Holding class for a single Relative Distinguished Name (RDN).
  4740. </member>
  4741. <member name="M:Org.BouncyCastle.Asn1.X500.Rdn.#ctor(Org.BouncyCastle.Asn1.DerObjectIdentifier,Org.BouncyCastle.Asn1.Asn1Encodable)">
  4742. Create a single valued RDN.
  4743. @param oid RDN type.
  4744. @param value RDN value.
  4745. </member>
  4746. <member name="M:Org.BouncyCastle.Asn1.X500.Rdn.#ctor(Org.BouncyCastle.Asn1.X500.AttributeTypeAndValue[])">
  4747. Create a multi-valued RDN.
  4748. @param aAndVs attribute type/value pairs making up the RDN
  4749. </member>
  4750. <member name="P:Org.BouncyCastle.Asn1.X500.Rdn.Count">
  4751. Return the number of AttributeTypeAndValue objects in this RDN,
  4752. @return size of RDN, greater than 1 if multi-valued.
  4753. </member>
  4754. <member name="M:Org.BouncyCastle.Asn1.X500.Rdn.ToAsn1Object">
  4755. * <pre>
  4756. * RelativeDistinguishedName ::=
  4757. * SET OF AttributeTypeAndValue
  4758. * AttributeTypeAndValue ::= SEQUENCE {
  4759. * type AttributeType,
  4760. * value AttributeValue }
  4761. * </pre>
  4762. * @return this object as its ASN1Primitive type
  4763. </member>
  4764. <member name="T:Org.BouncyCastle.Asn1.X509.AccessDescription">
  4765. The AccessDescription object.
  4766. <pre>
  4767. AccessDescription ::= SEQUENCE {
  4768. accessMethod OBJECT IDENTIFIER,
  4769. accessLocation GeneralName }
  4770. </pre>
  4771. </member>
  4772. <member name="M:Org.BouncyCastle.Asn1.X509.AccessDescription.#ctor(Org.BouncyCastle.Asn1.DerObjectIdentifier,Org.BouncyCastle.Asn1.X509.GeneralName)">
  4773. create an AccessDescription with the oid and location provided.
  4774. </member>
  4775. <member name="P:Org.BouncyCastle.Asn1.X509.AccessDescription.AccessMethod">
  4776. @return the access method.
  4777. </member>
  4778. <member name="P:Org.BouncyCastle.Asn1.X509.AccessDescription.AccessLocation">
  4779. @return the access location
  4780. </member>
  4781. <member name="P:Org.BouncyCastle.Asn1.X509.AlgorithmIdentifier.Algorithm">
  4782. <summary>
  4783. Return the OID in the Algorithm entry of this identifier.
  4784. </summary>
  4785. </member>
  4786. <member name="P:Org.BouncyCastle.Asn1.X509.AlgorithmIdentifier.Parameters">
  4787. <summary>
  4788. Return the parameters structure in the Parameters entry of this identifier.
  4789. </summary>
  4790. </member>
  4791. <member name="M:Org.BouncyCastle.Asn1.X509.AlgorithmIdentifier.ToAsn1Object">
  4792. Produce an object suitable for an Asn1OutputStream.
  4793. <pre>
  4794. AlgorithmIdentifier ::= Sequence {
  4795. algorithm OBJECT IDENTIFIER,
  4796. parameters ANY DEFINED BY algorithm OPTIONAL }
  4797. </pre>
  4798. </member>
  4799. <member name="M:Org.BouncyCastle.Asn1.X509.AttCertIssuer.#ctor(Org.BouncyCastle.Asn1.X509.GeneralNames)">
  4800. <summary>
  4801. Don't use this one if you are trying to be RFC 3281 compliant.
  4802. Use it for v1 attribute certificates only.
  4803. </summary>
  4804. <param name="names">Our GeneralNames structure</param>
  4805. </member>
  4806. <member name="M:Org.BouncyCastle.Asn1.X509.AttCertIssuer.ToAsn1Object">
  4807. Produce an object suitable for an Asn1OutputStream.
  4808. <pre>
  4809. AttCertIssuer ::= CHOICE {
  4810. v1Form GeneralNames, -- MUST NOT be used in this
  4811. -- profile
  4812. v2Form [0] V2Form -- v2 only
  4813. }
  4814. </pre>
  4815. </member>
  4816. <member name="M:Org.BouncyCastle.Asn1.X509.AttCertValidityPeriod.ToAsn1Object">
  4817. Produce an object suitable for an Asn1OutputStream.
  4818. <pre>
  4819. AttCertValidityPeriod ::= Sequence {
  4820. notBeforeTime GeneralizedTime,
  4821. notAfterTime GeneralizedTime
  4822. }
  4823. </pre>
  4824. </member>
  4825. <member name="M:Org.BouncyCastle.Asn1.X509.AttributeX509.GetInstance(System.Object)">
  4826. return an Attr object from the given object.
  4827. @param o the object we want converted.
  4828. @exception ArgumentException if the object cannot be converted.
  4829. </member>
  4830. <member name="M:Org.BouncyCastle.Asn1.X509.AttributeX509.ToAsn1Object">
  4831. Produce an object suitable for an Asn1OutputStream.
  4832. <pre>
  4833. Attr ::= Sequence {
  4834. attrType OBJECT IDENTIFIER,
  4835. attrValues Set OF AttributeValue
  4836. }
  4837. </pre>
  4838. </member>
  4839. <member name="M:Org.BouncyCastle.Asn1.X509.AttributeCertificate.GetInstance(System.Object)">
  4840. @param obj
  4841. @return
  4842. </member>
  4843. <member name="M:Org.BouncyCastle.Asn1.X509.AttributeCertificate.ToAsn1Object">
  4844. Produce an object suitable for an Asn1OutputStream.
  4845. <pre>
  4846. AttributeCertificate ::= Sequence {
  4847. acinfo AttributeCertificateInfo,
  4848. signatureAlgorithm AlgorithmIdentifier,
  4849. signatureValue BIT STRING
  4850. }
  4851. </pre>
  4852. </member>
  4853. <member name="M:Org.BouncyCastle.Asn1.X509.AttributeCertificateInfo.ToAsn1Object">
  4854. Produce an object suitable for an Asn1OutputStream.
  4855. <pre>
  4856. AttributeCertificateInfo ::= Sequence {
  4857. version AttCertVersion -- version is v2,
  4858. holder Holder,
  4859. issuer AttCertIssuer,
  4860. signature AlgorithmIdentifier,
  4861. serialNumber CertificateSerialNumber,
  4862. attrCertValidityPeriod AttCertValidityPeriod,
  4863. attributes Sequence OF Attr,
  4864. issuerUniqueID UniqueIdentifier OPTIONAL,
  4865. extensions Extensions OPTIONAL
  4866. }
  4867. AttCertVersion ::= Integer { v2(1) }
  4868. </pre>
  4869. </member>
  4870. <member name="T:Org.BouncyCastle.Asn1.X509.AuthorityInformationAccess">
  4871. The AuthorityInformationAccess object.
  4872. <pre>
  4873. id-pe-authorityInfoAccess OBJECT IDENTIFIER ::= { id-pe 1 }
  4874. AuthorityInfoAccessSyntax ::=
  4875. Sequence SIZE (1..MAX) OF AccessDescription
  4876. AccessDescription ::= Sequence {
  4877. accessMethod OBJECT IDENTIFIER,
  4878. accessLocation GeneralName }
  4879. id-ad OBJECT IDENTIFIER ::= { id-pkix 48 }
  4880. id-ad-caIssuers OBJECT IDENTIFIER ::= { id-ad 2 }
  4881. id-ad-ocsp OBJECT IDENTIFIER ::= { id-ad 1 }
  4882. </pre>
  4883. </member>
  4884. <member name="M:Org.BouncyCastle.Asn1.X509.AuthorityInformationAccess.#ctor(Org.BouncyCastle.Asn1.DerObjectIdentifier,Org.BouncyCastle.Asn1.X509.GeneralName)">
  4885. create an AuthorityInformationAccess with the oid and location provided.
  4886. </member>
  4887. <member name="T:Org.BouncyCastle.Asn1.X509.AuthorityKeyIdentifier">
  4888. The AuthorityKeyIdentifier object.
  4889. <pre>
  4890. id-ce-authorityKeyIdentifier OBJECT IDENTIFIER ::= { id-ce 35 }
  4891. AuthorityKeyIdentifier ::= Sequence {
  4892. keyIdentifier [0] IMPLICIT KeyIdentifier OPTIONAL,
  4893. authorityCertIssuer [1] IMPLICIT GeneralNames OPTIONAL,
  4894. authorityCertSerialNumber [2] IMPLICIT CertificateSerialNumber OPTIONAL }
  4895. KeyIdentifier ::= OCTET STRING
  4896. </pre>
  4897. </member>
  4898. <member name="M:Org.BouncyCastle.Asn1.X509.AuthorityKeyIdentifier.#ctor(Org.BouncyCastle.Asn1.X509.SubjectPublicKeyInfo)">
  4899. *
  4900. * Calulates the keyidentifier using a SHA1 hash over the BIT STRING
  4901. * from SubjectPublicKeyInfo as defined in RFC2459.
  4902. *
  4903. * Example of making a AuthorityKeyIdentifier:
  4904. * <pre>
  4905. * SubjectPublicKeyInfo apki = new SubjectPublicKeyInfo((ASN1Sequence)new ASN1InputStream(
  4906. * publicKey.getEncoded()).readObject());
  4907. * AuthorityKeyIdentifier aki = new AuthorityKeyIdentifier(apki);
  4908. * </pre>
  4909. *
  4910. *
  4911. </member>
  4912. <member name="M:Org.BouncyCastle.Asn1.X509.AuthorityKeyIdentifier.#ctor(Org.BouncyCastle.Asn1.X509.SubjectPublicKeyInfo,Org.BouncyCastle.Asn1.X509.GeneralNames,Org.BouncyCastle.Math.BigInteger)">
  4913. create an AuthorityKeyIdentifier with the GeneralNames tag and
  4914. the serial number provided as well.
  4915. </member>
  4916. <member name="M:Org.BouncyCastle.Asn1.X509.AuthorityKeyIdentifier.#ctor(Org.BouncyCastle.Asn1.X509.GeneralNames,Org.BouncyCastle.Math.BigInteger)">
  4917. create an AuthorityKeyIdentifier with the GeneralNames tag and
  4918. the serial number provided.
  4919. </member>
  4920. <member name="M:Org.BouncyCastle.Asn1.X509.AuthorityKeyIdentifier.#ctor(System.Byte[])">
  4921. create an AuthorityKeyIdentifier with a precomputed key identifier
  4922. </member>
  4923. <member name="M:Org.BouncyCastle.Asn1.X509.AuthorityKeyIdentifier.#ctor(System.Byte[],Org.BouncyCastle.Asn1.X509.GeneralNames,Org.BouncyCastle.Math.BigInteger)">
  4924. create an AuthorityKeyIdentifier with a precomupted key identifier
  4925. and the GeneralNames tag and the serial number provided as well.
  4926. </member>
  4927. <member name="M:Org.BouncyCastle.Asn1.X509.AuthorityKeyIdentifier.ToAsn1Object">
  4928. Produce an object suitable for an Asn1OutputStream.
  4929. </member>
  4930. <member name="M:Org.BouncyCastle.Asn1.X509.BasicConstraints.#ctor(System.Int32)">
  4931. create a cA=true object for the given path length constraint.
  4932. @param pathLenConstraint
  4933. </member>
  4934. <member name="M:Org.BouncyCastle.Asn1.X509.BasicConstraints.ToAsn1Object">
  4935. Produce an object suitable for an Asn1OutputStream.
  4936. <pre>
  4937. BasicConstraints := Sequence {
  4938. cA Boolean DEFAULT FALSE,
  4939. pathLenConstraint Integer (0..MAX) OPTIONAL
  4940. }
  4941. </pre>
  4942. </member>
  4943. <member name="T:Org.BouncyCastle.Asn1.X509.CertificateList">
  4944. PKIX RFC-2459
  4945. The X.509 v2 CRL syntax is as follows. For signature calculation,
  4946. the data that is to be signed is ASN.1 Der encoded.
  4947. <pre>
  4948. CertificateList ::= Sequence {
  4949. tbsCertList TbsCertList,
  4950. signatureAlgorithm AlgorithmIdentifier,
  4951. signatureValue BIT STRING }
  4952. </pre>
  4953. </member>
  4954. <member name="T:Org.BouncyCastle.Asn1.X509.CertificatePair">
  4955. This class helps to support crossCerfificatePairs in a LDAP directory
  4956. according RFC 2587
  4957. <pre>
  4958. crossCertificatePairATTRIBUTE::={
  4959. WITH SYNTAX CertificatePair
  4960. EQUALITY MATCHING RULE certificatePairExactMatch
  4961. ID joint-iso-ccitt(2) ds(5) attributeType(4) crossCertificatePair(40)}
  4962. </pre>
  4963. <blockquote> The forward elements of the crossCertificatePair attribute of a
  4964. CA's directory entry shall be used to store all, except self-issued
  4965. certificates issued to this CA. Optionally, the reverse elements of the
  4966. crossCertificatePair attribute, of a CA's directory entry may contain a
  4967. subset of certificates issued by this CA to other CAs. When both the forward
  4968. and the reverse elements are present in a single attribute value, issuer name
  4969. in one certificate shall match the subject name in the other and vice versa,
  4970. and the subject public key in one certificate shall be capable of verifying
  4971. the digital signature on the other certificate and vice versa.
  4972. When a reverse element is present, the forward element value and the reverse
  4973. element value need not be stored in the same attribute value; in other words,
  4974. they can be stored in either a single attribute value or two attribute
  4975. values. </blockquote>
  4976. <pre>
  4977. CertificatePair ::= SEQUENCE {
  4978. forward [0] Certificate OPTIONAL,
  4979. reverse [1] Certificate OPTIONAL,
  4980. -- at least one of the pair shall be present -- }
  4981. </pre>
  4982. </member>
  4983. <member name="M:Org.BouncyCastle.Asn1.X509.CertificatePair.#ctor(Org.BouncyCastle.Asn1.Asn1Sequence)">
  4984. Constructor from Asn1Sequence.
  4985. <p/>
  4986. The sequence is of type CertificatePair:
  4987. <p/>
  4988. <pre>
  4989. CertificatePair ::= SEQUENCE {
  4990. forward [0] Certificate OPTIONAL,
  4991. reverse [1] Certificate OPTIONAL,
  4992. -- at least one of the pair shall be present -- }
  4993. </pre>
  4994. @param seq The ASN.1 sequence.
  4995. </member>
  4996. <member name="M:Org.BouncyCastle.Asn1.X509.CertificatePair.#ctor(Org.BouncyCastle.Asn1.X509.X509CertificateStructure,Org.BouncyCastle.Asn1.X509.X509CertificateStructure)">
  4997. Constructor from a given details.
  4998. @param forward Certificates issued to this CA.
  4999. @param reverse Certificates issued by this CA to other CAs.
  5000. </member>
  5001. <member name="M:Org.BouncyCastle.Asn1.X509.CertificatePair.ToAsn1Object">
  5002. Produce an object suitable for an Asn1OutputStream.
  5003. <p/>
  5004. Returns:
  5005. <p/>
  5006. <pre>
  5007. CertificatePair ::= SEQUENCE {
  5008. forward [0] Certificate OPTIONAL,
  5009. reverse [1] Certificate OPTIONAL,
  5010. -- at least one of the pair shall be present -- }
  5011. </pre>
  5012. @return a DERObject
  5013. </member>
  5014. <member name="P:Org.BouncyCastle.Asn1.X509.CertificatePair.Forward">
  5015. @return Returns the forward.
  5016. </member>
  5017. <member name="P:Org.BouncyCastle.Asn1.X509.CertificatePair.Reverse">
  5018. @return Returns the reverse.
  5019. </member>
  5020. <member name="M:Org.BouncyCastle.Asn1.X509.CertificatePolicies.#ctor(Org.BouncyCastle.Asn1.X509.PolicyInformation)">
  5021. Construct a CertificatePolicies object containing one PolicyInformation.
  5022. @param name the name to be contained.
  5023. </member>
  5024. <member name="M:Org.BouncyCastle.Asn1.X509.CertificatePolicies.ToAsn1Object">
  5025. Produce an object suitable for an ASN1OutputStream.
  5026. <pre>
  5027. CertificatePolicies ::= SEQUENCE SIZE {1..MAX} OF PolicyInformation
  5028. </pre>
  5029. </member>
  5030. <member name="T:Org.BouncyCastle.Asn1.X509.CertPolicyID">
  5031. CertPolicyId, used in the CertificatePolicies and PolicyMappings
  5032. X509V3 Extensions.
  5033. <pre>
  5034. CertPolicyId ::= OBJECT IDENTIFIER
  5035. </pre>
  5036. </member>
  5037. <member name="M:Org.BouncyCastle.Asn1.X509.CrlDistPoint.GetDistributionPoints">
  5038. Return the distribution points making up the sequence.
  5039. @return DistributionPoint[]
  5040. </member>
  5041. <member name="M:Org.BouncyCastle.Asn1.X509.CrlDistPoint.ToAsn1Object">
  5042. Produce an object suitable for an Asn1OutputStream.
  5043. <pre>
  5044. CrlDistPoint ::= Sequence SIZE {1..MAX} OF DistributionPoint
  5045. </pre>
  5046. </member>
  5047. <member name="T:Org.BouncyCastle.Asn1.X509.CrlNumber">
  5048. The CRLNumber object.
  5049. <pre>
  5050. CRLNumber::= Integer(0..MAX)
  5051. </pre>
  5052. </member>
  5053. <member name="T:Org.BouncyCastle.Asn1.X509.CrlReason">
  5054. The CRLReason enumeration.
  5055. <pre>
  5056. CRLReason ::= Enumerated {
  5057. unspecified (0),
  5058. keyCompromise (1),
  5059. cACompromise (2),
  5060. affiliationChanged (3),
  5061. superseded (4),
  5062. cessationOfOperation (5),
  5063. certificateHold (6),
  5064. removeFromCRL (8),
  5065. privilegeWithdrawn (9),
  5066. aACompromise (10)
  5067. }
  5068. </pre>
  5069. </member>
  5070. <member name="T:Org.BouncyCastle.Asn1.X509.DigestInfo">
  5071. The DigestInfo object.
  5072. <pre>
  5073. DigestInfo::=Sequence{
  5074. digestAlgorithm AlgorithmIdentifier,
  5075. digest OCTET STRING }
  5076. </pre>
  5077. </member>
  5078. <member name="T:Org.BouncyCastle.Asn1.X509.DisplayText">
  5079. <code>DisplayText</code> class, used in
  5080. <code>CertificatePolicies</code> X509 V3 extensions (in policy qualifiers).
  5081. <p>It stores a string in a chosen encoding.
  5082. <pre>
  5083. DisplayText ::= CHOICE {
  5084. ia5String IA5String (SIZE (1..200)),
  5085. visibleString VisibleString (SIZE (1..200)),
  5086. bmpString BMPString (SIZE (1..200)),
  5087. utf8String UTF8String (SIZE (1..200)) }
  5088. </pre></p>
  5089. @see PolicyQualifierInfo
  5090. @see PolicyInformation
  5091. </member>
  5092. <member name="F:Org.BouncyCastle.Asn1.X509.DisplayText.ContentTypeIA5String">
  5093. Constant corresponding to ia5String encoding.
  5094. </member>
  5095. <member name="F:Org.BouncyCastle.Asn1.X509.DisplayText.ContentTypeBmpString">
  5096. Constant corresponding to bmpString encoding.
  5097. </member>
  5098. <member name="F:Org.BouncyCastle.Asn1.X509.DisplayText.ContentTypeUtf8String">
  5099. Constant corresponding to utf8String encoding.
  5100. </member>
  5101. <member name="F:Org.BouncyCastle.Asn1.X509.DisplayText.ContentTypeVisibleString">
  5102. Constant corresponding to visibleString encoding.
  5103. </member>
  5104. <member name="F:Org.BouncyCastle.Asn1.X509.DisplayText.DisplayTextMaximumSize">
  5105. Describe constant <code>DisplayTextMaximumSize</code> here.
  5106. </member>
  5107. <member name="M:Org.BouncyCastle.Asn1.X509.DisplayText.#ctor(System.Int32,System.String)">
  5108. Creates a new <code>DisplayText</code> instance.
  5109. @param type the desired encoding type for the text.
  5110. @param text the text to store. Strings longer than 200
  5111. characters are truncated.
  5112. </member>
  5113. <member name="M:Org.BouncyCastle.Asn1.X509.DisplayText.#ctor(System.String)">
  5114. Creates a new <code>DisplayText</code> instance.
  5115. @param text the text to encapsulate. Strings longer than 200
  5116. characters are truncated.
  5117. </member>
  5118. <member name="M:Org.BouncyCastle.Asn1.X509.DisplayText.#ctor(Org.BouncyCastle.Asn1.IAsn1String)">
  5119. Creates a new <code>DisplayText</code> instance.
  5120. <p>Useful when reading back a <code>DisplayText</code> class
  5121. from it's Asn1Encodable form.</p>
  5122. @param contents an <code>Asn1Encodable</code> instance.
  5123. </member>
  5124. <member name="M:Org.BouncyCastle.Asn1.X509.DisplayText.GetString">
  5125. Returns the stored <code>string</code> object.
  5126. @return the stored text as a <code>string</code>.
  5127. </member>
  5128. <member name="T:Org.BouncyCastle.Asn1.X509.DistributionPoint">
  5129. The DistributionPoint object.
  5130. <pre>
  5131. DistributionPoint ::= Sequence {
  5132. distributionPoint [0] DistributionPointName OPTIONAL,
  5133. reasons [1] ReasonFlags OPTIONAL,
  5134. cRLIssuer [2] GeneralNames OPTIONAL
  5135. }
  5136. </pre>
  5137. </member>
  5138. <member name="T:Org.BouncyCastle.Asn1.X509.DistributionPointName">
  5139. The DistributionPointName object.
  5140. <pre>
  5141. DistributionPointName ::= CHOICE {
  5142. fullName [0] GeneralNames,
  5143. nameRelativeToCRLIssuer [1] RDN
  5144. }
  5145. </pre>
  5146. </member>
  5147. <member name="T:Org.BouncyCastle.Asn1.X509.ExtendedKeyUsage">
  5148. The extendedKeyUsage object.
  5149. <pre>
  5150. extendedKeyUsage ::= Sequence SIZE (1..MAX) OF KeyPurposeId
  5151. </pre>
  5152. </member>
  5153. <member name="M:Org.BouncyCastle.Asn1.X509.ExtendedKeyUsage.GetAllUsages">
  5154. Returns all extended key usages.
  5155. The returned ArrayList contains DerObjectIdentifier instances.
  5156. @return An ArrayList with all key purposes.
  5157. </member>
  5158. <member name="T:Org.BouncyCastle.Asn1.X509.GeneralName">
  5159. The GeneralName object.
  5160. <pre>
  5161. GeneralName ::= CHOICE {
  5162. otherName [0] OtherName,
  5163. rfc822Name [1] IA5String,
  5164. dNSName [2] IA5String,
  5165. x400Address [3] ORAddress,
  5166. directoryName [4] Name,
  5167. ediPartyName [5] EDIPartyName,
  5168. uniformResourceIdentifier [6] IA5String,
  5169. iPAddress [7] OCTET STRING,
  5170. registeredID [8] OBJECT IDENTIFIER}
  5171. OtherName ::= Sequence {
  5172. type-id OBJECT IDENTIFIER,
  5173. value [0] EXPLICIT ANY DEFINED BY type-id }
  5174. EDIPartyName ::= Sequence {
  5175. nameAssigner [0] DirectoryString OPTIONAL,
  5176. partyName [1] DirectoryString }
  5177. </pre>
  5178. </member>
  5179. <member name="M:Org.BouncyCastle.Asn1.X509.GeneralName.#ctor(Org.BouncyCastle.Asn1.Asn1Object,System.Int32)">
  5180. When the subjectAltName extension contains an Internet mail address,
  5181. the address MUST be included as an rfc822Name. The format of an
  5182. rfc822Name is an "addr-spec" as defined in RFC 822 [RFC 822].
  5183. When the subjectAltName extension contains a domain name service
  5184. label, the domain name MUST be stored in the dNSName (an IA5String).
  5185. The name MUST be in the "preferred name syntax," as specified by RFC
  5186. 1034 [RFC 1034].
  5187. When the subjectAltName extension contains a URI, the name MUST be
  5188. stored in the uniformResourceIdentifier (an IA5String). The name MUST
  5189. be a non-relative URL, and MUST follow the URL syntax and encoding
  5190. rules specified in [RFC 1738]. The name must include both a scheme
  5191. (e.g., "http" or "ftp") and a scheme-specific-part. The scheme-
  5192. specific-part must include a fully qualified domain name or IP
  5193. address as the host.
  5194. When the subjectAltName extension contains a iPAddress, the address
  5195. MUST be stored in the octet string in "network byte order," as
  5196. specified in RFC 791 [RFC 791]. The least significant bit (LSB) of
  5197. each octet is the LSB of the corresponding byte in the network
  5198. address. For IP Version 4, as specified in RFC 791, the octet string
  5199. MUST contain exactly four octets. For IP Version 6, as specified in
  5200. RFC 1883, the octet string MUST contain exactly sixteen octets [RFC
  5201. 1883].
  5202. </member>
  5203. <member name="M:Org.BouncyCastle.Asn1.X509.GeneralName.#ctor(System.Int32,System.String)">
  5204. Create a GeneralName for the given tag from the passed in string.
  5205. <p>
  5206. This constructor can handle:
  5207. <ul>
  5208. <li>rfc822Name</li>
  5209. <li>iPAddress</li>
  5210. <li>directoryName</li>
  5211. <li>dNSName</li>
  5212. <li>uniformResourceIdentifier</li>
  5213. <li>registeredID</li>
  5214. </ul>
  5215. For x400Address, otherName and ediPartyName there is no common string
  5216. format defined.
  5217. </p><p>
  5218. Note: A directory name can be encoded in different ways into a byte
  5219. representation. Be aware of this if the byte representation is used for
  5220. comparing results.
  5221. </p>
  5222. @param tag tag number
  5223. @param name string representation of name
  5224. @throws ArgumentException if the string encoding is not correct or
  5225. not supported.
  5226. </member>
  5227. <member name="M:Org.BouncyCastle.Asn1.X509.GeneralNames.#ctor(Org.BouncyCastle.Asn1.X509.GeneralName)">
  5228. <summary>Construct a GeneralNames object containing one GeneralName.</summary>
  5229. <param name="name">The name to be contained.</param>
  5230. </member>
  5231. <member name="M:Org.BouncyCastle.Asn1.X509.GeneralNames.ToAsn1Object">
  5232. Produce an object suitable for an Asn1OutputStream.
  5233. <pre>
  5234. GeneralNames ::= Sequence SIZE {1..MAX} OF GeneralName
  5235. </pre>
  5236. </member>
  5237. <member name="T:Org.BouncyCastle.Asn1.X509.GeneralSubtree">
  5238. Class for containing a restriction object subtrees in NameConstraints. See
  5239. RFC 3280.
  5240. <pre>
  5241. GeneralSubtree ::= SEQUENCE
  5242. {
  5243. baseName GeneralName,
  5244. minimum [0] BaseDistance DEFAULT 0,
  5245. maximum [1] BaseDistance OPTIONAL
  5246. }
  5247. </pre>
  5248. @see org.bouncycastle.asn1.x509.NameConstraints
  5249. </member>
  5250. <member name="M:Org.BouncyCastle.Asn1.X509.GeneralSubtree.#ctor(Org.BouncyCastle.Asn1.X509.GeneralName,Org.BouncyCastle.Math.BigInteger,Org.BouncyCastle.Math.BigInteger)">
  5251. Constructor from a given details.
  5252. According RFC 3280, the minimum and maximum fields are not used with any
  5253. name forms, thus minimum MUST be zero, and maximum MUST be absent.
  5254. <p>
  5255. If minimum is <code>null</code>, zero is assumed, if
  5256. maximum is <code>null</code>, maximum is absent.</p>
  5257. @param baseName
  5258. A restriction.
  5259. @param minimum
  5260. Minimum
  5261. @param maximum
  5262. Maximum
  5263. </member>
  5264. <member name="M:Org.BouncyCastle.Asn1.X509.GeneralSubtree.ToAsn1Object">
  5265. Produce an object suitable for an Asn1OutputStream.
  5266. Returns:
  5267. <pre>
  5268. GeneralSubtree ::= SEQUENCE
  5269. {
  5270. baseName GeneralName,
  5271. minimum [0] BaseDistance DEFAULT 0,
  5272. maximum [1] BaseDistance OPTIONAL
  5273. }
  5274. </pre>
  5275. @return a DERObject
  5276. </member>
  5277. <member name="T:Org.BouncyCastle.Asn1.X509.Holder">
  5278. The Holder object.
  5279. <p>
  5280. For an v2 attribute certificate this is:
  5281. <pre>
  5282. Holder ::= SEQUENCE {
  5283. baseCertificateID [0] IssuerSerial OPTIONAL,
  5284. -- the issuer and serial number of
  5285. -- the holder's Public Key Certificate
  5286. entityName [1] GeneralNames OPTIONAL,
  5287. -- the name of the claimant or role
  5288. objectDigestInfo [2] ObjectDigestInfo OPTIONAL
  5289. -- used to directly authenticate the holder,
  5290. -- for example, an executable
  5291. }
  5292. </pre>
  5293. </p>
  5294. <p>
  5295. For an v1 attribute certificate this is:
  5296. <pre>
  5297. subject CHOICE {
  5298. baseCertificateID [0] EXPLICIT IssuerSerial,
  5299. -- associated with a Public Key Certificate
  5300. subjectName [1] EXPLICIT GeneralNames },
  5301. -- associated with a name
  5302. </pre>
  5303. </p>
  5304. </member>
  5305. <member name="M:Org.BouncyCastle.Asn1.X509.Holder.#ctor(Org.BouncyCastle.Asn1.Asn1TaggedObject)">
  5306. Constructor for a holder for an v1 attribute certificate.
  5307. @param tagObj The ASN.1 tagged holder object.
  5308. </member>
  5309. <member name="M:Org.BouncyCastle.Asn1.X509.Holder.#ctor(Org.BouncyCastle.Asn1.Asn1Sequence)">
  5310. Constructor for a holder for an v2 attribute certificate. *
  5311. @param seq The ASN.1 sequence.
  5312. </member>
  5313. <member name="M:Org.BouncyCastle.Asn1.X509.Holder.#ctor(Org.BouncyCastle.Asn1.X509.IssuerSerial,System.Int32)">
  5314. Constructs a holder from a IssuerSerial.
  5315. @param baseCertificateID The IssuerSerial.
  5316. @param version The version of the attribute certificate.
  5317. </member>
  5318. <member name="P:Org.BouncyCastle.Asn1.X509.Holder.Version">
  5319. Returns 1 for v2 attribute certificates or 0 for v1 attribute
  5320. certificates.
  5321. @return The version of the attribute certificate.
  5322. </member>
  5323. <member name="M:Org.BouncyCastle.Asn1.X509.Holder.#ctor(Org.BouncyCastle.Asn1.X509.GeneralNames)">
  5324. Constructs a holder with an entityName for v2 attribute certificates or
  5325. with a subjectName for v1 attribute certificates.
  5326. @param entityName The entity or subject name.
  5327. </member>
  5328. <member name="M:Org.BouncyCastle.Asn1.X509.Holder.#ctor(Org.BouncyCastle.Asn1.X509.GeneralNames,System.Int32)">
  5329. Constructs a holder with an entityName for v2 attribute certificates or
  5330. with a subjectName for v1 attribute certificates.
  5331. @param entityName The entity or subject name.
  5332. @param version The version of the attribute certificate.
  5333. </member>
  5334. <member name="M:Org.BouncyCastle.Asn1.X509.Holder.#ctor(Org.BouncyCastle.Asn1.X509.ObjectDigestInfo)">
  5335. Constructs a holder from an object digest info.
  5336. @param objectDigestInfo The object digest info object.
  5337. </member>
  5338. <member name="P:Org.BouncyCastle.Asn1.X509.Holder.EntityName">
  5339. Returns the entityName for an v2 attribute certificate or the subjectName
  5340. for an v1 attribute certificate.
  5341. @return The entityname or subjectname.
  5342. </member>
  5343. <member name="M:Org.BouncyCastle.Asn1.X509.Holder.ToAsn1Object">
  5344. The Holder object.
  5345. <pre>
  5346. Holder ::= Sequence {
  5347. baseCertificateID [0] IssuerSerial OPTIONAL,
  5348. -- the issuer and serial number of
  5349. -- the holder's Public Key Certificate
  5350. entityName [1] GeneralNames OPTIONAL,
  5351. -- the name of the claimant or role
  5352. objectDigestInfo [2] ObjectDigestInfo OPTIONAL
  5353. -- used to directly authenticate the holder,
  5354. -- for example, an executable
  5355. }
  5356. </pre>
  5357. </member>
  5358. <member name="T:Org.BouncyCastle.Asn1.X509.IetfAttrSyntax">
  5359. Implementation of <code>IetfAttrSyntax</code> as specified by RFC3281.
  5360. </member>
  5361. <member name="M:Org.BouncyCastle.Asn1.X509.IetfAttrSyntax.#ctor(Org.BouncyCastle.Asn1.Asn1Sequence)">
  5362. </member>
  5363. <member name="M:Org.BouncyCastle.Asn1.X509.IetfAttrSyntax.ToAsn1Object">
  5364. <pre>
  5365. IetfAttrSyntax ::= Sequence {
  5366. policyAuthority [0] GeneralNames OPTIONAL,
  5367. values Sequence OF CHOICE {
  5368. octets OCTET STRING,
  5369. oid OBJECT IDENTIFIER,
  5370. string UTF8String
  5371. }
  5372. }
  5373. </pre>
  5374. </member>
  5375. <member name="M:Org.BouncyCastle.Asn1.X509.IssuerSerial.ToAsn1Object">
  5376. Produce an object suitable for an Asn1OutputStream.
  5377. <pre>
  5378. IssuerSerial ::= Sequence {
  5379. issuer GeneralNames,
  5380. serial CertificateSerialNumber,
  5381. issuerUid UniqueIdentifier OPTIONAL
  5382. }
  5383. </pre>
  5384. </member>
  5385. <member name="T:Org.BouncyCastle.Asn1.X509.IssuingDistributionPoint">
  5386. <pre>
  5387. IssuingDistributionPoint ::= SEQUENCE {
  5388. distributionPoint [0] DistributionPointName OPTIONAL,
  5389. onlyContainsUserCerts [1] BOOLEAN DEFAULT FALSE,
  5390. onlyContainsCACerts [2] BOOLEAN DEFAULT FALSE,
  5391. onlySomeReasons [3] ReasonFlags OPTIONAL,
  5392. indirectCRL [4] BOOLEAN DEFAULT FALSE,
  5393. onlyContainsAttributeCerts [5] BOOLEAN DEFAULT FALSE }
  5394. </pre>
  5395. </member>
  5396. <member name="M:Org.BouncyCastle.Asn1.X509.IssuingDistributionPoint.#ctor(Org.BouncyCastle.Asn1.X509.DistributionPointName,System.Boolean,System.Boolean,Org.BouncyCastle.Asn1.X509.ReasonFlags,System.Boolean,System.Boolean)">
  5397. Constructor from given details.
  5398. @param distributionPoint
  5399. May contain an URI as pointer to most current CRL.
  5400. @param onlyContainsUserCerts Covers revocation information for end certificates.
  5401. @param onlyContainsCACerts Covers revocation information for CA certificates.
  5402. @param onlySomeReasons
  5403. Which revocation reasons does this point cover.
  5404. @param indirectCRL
  5405. If <code>true</code> then the CRL contains revocation
  5406. information about certificates ssued by other CAs.
  5407. @param onlyContainsAttributeCerts Covers revocation information for attribute certificates.
  5408. </member>
  5409. <member name="M:Org.BouncyCastle.Asn1.X509.IssuingDistributionPoint.#ctor(Org.BouncyCastle.Asn1.Asn1Sequence)">
  5410. Constructor from Asn1Sequence
  5411. </member>
  5412. <member name="P:Org.BouncyCastle.Asn1.X509.IssuingDistributionPoint.DistributionPoint">
  5413. @return Returns the distributionPoint.
  5414. </member>
  5415. <member name="P:Org.BouncyCastle.Asn1.X509.IssuingDistributionPoint.OnlySomeReasons">
  5416. @return Returns the onlySomeReasons.
  5417. </member>
  5418. <member name="T:Org.BouncyCastle.Asn1.X509.KeyPurposeID">
  5419. The KeyPurposeID object.
  5420. <pre>
  5421. KeyPurposeID ::= OBJECT IDENTIFIER
  5422. </pre>
  5423. </member>
  5424. <member name="T:Org.BouncyCastle.Asn1.X509.KeyUsage">
  5425. The KeyUsage object.
  5426. <pre>
  5427. id-ce-keyUsage OBJECT IDENTIFIER ::= { id-ce 15 }
  5428. KeyUsage ::= BIT STRING {
  5429. digitalSignature (0),
  5430. nonRepudiation (1),
  5431. keyEncipherment (2),
  5432. dataEncipherment (3),
  5433. keyAgreement (4),
  5434. keyCertSign (5),
  5435. cRLSign (6),
  5436. encipherOnly (7),
  5437. decipherOnly (8) }
  5438. </pre>
  5439. </member>
  5440. <member name="M:Org.BouncyCastle.Asn1.X509.KeyUsage.#ctor(System.Int32)">
  5441. Basic constructor.
  5442. @param usage - the bitwise OR of the Key Usage flags giving the
  5443. allowed uses for the key.
  5444. e.g. (KeyUsage.keyEncipherment | KeyUsage.dataEncipherment)
  5445. </member>
  5446. <member name="M:Org.BouncyCastle.Asn1.X509.NameConstraints.#ctor(System.Collections.IList,System.Collections.IList)">
  5447. Constructor from a given details.
  5448. <p>permitted and excluded are Vectors of GeneralSubtree objects.</p>
  5449. @param permitted Permitted subtrees
  5450. @param excluded Excluded subtrees
  5451. </member>
  5452. <member name="T:Org.BouncyCastle.Asn1.X509.NoticeReference">
  5453. <code>NoticeReference</code> class, used in
  5454. <code>CertificatePolicies</code> X509 V3 extensions
  5455. (in policy qualifiers).
  5456. <pre>
  5457. NoticeReference ::= Sequence {
  5458. organization DisplayText,
  5459. noticeNumbers Sequence OF Integer }
  5460. </pre>
  5461. @see PolicyQualifierInfo
  5462. @see PolicyInformation
  5463. </member>
  5464. <member name="M:Org.BouncyCastle.Asn1.X509.NoticeReference.#ctor(System.String,System.Collections.IList)">
  5465. Creates a new <code>NoticeReference</code> instance.
  5466. @param organization a <code>String</code> value
  5467. @param numbers a <code>Vector</code> value
  5468. </member>
  5469. <member name="M:Org.BouncyCastle.Asn1.X509.NoticeReference.#ctor(System.String,Org.BouncyCastle.Asn1.Asn1EncodableVector)">
  5470. Creates a new <code>NoticeReference</code> instance.
  5471. @param organization a <code>String</code> value
  5472. @param noticeNumbers an <code>ASN1EncodableVector</code> value
  5473. </member>
  5474. <member name="M:Org.BouncyCastle.Asn1.X509.NoticeReference.#ctor(Org.BouncyCastle.Asn1.X509.DisplayText,Org.BouncyCastle.Asn1.Asn1EncodableVector)">
  5475. Creates a new <code>NoticeReference</code> instance.
  5476. @param organization displayText
  5477. @param noticeNumbers an <code>ASN1EncodableVector</code> value
  5478. </member>
  5479. <member name="M:Org.BouncyCastle.Asn1.X509.NoticeReference.#ctor(Org.BouncyCastle.Asn1.Asn1Sequence)">
  5480. Creates a new <code>NoticeReference</code> instance.
  5481. <p>Useful for reconstructing a <code>NoticeReference</code>
  5482. instance from its encodable/encoded form.</p>
  5483. @param as an <code>Asn1Sequence</code> value obtained from either
  5484. calling @{link ToAsn1Object()} for a <code>NoticeReference</code>
  5485. instance or from parsing it from a Der-encoded stream.
  5486. </member>
  5487. <member name="M:Org.BouncyCastle.Asn1.X509.NoticeReference.ToAsn1Object">
  5488. Describe <code>ToAsn1Object</code> method here.
  5489. @return a <code>Asn1Object</code> value
  5490. </member>
  5491. <member name="T:Org.BouncyCastle.Asn1.X509.ObjectDigestInfo">
  5492. ObjectDigestInfo ASN.1 structure used in v2 attribute certificates.
  5493. <pre>
  5494. ObjectDigestInfo ::= SEQUENCE {
  5495. digestedObjectType ENUMERATED {
  5496. publicKey (0),
  5497. publicKeyCert (1),
  5498. otherObjectTypes (2) },
  5499. -- otherObjectTypes MUST NOT
  5500. -- be used in this profile
  5501. otherObjectTypeID OBJECT IDENTIFIER OPTIONAL,
  5502. digestAlgorithm AlgorithmIdentifier,
  5503. objectDigest BIT STRING
  5504. }
  5505. </pre>
  5506. </member>
  5507. <member name="F:Org.BouncyCastle.Asn1.X509.ObjectDigestInfo.PublicKey">
  5508. The public key is hashed.
  5509. </member>
  5510. <member name="F:Org.BouncyCastle.Asn1.X509.ObjectDigestInfo.PublicKeyCert">
  5511. The public key certificate is hashed.
  5512. </member>
  5513. <member name="F:Org.BouncyCastle.Asn1.X509.ObjectDigestInfo.OtherObjectDigest">
  5514. An other object is hashed.
  5515. </member>
  5516. <member name="M:Org.BouncyCastle.Asn1.X509.ObjectDigestInfo.#ctor(System.Int32,System.String,Org.BouncyCastle.Asn1.X509.AlgorithmIdentifier,System.Byte[])">
  5517. Constructor from given details.
  5518. <p>
  5519. If <code>digestedObjectType</code> is not {@link #publicKeyCert} or
  5520. {@link #publicKey} <code>otherObjectTypeID</code> must be given,
  5521. otherwise it is ignored.</p>
  5522. @param digestedObjectType The digest object type.
  5523. @param otherObjectTypeID The object type ID for
  5524. <code>otherObjectDigest</code>.
  5525. @param digestAlgorithm The algorithm identifier for the hash.
  5526. @param objectDigest The hash value.
  5527. </member>
  5528. <member name="M:Org.BouncyCastle.Asn1.X509.ObjectDigestInfo.ToAsn1Object">
  5529. Produce an object suitable for an Asn1OutputStream.
  5530. <pre>
  5531. ObjectDigestInfo ::= SEQUENCE {
  5532. digestedObjectType ENUMERATED {
  5533. publicKey (0),
  5534. publicKeyCert (1),
  5535. otherObjectTypes (2) },
  5536. -- otherObjectTypes MUST NOT
  5537. -- be used in this profile
  5538. otherObjectTypeID OBJECT IDENTIFIER OPTIONAL,
  5539. digestAlgorithm AlgorithmIdentifier,
  5540. objectDigest BIT STRING
  5541. }
  5542. </pre>
  5543. </member>
  5544. <member name="T:Org.BouncyCastle.Asn1.X509.OtherName">
  5545. The OtherName object.
  5546. <pre>
  5547. OtherName ::= SEQUENCE {
  5548. type-id OBJECT IDENTIFIER,
  5549. value [0] EXPLICIT ANY DEFINED BY type-id }
  5550. </pre>
  5551. </member>
  5552. <member name="M:Org.BouncyCastle.Asn1.X509.OtherName.GetInstance(System.Object)">
  5553. OtherName factory method.
  5554. @param obj the object used to construct an instance of <code>
  5555. OtherName</code>. It must be an instance of <code>OtherName
  5556. </code> or <code>ASN1Sequence</code>.
  5557. @return the instance of <code>OtherName</code> built from the
  5558. supplied object.
  5559. @throws java.lang.IllegalArgumentException if the object passed
  5560. to the factory is not an instance of <code>OtherName</code> or something that
  5561. can be converted into an appropriate <code>ASN1Sequence</code>.
  5562. </member>
  5563. <member name="M:Org.BouncyCastle.Asn1.X509.OtherName.#ctor(Org.BouncyCastle.Asn1.DerObjectIdentifier,Org.BouncyCastle.Asn1.Asn1Encodable)">
  5564. Base constructor.
  5565. @param typeID the type of the other name.
  5566. @param value the ANY object that represents the value.
  5567. </member>
  5568. <member name="T:Org.BouncyCastle.Asn1.X509.PolicyMappings">
  5569. PolicyMappings V3 extension, described in RFC3280.
  5570. <pre>
  5571. PolicyMappings ::= Sequence SIZE (1..MAX) OF Sequence {
  5572. issuerDomainPolicy CertPolicyId,
  5573. subjectDomainPolicy CertPolicyId }
  5574. </pre>
  5575. @see <a href="http://www.faqs.org/rfc/rfc3280.txt">RFC 3280, section 4.2.1.6</a>
  5576. </member>
  5577. <member name="M:Org.BouncyCastle.Asn1.X509.PolicyMappings.#ctor(Org.BouncyCastle.Asn1.Asn1Sequence)">
  5578. Creates a new <code>PolicyMappings</code> instance.
  5579. @param seq an <code>Asn1Sequence</code> constructed as specified
  5580. in RFC 3280
  5581. </member>
  5582. <member name="M:Org.BouncyCastle.Asn1.X509.PolicyMappings.#ctor(System.Collections.IDictionary)">
  5583. Creates a new <code>PolicyMappings</code> instance.
  5584. @param mappings a <code>HashMap</code> value that maps
  5585. <code>string</code> oids
  5586. to other <code>string</code> oids.
  5587. </member>
  5588. <member name="T:Org.BouncyCastle.Asn1.X509.PolicyQualifierID">
  5589. PolicyQualifierId, used in the CertificatePolicies
  5590. X509V3 extension.
  5591. <pre>
  5592. id-qt OBJECT IDENTIFIER ::= { id-pkix 2 }
  5593. id-qt-cps OBJECT IDENTIFIER ::= { id-qt 1 }
  5594. id-qt-unotice OBJECT IDENTIFIER ::= { id-qt 2 }
  5595. PolicyQualifierId ::=
  5596. OBJECT IDENTIFIER ( id-qt-cps | id-qt-unotice )
  5597. </pre>
  5598. </member>
  5599. <member name="T:Org.BouncyCastle.Asn1.X509.PolicyQualifierInfo">
  5600. Policy qualifiers, used in the X509V3 CertificatePolicies
  5601. extension.
  5602. <pre>
  5603. PolicyQualifierInfo ::= Sequence {
  5604. policyQualifierId PolicyQualifierId,
  5605. qualifier ANY DEFINED BY policyQualifierId }
  5606. </pre>
  5607. </member>
  5608. <member name="M:Org.BouncyCastle.Asn1.X509.PolicyQualifierInfo.#ctor(Org.BouncyCastle.Asn1.DerObjectIdentifier,Org.BouncyCastle.Asn1.Asn1Encodable)">
  5609. Creates a new <code>PolicyQualifierInfo</code> instance.
  5610. @param policyQualifierId a <code>PolicyQualifierId</code> value
  5611. @param qualifier the qualifier, defined by the above field.
  5612. </member>
  5613. <member name="M:Org.BouncyCastle.Asn1.X509.PolicyQualifierInfo.#ctor(System.String)">
  5614. Creates a new <code>PolicyQualifierInfo</code> containing a
  5615. cPSuri qualifier.
  5616. @param cps the CPS (certification practice statement) uri as a
  5617. <code>string</code>.
  5618. </member>
  5619. <member name="M:Org.BouncyCastle.Asn1.X509.PolicyQualifierInfo.#ctor(Org.BouncyCastle.Asn1.Asn1Sequence)">
  5620. Creates a new <code>PolicyQualifierInfo</code> instance.
  5621. @param as <code>PolicyQualifierInfo</code> X509 structure
  5622. encoded as an Asn1Sequence.
  5623. </member>
  5624. <member name="M:Org.BouncyCastle.Asn1.X509.PolicyQualifierInfo.ToAsn1Object">
  5625. Returns a Der-encodable representation of this instance.
  5626. @return a <code>Asn1Object</code> value
  5627. </member>
  5628. <member name="T:Org.BouncyCastle.Asn1.X509.PrivateKeyUsagePeriod">
  5629. <remarks>
  5630. <pre>
  5631. PrivateKeyUsagePeriod ::= SEQUENCE
  5632. {
  5633. notBefore [0] GeneralizedTime OPTIONAL,
  5634. notAfter [1] GeneralizedTime OPTIONAL }
  5635. </pre>
  5636. </remarks>
  5637. </member>
  5638. <member name="T:Org.BouncyCastle.Asn1.X509.Qualified.BiometricData">
  5639. The BiometricData object.
  5640. <pre>
  5641. BiometricData ::= SEQUENCE {
  5642. typeOfBiometricData TypeOfBiometricData,
  5643. hashAlgorithm AlgorithmIdentifier,
  5644. biometricDataHash OCTET STRING,
  5645. sourceDataUri IA5String OPTIONAL }
  5646. </pre>
  5647. </member>
  5648. <member name="T:Org.BouncyCastle.Asn1.X509.Qualified.Iso4217CurrencyCode">
  5649. The Iso4217CurrencyCode object.
  5650. <pre>
  5651. Iso4217CurrencyCode ::= CHOICE {
  5652. alphabetic PrintableString (SIZE 3), --Recommended
  5653. numeric INTEGER (1..999) }
  5654. -- Alphabetic or numeric currency code as defined in ISO 4217
  5655. -- It is recommended that the Alphabetic form is used
  5656. </pre>
  5657. </member>
  5658. <member name="T:Org.BouncyCastle.Asn1.X509.Qualified.MonetaryValue">
  5659. The MonetaryValue object.
  5660. <pre>
  5661. MonetaryValue ::= SEQUENCE {
  5662. currency Iso4217CurrencyCode,
  5663. amount INTEGER,
  5664. exponent INTEGER }
  5665. -- value = amount * 10^exponent
  5666. </pre>
  5667. </member>
  5668. <member name="T:Org.BouncyCastle.Asn1.X509.Qualified.QCStatement">
  5669. The QCStatement object.
  5670. <pre>
  5671. QCStatement ::= SEQUENCE {
  5672. statementId OBJECT IDENTIFIER,
  5673. statementInfo ANY DEFINED BY statementId OPTIONAL}
  5674. </pre>
  5675. </member>
  5676. <member name="T:Org.BouncyCastle.Asn1.X509.Qualified.SemanticsInformation">
  5677. The SemanticsInformation object.
  5678. <pre>
  5679. SemanticsInformation ::= SEQUENCE {
  5680. semanticsIdentifier OBJECT IDENTIFIER OPTIONAL,
  5681. nameRegistrationAuthorities NameRegistrationAuthorities
  5682. OPTIONAL }
  5683. (WITH COMPONENTS {..., semanticsIdentifier PRESENT}|
  5684. WITH COMPONENTS {..., nameRegistrationAuthorities PRESENT})
  5685. NameRegistrationAuthorities ::= SEQUENCE SIZE (1..MAX) OF
  5686. GeneralName
  5687. </pre>
  5688. </member>
  5689. <member name="T:Org.BouncyCastle.Asn1.X509.Qualified.TypeOfBiometricData">
  5690. The TypeOfBiometricData object.
  5691. <pre>
  5692. TypeOfBiometricData ::= CHOICE {
  5693. predefinedBiometricType PredefinedBiometricType,
  5694. biometricDataOid OBJECT IDENTIFIER }
  5695. PredefinedBiometricType ::= INTEGER {
  5696. picture(0),handwritten-signature(1)}
  5697. (picture|handwritten-signature)
  5698. </pre>
  5699. </member>
  5700. <member name="T:Org.BouncyCastle.Asn1.X509.ReasonFlags">
  5701. The ReasonFlags object.
  5702. <pre>
  5703. ReasonFlags ::= BIT STRING {
  5704. unused(0),
  5705. keyCompromise(1),
  5706. cACompromise(2),
  5707. affiliationChanged(3),
  5708. superseded(4),
  5709. cessationOfOperation(5),
  5710. certficateHold(6)
  5711. }
  5712. </pre>
  5713. </member>
  5714. <member name="M:Org.BouncyCastle.Asn1.X509.ReasonFlags.#ctor(System.Int32)">
  5715. @param reasons - the bitwise OR of the Key Reason flags giving the
  5716. allowed uses for the key.
  5717. </member>
  5718. <member name="T:Org.BouncyCastle.Asn1.X509.RoleSyntax">
  5719. Implementation of the RoleSyntax object as specified by the RFC3281.
  5720. <pre>
  5721. RoleSyntax ::= SEQUENCE {
  5722. roleAuthority [0] GeneralNames OPTIONAL,
  5723. roleName [1] GeneralName
  5724. }
  5725. </pre>
  5726. </member>
  5727. <member name="M:Org.BouncyCastle.Asn1.X509.RoleSyntax.GetInstance(System.Object)">
  5728. RoleSyntax factory method.
  5729. @param obj the object used to construct an instance of <code>
  5730. RoleSyntax</code>. It must be an instance of <code>RoleSyntax
  5731. </code> or <code>Asn1Sequence</code>.
  5732. @return the instance of <code>RoleSyntax</code> built from the
  5733. supplied object.
  5734. @throws java.lang.ArgumentException if the object passed
  5735. to the factory is not an instance of <code>RoleSyntax</code> or
  5736. <code>Asn1Sequence</code>.
  5737. </member>
  5738. <member name="M:Org.BouncyCastle.Asn1.X509.RoleSyntax.#ctor(Org.BouncyCastle.Asn1.X509.GeneralNames,Org.BouncyCastle.Asn1.X509.GeneralName)">
  5739. Constructor.
  5740. @param roleAuthority the role authority of this RoleSyntax.
  5741. @param roleName the role name of this RoleSyntax.
  5742. </member>
  5743. <member name="M:Org.BouncyCastle.Asn1.X509.RoleSyntax.#ctor(Org.BouncyCastle.Asn1.X509.GeneralName)">
  5744. Constructor. Invoking this constructor is the same as invoking
  5745. <code>new RoleSyntax(null, roleName)</code>.
  5746. @param roleName the role name of this RoleSyntax.
  5747. </member>
  5748. <member name="M:Org.BouncyCastle.Asn1.X509.RoleSyntax.#ctor(System.String)">
  5749. Utility constructor. Takes a <code>string</code> argument representing
  5750. the role name, builds a <code>GeneralName</code> to hold the role name
  5751. and calls the constructor that takes a <code>GeneralName</code>.
  5752. @param roleName
  5753. </member>
  5754. <member name="M:Org.BouncyCastle.Asn1.X509.RoleSyntax.#ctor(Org.BouncyCastle.Asn1.Asn1Sequence)">
  5755. Constructor that builds an instance of <code>RoleSyntax</code> by
  5756. extracting the encoded elements from the <code>Asn1Sequence</code>
  5757. object supplied.
  5758. @param seq an instance of <code>Asn1Sequence</code> that holds
  5759. the encoded elements used to build this <code>RoleSyntax</code>.
  5760. </member>
  5761. <member name="P:Org.BouncyCastle.Asn1.X509.RoleSyntax.RoleAuthority">
  5762. Gets the role authority of this RoleSyntax.
  5763. @return an instance of <code>GeneralNames</code> holding the
  5764. role authority of this RoleSyntax.
  5765. </member>
  5766. <member name="P:Org.BouncyCastle.Asn1.X509.RoleSyntax.RoleName">
  5767. Gets the role name of this RoleSyntax.
  5768. @return an instance of <code>GeneralName</code> holding the
  5769. role name of this RoleSyntax.
  5770. </member>
  5771. <member name="M:Org.BouncyCastle.Asn1.X509.RoleSyntax.GetRoleNameAsString">
  5772. Gets the role name as a <code>java.lang.string</code> object.
  5773. @return the role name of this RoleSyntax represented as a
  5774. <code>string</code> object.
  5775. </member>
  5776. <member name="M:Org.BouncyCastle.Asn1.X509.RoleSyntax.GetRoleAuthorityAsString">
  5777. Gets the role authority as a <code>string[]</code> object.
  5778. @return the role authority of this RoleSyntax represented as a
  5779. <code>string[]</code> array.
  5780. </member>
  5781. <member name="M:Org.BouncyCastle.Asn1.X509.RoleSyntax.ToAsn1Object">
  5782. Implementation of the method <code>ToAsn1Object</code> as
  5783. required by the superclass <code>ASN1Encodable</code>.
  5784. <pre>
  5785. RoleSyntax ::= SEQUENCE {
  5786. roleAuthority [0] GeneralNames OPTIONAL,
  5787. roleName [1] GeneralName
  5788. }
  5789. </pre>
  5790. </member>
  5791. <member name="M:Org.BouncyCastle.Asn1.X509.RsaPublicKeyStructure.ToAsn1Object">
  5792. This outputs the key in Pkcs1v2 format.
  5793. <pre>
  5794. RSAPublicKey ::= Sequence {
  5795. modulus Integer, -- n
  5796. publicExponent Integer, -- e
  5797. }
  5798. </pre>
  5799. </member>
  5800. <member name="T:Org.BouncyCastle.Asn1.X509.SigI.NameOrPseudonym">
  5801. Structure for a name or pseudonym.
  5802. <pre>
  5803. NameOrPseudonym ::= CHOICE {
  5804. surAndGivenName SEQUENCE {
  5805. surName DirectoryString,
  5806. givenName SEQUENCE OF DirectoryString
  5807. },
  5808. pseudonym DirectoryString
  5809. }
  5810. </pre>
  5811. @see org.bouncycastle.asn1.x509.sigi.PersonalData
  5812. </member>
  5813. <member name="M:Org.BouncyCastle.Asn1.X509.SigI.NameOrPseudonym.#ctor(Org.BouncyCastle.Asn1.X500.DirectoryString)">
  5814. Constructor from DERString.
  5815. <p/>
  5816. The sequence is of type NameOrPseudonym:
  5817. <p/>
  5818. <pre>
  5819. NameOrPseudonym ::= CHOICE {
  5820. surAndGivenName SEQUENCE {
  5821. surName DirectoryString,
  5822. givenName SEQUENCE OF DirectoryString
  5823. },
  5824. pseudonym DirectoryString
  5825. }
  5826. </pre>
  5827. @param pseudonym pseudonym value to use.
  5828. </member>
  5829. <member name="M:Org.BouncyCastle.Asn1.X509.SigI.NameOrPseudonym.#ctor(Org.BouncyCastle.Asn1.Asn1Sequence)">
  5830. Constructor from Asn1Sequence.
  5831. <p/>
  5832. The sequence is of type NameOrPseudonym:
  5833. <p/>
  5834. <pre>
  5835. NameOrPseudonym ::= CHOICE {
  5836. surAndGivenName SEQUENCE {
  5837. surName DirectoryString,
  5838. givenName SEQUENCE OF DirectoryString
  5839. },
  5840. pseudonym DirectoryString
  5841. }
  5842. </pre>
  5843. @param seq The ASN.1 sequence.
  5844. </member>
  5845. <member name="M:Org.BouncyCastle.Asn1.X509.SigI.NameOrPseudonym.#ctor(System.String)">
  5846. Constructor from a given details.
  5847. @param pseudonym The pseudonym.
  5848. </member>
  5849. <member name="M:Org.BouncyCastle.Asn1.X509.SigI.NameOrPseudonym.#ctor(Org.BouncyCastle.Asn1.X500.DirectoryString,Org.BouncyCastle.Asn1.Asn1Sequence)">
  5850. Constructor from a given details.
  5851. @param surname The surname.
  5852. @param givenName A sequence of directory strings making up the givenName
  5853. </member>
  5854. <member name="M:Org.BouncyCastle.Asn1.X509.SigI.NameOrPseudonym.ToAsn1Object">
  5855. Produce an object suitable for an Asn1OutputStream.
  5856. <p/>
  5857. Returns:
  5858. <p/>
  5859. <pre>
  5860. NameOrPseudonym ::= CHOICE {
  5861. surAndGivenName SEQUENCE {
  5862. surName DirectoryString,
  5863. givenName SEQUENCE OF DirectoryString
  5864. },
  5865. pseudonym DirectoryString
  5866. }
  5867. </pre>
  5868. @return an Asn1Object
  5869. </member>
  5870. <member name="T:Org.BouncyCastle.Asn1.X509.SigI.PersonalData">
  5871. Contains personal data for the otherName field in the subjectAltNames
  5872. extension.
  5873. <p/>
  5874. <pre>
  5875. PersonalData ::= SEQUENCE {
  5876. nameOrPseudonym NameOrPseudonym,
  5877. nameDistinguisher [0] INTEGER OPTIONAL,
  5878. dateOfBirth [1] GeneralizedTime OPTIONAL,
  5879. placeOfBirth [2] DirectoryString OPTIONAL,
  5880. gender [3] PrintableString OPTIONAL,
  5881. postalAddress [4] DirectoryString OPTIONAL
  5882. }
  5883. </pre>
  5884. @see org.bouncycastle.asn1.x509.sigi.NameOrPseudonym
  5885. @see org.bouncycastle.asn1.x509.sigi.SigIObjectIdentifiers
  5886. </member>
  5887. <member name="M:Org.BouncyCastle.Asn1.X509.SigI.PersonalData.#ctor(Org.BouncyCastle.Asn1.Asn1Sequence)">
  5888. Constructor from Asn1Sequence.
  5889. <p/>
  5890. The sequence is of type NameOrPseudonym:
  5891. <p/>
  5892. <pre>
  5893. PersonalData ::= SEQUENCE {
  5894. nameOrPseudonym NameOrPseudonym,
  5895. nameDistinguisher [0] INTEGER OPTIONAL,
  5896. dateOfBirth [1] GeneralizedTime OPTIONAL,
  5897. placeOfBirth [2] DirectoryString OPTIONAL,
  5898. gender [3] PrintableString OPTIONAL,
  5899. postalAddress [4] DirectoryString OPTIONAL
  5900. }
  5901. </pre>
  5902. @param seq The ASN.1 sequence.
  5903. </member>
  5904. <member name="M:Org.BouncyCastle.Asn1.X509.SigI.PersonalData.#ctor(Org.BouncyCastle.Asn1.X509.SigI.NameOrPseudonym,Org.BouncyCastle.Math.BigInteger,Org.BouncyCastle.Asn1.DerGeneralizedTime,Org.BouncyCastle.Asn1.X500.DirectoryString,System.String,Org.BouncyCastle.Asn1.X500.DirectoryString)">
  5905. Constructor from a given details.
  5906. @param nameOrPseudonym Name or pseudonym.
  5907. @param nameDistinguisher Name distinguisher.
  5908. @param dateOfBirth Date of birth.
  5909. @param placeOfBirth Place of birth.
  5910. @param gender Gender.
  5911. @param postalAddress Postal Address.
  5912. </member>
  5913. <member name="M:Org.BouncyCastle.Asn1.X509.SigI.PersonalData.ToAsn1Object">
  5914. Produce an object suitable for an Asn1OutputStream.
  5915. <p/>
  5916. Returns:
  5917. <p/>
  5918. <pre>
  5919. PersonalData ::= SEQUENCE {
  5920. nameOrPseudonym NameOrPseudonym,
  5921. nameDistinguisher [0] INTEGER OPTIONAL,
  5922. dateOfBirth [1] GeneralizedTime OPTIONAL,
  5923. placeOfBirth [2] DirectoryString OPTIONAL,
  5924. gender [3] PrintableString OPTIONAL,
  5925. postalAddress [4] DirectoryString OPTIONAL
  5926. }
  5927. </pre>
  5928. @return an Asn1Object
  5929. </member>
  5930. <member name="T:Org.BouncyCastle.Asn1.X509.SigI.SigIObjectIdentifiers">
  5931. Object Identifiers of SigI specifciation (German Signature Law
  5932. Interoperability specification).
  5933. </member>
  5934. <member name="F:Org.BouncyCastle.Asn1.X509.SigI.SigIObjectIdentifiers.IdSigIKP">
  5935. Key purpose IDs for German SigI (Signature Interoperability
  5936. Specification)
  5937. </member>
  5938. <member name="F:Org.BouncyCastle.Asn1.X509.SigI.SigIObjectIdentifiers.IdSigICP">
  5939. Certificate policy IDs for German SigI (Signature Interoperability
  5940. Specification)
  5941. </member>
  5942. <member name="F:Org.BouncyCastle.Asn1.X509.SigI.SigIObjectIdentifiers.IdSigION">
  5943. Other Name IDs for German SigI (Signature Interoperability Specification)
  5944. </member>
  5945. <member name="F:Org.BouncyCastle.Asn1.X509.SigI.SigIObjectIdentifiers.IdSigIKPDirectoryService">
  5946. To be used for for the generation of directory service certificates.
  5947. </member>
  5948. <member name="F:Org.BouncyCastle.Asn1.X509.SigI.SigIObjectIdentifiers.IdSigIONPersonalData">
  5949. ID for PersonalData
  5950. </member>
  5951. <member name="F:Org.BouncyCastle.Asn1.X509.SigI.SigIObjectIdentifiers.IdSigICPSigConform">
  5952. Certificate is conform to german signature law.
  5953. </member>
  5954. <member name="T:Org.BouncyCastle.Asn1.X509.SubjectDirectoryAttributes">
  5955. This extension may contain further X.500 attributes of the subject. See also
  5956. RFC 3039.
  5957. <pre>
  5958. SubjectDirectoryAttributes ::= Attributes
  5959. Attributes ::= SEQUENCE SIZE (1..MAX) OF Attribute
  5960. Attribute ::= SEQUENCE
  5961. {
  5962. type AttributeType
  5963. values SET OF AttributeValue
  5964. }
  5965. AttributeType ::= OBJECT IDENTIFIER
  5966. AttributeValue ::= ANY DEFINED BY AttributeType
  5967. </pre>
  5968. @see org.bouncycastle.asn1.x509.X509Name for AttributeType ObjectIdentifiers.
  5969. </member>
  5970. <member name="M:Org.BouncyCastle.Asn1.X509.SubjectDirectoryAttributes.#ctor(Org.BouncyCastle.Asn1.Asn1Sequence)">
  5971. Constructor from Asn1Sequence.
  5972. The sequence is of type SubjectDirectoryAttributes:
  5973. <pre>
  5974. SubjectDirectoryAttributes ::= Attributes
  5975. Attributes ::= SEQUENCE SIZE (1..MAX) OF Attribute
  5976. Attribute ::= SEQUENCE
  5977. {
  5978. type AttributeType
  5979. values SET OF AttributeValue
  5980. }
  5981. AttributeType ::= OBJECT IDENTIFIER
  5982. AttributeValue ::= ANY DEFINED BY AttributeType
  5983. </pre>
  5984. @param seq
  5985. The ASN.1 sequence.
  5986. </member>
  5987. <member name="M:Org.BouncyCastle.Asn1.X509.SubjectDirectoryAttributes.#ctor(System.Collections.IList)">
  5988. Constructor from an ArrayList of attributes.
  5989. The ArrayList consists of attributes of type {@link Attribute Attribute}
  5990. @param attributes The attributes.
  5991. </member>
  5992. <member name="M:Org.BouncyCastle.Asn1.X509.SubjectDirectoryAttributes.ToAsn1Object">
  5993. Produce an object suitable for an Asn1OutputStream.
  5994. Returns:
  5995. <pre>
  5996. SubjectDirectoryAttributes ::= Attributes
  5997. Attributes ::= SEQUENCE SIZE (1..MAX) OF Attribute
  5998. Attribute ::= SEQUENCE
  5999. {
  6000. type AttributeType
  6001. values SET OF AttributeValue
  6002. }
  6003. AttributeType ::= OBJECT IDENTIFIER
  6004. AttributeValue ::= ANY DEFINED BY AttributeType
  6005. </pre>
  6006. @return a DERObject
  6007. </member>
  6008. <member name="P:Org.BouncyCastle.Asn1.X509.SubjectDirectoryAttributes.Attributes">
  6009. @return Returns the attributes.
  6010. </member>
  6011. <member name="T:Org.BouncyCastle.Asn1.X509.SubjectKeyIdentifier">
  6012. The SubjectKeyIdentifier object.
  6013. <pre>
  6014. SubjectKeyIdentifier::= OCTET STRING
  6015. </pre>
  6016. </member>
  6017. <member name="M:Org.BouncyCastle.Asn1.X509.SubjectKeyIdentifier.#ctor(Org.BouncyCastle.Asn1.X509.SubjectPublicKeyInfo)">
  6018. Calculates the keyIdentifier using a SHA1 hash over the BIT STRING
  6019. from SubjectPublicKeyInfo as defined in RFC3280.
  6020. @param spki the subject public key info.
  6021. </member>
  6022. <member name="M:Org.BouncyCastle.Asn1.X509.SubjectKeyIdentifier.CreateSha1KeyIdentifier(Org.BouncyCastle.Asn1.X509.SubjectPublicKeyInfo)">
  6023. Return a RFC 3280 type 1 key identifier. As in:
  6024. <pre>
  6025. (1) The keyIdentifier is composed of the 160-bit SHA-1 hash of the
  6026. value of the BIT STRING subjectPublicKey (excluding the tag,
  6027. length, and number of unused bits).
  6028. </pre>
  6029. @param keyInfo the key info object containing the subjectPublicKey field.
  6030. @return the key identifier.
  6031. </member>
  6032. <member name="M:Org.BouncyCastle.Asn1.X509.SubjectKeyIdentifier.CreateTruncatedSha1KeyIdentifier(Org.BouncyCastle.Asn1.X509.SubjectPublicKeyInfo)">
  6033. Return a RFC 3280 type 2 key identifier. As in:
  6034. <pre>
  6035. (2) The keyIdentifier is composed of a four bit type field with
  6036. the value 0100 followed by the least significant 60 bits of the
  6037. SHA-1 hash of the value of the BIT STRING subjectPublicKey.
  6038. </pre>
  6039. @param keyInfo the key info object containing the subjectPublicKey field.
  6040. @return the key identifier.
  6041. </member>
  6042. <member name="T:Org.BouncyCastle.Asn1.X509.SubjectPublicKeyInfo">
  6043. The object that contains the public key stored in a certficate.
  6044. <p>
  6045. The GetEncoded() method in the public keys in the JCE produces a DER
  6046. encoded one of these.</p>
  6047. </member>
  6048. <member name="M:Org.BouncyCastle.Asn1.X509.SubjectPublicKeyInfo.ParsePublicKey">
  6049. for when the public key is an encoded object - if the bitstring
  6050. can't be decoded this routine raises an IOException.
  6051. @exception IOException - if the bit string doesn't represent a Der
  6052. encoded object.
  6053. </member>
  6054. <member name="M:Org.BouncyCastle.Asn1.X509.SubjectPublicKeyInfo.GetPublicKey">
  6055. for when the public key is an encoded object - if the bitstring
  6056. can't be decoded this routine raises an IOException.
  6057. @exception IOException - if the bit string doesn't represent a Der
  6058. encoded object.
  6059. </member>
  6060. <member name="P:Org.BouncyCastle.Asn1.X509.SubjectPublicKeyInfo.PublicKeyData">
  6061. for when the public key is raw bits...
  6062. </member>
  6063. <member name="M:Org.BouncyCastle.Asn1.X509.SubjectPublicKeyInfo.ToAsn1Object">
  6064. Produce an object suitable for an Asn1OutputStream.
  6065. <pre>
  6066. SubjectPublicKeyInfo ::= Sequence {
  6067. algorithm AlgorithmIdentifier,
  6068. publicKey BIT STRING }
  6069. </pre>
  6070. </member>
  6071. <member name="T:Org.BouncyCastle.Asn1.X509.Target">
  6072. Target structure used in target information extension for attribute
  6073. certificates from RFC 3281.
  6074. <pre>
  6075. Target ::= CHOICE {
  6076. targetName [0] GeneralName,
  6077. targetGroup [1] GeneralName,
  6078. targetCert [2] TargetCert
  6079. }
  6080. </pre>
  6081. <p>
  6082. The targetCert field is currently not supported and must not be used
  6083. according to RFC 3281.</p>
  6084. </member>
  6085. <member name="M:Org.BouncyCastle.Asn1.X509.Target.GetInstance(System.Object)">
  6086. Creates an instance of a Target from the given object.
  6087. <p>
  6088. <code>obj</code> can be a Target or a {@link Asn1TaggedObject}</p>
  6089. @param obj The object.
  6090. @return A Target instance.
  6091. @throws ArgumentException if the given object cannot be
  6092. interpreted as Target.
  6093. </member>
  6094. <member name="M:Org.BouncyCastle.Asn1.X509.Target.#ctor(Org.BouncyCastle.Asn1.Asn1TaggedObject)">
  6095. Constructor from Asn1TaggedObject.
  6096. @param tagObj The tagged object.
  6097. @throws ArgumentException if the encoding is wrong.
  6098. </member>
  6099. <member name="M:Org.BouncyCastle.Asn1.X509.Target.#ctor(Org.BouncyCastle.Asn1.X509.Target.Choice,Org.BouncyCastle.Asn1.X509.GeneralName)">
  6100. Constructor from given details.
  6101. <p>
  6102. Exactly one of the parameters must be not <code>null</code>.</p>
  6103. @param type the choice type to apply to the name.
  6104. @param name the general name.
  6105. @throws ArgumentException if type is invalid.
  6106. </member>
  6107. <member name="P:Org.BouncyCastle.Asn1.X509.Target.TargetGroup">
  6108. @return Returns the targetGroup.
  6109. </member>
  6110. <member name="P:Org.BouncyCastle.Asn1.X509.Target.TargetName">
  6111. @return Returns the targetName.
  6112. </member>
  6113. <member name="M:Org.BouncyCastle.Asn1.X509.Target.ToAsn1Object">
  6114. Produce an object suitable for an Asn1OutputStream.
  6115. Returns:
  6116. <pre>
  6117. Target ::= CHOICE {
  6118. targetName [0] GeneralName,
  6119. targetGroup [1] GeneralName,
  6120. targetCert [2] TargetCert
  6121. }
  6122. </pre>
  6123. @return an Asn1Object
  6124. </member>
  6125. <member name="T:Org.BouncyCastle.Asn1.X509.TargetInformation">
  6126. Target information extension for attributes certificates according to RFC
  6127. 3281.
  6128. <pre>
  6129. SEQUENCE OF Targets
  6130. </pre>
  6131. </member>
  6132. <member name="M:Org.BouncyCastle.Asn1.X509.TargetInformation.GetInstance(System.Object)">
  6133. Creates an instance of a TargetInformation from the given object.
  6134. <p>
  6135. <code>obj</code> can be a TargetInformation or a {@link Asn1Sequence}</p>
  6136. @param obj The object.
  6137. @return A TargetInformation instance.
  6138. @throws ArgumentException if the given object cannot be interpreted as TargetInformation.
  6139. </member>
  6140. <member name="M:Org.BouncyCastle.Asn1.X509.TargetInformation.#ctor(Org.BouncyCastle.Asn1.Asn1Sequence)">
  6141. Constructor from a Asn1Sequence.
  6142. @param seq The Asn1Sequence.
  6143. @throws ArgumentException if the sequence does not contain
  6144. correctly encoded Targets elements.
  6145. </member>
  6146. <member name="M:Org.BouncyCastle.Asn1.X509.TargetInformation.GetTargetsObjects">
  6147. Returns the targets in this target information extension.
  6148. <p>
  6149. The ArrayList is cloned before it is returned.</p>
  6150. @return Returns the targets.
  6151. </member>
  6152. <member name="M:Org.BouncyCastle.Asn1.X509.TargetInformation.#ctor(Org.BouncyCastle.Asn1.X509.Targets)">
  6153. Constructs a target information from a single targets element.
  6154. According to RFC 3281 only one targets element must be produced.
  6155. @param targets A Targets instance.
  6156. </member>
  6157. <member name="M:Org.BouncyCastle.Asn1.X509.TargetInformation.#ctor(Org.BouncyCastle.Asn1.X509.Target[])">
  6158. According to RFC 3281 only one targets element must be produced. If
  6159. multiple targets are given they must be merged in
  6160. into one targets element.
  6161. @param targets An array with {@link Targets}.
  6162. </member>
  6163. <member name="M:Org.BouncyCastle.Asn1.X509.TargetInformation.ToAsn1Object">
  6164. Produce an object suitable for an Asn1OutputStream.
  6165. Returns:
  6166. <pre>
  6167. SEQUENCE OF Targets
  6168. </pre>
  6169. <p>
  6170. According to RFC 3281 only one targets element must be produced. If
  6171. multiple targets are given in the constructor they are merged into one
  6172. targets element. If this was produced from a
  6173. {@link Org.BouncyCastle.Asn1.Asn1Sequence} the encoding is kept.</p>
  6174. @return an Asn1Object
  6175. </member>
  6176. <member name="T:Org.BouncyCastle.Asn1.X509.Targets">
  6177. Targets structure used in target information extension for attribute
  6178. certificates from RFC 3281.
  6179. <pre>
  6180. Targets ::= SEQUENCE OF Target
  6181. Target ::= CHOICE {
  6182. targetName [0] GeneralName,
  6183. targetGroup [1] GeneralName,
  6184. targetCert [2] TargetCert
  6185. }
  6186. TargetCert ::= SEQUENCE {
  6187. targetCertificate IssuerSerial,
  6188. targetName GeneralName OPTIONAL,
  6189. certDigestInfo ObjectDigestInfo OPTIONAL
  6190. }
  6191. </pre>
  6192. @see org.bouncycastle.asn1.x509.Target
  6193. @see org.bouncycastle.asn1.x509.TargetInformation
  6194. </member>
  6195. <member name="M:Org.BouncyCastle.Asn1.X509.Targets.GetInstance(System.Object)">
  6196. Creates an instance of a Targets from the given object.
  6197. <p>
  6198. <code>obj</code> can be a Targets or a {@link Asn1Sequence}</p>
  6199. @param obj The object.
  6200. @return A Targets instance.
  6201. @throws ArgumentException if the given object cannot be interpreted as Target.
  6202. </member>
  6203. <member name="M:Org.BouncyCastle.Asn1.X509.Targets.#ctor(Org.BouncyCastle.Asn1.Asn1Sequence)">
  6204. Constructor from Asn1Sequence.
  6205. @param targets The ASN.1 SEQUENCE.
  6206. @throws ArgumentException if the contents of the sequence are
  6207. invalid.
  6208. </member>
  6209. <member name="M:Org.BouncyCastle.Asn1.X509.Targets.#ctor(Org.BouncyCastle.Asn1.X509.Target[])">
  6210. Constructor from given targets.
  6211. <p>
  6212. The ArrayList is copied.</p>
  6213. @param targets An <code>ArrayList</code> of {@link Target}s.
  6214. @see Target
  6215. @throws ArgumentException if the ArrayList contains not only Targets.
  6216. </member>
  6217. <member name="M:Org.BouncyCastle.Asn1.X509.Targets.GetTargets">
  6218. Returns the targets in an <code>ArrayList</code>.
  6219. <p>
  6220. The ArrayList is cloned before it is returned.</p>
  6221. @return Returns the targets.
  6222. </member>
  6223. <member name="M:Org.BouncyCastle.Asn1.X509.Targets.ToAsn1Object">
  6224. Produce an object suitable for an Asn1OutputStream.
  6225. Returns:
  6226. <pre>
  6227. Targets ::= SEQUENCE OF Target
  6228. </pre>
  6229. @return an Asn1Object
  6230. </member>
  6231. <member name="T:Org.BouncyCastle.Asn1.X509.TbsCertificateStructure">
  6232. The TbsCertificate object.
  6233. <pre>
  6234. TbsCertificate ::= Sequence {
  6235. version [ 0 ] Version DEFAULT v1(0),
  6236. serialNumber CertificateSerialNumber,
  6237. signature AlgorithmIdentifier,
  6238. issuer Name,
  6239. validity Validity,
  6240. subject Name,
  6241. subjectPublicKeyInfo SubjectPublicKeyInfo,
  6242. issuerUniqueID [ 1 ] IMPLICIT UniqueIdentifier OPTIONAL,
  6243. subjectUniqueID [ 2 ] IMPLICIT UniqueIdentifier OPTIONAL,
  6244. extensions [ 3 ] Extensions OPTIONAL
  6245. }
  6246. </pre>
  6247. <p>
  6248. Note: issuerUniqueID and subjectUniqueID are both deprecated by the IETF. This class
  6249. will parse them, but you really shouldn't be creating new ones.</p>
  6250. </member>
  6251. <member name="T:Org.BouncyCastle.Asn1.X509.TbsCertificateList">
  6252. PKIX RFC-2459 - TbsCertList object.
  6253. <pre>
  6254. TbsCertList ::= Sequence {
  6255. version Version OPTIONAL,
  6256. -- if present, shall be v2
  6257. signature AlgorithmIdentifier,
  6258. issuer Name,
  6259. thisUpdate Time,
  6260. nextUpdate Time OPTIONAL,
  6261. revokedCertificates Sequence OF Sequence {
  6262. userCertificate CertificateSerialNumber,
  6263. revocationDate Time,
  6264. crlEntryExtensions Extensions OPTIONAL
  6265. -- if present, shall be v2
  6266. } OPTIONAL,
  6267. crlExtensions [0] EXPLICIT Extensions OPTIONAL
  6268. -- if present, shall be v2
  6269. }
  6270. </pre>
  6271. </member>
  6272. <member name="M:Org.BouncyCastle.Asn1.X509.Time.#ctor(System.DateTime)">
  6273. creates a time object from a given date - if the date is between 1950
  6274. and 2049 a UTCTime object is Generated, otherwise a GeneralizedTime
  6275. is used.
  6276. </member>
  6277. <member name="M:Org.BouncyCastle.Asn1.X509.Time.ToDateTime">
  6278. <summary>
  6279. Return our time as DateTime.
  6280. </summary>
  6281. <returns>A date time.</returns>
  6282. </member>
  6283. <member name="M:Org.BouncyCastle.Asn1.X509.Time.ToAsn1Object">
  6284. Produce an object suitable for an Asn1OutputStream.
  6285. <pre>
  6286. Time ::= CHOICE {
  6287. utcTime UTCTime,
  6288. generalTime GeneralizedTime }
  6289. </pre>
  6290. </member>
  6291. <member name="T:Org.BouncyCastle.Asn1.X509.UserNotice">
  6292. <code>UserNotice</code> class, used in
  6293. <code>CertificatePolicies</code> X509 extensions (in policy
  6294. qualifiers).
  6295. <pre>
  6296. UserNotice ::= Sequence {
  6297. noticeRef NoticeReference OPTIONAL,
  6298. explicitText DisplayText OPTIONAL}
  6299. </pre>
  6300. @see PolicyQualifierId
  6301. @see PolicyInformation
  6302. </member>
  6303. <member name="M:Org.BouncyCastle.Asn1.X509.UserNotice.#ctor(Org.BouncyCastle.Asn1.X509.NoticeReference,Org.BouncyCastle.Asn1.X509.DisplayText)">
  6304. Creates a new <code>UserNotice</code> instance.
  6305. @param noticeRef a <code>NoticeReference</code> value
  6306. @param explicitText a <code>DisplayText</code> value
  6307. </member>
  6308. <member name="M:Org.BouncyCastle.Asn1.X509.UserNotice.#ctor(Org.BouncyCastle.Asn1.X509.NoticeReference,System.String)">
  6309. Creates a new <code>UserNotice</code> instance.
  6310. @param noticeRef a <code>NoticeReference</code> value
  6311. @param str the explicitText field as a string.
  6312. </member>
  6313. <member name="M:Org.BouncyCastle.Asn1.X509.UserNotice.#ctor(Org.BouncyCastle.Asn1.Asn1Sequence)">
  6314. Creates a new <code>UserNotice</code> instance.
  6315. <p>Useful from reconstructing a <code>UserNotice</code> instance
  6316. from its encodable/encoded form.
  6317. @param as an <code>ASN1Sequence</code> value obtained from either
  6318. calling @{link toASN1Object()} for a <code>UserNotice</code>
  6319. instance or from parsing it from a DER-encoded stream.</p>
  6320. </member>
  6321. <member name="T:Org.BouncyCastle.Asn1.X509.V1TbsCertificateGenerator">
  6322. Generator for Version 1 TbsCertificateStructures.
  6323. <pre>
  6324. TbsCertificate ::= Sequence {
  6325. version [ 0 ] Version DEFAULT v1(0),
  6326. serialNumber CertificateSerialNumber,
  6327. signature AlgorithmIdentifier,
  6328. issuer Name,
  6329. validity Validity,
  6330. subject Name,
  6331. subjectPublicKeyInfo SubjectPublicKeyInfo,
  6332. }
  6333. </pre>
  6334. </member>
  6335. <member name="T:Org.BouncyCastle.Asn1.X509.V2AttributeCertificateInfoGenerator">
  6336. Generator for Version 2 AttributeCertificateInfo
  6337. <pre>
  6338. AttributeCertificateInfo ::= Sequence {
  6339. version AttCertVersion -- version is v2,
  6340. holder Holder,
  6341. issuer AttCertIssuer,
  6342. signature AlgorithmIdentifier,
  6343. serialNumber CertificateSerialNumber,
  6344. attrCertValidityPeriod AttCertValidityPeriod,
  6345. attributes Sequence OF Attr,
  6346. issuerUniqueID UniqueIdentifier OPTIONAL,
  6347. extensions Extensions OPTIONAL
  6348. }
  6349. </pre>
  6350. </member>
  6351. <member name="M:Org.BouncyCastle.Asn1.X509.V2AttributeCertificateInfoGenerator.AddAttribute(Org.BouncyCastle.Asn1.X509.AttributeX509)">
  6352. @param attribute
  6353. </member>
  6354. <member name="M:Org.BouncyCastle.Asn1.X509.V2Form.ToAsn1Object">
  6355. Produce an object suitable for an Asn1OutputStream.
  6356. <pre>
  6357. V2Form ::= Sequence {
  6358. issuerName GeneralNames OPTIONAL,
  6359. baseCertificateID [0] IssuerSerial OPTIONAL,
  6360. objectDigestInfo [1] ObjectDigestInfo OPTIONAL
  6361. -- issuerName MUST be present in this profile
  6362. -- baseCertificateID and objectDigestInfo MUST NOT
  6363. -- be present in this profile
  6364. }
  6365. </pre>
  6366. </member>
  6367. <member name="T:Org.BouncyCastle.Asn1.X509.V2TbsCertListGenerator">
  6368. Generator for Version 2 TbsCertList structures.
  6369. <pre>
  6370. TbsCertList ::= Sequence {
  6371. version Version OPTIONAL,
  6372. -- if present, shall be v2
  6373. signature AlgorithmIdentifier,
  6374. issuer Name,
  6375. thisUpdate Time,
  6376. nextUpdate Time OPTIONAL,
  6377. revokedCertificates Sequence OF Sequence {
  6378. userCertificate CertificateSerialNumber,
  6379. revocationDate Time,
  6380. crlEntryExtensions Extensions OPTIONAL
  6381. -- if present, shall be v2
  6382. } OPTIONAL,
  6383. crlExtensions [0] EXPLICIT Extensions OPTIONAL
  6384. -- if present, shall be v2
  6385. }
  6386. </pre>
  6387. <b>Note: This class may be subject to change</b>
  6388. </member>
  6389. <member name="T:Org.BouncyCastle.Asn1.X509.V3TbsCertificateGenerator">
  6390. Generator for Version 3 TbsCertificateStructures.
  6391. <pre>
  6392. TbsCertificate ::= Sequence {
  6393. version [ 0 ] Version DEFAULT v1(0),
  6394. serialNumber CertificateSerialNumber,
  6395. signature AlgorithmIdentifier,
  6396. issuer Name,
  6397. validity Validity,
  6398. subject Name,
  6399. subjectPublicKeyInfo SubjectPublicKeyInfo,
  6400. issuerUniqueID [ 1 ] IMPLICIT UniqueIdentifier OPTIONAL,
  6401. subjectUniqueID [ 2 ] IMPLICIT UniqueIdentifier OPTIONAL,
  6402. extensions [ 3 ] Extensions OPTIONAL
  6403. }
  6404. </pre>
  6405. </member>
  6406. <member name="T:Org.BouncyCastle.Asn1.X509.X509CertificateStructure">
  6407. an X509Certificate structure.
  6408. <pre>
  6409. Certificate ::= Sequence {
  6410. tbsCertificate TbsCertificate,
  6411. signatureAlgorithm AlgorithmIdentifier,
  6412. signature BIT STRING
  6413. }
  6414. </pre>
  6415. </member>
  6416. <member name="T:Org.BouncyCastle.Asn1.X509.X509DefaultEntryConverter">
  6417. The default converter for X509 DN entries when going from their
  6418. string value to ASN.1 strings.
  6419. </member>
  6420. <member name="M:Org.BouncyCastle.Asn1.X509.X509DefaultEntryConverter.GetConvertedValue(Org.BouncyCastle.Asn1.DerObjectIdentifier,System.String)">
  6421. Apply default conversion for the given value depending on the oid
  6422. and the character range of the value.
  6423. @param oid the object identifier for the DN entry
  6424. @param value the value associated with it
  6425. @return the ASN.1 equivalent for the string value.
  6426. </member>
  6427. <member name="T:Org.BouncyCastle.Asn1.X509.X509Extension">
  6428. an object for the elements in the X.509 V3 extension block.
  6429. </member>
  6430. <member name="M:Org.BouncyCastle.Asn1.X509.X509Extension.ConvertValueToObject(Org.BouncyCastle.Asn1.X509.X509Extension)">
  6431. <sumary>Convert the value of the passed in extension to an object.</sumary>
  6432. <param name="ext">The extension to parse.</param>
  6433. <returns>The object the value string contains.</returns>
  6434. <exception cref="T:System.ArgumentException">If conversion is not possible.</exception>
  6435. </member>
  6436. <member name="F:Org.BouncyCastle.Asn1.X509.X509Extensions.SubjectDirectoryAttributes">
  6437. Subject Directory Attributes
  6438. </member>
  6439. <member name="F:Org.BouncyCastle.Asn1.X509.X509Extensions.SubjectKeyIdentifier">
  6440. Subject Key Identifier
  6441. </member>
  6442. <member name="F:Org.BouncyCastle.Asn1.X509.X509Extensions.KeyUsage">
  6443. Key Usage
  6444. </member>
  6445. <member name="F:Org.BouncyCastle.Asn1.X509.X509Extensions.PrivateKeyUsagePeriod">
  6446. Private Key Usage Period
  6447. </member>
  6448. <member name="F:Org.BouncyCastle.Asn1.X509.X509Extensions.SubjectAlternativeName">
  6449. Subject Alternative Name
  6450. </member>
  6451. <member name="F:Org.BouncyCastle.Asn1.X509.X509Extensions.IssuerAlternativeName">
  6452. Issuer Alternative Name
  6453. </member>
  6454. <member name="F:Org.BouncyCastle.Asn1.X509.X509Extensions.BasicConstraints">
  6455. Basic Constraints
  6456. </member>
  6457. <member name="F:Org.BouncyCastle.Asn1.X509.X509Extensions.CrlNumber">
  6458. CRL Number
  6459. </member>
  6460. <member name="F:Org.BouncyCastle.Asn1.X509.X509Extensions.ReasonCode">
  6461. Reason code
  6462. </member>
  6463. <member name="F:Org.BouncyCastle.Asn1.X509.X509Extensions.InstructionCode">
  6464. Hold Instruction Code
  6465. </member>
  6466. <member name="F:Org.BouncyCastle.Asn1.X509.X509Extensions.InvalidityDate">
  6467. Invalidity Date
  6468. </member>
  6469. <member name="F:Org.BouncyCastle.Asn1.X509.X509Extensions.DeltaCrlIndicator">
  6470. Delta CRL indicator
  6471. </member>
  6472. <member name="F:Org.BouncyCastle.Asn1.X509.X509Extensions.IssuingDistributionPoint">
  6473. Issuing Distribution Point
  6474. </member>
  6475. <member name="F:Org.BouncyCastle.Asn1.X509.X509Extensions.CertificateIssuer">
  6476. Certificate Issuer
  6477. </member>
  6478. <member name="F:Org.BouncyCastle.Asn1.X509.X509Extensions.NameConstraints">
  6479. Name Constraints
  6480. </member>
  6481. <member name="F:Org.BouncyCastle.Asn1.X509.X509Extensions.CrlDistributionPoints">
  6482. CRL Distribution Points
  6483. </member>
  6484. <member name="F:Org.BouncyCastle.Asn1.X509.X509Extensions.CertificatePolicies">
  6485. Certificate Policies
  6486. </member>
  6487. <member name="F:Org.BouncyCastle.Asn1.X509.X509Extensions.PolicyMappings">
  6488. Policy Mappings
  6489. </member>
  6490. <member name="F:Org.BouncyCastle.Asn1.X509.X509Extensions.AuthorityKeyIdentifier">
  6491. Authority Key Identifier
  6492. </member>
  6493. <member name="F:Org.BouncyCastle.Asn1.X509.X509Extensions.PolicyConstraints">
  6494. Policy Constraints
  6495. </member>
  6496. <member name="F:Org.BouncyCastle.Asn1.X509.X509Extensions.ExtendedKeyUsage">
  6497. Extended Key Usage
  6498. </member>
  6499. <member name="F:Org.BouncyCastle.Asn1.X509.X509Extensions.FreshestCrl">
  6500. Freshest CRL
  6501. </member>
  6502. <member name="F:Org.BouncyCastle.Asn1.X509.X509Extensions.InhibitAnyPolicy">
  6503. Inhibit Any Policy
  6504. </member>
  6505. <member name="F:Org.BouncyCastle.Asn1.X509.X509Extensions.AuthorityInfoAccess">
  6506. Authority Info Access
  6507. </member>
  6508. <member name="F:Org.BouncyCastle.Asn1.X509.X509Extensions.SubjectInfoAccess">
  6509. Subject Info Access
  6510. </member>
  6511. <member name="F:Org.BouncyCastle.Asn1.X509.X509Extensions.LogoType">
  6512. Logo Type
  6513. </member>
  6514. <member name="F:Org.BouncyCastle.Asn1.X509.X509Extensions.BiometricInfo">
  6515. BiometricInfo
  6516. </member>
  6517. <member name="F:Org.BouncyCastle.Asn1.X509.X509Extensions.QCStatements">
  6518. QCStatements
  6519. </member>
  6520. <member name="F:Org.BouncyCastle.Asn1.X509.X509Extensions.AuditIdentity">
  6521. Audit identity extension in attribute certificates.
  6522. </member>
  6523. <member name="F:Org.BouncyCastle.Asn1.X509.X509Extensions.NoRevAvail">
  6524. NoRevAvail extension in attribute certificates.
  6525. </member>
  6526. <member name="F:Org.BouncyCastle.Asn1.X509.X509Extensions.TargetInformation">
  6527. TargetInformation extension in attribute certificates.
  6528. </member>
  6529. <member name="F:Org.BouncyCastle.Asn1.X509.X509Extensions.ExpiredCertsOnCrl">
  6530. Expired Certificates on CRL extension
  6531. </member>
  6532. <member name="M:Org.BouncyCastle.Asn1.X509.X509Extensions.#ctor(Org.BouncyCastle.Asn1.Asn1Sequence)">
  6533. Constructor from Asn1Sequence.
  6534. the extensions are a list of constructed sequences, either with (Oid, OctetString) or (Oid, Boolean, OctetString)
  6535. </member>
  6536. <member name="M:Org.BouncyCastle.Asn1.X509.X509Extensions.#ctor(System.Collections.IDictionary)">
  6537. constructor from a table of extensions.
  6538. <p>
  6539. it's is assumed the table contains Oid/string pairs.</p>
  6540. </member>
  6541. <member name="M:Org.BouncyCastle.Asn1.X509.X509Extensions.#ctor(System.Collections.IList,System.Collections.IDictionary)">
  6542. Constructor from a table of extensions with ordering.
  6543. <p>
  6544. It's is assumed the table contains Oid/string pairs.</p>
  6545. </member>
  6546. <member name="M:Org.BouncyCastle.Asn1.X509.X509Extensions.#ctor(System.Collections.IList,System.Collections.IList)">
  6547. Constructor from two vectors
  6548. @param objectIDs an ArrayList of the object identifiers.
  6549. @param values an ArrayList of the extension values.
  6550. </member>
  6551. <member name="M:Org.BouncyCastle.Asn1.X509.X509Extensions.#ctor(System.Collections.Hashtable)">
  6552. constructor from a table of extensions.
  6553. <p>
  6554. it's is assumed the table contains Oid/string pairs.</p>
  6555. </member>
  6556. <member name="M:Org.BouncyCastle.Asn1.X509.X509Extensions.#ctor(System.Collections.ArrayList,System.Collections.Hashtable)">
  6557. Constructor from a table of extensions with ordering.
  6558. <p>
  6559. It's is assumed the table contains Oid/string pairs.</p>
  6560. </member>
  6561. <member name="M:Org.BouncyCastle.Asn1.X509.X509Extensions.#ctor(System.Collections.ArrayList,System.Collections.ArrayList)">
  6562. Constructor from two vectors
  6563. @param objectIDs an ArrayList of the object identifiers.
  6564. @param values an ArrayList of the extension values.
  6565. </member>
  6566. <member name="P:Org.BouncyCastle.Asn1.X509.X509Extensions.ExtensionOids">
  6567. return an Enumeration of the extension field's object ids.
  6568. </member>
  6569. <member name="M:Org.BouncyCastle.Asn1.X509.X509Extensions.GetExtension(Org.BouncyCastle.Asn1.DerObjectIdentifier)">
  6570. return the extension represented by the object identifier
  6571. passed in.
  6572. @return the extension if it's present, null otherwise.
  6573. </member>
  6574. <member name="M:Org.BouncyCastle.Asn1.X509.X509Extensions.GetExtensionParsedValue(Org.BouncyCastle.Asn1.DerObjectIdentifier)">
  6575. return the parsed value of the extension represented by the object identifier
  6576. passed in.
  6577. @return the parsed value of the extension if it's present, null otherwise.
  6578. </member>
  6579. <member name="M:Org.BouncyCastle.Asn1.X509.X509Extensions.ToAsn1Object">
  6580. <pre>
  6581. Extensions ::= SEQUENCE SIZE (1..MAX) OF Extension
  6582. Extension ::= SEQUENCE {
  6583. extnId EXTENSION.&amp;id ({ExtensionSet}),
  6584. critical BOOLEAN DEFAULT FALSE,
  6585. extnValue OCTET STRING }
  6586. </pre>
  6587. </member>
  6588. <member name="T:Org.BouncyCastle.Asn1.X509.X509ExtensionsGenerator">
  6589. <remarks>Generator for X.509 extensions</remarks>
  6590. </member>
  6591. <member name="M:Org.BouncyCastle.Asn1.X509.X509ExtensionsGenerator.Reset">
  6592. <summary>Reset the generator</summary>
  6593. </member>
  6594. <member name="M:Org.BouncyCastle.Asn1.X509.X509ExtensionsGenerator.AddExtension(Org.BouncyCastle.Asn1.DerObjectIdentifier,System.Boolean,Org.BouncyCastle.Asn1.Asn1Encodable)">
  6595. <summary>
  6596. Add an extension with the given oid and the passed in value to be included
  6597. in the OCTET STRING associated with the extension.
  6598. </summary>
  6599. <param name="oid">OID for the extension.</param>
  6600. <param name="critical">True if critical, false otherwise.</param>
  6601. <param name="extValue">The ASN.1 object to be included in the extension.</param>
  6602. </member>
  6603. <member name="M:Org.BouncyCastle.Asn1.X509.X509ExtensionsGenerator.AddExtension(Org.BouncyCastle.Asn1.DerObjectIdentifier,System.Boolean,System.Byte[])">
  6604. <summary>
  6605. Add an extension with the given oid and the passed in byte array to be wrapped
  6606. in the OCTET STRING associated with the extension.
  6607. </summary>
  6608. <param name="oid">OID for the extension.</param>
  6609. <param name="critical">True if critical, false otherwise.</param>
  6610. <param name="extValue">The byte array to be wrapped.</param>
  6611. </member>
  6612. <member name="P:Org.BouncyCastle.Asn1.X509.X509ExtensionsGenerator.IsEmpty">
  6613. <summary>Return true if there are no extension present in this generator.</summary>
  6614. <returns>True if empty, false otherwise</returns>
  6615. </member>
  6616. <member name="M:Org.BouncyCastle.Asn1.X509.X509ExtensionsGenerator.Generate">
  6617. <summary>Generate an X509Extensions object based on the current state of the generator.</summary>
  6618. <returns>An <c>X509Extensions</c> object</returns>
  6619. </member>
  6620. <member name="T:Org.BouncyCastle.Asn1.X509.X509Name">
  6621. <pre>
  6622. RDNSequence ::= SEQUENCE OF RelativeDistinguishedName
  6623. RelativeDistinguishedName ::= SET SIZE (1..MAX) OF AttributeTypeAndValue
  6624. AttributeTypeAndValue ::= SEQUENCE {
  6625. type OBJECT IDENTIFIER,
  6626. value ANY }
  6627. </pre>
  6628. </member>
  6629. <member name="F:Org.BouncyCastle.Asn1.X509.X509Name.C">
  6630. country code - StringType(SIZE(2))
  6631. </member>
  6632. <member name="F:Org.BouncyCastle.Asn1.X509.X509Name.O">
  6633. organization - StringType(SIZE(1..64))
  6634. </member>
  6635. <member name="F:Org.BouncyCastle.Asn1.X509.X509Name.OU">
  6636. organizational unit name - StringType(SIZE(1..64))
  6637. </member>
  6638. <member name="F:Org.BouncyCastle.Asn1.X509.X509Name.T">
  6639. Title
  6640. </member>
  6641. <member name="F:Org.BouncyCastle.Asn1.X509.X509Name.CN">
  6642. common name - StringType(SIZE(1..64))
  6643. </member>
  6644. <member name="F:Org.BouncyCastle.Asn1.X509.X509Name.Street">
  6645. street - StringType(SIZE(1..64))
  6646. </member>
  6647. <member name="F:Org.BouncyCastle.Asn1.X509.X509Name.SerialNumber">
  6648. device serial number name - StringType(SIZE(1..64))
  6649. </member>
  6650. <member name="F:Org.BouncyCastle.Asn1.X509.X509Name.L">
  6651. locality name - StringType(SIZE(1..64))
  6652. </member>
  6653. <member name="F:Org.BouncyCastle.Asn1.X509.X509Name.ST">
  6654. state, or province name - StringType(SIZE(1..64))
  6655. </member>
  6656. <member name="F:Org.BouncyCastle.Asn1.X509.X509Name.Surname">
  6657. Naming attributes of type X520name
  6658. </member>
  6659. <member name="F:Org.BouncyCastle.Asn1.X509.X509Name.BusinessCategory">
  6660. businessCategory - DirectoryString(SIZE(1..128)
  6661. </member>
  6662. <member name="F:Org.BouncyCastle.Asn1.X509.X509Name.PostalCode">
  6663. postalCode - DirectoryString(SIZE(1..40)
  6664. </member>
  6665. <member name="F:Org.BouncyCastle.Asn1.X509.X509Name.DnQualifier">
  6666. dnQualifier - DirectoryString(SIZE(1..64)
  6667. </member>
  6668. <member name="F:Org.BouncyCastle.Asn1.X509.X509Name.Pseudonym">
  6669. RFC 3039 Pseudonym - DirectoryString(SIZE(1..64)
  6670. </member>
  6671. <member name="F:Org.BouncyCastle.Asn1.X509.X509Name.DateOfBirth">
  6672. RFC 3039 DateOfBirth - GeneralizedTime - YYYYMMDD000000Z
  6673. </member>
  6674. <member name="F:Org.BouncyCastle.Asn1.X509.X509Name.PlaceOfBirth">
  6675. RFC 3039 PlaceOfBirth - DirectoryString(SIZE(1..128)
  6676. </member>
  6677. <member name="F:Org.BouncyCastle.Asn1.X509.X509Name.Gender">
  6678. RFC 3039 DateOfBirth - PrintableString (SIZE(1)) -- "M", "F", "m" or "f"
  6679. </member>
  6680. <member name="F:Org.BouncyCastle.Asn1.X509.X509Name.CountryOfCitizenship">
  6681. RFC 3039 CountryOfCitizenship - PrintableString (SIZE (2)) -- ISO 3166
  6682. codes only
  6683. </member>
  6684. <member name="F:Org.BouncyCastle.Asn1.X509.X509Name.CountryOfResidence">
  6685. RFC 3039 CountryOfCitizenship - PrintableString (SIZE (2)) -- ISO 3166
  6686. codes only
  6687. </member>
  6688. <member name="F:Org.BouncyCastle.Asn1.X509.X509Name.NameAtBirth">
  6689. ISIS-MTT NameAtBirth - DirectoryString(SIZE(1..64)
  6690. </member>
  6691. <member name="F:Org.BouncyCastle.Asn1.X509.X509Name.PostalAddress">
  6692. RFC 3039 PostalAddress - SEQUENCE SIZE (1..6) OF
  6693. DirectoryString(SIZE(1..30))
  6694. </member>
  6695. <member name="F:Org.BouncyCastle.Asn1.X509.X509Name.DmdName">
  6696. RFC 2256 dmdName
  6697. </member>
  6698. <member name="F:Org.BouncyCastle.Asn1.X509.X509Name.TelephoneNumber">
  6699. id-at-telephoneNumber
  6700. </member>
  6701. <member name="F:Org.BouncyCastle.Asn1.X509.X509Name.OrganizationIdentifier">
  6702. id-at-organizationIdentifier
  6703. </member>
  6704. <member name="F:Org.BouncyCastle.Asn1.X509.X509Name.Name">
  6705. id-at-name
  6706. </member>
  6707. <member name="F:Org.BouncyCastle.Asn1.X509.X509Name.EmailAddress">
  6708. Email address (RSA PKCS#9 extension) - IA5String.
  6709. <p>Note: if you're trying to be ultra orthodox, don't use this! It shouldn't be in here.</p>
  6710. </member>
  6711. <member name="F:Org.BouncyCastle.Asn1.X509.X509Name.UnstructuredName">
  6712. more from PKCS#9
  6713. </member>
  6714. <member name="F:Org.BouncyCastle.Asn1.X509.X509Name.E">
  6715. email address in Verisign certificates
  6716. </member>
  6717. <member name="F:Org.BouncyCastle.Asn1.X509.X509Name.UID">
  6718. LDAP User id.
  6719. </member>
  6720. <member name="P:Org.BouncyCastle.Asn1.X509.X509Name.DefaultReverse">
  6721. determines whether or not strings should be processed and printed
  6722. from back to front.
  6723. </member>
  6724. <member name="F:Org.BouncyCastle.Asn1.X509.X509Name.DefaultSymbols">
  6725. default look up table translating OID values into their common symbols following
  6726. the convention in RFC 2253 with a few extras
  6727. </member>
  6728. <member name="F:Org.BouncyCastle.Asn1.X509.X509Name.RFC2253Symbols">
  6729. look up table translating OID values into their common symbols following the convention in RFC 2253
  6730. </member>
  6731. <member name="F:Org.BouncyCastle.Asn1.X509.X509Name.RFC1779Symbols">
  6732. look up table translating OID values into their common symbols following the convention in RFC 1779
  6733. </member>
  6734. <member name="F:Org.BouncyCastle.Asn1.X509.X509Name.DefaultLookup">
  6735. look up table translating common symbols into their OIDS.
  6736. </member>
  6737. <member name="M:Org.BouncyCastle.Asn1.X509.X509Name.GetInstance(Org.BouncyCastle.Asn1.Asn1TaggedObject,System.Boolean)">
  6738. Return a X509Name based on the passed in tagged object.
  6739. @param obj tag object holding name.
  6740. @param explicitly true if explicitly tagged false otherwise.
  6741. @return the X509Name
  6742. </member>
  6743. <member name="M:Org.BouncyCastle.Asn1.X509.X509Name.#ctor(Org.BouncyCastle.Asn1.Asn1Sequence)">
  6744. Constructor from Asn1Sequence
  6745. the principal will be a list of constructed sets, each containing an (OID, string) pair.
  6746. </member>
  6747. <member name="M:Org.BouncyCastle.Asn1.X509.X509Name.#ctor(System.Collections.IList,System.Collections.IDictionary)">
  6748. Constructor from a table of attributes with ordering.
  6749. <p>
  6750. it's is assumed the table contains OID/string pairs, and the contents
  6751. of the table are copied into an internal table as part of the
  6752. construction process. The ordering ArrayList should contain the OIDs
  6753. in the order they are meant to be encoded or printed in ToString.</p>
  6754. </member>
  6755. <member name="M:Org.BouncyCastle.Asn1.X509.X509Name.#ctor(System.Collections.IList,System.Collections.IDictionary,Org.BouncyCastle.Asn1.X509.X509NameEntryConverter)">
  6756. Constructor from a table of attributes with ordering.
  6757. <p>
  6758. it's is assumed the table contains OID/string pairs, and the contents
  6759. of the table are copied into an internal table as part of the
  6760. construction process. The ordering ArrayList should contain the OIDs
  6761. in the order they are meant to be encoded or printed in ToString.</p>
  6762. <p>
  6763. The passed in converter will be used to convert the strings into their
  6764. ASN.1 counterparts.</p>
  6765. </member>
  6766. <member name="M:Org.BouncyCastle.Asn1.X509.X509Name.#ctor(System.Collections.IList,System.Collections.IList)">
  6767. Takes two vectors one of the oids and the other of the values.
  6768. </member>
  6769. <member name="M:Org.BouncyCastle.Asn1.X509.X509Name.#ctor(System.Collections.IList,System.Collections.IList,Org.BouncyCastle.Asn1.X509.X509NameEntryConverter)">
  6770. Takes two vectors one of the oids and the other of the values.
  6771. <p>
  6772. The passed in converter will be used to convert the strings into their
  6773. ASN.1 counterparts.</p>
  6774. </member>
  6775. <member name="M:Org.BouncyCastle.Asn1.X509.X509Name.#ctor(System.String)">
  6776. Takes an X509 dir name as a string of the format "C=AU, ST=Victoria", or
  6777. some such, converting it into an ordered set of name attributes.
  6778. </member>
  6779. <member name="M:Org.BouncyCastle.Asn1.X509.X509Name.#ctor(System.String,Org.BouncyCastle.Asn1.X509.X509NameEntryConverter)">
  6780. Takes an X509 dir name as a string of the format "C=AU, ST=Victoria", or
  6781. some such, converting it into an ordered set of name attributes with each
  6782. string value being converted to its associated ASN.1 type using the passed
  6783. in converter.
  6784. </member>
  6785. <member name="M:Org.BouncyCastle.Asn1.X509.X509Name.#ctor(System.Boolean,System.String)">
  6786. Takes an X509 dir name as a string of the format "C=AU, ST=Victoria", or
  6787. some such, converting it into an ordered set of name attributes. If reverse
  6788. is true, create the encoded version of the sequence starting from the
  6789. last element in the string.
  6790. </member>
  6791. <member name="M:Org.BouncyCastle.Asn1.X509.X509Name.#ctor(System.Boolean,System.String,Org.BouncyCastle.Asn1.X509.X509NameEntryConverter)">
  6792. Takes an X509 dir name as a string of the format "C=AU, ST=Victoria", or
  6793. some such, converting it into an ordered set of name attributes with each
  6794. string value being converted to its associated ASN.1 type using the passed
  6795. in converter. If reverse is true the ASN.1 sequence representing the DN will
  6796. be built by starting at the end of the string, rather than the start.
  6797. </member>
  6798. <member name="M:Org.BouncyCastle.Asn1.X509.X509Name.#ctor(System.Boolean,System.Collections.IDictionary,System.String)">
  6799. Takes an X509 dir name as a string of the format "C=AU, ST=Victoria", or
  6800. some such, converting it into an ordered set of name attributes. lookUp
  6801. should provide a table of lookups, indexed by lowercase only strings and
  6802. yielding a DerObjectIdentifier, other than that OID. and numeric oids
  6803. will be processed automatically.
  6804. <br/>
  6805. If reverse is true, create the encoded version of the sequence
  6806. starting from the last element in the string.
  6807. @param reverse true if we should start scanning from the end (RFC 2553).
  6808. @param lookUp table of names and their oids.
  6809. @param dirName the X.500 string to be parsed.
  6810. </member>
  6811. <member name="M:Org.BouncyCastle.Asn1.X509.X509Name.#ctor(System.Boolean,System.Collections.IDictionary,System.String,Org.BouncyCastle.Asn1.X509.X509NameEntryConverter)">
  6812. Takes an X509 dir name as a string of the format "C=AU, ST=Victoria", or
  6813. some such, converting it into an ordered set of name attributes. lookUp
  6814. should provide a table of lookups, indexed by lowercase only strings and
  6815. yielding a DerObjectIdentifier, other than that OID. and numeric oids
  6816. will be processed automatically. The passed in converter is used to convert the
  6817. string values to the right of each equals sign to their ASN.1 counterparts.
  6818. <br/>
  6819. @param reverse true if we should start scanning from the end, false otherwise.
  6820. @param lookUp table of names and oids.
  6821. @param dirName the string dirName
  6822. @param converter the converter to convert string values into their ASN.1 equivalents
  6823. </member>
  6824. <member name="M:Org.BouncyCastle.Asn1.X509.X509Name.GetOidList">
  6825. return an IList of the oids in the name, in the order they were found.
  6826. </member>
  6827. <member name="M:Org.BouncyCastle.Asn1.X509.X509Name.GetValueList">
  6828. return an IList of the values found in the name, in the order they
  6829. were found.
  6830. </member>
  6831. <member name="M:Org.BouncyCastle.Asn1.X509.X509Name.GetValueList(Org.BouncyCastle.Asn1.DerObjectIdentifier)">
  6832. return an IList of the values found in the name, in the order they
  6833. were found, with the DN label corresponding to passed in oid.
  6834. </member>
  6835. <member name="M:Org.BouncyCastle.Asn1.X509.X509Name.Equivalent(Org.BouncyCastle.Asn1.X509.X509Name,System.Boolean)">
  6836. <param name="other">The X509Name object to test equivalency against.</param>
  6837. <param name="inOrder">If true, the order of elements must be the same,
  6838. as well as the values associated with each element.</param>
  6839. </member>
  6840. <member name="M:Org.BouncyCastle.Asn1.X509.X509Name.Equivalent(Org.BouncyCastle.Asn1.X509.X509Name)">
  6841. test for equivalence - note: case is ignored.
  6842. </member>
  6843. <member name="M:Org.BouncyCastle.Asn1.X509.X509Name.ToString(System.Boolean,System.Collections.IDictionary)">
  6844. convert the structure to a string - if reverse is true the
  6845. oids and values are listed out starting with the last element
  6846. in the sequence (ala RFC 2253), otherwise the string will begin
  6847. with the first element of the structure. If no string definition
  6848. for the oid is found in oidSymbols the string value of the oid is
  6849. added. Two standard symbol tables are provided DefaultSymbols, and
  6850. RFC2253Symbols as part of this class.
  6851. @param reverse if true start at the end of the sequence and work back.
  6852. @param oidSymbols look up table strings for oids.
  6853. </member>
  6854. <member name="T:Org.BouncyCastle.Asn1.X509.X509NameEntryConverter">
  6855. * It turns out that the number of standard ways the fields in a DN should be
  6856. * encoded into their ASN.1 counterparts is rapidly approaching the
  6857. * number of machines on the internet. By default the X509Name class
  6858. * will produce UTF8Strings in line with the current recommendations (RFC 3280).
  6859. * <p>
  6860. * An example of an encoder look like below:
  6861. * <pre>
  6862. * public class X509DirEntryConverter
  6863. * : X509NameEntryConverter
  6864. * {
  6865. * public Asn1Object GetConvertedValue(
  6866. * DerObjectIdentifier oid,
  6867. * string value)
  6868. * {
  6869. * if (str.Length() != 0 &amp;&amp; str.charAt(0) == '#')
  6870. * {
  6871. * return ConvertHexEncoded(str, 1);
  6872. * }
  6873. * if (oid.Equals(EmailAddress))
  6874. * {
  6875. * return new DerIA5String(str);
  6876. * }
  6877. * else if (CanBePrintable(str))
  6878. * {
  6879. * return new DerPrintableString(str);
  6880. * }
  6881. * else if (CanBeUTF8(str))
  6882. * {
  6883. * return new DerUtf8String(str);
  6884. * }
  6885. * else
  6886. * {
  6887. * return new DerBmpString(str);
  6888. * }
  6889. * }
  6890. * }
  6891. * </pre>
  6892. * </p>
  6893. </member>
  6894. <member name="M:Org.BouncyCastle.Asn1.X509.X509NameEntryConverter.ConvertHexEncoded(System.String,System.Int32)">
  6895. Convert an inline encoded hex string rendition of an ASN.1
  6896. object back into its corresponding ASN.1 object.
  6897. @param str the hex encoded object
  6898. @param off the index at which the encoding starts
  6899. @return the decoded object
  6900. </member>
  6901. <member name="M:Org.BouncyCastle.Asn1.X509.X509NameEntryConverter.CanBePrintable(System.String)">
  6902. return true if the passed in string can be represented without
  6903. loss as a PrintableString, false otherwise.
  6904. </member>
  6905. <member name="M:Org.BouncyCastle.Asn1.X509.X509NameEntryConverter.GetConvertedValue(Org.BouncyCastle.Asn1.DerObjectIdentifier,System.String)">
  6906. Convert the passed in string value into the appropriate ASN.1
  6907. encoded object.
  6908. @param oid the oid associated with the value in the DN.
  6909. @param value the value of the particular DN component.
  6910. @return the ASN.1 equivalent for the value.
  6911. </member>
  6912. <member name="T:Org.BouncyCastle.Asn1.X509.X509NameTokenizer">
  6913. class for breaking up an X500 Name into it's component tokens, ala
  6914. java.util.StringTokenizer. We need this class as some of the
  6915. lightweight Java environment don't support classes like
  6916. StringTokenizer.
  6917. </member>
  6918. <member name="T:Org.BouncyCastle.Asn1.X9.ECNamedCurveTable">
  6919. A general class that reads all X9.62 style EC curve tables.
  6920. </member>
  6921. <member name="M:Org.BouncyCastle.Asn1.X9.ECNamedCurveTable.GetByName(System.String)">
  6922. return a X9ECParameters object representing the passed in named
  6923. curve. The routine returns null if the curve is not present.
  6924. @param name the name of the curve requested
  6925. @return an X9ECParameters object or null if the curve is not available.
  6926. </member>
  6927. <member name="M:Org.BouncyCastle.Asn1.X9.ECNamedCurveTable.GetOid(System.String)">
  6928. return the object identifier signified by the passed in name. Null
  6929. if there is no object identifier associated with name.
  6930. @return the object identifier associated with name, if present.
  6931. </member>
  6932. <member name="M:Org.BouncyCastle.Asn1.X9.ECNamedCurveTable.GetByOid(Org.BouncyCastle.Asn1.DerObjectIdentifier)">
  6933. return a X9ECParameters object representing the passed in named
  6934. curve.
  6935. @param oid the object id of the curve requested
  6936. @return an X9ECParameters object or null if the curve is not available.
  6937. </member>
  6938. <member name="P:Org.BouncyCastle.Asn1.X9.ECNamedCurveTable.Names">
  6939. return an enumeration of the names of the available curves.
  6940. @return an enumeration of the names of the available curves.
  6941. </member>
  6942. <member name="T:Org.BouncyCastle.Asn1.X9.KeySpecificInfo">
  6943. ASN.1 def for Diffie-Hellman key exchange KeySpecificInfo structure. See
  6944. RFC 2631, or X9.42, for further details.
  6945. </member>
  6946. <member name="M:Org.BouncyCastle.Asn1.X9.KeySpecificInfo.ToAsn1Object">
  6947. Produce an object suitable for an Asn1OutputStream.
  6948. <pre>
  6949. KeySpecificInfo ::= Sequence {
  6950. algorithm OBJECT IDENTIFIER,
  6951. counter OCTET STRING SIZE (4..4)
  6952. }
  6953. </pre>
  6954. </member>
  6955. <member name="T:Org.BouncyCastle.Asn1.X9.OtherInfo">
  6956. ANS.1 def for Diffie-Hellman key exchange OtherInfo structure. See
  6957. RFC 2631, or X9.42, for further details.
  6958. </member>
  6959. <member name="M:Org.BouncyCastle.Asn1.X9.OtherInfo.ToAsn1Object">
  6960. Produce an object suitable for an Asn1OutputStream.
  6961. <pre>
  6962. OtherInfo ::= Sequence {
  6963. keyInfo KeySpecificInfo,
  6964. partyAInfo [0] OCTET STRING OPTIONAL,
  6965. suppPubInfo [2] OCTET STRING
  6966. }
  6967. </pre>
  6968. </member>
  6969. <member name="T:Org.BouncyCastle.Asn1.X9.X962NamedCurves">
  6970. table of the current named curves defined in X.962 EC-DSA.
  6971. </member>
  6972. <member name="M:Org.BouncyCastle.Asn1.X9.X962NamedCurves.GetByOid(Org.BouncyCastle.Asn1.DerObjectIdentifier)">
  6973. return the X9ECParameters object for the named curve represented by
  6974. the passed in object identifier. Null if the curve isn't present.
  6975. @param oid an object identifier representing a named curve, if present.
  6976. </member>
  6977. <member name="M:Org.BouncyCastle.Asn1.X9.X962NamedCurves.GetOid(System.String)">
  6978. return the object identifier signified by the passed in name. Null
  6979. if there is no object identifier associated with name.
  6980. @return the object identifier associated with name, if present.
  6981. </member>
  6982. <member name="M:Org.BouncyCastle.Asn1.X9.X962NamedCurves.GetName(Org.BouncyCastle.Asn1.DerObjectIdentifier)">
  6983. return the named curve name represented by the given object identifier.
  6984. </member>
  6985. <member name="P:Org.BouncyCastle.Asn1.X9.X962NamedCurves.Names">
  6986. returns an enumeration containing the name strings for curves
  6987. contained in this structure.
  6988. </member>
  6989. <member name="M:Org.BouncyCastle.Asn1.X9.X962Parameters.ToAsn1Object">
  6990. Produce an object suitable for an Asn1OutputStream.
  6991. <pre>
  6992. Parameters ::= CHOICE {
  6993. ecParameters ECParameters,
  6994. namedCurve CURVES.&amp;id({CurveNames}),
  6995. implicitlyCA Null
  6996. }
  6997. </pre>
  6998. </member>
  6999. <member name="T:Org.BouncyCastle.Asn1.X9.X9Curve">
  7000. ASN.1 def for Elliptic-Curve Curve structure. See
  7001. X9.62, for further details.
  7002. </member>
  7003. <member name="M:Org.BouncyCastle.Asn1.X9.X9Curve.ToAsn1Object">
  7004. Produce an object suitable for an Asn1OutputStream.
  7005. <pre>
  7006. Curve ::= Sequence {
  7007. a FieldElement,
  7008. b FieldElement,
  7009. seed BIT STRING OPTIONAL
  7010. }
  7011. </pre>
  7012. </member>
  7013. <member name="T:Org.BouncyCastle.Asn1.X9.X9ECParameters">
  7014. ASN.1 def for Elliptic-Curve ECParameters structure. See
  7015. X9.62, for further details.
  7016. </member>
  7017. <member name="P:Org.BouncyCastle.Asn1.X9.X9ECParameters.CurveEntry">
  7018. Return the ASN.1 entry representing the Curve.
  7019. @return the X9Curve for the curve in these parameters.
  7020. </member>
  7021. <member name="P:Org.BouncyCastle.Asn1.X9.X9ECParameters.FieldIDEntry">
  7022. Return the ASN.1 entry representing the FieldID.
  7023. @return the X9FieldID for the FieldID in these parameters.
  7024. </member>
  7025. <member name="P:Org.BouncyCastle.Asn1.X9.X9ECParameters.BaseEntry">
  7026. Return the ASN.1 entry representing the base point G.
  7027. @return the X9ECPoint for the base point in these parameters.
  7028. </member>
  7029. <member name="M:Org.BouncyCastle.Asn1.X9.X9ECParameters.ToAsn1Object">
  7030. Produce an object suitable for an Asn1OutputStream.
  7031. <pre>
  7032. ECParameters ::= Sequence {
  7033. version Integer { ecpVer1(1) } (ecpVer1),
  7034. fieldID FieldID {{FieldTypes}},
  7035. curve X9Curve,
  7036. base X9ECPoint,
  7037. order Integer,
  7038. cofactor Integer OPTIONAL
  7039. }
  7040. </pre>
  7041. </member>
  7042. <member name="T:Org.BouncyCastle.Asn1.X9.X9ECPoint">
  7043. class for describing an ECPoint as a Der object.
  7044. </member>
  7045. <member name="M:Org.BouncyCastle.Asn1.X9.X9ECPoint.ToAsn1Object">
  7046. Produce an object suitable for an Asn1OutputStream.
  7047. <pre>
  7048. ECPoint ::= OCTET STRING
  7049. </pre>
  7050. <p>
  7051. Octet string produced using ECPoint.GetEncoded().</p>
  7052. </member>
  7053. <member name="T:Org.BouncyCastle.Asn1.X9.X9FieldElement">
  7054. Class for processing an ECFieldElement as a DER object.
  7055. </member>
  7056. <member name="M:Org.BouncyCastle.Asn1.X9.X9FieldElement.ToAsn1Object">
  7057. Produce an object suitable for an Asn1OutputStream.
  7058. <pre>
  7059. FieldElement ::= OCTET STRING
  7060. </pre>
  7061. <p>
  7062. <ol>
  7063. <li> if <i>q</i> is an odd prime then the field element is
  7064. processed as an Integer and converted to an octet string
  7065. according to x 9.62 4.3.1.</li>
  7066. <li> if <i>q</i> is 2<sup>m</sup> then the bit string
  7067. contained in the field element is converted into an octet
  7068. string with the same ordering padded at the front if necessary.
  7069. </li>
  7070. </ol>
  7071. </p>
  7072. </member>
  7073. <member name="T:Org.BouncyCastle.Asn1.X9.X9FieldID">
  7074. ASN.1 def for Elliptic-Curve Field ID structure. See
  7075. X9.62, for further details.
  7076. </member>
  7077. <member name="M:Org.BouncyCastle.Asn1.X9.X9FieldID.#ctor(Org.BouncyCastle.Math.BigInteger)">
  7078. Constructor for elliptic curves over prime fields
  7079. <code>F<sub>2</sub></code>.
  7080. @param primeP The prime <code>p</code> defining the prime field.
  7081. </member>
  7082. <member name="M:Org.BouncyCastle.Asn1.X9.X9FieldID.#ctor(System.Int32,System.Int32)">
  7083. Constructor for elliptic curves over binary fields
  7084. <code>F<sub>2<sup>m</sup></sub></code>.
  7085. @param m The exponent <code>m</code> of
  7086. <code>F<sub>2<sup>m</sup></sub></code>.
  7087. @param k1 The integer <code>k1</code> where <code>x<sup>m</sup> +
  7088. x<sup>k1</sup> + 1</code>
  7089. represents the reduction polynomial <code>f(z)</code>.
  7090. </member>
  7091. <member name="M:Org.BouncyCastle.Asn1.X9.X9FieldID.#ctor(System.Int32,System.Int32,System.Int32,System.Int32)">
  7092. Constructor for elliptic curves over binary fields
  7093. <code>F<sub>2<sup>m</sup></sub></code>.
  7094. @param m The exponent <code>m</code> of
  7095. <code>F<sub>2<sup>m</sup></sub></code>.
  7096. @param k1 The integer <code>k1</code> where <code>x<sup>m</sup> +
  7097. x<sup>k3</sup> + x<sup>k2</sup> + x<sup>k1</sup> + 1</code>
  7098. represents the reduction polynomial <code>f(z)</code>.
  7099. @param k2 The integer <code>k2</code> where <code>x<sup>m</sup> +
  7100. x<sup>k3</sup> + x<sup>k2</sup> + x<sup>k1</sup> + 1</code>
  7101. represents the reduction polynomial <code>f(z)</code>.
  7102. @param k3 The integer <code>k3</code> where <code>x<sup>m</sup> +
  7103. x<sup>k3</sup> + x<sup>k2</sup> + x<sup>k1</sup> + 1</code>
  7104. represents the reduction polynomial <code>f(z)</code>..
  7105. </member>
  7106. <member name="M:Org.BouncyCastle.Asn1.X9.X9FieldID.ToAsn1Object">
  7107. Produce a Der encoding of the following structure.
  7108. <pre>
  7109. FieldID ::= Sequence {
  7110. fieldType FIELD-ID.&amp;id({IOSet}),
  7111. parameters FIELD-ID.&amp;Type({IOSet}{&#64;fieldType})
  7112. }
  7113. </pre>
  7114. </member>
  7115. <member name="F:Org.BouncyCastle.Asn1.X9.X9ObjectIdentifiers.IdDsaWithSha1">
  7116. id-dsa-with-sha1 OBJECT IDENTIFIER ::= { iso(1) member-body(2)
  7117. us(840) x9-57 (10040) x9cm(4) 3 }
  7118. </member>
  7119. <member name="F:Org.BouncyCastle.Asn1.X9.X9ObjectIdentifiers.X9x63Scheme">
  7120. X9.63
  7121. </member>
  7122. <member name="F:Org.BouncyCastle.Asn1.X9.X9ObjectIdentifiers.ansi_x9_42">
  7123. X9.42
  7124. </member>
  7125. <member name="T:Org.BouncyCastle.Bcpg.ArmoredInputStream">
  7126. reader for Base64 armored objects - read the headers and then start returning
  7127. bytes when the data is reached. An IOException is thrown if the CRC check
  7128. is detected and fails.
  7129. <p>
  7130. By default a missing CRC will not cause an exception. To force CRC detection use:
  7131. <pre>
  7132. ArmoredInputStream aIn = ...
  7133. aIn.setDetectMissingCRC(true);
  7134. </pre>
  7135. </p>
  7136. </member>
  7137. <member name="M:Org.BouncyCastle.Bcpg.ArmoredInputStream.Decode(System.Int32,System.Int32,System.Int32,System.Int32,System.Int32[])">
  7138. decode the base 64 encoded input data.
  7139. @return the offset the data starts in out.
  7140. </member>
  7141. <member name="M:Org.BouncyCastle.Bcpg.ArmoredInputStream.#ctor(System.IO.Stream)">
  7142. Create a stream for reading a PGP armoured message, parsing up to a header
  7143. and then reading the data that follows.
  7144. @param input
  7145. </member>
  7146. <member name="M:Org.BouncyCastle.Bcpg.ArmoredInputStream.#ctor(System.IO.Stream,System.Boolean)">
  7147. Create an armoured input stream which will assume the data starts
  7148. straight away, or parse for headers first depending on the value of
  7149. hasHeaders.
  7150. @param input
  7151. @param hasHeaders true if headers are to be looked for, false otherwise.
  7152. </member>
  7153. <member name="M:Org.BouncyCastle.Bcpg.ArmoredInputStream.IsClearText">
  7154. @return true if we are inside the clear text section of a PGP
  7155. signed message.
  7156. </member>
  7157. <member name="M:Org.BouncyCastle.Bcpg.ArmoredInputStream.IsEndOfStream">
  7158. @return true if the stream is actually at end of file.
  7159. </member>
  7160. <member name="M:Org.BouncyCastle.Bcpg.ArmoredInputStream.GetArmorHeaderLine">
  7161. Return the armor header line (if there is one)
  7162. @return the armor header line, null if none present.
  7163. </member>
  7164. <member name="M:Org.BouncyCastle.Bcpg.ArmoredInputStream.GetArmorHeaders">
  7165. Return the armor headers (the lines after the armor header line),
  7166. @return an array of armor headers, null if there aren't any.
  7167. </member>
  7168. <member name="M:Org.BouncyCastle.Bcpg.ArmoredInputStream.Read(System.Byte[],System.Int32,System.Int32)">
  7169. Reads up to <code>len</code> bytes of data from the input stream into
  7170. an array of bytes. An attempt is made to read as many as
  7171. <code>len</code> bytes, but a smaller number may be read.
  7172. The number of bytes actually read is returned as an integer.
  7173. The first byte read is stored into element <code>b[off]</code>, the
  7174. next one into <code>b[off+1]</code>, and so on. The number of bytes read
  7175. is, at most, equal to <code>len</code>.
  7176. NOTE: We need to override the custom behavior of Java's {@link InputStream#read(byte[], int, int)},
  7177. as the upstream method silently swallows {@link IOException IOExceptions}.
  7178. This would cause CRC checksum errors to go unnoticed.
  7179. @see <a href="https://github.com/bcgit/bc-java/issues/998">Related BC bug report</a>
  7180. @param b byte array
  7181. @param off offset at which we start writing data to the array
  7182. @param len number of bytes we write into the array
  7183. @return total number of bytes read into the buffer
  7184. @throws IOException if an exception happens AT ANY POINT
  7185. </member>
  7186. <member name="M:Org.BouncyCastle.Bcpg.ArmoredInputStream.SetDetectMissingCrc(System.Boolean)">
  7187. Change how the stream should react if it encounters missing CRC checksum.
  7188. The default value is false (ignore missing CRC checksums). If the behavior is set to true,
  7189. an {@link IOException} will be thrown if a missing CRC checksum is encountered.
  7190. @param detectMissing ignore missing CRC sums
  7191. </member>
  7192. <member name="T:Org.BouncyCastle.Bcpg.ArmoredOutputStream">
  7193. Basic output stream.
  7194. </member>
  7195. <member name="M:Org.BouncyCastle.Bcpg.ArmoredOutputStream.Encode(System.IO.Stream,System.Int32[],System.Int32)">
  7196. encode the input data producing a base 64 encoded byte array.
  7197. </member>
  7198. <member name="M:Org.BouncyCastle.Bcpg.ArmoredOutputStream.SetHeader(System.String,System.String)">
  7199. Set an additional header entry. Any current value(s) under the same name will be
  7200. replaced by the new one. A null value will clear the entry for name. *
  7201. @param name the name of the header entry.
  7202. @param v the value of the header entry.
  7203. </member>
  7204. <member name="M:Org.BouncyCastle.Bcpg.ArmoredOutputStream.AddHeader(System.String,System.String)">
  7205. Set an additional header entry. The current value(s) will continue to exist together
  7206. with the new one. Adding a null value has no effect.
  7207. @param name the name of the header entry.
  7208. @param value the value of the header entry.
  7209. </member>
  7210. <member name="M:Org.BouncyCastle.Bcpg.ArmoredOutputStream.ResetHeaders">
  7211. Reset the headers to only contain a Version string (if one is present).
  7212. </member>
  7213. <member name="M:Org.BouncyCastle.Bcpg.ArmoredOutputStream.BeginClearText(Org.BouncyCastle.Bcpg.HashAlgorithmTag)">
  7214. Start a clear text signed message.
  7215. @param hashAlgorithm
  7216. </member>
  7217. <member name="M:Org.BouncyCastle.Bcpg.ArmoredOutputStream.Close">
  7218. <b>Note</b>: Close() does not close the underlying stream. So it is possible to write
  7219. multiple objects using armoring to a single stream.
  7220. </member>
  7221. <member name="T:Org.BouncyCastle.Bcpg.Attr.ImageAttrib">
  7222. <remarks>Basic type for a image attribute packet.</remarks>
  7223. </member>
  7224. <member name="T:Org.BouncyCastle.Bcpg.BcpgInputStream">
  7225. <remarks>Reader for PGP objects.</remarks>
  7226. </member>
  7227. <member name="M:Org.BouncyCastle.Bcpg.BcpgInputStream.NextPacketTag">
  7228. <summary>Returns the next packet tag in the stream.</summary>
  7229. </member>
  7230. <member name="T:Org.BouncyCastle.Bcpg.BcpgInputStream.PartialInputStream">
  7231. <summary>
  7232. A stream that overlays our input stream, allowing the user to only read a segment of it.
  7233. NB: dataLength will be negative if the segment length is in the upper range above 2**31.
  7234. </summary>
  7235. </member>
  7236. <member name="T:Org.BouncyCastle.Bcpg.BcpgObject">
  7237. <remarks>Base class for a PGP object.</remarks>
  7238. </member>
  7239. <member name="T:Org.BouncyCastle.Bcpg.BcpgOutputStream">
  7240. <remarks>Basic output stream.</remarks>
  7241. </member>
  7242. <member name="M:Org.BouncyCastle.Bcpg.BcpgOutputStream.#ctor(System.IO.Stream)">
  7243. <summary>Create a stream representing a general packet.</summary>
  7244. <param name="outStr">Output stream to write to.</param>
  7245. </member>
  7246. <member name="M:Org.BouncyCastle.Bcpg.BcpgOutputStream.#ctor(System.IO.Stream,Org.BouncyCastle.Bcpg.PacketTag)">
  7247. <summary>Create a stream representing an old style partial object.</summary>
  7248. <param name="outStr">Output stream to write to.</param>
  7249. <param name="tag">The packet tag for the object.</param>
  7250. </member>
  7251. <member name="M:Org.BouncyCastle.Bcpg.BcpgOutputStream.#ctor(System.IO.Stream,Org.BouncyCastle.Bcpg.PacketTag,System.Int64,System.Boolean)">
  7252. <summary>Create a stream representing a general packet.</summary>
  7253. <param name="outStr">Output stream to write to.</param>
  7254. <param name="tag">Packet tag.</param>
  7255. <param name="length">Size of chunks making up the packet.</param>
  7256. <param name="oldFormat">If true, the header is written out in old format.</param>
  7257. </member>
  7258. <member name="M:Org.BouncyCastle.Bcpg.BcpgOutputStream.#ctor(System.IO.Stream,Org.BouncyCastle.Bcpg.PacketTag,System.Int64)">
  7259. <summary>Create a new style partial input stream buffered into chunks.</summary>
  7260. <param name="outStr">Output stream to write to.</param>
  7261. <param name="tag">Packet tag.</param>
  7262. <param name="length">Size of chunks making up the packet.</param>
  7263. </member>
  7264. <member name="M:Org.BouncyCastle.Bcpg.BcpgOutputStream.#ctor(System.IO.Stream,Org.BouncyCastle.Bcpg.PacketTag,System.Byte[])">
  7265. <summary>Create a new style partial input stream buffered into chunks.</summary>
  7266. <param name="outStr">Output stream to write to.</param>
  7267. <param name="tag">Packet tag.</param>
  7268. <param name="buffer">Buffer to use for collecting chunks.</param>
  7269. </member>
  7270. <member name="M:Org.BouncyCastle.Bcpg.BcpgOutputStream.Flush">
  7271. <summary>Flush the underlying stream.</summary>
  7272. </member>
  7273. <member name="M:Org.BouncyCastle.Bcpg.BcpgOutputStream.Finish">
  7274. <summary>Finish writing out the current packet without closing the underlying stream.</summary>
  7275. </member>
  7276. <member name="T:Org.BouncyCastle.Bcpg.CompressedDataPacket">
  7277. <remarks>Generic compressed data object.</remarks>
  7278. </member>
  7279. <member name="P:Org.BouncyCastle.Bcpg.CompressedDataPacket.Algorithm">
  7280. <summary>The algorithm tag value.</summary>
  7281. </member>
  7282. <member name="T:Org.BouncyCastle.Bcpg.CompressionAlgorithmTag">
  7283. <remarks>Basic tags for compression algorithms.</remarks>
  7284. </member>
  7285. <member name="T:Org.BouncyCastle.Bcpg.ContainedPacket">
  7286. <remarks>Basic type for a PGP packet.</remarks>
  7287. </member>
  7288. <member name="T:Org.BouncyCastle.Bcpg.DsaPublicBcpgKey">
  7289. <remarks>Base class for a DSA public key.</remarks>
  7290. </member>
  7291. <member name="M:Org.BouncyCastle.Bcpg.DsaPublicBcpgKey.#ctor(Org.BouncyCastle.Bcpg.BcpgInputStream)">
  7292. <param name="bcpgIn">The stream to read the packet from.</param>
  7293. </member>
  7294. <member name="P:Org.BouncyCastle.Bcpg.DsaPublicBcpgKey.Format">
  7295. <summary>The format, as a string, always "PGP".</summary>
  7296. </member>
  7297. <member name="M:Org.BouncyCastle.Bcpg.DsaPublicBcpgKey.GetEncoded">
  7298. <summary>Return the standard PGP encoding of the key.</summary>
  7299. </member>
  7300. <member name="T:Org.BouncyCastle.Bcpg.DsaSecretBcpgKey">
  7301. <remarks>Base class for a DSA secret key.</remarks>
  7302. </member>
  7303. <member name="M:Org.BouncyCastle.Bcpg.DsaSecretBcpgKey.#ctor(Org.BouncyCastle.Bcpg.BcpgInputStream)">
  7304. @param in
  7305. </member>
  7306. <member name="P:Org.BouncyCastle.Bcpg.DsaSecretBcpgKey.Format">
  7307. <summary>The format, as a string, always "PGP".</summary>
  7308. </member>
  7309. <member name="M:Org.BouncyCastle.Bcpg.DsaSecretBcpgKey.GetEncoded">
  7310. <summary>Return the standard PGP encoding of the key.</summary>
  7311. </member>
  7312. <member name="P:Org.BouncyCastle.Bcpg.DsaSecretBcpgKey.X">
  7313. @return x
  7314. </member>
  7315. <member name="T:Org.BouncyCastle.Bcpg.ECDHPublicBcpgKey">
  7316. <remarks>Base class for an ECDH Public Key.</remarks>
  7317. </member>
  7318. <member name="M:Org.BouncyCastle.Bcpg.ECDHPublicBcpgKey.#ctor(Org.BouncyCastle.Bcpg.BcpgInputStream)">
  7319. <param name="bcpgIn">The stream to read the packet from.</param>
  7320. </member>
  7321. <member name="T:Org.BouncyCastle.Bcpg.ECDsaPublicBcpgKey">
  7322. <remarks>Base class for an ECDSA Public Key.</remarks>
  7323. </member>
  7324. <member name="M:Org.BouncyCastle.Bcpg.ECDsaPublicBcpgKey.#ctor(Org.BouncyCastle.Bcpg.BcpgInputStream)">
  7325. <param name="bcpgIn">The stream to read the packet from.</param>
  7326. </member>
  7327. <member name="T:Org.BouncyCastle.Bcpg.ECPublicBcpgKey">
  7328. <remarks>Base class for an EC Public Key.</remarks>
  7329. </member>
  7330. <member name="M:Org.BouncyCastle.Bcpg.ECPublicBcpgKey.#ctor(Org.BouncyCastle.Bcpg.BcpgInputStream)">
  7331. <param name="bcpgIn">The stream to read the packet from.</param>
  7332. </member>
  7333. <member name="P:Org.BouncyCastle.Bcpg.ECPublicBcpgKey.Format">
  7334. <summary>The format, as a string, always "PGP".</summary>
  7335. </member>
  7336. <member name="M:Org.BouncyCastle.Bcpg.ECPublicBcpgKey.GetEncoded">
  7337. <summary>Return the standard PGP encoding of the key.</summary>
  7338. </member>
  7339. <member name="T:Org.BouncyCastle.Bcpg.ECSecretBcpgKey">
  7340. <remarks>Base class for an EC Secret Key.</remarks>
  7341. </member>
  7342. <member name="P:Org.BouncyCastle.Bcpg.ECSecretBcpgKey.Format">
  7343. <summary>The format, as a string, always "PGP".</summary>
  7344. </member>
  7345. <member name="M:Org.BouncyCastle.Bcpg.ECSecretBcpgKey.GetEncoded">
  7346. <summary>Return the standard PGP encoding of the key.</summary>
  7347. </member>
  7348. <member name="T:Org.BouncyCastle.Bcpg.ElGamalPublicBcpgKey">
  7349. <remarks>Base class for an ElGamal public key.</remarks>
  7350. </member>
  7351. <member name="P:Org.BouncyCastle.Bcpg.ElGamalPublicBcpgKey.Format">
  7352. <summary>The format, as a string, always "PGP".</summary>
  7353. </member>
  7354. <member name="M:Org.BouncyCastle.Bcpg.ElGamalPublicBcpgKey.GetEncoded">
  7355. <summary>Return the standard PGP encoding of the key.</summary>
  7356. </member>
  7357. <member name="T:Org.BouncyCastle.Bcpg.ElGamalSecretBcpgKey">
  7358. <remarks>Base class for an ElGamal secret key.</remarks>
  7359. </member>
  7360. <member name="M:Org.BouncyCastle.Bcpg.ElGamalSecretBcpgKey.#ctor(Org.BouncyCastle.Bcpg.BcpgInputStream)">
  7361. @param in
  7362. </member>
  7363. <member name="M:Org.BouncyCastle.Bcpg.ElGamalSecretBcpgKey.#ctor(Org.BouncyCastle.Math.BigInteger)">
  7364. @param x
  7365. </member>
  7366. <member name="P:Org.BouncyCastle.Bcpg.ElGamalSecretBcpgKey.Format">
  7367. <summary>The format, as a string, always "PGP".</summary>
  7368. </member>
  7369. <member name="M:Org.BouncyCastle.Bcpg.ElGamalSecretBcpgKey.GetEncoded">
  7370. <summary>Return the standard PGP encoding of the key.</summary>
  7371. </member>
  7372. <member name="T:Org.BouncyCastle.Bcpg.ExperimentalPacket">
  7373. <remarks>Basic packet for an experimental packet.</remarks>
  7374. </member>
  7375. <member name="T:Org.BouncyCastle.Bcpg.HashAlgorithmTag">
  7376. <remarks>Basic tags for hash algorithms.</remarks>
  7377. </member>
  7378. <member name="T:Org.BouncyCastle.Bcpg.IBcpgKey">
  7379. <remarks>Base interface for a PGP key.</remarks>
  7380. </member>
  7381. <member name="P:Org.BouncyCastle.Bcpg.IBcpgKey.Format">
  7382. <summary>
  7383. The base format for this key - in the case of the symmetric keys it will generally
  7384. be raw indicating that the key is just a straight byte representation, for an asymmetric
  7385. key the format will be PGP, indicating the key is a string of MPIs encoded in PGP format.
  7386. </summary>
  7387. <returns>"RAW" or "PGP".</returns>
  7388. </member>
  7389. <member name="M:Org.BouncyCastle.Bcpg.InputStreamPacket.GetInputStream">
  7390. <summary>Note: you can only read from this once...</summary>
  7391. </member>
  7392. <member name="T:Org.BouncyCastle.Bcpg.LiteralDataPacket">
  7393. <remarks>Generic literal data packet.</remarks>
  7394. </member>
  7395. <member name="P:Org.BouncyCastle.Bcpg.LiteralDataPacket.Format">
  7396. <summary>The format tag value.</summary>
  7397. </member>
  7398. <member name="P:Org.BouncyCastle.Bcpg.LiteralDataPacket.ModificationTime">
  7399. <summary>The modification time of the file in milli-seconds (since Jan 1, 1970 UTC)</summary>
  7400. </member>
  7401. <member name="T:Org.BouncyCastle.Bcpg.MarkerPacket">
  7402. <remarks>Basic type for a marker packet.</remarks>
  7403. </member>
  7404. <member name="T:Org.BouncyCastle.Bcpg.ModDetectionCodePacket">
  7405. <remarks>Basic packet for a modification detection code packet.</remarks>
  7406. </member>
  7407. <member name="T:Org.BouncyCastle.Bcpg.MPInteger">
  7408. <remarks>A multiple precision integer</remarks>
  7409. </member>
  7410. <member name="T:Org.BouncyCastle.Bcpg.OnePassSignaturePacket">
  7411. <remarks>Generic signature object</remarks>
  7412. </member>
  7413. <member name="P:Org.BouncyCastle.Bcpg.OnePassSignaturePacket.KeyAlgorithm">
  7414. <summary>The encryption algorithm tag.</summary>
  7415. </member>
  7416. <member name="P:Org.BouncyCastle.Bcpg.OnePassSignaturePacket.HashAlgorithm">
  7417. <summary>The hash algorithm tag.</summary>
  7418. </member>
  7419. <member name="T:Org.BouncyCastle.Bcpg.PacketTag">
  7420. <remarks>Basic PGP packet tag types.</remarks>
  7421. </member>
  7422. <member name="T:Org.BouncyCastle.Bcpg.PublicKeyAlgorithmTag">
  7423. <remarks>Public Key Algorithm tag numbers.</remarks>
  7424. </member>
  7425. <member name="T:Org.BouncyCastle.Bcpg.PublicKeyEncSessionPacket">
  7426. <remarks>Basic packet for a PGP public key.</remarks>
  7427. </member>
  7428. <member name="T:Org.BouncyCastle.Bcpg.PublicKeyPacket">
  7429. <remarks>Basic packet for a PGP public key.</remarks>
  7430. </member>
  7431. <member name="M:Org.BouncyCastle.Bcpg.PublicKeyPacket.#ctor(Org.BouncyCastle.Bcpg.PublicKeyAlgorithmTag,System.DateTime,Org.BouncyCastle.Bcpg.IBcpgKey)">
  7432. <summary>Construct a version 4 public key packet.</summary>
  7433. </member>
  7434. <member name="T:Org.BouncyCastle.Bcpg.PublicSubkeyPacket">
  7435. <remarks>Basic packet for a PGP public subkey</remarks>
  7436. </member>
  7437. <member name="M:Org.BouncyCastle.Bcpg.PublicSubkeyPacket.#ctor(Org.BouncyCastle.Bcpg.PublicKeyAlgorithmTag,System.DateTime,Org.BouncyCastle.Bcpg.IBcpgKey)">
  7438. <summary>Construct a version 4 public subkey packet.</summary>
  7439. </member>
  7440. <member name="T:Org.BouncyCastle.Bcpg.RsaPublicBcpgKey">
  7441. <remarks>Base class for an RSA public key.</remarks>
  7442. </member>
  7443. <member name="M:Org.BouncyCastle.Bcpg.RsaPublicBcpgKey.#ctor(Org.BouncyCastle.Bcpg.BcpgInputStream)">
  7444. <summary>Construct an RSA public key from the passed in stream.</summary>
  7445. </member>
  7446. <member name="M:Org.BouncyCastle.Bcpg.RsaPublicBcpgKey.#ctor(Org.BouncyCastle.Math.BigInteger,Org.BouncyCastle.Math.BigInteger)">
  7447. <param name="n">The modulus.</param>
  7448. <param name="e">The public exponent.</param>
  7449. </member>
  7450. <member name="P:Org.BouncyCastle.Bcpg.RsaPublicBcpgKey.Format">
  7451. <summary>The format, as a string, always "PGP".</summary>
  7452. </member>
  7453. <member name="M:Org.BouncyCastle.Bcpg.RsaPublicBcpgKey.GetEncoded">
  7454. <summary>Return the standard PGP encoding of the key.</summary>
  7455. </member>
  7456. <member name="T:Org.BouncyCastle.Bcpg.RsaSecretBcpgKey">
  7457. <remarks>Base class for an RSA secret (or priate) key.</remarks>
  7458. </member>
  7459. <member name="P:Org.BouncyCastle.Bcpg.RsaSecretBcpgKey.Format">
  7460. <summary>The format, as a string, always "PGP".</summary>
  7461. </member>
  7462. <member name="M:Org.BouncyCastle.Bcpg.RsaSecretBcpgKey.GetEncoded">
  7463. <summary>Return the standard PGP encoding of the key.</summary>
  7464. </member>
  7465. <member name="T:Org.BouncyCastle.Bcpg.S2k">
  7466. <remarks>The string to key specifier class.</remarks>
  7467. </member>
  7468. <member name="P:Org.BouncyCastle.Bcpg.S2k.HashAlgorithm">
  7469. <summary>The hash algorithm.</summary>
  7470. </member>
  7471. <member name="M:Org.BouncyCastle.Bcpg.S2k.GetIV">
  7472. <summary>The IV for the key generation algorithm.</summary>
  7473. </member>
  7474. <member name="P:Org.BouncyCastle.Bcpg.S2k.IterationCount">
  7475. <summary>The iteration count</summary>
  7476. </member>
  7477. <member name="P:Org.BouncyCastle.Bcpg.S2k.ProtectionMode">
  7478. <summary>The protection mode - only if GnuDummyS2K</summary>
  7479. </member>
  7480. <member name="T:Org.BouncyCastle.Bcpg.SecretKeyPacket">
  7481. <remarks>Basic packet for a PGP secret key.</remarks>
  7482. </member>
  7483. <member name="T:Org.BouncyCastle.Bcpg.SecretSubkeyPacket">
  7484. <remarks>Basic packet for a PGP secret key.</remarks>
  7485. </member>
  7486. <member name="T:Org.BouncyCastle.Bcpg.SignaturePacket">
  7487. <remarks>Generic signature packet.</remarks>
  7488. </member>
  7489. <member name="M:Org.BouncyCastle.Bcpg.SignaturePacket.#ctor(System.Int32,System.Int64,Org.BouncyCastle.Bcpg.PublicKeyAlgorithmTag,Org.BouncyCastle.Bcpg.HashAlgorithmTag,Org.BouncyCastle.Bcpg.SignatureSubpacket[],Org.BouncyCastle.Bcpg.SignatureSubpacket[],System.Byte[],Org.BouncyCastle.Bcpg.MPInteger[])">
  7490. Generate a version 4 signature packet.
  7491. @param signatureType
  7492. @param keyAlgorithm
  7493. @param hashAlgorithm
  7494. @param hashedData
  7495. @param unhashedData
  7496. @param fingerprint
  7497. @param signature
  7498. </member>
  7499. <member name="M:Org.BouncyCastle.Bcpg.SignaturePacket.#ctor(System.Int32,System.Int32,System.Int64,Org.BouncyCastle.Bcpg.PublicKeyAlgorithmTag,Org.BouncyCastle.Bcpg.HashAlgorithmTag,System.Int64,System.Byte[],Org.BouncyCastle.Bcpg.MPInteger[])">
  7500. Generate a version 2/3 signature packet.
  7501. @param signatureType
  7502. @param keyAlgorithm
  7503. @param hashAlgorithm
  7504. @param fingerprint
  7505. @param signature
  7506. </member>
  7507. <member name="P:Org.BouncyCastle.Bcpg.SignaturePacket.KeyId">
  7508. return the keyId
  7509. @return the keyId that created the signature.
  7510. </member>
  7511. <member name="M:Org.BouncyCastle.Bcpg.SignaturePacket.GetSignatureTrailer">
  7512. return the signature trailer that must be included with the data
  7513. to reconstruct the signature
  7514. @return byte[]
  7515. </member>
  7516. <member name="M:Org.BouncyCastle.Bcpg.SignaturePacket.GetSignature">
  7517. * return the signature as a set of integers - note this is normalised to be the
  7518. * ASN.1 encoding of what appears in the signature packet.
  7519. </member>
  7520. <member name="M:Org.BouncyCastle.Bcpg.SignaturePacket.GetSignatureBytes">
  7521. Return the byte encoding of the signature section.
  7522. @return uninterpreted signature bytes.
  7523. </member>
  7524. <member name="P:Org.BouncyCastle.Bcpg.SignaturePacket.CreationTime">
  7525. <summary>Return the creation time in milliseconds since 1 Jan., 1970 UTC.</summary>
  7526. </member>
  7527. <member name="T:Org.BouncyCastle.Bcpg.SignatureSubpacket">
  7528. <remarks>Basic type for a PGP Signature sub-packet.</remarks>
  7529. </member>
  7530. <member name="M:Org.BouncyCastle.Bcpg.SignatureSubpacket.GetData">
  7531. <summary>Return the generic data making up the packet.</summary>
  7532. </member>
  7533. <member name="T:Org.BouncyCastle.Bcpg.SignatureSubpacketsParser">
  7534. reader for signature sub-packets
  7535. </member>
  7536. <member name="T:Org.BouncyCastle.Bcpg.SignatureSubpacketTag">
  7537. Basic PGP signature sub-packet tag types.
  7538. </member>
  7539. <member name="T:Org.BouncyCastle.Bcpg.Sig.EmbeddedSignature">
  7540. Packet embedded signature
  7541. </member>
  7542. <member name="T:Org.BouncyCastle.Bcpg.Sig.Exportable">
  7543. packet giving signature creation time.
  7544. </member>
  7545. <member name="T:Org.BouncyCastle.Bcpg.Sig.Features">
  7546. packet giving signature expiration time.
  7547. </member>
  7548. <member name="F:Org.BouncyCastle.Bcpg.Sig.Features.FEATURE_MODIFICATION_DETECTION">
  7549. Identifier for the Modification Detection (packets 18 and 19)
  7550. </member>
  7551. <member name="F:Org.BouncyCastle.Bcpg.Sig.Features.FEATURE_AEAD_ENCRYPTED_DATA">
  7552. Identifier for the AEAD Encrypted Data Packet (packet 20) and version 5
  7553. Symmetric-Key Encrypted Session Key Packets (packet 3)
  7554. </member>
  7555. <member name="F:Org.BouncyCastle.Bcpg.Sig.Features.FEATURE_VERSION_5_PUBLIC_KEY">
  7556. Identifier for the Version 5 Public-Key Packet format and corresponding new
  7557. fingerprint format
  7558. </member>
  7559. <member name="P:Org.BouncyCastle.Bcpg.Sig.Features.SupportsModificationDetection">
  7560. Returns if modification detection is supported.
  7561. </member>
  7562. <member name="M:Org.BouncyCastle.Bcpg.Sig.Features.SupportsFeature(System.Byte)">
  7563. Returns if a particular feature is supported.
  7564. </member>
  7565. <member name="T:Org.BouncyCastle.Bcpg.Sig.IssuerKeyId">
  7566. packet giving signature creation time.
  7567. </member>
  7568. <member name="T:Org.BouncyCastle.Bcpg.Sig.KeyExpirationTime">
  7569. packet giving time after creation at which the key expires.
  7570. </member>
  7571. <member name="P:Org.BouncyCastle.Bcpg.Sig.KeyExpirationTime.Time">
  7572. Return the number of seconds after creation time a key is valid for.
  7573. @return second count for key validity.
  7574. </member>
  7575. <member name="T:Org.BouncyCastle.Bcpg.Sig.KeyFlags">
  7576. Packet holding the key flag values.
  7577. </member>
  7578. <member name="P:Org.BouncyCastle.Bcpg.Sig.KeyFlags.Flags">
  7579. <summary>
  7580. Return the flag values contained in the first 4 octets (note: at the moment
  7581. the standard only uses the first one).
  7582. </summary>
  7583. </member>
  7584. <member name="T:Org.BouncyCastle.Bcpg.Sig.NotationData">
  7585. Class provided a NotationData object according to
  7586. RFC2440, Chapter 5.2.3.15. Notation Data
  7587. </member>
  7588. <member name="T:Org.BouncyCastle.Bcpg.Sig.PreferredAlgorithms">
  7589. packet giving signature creation time.
  7590. </member>
  7591. <member name="T:Org.BouncyCastle.Bcpg.Sig.PrimaryUserId">
  7592. packet giving whether or not the signature is signed using the primary user ID for the key.
  7593. </member>
  7594. <member name="T:Org.BouncyCastle.Bcpg.Sig.Revocable">
  7595. packet giving whether or not is revocable.
  7596. </member>
  7597. <member name="T:Org.BouncyCastle.Bcpg.Sig.SignatureCreationTime">
  7598. packet giving signature creation time.
  7599. </member>
  7600. <member name="T:Org.BouncyCastle.Bcpg.Sig.SignatureExpirationTime">
  7601. packet giving signature expiration time.
  7602. </member>
  7603. <member name="P:Org.BouncyCastle.Bcpg.Sig.SignatureExpirationTime.Time">
  7604. return time in seconds before signature expires after creation time.
  7605. </member>
  7606. <member name="T:Org.BouncyCastle.Bcpg.Sig.SignerUserId">
  7607. packet giving the User ID of the signer.
  7608. </member>
  7609. <member name="T:Org.BouncyCastle.Bcpg.Sig.TrustSignature">
  7610. packet giving trust.
  7611. </member>
  7612. <member name="T:Org.BouncyCastle.Bcpg.RevocationKey">
  7613. <summary>
  7614. Represents revocation key OpenPGP signature sub packet.
  7615. </summary>
  7616. </member>
  7617. <member name="T:Org.BouncyCastle.Bcpg.RevocationReason">
  7618. <summary>
  7619. Represents revocation reason OpenPGP signature sub packet.
  7620. </summary>
  7621. </member>
  7622. <member name="T:Org.BouncyCastle.Bcpg.SymmetricEncDataPacket">
  7623. <remarks>Basic type for a symmetric key encrypted packet.</remarks>
  7624. </member>
  7625. <member name="T:Org.BouncyCastle.Bcpg.SymmetricKeyAlgorithmTag">
  7626. Basic tags for symmetric key algorithms
  7627. </member>
  7628. <member name="T:Org.BouncyCastle.Bcpg.SymmetricKeyEncSessionPacket">
  7629. Basic type for a symmetric encrypted session key packet
  7630. </member>
  7631. <member name="P:Org.BouncyCastle.Bcpg.SymmetricKeyEncSessionPacket.EncAlgorithm">
  7632. @return int
  7633. </member>
  7634. <member name="P:Org.BouncyCastle.Bcpg.SymmetricKeyEncSessionPacket.S2k">
  7635. @return S2k
  7636. </member>
  7637. <member name="M:Org.BouncyCastle.Bcpg.SymmetricKeyEncSessionPacket.GetSecKeyData">
  7638. @return byte[]
  7639. </member>
  7640. <member name="P:Org.BouncyCastle.Bcpg.SymmetricKeyEncSessionPacket.Version">
  7641. @return int
  7642. </member>
  7643. <member name="T:Org.BouncyCastle.Bcpg.TrustPacket">
  7644. <summary>Basic type for a trust packet.</summary>
  7645. </member>
  7646. <member name="T:Org.BouncyCastle.Bcpg.UserAttributePacket">
  7647. Basic type for a user attribute packet.
  7648. </member>
  7649. <member name="T:Org.BouncyCastle.Bcpg.UserAttributeSubpacket">
  7650. Basic type for a user attribute sub-packet.
  7651. </member>
  7652. <member name="M:Org.BouncyCastle.Bcpg.UserAttributeSubpacket.GetData">
  7653. return the generic data making up the packet.
  7654. </member>
  7655. <member name="T:Org.BouncyCastle.Bcpg.UserAttributeSubpacketsParser">
  7656. reader for user attribute sub-packets
  7657. </member>
  7658. <member name="T:Org.BouncyCastle.Bcpg.UserAttributeSubpacketTag">
  7659. Basic PGP user attribute sub-packet tag types.
  7660. </member>
  7661. <member name="T:Org.BouncyCastle.Bcpg.UserIdPacket">
  7662. Basic type for a user ID packet.
  7663. </member>
  7664. <member name="T:Org.BouncyCastle.Bcpg.OpenPgp.PgpCompressedData">
  7665. <remarks>Compressed data objects</remarks>
  7666. </member>
  7667. <member name="P:Org.BouncyCastle.Bcpg.OpenPgp.PgpCompressedData.Algorithm">
  7668. <summary>The algorithm used for compression</summary>
  7669. </member>
  7670. <member name="M:Org.BouncyCastle.Bcpg.OpenPgp.PgpCompressedData.GetInputStream">
  7671. <summary>Get the raw input stream contained in the object.</summary>
  7672. </member>
  7673. <member name="M:Org.BouncyCastle.Bcpg.OpenPgp.PgpCompressedData.GetDataStream">
  7674. <summary>Return an uncompressed input stream which allows reading of the compressed data.</summary>
  7675. </member>
  7676. <member name="T:Org.BouncyCastle.Bcpg.OpenPgp.PgpCompressedDataGenerator">
  7677. <remarks>Class for producing compressed data packets.</remarks>
  7678. </member>
  7679. <member name="M:Org.BouncyCastle.Bcpg.OpenPgp.PgpCompressedDataGenerator.Open(System.IO.Stream)">
  7680. <summary>
  7681. <p>
  7682. Return an output stream which will save the data being written to
  7683. the compressed object.
  7684. </p>
  7685. <p>
  7686. The stream created can be closed off by either calling Close()
  7687. on the stream or Close() on the generator. Closing the returned
  7688. stream does not close off the Stream parameter <c>outStr</c>.
  7689. </p>
  7690. </summary>
  7691. <param name="outStr">Stream to be used for output.</param>
  7692. <returns>A Stream for output of the compressed data.</returns>
  7693. <exception cref="T:System.ArgumentNullException"></exception>
  7694. <exception cref="T:System.InvalidOperationException"></exception>
  7695. <exception cref="T:System.IO.IOException"></exception>
  7696. </member>
  7697. <member name="M:Org.BouncyCastle.Bcpg.OpenPgp.PgpCompressedDataGenerator.Open(System.IO.Stream,System.Byte[])">
  7698. <summary>
  7699. <p>
  7700. Return an output stream which will compress the data as it is written to it.
  7701. The stream will be written out in chunks according to the size of the passed in buffer.
  7702. </p>
  7703. <p>
  7704. The stream created can be closed off by either calling Close()
  7705. on the stream or Close() on the generator. Closing the returned
  7706. stream does not close off the Stream parameter <c>outStr</c>.
  7707. </p>
  7708. <p>
  7709. <b>Note</b>: if the buffer is not a power of 2 in length only the largest power of 2
  7710. bytes worth of the buffer will be used.
  7711. </p>
  7712. <p>
  7713. <b>Note</b>: using this may break compatibility with RFC 1991 compliant tools.
  7714. Only recent OpenPGP implementations are capable of accepting these streams.
  7715. </p>
  7716. </summary>
  7717. <param name="outStr">Stream to be used for output.</param>
  7718. <param name="buffer">The buffer to use.</param>
  7719. <returns>A Stream for output of the compressed data.</returns>
  7720. <exception cref="T:System.ArgumentNullException"></exception>
  7721. <exception cref="T:System.InvalidOperationException"></exception>
  7722. <exception cref="T:System.IO.IOException"></exception>
  7723. <exception cref="T:Org.BouncyCastle.Bcpg.OpenPgp.PgpException"></exception>
  7724. </member>
  7725. <member name="M:Org.BouncyCastle.Bcpg.OpenPgp.PgpCompressedDataGenerator.Close">
  7726. <summary>Close the compressed object.</summary>summary>
  7727. </member>
  7728. <member name="T:Org.BouncyCastle.Bcpg.OpenPgp.PgpDataValidationException">
  7729. <remarks>
  7730. Thrown if the IV at the start of a data stream indicates the wrong key is being used.
  7731. </remarks>
  7732. </member>
  7733. <member name="M:Org.BouncyCastle.Bcpg.OpenPgp.PgpEncryptedData.GetInputStream">
  7734. <summary>Return the raw input stream for the data stream.</summary>
  7735. </member>
  7736. <member name="M:Org.BouncyCastle.Bcpg.OpenPgp.PgpEncryptedData.IsIntegrityProtected">
  7737. <summary>Return true if the message is integrity protected.</summary>
  7738. <returns>True, if there is a modification detection code namespace associated
  7739. with this stream.</returns>
  7740. </member>
  7741. <member name="M:Org.BouncyCastle.Bcpg.OpenPgp.PgpEncryptedData.Verify">
  7742. <summary>Note: This can only be called after the message has been read.</summary>
  7743. <returns>True, if the message verifies, false otherwise</returns>
  7744. </member>
  7745. <member name="T:Org.BouncyCastle.Bcpg.OpenPgp.PgpEncryptedDataGenerator">
  7746. <remarks>Generator for encrypted objects.</remarks>
  7747. </member>
  7748. <member name="M:Org.BouncyCastle.Bcpg.OpenPgp.PgpEncryptedDataGenerator.#ctor(Org.BouncyCastle.Bcpg.SymmetricKeyAlgorithmTag,Org.BouncyCastle.Security.SecureRandom)">
  7749. <summary>Existing SecureRandom constructor.</summary>
  7750. <param name="encAlgorithm">The symmetric algorithm to use.</param>
  7751. <param name="rand">Source of randomness.</param>
  7752. </member>
  7753. <member name="M:Org.BouncyCastle.Bcpg.OpenPgp.PgpEncryptedDataGenerator.#ctor(Org.BouncyCastle.Bcpg.SymmetricKeyAlgorithmTag,System.Boolean,Org.BouncyCastle.Security.SecureRandom)">
  7754. <summary>Creates a cipher stream which will have an integrity packet associated with it.</summary>
  7755. </member>
  7756. <member name="M:Org.BouncyCastle.Bcpg.OpenPgp.PgpEncryptedDataGenerator.#ctor(Org.BouncyCastle.Bcpg.SymmetricKeyAlgorithmTag,Org.BouncyCastle.Security.SecureRandom,System.Boolean)">
  7757. <summary>Base constructor.</summary>
  7758. <param name="encAlgorithm">The symmetric algorithm to use.</param>
  7759. <param name="rand">Source of randomness.</param>
  7760. <param name="oldFormat">PGP 2.6.x compatibility required.</param>
  7761. </member>
  7762. <member name="M:Org.BouncyCastle.Bcpg.OpenPgp.PgpEncryptedDataGenerator.AddMethod(System.Char[])">
  7763. <summary>
  7764. Add a PBE encryption method to the encrypted object using the default algorithm (S2K_SHA1).
  7765. </summary>
  7766. <remarks>
  7767. Conversion of the passphrase characters to bytes is performed using Convert.ToByte(), which is
  7768. the historical behaviour of the library (1.7 and earlier).
  7769. </remarks>
  7770. </member>
  7771. <member name="M:Org.BouncyCastle.Bcpg.OpenPgp.PgpEncryptedDataGenerator.AddMethod(System.Char[],Org.BouncyCastle.Bcpg.HashAlgorithmTag)">
  7772. <summary>Add a PBE encryption method to the encrypted object.</summary>
  7773. <remarks>
  7774. Conversion of the passphrase characters to bytes is performed using Convert.ToByte(), which is
  7775. the historical behaviour of the library (1.7 and earlier).
  7776. </remarks>
  7777. </member>
  7778. <member name="M:Org.BouncyCastle.Bcpg.OpenPgp.PgpEncryptedDataGenerator.AddMethodUtf8(System.Char[],Org.BouncyCastle.Bcpg.HashAlgorithmTag)">
  7779. <summary>Add a PBE encryption method to the encrypted object.</summary>
  7780. <remarks>
  7781. The passphrase is encoded to bytes using UTF8 (Encoding.UTF8.GetBytes).
  7782. </remarks>
  7783. </member>
  7784. <member name="M:Org.BouncyCastle.Bcpg.OpenPgp.PgpEncryptedDataGenerator.AddMethodRaw(System.Byte[],Org.BouncyCastle.Bcpg.HashAlgorithmTag)">
  7785. <summary>Add a PBE encryption method to the encrypted object.</summary>
  7786. <remarks>
  7787. Allows the caller to handle the encoding of the passphrase to bytes.
  7788. </remarks>
  7789. </member>
  7790. <member name="M:Org.BouncyCastle.Bcpg.OpenPgp.PgpEncryptedDataGenerator.AddMethod(Org.BouncyCastle.Bcpg.OpenPgp.PgpPublicKey)">
  7791. <summary>Add a public key encrypted session key to the encrypted object.</summary>
  7792. </member>
  7793. <member name="M:Org.BouncyCastle.Bcpg.OpenPgp.PgpEncryptedDataGenerator.Open(System.IO.Stream,System.Int64,System.Byte[])">
  7794. <summary>
  7795. <p>
  7796. If buffer is non null stream assumed to be partial, otherwise the length will be used
  7797. to output a fixed length packet.
  7798. </p>
  7799. <p>
  7800. The stream created can be closed off by either calling Close()
  7801. on the stream or Close() on the generator. Closing the returned
  7802. stream does not close off the Stream parameter <c>outStr</c>.
  7803. </p>
  7804. </summary>
  7805. </member>
  7806. <member name="M:Org.BouncyCastle.Bcpg.OpenPgp.PgpEncryptedDataGenerator.Open(System.IO.Stream,System.Int64)">
  7807. <summary>
  7808. <p>
  7809. Return an output stream which will encrypt the data as it is written to it.
  7810. </p>
  7811. <p>
  7812. The stream created can be closed off by either calling Close()
  7813. on the stream or Close() on the generator. Closing the returned
  7814. stream does not close off the Stream parameter <c>outStr</c>.
  7815. </p>
  7816. </summary>
  7817. </member>
  7818. <member name="M:Org.BouncyCastle.Bcpg.OpenPgp.PgpEncryptedDataGenerator.Open(System.IO.Stream,System.Byte[])">
  7819. <summary>
  7820. <p>
  7821. Return an output stream which will encrypt the data as it is written to it.
  7822. The stream will be written out in chunks according to the size of the passed in buffer.
  7823. </p>
  7824. <p>
  7825. The stream created can be closed off by either calling Close()
  7826. on the stream or Close() on the generator. Closing the returned
  7827. stream does not close off the Stream parameter <c>outStr</c>.
  7828. </p>
  7829. <p>
  7830. <b>Note</b>: if the buffer is not a power of 2 in length only the largest power of 2
  7831. bytes worth of the buffer will be used.
  7832. </p>
  7833. </summary>
  7834. </member>
  7835. <member name="M:Org.BouncyCastle.Bcpg.OpenPgp.PgpEncryptedDataGenerator.Close">
  7836. <summary>
  7837. <p>
  7838. Close off the encrypted object - this is equivalent to calling Close() on the stream
  7839. returned by the Open() method.
  7840. </p>
  7841. <p>
  7842. <b>Note</b>: This does not close the underlying output stream, only the stream on top of
  7843. it created by the Open() method.
  7844. </p>
  7845. </summary>
  7846. </member>
  7847. <member name="T:Org.BouncyCastle.Bcpg.OpenPgp.PgpEncryptedDataList">
  7848. <remarks>A holder for a list of PGP encryption method packets.</remarks>
  7849. </member>
  7850. <member name="T:Org.BouncyCastle.Bcpg.OpenPgp.PgpException">
  7851. <remarks>Generic exception class for PGP encoding/decoding problems.</remarks>
  7852. </member>
  7853. <member name="T:Org.BouncyCastle.Bcpg.OpenPgp.PgpKeyFlags">
  7854. <remarks>Key flag values for the KeyFlags subpacket.</remarks>
  7855. </member>
  7856. <member name="T:Org.BouncyCastle.Bcpg.OpenPgp.PgpKeyPair">
  7857. <remarks>
  7858. General class to handle JCA key pairs and convert them into OpenPGP ones.
  7859. <p>
  7860. A word for the unwary, the KeyId for an OpenPGP public key is calculated from
  7861. a hash that includes the time of creation, if you pass a different date to the
  7862. constructor below with the same public private key pair the KeyIs will not be the
  7863. same as for previous generations of the key, so ideally you only want to do
  7864. this once.
  7865. </p>
  7866. </remarks>
  7867. </member>
  7868. <member name="M:Org.BouncyCastle.Bcpg.OpenPgp.PgpKeyPair.#ctor(Org.BouncyCastle.Bcpg.OpenPgp.PgpPublicKey,Org.BouncyCastle.Bcpg.OpenPgp.PgpPrivateKey)">
  7869. <summary>Create a key pair from a PgpPrivateKey and a PgpPublicKey.</summary>
  7870. <param name="pub">The public key.</param>
  7871. <param name="priv">The private key.</param>
  7872. </member>
  7873. <member name="P:Org.BouncyCastle.Bcpg.OpenPgp.PgpKeyPair.KeyId">
  7874. <summary>The keyId associated with this key pair.</summary>
  7875. </member>
  7876. <member name="T:Org.BouncyCastle.Bcpg.OpenPgp.PgpKeyRingGenerator">
  7877. <remarks>
  7878. Generator for a PGP master and subkey ring.
  7879. This class will generate both the secret and public key rings
  7880. </remarks>
  7881. </member>
  7882. <member name="M:Org.BouncyCastle.Bcpg.OpenPgp.PgpKeyRingGenerator.#ctor(System.Int32,Org.BouncyCastle.Bcpg.OpenPgp.PgpKeyPair,System.String,Org.BouncyCastle.Bcpg.SymmetricKeyAlgorithmTag,System.Char[],Org.BouncyCastle.Bcpg.OpenPgp.PgpSignatureSubpacketVector,Org.BouncyCastle.Bcpg.OpenPgp.PgpSignatureSubpacketVector,Org.BouncyCastle.Security.SecureRandom)">
  7883. <summary>
  7884. Create a new key ring generator using old style checksumming. It is recommended to use
  7885. SHA1 checksumming where possible.
  7886. </summary>
  7887. <remarks>
  7888. Conversion of the passphrase characters to bytes is performed using Convert.ToByte(), which is
  7889. the historical behaviour of the library (1.7 and earlier).
  7890. </remarks>
  7891. <param name="certificationLevel">The certification level for keys on this ring.</param>
  7892. <param name="masterKey">The master key pair.</param>
  7893. <param name="id">The id to be associated with the ring.</param>
  7894. <param name="encAlgorithm">The algorithm to be used to protect secret keys.</param>
  7895. <param name="passPhrase">The passPhrase to be used to protect secret keys.</param>
  7896. <param name="hashedPackets">Packets to be included in the certification hash.</param>
  7897. <param name="unhashedPackets">Packets to be attached unhashed to the certification.</param>
  7898. <param name="rand">input secured random.</param>
  7899. </member>
  7900. <member name="M:Org.BouncyCastle.Bcpg.OpenPgp.PgpKeyRingGenerator.#ctor(System.Int32,Org.BouncyCastle.Bcpg.OpenPgp.PgpKeyPair,System.String,Org.BouncyCastle.Bcpg.SymmetricKeyAlgorithmTag,System.Char[],System.Boolean,Org.BouncyCastle.Bcpg.OpenPgp.PgpSignatureSubpacketVector,Org.BouncyCastle.Bcpg.OpenPgp.PgpSignatureSubpacketVector,Org.BouncyCastle.Security.SecureRandom)">
  7901. <summary>
  7902. Create a new key ring generator.
  7903. </summary>
  7904. <remarks>
  7905. Conversion of the passphrase characters to bytes is performed using Convert.ToByte(), which is
  7906. the historical behaviour of the library (1.7 and earlier).
  7907. </remarks>
  7908. <param name="certificationLevel">The certification level for keys on this ring.</param>
  7909. <param name="masterKey">The master key pair.</param>
  7910. <param name="id">The id to be associated with the ring.</param>
  7911. <param name="encAlgorithm">The algorithm to be used to protect secret keys.</param>
  7912. <param name="passPhrase">The passPhrase to be used to protect secret keys.</param>
  7913. <param name="useSha1">Checksum the secret keys with SHA1 rather than the older 16 bit checksum.</param>
  7914. <param name="hashedPackets">Packets to be included in the certification hash.</param>
  7915. <param name="unhashedPackets">Packets to be attached unhashed to the certification.</param>
  7916. <param name="rand">input secured random.</param>
  7917. </member>
  7918. <member name="M:Org.BouncyCastle.Bcpg.OpenPgp.PgpKeyRingGenerator.#ctor(System.Int32,Org.BouncyCastle.Bcpg.OpenPgp.PgpKeyPair,System.String,Org.BouncyCastle.Bcpg.SymmetricKeyAlgorithmTag,System.Boolean,System.Char[],System.Boolean,Org.BouncyCastle.Bcpg.OpenPgp.PgpSignatureSubpacketVector,Org.BouncyCastle.Bcpg.OpenPgp.PgpSignatureSubpacketVector,Org.BouncyCastle.Security.SecureRandom)">
  7919. <summary>
  7920. Create a new key ring generator.
  7921. </summary>
  7922. <param name="certificationLevel">The certification level for keys on this ring.</param>
  7923. <param name="masterKey">The master key pair.</param>
  7924. <param name="id">The id to be associated with the ring.</param>
  7925. <param name="encAlgorithm">The algorithm to be used to protect secret keys.</param>
  7926. <param name="utf8PassPhrase">
  7927. If true, conversion of the passphrase to bytes uses Encoding.UTF8.GetBytes(), otherwise the conversion
  7928. is performed using Convert.ToByte(), which is the historical behaviour of the library (1.7 and earlier).
  7929. </param>
  7930. <param name="passPhrase">The passPhrase to be used to protect secret keys.</param>
  7931. <param name="useSha1">Checksum the secret keys with SHA1 rather than the older 16 bit checksum.</param>
  7932. <param name="hashedPackets">Packets to be included in the certification hash.</param>
  7933. <param name="unhashedPackets">Packets to be attached unhashed to the certification.</param>
  7934. <param name="rand">input secured random.</param>
  7935. </member>
  7936. <member name="M:Org.BouncyCastle.Bcpg.OpenPgp.PgpKeyRingGenerator.#ctor(System.Int32,Org.BouncyCastle.Bcpg.OpenPgp.PgpKeyPair,System.String,Org.BouncyCastle.Bcpg.SymmetricKeyAlgorithmTag,System.Byte[],System.Boolean,Org.BouncyCastle.Bcpg.OpenPgp.PgpSignatureSubpacketVector,Org.BouncyCastle.Bcpg.OpenPgp.PgpSignatureSubpacketVector,Org.BouncyCastle.Security.SecureRandom)">
  7937. <summary>
  7938. Create a new key ring generator.
  7939. </summary>
  7940. <param name="certificationLevel">The certification level for keys on this ring.</param>
  7941. <param name="masterKey">The master key pair.</param>
  7942. <param name="id">The id to be associated with the ring.</param>
  7943. <param name="encAlgorithm">The algorithm to be used to protect secret keys.</param>
  7944. <param name="rawPassPhrase">The passPhrase to be used to protect secret keys.</param>
  7945. <param name="useSha1">Checksum the secret keys with SHA1 rather than the older 16 bit checksum.</param>
  7946. <param name="hashedPackets">Packets to be included in the certification hash.</param>
  7947. <param name="unhashedPackets">Packets to be attached unhashed to the certification.</param>
  7948. <param name="rand">input secured random.</param>
  7949. </member>
  7950. <member name="M:Org.BouncyCastle.Bcpg.OpenPgp.PgpKeyRingGenerator.#ctor(System.Int32,Org.BouncyCastle.Bcpg.OpenPgp.PgpKeyPair,System.String,Org.BouncyCastle.Bcpg.SymmetricKeyAlgorithmTag,Org.BouncyCastle.Bcpg.HashAlgorithmTag,System.Char[],System.Boolean,Org.BouncyCastle.Bcpg.OpenPgp.PgpSignatureSubpacketVector,Org.BouncyCastle.Bcpg.OpenPgp.PgpSignatureSubpacketVector,Org.BouncyCastle.Security.SecureRandom)">
  7951. <summary>
  7952. Create a new key ring generator.
  7953. </summary>
  7954. <remarks>
  7955. Conversion of the passphrase characters to bytes is performed using Convert.ToByte(), which is
  7956. the historical behaviour of the library (1.7 and earlier).
  7957. </remarks>
  7958. <param name="certificationLevel">The certification level for keys on this ring.</param>
  7959. <param name="masterKey">The master key pair.</param>
  7960. <param name="id">The id to be associated with the ring.</param>
  7961. <param name="encAlgorithm">The algorithm to be used to protect secret keys.</param>
  7962. <param name="hashAlgorithm">The hash algorithm.</param>
  7963. <param name="passPhrase">The passPhrase to be used to protect secret keys.</param>
  7964. <param name="useSha1">Checksum the secret keys with SHA1 rather than the older 16 bit checksum.</param>
  7965. <param name="hashedPackets">Packets to be included in the certification hash.</param>
  7966. <param name="unhashedPackets">Packets to be attached unhashed to the certification.</param>
  7967. <param name="rand">input secured random.</param>
  7968. </member>
  7969. <member name="M:Org.BouncyCastle.Bcpg.OpenPgp.PgpKeyRingGenerator.#ctor(System.Int32,Org.BouncyCastle.Bcpg.OpenPgp.PgpKeyPair,System.String,Org.BouncyCastle.Bcpg.SymmetricKeyAlgorithmTag,Org.BouncyCastle.Bcpg.HashAlgorithmTag,System.Boolean,System.Char[],System.Boolean,Org.BouncyCastle.Bcpg.OpenPgp.PgpSignatureSubpacketVector,Org.BouncyCastle.Bcpg.OpenPgp.PgpSignatureSubpacketVector,Org.BouncyCastle.Security.SecureRandom)">
  7970. <summary>
  7971. Create a new key ring generator.
  7972. </summary>
  7973. <param name="certificationLevel">The certification level for keys on this ring.</param>
  7974. <param name="masterKey">The master key pair.</param>
  7975. <param name="id">The id to be associated with the ring.</param>
  7976. <param name="encAlgorithm">The algorithm to be used to protect secret keys.</param>
  7977. <param name="hashAlgorithm">The hash algorithm.</param>
  7978. <param name="utf8PassPhrase">
  7979. If true, conversion of the passphrase to bytes uses Encoding.UTF8.GetBytes(), otherwise the conversion
  7980. is performed using Convert.ToByte(), which is the historical behaviour of the library (1.7 and earlier).
  7981. </param>
  7982. <param name="passPhrase">The passPhrase to be used to protect secret keys.</param>
  7983. <param name="useSha1">Checksum the secret keys with SHA1 rather than the older 16 bit checksum.</param>
  7984. <param name="hashedPackets">Packets to be included in the certification hash.</param>
  7985. <param name="unhashedPackets">Packets to be attached unhashed to the certification.</param>
  7986. <param name="rand">input secured random.</param>
  7987. </member>
  7988. <member name="M:Org.BouncyCastle.Bcpg.OpenPgp.PgpKeyRingGenerator.#ctor(System.Int32,Org.BouncyCastle.Bcpg.OpenPgp.PgpKeyPair,System.String,Org.BouncyCastle.Bcpg.SymmetricKeyAlgorithmTag,Org.BouncyCastle.Bcpg.HashAlgorithmTag,System.Byte[],System.Boolean,Org.BouncyCastle.Bcpg.OpenPgp.PgpSignatureSubpacketVector,Org.BouncyCastle.Bcpg.OpenPgp.PgpSignatureSubpacketVector,Org.BouncyCastle.Security.SecureRandom)">
  7989. <summary>
  7990. Create a new key ring generator.
  7991. </summary>
  7992. <remarks>
  7993. Allows the caller to handle the encoding of the passphrase to bytes.
  7994. </remarks>
  7995. <param name="certificationLevel">The certification level for keys on this ring.</param>
  7996. <param name="masterKey">The master key pair.</param>
  7997. <param name="id">The id to be associated with the ring.</param>
  7998. <param name="encAlgorithm">The algorithm to be used to protect secret keys.</param>
  7999. <param name="hashAlgorithm">The hash algorithm.</param>
  8000. <param name="rawPassPhrase">The passPhrase to be used to protect secret keys.</param>
  8001. <param name="useSha1">Checksum the secret keys with SHA1 rather than the older 16 bit checksum.</param>
  8002. <param name="hashedPackets">Packets to be included in the certification hash.</param>
  8003. <param name="unhashedPackets">Packets to be attached unhashed to the certification.</param>
  8004. <param name="rand">input secured random.</param>
  8005. </member>
  8006. <member name="M:Org.BouncyCastle.Bcpg.OpenPgp.PgpKeyRingGenerator.AddSubKey(Org.BouncyCastle.Bcpg.OpenPgp.PgpKeyPair)">
  8007. <summary>Add a subkey to the key ring to be generated with default certification.</summary>
  8008. </member>
  8009. <member name="M:Org.BouncyCastle.Bcpg.OpenPgp.PgpKeyRingGenerator.AddSubKey(Org.BouncyCastle.Bcpg.OpenPgp.PgpKeyPair,Org.BouncyCastle.Bcpg.HashAlgorithmTag)">
  8010. <summary>
  8011. Add a subkey to the key ring to be generated with default certification.
  8012. </summary>
  8013. <param name="keyPair">The key pair.</param>
  8014. <param name="hashAlgorithm">The hash algorithm.</param>
  8015. </member>
  8016. <member name="M:Org.BouncyCastle.Bcpg.OpenPgp.PgpKeyRingGenerator.AddSubKey(Org.BouncyCastle.Bcpg.OpenPgp.PgpKeyPair,Org.BouncyCastle.Bcpg.HashAlgorithmTag,Org.BouncyCastle.Bcpg.HashAlgorithmTag)">
  8017. <summary>
  8018. Add a signing subkey to the key ring to be generated with default certification and a primary key binding signature.
  8019. </summary>
  8020. <param name="keyPair">The key pair.</param>
  8021. <param name="hashAlgorithm">The hash algorithm.</param>
  8022. <param name="primaryKeyBindingHashAlgorithm">The primary-key binding hash algorithm.</param>
  8023. </member>
  8024. <member name="M:Org.BouncyCastle.Bcpg.OpenPgp.PgpKeyRingGenerator.AddSubKey(Org.BouncyCastle.Bcpg.OpenPgp.PgpKeyPair,Org.BouncyCastle.Bcpg.OpenPgp.PgpSignatureSubpacketVector,Org.BouncyCastle.Bcpg.OpenPgp.PgpSignatureSubpacketVector)">
  8025. <summary>
  8026. Add a subkey with specific hashed and unhashed packets associated with it and
  8027. default certification using SHA-1.
  8028. </summary>
  8029. <param name="keyPair">Public/private key pair.</param>
  8030. <param name="hashedPackets">Hashed packet values to be included in certification.</param>
  8031. <param name="unhashedPackets">Unhashed packets values to be included in certification.</param>
  8032. <exception cref="T:Org.BouncyCastle.Bcpg.OpenPgp.PgpException"></exception>
  8033. </member>
  8034. <member name="M:Org.BouncyCastle.Bcpg.OpenPgp.PgpKeyRingGenerator.AddSubKey(Org.BouncyCastle.Bcpg.OpenPgp.PgpKeyPair,Org.BouncyCastle.Bcpg.OpenPgp.PgpSignatureSubpacketVector,Org.BouncyCastle.Bcpg.OpenPgp.PgpSignatureSubpacketVector,Org.BouncyCastle.Bcpg.HashAlgorithmTag)">
  8035. <summary>
  8036. Add a subkey with specific hashed and unhashed packets associated with it and
  8037. default certification.
  8038. </summary>
  8039. <param name="keyPair">Public/private key pair.</param>
  8040. <param name="hashedPackets">Hashed packet values to be included in certification.</param>
  8041. <param name="unhashedPackets">Unhashed packets values to be included in certification.</param>
  8042. <param name="hashAlgorithm">The hash algorithm.</param>
  8043. <exception cref="T:Org.BouncyCastle.Bcpg.OpenPgp.PgpException">exception adding subkey: </exception>
  8044. <exception cref="T:Org.BouncyCastle.Bcpg.OpenPgp.PgpException"></exception>
  8045. </member>
  8046. <member name="M:Org.BouncyCastle.Bcpg.OpenPgp.PgpKeyRingGenerator.AddSubKey(Org.BouncyCastle.Bcpg.OpenPgp.PgpKeyPair,Org.BouncyCastle.Bcpg.OpenPgp.PgpSignatureSubpacketVector,Org.BouncyCastle.Bcpg.OpenPgp.PgpSignatureSubpacketVector,Org.BouncyCastle.Bcpg.HashAlgorithmTag,Org.BouncyCastle.Bcpg.HashAlgorithmTag)">
  8047. <summary>
  8048. Add a signing subkey with specific hashed and unhashed packets associated with it and
  8049. default certifications, including the primary-key binding signature.
  8050. </summary>
  8051. <param name="keyPair">Public/private key pair.</param>
  8052. <param name="hashedPackets">Hashed packet values to be included in certification.</param>
  8053. <param name="unhashedPackets">Unhashed packets values to be included in certification.</param>
  8054. <param name="hashAlgorithm">The hash algorithm.</param>
  8055. <param name="primaryKeyBindingHashAlgorithm">The primary-key binding hash algorithm.</param>
  8056. <exception cref="T:Org.BouncyCastle.Bcpg.OpenPgp.PgpException">exception adding subkey: </exception>
  8057. <exception cref="T:Org.BouncyCastle.Bcpg.OpenPgp.PgpException"></exception>
  8058. </member>
  8059. <member name="M:Org.BouncyCastle.Bcpg.OpenPgp.PgpKeyRingGenerator.GenerateSecretKeyRing">
  8060. <summary>Return the secret key ring.</summary>
  8061. </member>
  8062. <member name="M:Org.BouncyCastle.Bcpg.OpenPgp.PgpKeyRingGenerator.GeneratePublicKeyRing">
  8063. <summary>Return the public key ring that corresponds to the secret key ring.</summary>
  8064. </member>
  8065. <member name="T:Org.BouncyCastle.Bcpg.OpenPgp.PgpKeyValidationException">
  8066. <remarks>
  8067. Thrown if the key checksum is invalid.
  8068. </remarks>
  8069. </member>
  8070. <member name="T:Org.BouncyCastle.Bcpg.OpenPgp.PgpLiteralData">
  8071. <summary>Class for processing literal data objects.</summary>
  8072. </member>
  8073. <member name="F:Org.BouncyCastle.Bcpg.OpenPgp.PgpLiteralData.Console">
  8074. <summary>The special name indicating a "for your eyes only" packet.</summary>
  8075. </member>
  8076. <member name="P:Org.BouncyCastle.Bcpg.OpenPgp.PgpLiteralData.Format">
  8077. <summary>The format of the data stream - Binary or Text</summary>
  8078. </member>
  8079. <member name="P:Org.BouncyCastle.Bcpg.OpenPgp.PgpLiteralData.FileName">
  8080. <summary>The file name that's associated with the data stream.</summary>
  8081. </member>
  8082. <member name="M:Org.BouncyCastle.Bcpg.OpenPgp.PgpLiteralData.GetRawFileName">
  8083. Return the file name as an unintrepreted byte array.
  8084. </member>
  8085. <member name="P:Org.BouncyCastle.Bcpg.OpenPgp.PgpLiteralData.ModificationTime">
  8086. <summary>The modification time for the file.</summary>
  8087. </member>
  8088. <member name="M:Org.BouncyCastle.Bcpg.OpenPgp.PgpLiteralData.GetInputStream">
  8089. <summary>The raw input stream for the data stream.</summary>
  8090. </member>
  8091. <member name="M:Org.BouncyCastle.Bcpg.OpenPgp.PgpLiteralData.GetDataStream">
  8092. <summary>The input stream representing the data stream.</summary>
  8093. </member>
  8094. <member name="T:Org.BouncyCastle.Bcpg.OpenPgp.PgpLiteralDataGenerator">
  8095. <remarks>Class for producing literal data packets.</remarks>
  8096. </member>
  8097. <member name="F:Org.BouncyCastle.Bcpg.OpenPgp.PgpLiteralDataGenerator.Console">
  8098. <summary>The special name indicating a "for your eyes only" packet.</summary>
  8099. </member>
  8100. <member name="M:Org.BouncyCastle.Bcpg.OpenPgp.PgpLiteralDataGenerator.#ctor(System.Boolean)">
  8101. <summary>
  8102. Generates literal data objects in the old format.
  8103. This is important if you need compatibility with PGP 2.6.x.
  8104. </summary>
  8105. <param name="oldFormat">If true, uses old format.</param>
  8106. </member>
  8107. <member name="M:Org.BouncyCastle.Bcpg.OpenPgp.PgpLiteralDataGenerator.Open(System.IO.Stream,System.Char,System.String,System.Int64,System.DateTime)">
  8108. <summary>
  8109. <p>
  8110. Open a literal data packet, returning a stream to store the data inside the packet.
  8111. </p>
  8112. <p>
  8113. The stream created can be closed off by either calling Close()
  8114. on the stream or Close() on the generator. Closing the returned
  8115. stream does not close off the Stream parameter <c>outStr</c>.
  8116. </p>
  8117. </summary>
  8118. <param name="outStr">The stream we want the packet in.</param>
  8119. <param name="format">The format we are using.</param>
  8120. <param name="name">The name of the 'file'.</param>
  8121. <param name="length">The length of the data we will write.</param>
  8122. <param name="modificationTime">The time of last modification we want stored.</param>
  8123. </member>
  8124. <member name="M:Org.BouncyCastle.Bcpg.OpenPgp.PgpLiteralDataGenerator.Open(System.IO.Stream,System.Char,System.String,System.DateTime,System.Byte[])">
  8125. <summary>
  8126. <p>
  8127. Open a literal data packet, returning a stream to store the data inside the packet,
  8128. as an indefinite length stream. The stream is written out as a series of partial
  8129. packets with a chunk size determined by the size of the passed in buffer.
  8130. </p>
  8131. <p>
  8132. The stream created can be closed off by either calling Close()
  8133. on the stream or Close() on the generator. Closing the returned
  8134. stream does not close off the Stream parameter <c>outStr</c>.
  8135. </p>
  8136. <p>
  8137. <b>Note</b>: if the buffer is not a power of 2 in length only the largest power of 2
  8138. bytes worth of the buffer will be used.</p>
  8139. </summary>
  8140. <param name="outStr">The stream we want the packet in.</param>
  8141. <param name="format">The format we are using.</param>
  8142. <param name="name">The name of the 'file'.</param>
  8143. <param name="modificationTime">The time of last modification we want stored.</param>
  8144. <param name="buffer">The buffer to use for collecting data to put into chunks.</param>
  8145. </member>
  8146. <member name="M:Org.BouncyCastle.Bcpg.OpenPgp.PgpLiteralDataGenerator.Open(System.IO.Stream,System.Char,System.IO.FileInfo)">
  8147. <summary>
  8148. <p>
  8149. Open a literal data packet for the passed in <c>FileInfo</c> object, returning
  8150. an output stream for saving the file contents.
  8151. </p>
  8152. <p>
  8153. The stream created can be closed off by either calling Close()
  8154. on the stream or Close() on the generator. Closing the returned
  8155. stream does not close off the Stream parameter <c>outStr</c>.
  8156. </p>
  8157. </summary>
  8158. <param name="outStr">The stream we want the packet in.</param>
  8159. <param name="format">The format we are using.</param>
  8160. <param name="file">The <c>FileInfo</c> object containg the packet details.</param>
  8161. </member>
  8162. <member name="M:Org.BouncyCastle.Bcpg.OpenPgp.PgpLiteralDataGenerator.Close">
  8163. <summary>
  8164. Close the literal data packet - this is equivalent to calling Close()
  8165. on the stream returned by the Open() method.
  8166. </summary>
  8167. </member>
  8168. <member name="T:Org.BouncyCastle.Bcpg.OpenPgp.PgpMarker">
  8169. <remarks>
  8170. A PGP marker packet - in general these should be ignored other than where
  8171. the idea is to preserve the original input stream.
  8172. </remarks>
  8173. </member>
  8174. <member name="T:Org.BouncyCastle.Bcpg.OpenPgp.PgpObjectFactory">
  8175. <remarks>
  8176. General class for reading a PGP object stream.
  8177. <p>
  8178. Note: if this class finds a PgpPublicKey or a PgpSecretKey it
  8179. will create a PgpPublicKeyRing, or a PgpSecretKeyRing for each
  8180. key found. If all you are trying to do is read a key ring file use
  8181. either PgpPublicKeyRingBundle or PgpSecretKeyRingBundle.</p>
  8182. </remarks>
  8183. </member>
  8184. <member name="M:Org.BouncyCastle.Bcpg.OpenPgp.PgpObjectFactory.NextPgpObject">
  8185. <summary>Return the next object in the stream, or null if the end is reached.</summary>
  8186. <exception cref="T:System.IO.IOException">On a parse error</exception>
  8187. </member>
  8188. <member name="M:Org.BouncyCastle.Bcpg.OpenPgp.PgpObjectFactory.AllPgpObjects">
  8189. <summary>
  8190. Return all available objects in a list.
  8191. </summary>
  8192. <returns>An <c>IList</c> containing all objects from this factory, in order.</returns>
  8193. </member>
  8194. <member name="M:Org.BouncyCastle.Bcpg.OpenPgp.PgpObjectFactory.FilterPgpObjects(System.Type)">
  8195. <summary>
  8196. Read all available objects, returning only those that are assignable to the specified type.
  8197. </summary>
  8198. <param name="type">The type of objects to return. All other objects are ignored.</param>
  8199. <returns>An <c>IList</c> containing the filtered objects from this factory, in order.</returns>
  8200. </member>
  8201. <member name="T:Org.BouncyCastle.Bcpg.OpenPgp.PgpOnePassSignature">
  8202. <remarks>A one pass signature object.</remarks>
  8203. </member>
  8204. <member name="M:Org.BouncyCastle.Bcpg.OpenPgp.PgpOnePassSignature.InitVerify(Org.BouncyCastle.Bcpg.OpenPgp.PgpPublicKey)">
  8205. <summary>Initialise the signature object for verification.</summary>
  8206. </member>
  8207. <member name="M:Org.BouncyCastle.Bcpg.OpenPgp.PgpOnePassSignature.Verify(Org.BouncyCastle.Bcpg.OpenPgp.PgpSignature)">
  8208. <summary>Verify the calculated signature against the passed in PgpSignature.</summary>
  8209. </member>
  8210. <member name="T:Org.BouncyCastle.Bcpg.OpenPgp.PgpOnePassSignatureList">
  8211. <remarks>Holder for a list of PgpOnePassSignature objects.</remarks>
  8212. </member>
  8213. <member name="T:Org.BouncyCastle.Bcpg.OpenPgp.PgpPad">
  8214. <remarks>Padding functions.</remarks>
  8215. </member>
  8216. <member name="T:Org.BouncyCastle.Bcpg.OpenPgp.PgpPbeEncryptedData">
  8217. <remarks>A password based encryption object.</remarks>
  8218. </member>
  8219. <member name="M:Org.BouncyCastle.Bcpg.OpenPgp.PgpPbeEncryptedData.GetInputStream">
  8220. <summary>Return the raw input stream for the data stream.</summary>
  8221. </member>
  8222. <member name="M:Org.BouncyCastle.Bcpg.OpenPgp.PgpPbeEncryptedData.GetDataStream(System.Char[])">
  8223. <summary>Return the decrypted input stream, using the passed in passphrase.</summary>
  8224. <remarks>
  8225. Conversion of the passphrase characters to bytes is performed using Convert.ToByte(), which is
  8226. the historical behaviour of the library (1.7 and earlier).
  8227. </remarks>
  8228. </member>
  8229. <member name="M:Org.BouncyCastle.Bcpg.OpenPgp.PgpPbeEncryptedData.GetDataStreamUtf8(System.Char[])">
  8230. <summary>Return the decrypted input stream, using the passed in passphrase.</summary>
  8231. <remarks>
  8232. The passphrase is encoded to bytes using UTF8 (Encoding.UTF8.GetBytes).
  8233. </remarks>
  8234. </member>
  8235. <member name="M:Org.BouncyCastle.Bcpg.OpenPgp.PgpPbeEncryptedData.GetDataStreamRaw(System.Byte[])">
  8236. <summary>Return the decrypted input stream, using the passed in passphrase.</summary>
  8237. <remarks>
  8238. Allows the caller to handle the encoding of the passphrase to bytes.
  8239. </remarks>
  8240. </member>
  8241. <member name="T:Org.BouncyCastle.Bcpg.OpenPgp.PgpPrivateKey">
  8242. <remarks>General class to contain a private key for use with other OpenPGP objects.</remarks>
  8243. </member>
  8244. <member name="M:Org.BouncyCastle.Bcpg.OpenPgp.PgpPrivateKey.#ctor(System.Int64,Org.BouncyCastle.Bcpg.PublicKeyPacket,Org.BouncyCastle.Crypto.AsymmetricKeyParameter)">
  8245. <summary>
  8246. Create a PgpPrivateKey from a keyID, the associated public data packet, and a regular private key.
  8247. </summary>
  8248. <param name="keyID">ID of the corresponding public key.</param>
  8249. <param name="publicKeyPacket">the public key data packet to be associated with this private key.</param>
  8250. <param name="privateKey">the private key data packet to be associated with this private key.</param>
  8251. </member>
  8252. <member name="P:Org.BouncyCastle.Bcpg.OpenPgp.PgpPrivateKey.KeyId">
  8253. <summary>The keyId associated with the contained private key.</summary>
  8254. </member>
  8255. <member name="P:Org.BouncyCastle.Bcpg.OpenPgp.PgpPrivateKey.PublicKeyPacket">
  8256. <summary>The public key packet associated with this private key, if available.</summary>
  8257. </member>
  8258. <member name="P:Org.BouncyCastle.Bcpg.OpenPgp.PgpPrivateKey.Key">
  8259. <summary>The contained private key.</summary>
  8260. </member>
  8261. <member name="T:Org.BouncyCastle.Bcpg.OpenPgp.PgpPublicKey">
  8262. <remarks>General class to handle a PGP public key object.</remarks>
  8263. </member>
  8264. <member name="M:Org.BouncyCastle.Bcpg.OpenPgp.PgpPublicKey.#ctor(Org.BouncyCastle.Bcpg.PublicKeyAlgorithmTag,Org.BouncyCastle.Crypto.AsymmetricKeyParameter,System.DateTime)">
  8265. <summary>
  8266. Create a PgpPublicKey from the passed in lightweight one.
  8267. </summary>
  8268. <remarks>
  8269. Note: the time passed in affects the value of the key's keyId, so you probably only want
  8270. to do this once for a lightweight key, or make sure you keep track of the time you used.
  8271. </remarks>
  8272. <param name="algorithm">Asymmetric algorithm type representing the public key.</param>
  8273. <param name="pubKey">Actual public key to associate.</param>
  8274. <param name="time">Date of creation.</param>
  8275. <exception cref="T:System.ArgumentException">If <c>pubKey</c> is not public.</exception>
  8276. <exception cref="T:Org.BouncyCastle.Bcpg.OpenPgp.PgpException">On key creation problem.</exception>
  8277. </member>
  8278. <member name="M:Org.BouncyCastle.Bcpg.OpenPgp.PgpPublicKey.#ctor(Org.BouncyCastle.Bcpg.PublicKeyPacket,Org.BouncyCastle.Bcpg.TrustPacket,System.Collections.IList)">
  8279. <summary>Constructor for a sub-key.</summary>
  8280. </member>
  8281. <member name="M:Org.BouncyCastle.Bcpg.OpenPgp.PgpPublicKey.#ctor(Org.BouncyCastle.Bcpg.OpenPgp.PgpPublicKey)">
  8282. <summary>Copy constructor.</summary>
  8283. <param name="pubKey">The public key to copy.</param>
  8284. </member>
  8285. <member name="P:Org.BouncyCastle.Bcpg.OpenPgp.PgpPublicKey.Version">
  8286. <summary>The version of this key.</summary>
  8287. </member>
  8288. <member name="P:Org.BouncyCastle.Bcpg.OpenPgp.PgpPublicKey.CreationTime">
  8289. <summary>The creation time of this key.</summary>
  8290. </member>
  8291. <member name="P:Org.BouncyCastle.Bcpg.OpenPgp.PgpPublicKey.ValidDays">
  8292. <summary>The number of valid days from creation time - zero means no expiry.</summary>
  8293. <remarks>WARNING: This method will return 1 for keys with version > 3 that expire in less than 1 day</remarks>
  8294. </member>
  8295. <member name="M:Org.BouncyCastle.Bcpg.OpenPgp.PgpPublicKey.GetTrustData">
  8296. <summary>Return the trust data associated with the public key, if present.</summary>
  8297. <returns>A byte array with trust data, null otherwise.</returns>
  8298. </member>
  8299. <member name="M:Org.BouncyCastle.Bcpg.OpenPgp.PgpPublicKey.GetValidSeconds">
  8300. <summary>The number of valid seconds from creation time - zero means no expiry.</summary>
  8301. </member>
  8302. <member name="P:Org.BouncyCastle.Bcpg.OpenPgp.PgpPublicKey.KeyId">
  8303. <summary>The keyId associated with the public key.</summary>
  8304. </member>
  8305. <member name="M:Org.BouncyCastle.Bcpg.OpenPgp.PgpPublicKey.GetFingerprint">
  8306. <summary>The fingerprint of the key</summary>
  8307. </member>
  8308. <member name="P:Org.BouncyCastle.Bcpg.OpenPgp.PgpPublicKey.IsEncryptionKey">
  8309. <summary>
  8310. Check if this key has an algorithm type that makes it suitable to use for encryption.
  8311. </summary>
  8312. <remarks>
  8313. Note: with version 4 keys KeyFlags subpackets should also be considered when present for
  8314. determining the preferred use of the key.
  8315. </remarks>
  8316. <returns>
  8317. <c>true</c> if this key algorithm is suitable for encryption.
  8318. </returns>
  8319. </member>
  8320. <member name="P:Org.BouncyCastle.Bcpg.OpenPgp.PgpPublicKey.IsMasterKey">
  8321. <summary>True, if this could be a master key.</summary>
  8322. </member>
  8323. <member name="P:Org.BouncyCastle.Bcpg.OpenPgp.PgpPublicKey.Algorithm">
  8324. <summary>The algorithm code associated with the public key.</summary>
  8325. </member>
  8326. <member name="P:Org.BouncyCastle.Bcpg.OpenPgp.PgpPublicKey.BitStrength">
  8327. <summary>The strength of the key in bits.</summary>
  8328. </member>
  8329. <member name="M:Org.BouncyCastle.Bcpg.OpenPgp.PgpPublicKey.GetKey">
  8330. <summary>The public key contained in the object.</summary>
  8331. <returns>A lightweight public key.</returns>
  8332. <exception cref="T:Org.BouncyCastle.Bcpg.OpenPgp.PgpException">If the key algorithm is not recognised.</exception>
  8333. </member>
  8334. <member name="M:Org.BouncyCastle.Bcpg.OpenPgp.PgpPublicKey.GetUserIds">
  8335. <summary>Allows enumeration of any user IDs associated with the key.</summary>
  8336. <returns>An <c>IEnumerable</c> of <c>string</c> objects.</returns>
  8337. </member>
  8338. <member name="M:Org.BouncyCastle.Bcpg.OpenPgp.PgpPublicKey.GetUserAttributes">
  8339. <summary>Allows enumeration of any user attribute vectors associated with the key.</summary>
  8340. <returns>An <c>IEnumerable</c> of <c>PgpUserAttributeSubpacketVector</c> objects.</returns>
  8341. </member>
  8342. <member name="M:Org.BouncyCastle.Bcpg.OpenPgp.PgpPublicKey.GetSignaturesForId(System.String)">
  8343. <summary>Allows enumeration of any signatures associated with the passed in id.</summary>
  8344. <param name="id">The ID to be matched.</param>
  8345. <returns>An <c>IEnumerable</c> of <c>PgpSignature</c> objects.</returns>
  8346. </member>
  8347. <member name="M:Org.BouncyCastle.Bcpg.OpenPgp.PgpPublicKey.GetSignaturesForUserAttribute(Org.BouncyCastle.Bcpg.OpenPgp.PgpUserAttributeSubpacketVector)">
  8348. <summary>Allows enumeration of signatures associated with the passed in user attributes.</summary>
  8349. <param name="userAttributes">The vector of user attributes to be matched.</param>
  8350. <returns>An <c>IEnumerable</c> of <c>PgpSignature</c> objects.</returns>
  8351. </member>
  8352. <member name="M:Org.BouncyCastle.Bcpg.OpenPgp.PgpPublicKey.GetSignaturesOfType(System.Int32)">
  8353. <summary>Allows enumeration of signatures of the passed in type that are on this key.</summary>
  8354. <param name="signatureType">The type of the signature to be returned.</param>
  8355. <returns>An <c>IEnumerable</c> of <c>PgpSignature</c> objects.</returns>
  8356. </member>
  8357. <member name="M:Org.BouncyCastle.Bcpg.OpenPgp.PgpPublicKey.GetSignatures">
  8358. <summary>Allows enumeration of all signatures/certifications associated with this key.</summary>
  8359. <returns>An <c>IEnumerable</c> with all signatures/certifications.</returns>
  8360. </member>
  8361. <member name="M:Org.BouncyCastle.Bcpg.OpenPgp.PgpPublicKey.GetKeySignatures">
  8362. Return all signatures/certifications directly associated with this key (ie, not to a user id).
  8363. @return an iterator (possibly empty) with all signatures/certifications.
  8364. </member>
  8365. <member name="M:Org.BouncyCastle.Bcpg.OpenPgp.PgpPublicKey.IsRevoked">
  8366. <summary>Check whether this (sub)key has a revocation signature on it.</summary>
  8367. <returns>True, if this (sub)key has been revoked.</returns>
  8368. </member>
  8369. <member name="M:Org.BouncyCastle.Bcpg.OpenPgp.PgpPublicKey.AddCertification(Org.BouncyCastle.Bcpg.OpenPgp.PgpPublicKey,System.String,Org.BouncyCastle.Bcpg.OpenPgp.PgpSignature)">
  8370. <summary>Add a certification for an id to the given public key.</summary>
  8371. <param name="key">The key the certification is to be added to.</param>
  8372. <param name="id">The ID the certification is associated with.</param>
  8373. <param name="certification">The new certification.</param>
  8374. <returns>The re-certified key.</returns>
  8375. </member>
  8376. <member name="M:Org.BouncyCastle.Bcpg.OpenPgp.PgpPublicKey.AddCertification(Org.BouncyCastle.Bcpg.OpenPgp.PgpPublicKey,Org.BouncyCastle.Bcpg.OpenPgp.PgpUserAttributeSubpacketVector,Org.BouncyCastle.Bcpg.OpenPgp.PgpSignature)">
  8377. <summary>Add a certification for the given UserAttributeSubpackets to the given public key.</summary>
  8378. <param name="key">The key the certification is to be added to.</param>
  8379. <param name="userAttributes">The attributes the certification is associated with.</param>
  8380. <param name="certification">The new certification.</param>
  8381. <returns>The re-certified key.</returns>
  8382. </member>
  8383. <member name="M:Org.BouncyCastle.Bcpg.OpenPgp.PgpPublicKey.RemoveCertification(Org.BouncyCastle.Bcpg.OpenPgp.PgpPublicKey,Org.BouncyCastle.Bcpg.OpenPgp.PgpUserAttributeSubpacketVector)">
  8384. <summary>
  8385. Remove any certifications associated with a user attribute subpacket on a key.
  8386. </summary>
  8387. <param name="key">The key the certifications are to be removed from.</param>
  8388. <param name="userAttributes">The attributes to be removed.</param>
  8389. <returns>
  8390. The re-certified key, or null if the user attribute subpacket was not found on the key.
  8391. </returns>
  8392. </member>
  8393. <member name="M:Org.BouncyCastle.Bcpg.OpenPgp.PgpPublicKey.RemoveCertification(Org.BouncyCastle.Bcpg.OpenPgp.PgpPublicKey,System.String)">
  8394. <summary>Remove any certifications associated with a given ID on a key.</summary>
  8395. <param name="key">The key the certifications are to be removed from.</param>
  8396. <param name="id">The ID that is to be removed.</param>
  8397. <returns>The re-certified key, or null if the ID was not found on the key.</returns>
  8398. </member>
  8399. <member name="M:Org.BouncyCastle.Bcpg.OpenPgp.PgpPublicKey.RemoveCertification(Org.BouncyCastle.Bcpg.OpenPgp.PgpPublicKey,System.String,Org.BouncyCastle.Bcpg.OpenPgp.PgpSignature)">
  8400. <summary>Remove a certification associated with a given ID on a key.</summary>
  8401. <param name="key">The key the certifications are to be removed from.</param>
  8402. <param name="id">The ID that the certfication is to be removed from.</param>
  8403. <param name="certification">The certfication to be removed.</param>
  8404. <returns>The re-certified key, or null if the certification was not found.</returns>
  8405. </member>
  8406. <member name="M:Org.BouncyCastle.Bcpg.OpenPgp.PgpPublicKey.RemoveCertification(Org.BouncyCastle.Bcpg.OpenPgp.PgpPublicKey,Org.BouncyCastle.Bcpg.OpenPgp.PgpUserAttributeSubpacketVector,Org.BouncyCastle.Bcpg.OpenPgp.PgpSignature)">
  8407. <summary>Remove a certification associated with a given user attributes on a key.</summary>
  8408. <param name="key">The key the certifications are to be removed from.</param>
  8409. <param name="userAttributes">The user attributes that the certfication is to be removed from.</param>
  8410. <param name="certification">The certification to be removed.</param>
  8411. <returns>The re-certified key, or null if the certification was not found.</returns>
  8412. </member>
  8413. <member name="M:Org.BouncyCastle.Bcpg.OpenPgp.PgpPublicKey.AddCertification(Org.BouncyCastle.Bcpg.OpenPgp.PgpPublicKey,Org.BouncyCastle.Bcpg.OpenPgp.PgpSignature)">
  8414. <summary>Add a revocation or some other key certification to a key.</summary>
  8415. <param name="key">The key the revocation is to be added to.</param>
  8416. <param name="certification">The key signature to be added.</param>
  8417. <returns>The new changed public key object.</returns>
  8418. </member>
  8419. <member name="M:Org.BouncyCastle.Bcpg.OpenPgp.PgpPublicKey.RemoveCertification(Org.BouncyCastle.Bcpg.OpenPgp.PgpPublicKey,Org.BouncyCastle.Bcpg.OpenPgp.PgpSignature)">
  8420. <summary>Remove a certification from the key.</summary>
  8421. <param name="key">The key the certifications are to be removed from.</param>
  8422. <param name="certification">The certfication to be removed.</param>
  8423. <returns>The modified key, null if the certification was not found.</returns>
  8424. </member>
  8425. <member name="T:Org.BouncyCastle.Bcpg.OpenPgp.PgpPublicKeyEncryptedData">
  8426. <remarks>A public key encrypted data object.</remarks>
  8427. </member>
  8428. <member name="P:Org.BouncyCastle.Bcpg.OpenPgp.PgpPublicKeyEncryptedData.KeyId">
  8429. <summary>The key ID for the key used to encrypt the data.</summary>
  8430. </member>
  8431. <member name="M:Org.BouncyCastle.Bcpg.OpenPgp.PgpPublicKeyEncryptedData.GetSymmetricAlgorithm(Org.BouncyCastle.Bcpg.OpenPgp.PgpPrivateKey)">
  8432. <summary>
  8433. Return the algorithm code for the symmetric algorithm used to encrypt the data.
  8434. </summary>
  8435. </member>
  8436. <member name="M:Org.BouncyCastle.Bcpg.OpenPgp.PgpPublicKeyEncryptedData.GetDataStream(Org.BouncyCastle.Bcpg.OpenPgp.PgpPrivateKey)">
  8437. <summary>Return the decrypted data stream for the packet.</summary>
  8438. </member>
  8439. <member name="T:Org.BouncyCastle.Bcpg.OpenPgp.PgpPublicKeyRing">
  8440. <remarks>
  8441. Class to hold a single master public key and its subkeys.
  8442. <p>
  8443. Often PGP keyring files consist of multiple master keys, if you are trying to process
  8444. or construct one of these you should use the <c>PgpPublicKeyRingBundle</c> class.
  8445. </p>
  8446. </remarks>
  8447. </member>
  8448. <member name="M:Org.BouncyCastle.Bcpg.OpenPgp.PgpPublicKeyRing.GetPublicKey">
  8449. <summary>Return the first public key in the ring.</summary>
  8450. </member>
  8451. <member name="M:Org.BouncyCastle.Bcpg.OpenPgp.PgpPublicKeyRing.GetPublicKey(System.Int64)">
  8452. <summary>Return the public key referred to by the passed in key ID if it is present.</summary>
  8453. </member>
  8454. <member name="M:Org.BouncyCastle.Bcpg.OpenPgp.PgpPublicKeyRing.GetPublicKeys">
  8455. <summary>Allows enumeration of all the public keys.</summary>
  8456. <returns>An <c>IEnumerable</c> of <c>PgpPublicKey</c> objects.</returns>
  8457. </member>
  8458. <member name="M:Org.BouncyCastle.Bcpg.OpenPgp.PgpPublicKeyRing.InsertPublicKey(Org.BouncyCastle.Bcpg.OpenPgp.PgpPublicKeyRing,Org.BouncyCastle.Bcpg.OpenPgp.PgpPublicKey)">
  8459. <summary>
  8460. Returns a new key ring with the public key passed in either added or
  8461. replacing an existing one.
  8462. </summary>
  8463. <param name="pubRing">The public key ring to be modified.</param>
  8464. <param name="pubKey">The public key to be inserted.</param>
  8465. <returns>A new <c>PgpPublicKeyRing</c></returns>
  8466. </member>
  8467. <member name="M:Org.BouncyCastle.Bcpg.OpenPgp.PgpPublicKeyRing.RemovePublicKey(Org.BouncyCastle.Bcpg.OpenPgp.PgpPublicKeyRing,Org.BouncyCastle.Bcpg.OpenPgp.PgpPublicKey)">
  8468. <summary>Returns a new key ring with the public key passed in removed from the key ring.</summary>
  8469. <param name="pubRing">The public key ring to be modified.</param>
  8470. <param name="pubKey">The public key to be removed.</param>
  8471. <returns>A new <c>PgpPublicKeyRing</c>, or null if pubKey is not found.</returns>
  8472. </member>
  8473. <member name="T:Org.BouncyCastle.Bcpg.OpenPgp.PgpPublicKeyRingBundle">
  8474. <remarks>
  8475. Often a PGP key ring file is made up of a succession of master/sub-key key rings.
  8476. If you want to read an entire public key file in one hit this is the class for you.
  8477. </remarks>
  8478. </member>
  8479. <member name="M:Org.BouncyCastle.Bcpg.OpenPgp.PgpPublicKeyRingBundle.#ctor(System.IO.Stream)">
  8480. <summary>Build a PgpPublicKeyRingBundle from the passed in input stream.</summary>
  8481. <param name="inputStream">Input stream containing data.</param>
  8482. <exception cref="T:System.IO.IOException">If a problem parsing the stream occurs.</exception>
  8483. <exception cref="T:Org.BouncyCastle.Bcpg.OpenPgp.PgpException">If an object is encountered which isn't a PgpPublicKeyRing.</exception>
  8484. </member>
  8485. <member name="P:Org.BouncyCastle.Bcpg.OpenPgp.PgpPublicKeyRingBundle.Count">
  8486. <summary>Return the number of key rings in this collection.</summary>
  8487. </member>
  8488. <member name="M:Org.BouncyCastle.Bcpg.OpenPgp.PgpPublicKeyRingBundle.GetKeyRings">
  8489. <summary>Allow enumeration of the public key rings making up this collection.</summary>
  8490. </member>
  8491. <member name="M:Org.BouncyCastle.Bcpg.OpenPgp.PgpPublicKeyRingBundle.GetKeyRings(System.String)">
  8492. <summary>Allow enumeration of the key rings associated with the passed in userId.</summary>
  8493. <param name="userId">The user ID to be matched.</param>
  8494. <returns>An <c>IEnumerable</c> of key rings which matched (possibly none).</returns>
  8495. </member>
  8496. <member name="M:Org.BouncyCastle.Bcpg.OpenPgp.PgpPublicKeyRingBundle.GetKeyRings(System.String,System.Boolean)">
  8497. <summary>Allow enumeration of the key rings associated with the passed in userId.</summary>
  8498. <param name="userId">The user ID to be matched.</param>
  8499. <param name="matchPartial">If true, userId need only be a substring of an actual ID string to match.</param>
  8500. <returns>An <c>IEnumerable</c> of key rings which matched (possibly none).</returns>
  8501. </member>
  8502. <member name="M:Org.BouncyCastle.Bcpg.OpenPgp.PgpPublicKeyRingBundle.GetKeyRings(System.String,System.Boolean,System.Boolean)">
  8503. <summary>Allow enumeration of the key rings associated with the passed in userId.</summary>
  8504. <param name="userId">The user ID to be matched.</param>
  8505. <param name="matchPartial">If true, userId need only be a substring of an actual ID string to match.</param>
  8506. <param name="ignoreCase">If true, case is ignored in user ID comparisons.</param>
  8507. <returns>An <c>IEnumerable</c> of key rings which matched (possibly none).</returns>
  8508. </member>
  8509. <member name="M:Org.BouncyCastle.Bcpg.OpenPgp.PgpPublicKeyRingBundle.GetPublicKey(System.Int64)">
  8510. <summary>Return the PGP public key associated with the given key id.</summary>
  8511. <param name="keyId">The ID of the public key to return.</param>
  8512. </member>
  8513. <member name="M:Org.BouncyCastle.Bcpg.OpenPgp.PgpPublicKeyRingBundle.GetPublicKeyRing(System.Int64)">
  8514. <summary>Return the public key ring which contains the key referred to by keyId</summary>
  8515. <param name="keyId">key ID to match against</param>
  8516. </member>
  8517. <member name="M:Org.BouncyCastle.Bcpg.OpenPgp.PgpPublicKeyRingBundle.Contains(System.Int64)">
  8518. <summary>
  8519. Return true if a key matching the passed in key ID is present, false otherwise.
  8520. </summary>
  8521. <param name="keyID">key ID to look for.</param>
  8522. </member>
  8523. <member name="M:Org.BouncyCastle.Bcpg.OpenPgp.PgpPublicKeyRingBundle.AddPublicKeyRing(Org.BouncyCastle.Bcpg.OpenPgp.PgpPublicKeyRingBundle,Org.BouncyCastle.Bcpg.OpenPgp.PgpPublicKeyRing)">
  8524. <summary>
  8525. Return a new bundle containing the contents of the passed in bundle and
  8526. the passed in public key ring.
  8527. </summary>
  8528. <param name="bundle">The <c>PgpPublicKeyRingBundle</c> the key ring is to be added to.</param>
  8529. <param name="publicKeyRing">The key ring to be added.</param>
  8530. <returns>A new <c>PgpPublicKeyRingBundle</c> merging the current one with the passed in key ring.</returns>
  8531. <exception cref="T:System.ArgumentException">If the keyId for the passed in key ring is already present.</exception>
  8532. </member>
  8533. <member name="M:Org.BouncyCastle.Bcpg.OpenPgp.PgpPublicKeyRingBundle.RemovePublicKeyRing(Org.BouncyCastle.Bcpg.OpenPgp.PgpPublicKeyRingBundle,Org.BouncyCastle.Bcpg.OpenPgp.PgpPublicKeyRing)">
  8534. <summary>
  8535. Return a new bundle containing the contents of the passed in bundle with
  8536. the passed in public key ring removed.
  8537. </summary>
  8538. <param name="bundle">The <c>PgpPublicKeyRingBundle</c> the key ring is to be removed from.</param>
  8539. <param name="publicKeyRing">The key ring to be removed.</param>
  8540. <returns>A new <c>PgpPublicKeyRingBundle</c> not containing the passed in key ring.</returns>
  8541. <exception cref="T:System.ArgumentException">If the keyId for the passed in key ring is not present.</exception>
  8542. </member>
  8543. <member name="T:Org.BouncyCastle.Bcpg.OpenPgp.PgpSecretKey">
  8544. <remarks>General class to handle a PGP secret key object.</remarks>
  8545. </member>
  8546. <member name="M:Org.BouncyCastle.Bcpg.OpenPgp.PgpSecretKey.#ctor(System.Int32,Org.BouncyCastle.Bcpg.OpenPgp.PgpKeyPair,System.String,Org.BouncyCastle.Bcpg.SymmetricKeyAlgorithmTag,System.Char[],Org.BouncyCastle.Bcpg.OpenPgp.PgpSignatureSubpacketVector,Org.BouncyCastle.Bcpg.OpenPgp.PgpSignatureSubpacketVector,Org.BouncyCastle.Security.SecureRandom)">
  8547. <remarks>
  8548. Conversion of the passphrase characters to bytes is performed using Convert.ToByte(), which is
  8549. the historical behaviour of the library (1.7 and earlier).
  8550. </remarks>
  8551. </member>
  8552. <member name="M:Org.BouncyCastle.Bcpg.OpenPgp.PgpSecretKey.#ctor(System.Int32,Org.BouncyCastle.Bcpg.OpenPgp.PgpKeyPair,System.String,Org.BouncyCastle.Bcpg.SymmetricKeyAlgorithmTag,System.Char[],System.Boolean,Org.BouncyCastle.Bcpg.OpenPgp.PgpSignatureSubpacketVector,Org.BouncyCastle.Bcpg.OpenPgp.PgpSignatureSubpacketVector,Org.BouncyCastle.Security.SecureRandom)">
  8553. <remarks>
  8554. Conversion of the passphrase characters to bytes is performed using Convert.ToByte(), which is
  8555. the historical behaviour of the library (1.7 and earlier).
  8556. </remarks>
  8557. </member>
  8558. <member name="M:Org.BouncyCastle.Bcpg.OpenPgp.PgpSecretKey.#ctor(System.Int32,Org.BouncyCastle.Bcpg.OpenPgp.PgpKeyPair,System.String,Org.BouncyCastle.Bcpg.SymmetricKeyAlgorithmTag,System.Boolean,System.Char[],System.Boolean,Org.BouncyCastle.Bcpg.OpenPgp.PgpSignatureSubpacketVector,Org.BouncyCastle.Bcpg.OpenPgp.PgpSignatureSubpacketVector,Org.BouncyCastle.Security.SecureRandom)">
  8559. <remarks>
  8560. If utf8PassPhrase is true, conversion of the passphrase to bytes uses Encoding.UTF8.GetBytes(), otherwise the conversion
  8561. is performed using Convert.ToByte(), which is the historical behaviour of the library (1.7 and earlier).
  8562. </remarks>
  8563. </member>
  8564. <member name="M:Org.BouncyCastle.Bcpg.OpenPgp.PgpSecretKey.#ctor(System.Int32,Org.BouncyCastle.Bcpg.OpenPgp.PgpKeyPair,System.String,Org.BouncyCastle.Bcpg.SymmetricKeyAlgorithmTag,System.Byte[],System.Boolean,Org.BouncyCastle.Bcpg.OpenPgp.PgpSignatureSubpacketVector,Org.BouncyCastle.Bcpg.OpenPgp.PgpSignatureSubpacketVector,Org.BouncyCastle.Security.SecureRandom)">
  8565. <remarks>
  8566. Allows the caller to handle the encoding of the passphrase to bytes.
  8567. </remarks>
  8568. </member>
  8569. <member name="M:Org.BouncyCastle.Bcpg.OpenPgp.PgpSecretKey.#ctor(System.Int32,Org.BouncyCastle.Bcpg.OpenPgp.PgpKeyPair,System.String,Org.BouncyCastle.Bcpg.SymmetricKeyAlgorithmTag,Org.BouncyCastle.Bcpg.HashAlgorithmTag,System.Char[],System.Boolean,Org.BouncyCastle.Bcpg.OpenPgp.PgpSignatureSubpacketVector,Org.BouncyCastle.Bcpg.OpenPgp.PgpSignatureSubpacketVector,Org.BouncyCastle.Security.SecureRandom)">
  8570. <remarks>
  8571. Conversion of the passphrase characters to bytes is performed using Convert.ToByte(), which is
  8572. the historical behaviour of the library (1.7 and earlier).
  8573. </remarks>
  8574. </member>
  8575. <member name="M:Org.BouncyCastle.Bcpg.OpenPgp.PgpSecretKey.#ctor(System.Int32,Org.BouncyCastle.Bcpg.OpenPgp.PgpKeyPair,System.String,Org.BouncyCastle.Bcpg.SymmetricKeyAlgorithmTag,Org.BouncyCastle.Bcpg.HashAlgorithmTag,System.Boolean,System.Char[],System.Boolean,Org.BouncyCastle.Bcpg.OpenPgp.PgpSignatureSubpacketVector,Org.BouncyCastle.Bcpg.OpenPgp.PgpSignatureSubpacketVector,Org.BouncyCastle.Security.SecureRandom)">
  8576. <remarks>
  8577. If utf8PassPhrase is true, conversion of the passphrase to bytes uses Encoding.UTF8.GetBytes(), otherwise the conversion
  8578. is performed using Convert.ToByte(), which is the historical behaviour of the library (1.7 and earlier).
  8579. </remarks>
  8580. </member>
  8581. <member name="M:Org.BouncyCastle.Bcpg.OpenPgp.PgpSecretKey.#ctor(System.Int32,Org.BouncyCastle.Bcpg.OpenPgp.PgpKeyPair,System.String,Org.BouncyCastle.Bcpg.SymmetricKeyAlgorithmTag,Org.BouncyCastle.Bcpg.HashAlgorithmTag,System.Byte[],System.Boolean,Org.BouncyCastle.Bcpg.OpenPgp.PgpSignatureSubpacketVector,Org.BouncyCastle.Bcpg.OpenPgp.PgpSignatureSubpacketVector,Org.BouncyCastle.Security.SecureRandom)">
  8582. <remarks>
  8583. Allows the caller to handle the encoding of the passphrase to bytes.
  8584. </remarks>
  8585. </member>
  8586. <member name="P:Org.BouncyCastle.Bcpg.OpenPgp.PgpSecretKey.IsSigningKey">
  8587. <summary>
  8588. Check if this key has an algorithm type that makes it suitable to use for signing.
  8589. </summary>
  8590. <remarks>
  8591. Note: with version 4 keys KeyFlags subpackets should also be considered when present for
  8592. determining the preferred use of the key.
  8593. </remarks>
  8594. <returns>
  8595. <c>true</c> if this key algorithm is suitable for use with signing.
  8596. </returns>
  8597. </member>
  8598. <member name="P:Org.BouncyCastle.Bcpg.OpenPgp.PgpSecretKey.IsMasterKey">
  8599. <summary>True, if this is a master key.</summary>
  8600. </member>
  8601. <member name="P:Org.BouncyCastle.Bcpg.OpenPgp.PgpSecretKey.IsPrivateKeyEmpty">
  8602. <summary>Detect if the Secret Key's Private Key is empty or not</summary>
  8603. </member>
  8604. <member name="P:Org.BouncyCastle.Bcpg.OpenPgp.PgpSecretKey.KeyEncryptionAlgorithm">
  8605. <summary>The algorithm the key is encrypted with.</summary>
  8606. </member>
  8607. <member name="P:Org.BouncyCastle.Bcpg.OpenPgp.PgpSecretKey.KeyId">
  8608. <summary>The key ID of the public key associated with this key.</summary>
  8609. </member>
  8610. <member name="P:Org.BouncyCastle.Bcpg.OpenPgp.PgpSecretKey.S2kUsage">
  8611. <summary>Return the S2K usage associated with this key.</summary>
  8612. </member>
  8613. <member name="P:Org.BouncyCastle.Bcpg.OpenPgp.PgpSecretKey.S2k">
  8614. <summary>Return the S2K used to process this key.</summary>
  8615. </member>
  8616. <member name="P:Org.BouncyCastle.Bcpg.OpenPgp.PgpSecretKey.PublicKey">
  8617. <summary>The public key associated with this key.</summary>
  8618. </member>
  8619. <member name="P:Org.BouncyCastle.Bcpg.OpenPgp.PgpSecretKey.UserIds">
  8620. <summary>Allows enumeration of any user IDs associated with the key.</summary>
  8621. <returns>An <c>IEnumerable</c> of <c>string</c> objects.</returns>
  8622. </member>
  8623. <member name="P:Org.BouncyCastle.Bcpg.OpenPgp.PgpSecretKey.UserAttributes">
  8624. <summary>Allows enumeration of any user attribute vectors associated with the key.</summary>
  8625. <returns>An <c>IEnumerable</c> of <c>string</c> objects.</returns>
  8626. </member>
  8627. <member name="M:Org.BouncyCastle.Bcpg.OpenPgp.PgpSecretKey.ExtractPrivateKey(System.Char[])">
  8628. <summary>Extract a <c>PgpPrivateKey</c> from this secret key's encrypted contents.</summary>
  8629. <remarks>
  8630. Conversion of the passphrase characters to bytes is performed using Convert.ToByte(), which is
  8631. the historical behaviour of the library (1.7 and earlier).
  8632. </remarks>
  8633. </member>
  8634. <member name="M:Org.BouncyCastle.Bcpg.OpenPgp.PgpSecretKey.ExtractPrivateKeyUtf8(System.Char[])">
  8635. <summary>Extract a <c>PgpPrivateKey</c> from this secret key's encrypted contents.</summary>
  8636. <remarks>
  8637. The passphrase is encoded to bytes using UTF8 (Encoding.UTF8.GetBytes).
  8638. </remarks>
  8639. </member>
  8640. <member name="M:Org.BouncyCastle.Bcpg.OpenPgp.PgpSecretKey.ExtractPrivateKeyRaw(System.Byte[])">
  8641. <summary>Extract a <c>PgpPrivateKey</c> from this secret key's encrypted contents.</summary>
  8642. <remarks>
  8643. Allows the caller to handle the encoding of the passphrase to bytes.
  8644. </remarks>
  8645. </member>
  8646. <member name="M:Org.BouncyCastle.Bcpg.OpenPgp.PgpSecretKey.CopyWithNewPassword(Org.BouncyCastle.Bcpg.OpenPgp.PgpSecretKey,System.Char[],System.Char[],Org.BouncyCastle.Bcpg.SymmetricKeyAlgorithmTag,Org.BouncyCastle.Security.SecureRandom)">
  8647. <summary>
  8648. Return a copy of the passed in secret key, encrypted using a new password
  8649. and the passed in algorithm.
  8650. </summary>
  8651. <remarks>
  8652. Conversion of the passphrase characters to bytes is performed using Convert.ToByte(), which is
  8653. the historical behaviour of the library (1.7 and earlier).
  8654. </remarks>
  8655. <param name="key">The PgpSecretKey to be copied.</param>
  8656. <param name="oldPassPhrase">The current password for the key.</param>
  8657. <param name="newPassPhrase">The new password for the key.</param>
  8658. <param name="newEncAlgorithm">The algorithm to be used for the encryption.</param>
  8659. <param name="rand">Source of randomness.</param>
  8660. </member>
  8661. <member name="M:Org.BouncyCastle.Bcpg.OpenPgp.PgpSecretKey.CopyWithNewPasswordUtf8(Org.BouncyCastle.Bcpg.OpenPgp.PgpSecretKey,System.Char[],System.Char[],Org.BouncyCastle.Bcpg.SymmetricKeyAlgorithmTag,Org.BouncyCastle.Security.SecureRandom)">
  8662. <summary>
  8663. Return a copy of the passed in secret key, encrypted using a new password
  8664. and the passed in algorithm.
  8665. </summary>
  8666. <remarks>
  8667. The passphrase is encoded to bytes using UTF8 (Encoding.UTF8.GetBytes).
  8668. </remarks>
  8669. <param name="key">The PgpSecretKey to be copied.</param>
  8670. <param name="oldPassPhrase">The current password for the key.</param>
  8671. <param name="newPassPhrase">The new password for the key.</param>
  8672. <param name="newEncAlgorithm">The algorithm to be used for the encryption.</param>
  8673. <param name="rand">Source of randomness.</param>
  8674. </member>
  8675. <member name="M:Org.BouncyCastle.Bcpg.OpenPgp.PgpSecretKey.CopyWithNewPasswordRaw(Org.BouncyCastle.Bcpg.OpenPgp.PgpSecretKey,System.Byte[],System.Byte[],Org.BouncyCastle.Bcpg.SymmetricKeyAlgorithmTag,Org.BouncyCastle.Security.SecureRandom)">
  8676. <summary>
  8677. Return a copy of the passed in secret key, encrypted using a new password
  8678. and the passed in algorithm.
  8679. </summary>
  8680. <remarks>
  8681. Allows the caller to handle the encoding of the passphrase to bytes.
  8682. </remarks>
  8683. <param name="key">The PgpSecretKey to be copied.</param>
  8684. <param name="rawOldPassPhrase">The current password for the key.</param>
  8685. <param name="rawNewPassPhrase">The new password for the key.</param>
  8686. <param name="newEncAlgorithm">The algorithm to be used for the encryption.</param>
  8687. <param name="rand">Source of randomness.</param>
  8688. </member>
  8689. <member name="M:Org.BouncyCastle.Bcpg.OpenPgp.PgpSecretKey.ReplacePublicKey(Org.BouncyCastle.Bcpg.OpenPgp.PgpSecretKey,Org.BouncyCastle.Bcpg.OpenPgp.PgpPublicKey)">
  8690. <summary>Replace the passed the public key on the passed in secret key.</summary>
  8691. <param name="secretKey">Secret key to change.</param>
  8692. <param name="publicKey">New public key.</param>
  8693. <returns>A new secret key.</returns>
  8694. <exception cref="T:System.ArgumentException">If KeyId's do not match.</exception>
  8695. </member>
  8696. <member name="M:Org.BouncyCastle.Bcpg.OpenPgp.PgpSecretKey.ParseSecretKeyFromSExpr(System.IO.Stream,System.Char[],Org.BouncyCastle.Bcpg.OpenPgp.PgpPublicKey)">
  8697. <summary>
  8698. Parse a secret key from one of the GPG S expression keys associating it with the passed in public key.
  8699. </summary>
  8700. <remarks>
  8701. Conversion of the passphrase characters to bytes is performed using Convert.ToByte(), which is
  8702. the historical behaviour of the library (1.7 and earlier).
  8703. </remarks>
  8704. </member>
  8705. <member name="M:Org.BouncyCastle.Bcpg.OpenPgp.PgpSecretKey.ParseSecretKeyFromSExprUtf8(System.IO.Stream,System.Char[],Org.BouncyCastle.Bcpg.OpenPgp.PgpPublicKey)">
  8706. <summary>
  8707. Parse a secret key from one of the GPG S expression keys associating it with the passed in public key.
  8708. </summary>
  8709. <remarks>
  8710. The passphrase is encoded to bytes using UTF8 (Encoding.UTF8.GetBytes).
  8711. </remarks>
  8712. </member>
  8713. <member name="M:Org.BouncyCastle.Bcpg.OpenPgp.PgpSecretKey.ParseSecretKeyFromSExprRaw(System.IO.Stream,System.Byte[],Org.BouncyCastle.Bcpg.OpenPgp.PgpPublicKey)">
  8714. <summary>
  8715. Parse a secret key from one of the GPG S expression keys associating it with the passed in public key.
  8716. </summary>
  8717. <remarks>
  8718. Allows the caller to handle the encoding of the passphrase to bytes.
  8719. </remarks>
  8720. </member>
  8721. <member name="M:Org.BouncyCastle.Bcpg.OpenPgp.PgpSecretKey.ParseSecretKeyFromSExpr(System.IO.Stream,System.Char[])">
  8722. <summary>
  8723. Parse a secret key from one of the GPG S expression keys.
  8724. </summary>
  8725. <remarks>
  8726. Conversion of the passphrase characters to bytes is performed using Convert.ToByte(), which is
  8727. the historical behaviour of the library (1.7 and earlier).
  8728. </remarks>
  8729. </member>
  8730. <member name="M:Org.BouncyCastle.Bcpg.OpenPgp.PgpSecretKey.ParseSecretKeyFromSExprUtf8(System.IO.Stream,System.Char[])">
  8731. <summary>
  8732. Parse a secret key from one of the GPG S expression keys.
  8733. </summary>
  8734. <remarks>
  8735. The passphrase is encoded to bytes using UTF8 (Encoding.UTF8.GetBytes).
  8736. </remarks>
  8737. </member>
  8738. <member name="M:Org.BouncyCastle.Bcpg.OpenPgp.PgpSecretKey.ParseSecretKeyFromSExprRaw(System.IO.Stream,System.Byte[])">
  8739. <summary>
  8740. Parse a secret key from one of the GPG S expression keys.
  8741. </summary>
  8742. <remarks>
  8743. Allows the caller to handle the encoding of the passphrase to bytes.
  8744. </remarks>
  8745. </member>
  8746. <member name="M:Org.BouncyCastle.Bcpg.OpenPgp.PgpSecretKey.DoParseSecretKeyFromSExpr(System.IO.Stream,System.Byte[],System.Boolean)">
  8747. <summary>
  8748. Parse a secret key from one of the GPG S expression keys.
  8749. </summary>
  8750. </member>
  8751. <member name="T:Org.BouncyCastle.Bcpg.OpenPgp.PgpSecretKeyRing">
  8752. <remarks>
  8753. Class to hold a single master secret key and its subkeys.
  8754. <p>
  8755. Often PGP keyring files consist of multiple master keys, if you are trying to process
  8756. or construct one of these you should use the <c>PgpSecretKeyRingBundle</c> class.
  8757. </p>
  8758. </remarks>
  8759. </member>
  8760. <member name="M:Org.BouncyCastle.Bcpg.OpenPgp.PgpSecretKeyRing.GetPublicKey">
  8761. <summary>Return the public key for the master key.</summary>
  8762. </member>
  8763. <member name="M:Org.BouncyCastle.Bcpg.OpenPgp.PgpSecretKeyRing.GetSecretKey">
  8764. <summary>Return the master private key.</summary>
  8765. </member>
  8766. <member name="M:Org.BouncyCastle.Bcpg.OpenPgp.PgpSecretKeyRing.GetSecretKeys">
  8767. <summary>Allows enumeration of the secret keys.</summary>
  8768. <returns>An <c>IEnumerable</c> of <c>PgpSecretKey</c> objects.</returns>
  8769. </member>
  8770. <member name="M:Org.BouncyCastle.Bcpg.OpenPgp.PgpSecretKeyRing.GetExtraPublicKeys">
  8771. <summary>
  8772. Return an iterator of the public keys in the secret key ring that
  8773. have no matching private key. At the moment only personal certificate data
  8774. appears in this fashion.
  8775. </summary>
  8776. <returns>An <c>IEnumerable</c> of unattached, or extra, public keys.</returns>
  8777. </member>
  8778. <member name="M:Org.BouncyCastle.Bcpg.OpenPgp.PgpSecretKeyRing.ReplacePublicKeys(Org.BouncyCastle.Bcpg.OpenPgp.PgpSecretKeyRing,Org.BouncyCastle.Bcpg.OpenPgp.PgpPublicKeyRing)">
  8779. <summary>
  8780. Replace the public key set on the secret ring with the corresponding key off the public ring.
  8781. </summary>
  8782. <param name="secretRing">Secret ring to be changed.</param>
  8783. <param name="publicRing">Public ring containing the new public key set.</param>
  8784. </member>
  8785. <member name="M:Org.BouncyCastle.Bcpg.OpenPgp.PgpSecretKeyRing.CopyWithNewPassword(Org.BouncyCastle.Bcpg.OpenPgp.PgpSecretKeyRing,System.Char[],System.Char[],Org.BouncyCastle.Bcpg.SymmetricKeyAlgorithmTag,Org.BouncyCastle.Security.SecureRandom)">
  8786. <summary>
  8787. Return a copy of the passed in secret key ring, with the master key and sub keys encrypted
  8788. using a new password and the passed in algorithm.
  8789. </summary>
  8790. <param name="ring">The <c>PgpSecretKeyRing</c> to be copied.</param>
  8791. <param name="oldPassPhrase">The current password for key.</param>
  8792. <param name="newPassPhrase">The new password for the key.</param>
  8793. <param name="newEncAlgorithm">The algorithm to be used for the encryption.</param>
  8794. <param name="rand">Source of randomness.</param>
  8795. </member>
  8796. <member name="M:Org.BouncyCastle.Bcpg.OpenPgp.PgpSecretKeyRing.InsertSecretKey(Org.BouncyCastle.Bcpg.OpenPgp.PgpSecretKeyRing,Org.BouncyCastle.Bcpg.OpenPgp.PgpSecretKey)">
  8797. <summary>
  8798. Returns a new key ring with the secret key passed in either added or
  8799. replacing an existing one with the same key ID.
  8800. </summary>
  8801. <param name="secRing">The secret key ring to be modified.</param>
  8802. <param name="secKey">The secret key to be inserted.</param>
  8803. <returns>A new <c>PgpSecretKeyRing</c></returns>
  8804. </member>
  8805. <member name="M:Org.BouncyCastle.Bcpg.OpenPgp.PgpSecretKeyRing.RemoveSecretKey(Org.BouncyCastle.Bcpg.OpenPgp.PgpSecretKeyRing,Org.BouncyCastle.Bcpg.OpenPgp.PgpSecretKey)">
  8806. <summary>Returns a new key ring with the secret key passed in removed from the key ring.</summary>
  8807. <param name="secRing">The secret key ring to be modified.</param>
  8808. <param name="secKey">The secret key to be removed.</param>
  8809. <returns>A new <c>PgpSecretKeyRing</c>, or null if secKey is not found.</returns>
  8810. </member>
  8811. <member name="T:Org.BouncyCastle.Bcpg.OpenPgp.PgpSecretKeyRingBundle">
  8812. <remarks>
  8813. Often a PGP key ring file is made up of a succession of master/sub-key key rings.
  8814. If you want to read an entire secret key file in one hit this is the class for you.
  8815. </remarks>
  8816. </member>
  8817. <member name="M:Org.BouncyCastle.Bcpg.OpenPgp.PgpSecretKeyRingBundle.#ctor(System.IO.Stream)">
  8818. <summary>Build a PgpSecretKeyRingBundle from the passed in input stream.</summary>
  8819. <param name="inputStream">Input stream containing data.</param>
  8820. <exception cref="T:System.IO.IOException">If a problem parsing the stream occurs.</exception>
  8821. <exception cref="T:Org.BouncyCastle.Bcpg.OpenPgp.PgpException">If an object is encountered which isn't a PgpSecretKeyRing.</exception>
  8822. </member>
  8823. <member name="P:Org.BouncyCastle.Bcpg.OpenPgp.PgpSecretKeyRingBundle.Count">
  8824. <summary>Return the number of rings in this collection.</summary>
  8825. </member>
  8826. <member name="M:Org.BouncyCastle.Bcpg.OpenPgp.PgpSecretKeyRingBundle.GetKeyRings">
  8827. <summary>Allow enumeration of the secret key rings making up this collection.</summary>
  8828. </member>
  8829. <member name="M:Org.BouncyCastle.Bcpg.OpenPgp.PgpSecretKeyRingBundle.GetKeyRings(System.String)">
  8830. <summary>Allow enumeration of the key rings associated with the passed in userId.</summary>
  8831. <param name="userId">The user ID to be matched.</param>
  8832. <returns>An <c>IEnumerable</c> of key rings which matched (possibly none).</returns>
  8833. </member>
  8834. <member name="M:Org.BouncyCastle.Bcpg.OpenPgp.PgpSecretKeyRingBundle.GetKeyRings(System.String,System.Boolean)">
  8835. <summary>Allow enumeration of the key rings associated with the passed in userId.</summary>
  8836. <param name="userId">The user ID to be matched.</param>
  8837. <param name="matchPartial">If true, userId need only be a substring of an actual ID string to match.</param>
  8838. <returns>An <c>IEnumerable</c> of key rings which matched (possibly none).</returns>
  8839. </member>
  8840. <member name="M:Org.BouncyCastle.Bcpg.OpenPgp.PgpSecretKeyRingBundle.GetKeyRings(System.String,System.Boolean,System.Boolean)">
  8841. <summary>Allow enumeration of the key rings associated with the passed in userId.</summary>
  8842. <param name="userId">The user ID to be matched.</param>
  8843. <param name="matchPartial">If true, userId need only be a substring of an actual ID string to match.</param>
  8844. <param name="ignoreCase">If true, case is ignored in user ID comparisons.</param>
  8845. <returns>An <c>IEnumerable</c> of key rings which matched (possibly none).</returns>
  8846. </member>
  8847. <member name="M:Org.BouncyCastle.Bcpg.OpenPgp.PgpSecretKeyRingBundle.GetSecretKey(System.Int64)">
  8848. <summary>Return the PGP secret key associated with the given key id.</summary>
  8849. <param name="keyId">The ID of the secret key to return.</param>
  8850. </member>
  8851. <member name="M:Org.BouncyCastle.Bcpg.OpenPgp.PgpSecretKeyRingBundle.GetSecretKeyRing(System.Int64)">
  8852. <summary>Return the secret key ring which contains the key referred to by keyId</summary>
  8853. <param name="keyId">The ID of the secret key</param>
  8854. </member>
  8855. <member name="M:Org.BouncyCastle.Bcpg.OpenPgp.PgpSecretKeyRingBundle.Contains(System.Int64)">
  8856. <summary>
  8857. Return true if a key matching the passed in key ID is present, false otherwise.
  8858. </summary>
  8859. <param name="keyID">key ID to look for.</param>
  8860. </member>
  8861. <member name="M:Org.BouncyCastle.Bcpg.OpenPgp.PgpSecretKeyRingBundle.AddSecretKeyRing(Org.BouncyCastle.Bcpg.OpenPgp.PgpSecretKeyRingBundle,Org.BouncyCastle.Bcpg.OpenPgp.PgpSecretKeyRing)">
  8862. <summary>
  8863. Return a new bundle containing the contents of the passed in bundle and
  8864. the passed in secret key ring.
  8865. </summary>
  8866. <param name="bundle">The <c>PgpSecretKeyRingBundle</c> the key ring is to be added to.</param>
  8867. <param name="secretKeyRing">The key ring to be added.</param>
  8868. <returns>A new <c>PgpSecretKeyRingBundle</c> merging the current one with the passed in key ring.</returns>
  8869. <exception cref="T:System.ArgumentException">If the keyId for the passed in key ring is already present.</exception>
  8870. </member>
  8871. <member name="M:Org.BouncyCastle.Bcpg.OpenPgp.PgpSecretKeyRingBundle.RemoveSecretKeyRing(Org.BouncyCastle.Bcpg.OpenPgp.PgpSecretKeyRingBundle,Org.BouncyCastle.Bcpg.OpenPgp.PgpSecretKeyRing)">
  8872. <summary>
  8873. Return a new bundle containing the contents of the passed in bundle with
  8874. the passed in secret key ring removed.
  8875. </summary>
  8876. <param name="bundle">The <c>PgpSecretKeyRingBundle</c> the key ring is to be removed from.</param>
  8877. <param name="secretKeyRing">The key ring to be removed.</param>
  8878. <returns>A new <c>PgpSecretKeyRingBundle</c> not containing the passed in key ring.</returns>
  8879. <exception cref="T:System.ArgumentException">If the keyId for the passed in key ring is not present.</exception>
  8880. </member>
  8881. <member name="T:Org.BouncyCastle.Bcpg.OpenPgp.PgpSignature">
  8882. <remarks>A PGP signature object.</remarks>
  8883. </member>
  8884. <member name="P:Org.BouncyCastle.Bcpg.OpenPgp.PgpSignature.Version">
  8885. <summary>The OpenPGP version number for this signature.</summary>
  8886. </member>
  8887. <member name="P:Org.BouncyCastle.Bcpg.OpenPgp.PgpSignature.KeyAlgorithm">
  8888. <summary>The key algorithm associated with this signature.</summary>
  8889. </member>
  8890. <member name="P:Org.BouncyCastle.Bcpg.OpenPgp.PgpSignature.HashAlgorithm">
  8891. <summary>The hash algorithm associated with this signature.</summary>
  8892. </member>
  8893. <member name="M:Org.BouncyCastle.Bcpg.OpenPgp.PgpSignature.IsCertification">
  8894. <summary>Return true if this signature represents a certification.</summary>
  8895. </member>
  8896. <member name="M:Org.BouncyCastle.Bcpg.OpenPgp.PgpSignature.VerifyCertification(Org.BouncyCastle.Bcpg.OpenPgp.PgpUserAttributeSubpacketVector,Org.BouncyCastle.Bcpg.OpenPgp.PgpPublicKey)">
  8897. <summary>
  8898. Verify the signature as certifying the passed in public key as associated
  8899. with the passed in user attributes.
  8900. </summary>
  8901. <param name="userAttributes">User attributes the key was stored under.</param>
  8902. <param name="key">The key to be verified.</param>
  8903. <returns>True, if the signature matches, false otherwise.</returns>
  8904. </member>
  8905. <member name="M:Org.BouncyCastle.Bcpg.OpenPgp.PgpSignature.VerifyCertification(System.String,Org.BouncyCastle.Bcpg.OpenPgp.PgpPublicKey)">
  8906. <summary>
  8907. Verify the signature as certifying the passed in public key as associated
  8908. with the passed in ID.
  8909. </summary>
  8910. <param name="id">ID the key was stored under.</param>
  8911. <param name="key">The key to be verified.</param>
  8912. <returns>True, if the signature matches, false otherwise.</returns>
  8913. </member>
  8914. <member name="M:Org.BouncyCastle.Bcpg.OpenPgp.PgpSignature.VerifyCertification(Org.BouncyCastle.Bcpg.OpenPgp.PgpPublicKey,Org.BouncyCastle.Bcpg.OpenPgp.PgpPublicKey)">
  8915. <summary>Verify a certification for the passed in key against the passed in master key.</summary>
  8916. <param name="masterKey">The key we are verifying against.</param>
  8917. <param name="pubKey">The key we are verifying.</param>
  8918. <returns>True, if the certification is valid, false otherwise.</returns>
  8919. </member>
  8920. <member name="M:Org.BouncyCastle.Bcpg.OpenPgp.PgpSignature.VerifyCertification(Org.BouncyCastle.Bcpg.OpenPgp.PgpPublicKey)">
  8921. <summary>Verify a key certification, such as revocation, for the passed in key.</summary>
  8922. <param name="pubKey">The key we are checking.</param>
  8923. <returns>True, if the certification is valid, false otherwise.</returns>
  8924. </member>
  8925. <member name="P:Org.BouncyCastle.Bcpg.OpenPgp.PgpSignature.KeyId">
  8926. <summary>The ID of the key that created the signature.</summary>
  8927. </member>
  8928. <member name="P:Org.BouncyCastle.Bcpg.OpenPgp.PgpSignature.CreationTime">
  8929. <summary>The creation time of this signature.</summary>
  8930. </member>
  8931. <member name="P:Org.BouncyCastle.Bcpg.OpenPgp.PgpSignature.HasSubpackets">
  8932. <summary>
  8933. Return true if the signature has either hashed or unhashed subpackets.
  8934. </summary>
  8935. </member>
  8936. <member name="M:Org.BouncyCastle.Bcpg.OpenPgp.PgpSignature.IsCertification(System.Int32)">
  8937. <summary>
  8938. Return true if the passed in signature type represents a certification, false if the signature type is not.
  8939. </summary>
  8940. <param name="signatureType"></param>
  8941. <returns>true if signatureType is a certification, false otherwise.</returns>
  8942. </member>
  8943. <member name="T:Org.BouncyCastle.Bcpg.OpenPgp.PgpSignatureGenerator">
  8944. <remarks>Generator for PGP signatures.</remarks>
  8945. </member>
  8946. <member name="M:Org.BouncyCastle.Bcpg.OpenPgp.PgpSignatureGenerator.#ctor(Org.BouncyCastle.Bcpg.PublicKeyAlgorithmTag,Org.BouncyCastle.Bcpg.HashAlgorithmTag)">
  8947. <summary>Create a generator for the passed in keyAlgorithm and hashAlgorithm codes.</summary>
  8948. </member>
  8949. <member name="M:Org.BouncyCastle.Bcpg.OpenPgp.PgpSignatureGenerator.InitSign(System.Int32,Org.BouncyCastle.Bcpg.OpenPgp.PgpPrivateKey)">
  8950. <summary>Initialise the generator for signing.</summary>
  8951. </member>
  8952. <member name="M:Org.BouncyCastle.Bcpg.OpenPgp.PgpSignatureGenerator.InitSign(System.Int32,Org.BouncyCastle.Bcpg.OpenPgp.PgpPrivateKey,Org.BouncyCastle.Security.SecureRandom)">
  8953. <summary>Initialise the generator for signing.</summary>
  8954. </member>
  8955. <member name="M:Org.BouncyCastle.Bcpg.OpenPgp.PgpSignatureGenerator.GenerateOnePassVersion(System.Boolean)">
  8956. <summary>Return the one pass header associated with the current signature.</summary>
  8957. </member>
  8958. <member name="M:Org.BouncyCastle.Bcpg.OpenPgp.PgpSignatureGenerator.Generate">
  8959. <summary>Return a signature object containing the current signature state.</summary>
  8960. </member>
  8961. <member name="M:Org.BouncyCastle.Bcpg.OpenPgp.PgpSignatureGenerator.GenerateCertification(System.String,Org.BouncyCastle.Bcpg.OpenPgp.PgpPublicKey)">
  8962. <summary>Generate a certification for the passed in ID and key.</summary>
  8963. <param name="id">The ID we are certifying against the public key.</param>
  8964. <param name="pubKey">The key we are certifying against the ID.</param>
  8965. <returns>The certification.</returns>
  8966. </member>
  8967. <member name="M:Org.BouncyCastle.Bcpg.OpenPgp.PgpSignatureGenerator.GenerateCertification(Org.BouncyCastle.Bcpg.OpenPgp.PgpUserAttributeSubpacketVector,Org.BouncyCastle.Bcpg.OpenPgp.PgpPublicKey)">
  8968. <summary>Generate a certification for the passed in userAttributes.</summary>
  8969. <param name="userAttributes">The ID we are certifying against the public key.</param>
  8970. <param name="pubKey">The key we are certifying against the ID.</param>
  8971. <returns>The certification.</returns>
  8972. </member>
  8973. <member name="M:Org.BouncyCastle.Bcpg.OpenPgp.PgpSignatureGenerator.GenerateCertification(Org.BouncyCastle.Bcpg.OpenPgp.PgpPublicKey,Org.BouncyCastle.Bcpg.OpenPgp.PgpPublicKey)">
  8974. <summary>Generate a certification for the passed in key against the passed in master key.</summary>
  8975. <param name="masterKey">The key we are certifying against.</param>
  8976. <param name="pubKey">The key we are certifying.</param>
  8977. <returns>The certification.</returns>
  8978. </member>
  8979. <member name="M:Org.BouncyCastle.Bcpg.OpenPgp.PgpSignatureGenerator.GenerateCertification(Org.BouncyCastle.Bcpg.OpenPgp.PgpPublicKey)">
  8980. <summary>Generate a certification, such as a revocation, for the passed in key.</summary>
  8981. <param name="pubKey">The key we are certifying.</param>
  8982. <returns>The certification.</returns>
  8983. </member>
  8984. <member name="T:Org.BouncyCastle.Bcpg.OpenPgp.PgpSignatureList">
  8985. <remarks>A list of PGP signatures - normally in the signature block after literal data.</remarks>
  8986. </member>
  8987. <member name="T:Org.BouncyCastle.Bcpg.OpenPgp.PgpSignatureSubpacketGenerator">
  8988. <remarks>Generator for signature subpackets.</remarks>
  8989. </member>
  8990. <member name="M:Org.BouncyCastle.Bcpg.OpenPgp.PgpSignatureSubpacketGenerator.#ctor">
  8991. <summary>
  8992. Base constructor, creates an empty generator.
  8993. </summary>
  8994. </member>
  8995. <member name="M:Org.BouncyCastle.Bcpg.OpenPgp.PgpSignatureSubpacketGenerator.#ctor(Org.BouncyCastle.Bcpg.OpenPgp.PgpSignatureSubpacketVector)">
  8996. <summary>
  8997. Constructor for pre-initialising the generator from an existing one.
  8998. </summary>
  8999. <param name="sigSubV">
  9000. sigSubV an initial set of subpackets.
  9001. </param>
  9002. </member>
  9003. <member name="M:Org.BouncyCastle.Bcpg.OpenPgp.PgpSignatureSubpacketGenerator.SetTrust(System.Boolean,System.Int32,System.Int32)">
  9004. <summary>
  9005. Add a TrustSignature packet to the signature. The values for depth and trust are largely
  9006. installation dependent but there are some guidelines in RFC 4880 - 5.2.3.13.
  9007. </summary>
  9008. <param name="isCritical">true if the packet is critical.</param>
  9009. <param name="depth">depth level.</param>
  9010. <param name="trustAmount">trust amount.</param>
  9011. </member>
  9012. <member name="M:Org.BouncyCastle.Bcpg.OpenPgp.PgpSignatureSubpacketGenerator.SetKeyExpirationTime(System.Boolean,System.Int64)">
  9013. <summary>
  9014. Set the number of seconds a key is valid for after the time of its creation.
  9015. A value of zero means the key never expires.
  9016. </summary>
  9017. <param name="isCritical">True, if should be treated as critical, false otherwise.</param>
  9018. <param name="seconds">The number of seconds the key is valid, or zero if no expiry.</param>
  9019. </member>
  9020. <member name="M:Org.BouncyCastle.Bcpg.OpenPgp.PgpSignatureSubpacketGenerator.SetSignatureExpirationTime(System.Boolean,System.Int64)">
  9021. <summary>
  9022. Set the number of seconds a signature is valid for after the time of its creation.
  9023. A value of zero means the signature never expires.
  9024. </summary>
  9025. <param name="isCritical">True, if should be treated as critical, false otherwise.</param>
  9026. <param name="seconds">The number of seconds the signature is valid, or zero if no expiry.</param>
  9027. </member>
  9028. <member name="M:Org.BouncyCastle.Bcpg.OpenPgp.PgpSignatureSubpacketGenerator.SetSignatureCreationTime(System.Boolean,System.DateTime)">
  9029. <summary>
  9030. Set the creation time for the signature.
  9031. <p>
  9032. Note: this overrides the generation of a creation time when the signature
  9033. is generated.</p>
  9034. </summary>
  9035. </member>
  9036. <member name="M:Org.BouncyCastle.Bcpg.OpenPgp.PgpSignatureSubpacketGenerator.SetRevocationReason(System.Boolean,Org.BouncyCastle.Bcpg.RevocationReasonTag,System.String)">
  9037. <summary>
  9038. Sets revocation reason sub packet
  9039. </summary>
  9040. </member>
  9041. <member name="M:Org.BouncyCastle.Bcpg.OpenPgp.PgpSignatureSubpacketGenerator.SetRevocationKey(System.Boolean,Org.BouncyCastle.Bcpg.PublicKeyAlgorithmTag,System.Byte[])">
  9042. <summary>
  9043. Sets revocation key sub packet
  9044. </summary>
  9045. </member>
  9046. <member name="M:Org.BouncyCastle.Bcpg.OpenPgp.PgpSignatureSubpacketGenerator.SetIssuerKeyID(System.Boolean,System.Int64)">
  9047. <summary>
  9048. Sets issuer key sub packet
  9049. </summary>
  9050. </member>
  9051. <member name="T:Org.BouncyCastle.Bcpg.OpenPgp.PgpSignatureSubpacketVector">
  9052. <remarks>Container for a list of signature subpackets.</remarks>
  9053. </member>
  9054. <member name="M:Org.BouncyCastle.Bcpg.OpenPgp.PgpSignatureSubpacketVector.HasSubpacket(Org.BouncyCastle.Bcpg.SignatureSubpacketTag)">
  9055. Return true if a particular subpacket type exists.
  9056. @param type type to look for.
  9057. @return true if present, false otherwise.
  9058. </member>
  9059. <member name="M:Org.BouncyCastle.Bcpg.OpenPgp.PgpSignatureSubpacketVector.GetSubpackets(Org.BouncyCastle.Bcpg.SignatureSubpacketTag)">
  9060. Return all signature subpackets of the passed in type.
  9061. @param type subpacket type code
  9062. @return an array of zero or more matching subpackets.
  9063. </member>
  9064. <member name="M:Org.BouncyCastle.Bcpg.OpenPgp.PgpSignatureSubpacketVector.GetSignatureExpirationTime">
  9065. <summary>
  9066. Return the number of seconds a signature is valid for after its creation date.
  9067. A value of zero means the signature never expires.
  9068. </summary>
  9069. <returns>Seconds a signature is valid for.</returns>
  9070. </member>
  9071. <member name="M:Org.BouncyCastle.Bcpg.OpenPgp.PgpSignatureSubpacketVector.GetKeyExpirationTime">
  9072. <summary>
  9073. Return the number of seconds a key is valid for after its creation date.
  9074. A value of zero means the key never expires.
  9075. </summary>
  9076. <returns>Seconds a signature is valid for.</returns>
  9077. </member>
  9078. <member name="P:Org.BouncyCastle.Bcpg.OpenPgp.PgpSignatureSubpacketVector.Count">
  9079. <summary>Return the number of packets this vector contains.</summary>
  9080. </member>
  9081. <member name="T:Org.BouncyCastle.Bcpg.OpenPgp.PgpUserAttributeSubpacketVector">
  9082. <remarks>Container for a list of user attribute subpackets.</remarks>
  9083. </member>
  9084. <member name="T:Org.BouncyCastle.Bcpg.OpenPgp.PgpUtilities">
  9085. <remarks>Basic utility class.</remarks>
  9086. </member>
  9087. <member name="M:Org.BouncyCastle.Bcpg.OpenPgp.PgpUtilities.MakeKeyFromPassPhrase(Org.BouncyCastle.Bcpg.SymmetricKeyAlgorithmTag,Org.BouncyCastle.Bcpg.S2k,System.Char[])">
  9088. <remarks>
  9089. Conversion of the passphrase characters to bytes is performed using Convert.ToByte(), which is
  9090. the historical behaviour of the library (1.7 and earlier).
  9091. </remarks>
  9092. </member>
  9093. <member name="M:Org.BouncyCastle.Bcpg.OpenPgp.PgpUtilities.MakeKeyFromPassPhraseUtf8(Org.BouncyCastle.Bcpg.SymmetricKeyAlgorithmTag,Org.BouncyCastle.Bcpg.S2k,System.Char[])">
  9094. <remarks>
  9095. The passphrase is encoded to bytes using UTF8 (Encoding.UTF8.GetBytes).
  9096. </remarks>
  9097. </member>
  9098. <member name="M:Org.BouncyCastle.Bcpg.OpenPgp.PgpUtilities.MakeKeyFromPassPhraseRaw(Org.BouncyCastle.Bcpg.SymmetricKeyAlgorithmTag,Org.BouncyCastle.Bcpg.S2k,System.Byte[])">
  9099. <remarks>
  9100. Allows the caller to handle the encoding of the passphrase to bytes.
  9101. </remarks>
  9102. </member>
  9103. <member name="M:Org.BouncyCastle.Bcpg.OpenPgp.PgpUtilities.WriteFileToLiteralData(System.IO.Stream,System.Char,System.IO.FileInfo)">
  9104. <summary>Write out the passed in file as a literal data packet.</summary>
  9105. </member>
  9106. <member name="M:Org.BouncyCastle.Bcpg.OpenPgp.PgpUtilities.WriteFileToLiteralData(System.IO.Stream,System.Char,System.IO.FileInfo,System.Byte[])">
  9107. <summary>Write out the passed in file as a literal data packet in partial packet format.</summary>
  9108. </member>
  9109. <member name="M:Org.BouncyCastle.Bcpg.OpenPgp.PgpUtilities.GetDecoderStream(System.IO.Stream)">
  9110. <summary>
  9111. Return either an ArmoredInputStream or a BcpgInputStream based on whether
  9112. the initial characters of the stream are binary PGP encodings or not.
  9113. </summary>
  9114. </member>
  9115. <member name="T:Org.BouncyCastle.Bcpg.OpenPgp.PgpV3SignatureGenerator">
  9116. <remarks>Generator for old style PGP V3 Signatures.</remarks>
  9117. </member>
  9118. <member name="M:Org.BouncyCastle.Bcpg.OpenPgp.PgpV3SignatureGenerator.#ctor(Org.BouncyCastle.Bcpg.PublicKeyAlgorithmTag,Org.BouncyCastle.Bcpg.HashAlgorithmTag)">
  9119. <summary>Create a generator for the passed in keyAlgorithm and hashAlgorithm codes.</summary>
  9120. </member>
  9121. <member name="M:Org.BouncyCastle.Bcpg.OpenPgp.PgpV3SignatureGenerator.InitSign(System.Int32,Org.BouncyCastle.Bcpg.OpenPgp.PgpPrivateKey)">
  9122. <summary>Initialise the generator for signing.</summary>
  9123. </member>
  9124. <member name="M:Org.BouncyCastle.Bcpg.OpenPgp.PgpV3SignatureGenerator.InitSign(System.Int32,Org.BouncyCastle.Bcpg.OpenPgp.PgpPrivateKey,Org.BouncyCastle.Security.SecureRandom)">
  9125. <summary>Initialise the generator for signing.</summary>
  9126. </member>
  9127. <member name="M:Org.BouncyCastle.Bcpg.OpenPgp.PgpV3SignatureGenerator.GenerateOnePassVersion(System.Boolean)">
  9128. <summary>Return the one pass header associated with the current signature.</summary>
  9129. </member>
  9130. <member name="M:Org.BouncyCastle.Bcpg.OpenPgp.PgpV3SignatureGenerator.Generate">
  9131. <summary>Return a V3 signature object containing the current signature state.</summary>
  9132. </member>
  9133. <member name="T:Org.BouncyCastle.Bcpg.OpenPgp.SXprUtilities">
  9134. Utility functions for looking a S-expression keys. This class will move when it finds a better home!
  9135. <p>
  9136. Format documented here:
  9137. http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg.git;a=blob;f=agent/keyformat.txt;h=42c4b1f06faf1bbe71ffadc2fee0fad6bec91a97;hb=refs/heads/master
  9138. </p>
  9139. </member>
  9140. <member name="M:Org.BouncyCastle.Cmp.GeneralPkiMessage.#ctor(Org.BouncyCastle.Asn1.Cmp.PkiMessage)">
  9141. <summary>
  9142. Wrap a PKIMessage ASN.1 structure.
  9143. </summary>
  9144. <param name="pkiMessage">PKI message.</param>
  9145. </member>
  9146. <member name="M:Org.BouncyCastle.Cmp.GeneralPkiMessage.#ctor(System.Byte[])">
  9147. <summary>
  9148. Create a PKIMessage from the passed in bytes.
  9149. </summary>
  9150. <param name="encoding">BER/DER encoding of the PKIMessage</param>
  9151. </member>
  9152. <member name="P:Org.BouncyCastle.Cmp.GeneralPkiMessage.HasProtection">
  9153. <summary>
  9154. Return true if this message has protection bits on it. A return value of true
  9155. indicates the message can be used to construct a ProtectedPKIMessage.
  9156. </summary>
  9157. </member>
  9158. <member name="T:Org.BouncyCastle.Cmp.ProtectedPkiMessage">
  9159. <summary>
  9160. Wrapper for a PKIMessage with protection attached to it.
  9161. </summary>
  9162. </member>
  9163. <member name="M:Org.BouncyCastle.Cmp.ProtectedPkiMessage.#ctor(Org.BouncyCastle.Cmp.GeneralPkiMessage)">
  9164. <summary>
  9165. Wrap a general message.
  9166. </summary>
  9167. <exception cref="T:System.ArgumentException">If the general message does not have protection.</exception>
  9168. <param name="pkiMessage">The General message</param>
  9169. </member>
  9170. <member name="M:Org.BouncyCastle.Cmp.ProtectedPkiMessage.#ctor(Org.BouncyCastle.Asn1.Cmp.PkiMessage)">
  9171. <summary>
  9172. Wrap a PKI message.
  9173. </summary>
  9174. <exception cref="T:System.ArgumentException">If the PKI message does not have protection.</exception>
  9175. <param name="pkiMessage">The PKI message</param>
  9176. </member>
  9177. <member name="P:Org.BouncyCastle.Cmp.ProtectedPkiMessage.Header">
  9178. <summary>
  9179. Message header
  9180. </summary>
  9181. </member>
  9182. <member name="P:Org.BouncyCastle.Cmp.ProtectedPkiMessage.Body">
  9183. <summary>
  9184. Message Body
  9185. </summary>
  9186. </member>
  9187. <member name="M:Org.BouncyCastle.Cmp.ProtectedPkiMessage.ToAsn1Message">
  9188. <summary>
  9189. Return the underlying ASN.1 structure contained in this object.
  9190. </summary>
  9191. <returns>PKI Message structure</returns>
  9192. </member>
  9193. <member name="P:Org.BouncyCastle.Cmp.ProtectedPkiMessage.HasPasswordBasedMacProtected">
  9194. <summary>
  9195. Determine whether the message is protected by a password based MAC. Use verify(PKMACBuilder, char[])
  9196. to verify the message if this method returns true.
  9197. </summary>
  9198. <returns>true if protection MAC PBE based, false otherwise.</returns>
  9199. </member>
  9200. <member name="M:Org.BouncyCastle.Cmp.ProtectedPkiMessage.GetCertificates">
  9201. <summary>
  9202. Return the extra certificates associated with this message.
  9203. </summary>
  9204. <returns>an array of extra certificates, zero length if none present.</returns>
  9205. </member>
  9206. <member name="M:Org.BouncyCastle.Cmp.ProtectedPkiMessage.Verify(Org.BouncyCastle.Crypto.IVerifierFactory)">
  9207. <summary>
  9208. Verify a message with a public key based signature attached.
  9209. </summary>
  9210. <param name="verifierFactory">a factory of signature verifiers.</param>
  9211. <returns>true if the provider is able to create a verifier that validates the signature, false otherwise.</returns>
  9212. </member>
  9213. <member name="M:Org.BouncyCastle.Cmp.ProtectedPkiMessage.Verify(Org.BouncyCastle.Crmf.PKMacBuilder,System.Char[])">
  9214. <summary>
  9215. Verify a message with password based MAC protection.
  9216. </summary>
  9217. <param name="pkMacBuilder">MAC builder that can be used to construct the appropriate MacCalculator</param>
  9218. <param name="password">the MAC password</param>
  9219. <returns>true if the passed in password and MAC builder verify the message, false otherwise.</returns>
  9220. <exception cref="T:System.InvalidOperationException">if algorithm not MAC based, or an exception is thrown verifying the MAC.</exception>
  9221. </member>
  9222. <member name="T:Org.BouncyCastle.Cms.CmsAttributeTableParameter">
  9223. <remarks>
  9224. The 'Signature' parameter is only available when generating unsigned attributes.
  9225. </remarks>
  9226. </member>
  9227. <member name="T:Org.BouncyCastle.Cms.CmsAuthenticatedData">
  9228. containing class for an CMS Authenticated Data object
  9229. </member>
  9230. <member name="P:Org.BouncyCastle.Cms.CmsAuthenticatedData.MacAlgOid">
  9231. return the object identifier for the content MAC algorithm.
  9232. </member>
  9233. <member name="M:Org.BouncyCastle.Cms.CmsAuthenticatedData.GetRecipientInfos">
  9234. return a store of the intended recipients for this message
  9235. </member>
  9236. <member name="P:Org.BouncyCastle.Cms.CmsAuthenticatedData.ContentInfo">
  9237. return the ContentInfo
  9238. </member>
  9239. <member name="M:Org.BouncyCastle.Cms.CmsAuthenticatedData.GetAuthAttrs">
  9240. return a table of the digested attributes indexed by
  9241. the OID of the attribute.
  9242. </member>
  9243. <member name="M:Org.BouncyCastle.Cms.CmsAuthenticatedData.GetUnauthAttrs">
  9244. return a table of the undigested attributes indexed by
  9245. the OID of the attribute.
  9246. </member>
  9247. <member name="M:Org.BouncyCastle.Cms.CmsAuthenticatedData.GetEncoded">
  9248. return the ASN.1 encoded representation of this object.
  9249. </member>
  9250. <member name="T:Org.BouncyCastle.Cms.CmsAuthenticatedDataGenerator">
  9251. General class for generating a CMS authenticated-data message.
  9252. A simple example of usage.
  9253. <pre>
  9254. CMSAuthenticatedDataGenerator fact = new CMSAuthenticatedDataGenerator();
  9255. fact.addKeyTransRecipient(cert);
  9256. CMSAuthenticatedData data = fact.generate(content, algorithm, "BC");
  9257. </pre>
  9258. </member>
  9259. <member name="M:Org.BouncyCastle.Cms.CmsAuthenticatedDataGenerator.#ctor">
  9260. base constructor
  9261. </member>
  9262. <member name="M:Org.BouncyCastle.Cms.CmsAuthenticatedDataGenerator.#ctor(Org.BouncyCastle.Security.SecureRandom)">
  9263. constructor allowing specific source of randomness
  9264. @param rand instance of SecureRandom to use
  9265. </member>
  9266. <member name="M:Org.BouncyCastle.Cms.CmsAuthenticatedDataGenerator.Generate(Org.BouncyCastle.Cms.CmsProcessable,System.String,Org.BouncyCastle.Crypto.CipherKeyGenerator)">
  9267. generate an enveloped object that contains an CMS Enveloped Data
  9268. object using the given provider and the passed in key generator.
  9269. </member>
  9270. <member name="M:Org.BouncyCastle.Cms.CmsAuthenticatedDataGenerator.Generate(Org.BouncyCastle.Cms.CmsProcessable,System.String)">
  9271. generate an authenticated object that contains an CMS Authenticated Data object
  9272. </member>
  9273. <member name="T:Org.BouncyCastle.Cms.CmsAuthenticatedDataParser">
  9274. Parsing class for an CMS Authenticated Data object from an input stream.
  9275. <p>
  9276. Note: that because we are in a streaming mode only one recipient can be tried and it is important
  9277. that the methods on the parser are called in the appropriate order.
  9278. </p>
  9279. <p>
  9280. Example of use - assuming the first recipient matches the private key we have.
  9281. <pre>
  9282. CMSAuthenticatedDataParser ad = new CMSAuthenticatedDataParser(inputStream);
  9283. RecipientInformationStore recipients = ad.getRecipientInfos();
  9284. Collection c = recipients.getRecipients();
  9285. Iterator it = c.iterator();
  9286. if (it.hasNext())
  9287. {
  9288. RecipientInformation recipient = (RecipientInformation)it.next();
  9289. CMSTypedStream recData = recipient.getContentStream(privateKey, "BC");
  9290. processDataStream(recData.getContentStream());
  9291. if (!Arrays.equals(ad.getMac(), recipient.getMac())
  9292. {
  9293. System.err.println("Data corrupted!!!!");
  9294. }
  9295. }
  9296. </pre>
  9297. Note: this class does not introduce buffering - if you are processing large files you should create
  9298. the parser with:
  9299. <pre>
  9300. CMSAuthenticatedDataParser ep = new CMSAuthenticatedDataParser(new BufferedInputStream(inputStream, bufSize));
  9301. </pre>
  9302. where bufSize is a suitably large buffer size.
  9303. </p>
  9304. </member>
  9305. <member name="P:Org.BouncyCastle.Cms.CmsAuthenticatedDataParser.MacAlgOid">
  9306. return the object identifier for the mac algorithm.
  9307. </member>
  9308. <member name="P:Org.BouncyCastle.Cms.CmsAuthenticatedDataParser.MacAlgParams">
  9309. return the ASN.1 encoded encryption algorithm parameters, or null if
  9310. there aren't any.
  9311. </member>
  9312. <member name="M:Org.BouncyCastle.Cms.CmsAuthenticatedDataParser.GetRecipientInfos">
  9313. return a store of the intended recipients for this message
  9314. </member>
  9315. <member name="M:Org.BouncyCastle.Cms.CmsAuthenticatedDataParser.GetAuthAttrs">
  9316. return a table of the unauthenticated attributes indexed by
  9317. the OID of the attribute.
  9318. @exception java.io.IOException
  9319. </member>
  9320. <member name="M:Org.BouncyCastle.Cms.CmsAuthenticatedDataParser.GetUnauthAttrs">
  9321. return a table of the unauthenticated attributes indexed by
  9322. the OID of the attribute.
  9323. @exception java.io.IOException
  9324. </member>
  9325. <member name="T:Org.BouncyCastle.Cms.CmsAuthenticatedDataStreamGenerator">
  9326. General class for generating a CMS authenticated-data message stream.
  9327. <p>
  9328. A simple example of usage.
  9329. <pre>
  9330. CMSAuthenticatedDataStreamGenerator edGen = new CMSAuthenticatedDataStreamGenerator();
  9331. edGen.addKeyTransRecipient(cert);
  9332. ByteArrayOutputStream bOut = new ByteArrayOutputStream();
  9333. OutputStream out = edGen.open(
  9334. bOut, CMSAuthenticatedDataGenerator.AES128_CBC, "BC");*
  9335. out.write(data);
  9336. out.close();
  9337. </pre>
  9338. </p>
  9339. </member>
  9340. <member name="M:Org.BouncyCastle.Cms.CmsAuthenticatedDataStreamGenerator.#ctor">
  9341. base constructor
  9342. </member>
  9343. <member name="M:Org.BouncyCastle.Cms.CmsAuthenticatedDataStreamGenerator.#ctor(Org.BouncyCastle.Security.SecureRandom)">
  9344. constructor allowing specific source of randomness
  9345. @param rand instance of SecureRandom to use
  9346. </member>
  9347. <member name="M:Org.BouncyCastle.Cms.CmsAuthenticatedDataStreamGenerator.SetBufferSize(System.Int32)">
  9348. Set the underlying string size for encapsulated data
  9349. @param bufferSize length of octet strings to buffer the data.
  9350. </member>
  9351. <member name="M:Org.BouncyCastle.Cms.CmsAuthenticatedDataStreamGenerator.SetBerEncodeRecipients(System.Boolean)">
  9352. Use a BER Set to store the recipient information
  9353. </member>
  9354. <member name="M:Org.BouncyCastle.Cms.CmsAuthenticatedDataStreamGenerator.Open(System.IO.Stream,System.String,Org.BouncyCastle.Crypto.CipherKeyGenerator)">
  9355. generate an enveloped object that contains an CMS Enveloped Data
  9356. object using the given provider and the passed in key generator.
  9357. @throws java.io.IOException
  9358. </member>
  9359. <member name="M:Org.BouncyCastle.Cms.CmsAuthenticatedDataStreamGenerator.Open(System.IO.Stream,System.String)">
  9360. generate an enveloped object that contains an CMS Enveloped Data object
  9361. </member>
  9362. <member name="M:Org.BouncyCastle.Cms.CmsAuthenticatedDataStreamGenerator.Open(System.IO.Stream,System.String,System.Int32)">
  9363. generate an enveloped object that contains an CMS Enveloped Data object
  9364. </member>
  9365. <member name="M:Org.BouncyCastle.Cms.CmsAuthenticatedGenerator.#ctor">
  9366. base constructor
  9367. </member>
  9368. <member name="M:Org.BouncyCastle.Cms.CmsAuthenticatedGenerator.#ctor(Org.BouncyCastle.Security.SecureRandom)">
  9369. constructor allowing specific source of randomness
  9370. @param rand instance of SecureRandom to use
  9371. </member>
  9372. <member name="T:Org.BouncyCastle.Cms.CmsAuthEnvelopedData">
  9373. containing class for an CMS AuthEnveloped Data object
  9374. </member>
  9375. <member name="T:Org.BouncyCastle.Cms.CmsCompressedData">
  9376. containing class for an CMS Compressed Data object
  9377. </member>
  9378. <member name="M:Org.BouncyCastle.Cms.CmsCompressedData.GetContent">
  9379. Return the uncompressed content.
  9380. @return the uncompressed content
  9381. @throws CmsException if there is an exception uncompressing the data.
  9382. </member>
  9383. <member name="M:Org.BouncyCastle.Cms.CmsCompressedData.GetContent(System.Int32)">
  9384. Return the uncompressed content, throwing an exception if the data size
  9385. is greater than the passed in limit. If the content is exceeded getCause()
  9386. on the CMSException will contain a StreamOverflowException
  9387. @param limit maximum number of bytes to read
  9388. @return the content read
  9389. @throws CMSException if there is an exception uncompressing the data.
  9390. </member>
  9391. <member name="P:Org.BouncyCastle.Cms.CmsCompressedData.ContentInfo">
  9392. return the ContentInfo
  9393. </member>
  9394. <member name="M:Org.BouncyCastle.Cms.CmsCompressedData.GetEncoded">
  9395. return the ASN.1 encoded representation of this object.
  9396. </member>
  9397. <member name="T:Org.BouncyCastle.Cms.CmsCompressedDataGenerator">
  9398. * General class for generating a compressed CMS message.
  9399. * <p>
  9400. * A simple example of usage.</p>
  9401. * <p>
  9402. * <pre>
  9403. * CMSCompressedDataGenerator fact = new CMSCompressedDataGenerator();
  9404. * CMSCompressedData data = fact.Generate(content, algorithm);
  9405. * </pre>
  9406. * </p>
  9407. </member>
  9408. <member name="M:Org.BouncyCastle.Cms.CmsCompressedDataGenerator.Generate(Org.BouncyCastle.Cms.CmsProcessable,System.String)">
  9409. Generate an object that contains an CMS Compressed Data
  9410. </member>
  9411. <member name="T:Org.BouncyCastle.Cms.CmsCompressedDataParser">
  9412. Class for reading a CMS Compressed Data stream.
  9413. <pre>
  9414. CMSCompressedDataParser cp = new CMSCompressedDataParser(inputStream);
  9415. process(cp.GetContent().GetContentStream());
  9416. </pre>
  9417. Note: this class does not introduce buffering - if you are processing large files you should create
  9418. the parser with:
  9419. <pre>
  9420. CMSCompressedDataParser ep = new CMSCompressedDataParser(new BufferedInputStream(inputStream, bufSize));
  9421. </pre>
  9422. where bufSize is a suitably large buffer size.
  9423. </member>
  9424. <member name="T:Org.BouncyCastle.Cms.CmsCompressedDataStreamGenerator">
  9425. General class for generating a compressed CMS message stream.
  9426. <p>
  9427. A simple example of usage.
  9428. </p>
  9429. <pre>
  9430. CMSCompressedDataStreamGenerator gen = new CMSCompressedDataStreamGenerator();
  9431. Stream cOut = gen.Open(outputStream, CMSCompressedDataStreamGenerator.ZLIB);
  9432. cOut.Write(data);
  9433. cOut.Close();
  9434. </pre>
  9435. </member>
  9436. <member name="M:Org.BouncyCastle.Cms.CmsCompressedDataStreamGenerator.#ctor">
  9437. base constructor
  9438. </member>
  9439. <member name="M:Org.BouncyCastle.Cms.CmsCompressedDataStreamGenerator.SetBufferSize(System.Int32)">
  9440. Set the underlying string size for encapsulated data
  9441. @param bufferSize length of octet strings to buffer the data.
  9442. </member>
  9443. <member name="M:Org.BouncyCastle.Cms.CmsContentInfoParser.Close">
  9444. Close the underlying data stream.
  9445. @throws IOException if the close fails.
  9446. </member>
  9447. <member name="T:Org.BouncyCastle.Cms.CmsEnvelopedData">
  9448. containing class for an CMS Enveloped Data object
  9449. </member>
  9450. <member name="P:Org.BouncyCastle.Cms.CmsEnvelopedData.EncryptionAlgOid">
  9451. return the object identifier for the content encryption algorithm.
  9452. </member>
  9453. <member name="M:Org.BouncyCastle.Cms.CmsEnvelopedData.GetRecipientInfos">
  9454. return a store of the intended recipients for this message
  9455. </member>
  9456. <member name="P:Org.BouncyCastle.Cms.CmsEnvelopedData.ContentInfo">
  9457. return the ContentInfo
  9458. </member>
  9459. <member name="M:Org.BouncyCastle.Cms.CmsEnvelopedData.GetUnprotectedAttributes">
  9460. return a table of the unprotected attributes indexed by
  9461. the OID of the attribute.
  9462. </member>
  9463. <member name="M:Org.BouncyCastle.Cms.CmsEnvelopedData.GetEncoded">
  9464. return the ASN.1 encoded representation of this object.
  9465. </member>
  9466. <member name="T:Org.BouncyCastle.Cms.CmsEnvelopedDataGenerator">
  9467. <remarks>
  9468. General class for generating a CMS enveloped-data message.
  9469. A simple example of usage.
  9470. <pre>
  9471. CmsEnvelopedDataGenerator fact = new CmsEnvelopedDataGenerator();
  9472. fact.AddKeyTransRecipient(cert);
  9473. CmsEnvelopedData data = fact.Generate(content, algorithm);
  9474. </pre>
  9475. </remarks>
  9476. </member>
  9477. <member name="M:Org.BouncyCastle.Cms.CmsEnvelopedDataGenerator.#ctor(Org.BouncyCastle.Security.SecureRandom)">
  9478. <summary>Constructor allowing specific source of randomness</summary>
  9479. <param name="rand">Instance of <c>SecureRandom</c> to use.</param>
  9480. </member>
  9481. <member name="M:Org.BouncyCastle.Cms.CmsEnvelopedDataGenerator.Generate(Org.BouncyCastle.Cms.CmsProcessable,System.String,Org.BouncyCastle.Crypto.CipherKeyGenerator)">
  9482. <summary>
  9483. Generate an enveloped object that contains a CMS Enveloped Data
  9484. object using the passed in key generator.
  9485. </summary>
  9486. </member>
  9487. <member name="M:Org.BouncyCastle.Cms.CmsEnvelopedDataGenerator.Generate(Org.BouncyCastle.Cms.CmsProcessable,System.String)">
  9488. <summary>Generate an enveloped object that contains an CMS Enveloped Data object.</summary>
  9489. </member>
  9490. <member name="M:Org.BouncyCastle.Cms.CmsEnvelopedDataGenerator.Generate(Org.BouncyCastle.Cms.CmsProcessable,System.String,System.Int32)">
  9491. <summary>Generate an enveloped object that contains an CMS Enveloped Data object.</summary>
  9492. </member>
  9493. <member name="T:Org.BouncyCastle.Cms.CmsEnvelopedDataParser">
  9494. Parsing class for an CMS Enveloped Data object from an input stream.
  9495. <p>
  9496. Note: that because we are in a streaming mode only one recipient can be tried and it is important
  9497. that the methods on the parser are called in the appropriate order.
  9498. </p>
  9499. <p>
  9500. Example of use - assuming the first recipient matches the private key we have.
  9501. <pre>
  9502. CmsEnvelopedDataParser ep = new CmsEnvelopedDataParser(inputStream);
  9503. RecipientInformationStore recipients = ep.GetRecipientInfos();
  9504. Collection c = recipients.getRecipients();
  9505. Iterator it = c.iterator();
  9506. if (it.hasNext())
  9507. {
  9508. RecipientInformation recipient = (RecipientInformation)it.next();
  9509. CMSTypedStream recData = recipient.getContentStream(privateKey);
  9510. processDataStream(recData.getContentStream());
  9511. }
  9512. </pre>
  9513. Note: this class does not introduce buffering - if you are processing large files you should create
  9514. the parser with:
  9515. <pre>
  9516. CmsEnvelopedDataParser ep = new CmsEnvelopedDataParser(new BufferedInputStream(inputStream, bufSize));
  9517. </pre>
  9518. where bufSize is a suitably large buffer size.
  9519. </p>
  9520. </member>
  9521. <member name="P:Org.BouncyCastle.Cms.CmsEnvelopedDataParser.EncryptionAlgOid">
  9522. return the object identifier for the content encryption algorithm.
  9523. </member>
  9524. <member name="P:Org.BouncyCastle.Cms.CmsEnvelopedDataParser.EncryptionAlgParams">
  9525. return the ASN.1 encoded encryption algorithm parameters, or null if
  9526. there aren't any.
  9527. </member>
  9528. <member name="M:Org.BouncyCastle.Cms.CmsEnvelopedDataParser.GetRecipientInfos">
  9529. return a store of the intended recipients for this message
  9530. </member>
  9531. <member name="M:Org.BouncyCastle.Cms.CmsEnvelopedDataParser.GetUnprotectedAttributes">
  9532. return a table of the unprotected attributes indexed by
  9533. the OID of the attribute.
  9534. @throws IOException
  9535. </member>
  9536. <member name="T:Org.BouncyCastle.Cms.CmsEnvelopedDataStreamGenerator">
  9537. General class for generating a CMS enveloped-data message stream.
  9538. <p>
  9539. A simple example of usage.
  9540. <pre>
  9541. CmsEnvelopedDataStreamGenerator edGen = new CmsEnvelopedDataStreamGenerator();
  9542. edGen.AddKeyTransRecipient(cert);
  9543. MemoryStream bOut = new MemoryStream();
  9544. Stream out = edGen.Open(
  9545. bOut, CMSEnvelopedDataGenerator.AES128_CBC);*
  9546. out.Write(data);
  9547. out.Close();
  9548. </pre>
  9549. </p>
  9550. </member>
  9551. <member name="M:Org.BouncyCastle.Cms.CmsEnvelopedDataStreamGenerator.#ctor(Org.BouncyCastle.Security.SecureRandom)">
  9552. <summary>Constructor allowing specific source of randomness</summary>
  9553. <param name="rand">Instance of <c>SecureRandom</c> to use.</param>
  9554. </member>
  9555. <member name="M:Org.BouncyCastle.Cms.CmsEnvelopedDataStreamGenerator.SetBufferSize(System.Int32)">
  9556. <summary>Set the underlying string size for encapsulated data.</summary>
  9557. <param name="bufferSize">Length of octet strings to buffer the data.</param>
  9558. </member>
  9559. <member name="M:Org.BouncyCastle.Cms.CmsEnvelopedDataStreamGenerator.SetBerEncodeRecipients(System.Boolean)">
  9560. <summary>Use a BER Set to store the recipient information.</summary>
  9561. </member>
  9562. <member name="M:Org.BouncyCastle.Cms.CmsEnvelopedDataStreamGenerator.Open(System.IO.Stream,System.String,Org.BouncyCastle.Crypto.CipherKeyGenerator)">
  9563. <summary>
  9564. Generate an enveloped object that contains an CMS Enveloped Data
  9565. object using the passed in key generator.
  9566. </summary>
  9567. </member>
  9568. <member name="M:Org.BouncyCastle.Cms.CmsEnvelopedDataStreamGenerator.Open(System.IO.Stream,System.String)">
  9569. generate an enveloped object that contains an CMS Enveloped Data object
  9570. @throws IOException
  9571. </member>
  9572. <member name="M:Org.BouncyCastle.Cms.CmsEnvelopedDataStreamGenerator.Open(System.IO.Stream,System.String,System.Int32)">
  9573. generate an enveloped object that contains an CMS Enveloped Data object
  9574. @throws IOException
  9575. </member>
  9576. <member name="T:Org.BouncyCastle.Cms.CmsEnvelopedGenerator">
  9577. General class for generating a CMS enveloped-data message.
  9578. A simple example of usage.
  9579. <pre>
  9580. CMSEnvelopedDataGenerator fact = new CMSEnvelopedDataGenerator();
  9581. fact.addKeyTransRecipient(cert);
  9582. CMSEnvelopedData data = fact.generate(content, algorithm, "BC");
  9583. </pre>
  9584. </member>
  9585. <member name="M:Org.BouncyCastle.Cms.CmsEnvelopedGenerator.#ctor(Org.BouncyCastle.Security.SecureRandom)">
  9586. <summary>Constructor allowing specific source of randomness</summary>
  9587. <param name="rand">Instance of <c>SecureRandom</c> to use.</param>
  9588. </member>
  9589. <member name="M:Org.BouncyCastle.Cms.CmsEnvelopedGenerator.AddKeyTransRecipient(Org.BouncyCastle.X509.X509Certificate)">
  9590. add a recipient.
  9591. @param cert recipient's public key certificate
  9592. @exception ArgumentException if there is a problem with the certificate
  9593. </member>
  9594. <member name="M:Org.BouncyCastle.Cms.CmsEnvelopedGenerator.AddKeyTransRecipient(Org.BouncyCastle.Crypto.AsymmetricKeyParameter,System.Byte[])">
  9595. add a recipient
  9596. @param key the public key used by the recipient
  9597. @param subKeyId the identifier for the recipient's public key
  9598. @exception ArgumentException if there is a problem with the key
  9599. </member>
  9600. <member name="M:Org.BouncyCastle.Cms.CmsEnvelopedGenerator.AddKekRecipient(System.String,Org.BouncyCastle.Crypto.Parameters.KeyParameter,System.Byte[])">
  9601. add a KEK recipient.
  9602. @param key the secret key to use for wrapping
  9603. @param keyIdentifier the byte string that identifies the key
  9604. </member>
  9605. <member name="M:Org.BouncyCastle.Cms.CmsEnvelopedGenerator.AddKekRecipient(System.String,Org.BouncyCastle.Crypto.Parameters.KeyParameter,Org.BouncyCastle.Asn1.Cms.KekIdentifier)">
  9606. add a KEK recipient.
  9607. @param key the secret key to use for wrapping
  9608. @param keyIdentifier the byte string that identifies the key
  9609. </member>
  9610. <member name="M:Org.BouncyCastle.Cms.CmsEnvelopedGenerator.AddKeyAgreementRecipient(System.String,Org.BouncyCastle.Crypto.AsymmetricKeyParameter,Org.BouncyCastle.Crypto.AsymmetricKeyParameter,Org.BouncyCastle.X509.X509Certificate,System.String)">
  9611. Add a key agreement based recipient.
  9612. @param agreementAlgorithm key agreement algorithm to use.
  9613. @param senderPrivateKey private key to initialise sender side of agreement with.
  9614. @param senderPublicKey sender public key to include with message.
  9615. @param recipientCert recipient's public key certificate.
  9616. @param cekWrapAlgorithm OID for key wrapping algorithm to use.
  9617. @exception SecurityUtilityException if the algorithm requested cannot be found
  9618. @exception InvalidKeyException if the keys are inappropriate for the algorithm specified
  9619. </member>
  9620. <member name="M:Org.BouncyCastle.Cms.CmsEnvelopedGenerator.AddKeyAgreementRecipients(System.String,Org.BouncyCastle.Crypto.AsymmetricKeyParameter,Org.BouncyCastle.Crypto.AsymmetricKeyParameter,System.Collections.ICollection,System.String)">
  9621. Add multiple key agreement based recipients (sharing a single KeyAgreeRecipientInfo structure).
  9622. @param agreementAlgorithm key agreement algorithm to use.
  9623. @param senderPrivateKey private key to initialise sender side of agreement with.
  9624. @param senderPublicKey sender public key to include with message.
  9625. @param recipientCerts recipients' public key certificates.
  9626. @param cekWrapAlgorithm OID for key wrapping algorithm to use.
  9627. @exception SecurityUtilityException if the algorithm requested cannot be found
  9628. @exception InvalidKeyException if the keys are inappropriate for the algorithm specified
  9629. </member>
  9630. <member name="M:Org.BouncyCastle.Cms.CmsEnvelopedGenerator.AddRecipientInfoGenerator(Org.BouncyCastle.Cms.RecipientInfoGenerator)">
  9631. <summary>
  9632. Add a generator to produce the recipient info required.
  9633. </summary>
  9634. <param name="recipientInfoGenerator">a generator of a recipient info object.</param>
  9635. </member>
  9636. <member name="M:Org.BouncyCastle.Cms.CmsProcessable.Write(System.IO.Stream)">
  9637. <summary>
  9638. Generic routine to copy out the data we want processed.
  9639. </summary>
  9640. <remarks>
  9641. This routine may be called multiple times.
  9642. </remarks>
  9643. </member>
  9644. <member name="T:Org.BouncyCastle.Cms.CmsProcessableByteArray">
  9645. a holding class for a byte array of data to be processed.
  9646. </member>
  9647. <member name="M:Org.BouncyCastle.Cms.CmsProcessableByteArray.GetContent">
  9648. <returns>A clone of the byte array</returns>
  9649. </member>
  9650. <member name="T:Org.BouncyCastle.Cms.CmsProcessableFile">
  9651. a holding class for a file of data to be processed.
  9652. </member>
  9653. <member name="M:Org.BouncyCastle.Cms.CmsProcessableFile.GetContent">
  9654. <returns>The file handle</returns>
  9655. </member>
  9656. <member name="T:Org.BouncyCastle.Cms.CmsSignedData">
  9657. general class for handling a pkcs7-signature message.
  9658. A simple example of usage - note, in the example below the validity of
  9659. the certificate isn't verified, just the fact that one of the certs
  9660. matches the given signer...
  9661. <pre>
  9662. IX509Store certs = s.GetCertificates();
  9663. SignerInformationStore signers = s.GetSignerInfos();
  9664. foreach (SignerInformation signer in signers.GetSigners())
  9665. {
  9666. ArrayList certList = new ArrayList(certs.GetMatches(signer.SignerID));
  9667. X509Certificate cert = (X509Certificate) certList[0];
  9668. if (signer.Verify(cert.GetPublicKey()))
  9669. {
  9670. verified++;
  9671. }
  9672. }
  9673. </pre>
  9674. </member>
  9675. <member name="M:Org.BouncyCastle.Cms.CmsSignedData.#ctor(System.Collections.IDictionary,System.Byte[])">
  9676. Content with detached signature, digests precomputed
  9677. @param hashes a map of precomputed digests for content indexed by name of hash.
  9678. @param sigBlock the signature object.
  9679. </member>
  9680. <member name="M:Org.BouncyCastle.Cms.CmsSignedData.#ctor(Org.BouncyCastle.Cms.CmsProcessable,System.IO.Stream)">
  9681. base constructor - content with detached signature.
  9682. @param signedContent the content that was signed.
  9683. @param sigData the signature object.
  9684. </member>
  9685. <member name="M:Org.BouncyCastle.Cms.CmsSignedData.#ctor(System.IO.Stream)">
  9686. base constructor - with encapsulated content
  9687. </member>
  9688. <member name="P:Org.BouncyCastle.Cms.CmsSignedData.Version">
  9689. <summary>Return the version number for this object.</summary>
  9690. </member>
  9691. <member name="M:Org.BouncyCastle.Cms.CmsSignedData.GetSignerInfos">
  9692. return the collection of signers that are associated with the
  9693. signatures for the message.
  9694. </member>
  9695. <member name="M:Org.BouncyCastle.Cms.CmsSignedData.GetAttributeCertificates(System.String)">
  9696. return a X509Store containing the attribute certificates, if any, contained
  9697. in this message.
  9698. @param type type of store to create
  9699. @return a store of attribute certificates
  9700. @exception NoSuchStoreException if the store type isn't available.
  9701. @exception CmsException if a general exception prevents creation of the X509Store
  9702. </member>
  9703. <member name="M:Org.BouncyCastle.Cms.CmsSignedData.GetCertificates(System.String)">
  9704. return a X509Store containing the public key certificates, if any, contained
  9705. in this message.
  9706. @param type type of store to create
  9707. @return a store of public key certificates
  9708. @exception NoSuchStoreException if the store type isn't available.
  9709. @exception CmsException if a general exception prevents creation of the X509Store
  9710. </member>
  9711. <member name="M:Org.BouncyCastle.Cms.CmsSignedData.GetCrls(System.String)">
  9712. return a X509Store containing CRLs, if any, contained
  9713. in this message.
  9714. @param type type of store to create
  9715. @return a store of CRLs
  9716. @exception NoSuchStoreException if the store type isn't available.
  9717. @exception CmsException if a general exception prevents creation of the X509Store
  9718. </member>
  9719. <member name="P:Org.BouncyCastle.Cms.CmsSignedData.SignedContentType">
  9720. <summary>
  9721. Return the <c>DerObjectIdentifier</c> associated with the encapsulated
  9722. content info structure carried in the signed data.
  9723. </summary>
  9724. </member>
  9725. <member name="P:Org.BouncyCastle.Cms.CmsSignedData.ContentInfo">
  9726. return the ContentInfo
  9727. </member>
  9728. <member name="M:Org.BouncyCastle.Cms.CmsSignedData.GetEncoded">
  9729. return the ASN.1 encoded representation of this object.
  9730. </member>
  9731. <member name="M:Org.BouncyCastle.Cms.CmsSignedData.GetEncoded(System.String)">
  9732. return the ASN.1 encoded representation of this object using the specified encoding.
  9733. @param encoding the ASN.1 encoding format to use ("BER" or "DER").
  9734. </member>
  9735. <member name="M:Org.BouncyCastle.Cms.CmsSignedData.ReplaceSigners(Org.BouncyCastle.Cms.CmsSignedData,Org.BouncyCastle.Cms.SignerInformationStore)">
  9736. Replace the signerinformation store associated with this
  9737. CmsSignedData object with the new one passed in. You would
  9738. probably only want to do this if you wanted to change the unsigned
  9739. attributes associated with a signer, or perhaps delete one.
  9740. @param signedData the signed data object to be used as a base.
  9741. @param signerInformationStore the new signer information store to use.
  9742. @return a new signed data object.
  9743. </member>
  9744. <member name="M:Org.BouncyCastle.Cms.CmsSignedData.ReplaceCertificatesAndCrls(Org.BouncyCastle.Cms.CmsSignedData,Org.BouncyCastle.X509.Store.IX509Store,Org.BouncyCastle.X509.Store.IX509Store,Org.BouncyCastle.X509.Store.IX509Store)">
  9745. Replace the certificate and CRL information associated with this
  9746. CmsSignedData object with the new one passed in.
  9747. @param signedData the signed data object to be used as a base.
  9748. @param x509Certs the new certificates to be used.
  9749. @param x509Crls the new CRLs to be used.
  9750. @return a new signed data object.
  9751. @exception CmsException if there is an error processing the stores
  9752. </member>
  9753. <member name="T:Org.BouncyCastle.Cms.CmsSignedDataGenerator">
  9754. * general class for generating a pkcs7-signature message.
  9755. * <p>
  9756. * A simple example of usage.
  9757. *
  9758. * <pre>
  9759. * IX509Store certs...
  9760. * IX509Store crls...
  9761. * CmsSignedDataGenerator gen = new CmsSignedDataGenerator();
  9762. *
  9763. * gen.AddSigner(privKey, cert, CmsSignedGenerator.DigestSha1);
  9764. * gen.AddCertificates(certs);
  9765. * gen.AddCrls(crls);
  9766. *
  9767. * CmsSignedData data = gen.Generate(content);
  9768. * </pre>
  9769. * </p>
  9770. </member>
  9771. <member name="M:Org.BouncyCastle.Cms.CmsSignedDataGenerator.#ctor(Org.BouncyCastle.Security.SecureRandom)">
  9772. <summary>Constructor allowing specific source of randomness</summary>
  9773. <param name="rand">Instance of <c>SecureRandom</c> to use.</param>
  9774. </member>
  9775. <member name="M:Org.BouncyCastle.Cms.CmsSignedDataGenerator.AddSigner(Org.BouncyCastle.Crypto.AsymmetricKeyParameter,Org.BouncyCastle.X509.X509Certificate,System.String)">
  9776. * add a signer - no attributes other than the default ones will be
  9777. * provided here.
  9778. *
  9779. * @param key signing key to use
  9780. * @param cert certificate containing corresponding public key
  9781. * @param digestOID digest algorithm OID
  9782. </member>
  9783. <member name="M:Org.BouncyCastle.Cms.CmsSignedDataGenerator.AddSigner(Org.BouncyCastle.Crypto.AsymmetricKeyParameter,Org.BouncyCastle.X509.X509Certificate,System.String,System.String)">
  9784. add a signer, specifying the digest encryption algorithm to use - no attributes other than the default ones will be
  9785. provided here.
  9786. @param key signing key to use
  9787. @param cert certificate containing corresponding public key
  9788. @param encryptionOID digest encryption algorithm OID
  9789. @param digestOID digest algorithm OID
  9790. </member>
  9791. <member name="M:Org.BouncyCastle.Cms.CmsSignedDataGenerator.AddSigner(Org.BouncyCastle.Crypto.AsymmetricKeyParameter,System.Byte[],System.String)">
  9792. add a signer - no attributes other than the default ones will be
  9793. provided here.
  9794. </member>
  9795. <member name="M:Org.BouncyCastle.Cms.CmsSignedDataGenerator.AddSigner(Org.BouncyCastle.Crypto.AsymmetricKeyParameter,System.Byte[],System.String,System.String)">
  9796. add a signer, specifying the digest encryption algorithm to use - no attributes other than the default ones will be
  9797. provided here.
  9798. </member>
  9799. <member name="M:Org.BouncyCastle.Cms.CmsSignedDataGenerator.AddSigner(Org.BouncyCastle.Crypto.AsymmetricKeyParameter,Org.BouncyCastle.X509.X509Certificate,System.String,Org.BouncyCastle.Asn1.Cms.AttributeTable,Org.BouncyCastle.Asn1.Cms.AttributeTable)">
  9800. * add a signer with extra signed/unsigned attributes.
  9801. *
  9802. * @param key signing key to use
  9803. * @param cert certificate containing corresponding public key
  9804. * @param digestOID digest algorithm OID
  9805. * @param signedAttr table of attributes to be included in signature
  9806. * @param unsignedAttr table of attributes to be included as unsigned
  9807. </member>
  9808. <member name="M:Org.BouncyCastle.Cms.CmsSignedDataGenerator.AddSigner(Org.BouncyCastle.Crypto.AsymmetricKeyParameter,Org.BouncyCastle.X509.X509Certificate,System.String,System.String,Org.BouncyCastle.Asn1.Cms.AttributeTable,Org.BouncyCastle.Asn1.Cms.AttributeTable)">
  9809. add a signer, specifying the digest encryption algorithm, with extra signed/unsigned attributes.
  9810. @param key signing key to use
  9811. @param cert certificate containing corresponding public key
  9812. @param encryptionOID digest encryption algorithm OID
  9813. @param digestOID digest algorithm OID
  9814. @param signedAttr table of attributes to be included in signature
  9815. @param unsignedAttr table of attributes to be included as unsigned
  9816. </member>
  9817. <member name="M:Org.BouncyCastle.Cms.CmsSignedDataGenerator.AddSigner(Org.BouncyCastle.Crypto.AsymmetricKeyParameter,System.Byte[],System.String,Org.BouncyCastle.Asn1.Cms.AttributeTable,Org.BouncyCastle.Asn1.Cms.AttributeTable)">
  9818. * add a signer with extra signed/unsigned attributes.
  9819. *
  9820. * @param key signing key to use
  9821. * @param subjectKeyID subjectKeyID of corresponding public key
  9822. * @param digestOID digest algorithm OID
  9823. * @param signedAttr table of attributes to be included in signature
  9824. * @param unsignedAttr table of attributes to be included as unsigned
  9825. </member>
  9826. <member name="M:Org.BouncyCastle.Cms.CmsSignedDataGenerator.AddSigner(Org.BouncyCastle.Crypto.AsymmetricKeyParameter,System.Byte[],System.String,System.String,Org.BouncyCastle.Asn1.Cms.AttributeTable,Org.BouncyCastle.Asn1.Cms.AttributeTable)">
  9827. add a signer, specifying the digest encryption algorithm, with extra signed/unsigned attributes.
  9828. @param key signing key to use
  9829. @param subjectKeyID subjectKeyID of corresponding public key
  9830. @param encryptionOID digest encryption algorithm OID
  9831. @param digestOID digest algorithm OID
  9832. @param signedAttr table of attributes to be included in signature
  9833. @param unsignedAttr table of attributes to be included as unsigned
  9834. </member>
  9835. <member name="M:Org.BouncyCastle.Cms.CmsSignedDataGenerator.AddSigner(Org.BouncyCastle.Crypto.AsymmetricKeyParameter,Org.BouncyCastle.X509.X509Certificate,System.String,Org.BouncyCastle.Cms.CmsAttributeTableGenerator,Org.BouncyCastle.Cms.CmsAttributeTableGenerator)">
  9836. add a signer with extra signed/unsigned attributes based on generators.
  9837. </member>
  9838. <member name="M:Org.BouncyCastle.Cms.CmsSignedDataGenerator.AddSigner(Org.BouncyCastle.Crypto.AsymmetricKeyParameter,Org.BouncyCastle.X509.X509Certificate,System.String,System.String,Org.BouncyCastle.Cms.CmsAttributeTableGenerator,Org.BouncyCastle.Cms.CmsAttributeTableGenerator)">
  9839. add a signer, specifying the digest encryption algorithm, with extra signed/unsigned attributes based on generators.
  9840. </member>
  9841. <member name="M:Org.BouncyCastle.Cms.CmsSignedDataGenerator.AddSigner(Org.BouncyCastle.Crypto.AsymmetricKeyParameter,System.Byte[],System.String,Org.BouncyCastle.Cms.CmsAttributeTableGenerator,Org.BouncyCastle.Cms.CmsAttributeTableGenerator)">
  9842. add a signer with extra signed/unsigned attributes based on generators.
  9843. </member>
  9844. <member name="M:Org.BouncyCastle.Cms.CmsSignedDataGenerator.AddSigner(Org.BouncyCastle.Crypto.AsymmetricKeyParameter,System.Byte[],System.String,System.String,Org.BouncyCastle.Cms.CmsAttributeTableGenerator,Org.BouncyCastle.Cms.CmsAttributeTableGenerator)">
  9845. add a signer, including digest encryption algorithm, with extra signed/unsigned attributes based on generators.
  9846. </member>
  9847. <member name="M:Org.BouncyCastle.Cms.CmsSignedDataGenerator.Generate(Org.BouncyCastle.Cms.CmsProcessable)">
  9848. generate a signed object that for a CMS Signed Data object
  9849. </member>
  9850. <member name="M:Org.BouncyCastle.Cms.CmsSignedDataGenerator.Generate(System.String,Org.BouncyCastle.Cms.CmsProcessable,System.Boolean)">
  9851. generate a signed object that for a CMS Signed Data
  9852. object - if encapsulate is true a copy
  9853. of the message will be included in the signature. The content type
  9854. is set according to the OID represented by the string signedContentType.
  9855. </member>
  9856. <member name="M:Org.BouncyCastle.Cms.CmsSignedDataGenerator.Generate(Org.BouncyCastle.Cms.CmsProcessable,System.Boolean)">
  9857. generate a signed object that for a CMS Signed Data
  9858. object - if encapsulate is true a copy
  9859. of the message will be included in the signature with the
  9860. default content type "data".
  9861. </member>
  9862. <member name="M:Org.BouncyCastle.Cms.CmsSignedDataGenerator.GenerateCounterSigners(Org.BouncyCastle.Cms.SignerInformation)">
  9863. generate a set of one or more SignerInformation objects representing counter signatures on
  9864. the passed in SignerInformation object.
  9865. @param signer the signer to be countersigned
  9866. @param sigProvider the provider to be used for counter signing.
  9867. @return a store containing the signers.
  9868. </member>
  9869. <member name="T:Org.BouncyCastle.Cms.CmsSignedDataParser">
  9870. Parsing class for an CMS Signed Data object from an input stream.
  9871. <p>
  9872. Note: that because we are in a streaming mode only one signer can be tried and it is important
  9873. that the methods on the parser are called in the appropriate order.
  9874. </p>
  9875. <p>
  9876. A simple example of usage for an encapsulated signature.
  9877. </p>
  9878. <p>
  9879. Two notes: first, in the example below the validity of
  9880. the certificate isn't verified, just the fact that one of the certs
  9881. matches the given signer, and, second, because we are in a streaming
  9882. mode the order of the operations is important.
  9883. </p>
  9884. <pre>
  9885. CmsSignedDataParser sp = new CmsSignedDataParser(encapSigData);
  9886. sp.GetSignedContent().Drain();
  9887. IX509Store certs = sp.GetCertificates();
  9888. SignerInformationStore signers = sp.GetSignerInfos();
  9889. foreach (SignerInformation signer in signers.GetSigners())
  9890. {
  9891. ArrayList certList = new ArrayList(certs.GetMatches(signer.SignerID));
  9892. X509Certificate cert = (X509Certificate) certList[0];
  9893. Console.WriteLine("verify returns: " + signer.Verify(cert));
  9894. }
  9895. </pre>
  9896. Note also: this class does not introduce buffering - if you are processing large files you should create
  9897. the parser with:
  9898. <pre>
  9899. CmsSignedDataParser ep = new CmsSignedDataParser(new BufferedInputStream(encapSigData, bufSize));
  9900. </pre>
  9901. where bufSize is a suitably large buffer size.
  9902. </member>
  9903. <member name="M:Org.BouncyCastle.Cms.CmsSignedDataParser.#ctor(System.IO.Stream)">
  9904. base constructor - with encapsulated content
  9905. </member>
  9906. <member name="M:Org.BouncyCastle.Cms.CmsSignedDataParser.#ctor(Org.BouncyCastle.Cms.CmsTypedStream,System.IO.Stream)">
  9907. base constructor
  9908. @param signedContent the content that was signed.
  9909. @param sigData the signature object.
  9910. </member>
  9911. <member name="P:Org.BouncyCastle.Cms.CmsSignedDataParser.Version">
  9912. Return the version number for the SignedData object
  9913. @return the version number
  9914. </member>
  9915. <member name="M:Org.BouncyCastle.Cms.CmsSignedDataParser.GetSignerInfos">
  9916. return the collection of signers that are associated with the
  9917. signatures for the message.
  9918. @throws CmsException
  9919. </member>
  9920. <member name="M:Org.BouncyCastle.Cms.CmsSignedDataParser.GetAttributeCertificates(System.String)">
  9921. return a X509Store containing the attribute certificates, if any, contained
  9922. in this message.
  9923. @param type type of store to create
  9924. @return a store of attribute certificates
  9925. @exception org.bouncycastle.x509.NoSuchStoreException if the store type isn't available.
  9926. @exception CmsException if a general exception prevents creation of the X509Store
  9927. </member>
  9928. <member name="M:Org.BouncyCastle.Cms.CmsSignedDataParser.GetCertificates(System.String)">
  9929. return a X509Store containing the public key certificates, if any, contained
  9930. in this message.
  9931. @param type type of store to create
  9932. @return a store of public key certificates
  9933. @exception NoSuchStoreException if the store type isn't available.
  9934. @exception CmsException if a general exception prevents creation of the X509Store
  9935. </member>
  9936. <member name="M:Org.BouncyCastle.Cms.CmsSignedDataParser.GetCrls(System.String)">
  9937. return a X509Store containing CRLs, if any, contained
  9938. in this message.
  9939. @param type type of store to create
  9940. @return a store of CRLs
  9941. @exception NoSuchStoreException if the store type isn't available.
  9942. @exception CmsException if a general exception prevents creation of the X509Store
  9943. </member>
  9944. <member name="P:Org.BouncyCastle.Cms.CmsSignedDataParser.SignedContentType">
  9945. <summary>
  9946. Return the <c>DerObjectIdentifier</c> associated with the encapsulated
  9947. content info structure carried in the signed data.
  9948. </summary>
  9949. </member>
  9950. <member name="M:Org.BouncyCastle.Cms.CmsSignedDataParser.ReplaceSigners(System.IO.Stream,Org.BouncyCastle.Cms.SignerInformationStore,System.IO.Stream)">
  9951. Replace the signerinformation store associated with the passed
  9952. in message contained in the stream original with the new one passed in.
  9953. You would probably only want to do this if you wanted to change the unsigned
  9954. attributes associated with a signer, or perhaps delete one.
  9955. <p>
  9956. The output stream is returned unclosed.
  9957. </p>
  9958. @param original the signed data stream to be used as a base.
  9959. @param signerInformationStore the new signer information store to use.
  9960. @param out the stream to Write the new signed data object to.
  9961. @return out.
  9962. </member>
  9963. <member name="M:Org.BouncyCastle.Cms.CmsSignedDataParser.ReplaceCertificatesAndCrls(System.IO.Stream,Org.BouncyCastle.X509.Store.IX509Store,Org.BouncyCastle.X509.Store.IX509Store,Org.BouncyCastle.X509.Store.IX509Store,System.IO.Stream)">
  9964. Replace the certificate and CRL information associated with this
  9965. CMSSignedData object with the new one passed in.
  9966. <p>
  9967. The output stream is returned unclosed.
  9968. </p>
  9969. @param original the signed data stream to be used as a base.
  9970. @param certsAndCrls the new certificates and CRLs to be used.
  9971. @param out the stream to Write the new signed data object to.
  9972. @return out.
  9973. @exception CmsException if there is an error processing the CertStore
  9974. </member>
  9975. <member name="T:Org.BouncyCastle.Cms.CmsSignedDataStreamGenerator">
  9976. General class for generating a pkcs7-signature message stream.
  9977. <p>
  9978. A simple example of usage.
  9979. </p>
  9980. <pre>
  9981. IX509Store certs...
  9982. CmsSignedDataStreamGenerator gen = new CmsSignedDataStreamGenerator();
  9983. gen.AddSigner(privateKey, cert, CmsSignedDataStreamGenerator.DIGEST_SHA1);
  9984. gen.AddCertificates(certs);
  9985. Stream sigOut = gen.Open(bOut);
  9986. sigOut.Write(Encoding.UTF8.GetBytes("Hello World!"));
  9987. sigOut.Close();
  9988. </pre>
  9989. </member>
  9990. <member name="M:Org.BouncyCastle.Cms.CmsSignedDataStreamGenerator.#ctor(Org.BouncyCastle.Security.SecureRandom)">
  9991. <summary>Constructor allowing specific source of randomness</summary>
  9992. <param name="rand">Instance of <c>SecureRandom</c> to use.</param>
  9993. </member>
  9994. <member name="M:Org.BouncyCastle.Cms.CmsSignedDataStreamGenerator.SetBufferSize(System.Int32)">
  9995. Set the underlying string size for encapsulated data
  9996. @param bufferSize length of octet strings to buffer the data.
  9997. </member>
  9998. <member name="M:Org.BouncyCastle.Cms.CmsSignedDataStreamGenerator.AddSigner(Org.BouncyCastle.Crypto.AsymmetricKeyParameter,Org.BouncyCastle.X509.X509Certificate,System.String)">
  9999. add a signer - no attributes other than the default ones will be
  10000. provided here.
  10001. @throws NoSuchAlgorithmException
  10002. @throws InvalidKeyException
  10003. </member>
  10004. <member name="M:Org.BouncyCastle.Cms.CmsSignedDataStreamGenerator.AddSigner(Org.BouncyCastle.Crypto.AsymmetricKeyParameter,Org.BouncyCastle.X509.X509Certificate,System.String,System.String)">
  10005. add a signer, specifying the digest encryption algorithm - no attributes other than the default ones will be
  10006. provided here.
  10007. @throws NoSuchProviderException
  10008. @throws NoSuchAlgorithmException
  10009. @throws InvalidKeyException
  10010. </member>
  10011. <member name="M:Org.BouncyCastle.Cms.CmsSignedDataStreamGenerator.AddSigner(Org.BouncyCastle.Crypto.AsymmetricKeyParameter,Org.BouncyCastle.X509.X509Certificate,System.String,Org.BouncyCastle.Asn1.Cms.AttributeTable,Org.BouncyCastle.Asn1.Cms.AttributeTable)">
  10012. add a signer with extra signed/unsigned attributes.
  10013. @throws NoSuchAlgorithmException
  10014. @throws InvalidKeyException
  10015. </member>
  10016. <member name="M:Org.BouncyCastle.Cms.CmsSignedDataStreamGenerator.AddSigner(Org.BouncyCastle.Crypto.AsymmetricKeyParameter,Org.BouncyCastle.X509.X509Certificate,System.String,System.String,Org.BouncyCastle.Asn1.Cms.AttributeTable,Org.BouncyCastle.Asn1.Cms.AttributeTable)">
  10017. add a signer with extra signed/unsigned attributes - specifying digest
  10018. encryption algorithm.
  10019. @throws NoSuchProviderException
  10020. @throws NoSuchAlgorithmException
  10021. @throws InvalidKeyException
  10022. </member>
  10023. <member name="M:Org.BouncyCastle.Cms.CmsSignedDataStreamGenerator.AddSigner(Org.BouncyCastle.Crypto.AsymmetricKeyParameter,System.Byte[],System.String)">
  10024. add a signer - no attributes other than the default ones will be
  10025. provided here.
  10026. @throws NoSuchAlgorithmException
  10027. @throws InvalidKeyException
  10028. </member>
  10029. <member name="M:Org.BouncyCastle.Cms.CmsSignedDataStreamGenerator.AddSigner(Org.BouncyCastle.Crypto.AsymmetricKeyParameter,System.Byte[],System.String,System.String)">
  10030. add a signer - no attributes other than the default ones will be
  10031. provided here.
  10032. @throws NoSuchProviderException
  10033. @throws NoSuchAlgorithmException
  10034. @throws InvalidKeyException
  10035. </member>
  10036. <member name="M:Org.BouncyCastle.Cms.CmsSignedDataStreamGenerator.AddSigner(Org.BouncyCastle.Crypto.AsymmetricKeyParameter,System.Byte[],System.String,Org.BouncyCastle.Asn1.Cms.AttributeTable,Org.BouncyCastle.Asn1.Cms.AttributeTable)">
  10037. add a signer with extra signed/unsigned attributes.
  10038. @throws NoSuchAlgorithmException
  10039. @throws InvalidKeyException
  10040. </member>
  10041. <member name="M:Org.BouncyCastle.Cms.CmsSignedDataStreamGenerator.Open(System.IO.Stream)">
  10042. generate a signed object that for a CMS Signed Data object
  10043. </member>
  10044. <member name="M:Org.BouncyCastle.Cms.CmsSignedDataStreamGenerator.Open(System.IO.Stream,System.Boolean)">
  10045. generate a signed object that for a CMS Signed Data
  10046. object - if encapsulate is true a copy
  10047. of the message will be included in the signature with the
  10048. default content type "data".
  10049. </member>
  10050. <member name="M:Org.BouncyCastle.Cms.CmsSignedDataStreamGenerator.Open(System.IO.Stream,System.Boolean,System.IO.Stream)">
  10051. generate a signed object that for a CMS Signed Data
  10052. object using the given provider - if encapsulate is true a copy
  10053. of the message will be included in the signature with the
  10054. default content type "data". If dataOutputStream is non null the data
  10055. being signed will be written to the stream as it is processed.
  10056. @param out stream the CMS object is to be written to.
  10057. @param encapsulate true if data should be encapsulated.
  10058. @param dataOutputStream output stream to copy the data being signed to.
  10059. </member>
  10060. <member name="M:Org.BouncyCastle.Cms.CmsSignedDataStreamGenerator.Open(System.IO.Stream,System.String,System.Boolean)">
  10061. generate a signed object that for a CMS Signed Data
  10062. object - if encapsulate is true a copy
  10063. of the message will be included in the signature. The content type
  10064. is set according to the OID represented by the string signedContentType.
  10065. </member>
  10066. <member name="M:Org.BouncyCastle.Cms.CmsSignedDataStreamGenerator.Open(System.IO.Stream,System.String,System.Boolean,System.IO.Stream)">
  10067. generate a signed object that for a CMS Signed Data
  10068. object using the given provider - if encapsulate is true a copy
  10069. of the message will be included in the signature. The content type
  10070. is set according to the OID represented by the string signedContentType.
  10071. @param out stream the CMS object is to be written to.
  10072. @param signedContentType OID for data to be signed.
  10073. @param encapsulate true if data should be encapsulated.
  10074. @param dataOutputStream output stream to copy the data being signed to.
  10075. </member>
  10076. <member name="F:Org.BouncyCastle.Cms.CmsSignedGenerator.Data">
  10077. Default type for the signed data.
  10078. </member>
  10079. <member name="M:Org.BouncyCastle.Cms.CmsSignedGenerator.#ctor(Org.BouncyCastle.Security.SecureRandom)">
  10080. <summary>Constructor allowing specific source of randomness</summary>
  10081. <param name="rand">Instance of <c>SecureRandom</c> to use.</param>
  10082. </member>
  10083. <member name="M:Org.BouncyCastle.Cms.CmsSignedGenerator.AddAttributeCertificates(Org.BouncyCastle.X509.Store.IX509Store)">
  10084. Add the attribute certificates contained in the passed in store to the
  10085. generator.
  10086. @param store a store of Version 2 attribute certificates
  10087. @throws CmsException if an error occurse processing the store.
  10088. </member>
  10089. <member name="M:Org.BouncyCastle.Cms.CmsSignedGenerator.AddSigners(Org.BouncyCastle.Cms.SignerInformationStore)">
  10090. Add a store of precalculated signers to the generator.
  10091. @param signerStore store of signers
  10092. </member>
  10093. <member name="M:Org.BouncyCastle.Cms.CmsSignedGenerator.GetGeneratedDigests">
  10094. Return a map of oids and byte arrays representing the digests calculated on the content during
  10095. the last generate.
  10096. @return a map of oids (as string objects) and byte[] representing digests.
  10097. </member>
  10098. <member name="M:Org.BouncyCastle.Cms.CmsSignedHelper.GetDigestAlgName(System.String)">
  10099. Return the digest algorithm using one of the standard JCA string
  10100. representations rather than the algorithm identifier (if possible).
  10101. </member>
  10102. <member name="M:Org.BouncyCastle.Cms.CmsSignedHelper.GetEncryptionAlgName(System.String)">
  10103. Return the digest encryption algorithm using one of the standard
  10104. JCA string representations rather than the algorithm identifier (if
  10105. possible).
  10106. </member>
  10107. <member name="T:Org.BouncyCastle.Cms.DefaultAuthenticatedAttributeTableGenerator">
  10108. Default authenticated attributes generator.
  10109. </member>
  10110. <member name="M:Org.BouncyCastle.Cms.DefaultAuthenticatedAttributeTableGenerator.#ctor">
  10111. Initialise to use all defaults
  10112. </member>
  10113. <member name="M:Org.BouncyCastle.Cms.DefaultAuthenticatedAttributeTableGenerator.#ctor(Org.BouncyCastle.Asn1.Cms.AttributeTable)">
  10114. Initialise with some extra attributes or overrides.
  10115. @param attributeTable initial attribute table to use.
  10116. </member>
  10117. <member name="M:Org.BouncyCastle.Cms.DefaultAuthenticatedAttributeTableGenerator.CreateStandardAttributeTable(System.Collections.IDictionary)">
  10118. Create a standard attribute table from the passed in parameters - this will
  10119. normally include contentType and messageDigest. If the constructor
  10120. using an AttributeTable was used, entries in it for contentType and
  10121. messageDigest will override the generated ones.
  10122. @param parameters source parameters for table generation.
  10123. @return a filled in IDictionary of attributes.
  10124. </member>
  10125. <member name="M:Org.BouncyCastle.Cms.DefaultAuthenticatedAttributeTableGenerator.GetAttributes(System.Collections.IDictionary)">
  10126. @param parameters source parameters
  10127. @return the populated attribute table
  10128. </member>
  10129. <member name="T:Org.BouncyCastle.Cms.DefaultSignedAttributeTableGenerator">
  10130. Default signed attributes generator.
  10131. </member>
  10132. <member name="M:Org.BouncyCastle.Cms.DefaultSignedAttributeTableGenerator.#ctor">
  10133. Initialise to use all defaults
  10134. </member>
  10135. <member name="M:Org.BouncyCastle.Cms.DefaultSignedAttributeTableGenerator.#ctor(Org.BouncyCastle.Asn1.Cms.AttributeTable)">
  10136. Initialise with some extra attributes or overrides.
  10137. @param attributeTable initial attribute table to use.
  10138. </member>
  10139. <member name="M:Org.BouncyCastle.Cms.DefaultSignedAttributeTableGenerator.createStandardAttributeTable(System.Collections.IDictionary)">
  10140. Create a standard attribute table from the passed in parameters - this will
  10141. normally include contentType, signingTime, and messageDigest. If the constructor
  10142. using an AttributeTable was used, entries in it for contentType, signingTime, and
  10143. messageDigest will override the generated ones.
  10144. @param parameters source parameters for table generation.
  10145. @return a filled in Hashtable of attributes.
  10146. </member>
  10147. <member name="M:Org.BouncyCastle.Cms.DefaultSignedAttributeTableGenerator.GetAttributes(System.Collections.IDictionary)">
  10148. @param parameters source parameters
  10149. @return the populated attribute table
  10150. </member>
  10151. <member name="T:Org.BouncyCastle.Cms.KekRecipientInformation">
  10152. the RecipientInfo class for a recipient who has been sent a message
  10153. encrypted using a secret key known to the other side.
  10154. </member>
  10155. <member name="M:Org.BouncyCastle.Cms.KekRecipientInformation.GetContentStream(Org.BouncyCastle.Crypto.ICipherParameters)">
  10156. decrypt the content and return an input stream.
  10157. </member>
  10158. <member name="T:Org.BouncyCastle.Cms.KeyAgreeRecipientInformation">
  10159. the RecipientInfo class for a recipient who has been sent a message
  10160. encrypted using key agreement.
  10161. </member>
  10162. <member name="M:Org.BouncyCastle.Cms.KeyAgreeRecipientInformation.GetContentStream(Org.BouncyCastle.Crypto.ICipherParameters)">
  10163. decrypt the content and return an input stream.
  10164. </member>
  10165. <member name="T:Org.BouncyCastle.Cms.KeyTransRecipientInformation">
  10166. the KeyTransRecipientInformation class for a recipient who has been sent a secret
  10167. key encrypted using their public key that needs to be used to
  10168. extract the message.
  10169. </member>
  10170. <member name="M:Org.BouncyCastle.Cms.KeyTransRecipientInformation.GetContentStream(Org.BouncyCastle.Crypto.ICipherParameters)">
  10171. decrypt the content and return it as a byte array.
  10172. </member>
  10173. <member name="T:Org.BouncyCastle.Cms.OriginatorID">
  10174. a basic index for an originator.
  10175. </member>
  10176. <member name="M:Org.BouncyCastle.Cms.OriginatorInformation.GetCertificates">
  10177. Return the certificates stored in the underlying OriginatorInfo object.
  10178. @return a Store of X509CertificateHolder objects.
  10179. </member>
  10180. <member name="M:Org.BouncyCastle.Cms.OriginatorInformation.GetCrls">
  10181. Return the CRLs stored in the underlying OriginatorInfo object.
  10182. @return a Store of X509CRLHolder objects.
  10183. </member>
  10184. <member name="M:Org.BouncyCastle.Cms.OriginatorInformation.ToAsn1Structure">
  10185. Return the underlying ASN.1 object defining this SignerInformation object.
  10186. @return a OriginatorInfo.
  10187. </member>
  10188. <member name="T:Org.BouncyCastle.Cms.PasswordRecipientInformation">
  10189. the RecipientInfo class for a recipient who has been sent a message
  10190. encrypted using a password.
  10191. </member>
  10192. <member name="P:Org.BouncyCastle.Cms.PasswordRecipientInformation.KeyDerivationAlgorithm">
  10193. return the object identifier for the key derivation algorithm, or null
  10194. if there is none present.
  10195. @return OID for key derivation algorithm, if present.
  10196. </member>
  10197. <member name="M:Org.BouncyCastle.Cms.PasswordRecipientInformation.GetContentStream(Org.BouncyCastle.Crypto.ICipherParameters)">
  10198. decrypt the content and return an input stream.
  10199. </member>
  10200. <member name="T:Org.BouncyCastle.Cms.Pkcs5Scheme2PbeKey">
  10201. <summary>
  10202. PKCS5 scheme-2 - password converted to bytes assuming ASCII.
  10203. </summary>
  10204. </member>
  10205. <member name="T:Org.BouncyCastle.Cms.Pkcs5Scheme2Utf8PbeKey">
  10206. PKCS5 scheme-2 - password converted to bytes using UTF-8.
  10207. </member>
  10208. <member name="M:Org.BouncyCastle.Cms.RecipientInfoGenerator.Generate(Org.BouncyCastle.Crypto.Parameters.KeyParameter,Org.BouncyCastle.Security.SecureRandom)">
  10209. <summary>
  10210. Generate a RecipientInfo object for the given key.
  10211. </summary>
  10212. <param name="contentEncryptionKey">
  10213. A <see cref="T:Org.BouncyCastle.Crypto.Parameters.KeyParameter"/>
  10214. </param>
  10215. <param name="random">
  10216. A <see cref="T:Org.BouncyCastle.Security.SecureRandom"/>
  10217. </param>
  10218. <returns>
  10219. A <see cref="T:Org.BouncyCastle.Asn1.Cms.RecipientInfo"/>
  10220. </returns>
  10221. <exception cref="T:Org.BouncyCastle.Security.GeneralSecurityException"></exception>
  10222. </member>
  10223. <member name="P:Org.BouncyCastle.Cms.RecipientInformation.KeyEncryptionAlgOid">
  10224. * return the object identifier for the key encryption algorithm.
  10225. *
  10226. * @return OID for key encryption algorithm.
  10227. </member>
  10228. <member name="P:Org.BouncyCastle.Cms.RecipientInformation.KeyEncryptionAlgParams">
  10229. * return the ASN.1 encoded key encryption algorithm parameters, or null if
  10230. * there aren't any.
  10231. *
  10232. * @return ASN.1 encoding of key encryption algorithm parameters.
  10233. </member>
  10234. <member name="M:Org.BouncyCastle.Cms.RecipientInformation.GetMac">
  10235. Return the MAC calculated for the content stream. Note: this call is only meaningful once all
  10236. the content has been read.
  10237. @return byte array containing the mac.
  10238. </member>
  10239. <member name="M:Org.BouncyCastle.Cms.RecipientInformationStore.GetFirstRecipient(Org.BouncyCastle.Cms.RecipientID)">
  10240. Return the first RecipientInformation object that matches the
  10241. passed in selector. Null if there are no matches.
  10242. @param selector to identify a recipient
  10243. @return a single RecipientInformation object. Null if none matches.
  10244. </member>
  10245. <member name="P:Org.BouncyCastle.Cms.RecipientInformationStore.Count">
  10246. Return the number of recipients in the collection.
  10247. @return number of recipients identified.
  10248. </member>
  10249. <member name="M:Org.BouncyCastle.Cms.RecipientInformationStore.GetRecipients">
  10250. Return all recipients in the collection
  10251. @return a collection of recipients.
  10252. </member>
  10253. <member name="M:Org.BouncyCastle.Cms.RecipientInformationStore.GetRecipients(Org.BouncyCastle.Cms.RecipientID)">
  10254. Return possible empty collection with recipients matching the passed in RecipientID
  10255. @param selector a recipient id to select against.
  10256. @return a collection of RecipientInformation objects.
  10257. </member>
  10258. <member name="T:Org.BouncyCastle.Cms.SignerID">
  10259. a basic index for a signer.
  10260. </member>
  10261. <member name="M:Org.BouncyCastle.Cms.SignerInfoGeneratorBuilder.SetDirectSignature(System.Boolean)">
  10262. If the passed in flag is true, the signer signature will be based on the data, not
  10263. a collection of signed attributes, and no signed attributes will be included.
  10264. @return the builder object
  10265. </member>
  10266. <member name="M:Org.BouncyCastle.Cms.SignerInfoGeneratorBuilder.WithSignedAttributeGenerator(Org.BouncyCastle.Cms.CmsAttributeTableGenerator)">
  10267. Provide a custom signed attribute generator.
  10268. @param signedGen a generator of signed attributes.
  10269. @return the builder object
  10270. </member>
  10271. <member name="M:Org.BouncyCastle.Cms.SignerInfoGeneratorBuilder.WithUnsignedAttributeGenerator(Org.BouncyCastle.Cms.CmsAttributeTableGenerator)">
  10272. Provide a generator of unsigned attributes.
  10273. @param unsignedGen a generator for signed attributes.
  10274. @return the builder object
  10275. </member>
  10276. <member name="M:Org.BouncyCastle.Cms.SignerInfoGeneratorBuilder.Build(Org.BouncyCastle.Crypto.ISignatureFactory,Org.BouncyCastle.X509.X509Certificate)">
  10277. Build a generator with the passed in X.509 certificate issuer and serial number as the signerIdentifier.
  10278. @param contentSigner operator for generating the final signature in the SignerInfo with.
  10279. @param certificate X.509 certificate related to the contentSigner.
  10280. @return a SignerInfoGenerator
  10281. @throws OperatorCreationException if the generator cannot be built.
  10282. </member>
  10283. <member name="M:Org.BouncyCastle.Cms.SignerInfoGeneratorBuilder.Build(Org.BouncyCastle.Crypto.ISignatureFactory,System.Byte[])">
  10284. Build a generator with the passed in subjectKeyIdentifier as the signerIdentifier. If used you should
  10285. try to follow the calculation described in RFC 5280 section 4.2.1.2.
  10286. @param signerFactory operator factory for generating the final signature in the SignerInfo with.
  10287. @param subjectKeyIdentifier key identifier to identify the public key for verifying the signature.
  10288. @return a SignerInfoGenerator
  10289. </member>
  10290. <member name="T:Org.BouncyCastle.Cms.SignerInformation">
  10291. an expanded SignerInfo block from a CMS Signed message
  10292. </member>
  10293. <member name="M:Org.BouncyCastle.Cms.SignerInformation.#ctor(Org.BouncyCastle.Cms.SignerInformation)">
  10294. Protected constructor. In some cases clients have their own idea about how to encode
  10295. the signed attributes and calculate the signature. This constructor is to allow developers
  10296. to deal with that by extending off the class and overriding e.g. SignedAttributes property.
  10297. @param baseInfo the SignerInformation to base this one on.
  10298. </member>
  10299. <member name="P:Org.BouncyCastle.Cms.SignerInformation.Version">
  10300. return the version number for this objects underlying SignerInfo structure.
  10301. </member>
  10302. <member name="P:Org.BouncyCastle.Cms.SignerInformation.DigestAlgOid">
  10303. return the object identifier for the signature.
  10304. </member>
  10305. <member name="P:Org.BouncyCastle.Cms.SignerInformation.DigestAlgParams">
  10306. return the signature parameters, or null if there aren't any.
  10307. </member>
  10308. <member name="M:Org.BouncyCastle.Cms.SignerInformation.GetContentDigest">
  10309. return the content digest that was calculated during verification.
  10310. </member>
  10311. <member name="P:Org.BouncyCastle.Cms.SignerInformation.EncryptionAlgOid">
  10312. return the object identifier for the signature.
  10313. </member>
  10314. <member name="P:Org.BouncyCastle.Cms.SignerInformation.EncryptionAlgParams">
  10315. return the signature/encryption algorithm parameters, or null if
  10316. there aren't any.
  10317. </member>
  10318. <member name="P:Org.BouncyCastle.Cms.SignerInformation.SignedAttributes">
  10319. return a table of the signed attributes - indexed by
  10320. the OID of the attribute.
  10321. </member>
  10322. <member name="P:Org.BouncyCastle.Cms.SignerInformation.UnsignedAttributes">
  10323. return a table of the unsigned attributes indexed by
  10324. the OID of the attribute.
  10325. </member>
  10326. <member name="M:Org.BouncyCastle.Cms.SignerInformation.GetSignature">
  10327. return the encoded signature
  10328. </member>
  10329. <member name="M:Org.BouncyCastle.Cms.SignerInformation.GetCounterSignatures">
  10330. Return a SignerInformationStore containing the counter signatures attached to this
  10331. signer. If no counter signatures are present an empty store is returned.
  10332. </member>
  10333. <member name="M:Org.BouncyCastle.Cms.SignerInformation.GetEncodedSignedAttributes">
  10334. return the DER encoding of the signed attributes.
  10335. @throws IOException if an encoding error occurs.
  10336. </member>
  10337. <member name="M:Org.BouncyCastle.Cms.SignerInformation.Verify(Org.BouncyCastle.Crypto.AsymmetricKeyParameter)">
  10338. verify that the given public key successfully handles and confirms the
  10339. signature associated with this signer.
  10340. </member>
  10341. <member name="M:Org.BouncyCastle.Cms.SignerInformation.Verify(Org.BouncyCastle.X509.X509Certificate)">
  10342. verify that the given certificate successfully handles and confirms
  10343. the signature associated with this signer and, if a signingTime
  10344. attribute is available, that the certificate was valid at the time the
  10345. signature was generated.
  10346. </member>
  10347. <member name="M:Org.BouncyCastle.Cms.SignerInformation.ToSignerInfo">
  10348. Return the base ASN.1 CMS structure that this object contains.
  10349. @return an object containing a CMS SignerInfo structure.
  10350. </member>
  10351. <member name="M:Org.BouncyCastle.Cms.SignerInformation.ReplaceUnsignedAttributes(Org.BouncyCastle.Cms.SignerInformation,Org.BouncyCastle.Asn1.Cms.AttributeTable)">
  10352. Return a signer information object with the passed in unsigned
  10353. attributes replacing the ones that are current associated with
  10354. the object passed in.
  10355. @param signerInformation the signerInfo to be used as the basis.
  10356. @param unsignedAttributes the unsigned attributes to add.
  10357. @return a copy of the original SignerInformationObject with the changed attributes.
  10358. </member>
  10359. <member name="M:Org.BouncyCastle.Cms.SignerInformation.AddCounterSigners(Org.BouncyCastle.Cms.SignerInformation,Org.BouncyCastle.Cms.SignerInformationStore)">
  10360. Return a signer information object with passed in SignerInformationStore representing counter
  10361. signatures attached as an unsigned attribute.
  10362. @param signerInformation the signerInfo to be used as the basis.
  10363. @param counterSigners signer info objects carrying counter signature.
  10364. @return a copy of the original SignerInformationObject with the changed attributes.
  10365. </member>
  10366. <member name="M:Org.BouncyCastle.Cms.SignerInformationStore.#ctor(Org.BouncyCastle.Cms.SignerInformation)">
  10367. Create a store containing a single SignerInformation object.
  10368. @param signerInfo the signer information to contain.
  10369. </member>
  10370. <member name="M:Org.BouncyCastle.Cms.SignerInformationStore.#ctor(System.Collections.ICollection)">
  10371. Create a store containing a collection of SignerInformation objects.
  10372. @param signerInfos a collection signer information objects to contain.
  10373. </member>
  10374. <member name="M:Org.BouncyCastle.Cms.SignerInformationStore.GetFirstSigner(Org.BouncyCastle.Cms.SignerID)">
  10375. Return the first SignerInformation object that matches the
  10376. passed in selector. Null if there are no matches.
  10377. @param selector to identify a signer
  10378. @return a single SignerInformation object. Null if none matches.
  10379. </member>
  10380. <member name="P:Org.BouncyCastle.Cms.SignerInformationStore.Count">
  10381. <summary>The number of signers in the collection.</summary>
  10382. </member>
  10383. <member name="M:Org.BouncyCastle.Cms.SignerInformationStore.GetSigners">
  10384. <returns>An ICollection of all signers in the collection</returns>
  10385. </member>
  10386. <member name="M:Org.BouncyCastle.Cms.SignerInformationStore.GetSigners(Org.BouncyCastle.Cms.SignerID)">
  10387. Return possible empty collection with signers matching the passed in SignerID
  10388. @param selector a signer id to select against.
  10389. @return a collection of SignerInformation objects.
  10390. </member>
  10391. <member name="T:Org.BouncyCastle.Cms.SimpleAttributeTableGenerator">
  10392. Basic generator that just returns a preconstructed attribute table
  10393. </member>
  10394. <member name="T:Org.BouncyCastle.Crmf.AuthenticatorControl">
  10395. <summary>
  10396. Carrier for an authenticator control.
  10397. </summary>
  10398. </member>
  10399. <member name="M:Org.BouncyCastle.Crmf.AuthenticatorControl.#ctor(Org.BouncyCastle.Asn1.DerUtf8String)">
  10400. <summary>
  10401. Basic constructor - build from a UTF-8 string representing the token.
  10402. </summary>
  10403. <param name="token">UTF-8 string representing the token.</param>
  10404. </member>
  10405. <member name="M:Org.BouncyCastle.Crmf.AuthenticatorControl.#ctor(System.String)">
  10406. <summary>
  10407. Basic constructor - build from a string representing the token.
  10408. </summary>
  10409. <param name="token">string representing the token.</param>
  10410. </member>
  10411. <member name="P:Org.BouncyCastle.Crmf.AuthenticatorControl.Type">
  10412. <summary>
  10413. Return the type of this control.
  10414. </summary>
  10415. </member>
  10416. <member name="P:Org.BouncyCastle.Crmf.AuthenticatorControl.Value">
  10417. <summary>
  10418. Return the token associated with this control (a UTF8String).
  10419. </summary>
  10420. </member>
  10421. <member name="M:Org.BouncyCastle.Crmf.CertificateRequestMessage.#ctor(System.Byte[])">
  10422. <summary>
  10423. Create a CertificateRequestMessage from the passed in bytes.
  10424. </summary>
  10425. <param name="encoded">BER/DER encoding of the CertReqMsg structure.</param>
  10426. </member>
  10427. <member name="M:Org.BouncyCastle.Crmf.CertificateRequestMessage.ToAsn1Structure">
  10428. <summary>
  10429. Return the underlying ASN.1 object defining this CertificateRequestMessage object.
  10430. </summary>
  10431. <returns>A CertReqMsg</returns>
  10432. </member>
  10433. <member name="M:Org.BouncyCastle.Crmf.CertificateRequestMessage.GetCertTemplate">
  10434. <summary>
  10435. Return the certificate template contained in this message.
  10436. </summary>
  10437. <returns>a CertTemplate structure.</returns>
  10438. </member>
  10439. <member name="P:Org.BouncyCastle.Crmf.CertificateRequestMessage.HasControls">
  10440. <summary>
  10441. Return whether or not this request has control values associated with it.
  10442. </summary>
  10443. <returns>true if there are control values present, false otherwise.</returns>
  10444. </member>
  10445. <member name="M:Org.BouncyCastle.Crmf.CertificateRequestMessage.HasControl(Org.BouncyCastle.Asn1.DerObjectIdentifier)">
  10446. <summary>
  10447. Return whether or not this request has a specific type of control value.
  10448. </summary>
  10449. <param name="objectIdentifier">the type OID for the control value we are checking for.</param>
  10450. <returns>true if a control value of type is present, false otherwise.</returns>
  10451. </member>
  10452. <member name="M:Org.BouncyCastle.Crmf.CertificateRequestMessage.GetControl(Org.BouncyCastle.Asn1.DerObjectIdentifier)">
  10453. <summary>
  10454. Return a control value of the specified type.
  10455. </summary>
  10456. <param name="type">the type OID for the control value we are checking for.</param>
  10457. <returns>the control value if present, null otherwise.</returns>
  10458. </member>
  10459. <member name="P:Org.BouncyCastle.Crmf.CertificateRequestMessage.HasProofOfPossession">
  10460. <summary>
  10461. Return whether or not this request message has a proof-of-possession field in it.
  10462. </summary>
  10463. <returns>true if proof-of-possession is present, false otherwise.</returns>
  10464. </member>
  10465. <member name="P:Org.BouncyCastle.Crmf.CertificateRequestMessage.ProofOfPossession">
  10466. <summary>
  10467. Return the type of the proof-of-possession this request message provides.
  10468. </summary>
  10469. <returns>one of: popRaVerified, popSigningKey, popKeyEncipherment, popKeyAgreement</returns>
  10470. </member>
  10471. <member name="P:Org.BouncyCastle.Crmf.CertificateRequestMessage.HasSigningKeyProofOfPossessionWithPkMac">
  10472. <summary>
  10473. Return whether or not the proof-of-possession (POP) is of the type popSigningKey and
  10474. it has a public key MAC associated with it.
  10475. </summary>
  10476. <returns>true if POP is popSigningKey and a PKMAC is present, false otherwise.</returns>
  10477. </member>
  10478. <member name="M:Org.BouncyCastle.Crmf.CertificateRequestMessage.IsValidSigningKeyPop(Org.BouncyCastle.Crypto.IVerifierFactoryProvider)">
  10479. <summary>
  10480. Return whether or not a signing key proof-of-possession (POP) is valid.
  10481. </summary>
  10482. <param name="verifierProvider">a provider that can produce content verifiers for the signature contained in this POP.</param>
  10483. <returns>true if the POP is valid, false otherwise.</returns>
  10484. <exception cref="T:System.InvalidOperationException">if there is a problem in verification or content verifier creation.</exception>
  10485. <exception cref="T:System.InvalidOperationException">if POP not appropriate.</exception>
  10486. </member>
  10487. <member name="M:Org.BouncyCastle.Crmf.CertificateRequestMessage.GetEncoded">
  10488. <summary>
  10489. Return the ASN.1 encoding of the certReqMsg we wrap.
  10490. </summary>
  10491. <returns>a byte array containing the binary encoding of the certReqMsg.</returns>
  10492. </member>
  10493. <member name="M:Org.BouncyCastle.Crmf.EncryptedValueBuilder.#ctor(Org.BouncyCastle.Crypto.IKeyWrapper,Org.BouncyCastle.Crypto.ICipherBuilderWithKey)">
  10494. Create a builder that makes EncryptedValue structures.
  10495. <param name="wrapper">wrapper a wrapper for key used to encrypt the actual data contained in the EncryptedValue.</param>
  10496. <param name="encryptor">encryptor an output encryptor to encrypt the actual data contained in the EncryptedValue. </param>
  10497. </member>
  10498. <member name="M:Org.BouncyCastle.Crmf.EncryptedValueBuilder.#ctor(Org.BouncyCastle.Crypto.IKeyWrapper,Org.BouncyCastle.Crypto.ICipherBuilderWithKey,Org.BouncyCastle.Crmf.IEncryptedValuePadder)">
  10499. Create a builder that makes EncryptedValue structures with fixed length blocks padded using the passed in padder.
  10500. <param name="wrapper">a wrapper for key used to encrypt the actual data contained in the EncryptedValue.</param>
  10501. <param name="encryptor">encryptor an output encryptor to encrypt the actual data contained in the EncryptedValue.</param>
  10502. <param name="padder">padder a padder to ensure that the EncryptedValue created will always be a constant length.</param>
  10503. </member>
  10504. <member name="M:Org.BouncyCastle.Crmf.EncryptedValueBuilder.Build(System.Char[])">
  10505. Build an EncryptedValue structure containing the passed in pass phrase.
  10506. <param name="revocationPassphrase">a revocation pass phrase.</param>
  10507. <returns>an EncryptedValue containing the encrypted pass phrase.</returns>
  10508. </member>
  10509. <member name="M:Org.BouncyCastle.Crmf.EncryptedValueBuilder.Build(Org.BouncyCastle.X509.X509Certificate)">
  10510. <summary>
  10511. Build an EncryptedValue structure containing the certificate contained in
  10512. the passed in holder.
  10513. </summary>
  10514. <param name="holder">a holder containing a certificate.</param>
  10515. <returns>an EncryptedValue containing the encrypted certificate.</returns>
  10516. <exception cref="T:Org.BouncyCastle.Crmf.CrmfException">on a failure to encrypt the data, or wrap the symmetric key for this value.</exception>
  10517. </member>
  10518. <member name="M:Org.BouncyCastle.Crmf.EncryptedValueBuilder.Build(Org.BouncyCastle.Asn1.Pkcs.PrivateKeyInfo)">
  10519. <summary>
  10520. Build an EncryptedValue structure containing the private key contained in
  10521. the passed info structure.
  10522. </summary>
  10523. <param name="privateKeyInfo">a PKCS#8 private key info structure.</param>
  10524. <returns>an EncryptedValue containing an EncryptedPrivateKeyInfo structure.</returns>
  10525. <exception cref="T:Org.BouncyCastle.Crmf.CrmfException">on a failure to encrypt the data, or wrap the symmetric key for this value.</exception>
  10526. </member>
  10527. <member name="T:Org.BouncyCastle.Crmf.IControl">
  10528. <summary>
  10529. Generic interface for a CertificateRequestMessage control value.
  10530. </summary>
  10531. </member>
  10532. <member name="P:Org.BouncyCastle.Crmf.IControl.Type">
  10533. <summary>
  10534. Return the type of this control.
  10535. </summary>
  10536. </member>
  10537. <member name="P:Org.BouncyCastle.Crmf.IControl.Value">
  10538. <summary>
  10539. Return the value contained in this control object.
  10540. </summary>
  10541. </member>
  10542. <member name="T:Org.BouncyCastle.Crmf.IEncryptedValuePadder">
  10543. <summary>
  10544. An encrypted value padder is used to make sure that prior to a value been
  10545. encrypted the data is padded to a standard length.
  10546. </summary>
  10547. </member>
  10548. <member name="M:Org.BouncyCastle.Crmf.IEncryptedValuePadder.GetPaddedData(System.Byte[])">
  10549. <summary>Return a byte array of padded data.</summary>
  10550. <param name="data">the data to be padded.</param>
  10551. <returns>a padded byte array containing data.</returns>
  10552. </member>
  10553. <member name="M:Org.BouncyCastle.Crmf.IEncryptedValuePadder.GetUnpaddedData(System.Byte[])">
  10554. <summary>Return a byte array of with padding removed.</summary>
  10555. <param name="paddedData">the data to be padded.</param>
  10556. <returns>an array containing the original unpadded data.</returns>
  10557. </member>
  10558. <member name="M:Org.BouncyCastle.Crmf.PkiArchiveControl.#ctor(Org.BouncyCastle.Asn1.Crmf.PkiArchiveOptions)">
  10559. <summary>
  10560. Basic constructor - build from an PKIArchiveOptions structure.
  10561. </summary>
  10562. <param name="pkiArchiveOptions">the ASN.1 structure that will underlie this control.</param>
  10563. </member>
  10564. <member name="P:Org.BouncyCastle.Crmf.PkiArchiveControl.Type">
  10565. <summary>
  10566. Return the type of this control.
  10567. </summary>
  10568. <returns>CRMFObjectIdentifiers.id_regCtrl_pkiArchiveOptions</returns>
  10569. </member>
  10570. <member name="P:Org.BouncyCastle.Crmf.PkiArchiveControl.Value">
  10571. <summary>
  10572. Return the underlying ASN.1 object.
  10573. </summary>
  10574. <returns>a PKIArchiveOptions structure.</returns>
  10575. </member>
  10576. <member name="P:Org.BouncyCastle.Crmf.PkiArchiveControl.ArchiveType">
  10577. <summary>
  10578. Return the archive control type, one of: encryptedPrivKey,keyGenParameters,or archiveRemGenPrivKey.
  10579. </summary>
  10580. <returns>the archive control type.</returns>
  10581. </member>
  10582. <member name="P:Org.BouncyCastle.Crmf.PkiArchiveControl.EnvelopedData">
  10583. <summary>
  10584. Return whether this control contains enveloped data.
  10585. </summary>
  10586. <returns>true if the control contains enveloped data, false otherwise.</returns>
  10587. </member>
  10588. <member name="M:Org.BouncyCastle.Crmf.PkiArchiveControl.GetEnvelopedData">
  10589. <summary>
  10590. Return the enveloped data structure contained in this control.
  10591. </summary>
  10592. <returns>a CMSEnvelopedData object.</returns>
  10593. </member>
  10594. <member name="M:Org.BouncyCastle.Crmf.PkiArchiveControlBuilder.#ctor(Org.BouncyCastle.Asn1.Pkcs.PrivateKeyInfo,Org.BouncyCastle.Asn1.X509.GeneralName)">
  10595. <summary>
  10596. Basic constructor - specify the contents of the PKIArchiveControl structure.
  10597. </summary>
  10598. <param name="privateKeyInfo">the private key to be archived.</param>
  10599. <param name="generalName">the general name to be associated with the private key.</param>
  10600. </member>
  10601. <member name="M:Org.BouncyCastle.Crmf.PkiArchiveControlBuilder.AddRecipientGenerator(Org.BouncyCastle.Cms.RecipientInfoGenerator)">
  10602. <summary>Add a recipient generator to this control.</summary>
  10603. <param name="recipientGen"> recipient generator created for a specific recipient.</param>
  10604. <returns>this builder object.</returns>
  10605. </member>
  10606. <member name="M:Org.BouncyCastle.Crmf.PkiArchiveControlBuilder.Build(Org.BouncyCastle.Crypto.ICipherBuilderWithKey)">
  10607. <summary>Build the PKIArchiveControl using the passed in encryptor to encrypt its contents.</summary>
  10608. <param name="contentEncryptor">a suitable content encryptor.</param>
  10609. <returns>a PKIArchiveControl object.</returns>
  10610. </member>
  10611. <member name="M:Org.BouncyCastle.Crmf.PKMacBuilder.#ctor">
  10612. <summary>
  10613. Default, IterationCount = 1000, OIW=IdSha1, Mac=HmacSHA1
  10614. </summary>
  10615. </member>
  10616. <member name="M:Org.BouncyCastle.Crmf.PKMacBuilder.#ctor(Org.BouncyCastle.Crmf.IPKMacPrimitivesProvider)">
  10617. <summary>
  10618. Defaults with IPKMacPrimitivesProvider
  10619. </summary>
  10620. <param name="provider"></param>
  10621. </member>
  10622. <member name="M:Org.BouncyCastle.Crmf.PKMacBuilder.#ctor(Org.BouncyCastle.Crmf.IPKMacPrimitivesProvider,Org.BouncyCastle.Asn1.X509.AlgorithmIdentifier,Org.BouncyCastle.Asn1.X509.AlgorithmIdentifier)">
  10623. <summary>
  10624. Create.
  10625. </summary>
  10626. <param name="provider">The Mac provider</param>
  10627. <param name="digestAlgorithmIdentifier">Digest Algorithm Id</param>
  10628. <param name="macAlgorithmIdentifier">Mac Algorithm Id</param>
  10629. </member>
  10630. <member name="M:Org.BouncyCastle.Crmf.PKMacBuilder.#ctor(Org.BouncyCastle.Crmf.IPKMacPrimitivesProvider,System.Int32)">
  10631. <summary>
  10632. Create a PKMAC builder enforcing a ceiling on the maximum iteration count.
  10633. </summary>
  10634. <param name="provider">supporting calculator</param>
  10635. <param name="maxIterations">max allowable value for iteration count.</param>
  10636. </member>
  10637. <member name="M:Org.BouncyCastle.Crmf.PKMacBuilder.SetSaltLength(System.Int32)">
  10638. Set the salt length in octets.
  10639. @param saltLength length in octets of the salt to be generated.
  10640. @return the generator
  10641. </member>
  10642. <member name="M:Org.BouncyCastle.Crmf.PKMacBuilder.SetIterationCount(System.Int32)">
  10643. <summary>
  10644. Set the iteration count.
  10645. </summary>
  10646. <param name="iterationCount">the iteration count.</param>
  10647. <returns>this</returns>
  10648. <exception cref="T:System.ArgumentException">if iteration count is less than 100</exception>
  10649. </member>
  10650. <member name="M:Org.BouncyCastle.Crmf.PKMacBuilder.SetParameters(Org.BouncyCastle.Asn1.Cmp.PbmParameter)">
  10651. <summary>
  10652. Set PbmParameters
  10653. </summary>
  10654. <param name="parameters">The parameters.</param>
  10655. <returns>this</returns>
  10656. </member>
  10657. <member name="M:Org.BouncyCastle.Crmf.PKMacBuilder.SetSecureRandom(Org.BouncyCastle.Security.SecureRandom)">
  10658. <summary>
  10659. The Secure random
  10660. </summary>
  10661. <param name="random">The random.</param>
  10662. <returns>this</returns>
  10663. </member>
  10664. <member name="M:Org.BouncyCastle.Crmf.PKMacBuilder.Build(System.Char[])">
  10665. <summary>
  10666. Build an IMacFactory.
  10667. </summary>
  10668. <param name="password">The password.</param>
  10669. <returns>IMacFactory</returns>
  10670. </member>
  10671. <member name="M:Org.BouncyCastle.Crmf.RegTokenControl.#ctor(Org.BouncyCastle.Asn1.DerUtf8String)">
  10672. <summary>
  10673. Basic constructor - build from a UTF-8 string representing the token.
  10674. </summary>
  10675. <param name="token">UTF-8 string representing the token.</param>
  10676. </member>
  10677. <member name="M:Org.BouncyCastle.Crmf.RegTokenControl.#ctor(System.String)">
  10678. <summary>
  10679. Basic constructor - build from a string representing the token.
  10680. </summary>
  10681. <param name="token">string representing the token.</param>
  10682. </member>
  10683. <member name="P:Org.BouncyCastle.Crmf.RegTokenControl.Type">
  10684. <summary>
  10685. Return the type of this control.
  10686. </summary>
  10687. <returns>CRMFObjectIdentifiers.id_regCtrl_regToken</returns>
  10688. </member>
  10689. <member name="P:Org.BouncyCastle.Crmf.RegTokenControl.Value">
  10690. <summary>
  10691. Return the token associated with this control (a UTF8String).
  10692. </summary>
  10693. <returns>a UTF8String.</returns>
  10694. </member>
  10695. <member name="T:Org.BouncyCastle.Crypto.Agreement.DHAgreement">
  10696. a Diffie-Hellman key exchange engine.
  10697. <p>
  10698. note: This uses MTI/A0 key agreement in order to make the key agreement
  10699. secure against passive attacks. If you're doing Diffie-Hellman and both
  10700. parties have long term public keys you should look at using this. For
  10701. further information have a look at RFC 2631.</p>
  10702. <p>
  10703. It's possible to extend this to more than two parties as well, for the moment
  10704. that is left as an exercise for the reader.</p>
  10705. </member>
  10706. <member name="M:Org.BouncyCastle.Crypto.Agreement.DHAgreement.CalculateMessage">
  10707. calculate our initial message.
  10708. </member>
  10709. <member name="M:Org.BouncyCastle.Crypto.Agreement.DHAgreement.CalculateAgreement(Org.BouncyCastle.Crypto.Parameters.DHPublicKeyParameters,Org.BouncyCastle.Math.BigInteger)">
  10710. given a message from a given party and the corresponding public key
  10711. calculate the next message in the agreement sequence. In this case
  10712. this will represent the shared secret.
  10713. </member>
  10714. <member name="T:Org.BouncyCastle.Crypto.Agreement.DHBasicAgreement">
  10715. a Diffie-Hellman key agreement class.
  10716. <p>
  10717. note: This is only the basic algorithm, it doesn't take advantage of
  10718. long term public keys if they are available. See the DHAgreement class
  10719. for a "better" implementation.</p>
  10720. </member>
  10721. <member name="M:Org.BouncyCastle.Crypto.Agreement.DHBasicAgreement.CalculateAgreement(Org.BouncyCastle.Crypto.ICipherParameters)">
  10722. given a short term public key from a given party calculate the next
  10723. message in the agreement sequence.
  10724. </member>
  10725. <member name="T:Org.BouncyCastle.Crypto.Agreement.DHStandardGroups">
  10726. <summary>Standard Diffie-Hellman groups from various IETF specifications.</summary>
  10727. </member>
  10728. <member name="T:Org.BouncyCastle.Crypto.Agreement.ECDHBasicAgreement">
  10729. P1363 7.2.1 ECSVDP-DH
  10730. ECSVDP-DH is Elliptic Curve Secret Value Derivation Primitive,
  10731. Diffie-Hellman version. It is based on the work of [DH76], [Mil86],
  10732. and [Kob87]. This primitive derives a shared secret value from one
  10733. party's private key and another party's public key, where both have
  10734. the same set of EC domain parameters. If two parties correctly
  10735. execute this primitive, they will produce the same output. This
  10736. primitive can be invoked by a scheme to derive a shared secret key;
  10737. specifically, it may be used with the schemes ECKAS-DH1 and
  10738. DL/ECKAS-DH2. It assumes that the input keys are valid (see also
  10739. Section 7.2.2).
  10740. </member>
  10741. <member name="T:Org.BouncyCastle.Crypto.Agreement.ECDHCBasicAgreement">
  10742. P1363 7.2.2 ECSVDP-DHC
  10743. ECSVDP-DHC is Elliptic Curve Secret Value Derivation Primitive,
  10744. Diffie-Hellman version with cofactor multiplication. It is based on
  10745. the work of [DH76], [Mil86], [Kob87], [LMQ98] and [Kal98a]. This
  10746. primitive derives a shared secret value from one party's private key
  10747. and another party's public key, where both have the same set of EC
  10748. domain parameters. If two parties correctly execute this primitive,
  10749. they will produce the same output. This primitive can be invoked by a
  10750. scheme to derive a shared secret key; specifically, it may be used
  10751. with the schemes ECKAS-DH1 and DL/ECKAS-DH2. It does not assume the
  10752. validity of the input public key (see also Section 7.2.1).
  10753. <p>
  10754. Note: As stated P1363 compatibility mode with ECDH can be preset, and
  10755. in this case the implementation doesn't have a ECDH compatibility mode
  10756. (if you want that just use ECDHBasicAgreement and note they both implement
  10757. BasicAgreement!).</p>
  10758. </member>
  10759. <member name="T:Org.BouncyCastle.Crypto.Agreement.JPake.JPakeParticipant">
  10760. <summary>
  10761. A participant in a Password Authenticated Key Exchange by Juggling (J-PAKE) exchange.
  10762. The J-PAKE exchange is defined by Feng Hao and Peter Ryan in the paper
  10763. <a href="http://grouper.ieee.org/groups/1363/Research/contributions/hao-ryan-2008.pdf">
  10764. "Password Authenticated Key Exchange by Juggling, 2008."</a>
  10765. The J-PAKE protocol is symmetric.
  10766. There is no notion of a <i>client</i> or <i>server</i>, but rather just two <i>participants</i>.
  10767. An instance of JPakeParticipant represents one participant, and
  10768. is the primary interface for executing the exchange.
  10769. To execute an exchange, construct a JPakeParticipant on each end,
  10770. and call the following 7 methods
  10771. (once and only once, in the given order, for each participant, sending messages between them as described):
  10772. CreateRound1PayloadToSend() - and send the payload to the other participant
  10773. ValidateRound1PayloadReceived(JPakeRound1Payload) - use the payload received from the other participant
  10774. CreateRound2PayloadToSend() - and send the payload to the other participant
  10775. ValidateRound2PayloadReceived(JPakeRound2Payload) - use the payload received from the other participant
  10776. CalculateKeyingMaterial()
  10777. CreateRound3PayloadToSend(BigInteger) - and send the payload to the other participant
  10778. ValidateRound3PayloadReceived(JPakeRound3Payload, BigInteger) - use the payload received from the other participant
  10779. Each side should derive a session key from the keying material returned by CalculateKeyingMaterial().
  10780. The caller is responsible for deriving the session key using a secure key derivation function (KDF).
  10781. Round 3 is an optional key confirmation process.
  10782. If you do not execute round 3, then there is no assurance that both participants are using the same key.
  10783. (i.e. if the participants used different passwords, then their session keys will differ.)
  10784. If the round 3 validation succeeds, then the keys are guaranteed to be the same on both sides.
  10785. The symmetric design can easily support the asymmetric cases when one party initiates the communication.
  10786. e.g. Sometimes the round1 payload and round2 payload may be sent in one pass.
  10787. Also, in some cases, the key confirmation payload can be sent together with the round2 payload.
  10788. These are the trivial techniques to optimize the communication.
  10789. The key confirmation process is implemented as specified in
  10790. <a href="http://csrc.nist.gov/publications/nistpubs/800-56A/SP800-56A_Revision1_Mar08-2007.pdf">NIST SP 800-56A Revision 1</a>,
  10791. Section 8.2 Unilateral Key Confirmation for Key Agreement Schemes.
  10792. This class is stateful and NOT threadsafe.
  10793. Each instance should only be used for ONE complete J-PAKE exchange
  10794. (i.e. a new JPakeParticipant should be constructed for each new J-PAKE exchange).
  10795. </summary>
  10796. </member>
  10797. <member name="M:Org.BouncyCastle.Crypto.Agreement.JPake.JPakeParticipant.#ctor(System.String,System.Char[])">
  10798. <summary>
  10799. Convenience constructor for a new JPakeParticipant that uses
  10800. the JPakePrimeOrderGroups#NIST_3072 prime order group,
  10801. a SHA-256 digest, and a default SecureRandom implementation.
  10802. After construction, the State state will be STATE_INITIALIZED.
  10803. Throws NullReferenceException if any argument is null. Throws
  10804. ArgumentException if password is empty.
  10805. </summary>
  10806. <param name="participantId">Unique identifier of this participant.
  10807. The two participants in the exchange must NOT share the same id.</param>
  10808. <param name="password">Shared secret.
  10809. A defensive copy of this array is made (and cleared once CalculateKeyingMaterial() is called).
  10810. Caller should clear the input password as soon as possible.</param>
  10811. </member>
  10812. <member name="M:Org.BouncyCastle.Crypto.Agreement.JPake.JPakeParticipant.#ctor(System.String,System.Char[],Org.BouncyCastle.Crypto.Agreement.JPake.JPakePrimeOrderGroup)">
  10813. <summary>
  10814. Convenience constructor for a new JPakeParticipant that uses
  10815. a SHA-256 digest, and a default SecureRandom implementation.
  10816. After construction, the State state will be STATE_INITIALIZED.
  10817. Throws NullReferenceException if any argument is null. Throws
  10818. ArgumentException if password is empty.
  10819. </summary>
  10820. <param name="participantId">Unique identifier of this participant.
  10821. The two participants in the exchange must NOT share the same id.</param>
  10822. <param name="password">Shared secret.
  10823. A defensive copy of this array is made (and cleared once CalculateKeyingMaterial() is called).
  10824. Caller should clear the input password as soon as possible.</param>
  10825. <param name="group">Prime order group. See JPakePrimeOrderGroups for standard groups.</param>
  10826. </member>
  10827. <member name="M:Org.BouncyCastle.Crypto.Agreement.JPake.JPakeParticipant.#ctor(System.String,System.Char[],Org.BouncyCastle.Crypto.Agreement.JPake.JPakePrimeOrderGroup,Org.BouncyCastle.Crypto.IDigest,Org.BouncyCastle.Security.SecureRandom)">
  10828. <summary>
  10829. Constructor for a new JPakeParticipant.
  10830. After construction, the State state will be STATE_INITIALIZED.
  10831. Throws NullReferenceException if any argument is null. Throws
  10832. ArgumentException if password is empty.
  10833. </summary>
  10834. <param name="participantId">Unique identifier of this participant.
  10835. The two participants in the exchange must NOT share the same id.</param>
  10836. <param name="password">Shared secret.
  10837. A defensive copy of this array is made (and cleared once CalculateKeyingMaterial() is called).
  10838. Caller should clear the input password as soon as possible.</param>
  10839. <param name="group">Prime order group. See JPakePrimeOrderGroups for standard groups.</param>
  10840. <param name="digest">Digest to use during zero knowledge proofs and key confirmation
  10841. (SHA-256 or stronger preferred).</param>
  10842. <param name="random">Source of secure random data for x1 and x2, and for the zero knowledge proofs.</param>
  10843. </member>
  10844. <member name="P:Org.BouncyCastle.Crypto.Agreement.JPake.JPakeParticipant.State">
  10845. <summary>
  10846. Gets the current state of this participant.
  10847. See the <tt>STATE_*</tt> constants for possible values.
  10848. </summary>
  10849. </member>
  10850. <member name="M:Org.BouncyCastle.Crypto.Agreement.JPake.JPakeParticipant.CreateRound1PayloadToSend">
  10851. <summary>
  10852. Creates and returns the payload to send to the other participant during round 1.
  10853. After execution, the State state} will be STATE_ROUND_1_CREATED}.
  10854. </summary>
  10855. </member>
  10856. <member name="M:Org.BouncyCastle.Crypto.Agreement.JPake.JPakeParticipant.ValidateRound1PayloadReceived(Org.BouncyCastle.Crypto.Agreement.JPake.JPakeRound1Payload)">
  10857. <summary>
  10858. Validates the payload received from the other participant during round 1.
  10859. Must be called prior to CreateRound2PayloadToSend().
  10860. After execution, the State state will be STATE_ROUND_1_VALIDATED.
  10861. Throws CryptoException if validation fails. Throws InvalidOperationException
  10862. if called multiple times.
  10863. </summary>
  10864. </member>
  10865. <member name="M:Org.BouncyCastle.Crypto.Agreement.JPake.JPakeParticipant.CreateRound2PayloadToSend">
  10866. <summary>
  10867. Creates and returns the payload to send to the other participant during round 2.
  10868. ValidateRound1PayloadReceived(JPakeRound1Payload) must be called prior to this method.
  10869. After execution, the State state will be STATE_ROUND_2_CREATED.
  10870. Throws InvalidOperationException if called prior to ValidateRound1PayloadReceived(JPakeRound1Payload), or multiple times
  10871. </summary>
  10872. </member>
  10873. <member name="M:Org.BouncyCastle.Crypto.Agreement.JPake.JPakeParticipant.ValidateRound2PayloadReceived(Org.BouncyCastle.Crypto.Agreement.JPake.JPakeRound2Payload)">
  10874. <summary>
  10875. Validates the payload received from the other participant during round 2.
  10876. Note that this DOES NOT detect a non-common password.
  10877. The only indication of a non-common password is through derivation
  10878. of different keys (which can be detected explicitly by executing round 3 and round 4)
  10879. Must be called prior to CalculateKeyingMaterial().
  10880. After execution, the State state will be STATE_ROUND_2_VALIDATED.
  10881. Throws CryptoException if validation fails. Throws
  10882. InvalidOperationException if called prior to ValidateRound1PayloadReceived(JPakeRound1Payload), or multiple times
  10883. </summary>
  10884. </member>
  10885. <member name="M:Org.BouncyCastle.Crypto.Agreement.JPake.JPakeParticipant.CalculateKeyingMaterial">
  10886. <summary>
  10887. Calculates and returns the key material.
  10888. A session key must be derived from this key material using a secure key derivation function (KDF).
  10889. The KDF used to derive the key is handled externally (i.e. not by JPakeParticipant).
  10890. The keying material will be identical for each participant if and only if
  10891. each participant's password is the same. i.e. If the participants do not
  10892. share the same password, then each participant will derive a different key.
  10893. Therefore, if you immediately start using a key derived from
  10894. the keying material, then you must handle detection of incorrect keys.
  10895. If you want to handle this detection explicitly, you can optionally perform
  10896. rounds 3 and 4. See JPakeParticipant for details on how to execute
  10897. rounds 3 and 4.
  10898. The keying material will be in the range <tt>[0, p-1]</tt>.
  10899. ValidateRound2PayloadReceived(JPakeRound2Payload) must be called prior to this method.
  10900. As a side effect, the internal password array is cleared, since it is no longer needed.
  10901. After execution, the State state will be STATE_KEY_CALCULATED.
  10902. Throws InvalidOperationException if called prior to ValidateRound2PayloadReceived(JPakeRound2Payload),
  10903. or if called multiple times.
  10904. </summary>
  10905. </member>
  10906. <member name="M:Org.BouncyCastle.Crypto.Agreement.JPake.JPakeParticipant.CreateRound3PayloadToSend(Org.BouncyCastle.Math.BigInteger)">
  10907. <summary>
  10908. Creates and returns the payload to send to the other participant during round 3.
  10909. See JPakeParticipant for more details on round 3.
  10910. After execution, the State state} will be STATE_ROUND_3_CREATED.
  10911. Throws InvalidOperationException if called prior to CalculateKeyingMaterial, or multiple
  10912. times.
  10913. </summary>
  10914. <param name="keyingMaterial">The keying material as returned from CalculateKeyingMaterial().</param>
  10915. </member>
  10916. <member name="M:Org.BouncyCastle.Crypto.Agreement.JPake.JPakeParticipant.ValidateRound3PayloadReceived(Org.BouncyCastle.Crypto.Agreement.JPake.JPakeRound3Payload,Org.BouncyCastle.Math.BigInteger)">
  10917. <summary>
  10918. Validates the payload received from the other participant during round 3.
  10919. See JPakeParticipant for more details on round 3.
  10920. After execution, the State state will be STATE_ROUND_3_VALIDATED.
  10921. Throws CryptoException if validation fails. Throws InvalidOperationException if called prior to
  10922. CalculateKeyingMaterial or multiple times
  10923. </summary>
  10924. <param name="round3PayloadReceived">The round 3 payload received from the other participant.</param>
  10925. <param name="keyingMaterial">The keying material as returned from CalculateKeyingMaterial().</param>
  10926. </member>
  10927. <member name="T:Org.BouncyCastle.Crypto.Agreement.JPake.JPakePrimeOrderGroup">
  10928. <summary>
  10929. A pre-computed prime order group for use during a J-PAKE exchange.
  10930. Typically a Schnorr group is used. In general, J-PAKE can use any prime order group
  10931. that is suitable for public key cryptography, including elliptic curve cryptography.
  10932. See JPakePrimeOrderGroups for convenient standard groups.
  10933. NIST <a href="http://csrc.nist.gov/groups/ST/toolkit/documents/Examples/DSA2_All.pdf">publishes</a>
  10934. many groups that can be used for the desired level of security.
  10935. </summary>
  10936. </member>
  10937. <member name="M:Org.BouncyCastle.Crypto.Agreement.JPake.JPakePrimeOrderGroup.#ctor(Org.BouncyCastle.Math.BigInteger,Org.BouncyCastle.Math.BigInteger,Org.BouncyCastle.Math.BigInteger)">
  10938. <summary>
  10939. Constructs a new JPakePrimeOrderGroup.
  10940. In general, you should use one of the pre-approved groups from
  10941. JPakePrimeOrderGroups, rather than manually constructing one.
  10942. The following basic checks are performed:
  10943. p-1 must be evenly divisible by q
  10944. g must be in [2, p-1]
  10945. g^q mod p must equal 1
  10946. p must be prime (within reasonably certainty)
  10947. q must be prime (within reasonably certainty)
  10948. The prime checks are performed using BigInteger#isProbablePrime(int),
  10949. and are therefore subject to the same probability guarantees.
  10950. These checks prevent trivial mistakes.
  10951. However, due to the small uncertainties if p and q are not prime,
  10952. advanced attacks are not prevented.
  10953. Use it at your own risk.
  10954. Throws NullReferenceException if any argument is null. Throws
  10955. InvalidOperationException is any of the above validations fail.
  10956. </summary>
  10957. </member>
  10958. <member name="M:Org.BouncyCastle.Crypto.Agreement.JPake.JPakePrimeOrderGroup.#ctor(Org.BouncyCastle.Math.BigInteger,Org.BouncyCastle.Math.BigInteger,Org.BouncyCastle.Math.BigInteger,System.Boolean)">
  10959. <summary>
  10960. Constructor used by the pre-approved groups in JPakePrimeOrderGroups.
  10961. These pre-approved groups can avoid the expensive checks.
  10962. User-specified groups should not use this constructor.
  10963. </summary>
  10964. </member>
  10965. <member name="T:Org.BouncyCastle.Crypto.Agreement.JPake.JPakePrimeOrderGroups">
  10966. <summary>
  10967. Standard pre-computed prime order groups for use by J-PAKE.
  10968. (J-PAKE can use pre-computed prime order groups, same as DSA and Diffie-Hellman.)
  10969. <p/>
  10970. This class contains some convenient constants for use as input for
  10971. constructing {@link JPAKEParticipant}s.
  10972. <p/>
  10973. The prime order groups below are taken from Sun's JDK JavaDoc (docs/guide/security/CryptoSpec.html#AppB),
  10974. and from the prime order groups
  10975. <a href="http://csrc.nist.gov/groups/ST/toolkit/documents/Examples/DSA2_All.pdf">published by NIST</a>.
  10976. </summary>
  10977. </member>
  10978. <member name="F:Org.BouncyCastle.Crypto.Agreement.JPake.JPakePrimeOrderGroups.SUN_JCE_1024">
  10979. <summary>
  10980. From Sun's JDK JavaDoc (docs/guide/security/CryptoSpec.html#AppB)
  10981. 1024-bit p, 160-bit q and 1024-bit g for 80-bit security.
  10982. </summary>
  10983. </member>
  10984. <member name="F:Org.BouncyCastle.Crypto.Agreement.JPake.JPakePrimeOrderGroups.NIST_2048">
  10985. <summary>
  10986. From NIST.
  10987. 2048-bit p, 224-bit q and 2048-bit g for 112-bit security.
  10988. </summary>
  10989. </member>
  10990. <member name="F:Org.BouncyCastle.Crypto.Agreement.JPake.JPakePrimeOrderGroups.NIST_3072">
  10991. <summary>
  10992. From NIST.
  10993. 3072-bit p, 256-bit q and 3072-bit g for 128-bit security.
  10994. </summary>
  10995. </member>
  10996. <member name="T:Org.BouncyCastle.Crypto.Agreement.JPake.JPakeRound1Payload">
  10997. <summary>
  10998. The payload sent/received during the first round of a J-PAKE exchange.
  10999. Each JPAKEParticipant creates and sends an instance of this payload to
  11000. the other. The payload to send should be created via
  11001. JPAKEParticipant.CreateRound1PayloadToSend().
  11002. Each participant must also validate the payload received from the other.
  11003. The received payload should be validated via
  11004. JPAKEParticipant.ValidateRound1PayloadReceived(JPakeRound1Payload).
  11005. </summary>
  11006. </member>
  11007. <member name="F:Org.BouncyCastle.Crypto.Agreement.JPake.JPakeRound1Payload.participantId">
  11008. <summary>
  11009. The id of the JPAKEParticipant who created/sent this payload.
  11010. </summary>
  11011. </member>
  11012. <member name="F:Org.BouncyCastle.Crypto.Agreement.JPake.JPakeRound1Payload.gx1">
  11013. <summary>
  11014. The value of g^x1
  11015. </summary>
  11016. </member>
  11017. <member name="F:Org.BouncyCastle.Crypto.Agreement.JPake.JPakeRound1Payload.gx2">
  11018. <summary>
  11019. The value of g^x2
  11020. </summary>
  11021. </member>
  11022. <member name="F:Org.BouncyCastle.Crypto.Agreement.JPake.JPakeRound1Payload.knowledgeProofForX1">
  11023. <summary>
  11024. The zero knowledge proof for x1.
  11025. This is a two element array, containing {g^v, r} for x1.
  11026. </summary>
  11027. </member>
  11028. <member name="F:Org.BouncyCastle.Crypto.Agreement.JPake.JPakeRound1Payload.knowledgeProofForX2">
  11029. <summary>
  11030. The zero knowledge proof for x2.
  11031. This is a two element array, containing {g^v, r} for x2.
  11032. </summary>
  11033. </member>
  11034. <member name="T:Org.BouncyCastle.Crypto.Agreement.JPake.JPakeRound2Payload">
  11035. <summary>
  11036. The payload sent/received during the second round of a J-PAKE exchange.
  11037. Each JPAKEParticipant creates and sends an instance
  11038. of this payload to the other JPAKEParticipant.
  11039. The payload to send should be created via
  11040. JPAKEParticipant#createRound2PayloadToSend()
  11041. Each JPAKEParticipant must also validate the payload
  11042. received from the other JPAKEParticipant.
  11043. The received payload should be validated via
  11044. JPAKEParticipant#validateRound2PayloadReceived(JPakeRound2Payload)
  11045. </summary>
  11046. </member>
  11047. <member name="F:Org.BouncyCastle.Crypto.Agreement.JPake.JPakeRound2Payload.participantId">
  11048. <summary>
  11049. The id of the JPAKEParticipant who created/sent this payload.
  11050. </summary>
  11051. </member>
  11052. <member name="F:Org.BouncyCastle.Crypto.Agreement.JPake.JPakeRound2Payload.a">
  11053. <summary>
  11054. The value of A, as computed during round 2.
  11055. </summary>
  11056. </member>
  11057. <member name="F:Org.BouncyCastle.Crypto.Agreement.JPake.JPakeRound2Payload.knowledgeProofForX2s">
  11058. <summary>
  11059. The zero knowledge proof for x2 * s.
  11060. This is a two element array, containing {g^v, r} for x2 * s.
  11061. </summary>
  11062. </member>
  11063. <member name="T:Org.BouncyCastle.Crypto.Agreement.JPake.JPakeRound3Payload">
  11064. <summary>
  11065. The payload sent/received during the optional third round of a J-PAKE exchange,
  11066. which is for explicit key confirmation.
  11067. Each JPAKEParticipant creates and sends an instance
  11068. of this payload to the other JPAKEParticipant.
  11069. The payload to send should be created via
  11070. JPAKEParticipant#createRound3PayloadToSend(BigInteger)
  11071. Eeach JPAKEParticipant must also validate the payload
  11072. received from the other JPAKEParticipant.
  11073. The received payload should be validated via
  11074. JPAKEParticipant#validateRound3PayloadReceived(JPakeRound3Payload, BigInteger)
  11075. </summary>
  11076. </member>
  11077. <member name="F:Org.BouncyCastle.Crypto.Agreement.JPake.JPakeRound3Payload.participantId">
  11078. <summary>
  11079. The id of the {@link JPAKEParticipant} who created/sent this payload.
  11080. </summary>
  11081. </member>
  11082. <member name="F:Org.BouncyCastle.Crypto.Agreement.JPake.JPakeRound3Payload.macTag">
  11083. <summary>
  11084. The value of MacTag, as computed by round 3.
  11085. See JPAKEUtil#calculateMacTag(string, string, BigInteger, BigInteger, BigInteger, BigInteger, BigInteger, org.bouncycastle.crypto.Digest)
  11086. </summary>
  11087. </member>
  11088. <member name="T:Org.BouncyCastle.Crypto.Agreement.JPake.JPakeUtilities">
  11089. <summary>
  11090. Primitives needed for a J-PAKE exchange.
  11091. The recommended way to perform a J-PAKE exchange is by using
  11092. two JPAKEParticipants. Internally, those participants
  11093. call these primitive operations in JPakeUtilities.
  11094. The primitives, however, can be used without a JPAKEParticipant if needed.
  11095. </summary>
  11096. </member>
  11097. <member name="M:Org.BouncyCastle.Crypto.Agreement.JPake.JPakeUtilities.GenerateX1(Org.BouncyCastle.Math.BigInteger,Org.BouncyCastle.Security.SecureRandom)">
  11098. <summary>
  11099. Return a value that can be used as x1 or x3 during round 1.
  11100. The returned value is a random value in the range [0, q-1].
  11101. </summary>
  11102. </member>
  11103. <member name="M:Org.BouncyCastle.Crypto.Agreement.JPake.JPakeUtilities.GenerateX2(Org.BouncyCastle.Math.BigInteger,Org.BouncyCastle.Security.SecureRandom)">
  11104. <summary>
  11105. Return a value that can be used as x2 or x4 during round 1.
  11106. The returned value is a random value in the range [1, q-1].
  11107. </summary>
  11108. </member>
  11109. <member name="M:Org.BouncyCastle.Crypto.Agreement.JPake.JPakeUtilities.CalculateS(System.Char[])">
  11110. <summary>
  11111. Converts the given password to a BigInteger
  11112. for use in arithmetic calculations.
  11113. </summary>
  11114. </member>
  11115. <member name="M:Org.BouncyCastle.Crypto.Agreement.JPake.JPakeUtilities.CalculateGx(Org.BouncyCastle.Math.BigInteger,Org.BouncyCastle.Math.BigInteger,Org.BouncyCastle.Math.BigInteger)">
  11116. <summary>
  11117. Calculate g^x mod p as done in round 1.
  11118. </summary>
  11119. </member>
  11120. <member name="M:Org.BouncyCastle.Crypto.Agreement.JPake.JPakeUtilities.CalculateGA(Org.BouncyCastle.Math.BigInteger,Org.BouncyCastle.Math.BigInteger,Org.BouncyCastle.Math.BigInteger,Org.BouncyCastle.Math.BigInteger)">
  11121. <summary>
  11122. Calculate ga as done in round 2.
  11123. </summary>
  11124. </member>
  11125. <member name="M:Org.BouncyCastle.Crypto.Agreement.JPake.JPakeUtilities.CalculateX2s(Org.BouncyCastle.Math.BigInteger,Org.BouncyCastle.Math.BigInteger,Org.BouncyCastle.Math.BigInteger)">
  11126. <summary>
  11127. Calculate x2 * s as done in round 2.
  11128. </summary>
  11129. </member>
  11130. <member name="M:Org.BouncyCastle.Crypto.Agreement.JPake.JPakeUtilities.CalculateA(Org.BouncyCastle.Math.BigInteger,Org.BouncyCastle.Math.BigInteger,Org.BouncyCastle.Math.BigInteger,Org.BouncyCastle.Math.BigInteger)">
  11131. <summary>
  11132. Calculate A as done in round 2.
  11133. </summary>
  11134. </member>
  11135. <member name="M:Org.BouncyCastle.Crypto.Agreement.JPake.JPakeUtilities.CalculateZeroKnowledgeProof(Org.BouncyCastle.Math.BigInteger,Org.BouncyCastle.Math.BigInteger,Org.BouncyCastle.Math.BigInteger,Org.BouncyCastle.Math.BigInteger,Org.BouncyCastle.Math.BigInteger,System.String,Org.BouncyCastle.Crypto.IDigest,Org.BouncyCastle.Security.SecureRandom)">
  11136. <summary>
  11137. Calculate a zero knowledge proof of x using Schnorr's signature.
  11138. The returned array has two elements {g^v, r = v-x*h} for x.
  11139. </summary>
  11140. </member>
  11141. <member name="M:Org.BouncyCastle.Crypto.Agreement.JPake.JPakeUtilities.ValidateGx4(Org.BouncyCastle.Math.BigInteger)">
  11142. <summary>
  11143. Validates that g^x4 is not 1.
  11144. throws CryptoException if g^x4 is 1
  11145. </summary>
  11146. </member>
  11147. <member name="M:Org.BouncyCastle.Crypto.Agreement.JPake.JPakeUtilities.ValidateGa(Org.BouncyCastle.Math.BigInteger)">
  11148. <summary>
  11149. Validates that ga is not 1.
  11150. As described by Feng Hao...
  11151. Alice could simply check ga != 1 to ensure it is a generator.
  11152. In fact, as we will explain in Section 3, (x1 + x3 + x4 ) is random over Zq even in the face of active attacks.
  11153. Hence, the probability for ga = 1 is extremely small - on the order of 2^160 for 160-bit q.
  11154. throws CryptoException if ga is 1
  11155. </summary>
  11156. </member>
  11157. <member name="M:Org.BouncyCastle.Crypto.Agreement.JPake.JPakeUtilities.ValidateZeroKnowledgeProof(Org.BouncyCastle.Math.BigInteger,Org.BouncyCastle.Math.BigInteger,Org.BouncyCastle.Math.BigInteger,Org.BouncyCastle.Math.BigInteger,Org.BouncyCastle.Math.BigInteger[],System.String,Org.BouncyCastle.Crypto.IDigest)">
  11158. <summary>
  11159. Validates the zero knowledge proof (generated by
  11160. calculateZeroKnowledgeProof(BigInteger, BigInteger, BigInteger, BigInteger, BigInteger, string, Digest, SecureRandom)
  11161. is correct.
  11162. throws CryptoException if the zero knowledge proof is not correct
  11163. </summary>
  11164. </member>
  11165. <member name="M:Org.BouncyCastle.Crypto.Agreement.JPake.JPakeUtilities.CalculateKeyingMaterial(Org.BouncyCastle.Math.BigInteger,Org.BouncyCastle.Math.BigInteger,Org.BouncyCastle.Math.BigInteger,Org.BouncyCastle.Math.BigInteger,Org.BouncyCastle.Math.BigInteger,Org.BouncyCastle.Math.BigInteger)">
  11166. <summary>
  11167. Calculates the keying material, which can be done after round 2 has completed.
  11168. A session key must be derived from this key material using a secure key derivation function (KDF).
  11169. The KDF used to derive the key is handled externally (i.e. not by JPAKEParticipant).
  11170. KeyingMaterial = (B/g^{x2*x4*s})^x2
  11171. </summary>
  11172. </member>
  11173. <member name="M:Org.BouncyCastle.Crypto.Agreement.JPake.JPakeUtilities.ValidateParticipantIdsDiffer(System.String,System.String)">
  11174. <summary>
  11175. Validates that the given participant ids are not equal.
  11176. (For the J-PAKE exchange, each participant must use a unique id.)
  11177. Throws CryptoException if the participantId strings are equal.
  11178. </summary>
  11179. </member>
  11180. <member name="M:Org.BouncyCastle.Crypto.Agreement.JPake.JPakeUtilities.ValidateParticipantIdsEqual(System.String,System.String)">
  11181. <summary>
  11182. Validates that the given participant ids are equal.
  11183. This is used to ensure that the payloads received from
  11184. each round all come from the same participant.
  11185. </summary>
  11186. </member>
  11187. <member name="M:Org.BouncyCastle.Crypto.Agreement.JPake.JPakeUtilities.ValidateNotNull(System.Object,System.String)">
  11188. <summary>
  11189. Validates that the given object is not null.
  11190. throws NullReferenceException if the object is null.
  11191. </summary>
  11192. <param name="obj">object in question</param>
  11193. <param name="description">name of the object (to be used in exception message)</param>
  11194. </member>
  11195. <member name="M:Org.BouncyCastle.Crypto.Agreement.JPake.JPakeUtilities.CalculateMacTag(System.String,System.String,Org.BouncyCastle.Math.BigInteger,Org.BouncyCastle.Math.BigInteger,Org.BouncyCastle.Math.BigInteger,Org.BouncyCastle.Math.BigInteger,Org.BouncyCastle.Math.BigInteger,Org.BouncyCastle.Crypto.IDigest)">
  11196. <summary>
  11197. Calculates the MacTag (to be used for key confirmation), as defined by
  11198. <a href="http://csrc.nist.gov/publications/nistpubs/800-56A/SP800-56A_Revision1_Mar08-2007.pdf">NIST SP 800-56A Revision 1</a>,
  11199. Section 8.2 Unilateral Key Confirmation for Key Agreement Schemes.
  11200. MacTag = HMAC(MacKey, MacLen, MacData)
  11201. MacKey = H(K || "JPAKE_KC")
  11202. MacData = "KC_1_U" || participantId || partnerParticipantId || gx1 || gx2 || gx3 || gx4
  11203. Note that both participants use "KC_1_U" because the sender of the round 3 message
  11204. is always the initiator for key confirmation.
  11205. HMAC = {@link HMac} used with the given {@link Digest}
  11206. H = The given {@link Digest}
  11207. MacLen = length of MacTag
  11208. </summary>
  11209. </member>
  11210. <member name="M:Org.BouncyCastle.Crypto.Agreement.JPake.JPakeUtilities.CalculateMacKey(Org.BouncyCastle.Math.BigInteger,Org.BouncyCastle.Crypto.IDigest)">
  11211. <summary>
  11212. Calculates the MacKey (i.e. the key to use when calculating the MagTag for key confirmation).
  11213. MacKey = H(K || "JPAKE_KC")
  11214. </summary>
  11215. </member>
  11216. <member name="M:Org.BouncyCastle.Crypto.Agreement.JPake.JPakeUtilities.ValidateMacTag(System.String,System.String,Org.BouncyCastle.Math.BigInteger,Org.BouncyCastle.Math.BigInteger,Org.BouncyCastle.Math.BigInteger,Org.BouncyCastle.Math.BigInteger,Org.BouncyCastle.Math.BigInteger,Org.BouncyCastle.Crypto.IDigest,Org.BouncyCastle.Math.BigInteger)">
  11217. <summary>
  11218. Validates the MacTag received from the partner participant.
  11219. throws CryptoException if the participantId strings are equal.
  11220. </summary>
  11221. </member>
  11222. <member name="T:Org.BouncyCastle.Crypto.Agreement.Kdf.ConcatenationKdfGenerator">
  11223. Generator for Concatenation Key Derivation Function defined in NIST SP 800-56A, Sect 5.8.1
  11224. </member>
  11225. <member name="M:Org.BouncyCastle.Crypto.Agreement.Kdf.ConcatenationKdfGenerator.#ctor(Org.BouncyCastle.Crypto.IDigest)">
  11226. @param digest the digest to be used as the source of generated bytes
  11227. </member>
  11228. <member name="P:Org.BouncyCastle.Crypto.Agreement.Kdf.ConcatenationKdfGenerator.Digest">
  11229. return the underlying digest.
  11230. </member>
  11231. <member name="M:Org.BouncyCastle.Crypto.Agreement.Kdf.ConcatenationKdfGenerator.GenerateBytes(System.Byte[],System.Int32,System.Int32)">
  11232. fill len bytes of the output buffer with bytes generated from
  11233. the derivation function.
  11234. @throws DataLengthException if the out buffer is too small.
  11235. </member>
  11236. <member name="T:Org.BouncyCastle.Crypto.Agreement.Kdf.DHKekGenerator">
  11237. RFC 2631 Diffie-hellman KEK derivation function.
  11238. </member>
  11239. <member name="T:Org.BouncyCastle.Crypto.Agreement.Kdf.ECDHKekGenerator">
  11240. X9.63 based key derivation function for ECDH CMS.
  11241. </member>
  11242. <member name="T:Org.BouncyCastle.Crypto.Agreement.SM2KeyExchange">
  11243. <summary>
  11244. SM2 Key Exchange protocol - based on https://tools.ietf.org/html/draft-shen-sm2-ecdsa-02
  11245. </summary>
  11246. </member>
  11247. <member name="T:Org.BouncyCastle.Crypto.Agreement.Srp.Srp6Client">
  11248. Implements the client side SRP-6a protocol. Note that this class is stateful, and therefore NOT threadsafe.
  11249. This implementation of SRP is based on the optimized message sequence put forth by Thomas Wu in the paper
  11250. "SRP-6: Improvements and Refinements to the Secure Remote Password Protocol, 2002"
  11251. </member>
  11252. <member name="M:Org.BouncyCastle.Crypto.Agreement.Srp.Srp6Client.Init(Org.BouncyCastle.Math.BigInteger,Org.BouncyCastle.Math.BigInteger,Org.BouncyCastle.Crypto.IDigest,Org.BouncyCastle.Security.SecureRandom)">
  11253. Initialises the client to begin new authentication attempt
  11254. @param N The safe prime associated with the client's verifier
  11255. @param g The group parameter associated with the client's verifier
  11256. @param digest The digest algorithm associated with the client's verifier
  11257. @param random For key generation
  11258. </member>
  11259. <member name="M:Org.BouncyCastle.Crypto.Agreement.Srp.Srp6Client.GenerateClientCredentials(System.Byte[],System.Byte[],System.Byte[])">
  11260. Generates client's credentials given the client's salt, identity and password
  11261. @param salt The salt used in the client's verifier.
  11262. @param identity The user's identity (eg. username)
  11263. @param password The user's password
  11264. @return Client's public value to send to server
  11265. </member>
  11266. <member name="M:Org.BouncyCastle.Crypto.Agreement.Srp.Srp6Client.CalculateSecret(Org.BouncyCastle.Math.BigInteger)">
  11267. Generates client's verification message given the server's credentials
  11268. @param serverB The server's credentials
  11269. @return Client's verification message for the server
  11270. @throws CryptoException If server's credentials are invalid
  11271. </member>
  11272. <member name="M:Org.BouncyCastle.Crypto.Agreement.Srp.Srp6Client.CalculateClientEvidenceMessage">
  11273. Computes the client evidence message M1 using the previously received values.
  11274. To be called after calculating the secret S.
  11275. @return M1: the client side generated evidence message
  11276. @throws CryptoException
  11277. </member>
  11278. <member name="M:Org.BouncyCastle.Crypto.Agreement.Srp.Srp6Client.VerifyServerEvidenceMessage(Org.BouncyCastle.Math.BigInteger)">
  11279. Authenticates the server evidence message M2 received and saves it only if correct.
  11280. @param M2: the server side generated evidence message
  11281. @return A boolean indicating if the server message M2 was the expected one.
  11282. @throws CryptoException
  11283. </member>
  11284. <member name="M:Org.BouncyCastle.Crypto.Agreement.Srp.Srp6Client.CalculateSessionKey">
  11285. Computes the final session key as a result of the SRP successful mutual authentication
  11286. To be called after verifying the server evidence message M2.
  11287. @return Key: the mutually authenticated symmetric session key
  11288. @throws CryptoException
  11289. </member>
  11290. <member name="T:Org.BouncyCastle.Crypto.Agreement.Srp.Srp6Server">
  11291. Implements the server side SRP-6a protocol. Note that this class is stateful, and therefore NOT threadsafe.
  11292. This implementation of SRP is based on the optimized message sequence put forth by Thomas Wu in the paper
  11293. "SRP-6: Improvements and Refinements to the Secure Remote Password Protocol, 2002"
  11294. </member>
  11295. <member name="M:Org.BouncyCastle.Crypto.Agreement.Srp.Srp6Server.Init(Org.BouncyCastle.Math.BigInteger,Org.BouncyCastle.Math.BigInteger,Org.BouncyCastle.Math.BigInteger,Org.BouncyCastle.Crypto.IDigest,Org.BouncyCastle.Security.SecureRandom)">
  11296. Initialises the server to accept a new client authentication attempt
  11297. @param N The safe prime associated with the client's verifier
  11298. @param g The group parameter associated with the client's verifier
  11299. @param v The client's verifier
  11300. @param digest The digest algorithm associated with the client's verifier
  11301. @param random For key generation
  11302. </member>
  11303. <member name="M:Org.BouncyCastle.Crypto.Agreement.Srp.Srp6Server.GenerateServerCredentials">
  11304. Generates the server's credentials that are to be sent to the client.
  11305. @return The server's public value to the client
  11306. </member>
  11307. <member name="M:Org.BouncyCastle.Crypto.Agreement.Srp.Srp6Server.CalculateSecret(Org.BouncyCastle.Math.BigInteger)">
  11308. Processes the client's credentials. If valid the shared secret is generated and returned.
  11309. @param clientA The client's credentials
  11310. @return A shared secret BigInteger
  11311. @throws CryptoException If client's credentials are invalid
  11312. </member>
  11313. <member name="M:Org.BouncyCastle.Crypto.Agreement.Srp.Srp6Server.VerifyClientEvidenceMessage(Org.BouncyCastle.Math.BigInteger)">
  11314. Authenticates the received client evidence message M1 and saves it only if correct.
  11315. To be called after calculating the secret S.
  11316. @param M1: the client side generated evidence message
  11317. @return A boolean indicating if the client message M1 was the expected one.
  11318. @throws CryptoException
  11319. </member>
  11320. <member name="M:Org.BouncyCastle.Crypto.Agreement.Srp.Srp6Server.CalculateServerEvidenceMessage">
  11321. Computes the server evidence message M2 using the previously verified values.
  11322. To be called after successfully verifying the client evidence message M1.
  11323. @return M2: the server side generated evidence message
  11324. @throws CryptoException
  11325. </member>
  11326. <member name="M:Org.BouncyCastle.Crypto.Agreement.Srp.Srp6Server.CalculateSessionKey">
  11327. Computes the final session key as a result of the SRP successful mutual authentication
  11328. To be called after calculating the server evidence message M2.
  11329. @return Key: the mutual authenticated symmetric session key
  11330. @throws CryptoException
  11331. </member>
  11332. <member name="M:Org.BouncyCastle.Crypto.Agreement.Srp.Srp6Utilities.CalculateM1(Org.BouncyCastle.Crypto.IDigest,Org.BouncyCastle.Math.BigInteger,Org.BouncyCastle.Math.BigInteger,Org.BouncyCastle.Math.BigInteger,Org.BouncyCastle.Math.BigInteger)">
  11333. Computes the client evidence message (M1) according to the standard routine:
  11334. M1 = H( A | B | S )
  11335. @param digest The Digest used as the hashing function H
  11336. @param N Modulus used to get the pad length
  11337. @param A The public client value
  11338. @param B The public server value
  11339. @param S The secret calculated by both sides
  11340. @return M1 The calculated client evidence message
  11341. </member>
  11342. <member name="M:Org.BouncyCastle.Crypto.Agreement.Srp.Srp6Utilities.CalculateM2(Org.BouncyCastle.Crypto.IDigest,Org.BouncyCastle.Math.BigInteger,Org.BouncyCastle.Math.BigInteger,Org.BouncyCastle.Math.BigInteger,Org.BouncyCastle.Math.BigInteger)">
  11343. Computes the server evidence message (M2) according to the standard routine:
  11344. M2 = H( A | M1 | S )
  11345. @param digest The Digest used as the hashing function H
  11346. @param N Modulus used to get the pad length
  11347. @param A The public client value
  11348. @param M1 The client evidence message
  11349. @param S The secret calculated by both sides
  11350. @return M2 The calculated server evidence message
  11351. </member>
  11352. <member name="M:Org.BouncyCastle.Crypto.Agreement.Srp.Srp6Utilities.CalculateKey(Org.BouncyCastle.Crypto.IDigest,Org.BouncyCastle.Math.BigInteger,Org.BouncyCastle.Math.BigInteger)">
  11353. Computes the final Key according to the standard routine: Key = H(S)
  11354. @param digest The Digest used as the hashing function H
  11355. @param N Modulus used to get the pad length
  11356. @param S The secret calculated by both sides
  11357. @return
  11358. </member>
  11359. <member name="T:Org.BouncyCastle.Crypto.Agreement.Srp.Srp6VerifierGenerator">
  11360. Generates new SRP verifier for user
  11361. </member>
  11362. <member name="M:Org.BouncyCastle.Crypto.Agreement.Srp.Srp6VerifierGenerator.Init(Org.BouncyCastle.Math.BigInteger,Org.BouncyCastle.Math.BigInteger,Org.BouncyCastle.Crypto.IDigest)">
  11363. Initialises generator to create new verifiers
  11364. @param N The safe prime to use (see DHParametersGenerator)
  11365. @param g The group parameter to use (see DHParametersGenerator)
  11366. @param digest The digest to use. The same digest type will need to be used later for the actual authentication
  11367. attempt. Also note that the final session key size is dependent on the chosen digest.
  11368. </member>
  11369. <member name="M:Org.BouncyCastle.Crypto.Agreement.Srp.Srp6VerifierGenerator.GenerateVerifier(System.Byte[],System.Byte[],System.Byte[])">
  11370. Creates a new SRP verifier
  11371. @param salt The salt to use, generally should be large and random
  11372. @param identity The user's identifying information (eg. username)
  11373. @param password The user's password
  11374. @return A new verifier for use in future SRP authentication
  11375. </member>
  11376. <member name="T:Org.BouncyCastle.Crypto.AsymmetricCipherKeyPair">
  11377. a holding class for public/private parameter pairs.
  11378. </member>
  11379. <member name="M:Org.BouncyCastle.Crypto.AsymmetricCipherKeyPair.#ctor(Org.BouncyCastle.Crypto.AsymmetricKeyParameter,Org.BouncyCastle.Crypto.AsymmetricKeyParameter)">
  11380. basic constructor.
  11381. @param publicParam a public key parameters object.
  11382. @param privateParam the corresponding private key parameters.
  11383. </member>
  11384. <member name="P:Org.BouncyCastle.Crypto.AsymmetricCipherKeyPair.Public">
  11385. return the public key parameters.
  11386. @return the public key parameters.
  11387. </member>
  11388. <member name="P:Org.BouncyCastle.Crypto.AsymmetricCipherKeyPair.Private">
  11389. return the private key parameters.
  11390. @return the private key parameters.
  11391. </member>
  11392. <member name="T:Org.BouncyCastle.Crypto.BufferedAeadBlockCipher">
  11393. The AEAD block ciphers already handle buffering internally, so this class
  11394. just takes care of implementing IBufferedCipher methods.
  11395. </member>
  11396. <member name="M:Org.BouncyCastle.Crypto.BufferedAeadBlockCipher.Init(System.Boolean,Org.BouncyCastle.Crypto.ICipherParameters)">
  11397. initialise the cipher.
  11398. @param forEncryption if true the cipher is initialised for
  11399. encryption, if false for decryption.
  11400. @param param the key and other data required by the cipher.
  11401. @exception ArgumentException if the parameters argument is
  11402. inappropriate.
  11403. </member>
  11404. <member name="M:Org.BouncyCastle.Crypto.BufferedAeadBlockCipher.GetBlockSize">
  11405. return the blocksize for the underlying cipher.
  11406. @return the blocksize for the underlying cipher.
  11407. </member>
  11408. <member name="M:Org.BouncyCastle.Crypto.BufferedAeadBlockCipher.GetUpdateOutputSize(System.Int32)">
  11409. return the size of the output buffer required for an update
  11410. an input of len bytes.
  11411. @param len the length of the input.
  11412. @return the space required to accommodate a call to update
  11413. with len bytes of input.
  11414. </member>
  11415. <member name="M:Org.BouncyCastle.Crypto.BufferedAeadBlockCipher.GetOutputSize(System.Int32)">
  11416. return the size of the output buffer required for an update plus a
  11417. doFinal with an input of len bytes.
  11418. @param len the length of the input.
  11419. @return the space required to accommodate a call to update and doFinal
  11420. with len bytes of input.
  11421. </member>
  11422. <member name="M:Org.BouncyCastle.Crypto.BufferedAeadBlockCipher.ProcessByte(System.Byte,System.Byte[],System.Int32)">
  11423. process a single byte, producing an output block if necessary.
  11424. @param in the input byte.
  11425. @param out the space for any output that might be produced.
  11426. @param outOff the offset from which the output will be copied.
  11427. @return the number of output bytes copied to out.
  11428. @exception DataLengthException if there isn't enough space in out.
  11429. @exception InvalidOperationException if the cipher isn't initialised.
  11430. </member>
  11431. <member name="M:Org.BouncyCastle.Crypto.BufferedAeadBlockCipher.ProcessBytes(System.Byte[],System.Int32,System.Int32,System.Byte[],System.Int32)">
  11432. process an array of bytes, producing output if necessary.
  11433. @param in the input byte array.
  11434. @param inOff the offset at which the input data starts.
  11435. @param len the number of bytes to be copied out of the input array.
  11436. @param out the space for any output that might be produced.
  11437. @param outOff the offset from which the output will be copied.
  11438. @return the number of output bytes copied to out.
  11439. @exception DataLengthException if there isn't enough space in out.
  11440. @exception InvalidOperationException if the cipher isn't initialised.
  11441. </member>
  11442. <member name="M:Org.BouncyCastle.Crypto.BufferedAeadBlockCipher.DoFinal(System.Byte[],System.Int32)">
  11443. Process the last block in the buffer.
  11444. @param out the array the block currently being held is copied into.
  11445. @param outOff the offset at which the copying starts.
  11446. @return the number of output bytes copied to out.
  11447. @exception DataLengthException if there is insufficient space in out for
  11448. the output, or the input is not block size aligned and should be.
  11449. @exception InvalidOperationException if the underlying cipher is not
  11450. initialised.
  11451. @exception InvalidCipherTextException if padding is expected and not found.
  11452. @exception DataLengthException if the input is not block size
  11453. aligned.
  11454. </member>
  11455. <member name="M:Org.BouncyCastle.Crypto.BufferedAeadBlockCipher.Reset">
  11456. Reset the buffer and cipher. After resetting the object is in the same
  11457. state as it was after the last init (if there was one).
  11458. </member>
  11459. <member name="T:Org.BouncyCastle.Crypto.BufferedAeadCipher">
  11460. The AEAD ciphers already handle buffering internally, so this class
  11461. just takes care of implementing IBufferedCipher methods.
  11462. </member>
  11463. <member name="M:Org.BouncyCastle.Crypto.BufferedAeadCipher.Init(System.Boolean,Org.BouncyCastle.Crypto.ICipherParameters)">
  11464. initialise the cipher.
  11465. @param forEncryption if true the cipher is initialised for
  11466. encryption, if false for decryption.
  11467. @param param the key and other data required by the cipher.
  11468. @exception ArgumentException if the parameters argument is
  11469. inappropriate.
  11470. </member>
  11471. <member name="M:Org.BouncyCastle.Crypto.BufferedAeadCipher.GetBlockSize">
  11472. return the blocksize for the underlying cipher.
  11473. @return the blocksize for the underlying cipher.
  11474. </member>
  11475. <member name="M:Org.BouncyCastle.Crypto.BufferedAeadCipher.GetUpdateOutputSize(System.Int32)">
  11476. return the size of the output buffer required for an update
  11477. an input of len bytes.
  11478. @param len the length of the input.
  11479. @return the space required to accommodate a call to update
  11480. with len bytes of input.
  11481. </member>
  11482. <member name="M:Org.BouncyCastle.Crypto.BufferedAeadCipher.GetOutputSize(System.Int32)">
  11483. return the size of the output buffer required for an update plus a
  11484. doFinal with an input of len bytes.
  11485. @param len the length of the input.
  11486. @return the space required to accommodate a call to update and doFinal
  11487. with len bytes of input.
  11488. </member>
  11489. <member name="M:Org.BouncyCastle.Crypto.BufferedAeadCipher.ProcessByte(System.Byte,System.Byte[],System.Int32)">
  11490. process a single byte, producing an output block if necessary.
  11491. @param in the input byte.
  11492. @param out the space for any output that might be produced.
  11493. @param outOff the offset from which the output will be copied.
  11494. @return the number of output bytes copied to out.
  11495. @exception DataLengthException if there isn't enough space in out.
  11496. @exception InvalidOperationException if the cipher isn't initialised.
  11497. </member>
  11498. <member name="M:Org.BouncyCastle.Crypto.BufferedAeadCipher.ProcessBytes(System.Byte[],System.Int32,System.Int32,System.Byte[],System.Int32)">
  11499. process an array of bytes, producing output if necessary.
  11500. @param in the input byte array.
  11501. @param inOff the offset at which the input data starts.
  11502. @param len the number of bytes to be copied out of the input array.
  11503. @param out the space for any output that might be produced.
  11504. @param outOff the offset from which the output will be copied.
  11505. @return the number of output bytes copied to out.
  11506. @exception DataLengthException if there isn't enough space in out.
  11507. @exception InvalidOperationException if the cipher isn't initialised.
  11508. </member>
  11509. <member name="M:Org.BouncyCastle.Crypto.BufferedAeadCipher.DoFinal(System.Byte[],System.Int32)">
  11510. Process the last block in the buffer.
  11511. @param out the array the block currently being held is copied into.
  11512. @param outOff the offset at which the copying starts.
  11513. @return the number of output bytes copied to out.
  11514. @exception DataLengthException if there is insufficient space in out for
  11515. the output, or the input is not block size aligned and should be.
  11516. @exception InvalidOperationException if the underlying cipher is not
  11517. initialised.
  11518. @exception InvalidCipherTextException if padding is expected and not found.
  11519. @exception DataLengthException if the input is not block size
  11520. aligned.
  11521. </member>
  11522. <member name="M:Org.BouncyCastle.Crypto.BufferedAeadCipher.Reset">
  11523. Reset the buffer and cipher. After resetting the object is in the same
  11524. state as it was after the last init (if there was one).
  11525. </member>
  11526. <member name="T:Org.BouncyCastle.Crypto.BufferedAsymmetricBlockCipher">
  11527. a buffer wrapper for an asymmetric block cipher, allowing input
  11528. to be accumulated in a piecemeal fashion until final processing.
  11529. </member>
  11530. <member name="M:Org.BouncyCastle.Crypto.BufferedAsymmetricBlockCipher.#ctor(Org.BouncyCastle.Crypto.IAsymmetricBlockCipher)">
  11531. base constructor.
  11532. @param cipher the cipher this buffering object wraps.
  11533. </member>
  11534. <member name="M:Org.BouncyCastle.Crypto.BufferedAsymmetricBlockCipher.GetBufferPosition">
  11535. return the amount of data sitting in the buffer.
  11536. @return the amount of data sitting in the buffer.
  11537. </member>
  11538. <member name="M:Org.BouncyCastle.Crypto.BufferedAsymmetricBlockCipher.Init(System.Boolean,Org.BouncyCastle.Crypto.ICipherParameters)">
  11539. initialise the buffer and the underlying cipher.
  11540. @param forEncryption if true the cipher is initialised for
  11541. encryption, if false for decryption.
  11542. @param param the key and other data required by the cipher.
  11543. </member>
  11544. <member name="M:Org.BouncyCastle.Crypto.BufferedAsymmetricBlockCipher.DoFinal">
  11545. process the contents of the buffer using the underlying
  11546. cipher.
  11547. @return the result of the encryption/decryption process on the
  11548. buffer.
  11549. @exception InvalidCipherTextException if we are given a garbage block.
  11550. </member>
  11551. <member name="M:Org.BouncyCastle.Crypto.BufferedAsymmetricBlockCipher.Reset">
  11552. <summary>Reset the buffer</summary>
  11553. </member>
  11554. <member name="T:Org.BouncyCastle.Crypto.BufferedBlockCipher">
  11555. A wrapper class that allows block ciphers to be used to process data in
  11556. a piecemeal fashion. The BufferedBlockCipher outputs a block only when the
  11557. buffer is full and more data is being added, or on a doFinal.
  11558. <p>
  11559. Note: in the case where the underlying cipher is either a CFB cipher or an
  11560. OFB one the last block may not be a multiple of the block size.
  11561. </p>
  11562. </member>
  11563. <member name="M:Org.BouncyCastle.Crypto.BufferedBlockCipher.#ctor">
  11564. constructor for subclasses
  11565. </member>
  11566. <member name="M:Org.BouncyCastle.Crypto.BufferedBlockCipher.#ctor(Org.BouncyCastle.Crypto.IBlockCipher)">
  11567. Create a buffered block cipher without padding.
  11568. @param cipher the underlying block cipher this buffering object wraps.
  11569. false otherwise.
  11570. </member>
  11571. <member name="M:Org.BouncyCastle.Crypto.BufferedBlockCipher.Init(System.Boolean,Org.BouncyCastle.Crypto.ICipherParameters)">
  11572. initialise the cipher.
  11573. @param forEncryption if true the cipher is initialised for
  11574. encryption, if false for decryption.
  11575. @param param the key and other data required by the cipher.
  11576. @exception ArgumentException if the parameters argument is
  11577. inappropriate.
  11578. </member>
  11579. <member name="M:Org.BouncyCastle.Crypto.BufferedBlockCipher.GetBlockSize">
  11580. return the blocksize for the underlying cipher.
  11581. @return the blocksize for the underlying cipher.
  11582. </member>
  11583. <member name="M:Org.BouncyCastle.Crypto.BufferedBlockCipher.GetUpdateOutputSize(System.Int32)">
  11584. return the size of the output buffer required for an update
  11585. an input of len bytes.
  11586. @param len the length of the input.
  11587. @return the space required to accommodate a call to update
  11588. with len bytes of input.
  11589. </member>
  11590. <member name="M:Org.BouncyCastle.Crypto.BufferedBlockCipher.GetOutputSize(System.Int32)">
  11591. return the size of the output buffer required for an update plus a
  11592. doFinal with an input of len bytes.
  11593. @param len the length of the input.
  11594. @return the space required to accommodate a call to update and doFinal
  11595. with len bytes of input.
  11596. </member>
  11597. <member name="M:Org.BouncyCastle.Crypto.BufferedBlockCipher.ProcessByte(System.Byte,System.Byte[],System.Int32)">
  11598. process a single byte, producing an output block if necessary.
  11599. @param in the input byte.
  11600. @param out the space for any output that might be produced.
  11601. @param outOff the offset from which the output will be copied.
  11602. @return the number of output bytes copied to out.
  11603. @exception DataLengthException if there isn't enough space in out.
  11604. @exception InvalidOperationException if the cipher isn't initialised.
  11605. </member>
  11606. <member name="M:Org.BouncyCastle.Crypto.BufferedBlockCipher.ProcessBytes(System.Byte[],System.Int32,System.Int32,System.Byte[],System.Int32)">
  11607. process an array of bytes, producing output if necessary.
  11608. @param in the input byte array.
  11609. @param inOff the offset at which the input data starts.
  11610. @param len the number of bytes to be copied out of the input array.
  11611. @param out the space for any output that might be produced.
  11612. @param outOff the offset from which the output will be copied.
  11613. @return the number of output bytes copied to out.
  11614. @exception DataLengthException if there isn't enough space in out.
  11615. @exception InvalidOperationException if the cipher isn't initialised.
  11616. </member>
  11617. <member name="M:Org.BouncyCastle.Crypto.BufferedBlockCipher.DoFinal(System.Byte[],System.Int32)">
  11618. Process the last block in the buffer.
  11619. @param out the array the block currently being held is copied into.
  11620. @param outOff the offset at which the copying starts.
  11621. @return the number of output bytes copied to out.
  11622. @exception DataLengthException if there is insufficient space in out for
  11623. the output, or the input is not block size aligned and should be.
  11624. @exception InvalidOperationException if the underlying cipher is not
  11625. initialised.
  11626. @exception InvalidCipherTextException if padding is expected and not found.
  11627. @exception DataLengthException if the input is not block size
  11628. aligned.
  11629. </member>
  11630. <member name="M:Org.BouncyCastle.Crypto.BufferedBlockCipher.Reset">
  11631. Reset the buffer and cipher. After resetting the object is in the same
  11632. state as it was after the last init (if there was one).
  11633. </member>
  11634. <member name="T:Org.BouncyCastle.Crypto.CipherKeyGenerator">
  11635. The base class for symmetric, or secret, cipher key generators.
  11636. </member>
  11637. <member name="M:Org.BouncyCastle.Crypto.CipherKeyGenerator.Init(Org.BouncyCastle.Crypto.KeyGenerationParameters)">
  11638. initialise the key generator.
  11639. @param param the parameters to be used for key generation
  11640. </member>
  11641. <member name="M:Org.BouncyCastle.Crypto.CipherKeyGenerator.GenerateKey">
  11642. Generate a secret key.
  11643. @return a byte array containing the key value.
  11644. </member>
  11645. <member name="T:Org.BouncyCastle.Crypto.DataLengthException">
  11646. this exception is thrown if a buffer that is meant to have output
  11647. copied into it turns out to be too short, or if we've been given
  11648. insufficient input. In general this exception will Get thrown rather
  11649. than an ArrayOutOfBounds exception.
  11650. </member>
  11651. <member name="M:Org.BouncyCastle.Crypto.DataLengthException.#ctor">
  11652. base constructor.
  11653. </member>
  11654. <member name="M:Org.BouncyCastle.Crypto.DataLengthException.#ctor(System.String)">
  11655. create a DataLengthException with the given message.
  11656. @param message the message to be carried with the exception.
  11657. </member>
  11658. <!-- Badly formed XML comment ignored for member "T:Org.BouncyCastle.Crypto.Digests.Blake2bDigest" -->
  11659. <member name="M:Org.BouncyCastle.Crypto.Digests.Blake2bDigest.#ctor(System.Int32)">
  11660. Basic sized constructor - size in bits.
  11661. @param digestSize size of the digest in bits
  11662. </member>
  11663. <member name="M:Org.BouncyCastle.Crypto.Digests.Blake2bDigest.#ctor(System.Byte[])">
  11664. Blake2b for authentication ("Prefix-MAC mode").
  11665. After calling the doFinal() method, the key will
  11666. remain to be used for further computations of
  11667. this instance.
  11668. The key can be overwritten using the clearKey() method.
  11669. @param key A key up to 64 bytes or null
  11670. </member>
  11671. <member name="M:Org.BouncyCastle.Crypto.Digests.Blake2bDigest.#ctor(System.Byte[],System.Int32,System.Byte[],System.Byte[])">
  11672. Blake2b with key, required digest length (in bytes), salt and personalization.
  11673. After calling the doFinal() method, the key, the salt and the personal string
  11674. will remain and might be used for further computations with this instance.
  11675. The key can be overwritten using the clearKey() method, the salt (pepper)
  11676. can be overwritten using the clearSalt() method.
  11677. @param key A key up to 64 bytes or null
  11678. @param digestLength from 1 up to 64 bytes
  11679. @param salt 16 bytes or null
  11680. @param personalization 16 bytes or null
  11681. </member>
  11682. <member name="M:Org.BouncyCastle.Crypto.Digests.Blake2bDigest.Update(System.Byte)">
  11683. update the message digest with a single byte.
  11684. @param b the input byte to be entered.
  11685. </member>
  11686. <member name="M:Org.BouncyCastle.Crypto.Digests.Blake2bDigest.BlockUpdate(System.Byte[],System.Int32,System.Int32)">
  11687. update the message digest with a block of bytes.
  11688. @param message the byte array containing the data.
  11689. @param offset the offset into the byte array where the data starts.
  11690. @param len the length of the data.
  11691. </member>
  11692. <member name="M:Org.BouncyCastle.Crypto.Digests.Blake2bDigest.DoFinal(System.Byte[],System.Int32)">
  11693. close the digest, producing the final digest value. The doFinal
  11694. call leaves the digest reset.
  11695. Key, salt and personal string remain.
  11696. @param out the array the digest is to be copied into.
  11697. @param outOffset the offset into the out array the digest is to start at.
  11698. </member>
  11699. <member name="M:Org.BouncyCastle.Crypto.Digests.Blake2bDigest.Reset">
  11700. Reset the digest back to it's initial state.
  11701. The key, the salt and the personal string will
  11702. remain for further computations.
  11703. </member>
  11704. <member name="P:Org.BouncyCastle.Crypto.Digests.Blake2bDigest.AlgorithmName">
  11705. return the algorithm name
  11706. @return the algorithm name
  11707. </member>
  11708. <member name="M:Org.BouncyCastle.Crypto.Digests.Blake2bDigest.GetDigestSize">
  11709. return the size, in bytes, of the digest produced by this message digest.
  11710. @return the size, in bytes, of the digest produced by this message digest.
  11711. </member>
  11712. <member name="M:Org.BouncyCastle.Crypto.Digests.Blake2bDigest.GetByteLength">
  11713. Return the size in bytes of the internal buffer the digest applies it's compression
  11714. function to.
  11715. @return byte length of the digests internal buffer.
  11716. </member>
  11717. <member name="M:Org.BouncyCastle.Crypto.Digests.Blake2bDigest.ClearKey">
  11718. Overwrite the key
  11719. if it is no longer used (zeroization)
  11720. </member>
  11721. <member name="M:Org.BouncyCastle.Crypto.Digests.Blake2bDigest.ClearSalt">
  11722. Overwrite the salt (pepper) if it
  11723. is secret and no longer used (zeroization)
  11724. </member>
  11725. <member name="T:Org.BouncyCastle.Crypto.Digests.Blake2sDigest">
  11726. Implementation of the cryptographic hash function BLAKE2s.
  11727. <p/>
  11728. BLAKE2s offers a built-in keying mechanism to be used directly
  11729. for authentication ("Prefix-MAC") rather than a HMAC construction.
  11730. <p/>
  11731. BLAKE2s offers a built-in support for a salt for randomized hashing
  11732. and a personal string for defining a unique hash function for each application.
  11733. <p/>
  11734. BLAKE2s is optimized for 32-bit platforms and produces digests of any size
  11735. between 1 and 32 bytes.
  11736. </member>
  11737. <member name="F:Org.BouncyCastle.Crypto.Digests.Blake2sDigest.blake2s_IV">
  11738. BLAKE2s Initialization Vector
  11739. </member>
  11740. <member name="F:Org.BouncyCastle.Crypto.Digests.Blake2sDigest.blake2s_sigma">
  11741. Message word permutations
  11742. </member>
  11743. <member name="F:Org.BouncyCastle.Crypto.Digests.Blake2sDigest.buffer">
  11744. Whenever this buffer overflows, it will be processed in the Compress()
  11745. function. For performance issues, long messages will not use this buffer.
  11746. </member>
  11747. <member name="F:Org.BouncyCastle.Crypto.Digests.Blake2sDigest.bufferPos">
  11748. Position of last inserted byte
  11749. </member>
  11750. <member name="F:Org.BouncyCastle.Crypto.Digests.Blake2sDigest.internalState">
  11751. Internal state, in the BLAKE2 paper it is called v
  11752. </member>
  11753. <member name="F:Org.BouncyCastle.Crypto.Digests.Blake2sDigest.chainValue">
  11754. State vector, in the BLAKE2 paper it is called h
  11755. </member>
  11756. <member name="F:Org.BouncyCastle.Crypto.Digests.Blake2sDigest.t0">
  11757. holds least significant bits of counter
  11758. </member>
  11759. <member name="F:Org.BouncyCastle.Crypto.Digests.Blake2sDigest.t1">
  11760. holds most significant bits of counter
  11761. </member>
  11762. <member name="F:Org.BouncyCastle.Crypto.Digests.Blake2sDigest.f0">
  11763. finalization flag, for last block: ~0
  11764. </member>
  11765. <member name="M:Org.BouncyCastle.Crypto.Digests.Blake2sDigest.#ctor">
  11766. BLAKE2s-256 for hashing.
  11767. </member>
  11768. <member name="M:Org.BouncyCastle.Crypto.Digests.Blake2sDigest.#ctor(System.Int32)">
  11769. BLAKE2s for hashing.
  11770. @param digestBits the desired digest length in bits. Must be a multiple of 8 and less than 256.
  11771. </member>
  11772. <member name="M:Org.BouncyCastle.Crypto.Digests.Blake2sDigest.#ctor(System.Byte[])">
  11773. BLAKE2s for authentication ("Prefix-MAC mode").
  11774. <p/>
  11775. After calling the doFinal() method, the key will remain to be used for
  11776. further computations of this instance. The key can be overwritten using
  11777. the clearKey() method.
  11778. @param key a key up to 32 bytes or null
  11779. </member>
  11780. <member name="M:Org.BouncyCastle.Crypto.Digests.Blake2sDigest.#ctor(System.Byte[],System.Int32,System.Byte[],System.Byte[])">
  11781. BLAKE2s with key, required digest length, salt and personalization.
  11782. <p/>
  11783. After calling the doFinal() method, the key, the salt and the personal
  11784. string will remain and might be used for further computations with this
  11785. instance. The key can be overwritten using the clearKey() method, the
  11786. salt (pepper) can be overwritten using the clearSalt() method.
  11787. @param key a key up to 32 bytes or null
  11788. @param digestBytes from 1 up to 32 bytes
  11789. @param salt 8 bytes or null
  11790. @param personalization 8 bytes or null
  11791. </member>
  11792. <member name="M:Org.BouncyCastle.Crypto.Digests.Blake2sDigest.Update(System.Byte)">
  11793. Update the message digest with a single byte.
  11794. @param b the input byte to be entered.
  11795. </member>
  11796. <member name="M:Org.BouncyCastle.Crypto.Digests.Blake2sDigest.BlockUpdate(System.Byte[],System.Int32,System.Int32)">
  11797. Update the message digest with a block of bytes.
  11798. @param message the byte array containing the data.
  11799. @param offset the offset into the byte array where the data starts.
  11800. @param len the length of the data.
  11801. </member>
  11802. <member name="M:Org.BouncyCastle.Crypto.Digests.Blake2sDigest.DoFinal(System.Byte[],System.Int32)">
  11803. Close the digest, producing the final digest value. The doFinal() call
  11804. leaves the digest reset. Key, salt and personal string remain.
  11805. @param out the array the digest is to be copied into.
  11806. @param outOffset the offset into the out array the digest is to start at.
  11807. </member>
  11808. <member name="M:Org.BouncyCastle.Crypto.Digests.Blake2sDigest.Reset">
  11809. Reset the digest back to its initial state. The key, the salt and the
  11810. personal string will remain for further computations.
  11811. </member>
  11812. <member name="P:Org.BouncyCastle.Crypto.Digests.Blake2sDigest.AlgorithmName">
  11813. Return the algorithm name.
  11814. @return the algorithm name
  11815. </member>
  11816. <member name="M:Org.BouncyCastle.Crypto.Digests.Blake2sDigest.GetDigestSize">
  11817. Return the size in bytes of the digest produced by this message digest.
  11818. @return the size in bytes of the digest produced by this message digest.
  11819. </member>
  11820. <member name="M:Org.BouncyCastle.Crypto.Digests.Blake2sDigest.GetByteLength">
  11821. Return the size in bytes of the internal buffer the digest applies its
  11822. compression function to.
  11823. @return byte length of the digest's internal buffer.
  11824. </member>
  11825. <member name="M:Org.BouncyCastle.Crypto.Digests.Blake2sDigest.ClearKey">
  11826. Overwrite the key if it is no longer used (zeroization).
  11827. </member>
  11828. <member name="M:Org.BouncyCastle.Crypto.Digests.Blake2sDigest.ClearSalt">
  11829. Overwrite the salt (pepper) if it is secret and no longer used
  11830. (zeroization).
  11831. </member>
  11832. <member name="T:Org.BouncyCastle.Crypto.Digests.CShakeDigest">
  11833. <summary>
  11834. Customizable SHAKE function.
  11835. </summary>
  11836. </member>
  11837. <member name="M:Org.BouncyCastle.Crypto.Digests.CShakeDigest.#ctor(System.Int32,System.Byte[],System.Byte[])">
  11838. <summary>
  11839. Base constructor
  11840. </summary>
  11841. <param name="bitLength">bit length of the underlying SHAKE function, 128 or 256.</param>
  11842. <param name="N">the function name string, note this is reserved for use by NIST. Avoid using it if not required.</param>
  11843. <param name="S">the customization string - available for local use.</param>
  11844. </member>
  11845. <member name="T:Org.BouncyCastle.Crypto.Digests.Dstu7564Digest">
  11846. implementation of Ukrainian DSTU 7564 hash function
  11847. </member>
  11848. <member name="T:Org.BouncyCastle.Crypto.Digests.GeneralDigest">
  11849. base implementation of MD4 family style digest as outlined in
  11850. "Handbook of Applied Cryptography", pages 344 - 347.
  11851. </member>
  11852. <member name="T:Org.BouncyCastle.Crypto.Digests.Gost3411Digest">
  11853. implementation of GOST R 34.11-94
  11854. </member>
  11855. <member name="M:Org.BouncyCastle.Crypto.Digests.Gost3411Digest.#ctor">
  11856. Standard constructor
  11857. </member>
  11858. <member name="M:Org.BouncyCastle.Crypto.Digests.Gost3411Digest.#ctor(System.Byte[])">
  11859. Constructor to allow use of a particular sbox with GOST28147
  11860. @see GOST28147Engine#getSBox(String)
  11861. </member>
  11862. <member name="M:Org.BouncyCastle.Crypto.Digests.Gost3411Digest.#ctor(Org.BouncyCastle.Crypto.Digests.Gost3411Digest)">
  11863. Copy constructor. This will copy the state of the provided
  11864. message digest.
  11865. </member>
  11866. <member name="F:Org.BouncyCastle.Crypto.Digests.Gost3411Digest.C2">
  11867. reset the chaining variables to the IV values.
  11868. </member>
  11869. <member name="T:Org.BouncyCastle.Crypto.Digests.KeccakDigest">
  11870. <summary>
  11871. Implementation of Keccak based on following KeccakNISTInterface.c from http://keccak.noekeon.org/
  11872. </summary>
  11873. <remarks>
  11874. Following the naming conventions used in the C source code to enable easy review of the implementation.
  11875. </remarks>
  11876. </member>
  11877. <member name="M:Org.BouncyCastle.Crypto.Digests.KeccakDigest.GetByteLength">
  11878. Return the size of block that the compression function is applied to in bytes.
  11879. @return internal byte length of a block.
  11880. </member>
  11881. <member name="T:Org.BouncyCastle.Crypto.Digests.LongDigest">
  11882. Base class for SHA-384 and SHA-512.
  11883. </member>
  11884. <member name="M:Org.BouncyCastle.Crypto.Digests.LongDigest.#ctor">
  11885. Constructor for variable length word
  11886. </member>
  11887. <member name="M:Org.BouncyCastle.Crypto.Digests.LongDigest.#ctor(Org.BouncyCastle.Crypto.Digests.LongDigest)">
  11888. Copy constructor. We are using copy constructors in place
  11889. of the object.Clone() interface as this interface is not
  11890. supported by J2ME.
  11891. </member>
  11892. <member name="M:Org.BouncyCastle.Crypto.Digests.LongDigest.AdjustByteCounts">
  11893. adjust the byte counts so that byteCount2 represents the
  11894. upper long (less 3 bits) word of the byte count.
  11895. </member>
  11896. <member name="T:Org.BouncyCastle.Crypto.Digests.MD2Digest">
  11897. implementation of MD2
  11898. as outlined in RFC1319 by B.Kaliski from RSA Laboratories April 1992
  11899. </member>
  11900. <member name="P:Org.BouncyCastle.Crypto.Digests.MD2Digest.AlgorithmName">
  11901. return the algorithm name
  11902. @return the algorithm name
  11903. </member>
  11904. <member name="M:Org.BouncyCastle.Crypto.Digests.MD2Digest.DoFinal(System.Byte[],System.Int32)">
  11905. Close the digest, producing the final digest value. The doFinal
  11906. call leaves the digest reset.
  11907. @param out the array the digest is to be copied into.
  11908. @param outOff the offset into the out array the digest is to start at.
  11909. </member>
  11910. <member name="M:Org.BouncyCastle.Crypto.Digests.MD2Digest.Reset">
  11911. reset the digest back to it's initial state.
  11912. </member>
  11913. <member name="M:Org.BouncyCastle.Crypto.Digests.MD2Digest.Update(System.Byte)">
  11914. update the message digest with a single byte.
  11915. @param in the input byte to be entered.
  11916. </member>
  11917. <member name="M:Org.BouncyCastle.Crypto.Digests.MD2Digest.BlockUpdate(System.Byte[],System.Int32,System.Int32)">
  11918. update the message digest with a block of bytes.
  11919. @param in the byte array containing the data.
  11920. @param inOff the offset into the byte array where the data starts.
  11921. @param len the length of the data.
  11922. </member>
  11923. <member name="T:Org.BouncyCastle.Crypto.Digests.MD4Digest">
  11924. implementation of MD4 as RFC 1320 by R. Rivest, MIT Laboratory for
  11925. Computer Science and RSA Data Security, Inc.
  11926. <p>
  11927. <b>NOTE</b>: This algorithm is only included for backwards compatibility
  11928. with legacy applications, it's not secure, don't use it for anything new!</p>
  11929. </member>
  11930. <member name="M:Org.BouncyCastle.Crypto.Digests.MD4Digest.#ctor">
  11931. Standard constructor
  11932. </member>
  11933. <member name="M:Org.BouncyCastle.Crypto.Digests.MD4Digest.#ctor(Org.BouncyCastle.Crypto.Digests.MD4Digest)">
  11934. Copy constructor. This will copy the state of the provided
  11935. message digest.
  11936. </member>
  11937. <member name="M:Org.BouncyCastle.Crypto.Digests.MD4Digest.Reset">
  11938. reset the chaining variables to the IV values.
  11939. </member>
  11940. <member name="T:Org.BouncyCastle.Crypto.Digests.MD5Digest">
  11941. implementation of MD5 as outlined in "Handbook of Applied Cryptography", pages 346 - 347.
  11942. </member>
  11943. <member name="M:Org.BouncyCastle.Crypto.Digests.MD5Digest.#ctor(Org.BouncyCastle.Crypto.Digests.MD5Digest)">
  11944. Copy constructor. This will copy the state of the provided
  11945. message digest.
  11946. </member>
  11947. <member name="M:Org.BouncyCastle.Crypto.Digests.MD5Digest.Reset">
  11948. reset the chaining variables to the IV values.
  11949. </member>
  11950. <member name="T:Org.BouncyCastle.Crypto.Digests.NonMemoableDigest">
  11951. Wrapper removes exposure to the IMemoable interface on an IDigest implementation.
  11952. </member>
  11953. <member name="M:Org.BouncyCastle.Crypto.Digests.NonMemoableDigest.#ctor(Org.BouncyCastle.Crypto.IDigest)">
  11954. Base constructor.
  11955. @param baseDigest underlying digest to use.
  11956. @exception IllegalArgumentException if baseDigest is null
  11957. </member>
  11958. <member name="T:Org.BouncyCastle.Crypto.Digests.ParallelHash">
  11959. <summary>
  11960. ParallelHash - a hash designed to support the efficient hashing of very long strings, by taking advantage,
  11961. of the parallelism available in modern processors with an optional XOF mode.
  11962. <para>
  11963. From NIST Special Publication 800-185 - SHA-3 Derived Functions:cSHAKE, KMAC, TupleHash and ParallelHash
  11964. </para>
  11965. </summary>
  11966. </member>
  11967. <member name="M:Org.BouncyCastle.Crypto.Digests.ParallelHash.#ctor(System.Int32,System.Byte[],System.Int32)">
  11968. Base constructor.
  11969. @param bitLength bit length of the underlying SHAKE function, 128 or 256.
  11970. @param S the customization string - available for local use.
  11971. @param B the blocksize (in bytes) for hashing.
  11972. </member>
  11973. <member name="T:Org.BouncyCastle.Crypto.Digests.RipeMD128Digest">
  11974. implementation of RipeMD128
  11975. </member>
  11976. <member name="M:Org.BouncyCastle.Crypto.Digests.RipeMD128Digest.#ctor">
  11977. Standard constructor
  11978. </member>
  11979. <member name="M:Org.BouncyCastle.Crypto.Digests.RipeMD128Digest.#ctor(Org.BouncyCastle.Crypto.Digests.RipeMD128Digest)">
  11980. Copy constructor. This will copy the state of the provided
  11981. message digest.
  11982. </member>
  11983. <member name="M:Org.BouncyCastle.Crypto.Digests.RipeMD128Digest.Reset">
  11984. reset the chaining variables to the IV values.
  11985. </member>
  11986. <member name="T:Org.BouncyCastle.Crypto.Digests.RipeMD160Digest">
  11987. implementation of RipeMD see,
  11988. http://www.esat.kuleuven.ac.be/~bosselae/ripemd160.html
  11989. </member>
  11990. <member name="M:Org.BouncyCastle.Crypto.Digests.RipeMD160Digest.#ctor">
  11991. Standard constructor
  11992. </member>
  11993. <member name="M:Org.BouncyCastle.Crypto.Digests.RipeMD160Digest.#ctor(Org.BouncyCastle.Crypto.Digests.RipeMD160Digest)">
  11994. Copy constructor. This will copy the state of the provided
  11995. message digest.
  11996. </member>
  11997. <member name="M:Org.BouncyCastle.Crypto.Digests.RipeMD160Digest.Reset">
  11998. reset the chaining variables to the IV values.
  11999. </member>
  12000. <member name="T:Org.BouncyCastle.Crypto.Digests.RipeMD256Digest">
  12001. <remarks>
  12002. <p>Implementation of RipeMD256.</p>
  12003. <p><b>Note:</b> this algorithm offers the same level of security as RipeMD128.</p>
  12004. </remarks>
  12005. </member>
  12006. <member name="M:Org.BouncyCastle.Crypto.Digests.RipeMD256Digest.#ctor">
  12007. <summary> Standard constructor</summary>
  12008. </member>
  12009. <member name="M:Org.BouncyCastle.Crypto.Digests.RipeMD256Digest.#ctor(Org.BouncyCastle.Crypto.Digests.RipeMD256Digest)">
  12010. <summary> Copy constructor. This will copy the state of the provided
  12011. message digest.
  12012. </summary>
  12013. </member>
  12014. <member name="M:Org.BouncyCastle.Crypto.Digests.RipeMD256Digest.Reset">
  12015. <summary> reset the chaining variables to the IV values.</summary>
  12016. </member>
  12017. <member name="T:Org.BouncyCastle.Crypto.Digests.RipeMD320Digest">
  12018. <remarks>
  12019. <p>Implementation of RipeMD 320.</p>
  12020. <p><b>Note:</b> this algorithm offers the same level of security as RipeMD160.</p>
  12021. </remarks>
  12022. </member>
  12023. <member name="M:Org.BouncyCastle.Crypto.Digests.RipeMD320Digest.#ctor">
  12024. <summary> Standard constructor</summary>
  12025. </member>
  12026. <member name="M:Org.BouncyCastle.Crypto.Digests.RipeMD320Digest.#ctor(Org.BouncyCastle.Crypto.Digests.RipeMD320Digest)">
  12027. <summary> Copy constructor. This will copy the state of the provided
  12028. message digest.
  12029. </summary>
  12030. </member>
  12031. <member name="M:Org.BouncyCastle.Crypto.Digests.RipeMD320Digest.Reset">
  12032. <summary> reset the chaining variables to the IV values.</summary>
  12033. </member>
  12034. <member name="T:Org.BouncyCastle.Crypto.Digests.Sha1Digest">
  12035. implementation of SHA-1 as outlined in "Handbook of Applied Cryptography", pages 346 - 349.
  12036. It is interesting to ponder why the, apart from the extra IV, the other difference here from MD5
  12037. is the "endianness" of the word processing!
  12038. </member>
  12039. <member name="M:Org.BouncyCastle.Crypto.Digests.Sha1Digest.#ctor(Org.BouncyCastle.Crypto.Digests.Sha1Digest)">
  12040. Copy constructor. This will copy the state of the provided
  12041. message digest.
  12042. </member>
  12043. <member name="M:Org.BouncyCastle.Crypto.Digests.Sha1Digest.Reset">
  12044. reset the chaining variables
  12045. </member>
  12046. <member name="T:Org.BouncyCastle.Crypto.Digests.Sha224Digest">
  12047. SHA-224 as described in RFC 3874
  12048. <pre>
  12049. block word digest
  12050. SHA-1 512 32 160
  12051. SHA-224 512 32 224
  12052. SHA-256 512 32 256
  12053. SHA-384 1024 64 384
  12054. SHA-512 1024 64 512
  12055. </pre>
  12056. </member>
  12057. <member name="M:Org.BouncyCastle.Crypto.Digests.Sha224Digest.#ctor">
  12058. Standard constructor
  12059. </member>
  12060. <member name="M:Org.BouncyCastle.Crypto.Digests.Sha224Digest.#ctor(Org.BouncyCastle.Crypto.Digests.Sha224Digest)">
  12061. Copy constructor. This will copy the state of the provided
  12062. message digest.
  12063. </member>
  12064. <member name="M:Org.BouncyCastle.Crypto.Digests.Sha224Digest.Reset">
  12065. reset the chaining variables
  12066. </member>
  12067. <member name="T:Org.BouncyCastle.Crypto.Digests.Sha256Digest">
  12068. Draft FIPS 180-2 implementation of SHA-256. <b>Note:</b> As this is
  12069. based on a draft this implementation is subject to change.
  12070. <pre>
  12071. block word digest
  12072. SHA-1 512 32 160
  12073. SHA-256 512 32 256
  12074. SHA-384 1024 64 384
  12075. SHA-512 1024 64 512
  12076. </pre>
  12077. </member>
  12078. <member name="M:Org.BouncyCastle.Crypto.Digests.Sha256Digest.#ctor(Org.BouncyCastle.Crypto.Digests.Sha256Digest)">
  12079. Copy constructor. This will copy the state of the provided
  12080. message digest.
  12081. </member>
  12082. <member name="M:Org.BouncyCastle.Crypto.Digests.Sha256Digest.Reset">
  12083. reset the chaining variables
  12084. </member>
  12085. <member name="T:Org.BouncyCastle.Crypto.Digests.Sha384Digest">
  12086. Draft FIPS 180-2 implementation of SHA-384. <b>Note:</b> As this is
  12087. based on a draft this implementation is subject to change.
  12088. <pre>
  12089. block word digest
  12090. SHA-1 512 32 160
  12091. SHA-256 512 32 256
  12092. SHA-384 1024 64 384
  12093. SHA-512 1024 64 512
  12094. </pre>
  12095. </member>
  12096. <member name="M:Org.BouncyCastle.Crypto.Digests.Sha384Digest.#ctor(Org.BouncyCastle.Crypto.Digests.Sha384Digest)">
  12097. Copy constructor. This will copy the state of the provided
  12098. message digest.
  12099. </member>
  12100. <member name="M:Org.BouncyCastle.Crypto.Digests.Sha384Digest.Reset">
  12101. reset the chaining variables
  12102. </member>
  12103. <member name="T:Org.BouncyCastle.Crypto.Digests.Sha3Digest">
  12104. <summary>
  12105. Implementation of SHA-3 based on following KeccakNISTInterface.c from http://keccak.noekeon.org/
  12106. </summary>
  12107. <remarks>
  12108. Following the naming conventions used in the C source code to enable easy review of the implementation.
  12109. </remarks>
  12110. </member>
  12111. <member name="T:Org.BouncyCastle.Crypto.Digests.Sha512Digest">
  12112. Draft FIPS 180-2 implementation of SHA-512. <b>Note:</b> As this is
  12113. based on a draft this implementation is subject to change.
  12114. <pre>
  12115. block word digest
  12116. SHA-1 512 32 160
  12117. SHA-256 512 32 256
  12118. SHA-384 1024 64 384
  12119. SHA-512 1024 64 512
  12120. </pre>
  12121. </member>
  12122. <member name="M:Org.BouncyCastle.Crypto.Digests.Sha512Digest.#ctor(Org.BouncyCastle.Crypto.Digests.Sha512Digest)">
  12123. Copy constructor. This will copy the state of the provided
  12124. message digest.
  12125. </member>
  12126. <member name="M:Org.BouncyCastle.Crypto.Digests.Sha512Digest.Reset">
  12127. reset the chaining variables
  12128. </member>
  12129. <member name="T:Org.BouncyCastle.Crypto.Digests.Sha512tDigest">
  12130. FIPS 180-4 implementation of SHA-512/t
  12131. </member>
  12132. <member name="M:Org.BouncyCastle.Crypto.Digests.Sha512tDigest.#ctor(System.Int32)">
  12133. Standard constructor
  12134. </member>
  12135. <member name="M:Org.BouncyCastle.Crypto.Digests.Sha512tDigest.#ctor(Org.BouncyCastle.Crypto.Digests.Sha512tDigest)">
  12136. Copy constructor. This will copy the state of the provided
  12137. message digest.
  12138. </member>
  12139. <member name="M:Org.BouncyCastle.Crypto.Digests.Sha512tDigest.Reset">
  12140. reset the chaining variables
  12141. </member>
  12142. <member name="T:Org.BouncyCastle.Crypto.Digests.ShakeDigest">
  12143. <summary>
  12144. Implementation of SHAKE based on following KeccakNISTInterface.c from http://keccak.noekeon.org/
  12145. </summary>
  12146. <remarks>
  12147. Following the naming conventions used in the C source code to enable easy review of the implementation.
  12148. </remarks>
  12149. </member>
  12150. <member name="T:Org.BouncyCastle.Crypto.Digests.ShortenedDigest">
  12151. Wrapper class that reduces the output length of a particular digest to
  12152. only the first n bytes of the digest function.
  12153. </member>
  12154. <member name="M:Org.BouncyCastle.Crypto.Digests.ShortenedDigest.#ctor(Org.BouncyCastle.Crypto.IDigest,System.Int32)">
  12155. Base constructor.
  12156. @param baseDigest underlying digest to use.
  12157. @param length length in bytes of the output of doFinal.
  12158. @exception ArgumentException if baseDigest is null, or length is greater than baseDigest.GetDigestSize().
  12159. </member>
  12160. <member name="T:Org.BouncyCastle.Crypto.Digests.SkeinDigest">
  12161. <summary>
  12162. Implementation of the Skein parameterised hash function in 256, 512 and 1024 bit block sizes,
  12163. based on the <see cref="T:Org.BouncyCastle.Crypto.Engines.ThreefishEngine">Threefish</see> tweakable block cipher.
  12164. </summary>
  12165. <remarks>
  12166. This is the 1.3 version of Skein defined in the Skein hash function submission to the NIST SHA-3
  12167. competition in October 2010.
  12168. <p/>
  12169. Skein was designed by Niels Ferguson - Stefan Lucks - Bruce Schneier - Doug Whiting - Mihir
  12170. Bellare - Tadayoshi Kohno - Jon Callas - Jesse Walker.
  12171. </remarks>
  12172. <seealso cref="T:Org.BouncyCastle.Crypto.Digests.SkeinEngine"/>
  12173. <seealso cref="T:Org.BouncyCastle.Crypto.Parameters.SkeinParameters"/>
  12174. </member>
  12175. <member name="F:Org.BouncyCastle.Crypto.Digests.SkeinDigest.SKEIN_256">
  12176. <summary>
  12177. 256 bit block size - Skein-256
  12178. </summary>
  12179. </member>
  12180. <member name="F:Org.BouncyCastle.Crypto.Digests.SkeinDigest.SKEIN_512">
  12181. <summary>
  12182. 512 bit block size - Skein-512
  12183. </summary>
  12184. </member>
  12185. <member name="F:Org.BouncyCastle.Crypto.Digests.SkeinDigest.SKEIN_1024">
  12186. <summary>
  12187. 1024 bit block size - Skein-1024
  12188. </summary>
  12189. </member>
  12190. <member name="M:Org.BouncyCastle.Crypto.Digests.SkeinDigest.#ctor(System.Int32,System.Int32)">
  12191. <summary>
  12192. Constructs a Skein digest with an internal state size and output size.
  12193. </summary>
  12194. <param name="stateSizeBits">the internal state size in bits - one of <see cref="F:Org.BouncyCastle.Crypto.Digests.SkeinDigest.SKEIN_256"/> <see cref="F:Org.BouncyCastle.Crypto.Digests.SkeinDigest.SKEIN_512"/> or
  12195. <see cref="F:Org.BouncyCastle.Crypto.Digests.SkeinDigest.SKEIN_1024"/>.</param>
  12196. <param name="digestSizeBits">the output/digest size to produce in bits, which must be an integral number of
  12197. bytes.</param>
  12198. </member>
  12199. <member name="M:Org.BouncyCastle.Crypto.Digests.SkeinDigest.Init(Org.BouncyCastle.Crypto.Parameters.SkeinParameters)">
  12200. <summary>
  12201. Optionally initialises the Skein digest with the provided parameters.
  12202. </summary>
  12203. See <see cref="T:Org.BouncyCastle.Crypto.Parameters.SkeinParameters"></see> for details on the parameterisation of the Skein hash function.
  12204. <param name="parameters">the parameters to apply to this engine, or <code>null</code> to use no parameters.</param>
  12205. </member>
  12206. <member name="T:Org.BouncyCastle.Crypto.Digests.SkeinEngine">
  12207. <summary>
  12208. Implementation of the Skein family of parameterised hash functions in 256, 512 and 1024 bit block
  12209. sizes, based on the <see cref="T:Org.BouncyCastle.Crypto.Engines.ThreefishEngine">Threefish</see> tweakable block cipher.
  12210. </summary>
  12211. <remarks>
  12212. This is the 1.3 version of Skein defined in the Skein hash function submission to the NIST SHA-3
  12213. competition in October 2010.
  12214. <p/>
  12215. Skein was designed by Niels Ferguson - Stefan Lucks - Bruce Schneier - Doug Whiting - Mihir
  12216. Bellare - Tadayoshi Kohno - Jon Callas - Jesse Walker.
  12217. <p/>
  12218. This implementation is the basis for <see cref="T:Org.BouncyCastle.Crypto.Digests.SkeinDigest"/> and <see cref="T:Org.BouncyCastle.Crypto.Macs.SkeinMac"/>, implementing the
  12219. parameter based configuration system that allows Skein to be adapted to multiple applications. <br/>
  12220. Initialising the engine with <see cref="T:Org.BouncyCastle.Crypto.Parameters.SkeinParameters"/> allows standard and arbitrary parameters to
  12221. be applied during the Skein hash function.
  12222. <p/>
  12223. Implemented:
  12224. <ul>
  12225. <li>256, 512 and 1024 bit internal states.</li>
  12226. <li>Full 96 bit input length.</li>
  12227. <li>Parameters defined in the Skein specification, and arbitrary other pre and post message
  12228. parameters.</li>
  12229. <li>Arbitrary output size in 1 byte intervals.</li>
  12230. </ul>
  12231. <p/>
  12232. Not implemented:
  12233. <ul>
  12234. <li>Sub-byte length input (bit padding).</li>
  12235. <li>Tree hashing.</li>
  12236. </ul>
  12237. </remarks>
  12238. <seealso cref="T:Org.BouncyCastle.Crypto.Parameters.SkeinParameters"/>
  12239. </member>
  12240. <member name="F:Org.BouncyCastle.Crypto.Digests.SkeinEngine.SKEIN_256">
  12241. <summary>
  12242. 256 bit block size - Skein-256
  12243. </summary>
  12244. </member>
  12245. <member name="F:Org.BouncyCastle.Crypto.Digests.SkeinEngine.SKEIN_512">
  12246. <summary>
  12247. 512 bit block size - Skein-512
  12248. </summary>
  12249. </member>
  12250. <member name="F:Org.BouncyCastle.Crypto.Digests.SkeinEngine.SKEIN_1024">
  12251. <summary>
  12252. 1024 bit block size - Skein-1024
  12253. </summary>
  12254. </member>
  12255. <member name="F:Org.BouncyCastle.Crypto.Digests.SkeinEngine.PARAM_TYPE_KEY">
  12256. The parameter type for the Skein key.
  12257. </member>
  12258. <member name="F:Org.BouncyCastle.Crypto.Digests.SkeinEngine.PARAM_TYPE_CONFIG">
  12259. The parameter type for the Skein configuration block.
  12260. </member>
  12261. <member name="F:Org.BouncyCastle.Crypto.Digests.SkeinEngine.PARAM_TYPE_MESSAGE">
  12262. The parameter type for the message.
  12263. </member>
  12264. <member name="F:Org.BouncyCastle.Crypto.Digests.SkeinEngine.PARAM_TYPE_OUTPUT">
  12265. The parameter type for the output transformation.
  12266. </member>
  12267. <member name="F:Org.BouncyCastle.Crypto.Digests.SkeinEngine.INITIAL_STATES">
  12268. Precalculated UBI(CFG) states for common state/output combinations without key or other
  12269. pre-message params.
  12270. </member>
  12271. <member name="F:Org.BouncyCastle.Crypto.Digests.SkeinEngine.UbiTweak.LOW_RANGE">
  12272. Point at which position might overflow long, so switch to add with carry logic
  12273. </member>
  12274. <member name="F:Org.BouncyCastle.Crypto.Digests.SkeinEngine.UbiTweak.T1_FINAL">
  12275. Bit 127 = final
  12276. </member>
  12277. <member name="F:Org.BouncyCastle.Crypto.Digests.SkeinEngine.UbiTweak.T1_FIRST">
  12278. Bit 126 = first
  12279. </member>
  12280. <member name="F:Org.BouncyCastle.Crypto.Digests.SkeinEngine.UbiTweak.tweak">
  12281. UBI uses a 128 bit tweak
  12282. </member>
  12283. <member name="F:Org.BouncyCastle.Crypto.Digests.SkeinEngine.UbiTweak.extendedPosition">
  12284. Whether 64 bit position exceeded
  12285. </member>
  12286. <member name="M:Org.BouncyCastle.Crypto.Digests.SkeinEngine.UbiTweak.AdvancePosition(System.Int32)">
  12287. Advances the position in the tweak by the specified value.
  12288. </member>
  12289. <member name="T:Org.BouncyCastle.Crypto.Digests.SkeinEngine.UBI">
  12290. The Unique Block Iteration chaining mode.
  12291. </member>
  12292. <member name="F:Org.BouncyCastle.Crypto.Digests.SkeinEngine.UBI.currentBlock">
  12293. Buffer for the current block of message data
  12294. </member>
  12295. <member name="F:Org.BouncyCastle.Crypto.Digests.SkeinEngine.UBI.currentOffset">
  12296. Offset into the current message block
  12297. </member>
  12298. <member name="F:Org.BouncyCastle.Crypto.Digests.SkeinEngine.UBI.message">
  12299. Buffer for message words for feedback into encrypted block
  12300. </member>
  12301. <member name="F:Org.BouncyCastle.Crypto.Digests.SkeinEngine.threefish">
  12302. Underlying Threefish tweakable block cipher
  12303. </member>
  12304. <member name="F:Org.BouncyCastle.Crypto.Digests.SkeinEngine.outputSizeBytes">
  12305. Size of the digest output, in bytes
  12306. </member>
  12307. <member name="F:Org.BouncyCastle.Crypto.Digests.SkeinEngine.chain">
  12308. The current chaining/state value
  12309. </member>
  12310. <member name="F:Org.BouncyCastle.Crypto.Digests.SkeinEngine.initialState">
  12311. The initial state value
  12312. </member>
  12313. <member name="F:Org.BouncyCastle.Crypto.Digests.SkeinEngine.key">
  12314. The (optional) key parameter
  12315. </member>
  12316. <member name="F:Org.BouncyCastle.Crypto.Digests.SkeinEngine.preMessageParameters">
  12317. Parameters to apply prior to the message
  12318. </member>
  12319. <member name="F:Org.BouncyCastle.Crypto.Digests.SkeinEngine.postMessageParameters">
  12320. Parameters to apply after the message, but prior to output
  12321. </member>
  12322. <member name="F:Org.BouncyCastle.Crypto.Digests.SkeinEngine.ubi">
  12323. The current UBI operation
  12324. </member>
  12325. <member name="F:Org.BouncyCastle.Crypto.Digests.SkeinEngine.singleByte">
  12326. Buffer for single byte update method
  12327. </member>
  12328. <member name="M:Org.BouncyCastle.Crypto.Digests.SkeinEngine.#ctor(System.Int32,System.Int32)">
  12329. <summary>
  12330. Constructs a Skein digest with an internal state size and output size.
  12331. </summary>
  12332. <param name="blockSizeBits">the internal state size in bits - one of <see cref="F:Org.BouncyCastle.Crypto.Digests.SkeinEngine.SKEIN_256"/> <see cref="F:Org.BouncyCastle.Crypto.Digests.SkeinEngine.SKEIN_512"/> or
  12333. <see cref="F:Org.BouncyCastle.Crypto.Digests.SkeinEngine.SKEIN_1024"/>.</param>
  12334. <param name="outputSizeBits">the output/digest size to produce in bits, which must be an integral number of
  12335. bytes.</param>
  12336. </member>
  12337. <member name="M:Org.BouncyCastle.Crypto.Digests.SkeinEngine.#ctor(Org.BouncyCastle.Crypto.Digests.SkeinEngine)">
  12338. <summary>
  12339. Creates a SkeinEngine as an exact copy of an existing instance.
  12340. </summary>
  12341. </member>
  12342. <member name="M:Org.BouncyCastle.Crypto.Digests.SkeinEngine.Init(Org.BouncyCastle.Crypto.Parameters.SkeinParameters)">
  12343. <summary>
  12344. Initialises the Skein engine with the provided parameters. See <see cref="T:Org.BouncyCastle.Crypto.Parameters.SkeinParameters"/> for
  12345. details on the parameterisation of the Skein hash function.
  12346. </summary>
  12347. <param name="parameters">the parameters to apply to this engine, or <code>null</code> to use no parameters.</param>
  12348. </member>
  12349. <member name="M:Org.BouncyCastle.Crypto.Digests.SkeinEngine.CreateInitialState">
  12350. Calculate the initial (pre message block) chaining state.
  12351. </member>
  12352. <member name="M:Org.BouncyCastle.Crypto.Digests.SkeinEngine.Reset">
  12353. <summary>
  12354. Reset the engine to the initial state (with the key and any pre-message parameters , ready to
  12355. accept message input.
  12356. </summary>
  12357. </member>
  12358. <member name="T:Org.BouncyCastle.Crypto.Digests.SM3Digest">
  12359. <summary>
  12360. Implementation of Chinese SM3 digest as described at
  12361. http://tools.ietf.org/html/draft-shen-sm3-hash-00
  12362. and at .... ( Chinese PDF )
  12363. </summary>
  12364. <remarks>
  12365. The specification says "process a bit stream",
  12366. but this is written to process bytes in blocks of 4,
  12367. meaning this will process 32-bit word groups.
  12368. But so do also most other digest specifications,
  12369. including the SHA-256 which was a origin for
  12370. this specification.
  12371. </remarks>
  12372. </member>
  12373. <member name="M:Org.BouncyCastle.Crypto.Digests.SM3Digest.#ctor">
  12374. <summary>
  12375. Standard constructor
  12376. </summary>
  12377. </member>
  12378. <member name="M:Org.BouncyCastle.Crypto.Digests.SM3Digest.#ctor(Org.BouncyCastle.Crypto.Digests.SM3Digest)">
  12379. <summary>
  12380. Copy constructor. This will copy the state of the provided
  12381. message digest.
  12382. </summary>
  12383. </member>
  12384. <member name="M:Org.BouncyCastle.Crypto.Digests.SM3Digest.Reset">
  12385. <summary>
  12386. reset the chaining variables
  12387. </summary>
  12388. </member>
  12389. <member name="T:Org.BouncyCastle.Crypto.Digests.TigerDigest">
  12390. implementation of Tiger based on:
  12391. <a href="http://www.cs.technion.ac.il/~biham/Reports/Tiger">
  12392. http://www.cs.technion.ac.il/~biham/Reports/Tiger</a>
  12393. </member>
  12394. <member name="M:Org.BouncyCastle.Crypto.Digests.TigerDigest.#ctor">
  12395. Standard constructor
  12396. </member>
  12397. <member name="M:Org.BouncyCastle.Crypto.Digests.TigerDigest.#ctor(Org.BouncyCastle.Crypto.Digests.TigerDigest)">
  12398. Copy constructor. This will copy the state of the provided
  12399. message digest.
  12400. </member>
  12401. <member name="M:Org.BouncyCastle.Crypto.Digests.TigerDigest.Reset">
  12402. reset the chaining variables
  12403. </member>
  12404. <member name="T:Org.BouncyCastle.Crypto.Digests.TupleHash">
  12405. <summary>
  12406. TupleHash - a hash designed to simply hash a tuple of input strings, any or all of which may be empty strings,
  12407. in an unambiguous way with an optional XOF mode.
  12408. <para>
  12409. From NIST Special Publication 800-185 - SHA-3 Derived Functions:cSHAKE, KMAC, TupleHash and ParallelHash
  12410. </para>
  12411. </summary>
  12412. </member>
  12413. <member name="M:Org.BouncyCastle.Crypto.Digests.TupleHash.#ctor(System.Int32,System.Byte[])">
  12414. Base constructor.
  12415. @param bitLength bit length of the underlying SHAKE function, 128 or 256.
  12416. @param S the customization string - available for local use.
  12417. </member>
  12418. <member name="T:Org.BouncyCastle.Crypto.Digests.WhirlpoolDigest">
  12419. Implementation of WhirlpoolDigest, based on Java source published by Barreto
  12420. and Rijmen.
  12421. </member>
  12422. <member name="M:Org.BouncyCastle.Crypto.Digests.WhirlpoolDigest.#ctor(Org.BouncyCastle.Crypto.Digests.WhirlpoolDigest)">
  12423. Copy constructor. This will copy the state of the provided message
  12424. digest.
  12425. </member>
  12426. <member name="M:Org.BouncyCastle.Crypto.Digests.WhirlpoolDigest.Reset">
  12427. Reset the chaining variables
  12428. </member>
  12429. <member name="M:Org.BouncyCastle.Crypto.EC.CustomNamedCurves.GetByOid(Org.BouncyCastle.Asn1.DerObjectIdentifier)">
  12430. return the X9ECParameters object for the named curve represented by
  12431. the passed in object identifier. Null if the curve isn't present.
  12432. @param oid an object identifier representing a named curve, if present.
  12433. </member>
  12434. <member name="M:Org.BouncyCastle.Crypto.EC.CustomNamedCurves.GetOid(System.String)">
  12435. return the object identifier signified by the passed in name. Null
  12436. if there is no object identifier associated with name.
  12437. @return the object identifier associated with name, if present.
  12438. </member>
  12439. <member name="M:Org.BouncyCastle.Crypto.EC.CustomNamedCurves.GetName(Org.BouncyCastle.Asn1.DerObjectIdentifier)">
  12440. return the named curve name represented by the given object identifier.
  12441. </member>
  12442. <member name="P:Org.BouncyCastle.Crypto.EC.CustomNamedCurves.Names">
  12443. returns an enumeration containing the name strings for curves
  12444. contained in this structure.
  12445. </member>
  12446. <member name="T:Org.BouncyCastle.Crypto.Encodings.ISO9796d1Encoding">
  12447. ISO 9796-1 padding. Note in the light of recent results you should
  12448. only use this with RSA (rather than the "simpler" Rabin keys) and you
  12449. should never use it with anything other than a hash (ie. even if the
  12450. message is small don't sign the message, sign it's hash) or some "random"
  12451. value. See your favorite search engine for details.
  12452. </member>
  12453. <member name="M:Org.BouncyCastle.Crypto.Encodings.ISO9796d1Encoding.GetInputBlockSize">
  12454. return the input block size. The largest message we can process
  12455. is (key_size_in_bits + 3)/16, which in our world comes to
  12456. key_size_in_bytes / 2.
  12457. </member>
  12458. <member name="M:Org.BouncyCastle.Crypto.Encodings.ISO9796d1Encoding.GetOutputBlockSize">
  12459. return the maximum possible size for the output.
  12460. </member>
  12461. <member name="M:Org.BouncyCastle.Crypto.Encodings.ISO9796d1Encoding.SetPadBits(System.Int32)">
  12462. set the number of bits in the next message to be treated as
  12463. pad bits.
  12464. </member>
  12465. <member name="M:Org.BouncyCastle.Crypto.Encodings.ISO9796d1Encoding.GetPadBits">
  12466. retrieve the number of pad bits in the last decoded message.
  12467. </member>
  12468. <member name="M:Org.BouncyCastle.Crypto.Encodings.ISO9796d1Encoding.DecodeBlock(System.Byte[],System.Int32,System.Int32)">
  12469. @exception InvalidCipherTextException if the decrypted block is not a valid ISO 9796 bit string
  12470. </member>
  12471. <member name="T:Org.BouncyCastle.Crypto.Encodings.OaepEncoding">
  12472. Optimal Asymmetric Encryption Padding (OAEP) - see PKCS 1 V 2.
  12473. </member>
  12474. <member name="M:Org.BouncyCastle.Crypto.Encodings.OaepEncoding.DecodeBlock(System.Byte[],System.Int32,System.Int32)">
  12475. @exception InvalidCipherTextException if the decrypted block turns out to
  12476. be badly formatted.
  12477. </member>
  12478. <member name="M:Org.BouncyCastle.Crypto.Encodings.OaepEncoding.MaskGeneratorFunction1(System.Byte[],System.Int32,System.Int32,System.Int32)">
  12479. mask generator function, as described in PKCS1v2.
  12480. </member>
  12481. <member name="T:Org.BouncyCastle.Crypto.Encodings.Pkcs1Encoding">
  12482. this does your basic Pkcs 1 v1.5 padding - whether or not you should be using this
  12483. depends on your application - see Pkcs1 Version 2 for details.
  12484. </member>
  12485. <member name="F:Org.BouncyCastle.Crypto.Encodings.Pkcs1Encoding.StrictLengthEnabledProperty">
  12486. some providers fail to include the leading zero in PKCS1 encoded blocks. If you need to
  12487. work with one of these set the system property Org.BouncyCastle.Pkcs1.Strict to false.
  12488. </member>
  12489. <member name="P:Org.BouncyCastle.Crypto.Encodings.Pkcs1Encoding.StrictLengthEnabled">
  12490. The same effect can be achieved by setting the static property directly
  12491. <p>
  12492. The static property is checked during construction of the encoding object, it is set to
  12493. true by default.
  12494. </p>
  12495. </member>
  12496. <member name="M:Org.BouncyCastle.Crypto.Encodings.Pkcs1Encoding.#ctor(Org.BouncyCastle.Crypto.IAsymmetricBlockCipher)">
  12497. Basic constructor.
  12498. @param cipher
  12499. </member>
  12500. <member name="M:Org.BouncyCastle.Crypto.Encodings.Pkcs1Encoding.#ctor(Org.BouncyCastle.Crypto.IAsymmetricBlockCipher,System.Int32)">
  12501. Constructor for decryption with a fixed plaintext length.
  12502. @param cipher The cipher to use for cryptographic operation.
  12503. @param pLen Length of the expected plaintext.
  12504. </member>
  12505. <member name="M:Org.BouncyCastle.Crypto.Encodings.Pkcs1Encoding.#ctor(Org.BouncyCastle.Crypto.IAsymmetricBlockCipher,System.Byte[])">
  12506. Constructor for decryption with a fixed plaintext length and a fallback
  12507. value that is returned, if the padding is incorrect.
  12508. @param cipher
  12509. The cipher to use for cryptographic operation.
  12510. @param fallback
  12511. The fallback value, we don't to a arraycopy here.
  12512. </member>
  12513. <member name="M:Org.BouncyCastle.Crypto.Encodings.Pkcs1Encoding.CheckPkcs1Encoding(System.Byte[],System.Int32)">
  12514. Checks if the argument is a correctly PKCS#1.5 encoded Plaintext
  12515. for encryption.
  12516. @param encoded The Plaintext.
  12517. @param pLen Expected length of the plaintext.
  12518. @return Either 0, if the encoding is correct, or -1, if it is incorrect.
  12519. </member>
  12520. <member name="M:Org.BouncyCastle.Crypto.Encodings.Pkcs1Encoding.DecodeBlockOrRandom(System.Byte[],System.Int32,System.Int32)">
  12521. Decode PKCS#1.5 encoding, and return a random value if the padding is not correct.
  12522. @param in The encrypted block.
  12523. @param inOff Offset in the encrypted block.
  12524. @param inLen Length of the encrypted block.
  12525. @param pLen Length of the desired output.
  12526. @return The plaintext without padding, or a random value if the padding was incorrect.
  12527. @throws InvalidCipherTextException
  12528. </member>
  12529. <member name="M:Org.BouncyCastle.Crypto.Encodings.Pkcs1Encoding.DecodeBlock(System.Byte[],System.Int32,System.Int32)">
  12530. @exception InvalidCipherTextException if the decrypted block is not in Pkcs1 format.
  12531. </member>
  12532. <member name="T:Org.BouncyCastle.Crypto.Engines.AesEngine">
  12533. an implementation of the AES (Rijndael), from FIPS-197.
  12534. <p>
  12535. For further details see: <a href="http://csrc.nist.gov/encryption/aes/">http://csrc.nist.gov/encryption/aes/</a>.
  12536. This implementation is based on optimizations from Dr. Brian Gladman's paper and C code at
  12537. <a href="http://fp.gladman.plus.com/cryptography_technology/rijndael/">http://fp.gladman.plus.com/cryptography_technology/rijndael/</a>
  12538. There are three levels of tradeoff of speed vs memory
  12539. Because java has no preprocessor, they are written as three separate classes from which to choose
  12540. The fastest uses 8Kbytes of static tables to precompute round calculations, 4 256 word tables for encryption
  12541. and 4 for decryption.
  12542. The middle performance version uses only one 256 word table for each, for a total of 2Kbytes,
  12543. adding 12 rotate operations per round to compute the values contained in the other tables from
  12544. the contents of the first.
  12545. The slowest version uses no static tables at all and computes the values in each round.
  12546. </p>
  12547. <p>
  12548. This file contains the middle performance version with 2Kbytes of static tables for round precomputation.
  12549. </p>
  12550. </member>
  12551. <member name="M:Org.BouncyCastle.Crypto.Engines.AesEngine.GenerateWorkingKey(System.Byte[],System.Boolean)">
  12552. Calculate the necessary round keys
  12553. The number of calculations depends on key size and block size
  12554. AES specified a fixed block size of 128 bits and key sizes 128/192/256 bits
  12555. This code is written assuming those are the only possible values
  12556. </member>
  12557. <member name="M:Org.BouncyCastle.Crypto.Engines.AesEngine.#ctor">
  12558. default constructor - 128 bit block size.
  12559. </member>
  12560. <member name="M:Org.BouncyCastle.Crypto.Engines.AesEngine.Init(System.Boolean,Org.BouncyCastle.Crypto.ICipherParameters)">
  12561. initialise an AES cipher.
  12562. @param forEncryption whether or not we are for encryption.
  12563. @param parameters the parameters required to set up the cipher.
  12564. @exception ArgumentException if the parameters argument is
  12565. inappropriate.
  12566. </member>
  12567. <member name="T:Org.BouncyCastle.Crypto.Engines.AesFastEngine">
  12568. an implementation of the AES (Rijndael)), from FIPS-197.
  12569. <p>
  12570. For further details see: <a href="http://csrc.nist.gov/encryption/aes/">http://csrc.nist.gov/encryption/aes/</a>.
  12571. This implementation is based on optimizations from Dr. Brian Gladman's paper and C code at
  12572. <a href="http://fp.gladman.plus.com/cryptography_technology/rijndael/">http://fp.gladman.plus.com/cryptography_technology/rijndael/</a>
  12573. There are three levels of tradeoff of speed vs memory
  12574. Because java has no preprocessor), they are written as three separate classes from which to choose
  12575. The fastest uses 8Kbytes of static tables to precompute round calculations), 4 256 word tables for encryption
  12576. and 4 for decryption.
  12577. The middle performance version uses only one 256 word table for each), for a total of 2Kbytes),
  12578. adding 12 rotate operations per round to compute the values contained in the other tables from
  12579. the contents of the first
  12580. The slowest version uses no static tables at all and computes the values in each round
  12581. </p>
  12582. <p>
  12583. This file contains the fast version with 8Kbytes of static tables for round precomputation
  12584. </p>
  12585. <remarks>
  12586. Unfortunately this class has a few side channel issues.
  12587. In an environment where encryption/decryption may be closely observed it should not be used.
  12588. </remarks>
  12589. </member>
  12590. <member name="M:Org.BouncyCastle.Crypto.Engines.AesFastEngine.GenerateWorkingKey(System.Byte[],System.Boolean)">
  12591. Calculate the necessary round keys
  12592. The number of calculations depends on key size and block size
  12593. AES specified a fixed block size of 128 bits and key sizes 128/192/256 bits
  12594. This code is written assuming those are the only possible values
  12595. </member>
  12596. <member name="M:Org.BouncyCastle.Crypto.Engines.AesFastEngine.#ctor">
  12597. default constructor - 128 bit block size.
  12598. </member>
  12599. <member name="M:Org.BouncyCastle.Crypto.Engines.AesFastEngine.Init(System.Boolean,Org.BouncyCastle.Crypto.ICipherParameters)">
  12600. initialise an AES cipher.
  12601. @param forEncryption whether or not we are for encryption.
  12602. @param parameters the parameters required to set up the cipher.
  12603. @exception ArgumentException if the parameters argument is
  12604. inappropriate.
  12605. </member>
  12606. <member name="T:Org.BouncyCastle.Crypto.Engines.AesLightEngine">
  12607. an implementation of the AES (Rijndael), from FIPS-197.
  12608. <p>
  12609. For further details see: <a href="http://csrc.nist.gov/encryption/aes/">http://csrc.nist.gov/encryption/aes/</a>.
  12610. This implementation is based on optimizations from Dr. Brian Gladman's paper and C code at
  12611. <a href="http://fp.gladman.plus.com/cryptography_technology/rijndael/">http://fp.gladman.plus.com/cryptography_technology/rijndael/</a>
  12612. There are three levels of tradeoff of speed vs memory
  12613. Because java has no preprocessor, they are written as three separate classes from which to choose
  12614. The fastest uses 8Kbytes of static tables to precompute round calculations, 4 256 word tables for encryption
  12615. and 4 for decryption.
  12616. The middle performance version uses only one 256 word table for each, for a total of 2Kbytes,
  12617. adding 12 rotate operations per round to compute the values contained in the other tables from
  12618. the contents of the first
  12619. The slowest version uses no static tables at all and computes the values
  12620. in each round.
  12621. </p>
  12622. <p>
  12623. This file contains the slowest performance version with no static tables
  12624. for round precomputation, but it has the smallest foot print.
  12625. </p>
  12626. </member>
  12627. <member name="M:Org.BouncyCastle.Crypto.Engines.AesLightEngine.GenerateWorkingKey(System.Byte[],System.Boolean)">
  12628. Calculate the necessary round keys
  12629. The number of calculations depends on key size and block size
  12630. AES specified a fixed block size of 128 bits and key sizes 128/192/256 bits
  12631. This code is written assuming those are the only possible values
  12632. </member>
  12633. <member name="M:Org.BouncyCastle.Crypto.Engines.AesLightEngine.#ctor">
  12634. default constructor - 128 bit block size.
  12635. </member>
  12636. <member name="M:Org.BouncyCastle.Crypto.Engines.AesLightEngine.Init(System.Boolean,Org.BouncyCastle.Crypto.ICipherParameters)">
  12637. initialise an AES cipher.
  12638. @param forEncryption whether or not we are for encryption.
  12639. @param parameters the parameters required to set up the cipher.
  12640. @exception ArgumentException if the parameters argument is
  12641. inappropriate.
  12642. </member>
  12643. <member name="T:Org.BouncyCastle.Crypto.Engines.AesWrapEngine">
  12644. <remarks>
  12645. An implementation of the AES Key Wrapper from the NIST Key Wrap Specification.
  12646. <p/>
  12647. For further details see: <a href="http://csrc.nist.gov/encryption/kms/key-wrap.pdf">http://csrc.nist.gov/encryption/kms/key-wrap.pdf</a>.
  12648. </remarks>
  12649. </member>
  12650. <member name="T:Org.BouncyCastle.Crypto.Engines.AriaEngine">
  12651. RFC 5794.
  12652. ARIA is a 128-bit block cipher with 128-, 192-, and 256-bit keys.
  12653. </member>
  12654. <member name="T:Org.BouncyCastle.Crypto.Engines.BlowfishEngine">
  12655. A class that provides Blowfish key encryption operations,
  12656. such as encoding data and generating keys.
  12657. All the algorithms herein are from Applied Cryptography
  12658. and implement a simplified cryptography interface.
  12659. </member>
  12660. <member name="M:Org.BouncyCastle.Crypto.Engines.BlowfishEngine.Init(System.Boolean,Org.BouncyCastle.Crypto.ICipherParameters)">
  12661. initialise a Blowfish cipher.
  12662. @param forEncryption whether or not we are for encryption.
  12663. @param parameters the parameters required to set up the cipher.
  12664. @exception ArgumentException if the parameters argument is
  12665. inappropriate.
  12666. </member>
  12667. <member name="M:Org.BouncyCastle.Crypto.Engines.BlowfishEngine.ProcessTable(System.UInt32,System.UInt32,System.UInt32[])">
  12668. apply the encryption cycle to each value pair in the table.
  12669. </member>
  12670. <member name="M:Org.BouncyCastle.Crypto.Engines.BlowfishEngine.EncryptBlock(System.Byte[],System.Int32,System.Byte[],System.Int32)">
  12671. Encrypt the given input starting at the given offset and place
  12672. the result in the provided buffer starting at the given offset.
  12673. The input will be an exact multiple of our blocksize.
  12674. </member>
  12675. <member name="M:Org.BouncyCastle.Crypto.Engines.BlowfishEngine.DecryptBlock(System.Byte[],System.Int32,System.Byte[],System.Int32)">
  12676. Decrypt the given input starting at the given offset and place
  12677. the result in the provided buffer starting at the given offset.
  12678. The input will be an exact multiple of our blocksize.
  12679. </member>
  12680. <member name="T:Org.BouncyCastle.Crypto.Engines.CamelliaEngine">
  12681. Camellia - based on RFC 3713.
  12682. </member>
  12683. <member name="T:Org.BouncyCastle.Crypto.Engines.CamelliaLightEngine">
  12684. Camellia - based on RFC 3713, smaller implementation, about half the size of CamelliaEngine.
  12685. </member>
  12686. <member name="T:Org.BouncyCastle.Crypto.Engines.CamelliaWrapEngine">
  12687. <remarks>
  12688. An implementation of the Camellia key wrapper based on RFC 3657/RFC 3394.
  12689. <p/>
  12690. For further details see: <a href="http://www.ietf.org/rfc/rfc3657.txt">http://www.ietf.org/rfc/rfc3657.txt</a>.
  12691. </remarks>
  12692. </member>
  12693. <member name="T:Org.BouncyCastle.Crypto.Engines.Cast5Engine">
  12694. A class that provides CAST key encryption operations,
  12695. such as encoding data and generating keys.
  12696. All the algorithms herein are from the Internet RFC's
  12697. RFC2144 - Cast5 (64bit block, 40-128bit key)
  12698. RFC2612 - CAST6 (128bit block, 128-256bit key)
  12699. and implement a simplified cryptography interface.
  12700. </member>
  12701. <member name="M:Org.BouncyCastle.Crypto.Engines.Cast5Engine.Init(System.Boolean,Org.BouncyCastle.Crypto.ICipherParameters)">
  12702. initialise a CAST cipher.
  12703. @param forEncryption whether or not we are for encryption.
  12704. @param parameters the parameters required to set up the cipher.
  12705. @exception ArgumentException if the parameters argument is
  12706. inappropriate.
  12707. </member>
  12708. <member name="M:Org.BouncyCastle.Crypto.Engines.Cast5Engine.EncryptBlock(System.Byte[],System.Int32,System.Byte[],System.Int32)">
  12709. Encrypt the given input starting at the given offset and place
  12710. the result in the provided buffer starting at the given offset.
  12711. @param src The plaintext buffer
  12712. @param srcIndex An offset into src
  12713. @param dst The ciphertext buffer
  12714. @param dstIndex An offset into dst
  12715. </member>
  12716. <member name="M:Org.BouncyCastle.Crypto.Engines.Cast5Engine.DecryptBlock(System.Byte[],System.Int32,System.Byte[],System.Int32)">
  12717. Decrypt the given input starting at the given offset and place
  12718. the result in the provided buffer starting at the given offset.
  12719. @param src The plaintext buffer
  12720. @param srcIndex An offset into src
  12721. @param dst The ciphertext buffer
  12722. @param dstIndex An offset into dst
  12723. </member>
  12724. <member name="M:Org.BouncyCastle.Crypto.Engines.Cast5Engine.F1(System.UInt32,System.UInt32,System.Int32)">
  12725. The first of the three processing functions for the
  12726. encryption and decryption.
  12727. @param D the input to be processed
  12728. @param Kmi the mask to be used from Km[n]
  12729. @param Kri the rotation value to be used
  12730. </member>
  12731. <member name="M:Org.BouncyCastle.Crypto.Engines.Cast5Engine.F2(System.UInt32,System.UInt32,System.Int32)">
  12732. The second of the three processing functions for the
  12733. encryption and decryption.
  12734. @param D the input to be processed
  12735. @param Kmi the mask to be used from Km[n]
  12736. @param Kri the rotation value to be used
  12737. </member>
  12738. <member name="M:Org.BouncyCastle.Crypto.Engines.Cast5Engine.F3(System.UInt32,System.UInt32,System.Int32)">
  12739. The third of the three processing functions for the
  12740. encryption and decryption.
  12741. @param D the input to be processed
  12742. @param Kmi the mask to be used from Km[n]
  12743. @param Kri the rotation value to be used
  12744. </member>
  12745. <member name="M:Org.BouncyCastle.Crypto.Engines.Cast5Engine.CAST_Encipher(System.UInt32,System.UInt32,System.UInt32[])">
  12746. Does the 16 rounds to encrypt the block.
  12747. @param L0 the LH-32bits of the plaintext block
  12748. @param R0 the RH-32bits of the plaintext block
  12749. </member>
  12750. <member name="T:Org.BouncyCastle.Crypto.Engines.Cast6Engine">
  12751. A class that provides CAST6 key encryption operations,
  12752. such as encoding data and generating keys.
  12753. All the algorithms herein are from the Internet RFC
  12754. RFC2612 - CAST6 (128bit block, 128-256bit key)
  12755. and implement a simplified cryptography interface.
  12756. </member>
  12757. <member name="M:Org.BouncyCastle.Crypto.Engines.Cast6Engine.EncryptBlock(System.Byte[],System.Int32,System.Byte[],System.Int32)">
  12758. Encrypt the given input starting at the given offset and place
  12759. the result in the provided buffer starting at the given offset.
  12760. @param src The plaintext buffer
  12761. @param srcIndex An offset into src
  12762. @param dst The ciphertext buffer
  12763. @param dstIndex An offset into dst
  12764. </member>
  12765. <member name="M:Org.BouncyCastle.Crypto.Engines.Cast6Engine.DecryptBlock(System.Byte[],System.Int32,System.Byte[],System.Int32)">
  12766. Decrypt the given input starting at the given offset and place
  12767. the result in the provided buffer starting at the given offset.
  12768. @param src The plaintext buffer
  12769. @param srcIndex An offset into src
  12770. @param dst The ciphertext buffer
  12771. @param dstIndex An offset into dst
  12772. </member>
  12773. <member name="M:Org.BouncyCastle.Crypto.Engines.Cast6Engine.CAST_Encipher(System.UInt32,System.UInt32,System.UInt32,System.UInt32,System.UInt32[])">
  12774. Does the 12 quad rounds rounds to encrypt the block.
  12775. @param A the 00-31 bits of the plaintext block
  12776. @param B the 32-63 bits of the plaintext block
  12777. @param C the 64-95 bits of the plaintext block
  12778. @param D the 96-127 bits of the plaintext block
  12779. @param result the resulting ciphertext
  12780. </member>
  12781. <member name="M:Org.BouncyCastle.Crypto.Engines.Cast6Engine.CAST_Decipher(System.UInt32,System.UInt32,System.UInt32,System.UInt32,System.UInt32[])">
  12782. Does the 12 quad rounds rounds to decrypt the block.
  12783. @param A the 00-31 bits of the ciphertext block
  12784. @param B the 32-63 bits of the ciphertext block
  12785. @param C the 64-95 bits of the ciphertext block
  12786. @param D the 96-127 bits of the ciphertext block
  12787. @param result the resulting plaintext
  12788. </member>
  12789. <member name="T:Org.BouncyCastle.Crypto.Engines.ChaCha7539Engine">
  12790. <summary>
  12791. Implementation of Daniel J. Bernstein's ChaCha stream cipher.
  12792. </summary>
  12793. </member>
  12794. <member name="M:Org.BouncyCastle.Crypto.Engines.ChaCha7539Engine.#ctor">
  12795. <summary>
  12796. Creates a 20 rounds ChaCha engine.
  12797. </summary>
  12798. </member>
  12799. <member name="T:Org.BouncyCastle.Crypto.Engines.ChaChaEngine">
  12800. <summary>
  12801. Implementation of Daniel J. Bernstein's ChaCha stream cipher.
  12802. </summary>
  12803. </member>
  12804. <member name="M:Org.BouncyCastle.Crypto.Engines.ChaChaEngine.#ctor">
  12805. <summary>
  12806. Creates a 20 rounds ChaCha engine.
  12807. </summary>
  12808. </member>
  12809. <member name="M:Org.BouncyCastle.Crypto.Engines.ChaChaEngine.#ctor(System.Int32)">
  12810. <summary>
  12811. Creates a ChaCha engine with a specific number of rounds.
  12812. </summary>
  12813. <param name="rounds">the number of rounds (must be an even number).</param>
  12814. </member>
  12815. <member name="M:Org.BouncyCastle.Crypto.Engines.ChaChaEngine.ChachaCore(System.Int32,System.UInt32[],System.UInt32[])">
  12816. <summary>
  12817. ChaCha function.
  12818. </summary>
  12819. <param name="rounds">The number of ChaCha rounds to execute</param>
  12820. <param name="input">The input words.</param>
  12821. <param name="x">The ChaCha state to modify.</param>
  12822. </member>
  12823. <member name="T:Org.BouncyCastle.Crypto.Engines.DesEdeEngine">
  12824. <remarks>A class that provides a basic DESede (or Triple DES) engine.</remarks>
  12825. </member>
  12826. <member name="M:Org.BouncyCastle.Crypto.Engines.DesEdeEngine.Init(System.Boolean,Org.BouncyCastle.Crypto.ICipherParameters)">
  12827. initialise a DESede cipher.
  12828. @param forEncryption whether or not we are for encryption.
  12829. @param parameters the parameters required to set up the cipher.
  12830. @exception ArgumentException if the parameters argument is
  12831. inappropriate.
  12832. </member>
  12833. <member name="T:Org.BouncyCastle.Crypto.Engines.DesEdeWrapEngine">
  12834. * Wrap keys according to
  12835. * <a href="http://www.ietf.org/internet-drafts/draft-ietf-smime-key-wrap-01.txt">
  12836. * draft-ietf-smime-key-wrap-01.txt</a>.
  12837. * <p>
  12838. * Note:
  12839. * <ul>
  12840. * <li>this is based on a draft, and as such is subject to change - don't use this class for anything requiring long term storage.</li>
  12841. * <li>if you are using this to wrap triple-des keys you need to set the
  12842. * parity bits on the key and, if it's a two-key triple-des key, pad it
  12843. * yourself.</li>
  12844. * </ul>
  12845. * </p>
  12846. </member>
  12847. <member name="F:Org.BouncyCastle.Crypto.Engines.DesEdeWrapEngine.engine">
  12848. Field engine
  12849. </member>
  12850. <member name="F:Org.BouncyCastle.Crypto.Engines.DesEdeWrapEngine.param">
  12851. Field param
  12852. </member>
  12853. <member name="F:Org.BouncyCastle.Crypto.Engines.DesEdeWrapEngine.paramPlusIV">
  12854. Field paramPlusIV
  12855. </member>
  12856. <member name="F:Org.BouncyCastle.Crypto.Engines.DesEdeWrapEngine.iv">
  12857. Field iv
  12858. </member>
  12859. <member name="F:Org.BouncyCastle.Crypto.Engines.DesEdeWrapEngine.forWrapping">
  12860. Field forWrapping
  12861. </member>
  12862. <member name="F:Org.BouncyCastle.Crypto.Engines.DesEdeWrapEngine.IV2">
  12863. Field IV2
  12864. </member>
  12865. <member name="M:Org.BouncyCastle.Crypto.Engines.DesEdeWrapEngine.Init(System.Boolean,Org.BouncyCastle.Crypto.ICipherParameters)">
  12866. Method init
  12867. @param forWrapping
  12868. @param param
  12869. </member>
  12870. <member name="P:Org.BouncyCastle.Crypto.Engines.DesEdeWrapEngine.AlgorithmName">
  12871. Method GetAlgorithmName
  12872. @return
  12873. </member>
  12874. <member name="M:Org.BouncyCastle.Crypto.Engines.DesEdeWrapEngine.Wrap(System.Byte[],System.Int32,System.Int32)">
  12875. Method wrap
  12876. @param in
  12877. @param inOff
  12878. @param inLen
  12879. @return
  12880. </member>
  12881. <member name="M:Org.BouncyCastle.Crypto.Engines.DesEdeWrapEngine.Unwrap(System.Byte[],System.Int32,System.Int32)">
  12882. Method unwrap
  12883. @param in
  12884. @param inOff
  12885. @param inLen
  12886. @return
  12887. @throws InvalidCipherTextException
  12888. </member>
  12889. <member name="M:Org.BouncyCastle.Crypto.Engines.DesEdeWrapEngine.CalculateCmsKeyChecksum(System.Byte[])">
  12890. Some key wrap algorithms make use of the Key Checksum defined
  12891. in CMS [CMS-Algorithms]. This is used to provide an integrity
  12892. check value for the key being wrapped. The algorithm is
  12893. - Compute the 20 octet SHA-1 hash on the key being wrapped.
  12894. - Use the first 8 octets of this hash as the checksum value.
  12895. @param key
  12896. @return
  12897. @throws Exception
  12898. @see http://www.w3.org/TR/xmlenc-core/#sec-CMSKeyChecksum
  12899. </member>
  12900. <member name="M:Org.BouncyCastle.Crypto.Engines.DesEdeWrapEngine.CheckCmsKeyChecksum(System.Byte[],System.Byte[])">
  12901. @param key
  12902. @param checksum
  12903. @return
  12904. @see http://www.w3.org/TR/xmlenc-core/#sec-CMSKeyChecksum
  12905. </member>
  12906. <member name="T:Org.BouncyCastle.Crypto.Engines.DesEngine">
  12907. <remarks>A class that provides a basic DES engine.</remarks>
  12908. </member>
  12909. <member name="M:Org.BouncyCastle.Crypto.Engines.DesEngine.Init(System.Boolean,Org.BouncyCastle.Crypto.ICipherParameters)">
  12910. initialise a DES cipher.
  12911. @param forEncryption whether or not we are for encryption.
  12912. @param parameters the parameters required to set up the cipher.
  12913. @exception ArgumentException if the parameters argument is
  12914. inappropriate.
  12915. </member>
  12916. <member name="F:Org.BouncyCastle.Crypto.Engines.DesEngine.bytebit">
  12917. what follows is mainly taken from "Applied Cryptography", by
  12918. Bruce Schneier, however it also bears great resemblance to Richard
  12919. Outerbridge's D3DES...
  12920. </member>
  12921. <member name="M:Org.BouncyCastle.Crypto.Engines.DesEngine.GenerateWorkingKey(System.Boolean,System.Byte[])">
  12922. Generate an integer based working key based on our secret key
  12923. and what we processing we are planning to do.
  12924. Acknowledgements for this routine go to James Gillogly and Phil Karn.
  12925. (whoever, and wherever they are!).
  12926. </member>
  12927. <member name="M:Org.BouncyCastle.Crypto.Engines.DesEngine.DesFunc(System.Int32[],System.Byte[],System.Int32,System.Byte[],System.Int32)">
  12928. the DES engine.
  12929. </member>
  12930. <member name="T:Org.BouncyCastle.Crypto.Engines.Dstu7624Engine">
  12931. implementation of DSTU 7624 (Kalyna)
  12932. </member>
  12933. <member name="T:Org.BouncyCastle.Crypto.Engines.ElGamalEngine">
  12934. this does your basic ElGamal algorithm.
  12935. </member>
  12936. <member name="M:Org.BouncyCastle.Crypto.Engines.ElGamalEngine.Init(System.Boolean,Org.BouncyCastle.Crypto.ICipherParameters)">
  12937. initialise the ElGamal engine.
  12938. @param forEncryption true if we are encrypting, false otherwise.
  12939. @param param the necessary ElGamal key parameters.
  12940. </member>
  12941. <member name="M:Org.BouncyCastle.Crypto.Engines.ElGamalEngine.GetInputBlockSize">
  12942. Return the maximum size for an input block to this engine.
  12943. For ElGamal this is always one byte less than the size of P on
  12944. encryption, and twice the length as the size of P on decryption.
  12945. @return maximum size for an input block.
  12946. </member>
  12947. <member name="M:Org.BouncyCastle.Crypto.Engines.ElGamalEngine.GetOutputBlockSize">
  12948. Return the maximum size for an output block to this engine.
  12949. For ElGamal this is always one byte less than the size of P on
  12950. decryption, and twice the length as the size of P on encryption.
  12951. @return maximum size for an output block.
  12952. </member>
  12953. <member name="M:Org.BouncyCastle.Crypto.Engines.ElGamalEngine.ProcessBlock(System.Byte[],System.Int32,System.Int32)">
  12954. Process a single block using the basic ElGamal algorithm.
  12955. @param in the input array.
  12956. @param inOff the offset into the input buffer where the data starts.
  12957. @param length the length of the data to be processed.
  12958. @return the result of the ElGamal process.
  12959. @exception DataLengthException the input block is too large.
  12960. </member>
  12961. <member name="T:Org.BouncyCastle.Crypto.Engines.Gost28147Engine">
  12962. implementation of GOST 28147-89
  12963. </member>
  12964. <member name="M:Org.BouncyCastle.Crypto.Engines.Gost28147Engine.#ctor">
  12965. standard constructor.
  12966. </member>
  12967. <member name="M:Org.BouncyCastle.Crypto.Engines.Gost28147Engine.Init(System.Boolean,Org.BouncyCastle.Crypto.ICipherParameters)">
  12968. initialise an Gost28147 cipher.
  12969. @param forEncryption whether or not we are for encryption.
  12970. @param parameters the parameters required to set up the cipher.
  12971. @exception ArgumentException if the parameters argument is inappropriate.
  12972. </member>
  12973. <member name="M:Org.BouncyCastle.Crypto.Engines.Gost28147Engine.GetSBox(System.String)">
  12974. Return the S-Box associated with SBoxName
  12975. @param sBoxName name of the S-Box
  12976. @return byte array representing the S-Box
  12977. </member>
  12978. <member name="T:Org.BouncyCastle.Crypto.Engines.HC128Engine">
  12979. HC-128 is a software-efficient stream cipher created by Hongjun Wu. It
  12980. generates keystream from a 128-bit secret key and a 128-bit initialization
  12981. vector.
  12982. <p>
  12983. http://www.ecrypt.eu.org/stream/p3ciphers/hc/hc128_p3.pdf
  12984. </p><p>
  12985. It is a third phase candidate in the eStream contest, and is patent-free.
  12986. No attacks are known as of today (April 2007). See
  12987. http://www.ecrypt.eu.org/stream/hcp3.html
  12988. </p>
  12989. </member>
  12990. <member name="M:Org.BouncyCastle.Crypto.Engines.HC128Engine.Init(System.Boolean,Org.BouncyCastle.Crypto.ICipherParameters)">
  12991. Initialise a HC-128 cipher.
  12992. @param forEncryption whether or not we are for encryption. Irrelevant, as
  12993. encryption and decryption are the same.
  12994. @param params the parameters required to set up the cipher.
  12995. @throws ArgumentException if the params argument is
  12996. inappropriate (ie. the key is not 128 bit long).
  12997. </member>
  12998. <member name="T:Org.BouncyCastle.Crypto.Engines.HC256Engine">
  12999. HC-256 is a software-efficient stream cipher created by Hongjun Wu. It
  13000. generates keystream from a 256-bit secret key and a 256-bit initialization
  13001. vector.
  13002. <p>
  13003. http://www.ecrypt.eu.org/stream/p3ciphers/hc/hc256_p3.pdf
  13004. </p><p>
  13005. Its brother, HC-128, is a third phase candidate in the eStream contest.
  13006. The algorithm is patent-free. No attacks are known as of today (April 2007).
  13007. See
  13008. http://www.ecrypt.eu.org/stream/hcp3.html
  13009. </p>
  13010. </member>
  13011. <member name="M:Org.BouncyCastle.Crypto.Engines.HC256Engine.Init(System.Boolean,Org.BouncyCastle.Crypto.ICipherParameters)">
  13012. Initialise a HC-256 cipher.
  13013. @param forEncryption whether or not we are for encryption. Irrelevant, as
  13014. encryption and decryption are the same.
  13015. @param params the parameters required to set up the cipher.
  13016. @throws ArgumentException if the params argument is
  13017. inappropriate (ie. the key is not 256 bit long).
  13018. </member>
  13019. <member name="T:Org.BouncyCastle.Crypto.Engines.IdeaEngine">
  13020. A class that provides a basic International Data Encryption Algorithm (IDEA) engine.
  13021. <p>
  13022. This implementation is based on the "HOWTO: INTERNATIONAL DATA ENCRYPTION ALGORITHM"
  13023. implementation summary by Fauzan Mirza (F.U.Mirza@sheffield.ac.uk). (barring 1 typo at the
  13024. end of the MulInv function!).
  13025. </p>
  13026. <p>
  13027. It can be found at ftp://ftp.funet.fi/pub/crypt/cryptography/symmetric/idea/
  13028. </p>
  13029. <p>
  13030. Note: This algorithm was patented in the USA, Japan and Europe. These patents expired in 2011/2012.
  13031. </p>
  13032. </member>
  13033. <member name="M:Org.BouncyCastle.Crypto.Engines.IdeaEngine.#ctor">
  13034. standard constructor.
  13035. </member>
  13036. <member name="M:Org.BouncyCastle.Crypto.Engines.IdeaEngine.Init(System.Boolean,Org.BouncyCastle.Crypto.ICipherParameters)">
  13037. initialise an IDEA cipher.
  13038. @param forEncryption whether or not we are for encryption.
  13039. @param parameters the parameters required to set up the cipher.
  13040. @exception ArgumentException if the parameters argument is
  13041. inappropriate.
  13042. </member>
  13043. <member name="M:Org.BouncyCastle.Crypto.Engines.IdeaEngine.Mul(System.Int32,System.Int32)">
  13044. return x = x * y where the multiplication is done modulo
  13045. 65537 (0x10001) (as defined in the IDEA specification) and
  13046. a zero input is taken to be 65536 (0x10000).
  13047. @param x the x value
  13048. @param y the y value
  13049. @return x = x * y
  13050. </member>
  13051. <member name="M:Org.BouncyCastle.Crypto.Engines.IdeaEngine.ExpandKey(System.Byte[])">
  13052. The following function is used to expand the user key to the encryption
  13053. subkey. The first 16 bytes are the user key, and the rest of the subkey
  13054. is calculated by rotating the previous 16 bytes by 25 bits to the left,
  13055. and so on until the subkey is completed.
  13056. </member>
  13057. <member name="M:Org.BouncyCastle.Crypto.Engines.IdeaEngine.MulInv(System.Int32)">
  13058. This function computes multiplicative inverse using Euclid's Greatest
  13059. Common Divisor algorithm. Zero and one are self inverse.
  13060. <p>
  13061. i.e. x * MulInv(x) == 1 (modulo BASE)
  13062. </p>
  13063. </member>
  13064. <member name="M:Org.BouncyCastle.Crypto.Engines.IdeaEngine.AddInv(System.Int32)">
  13065. Return the additive inverse of x.
  13066. <p>
  13067. i.e. x + AddInv(x) == 0
  13068. </p>
  13069. </member>
  13070. <member name="M:Org.BouncyCastle.Crypto.Engines.IdeaEngine.InvertKey(System.Int32[])">
  13071. The function to invert the encryption subkey to the decryption subkey.
  13072. It also involves the multiplicative inverse and the additive inverse functions.
  13073. </member>
  13074. <member name="T:Org.BouncyCastle.Crypto.Engines.IesEngine">
  13075. support class for constructing intergrated encryption ciphers
  13076. for doing basic message exchanges on top of key agreement ciphers
  13077. </member>
  13078. <member name="M:Org.BouncyCastle.Crypto.Engines.IesEngine.#ctor(Org.BouncyCastle.Crypto.IBasicAgreement,Org.BouncyCastle.Crypto.IDerivationFunction,Org.BouncyCastle.Crypto.IMac)">
  13079. set up for use with stream mode, where the key derivation function
  13080. is used to provide a stream of bytes to xor with the message.
  13081. @param agree the key agreement used as the basis for the encryption
  13082. @param kdf the key derivation function used for byte generation
  13083. @param mac the message authentication code generator for the message
  13084. </member>
  13085. <member name="M:Org.BouncyCastle.Crypto.Engines.IesEngine.#ctor(Org.BouncyCastle.Crypto.IBasicAgreement,Org.BouncyCastle.Crypto.IDerivationFunction,Org.BouncyCastle.Crypto.IMac,Org.BouncyCastle.Crypto.BufferedBlockCipher)">
  13086. set up for use in conjunction with a block cipher to handle the
  13087. message.
  13088. @param agree the key agreement used as the basis for the encryption
  13089. @param kdf the key derivation function used for byte generation
  13090. @param mac the message authentication code generator for the message
  13091. @param cipher the cipher to used for encrypting the message
  13092. </member>
  13093. <member name="M:Org.BouncyCastle.Crypto.Engines.IesEngine.Init(System.Boolean,Org.BouncyCastle.Crypto.ICipherParameters,Org.BouncyCastle.Crypto.ICipherParameters,Org.BouncyCastle.Crypto.ICipherParameters)">
  13094. Initialise the encryptor.
  13095. @param forEncryption whether or not this is encryption/decryption.
  13096. @param privParam our private key parameters
  13097. @param pubParam the recipient's/sender's public key parameters
  13098. @param param encoding and derivation parameters.
  13099. </member>
  13100. <member name="T:Org.BouncyCastle.Crypto.Engines.IsaacEngine">
  13101. Implementation of Bob Jenkin's ISAAC (Indirection Shift Accumulate Add and Count).
  13102. see: http://www.burtleburtle.net/bob/rand/isaacafa.html
  13103. </member>
  13104. <member name="M:Org.BouncyCastle.Crypto.Engines.IsaacEngine.Init(System.Boolean,Org.BouncyCastle.Crypto.ICipherParameters)">
  13105. initialise an ISAAC cipher.
  13106. @param forEncryption whether or not we are for encryption.
  13107. @param params the parameters required to set up the cipher.
  13108. @exception ArgumentException if the params argument is
  13109. inappropriate.
  13110. </member>
  13111. <member name="T:Org.BouncyCastle.Crypto.Engines.NaccacheSternEngine">
  13112. NaccacheStern Engine. For details on this cipher, please see
  13113. http://www.gemplus.com/smart/rd/publications/pdf/NS98pkcs.pdf
  13114. </member>
  13115. <member name="M:Org.BouncyCastle.Crypto.Engines.NaccacheSternEngine.Init(System.Boolean,Org.BouncyCastle.Crypto.ICipherParameters)">
  13116. Initializes this algorithm. Must be called before all other Functions.
  13117. @see org.bouncycastle.crypto.AsymmetricBlockCipher#init(bool,
  13118. org.bouncycastle.crypto.CipherParameters)
  13119. </member>
  13120. <member name="M:Org.BouncyCastle.Crypto.Engines.NaccacheSternEngine.GetInputBlockSize">
  13121. Returns the input block size of this algorithm.
  13122. @see org.bouncycastle.crypto.AsymmetricBlockCipher#GetInputBlockSize()
  13123. </member>
  13124. <member name="M:Org.BouncyCastle.Crypto.Engines.NaccacheSternEngine.GetOutputBlockSize">
  13125. Returns the output block size of this algorithm.
  13126. @see org.bouncycastle.crypto.AsymmetricBlockCipher#GetOutputBlockSize()
  13127. </member>
  13128. <member name="M:Org.BouncyCastle.Crypto.Engines.NaccacheSternEngine.ProcessBlock(System.Byte[],System.Int32,System.Int32)">
  13129. Process a single Block using the Naccache-Stern algorithm.
  13130. @see org.bouncycastle.crypto.AsymmetricBlockCipher#ProcessBlock(byte[],
  13131. int, int)
  13132. </member>
  13133. <member name="M:Org.BouncyCastle.Crypto.Engines.NaccacheSternEngine.Encrypt(Org.BouncyCastle.Math.BigInteger)">
  13134. Encrypts a BigInteger aka Plaintext with the public key.
  13135. @param plain
  13136. The BigInteger to encrypt
  13137. @return The byte[] representation of the encrypted BigInteger (i.e.
  13138. crypted.toByteArray())
  13139. </member>
  13140. <member name="M:Org.BouncyCastle.Crypto.Engines.NaccacheSternEngine.AddCryptedBlocks(System.Byte[],System.Byte[])">
  13141. Adds the contents of two encrypted blocks mod sigma
  13142. @param block1
  13143. the first encrypted block
  13144. @param block2
  13145. the second encrypted block
  13146. @return encrypt((block1 + block2) mod sigma)
  13147. @throws InvalidCipherTextException
  13148. </member>
  13149. <member name="M:Org.BouncyCastle.Crypto.Engines.NaccacheSternEngine.ProcessData(System.Byte[])">
  13150. Convenience Method for data exchange with the cipher.
  13151. Determines blocksize and splits data to blocksize.
  13152. @param data the data to be processed
  13153. @return the data after it went through the NaccacheSternEngine.
  13154. @throws InvalidCipherTextException
  13155. </member>
  13156. <member name="M:Org.BouncyCastle.Crypto.Engines.NaccacheSternEngine.chineseRemainder(System.Collections.IList,System.Collections.IList)">
  13157. Computes the integer x that is expressed through the given primes and the
  13158. congruences with the chinese remainder theorem (CRT).
  13159. @param congruences
  13160. the congruences c_i
  13161. @param primes
  13162. the primes p_i
  13163. @return an integer x for that x % p_i == c_i
  13164. </member>
  13165. <member name="T:Org.BouncyCastle.Crypto.Engines.NoekeonEngine">
  13166. A Noekeon engine, using direct-key mode.
  13167. </member>
  13168. <member name="M:Org.BouncyCastle.Crypto.Engines.NoekeonEngine.#ctor">
  13169. Create an instance of the Noekeon encryption algorithm
  13170. and set some defaults
  13171. </member>
  13172. <member name="M:Org.BouncyCastle.Crypto.Engines.NoekeonEngine.Init(System.Boolean,Org.BouncyCastle.Crypto.ICipherParameters)">
  13173. initialise
  13174. @param forEncryption whether or not we are for encryption.
  13175. @param params the parameters required to set up the cipher.
  13176. @exception ArgumentException if the params argument is
  13177. inappropriate.
  13178. </member>
  13179. <member name="T:Org.BouncyCastle.Crypto.Engines.NullEngine">
  13180. The no-op engine that just copies bytes through, irrespective of whether encrypting and decrypting.
  13181. Provided for the sake of completeness.
  13182. </member>
  13183. <member name="T:Org.BouncyCastle.Crypto.Engines.RC2Engine">
  13184. an implementation of RC2 as described in RFC 2268
  13185. "A Description of the RC2(r) Encryption Algorithm" R. Rivest.
  13186. </member>
  13187. <member name="M:Org.BouncyCastle.Crypto.Engines.RC2Engine.Init(System.Boolean,Org.BouncyCastle.Crypto.ICipherParameters)">
  13188. initialise a RC2 cipher.
  13189. @param forEncryption whether or not we are for encryption.
  13190. @param parameters the parameters required to set up the cipher.
  13191. @exception ArgumentException if the parameters argument is
  13192. inappropriate.
  13193. </member>
  13194. <member name="M:Org.BouncyCastle.Crypto.Engines.RC2Engine.RotateWordLeft(System.Int32,System.Int32)">
  13195. return the result rotating the 16 bit number in x left by y
  13196. </member>
  13197. <member name="T:Org.BouncyCastle.Crypto.Engines.RC2WrapEngine">
  13198. Wrap keys according to RFC 3217 - RC2 mechanism
  13199. </member>
  13200. <member name="F:Org.BouncyCastle.Crypto.Engines.RC2WrapEngine.engine">
  13201. Field engine
  13202. </member>
  13203. <member name="F:Org.BouncyCastle.Crypto.Engines.RC2WrapEngine.parameters">
  13204. Field param
  13205. </member>
  13206. <member name="F:Org.BouncyCastle.Crypto.Engines.RC2WrapEngine.paramPlusIV">
  13207. Field paramPlusIV
  13208. </member>
  13209. <member name="F:Org.BouncyCastle.Crypto.Engines.RC2WrapEngine.iv">
  13210. Field iv
  13211. </member>
  13212. <member name="F:Org.BouncyCastle.Crypto.Engines.RC2WrapEngine.forWrapping">
  13213. Field forWrapping
  13214. </member>
  13215. <member name="F:Org.BouncyCastle.Crypto.Engines.RC2WrapEngine.IV2">
  13216. Field IV2
  13217. </member>
  13218. <member name="M:Org.BouncyCastle.Crypto.Engines.RC2WrapEngine.Init(System.Boolean,Org.BouncyCastle.Crypto.ICipherParameters)">
  13219. Method init
  13220. @param forWrapping
  13221. @param param
  13222. </member>
  13223. <member name="P:Org.BouncyCastle.Crypto.Engines.RC2WrapEngine.AlgorithmName">
  13224. Method GetAlgorithmName
  13225. @return
  13226. </member>
  13227. <member name="M:Org.BouncyCastle.Crypto.Engines.RC2WrapEngine.Wrap(System.Byte[],System.Int32,System.Int32)">
  13228. Method wrap
  13229. @param in
  13230. @param inOff
  13231. @param inLen
  13232. @return
  13233. </member>
  13234. <member name="M:Org.BouncyCastle.Crypto.Engines.RC2WrapEngine.Unwrap(System.Byte[],System.Int32,System.Int32)">
  13235. Method unwrap
  13236. @param in
  13237. @param inOff
  13238. @param inLen
  13239. @return
  13240. @throws InvalidCipherTextException
  13241. </member>
  13242. <member name="M:Org.BouncyCastle.Crypto.Engines.RC2WrapEngine.CalculateCmsKeyChecksum(System.Byte[])">
  13243. Some key wrap algorithms make use of the Key Checksum defined
  13244. in CMS [CMS-Algorithms]. This is used to provide an integrity
  13245. check value for the key being wrapped. The algorithm is
  13246. - Compute the 20 octet SHA-1 hash on the key being wrapped.
  13247. - Use the first 8 octets of this hash as the checksum value.
  13248. @param key
  13249. @return
  13250. @throws Exception
  13251. @see http://www.w3.org/TR/xmlenc-core/#sec-CMSKeyChecksum
  13252. </member>
  13253. <member name="M:Org.BouncyCastle.Crypto.Engines.RC2WrapEngine.CheckCmsKeyChecksum(System.Byte[],System.Byte[])">
  13254. @param key
  13255. @param checksum
  13256. @return
  13257. @see http://www.w3.org/TR/xmlenc-core/#sec-CMSKeyChecksum
  13258. </member>
  13259. <member name="M:Org.BouncyCastle.Crypto.Engines.RC4Engine.Init(System.Boolean,Org.BouncyCastle.Crypto.ICipherParameters)">
  13260. initialise a RC4 cipher.
  13261. @param forEncryption whether or not we are for encryption.
  13262. @param parameters the parameters required to set up the cipher.
  13263. @exception ArgumentException if the parameters argument is
  13264. inappropriate.
  13265. </member>
  13266. <member name="T:Org.BouncyCastle.Crypto.Engines.RC532Engine">
  13267. The specification for RC5 came from the <code>RC5 Encryption Algorithm</code>
  13268. publication in RSA CryptoBytes, Spring of 1995.
  13269. <em>http://www.rsasecurity.com/rsalabs/cryptobytes</em>.
  13270. <p>
  13271. This implementation has a word size of 32 bits.</p>
  13272. </member>
  13273. <member name="M:Org.BouncyCastle.Crypto.Engines.RC532Engine.#ctor">
  13274. Create an instance of the RC5 encryption algorithm
  13275. and set some defaults
  13276. </member>
  13277. <member name="M:Org.BouncyCastle.Crypto.Engines.RC532Engine.Init(System.Boolean,Org.BouncyCastle.Crypto.ICipherParameters)">
  13278. initialise a RC5-32 cipher.
  13279. @param forEncryption whether or not we are for encryption.
  13280. @param parameters the parameters required to set up the cipher.
  13281. @exception ArgumentException if the parameters argument is
  13282. inappropriate.
  13283. </member>
  13284. <member name="M:Org.BouncyCastle.Crypto.Engines.RC532Engine.SetKey(System.Byte[])">
  13285. Re-key the cipher.
  13286. @param key the key to be used
  13287. </member>
  13288. <member name="M:Org.BouncyCastle.Crypto.Engines.RC532Engine.EncryptBlock(System.Byte[],System.Int32,System.Byte[],System.Int32)">
  13289. Encrypt the given block starting at the given offset and place
  13290. the result in the provided buffer starting at the given offset.
  13291. @param in in byte buffer containing data to encrypt
  13292. @param inOff offset into src buffer
  13293. @param out out buffer where encrypted data is written
  13294. @param outOff offset into out buffer
  13295. </member>
  13296. <member name="M:Org.BouncyCastle.Crypto.Engines.RC532Engine.RotateLeft(System.Int32,System.Int32)">
  13297. Perform a left "spin" of the word. The rotation of the given
  13298. word <em>x</em> is rotated left by <em>y</em> bits.
  13299. Only the <em>lg(32)</em> low-order bits of <em>y</em>
  13300. are used to determine the rotation amount. Here it is
  13301. assumed that the wordsize used is a power of 2.
  13302. @param x word to rotate
  13303. @param y number of bits to rotate % 32
  13304. </member>
  13305. <member name="M:Org.BouncyCastle.Crypto.Engines.RC532Engine.RotateRight(System.Int32,System.Int32)">
  13306. Perform a right "spin" of the word. The rotation of the given
  13307. word <em>x</em> is rotated left by <em>y</em> bits.
  13308. Only the <em>lg(32)</em> low-order bits of <em>y</em>
  13309. are used to determine the rotation amount. Here it is
  13310. assumed that the wordsize used is a power of 2.
  13311. @param x word to rotate
  13312. @param y number of bits to rotate % 32
  13313. </member>
  13314. <member name="T:Org.BouncyCastle.Crypto.Engines.RC564Engine">
  13315. The specification for RC5 came from the <code>RC5 Encryption Algorithm</code>
  13316. publication in RSA CryptoBytes, Spring of 1995.
  13317. <em>http://www.rsasecurity.com/rsalabs/cryptobytes</em>.
  13318. <p>
  13319. This implementation is set to work with a 64 bit word size.</p>
  13320. </member>
  13321. <member name="M:Org.BouncyCastle.Crypto.Engines.RC564Engine.#ctor">
  13322. Create an instance of the RC5 encryption algorithm
  13323. and set some defaults
  13324. </member>
  13325. <member name="M:Org.BouncyCastle.Crypto.Engines.RC564Engine.Init(System.Boolean,Org.BouncyCastle.Crypto.ICipherParameters)">
  13326. initialise a RC5-64 cipher.
  13327. @param forEncryption whether or not we are for encryption.
  13328. @param parameters the parameters required to set up the cipher.
  13329. @exception ArgumentException if the parameters argument is
  13330. inappropriate.
  13331. </member>
  13332. <member name="M:Org.BouncyCastle.Crypto.Engines.RC564Engine.SetKey(System.Byte[])">
  13333. Re-key the cipher.
  13334. @param key the key to be used
  13335. </member>
  13336. <member name="M:Org.BouncyCastle.Crypto.Engines.RC564Engine.EncryptBlock(System.Byte[],System.Int32,System.Byte[],System.Int32)">
  13337. Encrypt the given block starting at the given offset and place
  13338. the result in the provided buffer starting at the given offset.
  13339. @param in in byte buffer containing data to encrypt
  13340. @param inOff offset into src buffer
  13341. @param out out buffer where encrypted data is written
  13342. @param outOff offset into out buffer
  13343. </member>
  13344. <member name="M:Org.BouncyCastle.Crypto.Engines.RC564Engine.RotateLeft(System.Int64,System.Int64)">
  13345. Perform a left "spin" of the word. The rotation of the given
  13346. word <em>x</em> is rotated left by <em>y</em> bits.
  13347. Only the <em>lg(wordSize)</em> low-order bits of <em>y</em>
  13348. are used to determine the rotation amount. Here it is
  13349. assumed that the wordsize used is a power of 2.
  13350. @param x word to rotate
  13351. @param y number of bits to rotate % wordSize
  13352. </member>
  13353. <member name="M:Org.BouncyCastle.Crypto.Engines.RC564Engine.RotateRight(System.Int64,System.Int64)">
  13354. Perform a right "spin" of the word. The rotation of the given
  13355. word <em>x</em> is rotated left by <em>y</em> bits.
  13356. Only the <em>lg(wordSize)</em> low-order bits of <em>y</em>
  13357. are used to determine the rotation amount. Here it is
  13358. assumed that the wordsize used is a power of 2.
  13359. @param x word to rotate
  13360. @param y number of bits to rotate % wordSize
  13361. </member>
  13362. <member name="T:Org.BouncyCastle.Crypto.Engines.RC6Engine">
  13363. An RC6 engine.
  13364. </member>
  13365. <member name="M:Org.BouncyCastle.Crypto.Engines.RC6Engine.#ctor">
  13366. Create an instance of the RC6 encryption algorithm
  13367. and set some defaults
  13368. </member>
  13369. <member name="M:Org.BouncyCastle.Crypto.Engines.RC6Engine.Init(System.Boolean,Org.BouncyCastle.Crypto.ICipherParameters)">
  13370. initialise a RC5-32 cipher.
  13371. @param forEncryption whether or not we are for encryption.
  13372. @param parameters the parameters required to set up the cipher.
  13373. @exception ArgumentException if the parameters argument is
  13374. inappropriate.
  13375. </member>
  13376. <member name="M:Org.BouncyCastle.Crypto.Engines.RC6Engine.SetKey(System.Byte[])">
  13377. Re-key the cipher.
  13378. @param inKey the key to be used
  13379. </member>
  13380. <member name="M:Org.BouncyCastle.Crypto.Engines.RC6Engine.RotateLeft(System.Int32,System.Int32)">
  13381. Perform a left "spin" of the word. The rotation of the given
  13382. word <em>x</em> is rotated left by <em>y</em> bits.
  13383. Only the <em>lg(wordSize)</em> low-order bits of <em>y</em>
  13384. are used to determine the rotation amount. Here it is
  13385. assumed that the wordsize used is a power of 2.
  13386. @param x word to rotate
  13387. @param y number of bits to rotate % wordSize
  13388. </member>
  13389. <member name="M:Org.BouncyCastle.Crypto.Engines.RC6Engine.RotateRight(System.Int32,System.Int32)">
  13390. Perform a right "spin" of the word. The rotation of the given
  13391. word <em>x</em> is rotated left by <em>y</em> bits.
  13392. Only the <em>lg(wordSize)</em> low-order bits of <em>y</em>
  13393. are used to determine the rotation amount. Here it is
  13394. assumed that the wordsize used is a power of 2.
  13395. @param x word to rotate
  13396. @param y number of bits to rotate % wordSize
  13397. </member>
  13398. <member name="T:Org.BouncyCastle.Crypto.Engines.Rfc3211WrapEngine">
  13399. an implementation of the RFC 3211 Key Wrap
  13400. Specification.
  13401. </member>
  13402. <member name="T:Org.BouncyCastle.Crypto.Engines.Rfc3394WrapEngine">
  13403. <remarks>
  13404. An implementation of the AES Key Wrapper from the NIST Key Wrap
  13405. Specification as described in RFC 3394.
  13406. <p/>
  13407. For further details see: <a href="http://www.ietf.org/rfc/rfc3394.txt">http://www.ietf.org/rfc/rfc3394.txt</a>
  13408. and <a href="http://csrc.nist.gov/encryption/kms/key-wrap.pdf">http://csrc.nist.gov/encryption/kms/key-wrap.pdf</a>.
  13409. </remarks>
  13410. </member>
  13411. <member name="T:Org.BouncyCastle.Crypto.Engines.RijndaelEngine">
  13412. an implementation of Rijndael, based on the documentation and reference implementation
  13413. by Paulo Barreto, Vincent Rijmen, for v2.0 August '99.
  13414. <p>
  13415. Note: this implementation is based on information prior to readonly NIST publication.
  13416. </p>
  13417. </member>
  13418. <member name="M:Org.BouncyCastle.Crypto.Engines.RijndaelEngine.Mul0x2(System.Int32)">
  13419. multiply two elements of GF(2^m)
  13420. needed for MixColumn and InvMixColumn
  13421. </member>
  13422. <member name="M:Org.BouncyCastle.Crypto.Engines.RijndaelEngine.KeyAddition(System.Int64[])">
  13423. xor corresponding text input and round key input bytes
  13424. </member>
  13425. <member name="M:Org.BouncyCastle.Crypto.Engines.RijndaelEngine.ShiftRow(System.Byte[])">
  13426. Row 0 remains unchanged
  13427. The other three rows are shifted a variable amount
  13428. </member>
  13429. <member name="M:Org.BouncyCastle.Crypto.Engines.RijndaelEngine.Substitution(System.Byte[])">
  13430. Replace every byte of the input by the byte at that place
  13431. in the nonlinear S-box
  13432. </member>
  13433. <member name="M:Org.BouncyCastle.Crypto.Engines.RijndaelEngine.MixColumn">
  13434. Mix the bytes of every column in a linear way
  13435. </member>
  13436. <member name="M:Org.BouncyCastle.Crypto.Engines.RijndaelEngine.InvMixColumn">
  13437. Mix the bytes of every column in a linear way
  13438. This is the opposite operation of Mixcolumn
  13439. </member>
  13440. <member name="M:Org.BouncyCastle.Crypto.Engines.RijndaelEngine.GenerateWorkingKey(System.Byte[])">
  13441. Calculate the necessary round keys
  13442. The number of calculations depends on keyBits and blockBits
  13443. </member>
  13444. <member name="M:Org.BouncyCastle.Crypto.Engines.RijndaelEngine.#ctor">
  13445. default constructor - 128 bit block size.
  13446. </member>
  13447. <member name="M:Org.BouncyCastle.Crypto.Engines.RijndaelEngine.#ctor(System.Int32)">
  13448. basic constructor - set the cipher up for a given blocksize
  13449. @param blocksize the blocksize in bits, must be 128, 192, or 256.
  13450. </member>
  13451. <member name="M:Org.BouncyCastle.Crypto.Engines.RijndaelEngine.Init(System.Boolean,Org.BouncyCastle.Crypto.ICipherParameters)">
  13452. initialise a Rijndael cipher.
  13453. @param forEncryption whether or not we are for encryption.
  13454. @param parameters the parameters required to set up the cipher.
  13455. @exception ArgumentException if the parameters argument is
  13456. inappropriate.
  13457. </member>
  13458. <member name="T:Org.BouncyCastle.Crypto.Engines.RsaBlindedEngine">
  13459. this does your basic RSA algorithm with blinding
  13460. </member>
  13461. <member name="M:Org.BouncyCastle.Crypto.Engines.RsaBlindedEngine.Init(System.Boolean,Org.BouncyCastle.Crypto.ICipherParameters)">
  13462. initialise the RSA engine.
  13463. @param forEncryption true if we are encrypting, false otherwise.
  13464. @param param the necessary RSA key parameters.
  13465. </member>
  13466. <member name="M:Org.BouncyCastle.Crypto.Engines.RsaBlindedEngine.GetInputBlockSize">
  13467. Return the maximum size for an input block to this engine.
  13468. For RSA this is always one byte less than the key size on
  13469. encryption, and the same length as the key size on decryption.
  13470. @return maximum size for an input block.
  13471. </member>
  13472. <member name="M:Org.BouncyCastle.Crypto.Engines.RsaBlindedEngine.GetOutputBlockSize">
  13473. Return the maximum size for an output block to this engine.
  13474. For RSA this is always one byte less than the key size on
  13475. decryption, and the same length as the key size on encryption.
  13476. @return maximum size for an output block.
  13477. </member>
  13478. <member name="M:Org.BouncyCastle.Crypto.Engines.RsaBlindedEngine.ProcessBlock(System.Byte[],System.Int32,System.Int32)">
  13479. Process a single block using the basic RSA algorithm.
  13480. @param inBuf the input array.
  13481. @param inOff the offset into the input buffer where the data starts.
  13482. @param inLen the length of the data to be processed.
  13483. @return the result of the RSA process.
  13484. @exception DataLengthException the input block is too large.
  13485. </member>
  13486. <member name="T:Org.BouncyCastle.Crypto.Engines.RsaBlindingEngine">
  13487. This does your basic RSA Chaum's blinding and unblinding as outlined in
  13488. "Handbook of Applied Cryptography", page 475. You need to use this if you are
  13489. trying to get another party to generate signatures without them being aware
  13490. of the message they are signing.
  13491. </member>
  13492. <member name="M:Org.BouncyCastle.Crypto.Engines.RsaBlindingEngine.Init(System.Boolean,Org.BouncyCastle.Crypto.ICipherParameters)">
  13493. Initialise the blinding engine.
  13494. @param forEncryption true if we are encrypting (blinding), false otherwise.
  13495. @param param the necessary RSA key parameters.
  13496. </member>
  13497. <member name="M:Org.BouncyCastle.Crypto.Engines.RsaBlindingEngine.GetInputBlockSize">
  13498. Return the maximum size for an input block to this engine.
  13499. For RSA this is always one byte less than the key size on
  13500. encryption, and the same length as the key size on decryption.
  13501. @return maximum size for an input block.
  13502. </member>
  13503. <member name="M:Org.BouncyCastle.Crypto.Engines.RsaBlindingEngine.GetOutputBlockSize">
  13504. Return the maximum size for an output block to this engine.
  13505. For RSA this is always one byte less than the key size on
  13506. decryption, and the same length as the key size on encryption.
  13507. @return maximum size for an output block.
  13508. </member>
  13509. <member name="M:Org.BouncyCastle.Crypto.Engines.RsaBlindingEngine.ProcessBlock(System.Byte[],System.Int32,System.Int32)">
  13510. Process a single block using the RSA blinding algorithm.
  13511. @param in the input array.
  13512. @param inOff the offset into the input buffer where the data starts.
  13513. @param inLen the length of the data to be processed.
  13514. @return the result of the RSA process.
  13515. @throws DataLengthException the input block is too large.
  13516. </member>
  13517. <member name="T:Org.BouncyCastle.Crypto.Engines.RsaCoreEngine">
  13518. this does your basic RSA algorithm.
  13519. </member>
  13520. <member name="M:Org.BouncyCastle.Crypto.Engines.RsaCoreEngine.Init(System.Boolean,Org.BouncyCastle.Crypto.ICipherParameters)">
  13521. initialise the RSA engine.
  13522. @param forEncryption true if we are encrypting, false otherwise.
  13523. @param param the necessary RSA key parameters.
  13524. </member>
  13525. <member name="M:Org.BouncyCastle.Crypto.Engines.RsaCoreEngine.GetInputBlockSize">
  13526. Return the maximum size for an input block to this engine.
  13527. For RSA this is always one byte less than the key size on
  13528. encryption, and the same length as the key size on decryption.
  13529. @return maximum size for an input block.
  13530. </member>
  13531. <member name="M:Org.BouncyCastle.Crypto.Engines.RsaCoreEngine.GetOutputBlockSize">
  13532. Return the maximum size for an output block to this engine.
  13533. For RSA this is always one byte less than the key size on
  13534. decryption, and the same length as the key size on encryption.
  13535. @return maximum size for an output block.
  13536. </member>
  13537. <member name="T:Org.BouncyCastle.Crypto.Engines.RsaEngine">
  13538. this does your basic RSA algorithm.
  13539. </member>
  13540. <member name="M:Org.BouncyCastle.Crypto.Engines.RsaEngine.Init(System.Boolean,Org.BouncyCastle.Crypto.ICipherParameters)">
  13541. initialise the RSA engine.
  13542. @param forEncryption true if we are encrypting, false otherwise.
  13543. @param param the necessary RSA key parameters.
  13544. </member>
  13545. <member name="M:Org.BouncyCastle.Crypto.Engines.RsaEngine.GetInputBlockSize">
  13546. Return the maximum size for an input block to this engine.
  13547. For RSA this is always one byte less than the key size on
  13548. encryption, and the same length as the key size on decryption.
  13549. @return maximum size for an input block.
  13550. </member>
  13551. <member name="M:Org.BouncyCastle.Crypto.Engines.RsaEngine.GetOutputBlockSize">
  13552. Return the maximum size for an output block to this engine.
  13553. For RSA this is always one byte less than the key size on
  13554. decryption, and the same length as the key size on encryption.
  13555. @return maximum size for an output block.
  13556. </member>
  13557. <member name="M:Org.BouncyCastle.Crypto.Engines.RsaEngine.ProcessBlock(System.Byte[],System.Int32,System.Int32)">
  13558. Process a single block using the basic RSA algorithm.
  13559. @param inBuf the input array.
  13560. @param inOff the offset into the input buffer where the data starts.
  13561. @param inLen the length of the data to be processed.
  13562. @return the result of the RSA process.
  13563. @exception DataLengthException the input block is too large.
  13564. </member>
  13565. <member name="T:Org.BouncyCastle.Crypto.Engines.Salsa20Engine">
  13566. <summary>
  13567. Implementation of Daniel J. Bernstein's Salsa20 stream cipher, Snuffle 2005
  13568. </summary>
  13569. </member>
  13570. <member name="F:Org.BouncyCastle.Crypto.Engines.Salsa20Engine.StateSize">
  13571. Constants
  13572. </member>
  13573. <member name="M:Org.BouncyCastle.Crypto.Engines.Salsa20Engine.#ctor">
  13574. <summary>
  13575. Creates a 20 round Salsa20 engine.
  13576. </summary>
  13577. </member>
  13578. <member name="M:Org.BouncyCastle.Crypto.Engines.Salsa20Engine.#ctor(System.Int32)">
  13579. <summary>
  13580. Creates a Salsa20 engine with a specific number of rounds.
  13581. </summary>
  13582. <param name="rounds">the number of rounds (must be an even number).</param>
  13583. </member>
  13584. <member name="T:Org.BouncyCastle.Crypto.Engines.SeedEngine">
  13585. Implementation of the SEED algorithm as described in RFC 4009
  13586. </member>
  13587. <member name="T:Org.BouncyCastle.Crypto.Engines.SeedWrapEngine">
  13588. <remarks>
  13589. An implementation of the SEED key wrapper based on RFC 4010/RFC 3394.
  13590. <p/>
  13591. For further details see: <a href="http://www.ietf.org/rfc/rfc4010.txt">http://www.ietf.org/rfc/rfc4010.txt</a>.
  13592. </remarks>
  13593. </member>
  13594. <member name="T:Org.BouncyCastle.Crypto.Engines.SerpentEngine">
  13595. * Serpent is a 128-bit 32-round block cipher with variable key lengths,
  13596. * including 128, 192 and 256 bit keys conjectured to be at least as
  13597. * secure as three-key triple-DES.
  13598. * <p>
  13599. * Serpent was designed by Ross Anderson, Eli Biham and Lars Knudsen as a
  13600. * candidate algorithm for the NIST AES Quest.
  13601. * </p>
  13602. * <p>
  13603. * For full details see <a href="http://www.cl.cam.ac.uk/~rja14/serpent.html">The Serpent home page</a>
  13604. * </p>
  13605. </member>
  13606. <member name="M:Org.BouncyCastle.Crypto.Engines.SerpentEngine.MakeWorkingKey(System.Byte[])">
  13607. Expand a user-supplied key material into a session key.
  13608. @param key The user-key bytes (multiples of 4) to use.
  13609. @exception ArgumentException
  13610. </member>
  13611. <member name="M:Org.BouncyCastle.Crypto.Engines.SerpentEngine.EncryptBlock(System.Byte[],System.Int32,System.Byte[],System.Int32)">
  13612. Encrypt one block of plaintext.
  13613. @param input the array containing the input data.
  13614. @param inOff offset into the in array the data starts at.
  13615. @param output the array the output data will be copied into.
  13616. @param outOff the offset into the out array the output will start at.
  13617. </member>
  13618. <member name="M:Org.BouncyCastle.Crypto.Engines.SerpentEngine.DecryptBlock(System.Byte[],System.Int32,System.Byte[],System.Int32)">
  13619. Decrypt one block of ciphertext.
  13620. @param input the array containing the input data.
  13621. @param inOff offset into the in array the data starts at.
  13622. @param output the array the output data will be copied into.
  13623. @param outOff the offset into the out array the output will start at.
  13624. </member>
  13625. <member name="M:Org.BouncyCastle.Crypto.Engines.SerpentEngineBase.Init(System.Boolean,Org.BouncyCastle.Crypto.ICipherParameters)">
  13626. initialise a Serpent cipher.
  13627. @param encrypting whether or not we are for encryption.
  13628. @param params the parameters required to set up the cipher.
  13629. @throws IllegalArgumentException if the params argument is
  13630. inappropriate.
  13631. </member>
  13632. <member name="M:Org.BouncyCastle.Crypto.Engines.SerpentEngineBase.ProcessBlock(System.Byte[],System.Int32,System.Byte[],System.Int32)">
  13633. Process one block of input from the array in and write it to
  13634. the out array.
  13635. @param in the array containing the input data.
  13636. @param inOff offset into the in array the data starts at.
  13637. @param out the array the output data will be copied into.
  13638. @param outOff the offset into the out array the output will start at.
  13639. @return the number of bytes processed and produced.
  13640. @throws DataLengthException if there isn't enough data in in, or
  13641. space in out.
  13642. @throws IllegalStateException if the cipher isn't initialised.
  13643. </member>
  13644. <member name="M:Org.BouncyCastle.Crypto.Engines.SerpentEngineBase.Ib0(System.Int32,System.Int32,System.Int32,System.Int32)">
  13645. InvSO - {13, 3,11, 0,10, 6, 5,12, 1,14, 4, 7,15, 9, 8, 2 } - 15 terms.
  13646. </member>
  13647. <member name="M:Org.BouncyCastle.Crypto.Engines.SerpentEngineBase.Sb1(System.Int32,System.Int32,System.Int32,System.Int32)">
  13648. S1 - {15,12, 2, 7, 9, 0, 5,10, 1,11,14, 8, 6,13, 3, 4 } - 14 terms.
  13649. </member>
  13650. <member name="M:Org.BouncyCastle.Crypto.Engines.SerpentEngineBase.Ib1(System.Int32,System.Int32,System.Int32,System.Int32)">
  13651. InvS1 - { 5, 8, 2,14,15, 6,12, 3,11, 4, 7, 9, 1,13,10, 0 } - 14 steps.
  13652. </member>
  13653. <member name="M:Org.BouncyCastle.Crypto.Engines.SerpentEngineBase.Sb2(System.Int32,System.Int32,System.Int32,System.Int32)">
  13654. S2 - { 8, 6, 7, 9, 3,12,10,15,13, 1,14, 4, 0,11, 5, 2 } - 16 terms.
  13655. </member>
  13656. <member name="M:Org.BouncyCastle.Crypto.Engines.SerpentEngineBase.Ib2(System.Int32,System.Int32,System.Int32,System.Int32)">
  13657. InvS2 - {12, 9,15, 4,11,14, 1, 2, 0, 3, 6,13, 5, 8,10, 7 } - 16 steps.
  13658. </member>
  13659. <member name="M:Org.BouncyCastle.Crypto.Engines.SerpentEngineBase.Sb3(System.Int32,System.Int32,System.Int32,System.Int32)">
  13660. S3 - { 0,15,11, 8,12, 9, 6, 3,13, 1, 2, 4,10, 7, 5,14 } - 16 terms.
  13661. </member>
  13662. <member name="M:Org.BouncyCastle.Crypto.Engines.SerpentEngineBase.Ib3(System.Int32,System.Int32,System.Int32,System.Int32)">
  13663. InvS3 - { 0, 9,10, 7,11,14, 6,13, 3, 5,12, 2, 4, 8,15, 1 } - 15 terms
  13664. </member>
  13665. <member name="M:Org.BouncyCastle.Crypto.Engines.SerpentEngineBase.Sb4(System.Int32,System.Int32,System.Int32,System.Int32)">
  13666. S4 - { 1,15, 8, 3,12, 0,11, 6, 2, 5, 4,10, 9,14, 7,13 } - 15 terms.
  13667. </member>
  13668. <member name="M:Org.BouncyCastle.Crypto.Engines.SerpentEngineBase.Ib4(System.Int32,System.Int32,System.Int32,System.Int32)">
  13669. InvS4 - { 5, 0, 8, 3,10, 9, 7,14, 2,12,11, 6, 4,15,13, 1 } - 15 terms.
  13670. </member>
  13671. <member name="M:Org.BouncyCastle.Crypto.Engines.SerpentEngineBase.Sb5(System.Int32,System.Int32,System.Int32,System.Int32)">
  13672. S5 - {15, 5, 2,11, 4,10, 9,12, 0, 3,14, 8,13, 6, 7, 1 } - 16 terms.
  13673. </member>
  13674. <member name="M:Org.BouncyCastle.Crypto.Engines.SerpentEngineBase.Ib5(System.Int32,System.Int32,System.Int32,System.Int32)">
  13675. InvS5 - { 8,15, 2, 9, 4, 1,13,14,11, 6, 5, 3, 7,12,10, 0 } - 16 terms.
  13676. </member>
  13677. <member name="M:Org.BouncyCastle.Crypto.Engines.SerpentEngineBase.Sb6(System.Int32,System.Int32,System.Int32,System.Int32)">
  13678. S6 - { 7, 2,12, 5, 8, 4, 6,11,14, 9, 1,15,13, 3,10, 0 } - 15 terms.
  13679. </member>
  13680. <member name="M:Org.BouncyCastle.Crypto.Engines.SerpentEngineBase.Ib6(System.Int32,System.Int32,System.Int32,System.Int32)">
  13681. InvS6 - {15,10, 1,13, 5, 3, 6, 0, 4, 9,14, 7, 2,12, 8,11 } - 15 terms.
  13682. </member>
  13683. <member name="M:Org.BouncyCastle.Crypto.Engines.SerpentEngineBase.Sb7(System.Int32,System.Int32,System.Int32,System.Int32)">
  13684. S7 - { 1,13,15, 0,14, 8, 2,11, 7, 4,12,10, 9, 3, 5, 6 } - 16 terms.
  13685. </member>
  13686. <member name="M:Org.BouncyCastle.Crypto.Engines.SerpentEngineBase.Ib7(System.Int32,System.Int32,System.Int32,System.Int32)">
  13687. InvS7 - { 3, 0, 6,13, 9,14,15, 8, 5,12,11, 7,10, 1, 4, 2 } - 17 terms.
  13688. </member>
  13689. <member name="M:Org.BouncyCastle.Crypto.Engines.SerpentEngineBase.LT">
  13690. Apply the linear transformation to the register set.
  13691. </member>
  13692. <member name="M:Org.BouncyCastle.Crypto.Engines.SerpentEngineBase.InverseLT">
  13693. Apply the inverse of the linear transformation to the register set.
  13694. </member>
  13695. <member name="T:Org.BouncyCastle.Crypto.Engines.SkipjackEngine">
  13696. a class that provides a basic SKIPJACK engine.
  13697. </member>
  13698. <member name="M:Org.BouncyCastle.Crypto.Engines.SkipjackEngine.Init(System.Boolean,Org.BouncyCastle.Crypto.ICipherParameters)">
  13699. initialise a SKIPJACK cipher.
  13700. @param forEncryption whether or not we are for encryption.
  13701. @param parameters the parameters required to set up the cipher.
  13702. @exception ArgumentException if the parameters argument is
  13703. inappropriate.
  13704. </member>
  13705. <member name="M:Org.BouncyCastle.Crypto.Engines.SkipjackEngine.G(System.Int32,System.Int32)">
  13706. The G permutation
  13707. </member>
  13708. <member name="M:Org.BouncyCastle.Crypto.Engines.SkipjackEngine.H(System.Int32,System.Int32)">
  13709. the inverse of the G permutation.
  13710. </member>
  13711. <member name="T:Org.BouncyCastle.Crypto.Engines.SM2Engine">
  13712. <summary>
  13713. SM2 public key encryption engine - based on https://tools.ietf.org/html/draft-shen-sm2-ecdsa-02.
  13714. </summary>
  13715. </member>
  13716. <member name="T:Org.BouncyCastle.Crypto.Engines.SM4Engine">
  13717. <summary>SM4 Block Cipher - SM4 is a 128 bit block cipher with a 128 bit key.</summary>
  13718. <remarks>
  13719. The implementation here is based on the document <a href="http://eprint.iacr.org/2008/329.pdf">http://eprint.iacr.org/2008/329.pdf</a>
  13720. by Whitfield Diffie and George Ledin, which is a translation of Prof. LU Shu-wang's original standard.
  13721. </remarks>
  13722. </member>
  13723. <member name="T:Org.BouncyCastle.Crypto.Engines.TeaEngine">
  13724. An TEA engine.
  13725. </member>
  13726. <member name="M:Org.BouncyCastle.Crypto.Engines.TeaEngine.#ctor">
  13727. Create an instance of the TEA encryption algorithm
  13728. and set some defaults
  13729. </member>
  13730. <member name="M:Org.BouncyCastle.Crypto.Engines.TeaEngine.Init(System.Boolean,Org.BouncyCastle.Crypto.ICipherParameters)">
  13731. initialise
  13732. @param forEncryption whether or not we are for encryption.
  13733. @param params the parameters required to set up the cipher.
  13734. @exception ArgumentException if the params argument is
  13735. inappropriate.
  13736. </member>
  13737. <member name="M:Org.BouncyCastle.Crypto.Engines.TeaEngine.setKey(System.Byte[])">
  13738. Re-key the cipher.
  13739. @param key the key to be used
  13740. </member>
  13741. <member name="T:Org.BouncyCastle.Crypto.Engines.ThreefishEngine">
  13742. <summary>
  13743. Implementation of the Threefish tweakable large block cipher in 256, 512 and 1024 bit block
  13744. sizes.
  13745. </summary>
  13746. <remarks>
  13747. This is the 1.3 version of Threefish defined in the Skein hash function submission to the NIST
  13748. SHA-3 competition in October 2010.
  13749. <p/>
  13750. Threefish was designed by Niels Ferguson - Stefan Lucks - Bruce Schneier - Doug Whiting - Mihir
  13751. Bellare - Tadayoshi Kohno - Jon Callas - Jesse Walker.
  13752. <p/>
  13753. This implementation inlines all round functions, unrolls 8 rounds, and uses 1.2k of static tables
  13754. to speed up key schedule injection. <br/>
  13755. 2 x block size state is retained by each cipher instance.
  13756. </remarks>
  13757. </member>
  13758. <member name="F:Org.BouncyCastle.Crypto.Engines.ThreefishEngine.BLOCKSIZE_256">
  13759. <summary>
  13760. 256 bit block size - Threefish-256
  13761. </summary>
  13762. </member>
  13763. <member name="F:Org.BouncyCastle.Crypto.Engines.ThreefishEngine.BLOCKSIZE_512">
  13764. <summary>
  13765. 512 bit block size - Threefish-512
  13766. </summary>
  13767. </member>
  13768. <member name="F:Org.BouncyCastle.Crypto.Engines.ThreefishEngine.BLOCKSIZE_1024">
  13769. <summary>
  13770. 1024 bit block size - Threefish-1024
  13771. </summary>
  13772. </member>
  13773. <member name="F:Org.BouncyCastle.Crypto.Engines.ThreefishEngine.TWEAK_SIZE_BYTES">
  13774. Size of the tweak in bytes (always 128 bit/16 bytes)
  13775. </member>
  13776. <member name="F:Org.BouncyCastle.Crypto.Engines.ThreefishEngine.ROUNDS_256">
  13777. Rounds in Threefish-256
  13778. </member>
  13779. <member name="F:Org.BouncyCastle.Crypto.Engines.ThreefishEngine.ROUNDS_512">
  13780. Rounds in Threefish-512
  13781. </member>
  13782. <member name="F:Org.BouncyCastle.Crypto.Engines.ThreefishEngine.ROUNDS_1024">
  13783. Rounds in Threefish-1024
  13784. </member>
  13785. <member name="F:Org.BouncyCastle.Crypto.Engines.ThreefishEngine.MAX_ROUNDS">
  13786. Max rounds of any of the variants
  13787. </member>
  13788. <member name="F:Org.BouncyCastle.Crypto.Engines.ThreefishEngine.C_240">
  13789. Key schedule parity constant
  13790. </member>
  13791. <member name="F:Org.BouncyCastle.Crypto.Engines.ThreefishEngine.blocksizeBytes">
  13792. Block size in bytes
  13793. </member>
  13794. <member name="F:Org.BouncyCastle.Crypto.Engines.ThreefishEngine.blocksizeWords">
  13795. Block size in 64 bit words
  13796. </member>
  13797. <member name="F:Org.BouncyCastle.Crypto.Engines.ThreefishEngine.currentBlock">
  13798. Buffer for byte oriented processBytes to call internal word API
  13799. </member>
  13800. <member name="F:Org.BouncyCastle.Crypto.Engines.ThreefishEngine.t">
  13801. Tweak bytes (2 byte t1,t2, calculated t3 and repeat of t1,t2 for modulo free lookup
  13802. </member>
  13803. <member name="F:Org.BouncyCastle.Crypto.Engines.ThreefishEngine.kw">
  13804. Key schedule words
  13805. </member>
  13806. <member name="F:Org.BouncyCastle.Crypto.Engines.ThreefishEngine.cipher">
  13807. The internal cipher implementation (varies by blocksize)
  13808. </member>
  13809. <member name="M:Org.BouncyCastle.Crypto.Engines.ThreefishEngine.#ctor(System.Int32)">
  13810. <summary>
  13811. Constructs a new Threefish cipher, with a specified block size.
  13812. </summary>
  13813. <param name="blocksizeBits">the block size in bits, one of <see cref="F:Org.BouncyCastle.Crypto.Engines.ThreefishEngine.BLOCKSIZE_256"/>, <see cref="F:Org.BouncyCastle.Crypto.Engines.ThreefishEngine.BLOCKSIZE_512"/>,
  13814. <see cref="F:Org.BouncyCastle.Crypto.Engines.ThreefishEngine.BLOCKSIZE_1024"/> .</param>
  13815. </member>
  13816. <member name="M:Org.BouncyCastle.Crypto.Engines.ThreefishEngine.Init(System.Boolean,Org.BouncyCastle.Crypto.ICipherParameters)">
  13817. <summary>
  13818. Initialise the engine.
  13819. </summary>
  13820. <param name="forEncryption">Initialise for encryption if true, for decryption if false.</param>
  13821. <param name="parameters">an instance of <see cref="T:Org.BouncyCastle.Crypto.Parameters.TweakableBlockCipherParameters"/> or <see cref="T:Org.BouncyCastle.Crypto.Parameters.KeyParameter"/> (to
  13822. use a 0 tweak)</param>
  13823. </member>
  13824. <member name="M:Org.BouncyCastle.Crypto.Engines.ThreefishEngine.Init(System.Boolean,System.UInt64[],System.UInt64[])">
  13825. <summary>
  13826. Initialise the engine, specifying the key and tweak directly.
  13827. </summary>
  13828. <param name="forEncryption">the cipher mode.</param>
  13829. <param name="key">the words of the key, or <code>null</code> to use the current key.</param>
  13830. <param name="tweak">the 2 word (128 bit) tweak, or <code>null</code> to use the current tweak.</param>
  13831. </member>
  13832. <member name="M:Org.BouncyCastle.Crypto.Engines.ThreefishEngine.ProcessBlock(System.UInt64[],System.UInt64[])">
  13833. <summary>
  13834. Process a block of data represented as 64 bit words.
  13835. </summary>
  13836. <returns>the number of 8 byte words processed (which will be the same as the block size).</returns>
  13837. <param name="inWords">a block sized buffer of words to process.</param>
  13838. <param name="outWords">a block sized buffer of words to receive the output of the operation.</param>
  13839. <exception cref="T:Org.BouncyCastle.Crypto.DataLengthException">if either the input or output is not block sized</exception>
  13840. <exception cref="T:System.InvalidOperationException">if this engine is not initialised</exception>
  13841. </member>
  13842. <member name="M:Org.BouncyCastle.Crypto.Engines.ThreefishEngine.BytesToWord(System.Byte[],System.Int32)">
  13843. <summary>
  13844. Read a single 64 bit word from input in LSB first order.
  13845. </summary>
  13846. </member>
  13847. <member name="M:Org.BouncyCastle.Crypto.Engines.ThreefishEngine.WordToBytes(System.UInt64,System.Byte[],System.Int32)">
  13848. <summary>
  13849. Write a 64 bit word to output in LSB first order.
  13850. </summary>
  13851. </member>
  13852. <member name="M:Org.BouncyCastle.Crypto.Engines.ThreefishEngine.RotlXor(System.UInt64,System.Int32,System.UInt64)">
  13853. Rotate left + xor part of the mix operation.
  13854. </member>
  13855. <member name="M:Org.BouncyCastle.Crypto.Engines.ThreefishEngine.XorRotr(System.UInt64,System.Int32,System.UInt64)">
  13856. Rotate xor + rotate right part of the unmix operation.
  13857. </member>
  13858. <member name="F:Org.BouncyCastle.Crypto.Engines.ThreefishEngine.ThreefishCipher.t">
  13859. The extended + repeated tweak words
  13860. </member>
  13861. <member name="F:Org.BouncyCastle.Crypto.Engines.ThreefishEngine.ThreefishCipher.kw">
  13862. The extended + repeated key words
  13863. </member>
  13864. <member name="F:Org.BouncyCastle.Crypto.Engines.ThreefishEngine.Threefish256Cipher.ROTATION_0_0">
  13865. Mix rotation constants defined in Skein 1.3 specification
  13866. </member>
  13867. <member name="F:Org.BouncyCastle.Crypto.Engines.ThreefishEngine.Threefish256Cipher.ROTATION_0_1">
  13868. Mix rotation constants defined in Skein 1.3 specification
  13869. </member>
  13870. <member name="F:Org.BouncyCastle.Crypto.Engines.ThreefishEngine.Threefish512Cipher.ROTATION_0_0">
  13871. Mix rotation constants defined in Skein 1.3 specification
  13872. </member>
  13873. <member name="F:Org.BouncyCastle.Crypto.Engines.ThreefishEngine.Threefish512Cipher.ROTATION_0_1">
  13874. Mix rotation constants defined in Skein 1.3 specification
  13875. </member>
  13876. <member name="F:Org.BouncyCastle.Crypto.Engines.ThreefishEngine.Threefish512Cipher.ROTATION_0_2">
  13877. Mix rotation constants defined in Skein 1.3 specification
  13878. </member>
  13879. <member name="F:Org.BouncyCastle.Crypto.Engines.ThreefishEngine.Threefish512Cipher.ROTATION_0_3">
  13880. Mix rotation constants defined in Skein 1.3 specification
  13881. </member>
  13882. <member name="F:Org.BouncyCastle.Crypto.Engines.ThreefishEngine.Threefish1024Cipher.ROTATION_0_0">
  13883. Mix rotation constants defined in Skein 1.3 specification
  13884. </member>
  13885. <member name="F:Org.BouncyCastle.Crypto.Engines.ThreefishEngine.Threefish1024Cipher.ROTATION_0_1">
  13886. Mix rotation constants defined in Skein 1.3 specification
  13887. </member>
  13888. <member name="F:Org.BouncyCastle.Crypto.Engines.ThreefishEngine.Threefish1024Cipher.ROTATION_0_2">
  13889. Mix rotation constants defined in Skein 1.3 specification
  13890. </member>
  13891. <member name="F:Org.BouncyCastle.Crypto.Engines.ThreefishEngine.Threefish1024Cipher.ROTATION_0_3">
  13892. Mix rotation constants defined in Skein 1.3 specification
  13893. </member>
  13894. <member name="T:Org.BouncyCastle.Crypto.Engines.TnepresEngine">
  13895. Tnepres is a 128-bit 32-round block cipher with variable key lengths,
  13896. including 128, 192 and 256 bit keys conjectured to be at least as
  13897. secure as three-key triple-DES.
  13898. <p>
  13899. Tnepres is based on Serpent which was designed by Ross Anderson, Eli Biham and Lars Knudsen as a
  13900. candidate algorithm for the NIST AES Quest. Unfortunately there was an endianness issue
  13901. with test vectors in the AES submission and the resulting confusion lead to the Tnepres cipher
  13902. as well, which is a byte swapped version of Serpent.
  13903. </p>
  13904. <p>
  13905. For full details see <a href="http://www.cl.cam.ac.uk/~rja14/serpent.html">The Serpent home page</a>
  13906. </p>
  13907. </member>
  13908. <member name="M:Org.BouncyCastle.Crypto.Engines.TnepresEngine.MakeWorkingKey(System.Byte[])">
  13909. Expand a user-supplied key material into a session key.
  13910. @param key The user-key bytes (multiples of 4) to use.
  13911. @exception ArgumentException
  13912. </member>
  13913. <member name="M:Org.BouncyCastle.Crypto.Engines.TnepresEngine.EncryptBlock(System.Byte[],System.Int32,System.Byte[],System.Int32)">
  13914. Encrypt one block of plaintext.
  13915. @param input the array containing the input data.
  13916. @param inOff offset into the in array the data starts at.
  13917. @param output the array the output data will be copied into.
  13918. @param outOff the offset into the out array the output will start at.
  13919. </member>
  13920. <member name="M:Org.BouncyCastle.Crypto.Engines.TnepresEngine.DecryptBlock(System.Byte[],System.Int32,System.Byte[],System.Int32)">
  13921. Decrypt one block of ciphertext.
  13922. @param input the array containing the input data.
  13923. @param inOff offset into the in array the data starts at.
  13924. @param output the array the output data will be copied into.
  13925. @param outOff the offset into the out array the output will start at.
  13926. </member>
  13927. <member name="T:Org.BouncyCastle.Crypto.Engines.TwofishEngine">
  13928. A class that provides Twofish encryption operations.
  13929. This Java implementation is based on the Java reference
  13930. implementation provided by Bruce Schneier and developed
  13931. by Raif S. Naffah.
  13932. </member>
  13933. <member name="F:Org.BouncyCastle.Crypto.Engines.TwofishEngine.P_00">
  13934. Define the fixed p0/p1 permutations used in keyed S-box lookup.
  13935. By changing the following constant definitions, the S-boxes will
  13936. automatically Get changed in the Twofish engine.
  13937. </member>
  13938. <member name="F:Org.BouncyCastle.Crypto.Engines.TwofishEngine.gSubKeys">
  13939. gSubKeys[] and gSBox[] are eventually used in the
  13940. encryption and decryption methods.
  13941. </member>
  13942. <member name="M:Org.BouncyCastle.Crypto.Engines.TwofishEngine.Init(System.Boolean,Org.BouncyCastle.Crypto.ICipherParameters)">
  13943. initialise a Twofish cipher.
  13944. @param forEncryption whether or not we are for encryption.
  13945. @param parameters the parameters required to set up the cipher.
  13946. @exception ArgumentException if the parameters argument is
  13947. inappropriate.
  13948. </member>
  13949. <member name="M:Org.BouncyCastle.Crypto.Engines.TwofishEngine.EncryptBlock(System.Byte[],System.Int32,System.Byte[],System.Int32)">
  13950. Encrypt the given input starting at the given offset and place
  13951. the result in the provided buffer starting at the given offset.
  13952. The input will be an exact multiple of our blocksize.
  13953. encryptBlock uses the pre-calculated gSBox[] and subKey[]
  13954. arrays.
  13955. </member>
  13956. <member name="M:Org.BouncyCastle.Crypto.Engines.TwofishEngine.DecryptBlock(System.Byte[],System.Int32,System.Byte[],System.Int32)">
  13957. Decrypt the given input starting at the given offset and place
  13958. the result in the provided buffer starting at the given offset.
  13959. The input will be an exact multiple of our blocksize.
  13960. </member>
  13961. <member name="M:Org.BouncyCastle.Crypto.Engines.TwofishEngine.RS_MDS_Encode(System.Int32,System.Int32)">
  13962. Use (12, 8) Reed-Solomon code over GF(256) to produce
  13963. a key S-box 32-bit entity from 2 key material 32-bit
  13964. entities.
  13965. @param k0 first 32-bit entity
  13966. @param k1 second 32-bit entity
  13967. @return Remainder polynomial Generated using RS code
  13968. </member>
  13969. <member name="M:Org.BouncyCastle.Crypto.Engines.TwofishEngine.RS_rem(System.Int32)">
  13970. * Reed-Solomon code parameters: (12,8) reversible code:
  13971. * <p>
  13972. * <pre>
  13973. * G(x) = x^4 + (a+1/a)x^3 + ax^2 + (a+1/a)x + 1
  13974. * </pre>
  13975. * where a = primitive root of field generator 0x14D
  13976. * </p>
  13977. </member>
  13978. <member name="M:Org.BouncyCastle.Crypto.Engines.VmpcEngine.Init(System.Boolean,Org.BouncyCastle.Crypto.ICipherParameters)">
  13979. initialise a VMPC cipher.
  13980. @param forEncryption
  13981. whether or not we are for encryption.
  13982. @param params
  13983. the parameters required to set up the cipher.
  13984. @exception ArgumentException
  13985. if the params argument is inappropriate.
  13986. </member>
  13987. <member name="T:Org.BouncyCastle.Crypto.Engines.XSalsa20Engine">
  13988. <summary>
  13989. Implementation of Daniel J. Bernstein's XSalsa20 stream cipher - Salsa20 with an extended nonce.
  13990. </summary>
  13991. <remarks>
  13992. XSalsa20 requires a 256 bit key, and a 192 bit nonce.
  13993. </remarks>
  13994. </member>
  13995. <member name="M:Org.BouncyCastle.Crypto.Engines.XSalsa20Engine.SetKey(System.Byte[],System.Byte[])">
  13996. <summary>
  13997. XSalsa20 key generation: process 256 bit input key and 128 bits of the input nonce
  13998. using a core Salsa20 function without input addition to produce 256 bit working key
  13999. and use that with the remaining 64 bits of nonce to initialize a standard Salsa20 engine state.
  14000. </summary>
  14001. </member>
  14002. <member name="T:Org.BouncyCastle.Crypto.Engines.XteaEngine">
  14003. An XTEA engine.
  14004. </member>
  14005. <member name="M:Org.BouncyCastle.Crypto.Engines.XteaEngine.#ctor">
  14006. Create an instance of the TEA encryption algorithm
  14007. and set some defaults
  14008. </member>
  14009. <member name="M:Org.BouncyCastle.Crypto.Engines.XteaEngine.Init(System.Boolean,Org.BouncyCastle.Crypto.ICipherParameters)">
  14010. initialise
  14011. @param forEncryption whether or not we are for encryption.
  14012. @param params the parameters required to set up the cipher.
  14013. @exception ArgumentException if the params argument is
  14014. inappropriate.
  14015. </member>
  14016. <member name="M:Org.BouncyCastle.Crypto.Engines.XteaEngine.setKey(System.Byte[])">
  14017. Re-key the cipher.
  14018. @param key the key to be used
  14019. </member>
  14020. <member name="T:Org.BouncyCastle.Crypto.Fpe.FpeEngine">
  14021. <summary>Base class for format-preserving encryption.</summary>
  14022. </member>
  14023. <member name="M:Org.BouncyCastle.Crypto.Fpe.FpeEngine.ProcessBlock(System.Byte[],System.Int32,System.Int32,System.Byte[],System.Int32)">
  14024. <summary>
  14025. Process length bytes from inBuf, writing the output to outBuf.
  14026. </summary>
  14027. <returns>number of bytes output.</returns>
  14028. <param name="inBuf">input data.</param>
  14029. <param name="inOff">offset in input data to start at.</param>
  14030. <param name="length">number of bytes to process.</param>
  14031. <param name="outBuf">destination buffer.</param>
  14032. <param name="outOff">offset to start writing at in destination buffer.</param>
  14033. </member>
  14034. <member name="M:Org.BouncyCastle.Crypto.Fpe.FpeEngine.Init(System.Boolean,Org.BouncyCastle.Crypto.ICipherParameters)">
  14035. <summary>
  14036. Initialize the FPE engine for encryption/decryption.
  14037. </summary>
  14038. <returns>number of bytes output.</returns>
  14039. <param name="forEncryption">true if initialising for encryption, false otherwise.</param>
  14040. <param name="parameters ">the key and other parameters to use to set the engine up.</param>
  14041. </member>
  14042. <member name="T:Org.BouncyCastle.Crypto.Generators.BaseKdfBytesGenerator">
  14043. Basic KDF generator for derived keys and ivs as defined by IEEE P1363a/ISO 18033
  14044. <br/>
  14045. This implementation is based on ISO 18033/P1363a.
  14046. </member>
  14047. <member name="M:Org.BouncyCastle.Crypto.Generators.BaseKdfBytesGenerator.#ctor(System.Int32,Org.BouncyCastle.Crypto.IDigest)">
  14048. Construct a KDF Parameters generator.
  14049. @param counterStart value of counter.
  14050. @param digest the digest to be used as the source of derived keys.
  14051. </member>
  14052. <member name="P:Org.BouncyCastle.Crypto.Generators.BaseKdfBytesGenerator.Digest">
  14053. return the underlying digest.
  14054. </member>
  14055. <member name="M:Org.BouncyCastle.Crypto.Generators.BaseKdfBytesGenerator.GenerateBytes(System.Byte[],System.Int32,System.Int32)">
  14056. fill len bytes of the output buffer with bytes generated from
  14057. the derivation function.
  14058. @throws ArgumentException if the size of the request will cause an overflow.
  14059. @throws DataLengthException if the out buffer is too small.
  14060. </member>
  14061. <member name="T:Org.BouncyCastle.Crypto.Generators.BCrypt">
  14062. Core of password hashing scheme Bcrypt,
  14063. designed by Niels Provos and David Mazières,
  14064. corresponds to the C reference implementation.
  14065. <p>
  14066. This implementation does not correspondent to the 1999 published paper
  14067. "A Future-Adaptable Password Scheme" of Niels Provos and David Mazières,
  14068. see: https://www.usenix.org/legacy/events/usenix99/provos/provos_html/node1.html.
  14069. In contrast to the paper, the order of key setup and salt setup is reversed:
  14070. state &lt;- ExpandKey(state, 0, key)
  14071. state %lt;- ExpandKey(state, 0, salt)
  14072. This corresponds to the OpenBSD reference implementation of Bcrypt.
  14073. </p><p>
  14074. Note:
  14075. There is no successful cryptanalysis (status 2015), but
  14076. the amount of memory and the band width of Bcrypt
  14077. may be insufficient to effectively prevent attacks
  14078. with custom hardware like FPGAs, ASICs
  14079. </p><p>
  14080. This implementation uses some parts of Bouncy Castle's BlowfishEngine.
  14081. </p>
  14082. </member>
  14083. <member name="M:Org.BouncyCastle.Crypto.Generators.BCrypt.DeriveRawKey(System.Int32,System.Byte[],System.Byte[])">
  14084. Derives a raw 192 bit Bcrypt key
  14085. @param cost the cost factor, treated as an exponent of 2
  14086. @param salt a 16 byte salt
  14087. @param psw the password
  14088. @return a 192 bit key
  14089. </member>
  14090. <member name="F:Org.BouncyCastle.Crypto.Generators.BCrypt.SALT_SIZE_BYTES">
  14091. Size of the salt parameter in bytes
  14092. </member>
  14093. <member name="F:Org.BouncyCastle.Crypto.Generators.BCrypt.MIN_COST">
  14094. Minimum value of cost parameter, equal to log2(bytes of salt)
  14095. </member>
  14096. <member name="F:Org.BouncyCastle.Crypto.Generators.BCrypt.MAX_COST">
  14097. Maximum value of cost parameter (31 == 2,147,483,648)
  14098. </member>
  14099. <member name="F:Org.BouncyCastle.Crypto.Generators.BCrypt.MAX_PASSWORD_BYTES">
  14100. Maximum size of password == max (unrestricted) size of Blowfish key
  14101. </member>
  14102. <member name="M:Org.BouncyCastle.Crypto.Generators.BCrypt.PasswordToByteArray(System.Char[])">
  14103. Converts a character password to bytes incorporating the required trailing zero byte.
  14104. @param password the password to be encoded.
  14105. @return a byte representation of the password in UTF8 + trailing zero.
  14106. </member>
  14107. <member name="M:Org.BouncyCastle.Crypto.Generators.BCrypt.Generate(System.Byte[],System.Byte[],System.Int32)">
  14108. Calculates the <b>bcrypt</b> hash of a password.
  14109. <p>
  14110. This implements the raw <b>bcrypt</b> function as defined in the bcrypt specification, not
  14111. the crypt encoded version implemented in OpenBSD.
  14112. </p>
  14113. @param password the password bytes (up to 72 bytes) to use for this invocation.
  14114. @param salt the 128 bit salt to use for this invocation.
  14115. @param cost the bcrypt cost parameter. The cost of the bcrypt function grows as
  14116. <code>2^cost</code>. Legal values are 4..31 inclusive.
  14117. @return the output of the raw bcrypt operation: a 192 bit (24 byte) hash.
  14118. </member>
  14119. <member name="M:Org.BouncyCastle.Crypto.Generators.DesEdeKeyGenerator.engineInit(Org.BouncyCastle.Crypto.KeyGenerationParameters)">
  14120. initialise the key generator - if strength is set to zero
  14121. the key Generated will be 192 bits in size, otherwise
  14122. strength can be 128 or 192 (or 112 or 168 if you don't count
  14123. parity bits), depending on whether you wish to do 2-key or 3-key
  14124. triple DES.
  14125. @param param the parameters to be used for key generation
  14126. </member>
  14127. <member name="M:Org.BouncyCastle.Crypto.Generators.DesKeyGenerator.engineInit(Org.BouncyCastle.Crypto.KeyGenerationParameters)">
  14128. initialise the key generator - if strength is set to zero
  14129. the key generated will be 64 bits in size, otherwise
  14130. strength can be 64 or 56 bits (if you don't count the parity bits).
  14131. @param param the parameters to be used for key generation
  14132. </member>
  14133. <member name="T:Org.BouncyCastle.Crypto.Generators.DHBasicKeyPairGenerator">
  14134. a basic Diffie-Hellman key pair generator.
  14135. This generates keys consistent for use with the basic algorithm for
  14136. Diffie-Hellman.
  14137. </member>
  14138. <member name="T:Org.BouncyCastle.Crypto.Generators.DHKeyPairGenerator">
  14139. a Diffie-Hellman key pair generator.
  14140. This generates keys consistent for use in the MTI/A0 key agreement protocol
  14141. as described in "Handbook of Applied Cryptography", Pages 516-519.
  14142. </member>
  14143. <member name="M:Org.BouncyCastle.Crypto.Generators.DHParametersGenerator.GenerateParameters">
  14144. which Generates the p and g values from the given parameters,
  14145. returning the DHParameters object.
  14146. <p>
  14147. Note: can take a while...</p>
  14148. </member>
  14149. <member name="T:Org.BouncyCastle.Crypto.Generators.DsaKeyPairGenerator">
  14150. a DSA key pair generator.
  14151. This Generates DSA keys in line with the method described
  14152. in <i>FIPS 186-3 B.1 FFC Key Pair Generation</i>.
  14153. </member>
  14154. <member name="T:Org.BouncyCastle.Crypto.Generators.DsaParametersGenerator">
  14155. Generate suitable parameters for DSA, in line with FIPS 186-2, or FIPS 186-3.
  14156. </member>
  14157. <member name="M:Org.BouncyCastle.Crypto.Generators.DsaParametersGenerator.Init(System.Int32,System.Int32,Org.BouncyCastle.Security.SecureRandom)">
  14158. <summary>Initialise the generator</summary>
  14159. <remarks>This form can only be used for older DSA (pre-DSA2) parameters</remarks>
  14160. <param name="size">the size of keys in bits (from 512 up to 1024, and a multiple of 64)</param>
  14161. <param name="certainty">measure of robustness of primes (at least 80 for FIPS 186-2 compliance)</param>
  14162. <param name="random">the source of randomness to use</param>
  14163. </member>
  14164. <member name="M:Org.BouncyCastle.Crypto.Generators.DsaParametersGenerator.Init(Org.BouncyCastle.Crypto.Parameters.DsaParameterGenerationParameters)">
  14165. <summary>Initialise the generator for DSA 2</summary>
  14166. <remarks>You must use this Init method if you need to generate parameters for DSA 2 keys</remarks>
  14167. <param name="parameters">An instance of <c>DsaParameterGenerationParameters</c> used to configure this generator</param>
  14168. </member>
  14169. <member name="M:Org.BouncyCastle.Crypto.Generators.DsaParametersGenerator.GenerateParameters">
  14170. <summary>Generates a set of <c>DsaParameters</c></summary>
  14171. <remarks>Can take a while...</remarks>
  14172. </member>
  14173. <member name="M:Org.BouncyCastle.Crypto.Generators.DsaParametersGenerator.GenerateParameters_FIPS186_3">
  14174. generate suitable parameters for DSA, in line with
  14175. <i>FIPS 186-3 A.1 Generation of the FFC Primes p and q</i>.
  14176. </member>
  14177. <member name="M:Org.BouncyCastle.Crypto.Generators.ECKeyPairGenerator.GenerateKeyPair">
  14178. Given the domain parameters this routine generates an EC key
  14179. pair in accordance with X9.62 section 5.2.1 pages 26, 27.
  14180. </member>
  14181. <member name="T:Org.BouncyCastle.Crypto.Generators.ElGamalKeyPairGenerator">
  14182. a ElGamal key pair generator.
  14183. <p>
  14184. This Generates keys consistent for use with ElGamal as described in
  14185. page 164 of "Handbook of Applied Cryptography".</p>
  14186. </member>
  14187. <member name="M:Org.BouncyCastle.Crypto.Generators.ElGamalParametersGenerator.GenerateParameters">
  14188. * which Generates the p and g values from the given parameters,
  14189. * returning the ElGamalParameters object.
  14190. * <p>
  14191. * Note: can take a while...
  14192. * </p>
  14193. </member>
  14194. <member name="T:Org.BouncyCastle.Crypto.Generators.Gost3410KeyPairGenerator">
  14195. a GOST3410 key pair generator.
  14196. This generates GOST3410 keys in line with the method described
  14197. in GOST R 34.10-94.
  14198. </member>
  14199. <member name="T:Org.BouncyCastle.Crypto.Generators.Gost3410ParametersGenerator">
  14200. generate suitable parameters for GOST3410.
  14201. </member>
  14202. <member name="M:Org.BouncyCastle.Crypto.Generators.Gost3410ParametersGenerator.Init(System.Int32,System.Int32,Org.BouncyCastle.Security.SecureRandom)">
  14203. initialise the key generator.
  14204. @param size size of the key
  14205. @param typeProcedure type procedure A,B = 1; A',B' - else
  14206. @param random random byte source.
  14207. </member>
  14208. <member name="M:Org.BouncyCastle.Crypto.Generators.Gost3410ParametersGenerator.procedure_C(Org.BouncyCastle.Math.BigInteger,Org.BouncyCastle.Math.BigInteger)">
  14209. Procedure C
  14210. procedure generates the a value from the given p,q,
  14211. returning the a value.
  14212. </member>
  14213. <member name="M:Org.BouncyCastle.Crypto.Generators.Gost3410ParametersGenerator.GenerateParameters">
  14214. which generates the p , q and a values from the given parameters,
  14215. returning the Gost3410Parameters object.
  14216. </member>
  14217. <member name="T:Org.BouncyCastle.Crypto.Generators.HkdfBytesGenerator">
  14218. HMAC-based Extract-and-Expand Key Derivation Function (HKDF) implemented
  14219. according to IETF RFC 5869, May 2010 as specified by H. Krawczyk, IBM
  14220. Research &amp; P. Eronen, Nokia. It uses a HMac internally to compute de OKM
  14221. (output keying material) and is likely to have better security properties
  14222. than KDF's based on just a hash function.
  14223. </member>
  14224. <member name="M:Org.BouncyCastle.Crypto.Generators.HkdfBytesGenerator.#ctor(Org.BouncyCastle.Crypto.IDigest)">
  14225. Creates a HKDFBytesGenerator based on the given hash function.
  14226. @param hash the digest to be used as the source of generatedBytes bytes
  14227. </member>
  14228. <member name="M:Org.BouncyCastle.Crypto.Generators.HkdfBytesGenerator.Extract(System.Byte[],System.Byte[])">
  14229. Performs the extract part of the key derivation function.
  14230. @param salt the salt to use
  14231. @param ikm the input keying material
  14232. @return the PRK as KeyParameter
  14233. </member>
  14234. <member name="M:Org.BouncyCastle.Crypto.Generators.HkdfBytesGenerator.ExpandNext">
  14235. Performs the expand part of the key derivation function, using currentT
  14236. as input and output buffer.
  14237. @throws DataLengthException if the total number of bytes generated is larger than the one
  14238. specified by RFC 5869 (255 * HashLen)
  14239. </member>
  14240. <member name="T:Org.BouncyCastle.Crypto.Generators.Kdf1BytesGenerator">
  14241. KFD2 generator for derived keys and ivs as defined by IEEE P1363a/ISO 18033
  14242. <br/>
  14243. This implementation is based on IEEE P1363/ISO 18033.
  14244. </member>
  14245. <member name="M:Org.BouncyCastle.Crypto.Generators.Kdf1BytesGenerator.#ctor(Org.BouncyCastle.Crypto.IDigest)">
  14246. Construct a KDF1 byte generator.
  14247. @param digest the digest to be used as the source of derived keys.
  14248. </member>
  14249. <member name="T:Org.BouncyCastle.Crypto.Generators.Kdf2BytesGenerator">
  14250. KDF2 generator for derived keys and ivs as defined by IEEE P1363a/ISO 18033
  14251. <br/>
  14252. This implementation is based on IEEE P1363/ISO 18033.
  14253. </member>
  14254. <member name="M:Org.BouncyCastle.Crypto.Generators.Kdf2BytesGenerator.#ctor(Org.BouncyCastle.Crypto.IDigest)">
  14255. Construct a KDF2 bytes generator. Generates key material
  14256. according to IEEE P1363 or ISO 18033 depending on the initialisation.
  14257. @param digest the digest to be used as the source of derived keys.
  14258. </member>
  14259. <member name="T:Org.BouncyCastle.Crypto.Generators.Mgf1BytesGenerator">
  14260. Generator for MGF1 as defined in Pkcs 1v2
  14261. </member>
  14262. <member name="M:Org.BouncyCastle.Crypto.Generators.Mgf1BytesGenerator.#ctor(Org.BouncyCastle.Crypto.IDigest)">
  14263. @param digest the digest to be used as the source of Generated bytes
  14264. </member>
  14265. <member name="P:Org.BouncyCastle.Crypto.Generators.Mgf1BytesGenerator.Digest">
  14266. return the underlying digest.
  14267. </member>
  14268. <member name="M:Org.BouncyCastle.Crypto.Generators.Mgf1BytesGenerator.ItoOSP(System.Int32,System.Byte[])">
  14269. int to octet string.
  14270. </member>
  14271. <member name="M:Org.BouncyCastle.Crypto.Generators.Mgf1BytesGenerator.GenerateBytes(System.Byte[],System.Int32,System.Int32)">
  14272. fill len bytes of the output buffer with bytes Generated from
  14273. the derivation function.
  14274. @throws DataLengthException if the out buffer is too small.
  14275. </member>
  14276. <member name="T:Org.BouncyCastle.Crypto.Generators.NaccacheSternKeyPairGenerator">
  14277. Key generation parameters for NaccacheStern cipher. For details on this cipher, please see
  14278. http://www.gemplus.com/smart/rd/publications/pdf/NS98pkcs.pdf
  14279. </member>
  14280. <member name="M:Org.BouncyCastle.Crypto.Generators.NaccacheSternKeyPairGenerator.permuteList(System.Collections.IList,Org.BouncyCastle.Security.SecureRandom)">
  14281. Generates a permuted ArrayList from the original one. The original List
  14282. is not modified
  14283. @param arr
  14284. the ArrayList to be permuted
  14285. @param rand
  14286. the source of Randomness for permutation
  14287. @return a new IList with the permuted elements.
  14288. </member>
  14289. <member name="M:Org.BouncyCastle.Crypto.Generators.NaccacheSternKeyPairGenerator.findFirstPrimes(System.Int32)">
  14290. Finds the first 'count' primes starting with 3
  14291. @param count
  14292. the number of primes to find
  14293. @return a vector containing the found primes as Integer
  14294. </member>
  14295. <member name="T:Org.BouncyCastle.Crypto.Generators.OpenBsdBCrypt">
  14296. Password hashing scheme BCrypt,
  14297. designed by Niels Provos and David Mazières, using the
  14298. String format and the Base64 encoding
  14299. of the reference implementation on OpenBSD
  14300. </member>
  14301. <member name="M:Org.BouncyCastle.Crypto.Generators.OpenBsdBCrypt.CreateBcryptString(System.String,System.Byte[],System.Byte[],System.Int32)">
  14302. Creates a 60 character Bcrypt String, including
  14303. version, cost factor, salt and hash, separated by '$'
  14304. @param version the version, 2y,2b or 2a. (2a is not backwards compatible.)
  14305. @param cost the cost factor, treated as an exponent of 2
  14306. @param salt a 16 byte salt
  14307. @param password the password
  14308. @return a 60 character Bcrypt String
  14309. </member>
  14310. <member name="M:Org.BouncyCastle.Crypto.Generators.OpenBsdBCrypt.Generate(System.Char[],System.Byte[],System.Int32)">
  14311. Creates a 60 character Bcrypt String, including
  14312. version, cost factor, salt and hash, separated by '$' using version
  14313. '2y'.
  14314. @param cost the cost factor, treated as an exponent of 2
  14315. @param salt a 16 byte salt
  14316. @param password the password
  14317. @return a 60 character Bcrypt String
  14318. </member>
  14319. <member name="M:Org.BouncyCastle.Crypto.Generators.OpenBsdBCrypt.Generate(System.String,System.Char[],System.Byte[],System.Int32)">
  14320. Creates a 60 character Bcrypt String, including
  14321. version, cost factor, salt and hash, separated by '$'
  14322. @param version the version, may be 2b, 2y or 2a. (2a is not backwards compatible.)
  14323. @param cost the cost factor, treated as an exponent of 2
  14324. @param salt a 16 byte salt
  14325. @param password the password
  14326. @return a 60 character Bcrypt String
  14327. </member>
  14328. <member name="M:Org.BouncyCastle.Crypto.Generators.OpenBsdBCrypt.CheckPassword(System.String,System.Char[])">
  14329. Checks if a password corresponds to a 60 character Bcrypt String
  14330. @param bcryptString a 60 character Bcrypt String, including
  14331. version, cost factor, salt and hash,
  14332. separated by '$'
  14333. @param password the password as an array of chars
  14334. @return true if the password corresponds to the
  14335. Bcrypt String, otherwise false
  14336. </member>
  14337. <!-- Badly formed XML comment ignored for member "T:Org.BouncyCastle.Crypto.Generators.OpenSslPbeParametersGenerator" -->
  14338. <member name="M:Org.BouncyCastle.Crypto.Generators.OpenSslPbeParametersGenerator.#ctor">
  14339. <description>
  14340. Construct a OpenSSL Parameters generator - digest the original MD5.
  14341. </description>
  14342. </member>
  14343. <member name="M:Org.BouncyCastle.Crypto.Generators.OpenSslPbeParametersGenerator.#ctor(Org.BouncyCastle.Crypto.IDigest)">
  14344. <description>
  14345. Construct a OpenSSL Parameters generator - digest as specified.
  14346. </description>
  14347. <param name="digest">the digest to use as the PRF.</param>
  14348. </member>
  14349. <member name="M:Org.BouncyCastle.Crypto.Generators.OpenSslPbeParametersGenerator.Init(System.Byte[],System.Byte[])">
  14350. Initialise - note the iteration count for this algorithm is fixed at 1.
  14351. @param password password to use.
  14352. @param salt salt to use.
  14353. </member>
  14354. <member name="M:Org.BouncyCastle.Crypto.Generators.OpenSslPbeParametersGenerator.GenerateDerivedKey(System.Int32)">
  14355. the derived key function, the ith hash of the password and the salt.
  14356. </member>
  14357. <member name="M:Org.BouncyCastle.Crypto.Generators.OpenSslPbeParametersGenerator.GenerateDerivedParameters(System.Int32)">
  14358. Generate a key parameter derived from the password, salt, and iteration
  14359. count we are currently initialised with.
  14360. @param keySize the size of the key we want (in bits)
  14361. @return a KeyParameter object.
  14362. @exception ArgumentException if the key length larger than the base hash size.
  14363. </member>
  14364. <member name="M:Org.BouncyCastle.Crypto.Generators.OpenSslPbeParametersGenerator.GenerateDerivedParameters(System.Int32,System.Int32)">
  14365. Generate a key with initialisation vector parameter derived from
  14366. the password, salt, and iteration count we are currently initialised
  14367. with.
  14368. @param keySize the size of the key we want (in bits)
  14369. @param ivSize the size of the iv we want (in bits)
  14370. @return a ParametersWithIV object.
  14371. @exception ArgumentException if keySize + ivSize is larger than the base hash size.
  14372. </member>
  14373. <member name="M:Org.BouncyCastle.Crypto.Generators.OpenSslPbeParametersGenerator.GenerateDerivedMacParameters(System.Int32)">
  14374. Generate a key parameter for use with a MAC derived from the password,
  14375. salt, and iteration count we are currently initialised with.
  14376. @param keySize the size of the key we want (in bits)
  14377. @return a KeyParameter object.
  14378. @exception ArgumentException if the key length larger than the base hash size.
  14379. </member>
  14380. <member name="T:Org.BouncyCastle.Crypto.Generators.Pkcs12ParametersGenerator">
  14381. Generator for Pbe derived keys and ivs as defined by Pkcs 12 V1.0.
  14382. <p>
  14383. The document this implementation is based on can be found at
  14384. <a href="http://www.rsasecurity.com/rsalabs/pkcs/pkcs-12/index.html">
  14385. RSA's Pkcs12 Page</a>
  14386. </p>
  14387. </member>
  14388. <member name="M:Org.BouncyCastle.Crypto.Generators.Pkcs12ParametersGenerator.#ctor(Org.BouncyCastle.Crypto.IDigest)">
  14389. Construct a Pkcs 12 Parameters generator.
  14390. @param digest the digest to be used as the source of derived keys.
  14391. @exception ArgumentException if an unknown digest is passed in.
  14392. </member>
  14393. <member name="M:Org.BouncyCastle.Crypto.Generators.Pkcs12ParametersGenerator.Adjust(System.Byte[],System.Int32,System.Byte[])">
  14394. add a + b + 1, returning the result in a. The a value is treated
  14395. as a BigInteger of length (b.Length * 8) bits. The result is
  14396. modulo 2^b.Length in case of overflow.
  14397. </member>
  14398. <member name="M:Org.BouncyCastle.Crypto.Generators.Pkcs12ParametersGenerator.GenerateDerivedKey(System.Int32,System.Int32)">
  14399. generation of a derived key ala Pkcs12 V1.0.
  14400. </member>
  14401. <member name="M:Org.BouncyCastle.Crypto.Generators.Pkcs12ParametersGenerator.GenerateDerivedParameters(System.Int32)">
  14402. Generate a key parameter derived from the password, salt, and iteration
  14403. count we are currently initialised with.
  14404. @param keySize the size of the key we want (in bits)
  14405. @return a KeyParameter object.
  14406. </member>
  14407. <member name="M:Org.BouncyCastle.Crypto.Generators.Pkcs12ParametersGenerator.GenerateDerivedParameters(System.Int32,System.Int32)">
  14408. Generate a key with initialisation vector parameter derived from
  14409. the password, salt, and iteration count we are currently initialised
  14410. with.
  14411. @param keySize the size of the key we want (in bits)
  14412. @param ivSize the size of the iv we want (in bits)
  14413. @return a ParametersWithIV object.
  14414. </member>
  14415. <member name="M:Org.BouncyCastle.Crypto.Generators.Pkcs12ParametersGenerator.GenerateDerivedMacParameters(System.Int32)">
  14416. Generate a key parameter for use with a MAC derived from the password,
  14417. salt, and iteration count we are currently initialised with.
  14418. @param keySize the size of the key we want (in bits)
  14419. @return a KeyParameter object.
  14420. </member>
  14421. <member name="T:Org.BouncyCastle.Crypto.Generators.Pkcs5S1ParametersGenerator">
  14422. Generator for Pbe derived keys and ivs as defined by Pkcs 5 V2.0 Scheme 1.
  14423. Note this generator is limited to the size of the hash produced by the
  14424. digest used to drive it.
  14425. <p>
  14426. The document this implementation is based on can be found at
  14427. <a href="http://www.rsasecurity.com/rsalabs/pkcs/pkcs-5/index.html">
  14428. RSA's Pkcs5 Page</a>
  14429. </p>
  14430. </member>
  14431. <member name="M:Org.BouncyCastle.Crypto.Generators.Pkcs5S1ParametersGenerator.#ctor(Org.BouncyCastle.Crypto.IDigest)">
  14432. Construct a Pkcs 5 Scheme 1 Parameters generator.
  14433. @param digest the digest to be used as the source of derived keys.
  14434. </member>
  14435. <member name="M:Org.BouncyCastle.Crypto.Generators.Pkcs5S1ParametersGenerator.GenerateDerivedKey">
  14436. the derived key function, the ith hash of the mPassword and the mSalt.
  14437. </member>
  14438. <member name="M:Org.BouncyCastle.Crypto.Generators.Pkcs5S1ParametersGenerator.GenerateDerivedParameters(System.Int32)">
  14439. Generate a key parameter derived from the mPassword, mSalt, and iteration
  14440. count we are currently initialised with.
  14441. @param keySize the size of the key we want (in bits)
  14442. @return a KeyParameter object.
  14443. @exception ArgumentException if the key length larger than the base hash size.
  14444. </member>
  14445. <member name="M:Org.BouncyCastle.Crypto.Generators.Pkcs5S1ParametersGenerator.GenerateDerivedParameters(System.Int32,System.Int32)">
  14446. Generate a key with initialisation vector parameter derived from
  14447. the mPassword, mSalt, and iteration count we are currently initialised
  14448. with.
  14449. @param keySize the size of the key we want (in bits)
  14450. @param ivSize the size of the iv we want (in bits)
  14451. @return a ParametersWithIV object.
  14452. @exception ArgumentException if keySize + ivSize is larger than the base hash size.
  14453. </member>
  14454. <member name="M:Org.BouncyCastle.Crypto.Generators.Pkcs5S1ParametersGenerator.GenerateDerivedMacParameters(System.Int32)">
  14455. Generate a key parameter for use with a MAC derived from the mPassword,
  14456. mSalt, and iteration count we are currently initialised with.
  14457. @param keySize the size of the key we want (in bits)
  14458. @return a KeyParameter object.
  14459. @exception ArgumentException if the key length larger than the base hash size.
  14460. </member>
  14461. <member name="T:Org.BouncyCastle.Crypto.Generators.Pkcs5S2ParametersGenerator">
  14462. Generator for Pbe derived keys and ivs as defined by Pkcs 5 V2.0 Scheme 2.
  14463. This generator uses a SHA-1 HMac as the calculation function.
  14464. <p>
  14465. The document this implementation is based on can be found at
  14466. <a href="http://www.rsasecurity.com/rsalabs/pkcs/pkcs-5/index.html">
  14467. RSA's Pkcs5 Page</a></p>
  14468. </member>
  14469. <member name="M:Org.BouncyCastle.Crypto.Generators.Pkcs5S2ParametersGenerator.#ctor">
  14470. construct a Pkcs5 Scheme 2 Parameters generator.
  14471. </member>
  14472. <member name="M:Org.BouncyCastle.Crypto.Generators.Pkcs5S2ParametersGenerator.GenerateDerivedParameters(System.Int32)">
  14473. Generate a key parameter derived from the password, salt, and iteration
  14474. count we are currently initialised with.
  14475. @param keySize the size of the key we want (in bits)
  14476. @return a KeyParameter object.
  14477. </member>
  14478. <member name="M:Org.BouncyCastle.Crypto.Generators.Pkcs5S2ParametersGenerator.GenerateDerivedParameters(System.Int32,System.Int32)">
  14479. Generate a key with initialisation vector parameter derived from
  14480. the password, salt, and iteration count we are currently initialised
  14481. with.
  14482. @param keySize the size of the key we want (in bits)
  14483. @param ivSize the size of the iv we want (in bits)
  14484. @return a ParametersWithIV object.
  14485. </member>
  14486. <member name="M:Org.BouncyCastle.Crypto.Generators.Pkcs5S2ParametersGenerator.GenerateDerivedMacParameters(System.Int32)">
  14487. Generate a key parameter for use with a MAC derived from the password,
  14488. salt, and iteration count we are currently initialised with.
  14489. @param keySize the size of the key we want (in bits)
  14490. @return a KeyParameter object.
  14491. </member>
  14492. <member name="T:Org.BouncyCastle.Crypto.Generators.Poly1305KeyGenerator">
  14493. <summary>
  14494. Generates keys for the Poly1305 MAC.
  14495. </summary>
  14496. <remarks>
  14497. Poly1305 keys are 256 bit keys consisting of a 128 bit secret key used for the underlying block
  14498. cipher followed by a 128 bit {@code r} value used for the polynomial portion of the Mac. <br/>
  14499. The {@code r} value has a specific format with some bits required to be cleared, resulting in an
  14500. effective 106 bit key. <br/>
  14501. A separately generated 256 bit key can be modified to fit the Poly1305 key format by using the
  14502. {@link #clamp(byte[])} method to clear the required bits.
  14503. </remarks>
  14504. <seealso cref="T:Org.BouncyCastle.Crypto.Macs.Poly1305"/>
  14505. </member>
  14506. <member name="M:Org.BouncyCastle.Crypto.Generators.Poly1305KeyGenerator.engineInit(Org.BouncyCastle.Crypto.KeyGenerationParameters)">
  14507. <summary>
  14508. Initialises the key generator.
  14509. </summary>
  14510. <remarks>
  14511. Poly1305 keys are always 256 bits, so the key length in the provided parameters is ignored.
  14512. </remarks>
  14513. </member>
  14514. <member name="M:Org.BouncyCastle.Crypto.Generators.Poly1305KeyGenerator.engineGenerateKey">
  14515. <summary>
  14516. Generates a 256 bit key in the format required for Poly1305 - e.g.
  14517. <code>k[0] ... k[15], r[0] ... r[15]</code> with the required bits in <code>r</code> cleared
  14518. as per <see cref="M:Org.BouncyCastle.Crypto.Generators.Poly1305KeyGenerator.Clamp(System.Byte[])"/>.
  14519. </summary>
  14520. </member>
  14521. <member name="M:Org.BouncyCastle.Crypto.Generators.Poly1305KeyGenerator.Clamp(System.Byte[])">
  14522. <summary>
  14523. Modifies an existing 32 byte key value to comply with the requirements of the Poly1305 key by
  14524. clearing required bits in the <code>r</code> (second 16 bytes) portion of the key.<br/>
  14525. Specifically:
  14526. <ul>
  14527. <li>r[3], r[7], r[11], r[15] have top four bits clear (i.e., are {0, 1, . . . , 15})</li>
  14528. <li>r[4], r[8], r[12] have bottom two bits clear (i.e., are in {0, 4, 8, . . . , 252})</li>
  14529. </ul>
  14530. </summary>
  14531. <param name="key">a 32 byte key value <code>k[0] ... k[15], r[0] ... r[15]</code></param>
  14532. </member>
  14533. <member name="M:Org.BouncyCastle.Crypto.Generators.Poly1305KeyGenerator.CheckKey(System.Byte[])">
  14534. <summary>
  14535. Checks a 32 byte key for compliance with the Poly1305 key requirements, e.g.
  14536. <code>k[0] ... k[15], r[0] ... r[15]</code> with the required bits in <code>r</code> cleared
  14537. as per <see cref="M:Org.BouncyCastle.Crypto.Generators.Poly1305KeyGenerator.Clamp(System.Byte[])"/>.
  14538. </summary>
  14539. <param name="key">Key.</param>
  14540. <exception cref="T:System.ArgumentException">if the key is of the wrong length, or has invalid bits set
  14541. in the <code>r</code> portion of the key.</exception>
  14542. </member>
  14543. <member name="T:Org.BouncyCastle.Crypto.Generators.RsaBlindingFactorGenerator">
  14544. Generate a random factor suitable for use with RSA blind signatures
  14545. as outlined in Chaum's blinding and unblinding as outlined in
  14546. "Handbook of Applied Cryptography", page 475.
  14547. </member>
  14548. <member name="M:Org.BouncyCastle.Crypto.Generators.RsaBlindingFactorGenerator.Init(Org.BouncyCastle.Crypto.ICipherParameters)">
  14549. Initialise the factor generator
  14550. @param param the necessary RSA key parameters.
  14551. </member>
  14552. <member name="M:Org.BouncyCastle.Crypto.Generators.RsaBlindingFactorGenerator.GenerateBlindingFactor">
  14553. Generate a suitable blind factor for the public key the generator was initialised with.
  14554. @return a random blind factor
  14555. </member>
  14556. <member name="T:Org.BouncyCastle.Crypto.Generators.RsaKeyPairGenerator">
  14557. an RSA key pair generator.
  14558. </member>
  14559. <member name="M:Org.BouncyCastle.Crypto.Generators.RsaKeyPairGenerator.ChooseRandomPrime(System.Int32,Org.BouncyCastle.Math.BigInteger)">
  14560. <summary>Choose a random prime value for use with RSA</summary>
  14561. <param name="bitlength">the bit-length of the returned prime</param>
  14562. <param name="e">the RSA public exponent</param>
  14563. <returns>a prime p, with (p-1) relatively prime to e</returns>
  14564. </member>
  14565. <member name="T:Org.BouncyCastle.Crypto.Generators.SCrypt">
  14566. <summary>Implementation of the scrypt a password-based key derivation function.</summary>
  14567. <remarks>
  14568. Scrypt was created by Colin Percival and is specified in
  14569. <a href="http://tools.ietf.org/html/draft-josefsson-scrypt-kdf-01">draft-josefsson-scrypt-kd</a>.
  14570. </remarks>
  14571. </member>
  14572. <member name="M:Org.BouncyCastle.Crypto.Generators.SCrypt.Generate(System.Byte[],System.Byte[],System.Int32,System.Int32,System.Int32,System.Int32)">
  14573. <summary>Generate a key using the scrypt key derivation function.</summary>
  14574. <param name="P">the bytes of the pass phrase.</param>
  14575. <param name="S">the salt to use for this invocation.</param>
  14576. <param name="N">CPU/Memory cost parameter. Must be larger than 1, a power of 2 and less than
  14577. <code>2^(128 * r / 8)</code>.</param>
  14578. <param name="r">the block size, must be >= 1.</param>
  14579. <param name="p">Parallelization parameter. Must be a positive integer less than or equal to
  14580. <code>Int32.MaxValue / (128 * r * 8)</code>.</param>
  14581. <param name="dkLen">the length of the key to generate.</param>
  14582. <returns>the generated key.</returns>
  14583. </member>
  14584. <member name="T:Org.BouncyCastle.Crypto.IAlphabetMapper">
  14585. Base interface for mapping from an alphabet to a set of indexes
  14586. suitable for use with FPE.
  14587. </member>
  14588. <member name="P:Org.BouncyCastle.Crypto.IAlphabetMapper.Radix">
  14589. <summary>
  14590. Return the number of characters in the alphabet.
  14591. </summary>
  14592. <returns>the radix for the alphabet.</returns>
  14593. </member>
  14594. <member name="M:Org.BouncyCastle.Crypto.IAlphabetMapper.ConvertToIndexes(System.Char[])">
  14595. <summary>
  14596. Return the passed in char[] as a byte array of indexes (indexes
  14597. can be more than 1 byte)
  14598. </summary>
  14599. <returns>an index array.</returns>
  14600. <param name="input">characters to be mapped.</param>
  14601. </member>
  14602. <member name="M:Org.BouncyCastle.Crypto.IAlphabetMapper.ConvertToChars(System.Byte[])">
  14603. <summary>
  14604. Return a char[] for this alphabet based on the indexes passed.
  14605. </summary>
  14606. <returns>an array of char corresponding to the index values.</returns>
  14607. <param name="input">input array of indexes.</param>
  14608. </member>
  14609. <member name="T:Org.BouncyCastle.Crypto.IAsymmetricBlockCipher">
  14610. <remarks>Base interface for a public/private key block cipher.</remarks>
  14611. </member>
  14612. <member name="P:Org.BouncyCastle.Crypto.IAsymmetricBlockCipher.AlgorithmName">
  14613. <summary>The name of the algorithm this cipher implements.</summary>
  14614. </member>
  14615. <member name="M:Org.BouncyCastle.Crypto.IAsymmetricBlockCipher.Init(System.Boolean,Org.BouncyCastle.Crypto.ICipherParameters)">
  14616. <summary>Initialise the cipher.</summary>
  14617. <param name="forEncryption">Initialise for encryption if true, for decryption if false.</param>
  14618. <param name="parameters">The key or other data required by the cipher.</param>
  14619. </member>
  14620. <member name="M:Org.BouncyCastle.Crypto.IAsymmetricBlockCipher.GetInputBlockSize">
  14621. <returns>The maximum size, in bytes, an input block may be.</returns>
  14622. </member>
  14623. <member name="M:Org.BouncyCastle.Crypto.IAsymmetricBlockCipher.GetOutputBlockSize">
  14624. <returns>The maximum size, in bytes, an output block will be.</returns>
  14625. </member>
  14626. <member name="M:Org.BouncyCastle.Crypto.IAsymmetricBlockCipher.ProcessBlock(System.Byte[],System.Int32,System.Int32)">
  14627. <summary>Process a block.</summary>
  14628. <param name="inBuf">The input buffer.</param>
  14629. <param name="inOff">The offset into <paramref>inBuf</paramref> that the input block begins.</param>
  14630. <param name="inLen">The length of the input block.</param>
  14631. <exception cref="T:Org.BouncyCastle.Crypto.InvalidCipherTextException">Input decrypts improperly.</exception>
  14632. <exception cref="T:Org.BouncyCastle.Crypto.DataLengthException">Input is too large for the cipher.</exception>
  14633. </member>
  14634. <member name="T:Org.BouncyCastle.Crypto.IAsymmetricCipherKeyPairGenerator">
  14635. interface that a public/private key pair generator should conform to.
  14636. </member>
  14637. <member name="M:Org.BouncyCastle.Crypto.IAsymmetricCipherKeyPairGenerator.Init(Org.BouncyCastle.Crypto.KeyGenerationParameters)">
  14638. intialise the key pair generator.
  14639. @param the parameters the key pair is to be initialised with.
  14640. </member>
  14641. <member name="M:Org.BouncyCastle.Crypto.IAsymmetricCipherKeyPairGenerator.GenerateKeyPair">
  14642. return an AsymmetricCipherKeyPair containing the Generated keys.
  14643. @return an AsymmetricCipherKeyPair containing the Generated keys.
  14644. </member>
  14645. <member name="T:Org.BouncyCastle.Crypto.IBasicAgreement">
  14646. The basic interface that basic Diffie-Hellman implementations
  14647. conforms to.
  14648. </member>
  14649. <member name="M:Org.BouncyCastle.Crypto.IBasicAgreement.Init(Org.BouncyCastle.Crypto.ICipherParameters)">
  14650. initialise the agreement engine.
  14651. </member>
  14652. <member name="M:Org.BouncyCastle.Crypto.IBasicAgreement.GetFieldSize">
  14653. return the field size for the agreement algorithm in bytes.
  14654. </member>
  14655. <member name="M:Org.BouncyCastle.Crypto.IBasicAgreement.CalculateAgreement(Org.BouncyCastle.Crypto.ICipherParameters)">
  14656. given a public key from a given party calculate the next
  14657. message in the agreement sequence.
  14658. </member>
  14659. <member name="T:Org.BouncyCastle.Crypto.IBlockCipher">
  14660. <remarks>Base interface for a symmetric key block cipher.</remarks>
  14661. </member>
  14662. <member name="P:Org.BouncyCastle.Crypto.IBlockCipher.AlgorithmName">
  14663. <summary>The name of the algorithm this cipher implements.</summary>
  14664. </member>
  14665. <member name="M:Org.BouncyCastle.Crypto.IBlockCipher.Init(System.Boolean,Org.BouncyCastle.Crypto.ICipherParameters)">
  14666. <summary>Initialise the cipher.</summary>
  14667. <param name="forEncryption">Initialise for encryption if true, for decryption if false.</param>
  14668. <param name="parameters">The key or other data required by the cipher.</param>
  14669. </member>
  14670. <member name="M:Org.BouncyCastle.Crypto.IBlockCipher.GetBlockSize">
  14671. <returns>The block size for this cipher, in bytes.</returns>
  14672. </member>
  14673. <member name="P:Org.BouncyCastle.Crypto.IBlockCipher.IsPartialBlockOkay">
  14674. <summary>Indicates whether this cipher can handle partial blocks.</summary>
  14675. </member>
  14676. <member name="M:Org.BouncyCastle.Crypto.IBlockCipher.ProcessBlock(System.Byte[],System.Int32,System.Byte[],System.Int32)">
  14677. <summary>Process a block.</summary>
  14678. <param name="inBuf">The input buffer.</param>
  14679. <param name="inOff">The offset into <paramref>inBuf</paramref> that the input block begins.</param>
  14680. <param name="outBuf">The output buffer.</param>
  14681. <param name="outOff">The offset into <paramref>outBuf</paramref> to write the output block.</param>
  14682. <exception cref="T:Org.BouncyCastle.Crypto.DataLengthException">If input block is wrong size, or outBuf too small.</exception>
  14683. <returns>The number of bytes processed and produced.</returns>
  14684. </member>
  14685. <member name="M:Org.BouncyCastle.Crypto.IBlockCipher.Reset">
  14686. <summary>
  14687. Reset the cipher to the same state as it was after the last init (if there was one).
  14688. </summary>
  14689. </member>
  14690. <member name="T:Org.BouncyCastle.Crypto.IBlockResult">
  14691. <summary>
  14692. Operators that reduce their input to a single block return an object
  14693. of this type.
  14694. </summary>
  14695. </member>
  14696. <member name="M:Org.BouncyCastle.Crypto.IBlockResult.Collect">
  14697. <summary>
  14698. Return the final result of the operation.
  14699. </summary>
  14700. <returns>A block of bytes, representing the result of an operation.</returns>
  14701. </member>
  14702. <member name="M:Org.BouncyCastle.Crypto.IBlockResult.Collect(System.Byte[],System.Int32)">
  14703. <summary>
  14704. Store the final result of the operation by copying it into the destination array.
  14705. </summary>
  14706. <returns>The number of bytes copied into destination.</returns>
  14707. <param name="destination">The byte array to copy the result into.</param>
  14708. <param name="offset">The offset into destination to start copying the result at.</param>
  14709. </member>
  14710. <member name="T:Org.BouncyCastle.Crypto.IBufferedCipher">
  14711. <remarks>Block cipher engines are expected to conform to this interface.</remarks>
  14712. </member>
  14713. <member name="P:Org.BouncyCastle.Crypto.IBufferedCipher.AlgorithmName">
  14714. <summary>The name of the algorithm this cipher implements.</summary>
  14715. </member>
  14716. <member name="M:Org.BouncyCastle.Crypto.IBufferedCipher.Init(System.Boolean,Org.BouncyCastle.Crypto.ICipherParameters)">
  14717. <summary>Initialise the cipher.</summary>
  14718. <param name="forEncryption">If true the cipher is initialised for encryption,
  14719. if false for decryption.</param>
  14720. <param name="parameters">The key and other data required by the cipher.</param>
  14721. </member>
  14722. <member name="M:Org.BouncyCastle.Crypto.IBufferedCipher.Reset">
  14723. <summary>
  14724. Reset the cipher. After resetting the cipher is in the same state
  14725. as it was after the last init (if there was one).
  14726. </summary>
  14727. </member>
  14728. <member name="T:Org.BouncyCastle.Crypto.ICipher">
  14729. <summary>
  14730. Base interface for a ciphers that do not require data to be block aligned.
  14731. <para>
  14732. Note: In cases where the underlying algorithm is block based, these ciphers may add or remove padding as needed.
  14733. </para>
  14734. </summary>
  14735. </member>
  14736. <member name="M:Org.BouncyCastle.Crypto.ICipher.GetMaxOutputSize(System.Int32)">
  14737. <summary>
  14738. Return the size of the output buffer required for a Write() plus a
  14739. close() with the write() being passed inputLen bytes.
  14740. <para>
  14741. The returned size may be dependent on the initialisation of this cipher
  14742. and may not be accurate once subsequent input data is processed as the cipher may
  14743. add, add or remove padding, as it sees fit.
  14744. </para>
  14745. </summary>
  14746. <returns>The space required to accommodate a call to processBytes and doFinal with inputLen bytes of input.</returns>
  14747. <param name="inputLen">The length of the expected input.</param>
  14748. </member>
  14749. <member name="M:Org.BouncyCastle.Crypto.ICipher.GetUpdateOutputSize(System.Int32)">
  14750. <summary>
  14751. Return the size of the output buffer required for a write() with the write() being
  14752. passed inputLen bytes and just updating the cipher output.
  14753. </summary>
  14754. <returns>The space required to accommodate a call to processBytes with inputLen bytes of input.</returns>
  14755. <param name="inputLen">The length of the expected input.</param>
  14756. </member>
  14757. <member name="P:Org.BouncyCastle.Crypto.ICipher.Stream">
  14758. <summary>
  14759. Gets the stream for reading/writing data processed/to be processed.
  14760. </summary>
  14761. <value>The stream associated with this cipher.</value>
  14762. </member>
  14763. <member name="T:Org.BouncyCastle.Crypto.ICipherBuilder">
  14764. <summary>
  14765. Base interface for cipher builders.
  14766. </summary>
  14767. </member>
  14768. <member name="P:Org.BouncyCastle.Crypto.ICipherBuilder.AlgorithmDetails">
  14769. <summary>
  14770. Return the algorithm and parameter details associated with any cipher built.
  14771. </summary>
  14772. </member>
  14773. <member name="M:Org.BouncyCastle.Crypto.ICipherBuilder.GetMaxOutputSize(System.Int32)">
  14774. <summary>
  14775. Return the maximum output size that a given input will produce.
  14776. </summary>
  14777. <param name="inputLen">the length of the expected input.</param>
  14778. <returns>The maximum possible output size that can produced for the expected input length.</returns>
  14779. </member>
  14780. <member name="M:Org.BouncyCastle.Crypto.ICipherBuilder.BuildCipher(System.IO.Stream)">
  14781. <summary>
  14782. Build a cipher that operates on the passed in stream.
  14783. </summary>
  14784. <param name="stream">The stream to write/read any encrypted/decrypted data.</param>
  14785. <returns>A cipher based around the given stream.</returns>
  14786. </member>
  14787. <member name="T:Org.BouncyCastle.Crypto.ICipherBuilderWithKey">
  14788. <summary>
  14789. A cipher builder that can also return the key it was initialized with.
  14790. </summary>
  14791. </member>
  14792. <member name="P:Org.BouncyCastle.Crypto.ICipherBuilderWithKey.Key">
  14793. <summary>
  14794. Return the key we were initialized with.
  14795. </summary>
  14796. </member>
  14797. <member name="T:Org.BouncyCastle.Crypto.ICipherParameters">
  14798. all parameter classes implement this.
  14799. </member>
  14800. <member name="T:Org.BouncyCastle.Crypto.IDecryptorBuilderProvider">
  14801. <summary>
  14802. Interface describing a provider of cipher builders for creating decrypting ciphers.
  14803. </summary>
  14804. </member>
  14805. <member name="M:Org.BouncyCastle.Crypto.IDecryptorBuilderProvider.CreateDecryptorBuilder(System.Object)">
  14806. <summary>
  14807. Return a cipher builder for creating decrypting ciphers.
  14808. </summary>
  14809. <param name="algorithmDetails">The algorithm details/parameters to use to create the final cipher.</param>
  14810. <returns>A new cipher builder.</returns>
  14811. </member>
  14812. <member name="T:Org.BouncyCastle.Crypto.IDerivationFunction">
  14813. base interface for general purpose byte derivation functions.
  14814. </member>
  14815. <member name="P:Org.BouncyCastle.Crypto.IDerivationFunction.Digest">
  14816. return the message digest used as the basis for the function
  14817. </member>
  14818. <member name="T:Org.BouncyCastle.Crypto.IDerivationParameters">
  14819. Parameters for key/byte stream derivation classes
  14820. </member>
  14821. <member name="T:Org.BouncyCastle.Crypto.IDigest">
  14822. interface that a message digest conforms to.
  14823. </member>
  14824. <member name="P:Org.BouncyCastle.Crypto.IDigest.AlgorithmName">
  14825. return the algorithm name
  14826. @return the algorithm name
  14827. </member>
  14828. <member name="M:Org.BouncyCastle.Crypto.IDigest.GetDigestSize">
  14829. return the size, in bytes, of the digest produced by this message digest.
  14830. @return the size, in bytes, of the digest produced by this message digest.
  14831. </member>
  14832. <member name="M:Org.BouncyCastle.Crypto.IDigest.GetByteLength">
  14833. return the size, in bytes, of the internal buffer used by this digest.
  14834. @return the size, in bytes, of the internal buffer used by this digest.
  14835. </member>
  14836. <member name="M:Org.BouncyCastle.Crypto.IDigest.Update(System.Byte)">
  14837. update the message digest with a single byte.
  14838. @param inByte the input byte to be entered.
  14839. </member>
  14840. <member name="M:Org.BouncyCastle.Crypto.IDigest.BlockUpdate(System.Byte[],System.Int32,System.Int32)">
  14841. update the message digest with a block of bytes.
  14842. @param input the byte array containing the data.
  14843. @param inOff the offset into the byte array where the data starts.
  14844. @param len the length of the data.
  14845. </member>
  14846. <member name="M:Org.BouncyCastle.Crypto.IDigest.DoFinal(System.Byte[],System.Int32)">
  14847. Close the digest, producing the final digest value. The doFinal
  14848. call leaves the digest reset.
  14849. @param output the array the digest is to be copied into.
  14850. @param outOff the offset into the out array the digest is to start at.
  14851. </member>
  14852. <member name="M:Org.BouncyCastle.Crypto.IDigest.Reset">
  14853. reset the digest back to it's initial state.
  14854. </member>
  14855. <member name="T:Org.BouncyCastle.Crypto.IDigestFactory">
  14856. <summary>
  14857. Base interface for operator factories that create stream-based digest calculators.
  14858. </summary>
  14859. </member>
  14860. <member name="P:Org.BouncyCastle.Crypto.IDigestFactory.AlgorithmDetails">
  14861. <summary>The algorithm details object for calculators made by this factory.</summary>
  14862. </member>
  14863. <member name="P:Org.BouncyCastle.Crypto.IDigestFactory.DigestLength">
  14864. <summary>Return the size of the digest associated with this factory.</summary>
  14865. <returns>The length of the digest produced by this calculators from this factory in bytes.</returns>
  14866. </member>
  14867. <member name="M:Org.BouncyCastle.Crypto.IDigestFactory.CreateCalculator">
  14868. <summary>
  14869. Create a stream calculator for the digest associated with this factory. The stream
  14870. calculator is used for the actual operation of entering the data to be digested
  14871. and producing the digest block.
  14872. </summary>
  14873. <returns>A calculator producing an IBlockResult with the final digest in it.</returns>
  14874. </member>
  14875. <member name="T:Org.BouncyCastle.Crypto.IDsa">
  14876. interface for classes implementing the Digital Signature Algorithm
  14877. </member>
  14878. <member name="M:Org.BouncyCastle.Crypto.IDsa.Init(System.Boolean,Org.BouncyCastle.Crypto.ICipherParameters)">
  14879. initialise the signer for signature generation or signature
  14880. verification.
  14881. @param forSigning true if we are generating a signature, false
  14882. otherwise.
  14883. @param param key parameters for signature generation.
  14884. </member>
  14885. <member name="M:Org.BouncyCastle.Crypto.IDsa.GenerateSignature(System.Byte[])">
  14886. sign the passed in message (usually the output of a hash function).
  14887. @param message the message to be signed.
  14888. @return two big integers representing the r and s values respectively.
  14889. </member>
  14890. <member name="M:Org.BouncyCastle.Crypto.IDsa.VerifySignature(System.Byte[],Org.BouncyCastle.Math.BigInteger,Org.BouncyCastle.Math.BigInteger)">
  14891. verify the message message against the signature values r and s.
  14892. @param message the message that was supposed to have been signed.
  14893. @param r the r signature value.
  14894. @param s the s signature value.
  14895. </member>
  14896. <member name="T:Org.BouncyCastle.Crypto.IDsaExt">
  14897. <summary>
  14898. An "extended" interface for classes implementing DSA-style algorithms, that provides access
  14899. to the group order.
  14900. </summary>
  14901. </member>
  14902. <member name="P:Org.BouncyCastle.Crypto.IDsaExt.Order">
  14903. <summary>The order of the group that the r, s values in signatures belong to.</summary>
  14904. </member>
  14905. <member name="T:Org.BouncyCastle.Crypto.IEntropySource">
  14906. <summary>
  14907. Base interface describing an entropy source for a DRBG.
  14908. </summary>
  14909. </member>
  14910. <member name="P:Org.BouncyCastle.Crypto.IEntropySource.IsPredictionResistant">
  14911. <summary>
  14912. Return whether or not this entropy source is regarded as prediction resistant.
  14913. </summary>
  14914. <value><c>true</c> if this instance is prediction resistant; otherwise, <c>false</c>.</value>
  14915. </member>
  14916. <member name="M:Org.BouncyCastle.Crypto.IEntropySource.GetEntropy">
  14917. <summary>
  14918. Return a byte array of entropy.
  14919. </summary>
  14920. <returns>The entropy bytes.</returns>
  14921. </member>
  14922. <member name="P:Org.BouncyCastle.Crypto.IEntropySource.EntropySize">
  14923. <summary>
  14924. Return the number of bits of entropy this source can produce.
  14925. </summary>
  14926. <value>The size, in bits, of the return value of getEntropy.</value>
  14927. </member>
  14928. <member name="T:Org.BouncyCastle.Crypto.IEntropySourceProvider">
  14929. <summary>
  14930. Base interface describing a provider of entropy sources.
  14931. </summary>
  14932. </member>
  14933. <member name="M:Org.BouncyCastle.Crypto.IEntropySourceProvider.Get(System.Int32)">
  14934. <summary>
  14935. Return an entropy source providing a block of entropy.
  14936. </summary>
  14937. <param name="bitsRequired">The size of the block of entropy required.</param>
  14938. <returns>An entropy source providing bitsRequired blocks of entropy.</returns>
  14939. </member>
  14940. <member name="T:Org.BouncyCastle.Crypto.IKeyUnwrapper">
  14941. <summary>
  14942. Base interface for a key unwrapper.
  14943. </summary>
  14944. </member>
  14945. <member name="P:Org.BouncyCastle.Crypto.IKeyUnwrapper.AlgorithmDetails">
  14946. <summary>
  14947. The parameter set used to configure this key unwrapper.
  14948. </summary>
  14949. </member>
  14950. <member name="M:Org.BouncyCastle.Crypto.IKeyUnwrapper.Unwrap(System.Byte[],System.Int32,System.Int32)">
  14951. <summary>
  14952. Unwrap the passed in data.
  14953. </summary>
  14954. <param name="cipherText">The array containing the data to be unwrapped.</param>
  14955. <param name="offset">The offset into cipherText at which the unwrapped data starts.</param>
  14956. <param name="length">The length of the data to be unwrapped.</param>
  14957. <returns>an IBlockResult containing the unwrapped key data.</returns>
  14958. </member>
  14959. <member name="T:Org.BouncyCastle.Crypto.IKeyWrapper">
  14960. <summary>
  14961. Base interface for a key wrapper.
  14962. </summary>
  14963. </member>
  14964. <member name="P:Org.BouncyCastle.Crypto.IKeyWrapper.AlgorithmDetails">
  14965. <summary>
  14966. The parameter set used to configure this key wrapper.
  14967. </summary>
  14968. </member>
  14969. <member name="M:Org.BouncyCastle.Crypto.IKeyWrapper.Wrap(System.Byte[])">
  14970. <summary>
  14971. Wrap the passed in key data.
  14972. </summary>
  14973. <param name="keyData">The key data to be wrapped.</param>
  14974. <returns>an IBlockResult containing the wrapped key data.</returns>
  14975. </member>
  14976. <member name="T:Org.BouncyCastle.Crypto.IMac">
  14977. The base interface for implementations of message authentication codes (MACs).
  14978. </member>
  14979. <member name="M:Org.BouncyCastle.Crypto.IMac.Init(Org.BouncyCastle.Crypto.ICipherParameters)">
  14980. Initialise the MAC.
  14981. @param param the key and other data required by the MAC.
  14982. @exception ArgumentException if the parameters argument is
  14983. inappropriate.
  14984. </member>
  14985. <member name="P:Org.BouncyCastle.Crypto.IMac.AlgorithmName">
  14986. Return the name of the algorithm the MAC implements.
  14987. @return the name of the algorithm the MAC implements.
  14988. </member>
  14989. <member name="M:Org.BouncyCastle.Crypto.IMac.GetMacSize">
  14990. Return the block size for this MAC (in bytes).
  14991. @return the block size for this MAC in bytes.
  14992. </member>
  14993. <member name="M:Org.BouncyCastle.Crypto.IMac.Update(System.Byte)">
  14994. add a single byte to the mac for processing.
  14995. @param in the byte to be processed.
  14996. @exception InvalidOperationException if the MAC is not initialised.
  14997. </member>
  14998. <member name="M:Org.BouncyCastle.Crypto.IMac.BlockUpdate(System.Byte[],System.Int32,System.Int32)">
  14999. @param in the array containing the input.
  15000. @param inOff the index in the array the data begins at.
  15001. @param len the length of the input starting at inOff.
  15002. @exception InvalidOperationException if the MAC is not initialised.
  15003. @exception DataLengthException if there isn't enough data in in.
  15004. </member>
  15005. <member name="M:Org.BouncyCastle.Crypto.IMac.DoFinal(System.Byte[],System.Int32)">
  15006. Compute the final stage of the MAC writing the output to the out
  15007. parameter.
  15008. <p>
  15009. doFinal leaves the MAC in the same state it was after the last init.
  15010. </p>
  15011. @param out the array the MAC is to be output to.
  15012. @param outOff the offset into the out buffer the output is to start at.
  15013. @exception DataLengthException if there isn't enough space in out.
  15014. @exception InvalidOperationException if the MAC is not initialised.
  15015. </member>
  15016. <member name="M:Org.BouncyCastle.Crypto.IMac.Reset">
  15017. Reset the MAC. At the end of resetting the MAC should be in the
  15018. in the same state it was after the last init (if there was one).
  15019. </member>
  15020. <member name="P:Org.BouncyCastle.Crypto.IMacFactory.AlgorithmDetails">
  15021. <summary>The algorithm details object for this calculator.</summary>
  15022. </member>
  15023. <member name="M:Org.BouncyCastle.Crypto.IMacFactory.CreateCalculator">
  15024. <summary>
  15025. Create a stream calculator for this signature calculator. The stream
  15026. calculator is used for the actual operation of entering the data to be signed
  15027. and producing the signature block.
  15028. </summary>
  15029. <returns>A calculator producing an IBlockResult with a signature in it.</returns>
  15030. </member>
  15031. <member name="T:Org.BouncyCastle.Crypto.InvalidCipherTextException">
  15032. this exception is thrown whenever we find something we don't expect in a
  15033. message.
  15034. </member>
  15035. <member name="M:Org.BouncyCastle.Crypto.InvalidCipherTextException.#ctor">
  15036. base constructor.
  15037. </member>
  15038. <member name="M:Org.BouncyCastle.Crypto.InvalidCipherTextException.#ctor(System.String)">
  15039. create a InvalidCipherTextException with the given message.
  15040. @param message the message to be carried with the exception.
  15041. </member>
  15042. <member name="T:Org.BouncyCastle.Crypto.ISignatureFactory">
  15043. <summary>
  15044. Base interface for operators that serve as stream-based signature calculators.
  15045. </summary>
  15046. </member>
  15047. <member name="P:Org.BouncyCastle.Crypto.ISignatureFactory.AlgorithmDetails">
  15048. <summary>The algorithm details object for this calculator.</summary>
  15049. </member>
  15050. <member name="M:Org.BouncyCastle.Crypto.ISignatureFactory.CreateCalculator">
  15051. <summary>
  15052. Create a stream calculator for this signature calculator. The stream
  15053. calculator is used for the actual operation of entering the data to be signed
  15054. and producing the signature block.
  15055. </summary>
  15056. <returns>A calculator producing an IBlockResult with a signature in it.</returns>
  15057. </member>
  15058. <member name="P:Org.BouncyCastle.Crypto.ISigner.AlgorithmName">
  15059. Return the name of the algorithm the signer implements.
  15060. @return the name of the algorithm the signer implements.
  15061. </member>
  15062. <member name="M:Org.BouncyCastle.Crypto.ISigner.Init(System.Boolean,Org.BouncyCastle.Crypto.ICipherParameters)">
  15063. Initialise the signer for signing or verification.
  15064. @param forSigning true if for signing, false otherwise
  15065. @param param necessary parameters.
  15066. </member>
  15067. <member name="M:Org.BouncyCastle.Crypto.ISigner.Update(System.Byte)">
  15068. update the internal digest with the byte b
  15069. </member>
  15070. <member name="M:Org.BouncyCastle.Crypto.ISigner.BlockUpdate(System.Byte[],System.Int32,System.Int32)">
  15071. update the internal digest with the byte array in
  15072. </member>
  15073. <member name="M:Org.BouncyCastle.Crypto.ISigner.GenerateSignature">
  15074. Generate a signature for the message we've been loaded with using
  15075. the key we were initialised with.
  15076. </member>
  15077. <member name="M:Org.BouncyCastle.Crypto.ISigner.VerifySignature(System.Byte[])">
  15078. return true if the internal state represents the signature described
  15079. in the passed in array.
  15080. </member>
  15081. <member name="M:Org.BouncyCastle.Crypto.ISigner.Reset">
  15082. reset the internal state
  15083. </member>
  15084. <member name="T:Org.BouncyCastle.Crypto.ISignerWithRecovery">
  15085. Signer with message recovery.
  15086. </member>
  15087. <member name="M:Org.BouncyCastle.Crypto.ISignerWithRecovery.HasFullMessage">
  15088. Returns true if the signer has recovered the full message as
  15089. part of signature verification.
  15090. @return true if full message recovered.
  15091. </member>
  15092. <member name="M:Org.BouncyCastle.Crypto.ISignerWithRecovery.GetRecoveredMessage">
  15093. Returns a reference to what message was recovered (if any).
  15094. @return full/partial message, null if nothing.
  15095. </member>
  15096. <member name="M:Org.BouncyCastle.Crypto.ISignerWithRecovery.UpdateWithRecoveredMessage(System.Byte[])">
  15097. Perform an update with the recovered message before adding any other data. This must
  15098. be the first update method called, and calling it will result in the signer assuming
  15099. that further calls to update will include message content past what is recoverable.
  15100. @param signature the signature that we are in the process of verifying.
  15101. @throws IllegalStateException
  15102. </member>
  15103. <member name="T:Org.BouncyCastle.Crypto.IStreamCalculator">
  15104. <summary>
  15105. Base interface for cryptographic operations such as Hashes, MACs, and Signatures which reduce a stream of data
  15106. to a single value.
  15107. </summary>
  15108. </member>
  15109. <member name="P:Org.BouncyCastle.Crypto.IStreamCalculator.Stream">
  15110. <summary>Return a "sink" stream which only exists to update the implementing object.</summary>
  15111. <returns>A stream to write to in order to update the implementing object.</returns>
  15112. </member>
  15113. <member name="M:Org.BouncyCastle.Crypto.IStreamCalculator.GetResult">
  15114. <summary>
  15115. Return the result of processing the stream. This value is only available once the stream
  15116. has been closed.
  15117. </summary>
  15118. <returns>The result of processing the stream.</returns>
  15119. </member>
  15120. <member name="T:Org.BouncyCastle.Crypto.IStreamCipher">
  15121. <summary>The interface stream ciphers conform to.</summary>
  15122. </member>
  15123. <member name="P:Org.BouncyCastle.Crypto.IStreamCipher.AlgorithmName">
  15124. <summary>The name of the algorithm this cipher implements.</summary>
  15125. </member>
  15126. <member name="M:Org.BouncyCastle.Crypto.IStreamCipher.Init(System.Boolean,Org.BouncyCastle.Crypto.ICipherParameters)">
  15127. <summary>Initialise the cipher.</summary>
  15128. <param name="forEncryption">If true the cipher is initialised for encryption,
  15129. if false for decryption.</param>
  15130. <param name="parameters">The key and other data required by the cipher.</param>
  15131. <exception cref="T:System.ArgumentException">
  15132. If the parameters argument is inappropriate.
  15133. </exception>
  15134. </member>
  15135. <member name="M:Org.BouncyCastle.Crypto.IStreamCipher.ReturnByte(System.Byte)">
  15136. <summary>encrypt/decrypt a single byte returning the result.</summary>
  15137. <param name="input">the byte to be processed.</param>
  15138. <returns>the result of processing the input byte.</returns>
  15139. </member>
  15140. <member name="M:Org.BouncyCastle.Crypto.IStreamCipher.ProcessBytes(System.Byte[],System.Int32,System.Int32,System.Byte[],System.Int32)">
  15141. <summary>
  15142. Process a block of bytes from <c>input</c> putting the result into <c>output</c>.
  15143. </summary>
  15144. <param name="input">The input byte array.</param>
  15145. <param name="inOff">
  15146. The offset into <c>input</c> where the data to be processed starts.
  15147. </param>
  15148. <param name="length">The number of bytes to be processed.</param>
  15149. <param name="output">The output buffer the processed bytes go into.</param>
  15150. <param name="outOff">
  15151. The offset into <c>output</c> the processed data starts at.
  15152. </param>
  15153. <exception cref="T:Org.BouncyCastle.Crypto.DataLengthException">If the output buffer is too small.</exception>
  15154. </member>
  15155. <member name="M:Org.BouncyCastle.Crypto.IStreamCipher.Reset">
  15156. <summary>
  15157. Reset the cipher to the same state as it was after the last init (if there was one).
  15158. </summary>
  15159. </member>
  15160. <member name="T:Org.BouncyCastle.Crypto.IVerifier">
  15161. <summary>
  15162. Operators that reduce their input to the validation of a signature produce this type.
  15163. </summary>
  15164. </member>
  15165. <member name="M:Org.BouncyCastle.Crypto.IVerifier.IsVerified(System.Byte[])">
  15166. <summary>
  15167. Return true if the passed in data matches what is expected by the verification result.
  15168. </summary>
  15169. <param name="data">The bytes representing the signature.</param>
  15170. <returns>true if the signature verifies, false otherwise.</returns>
  15171. </member>
  15172. <member name="M:Org.BouncyCastle.Crypto.IVerifier.IsVerified(System.Byte[],System.Int32,System.Int32)">
  15173. <summary>
  15174. Return true if the length bytes from off in the source array match the signature
  15175. expected by the verification result.
  15176. </summary>
  15177. <param name="source">Byte array containing the signature.</param>
  15178. <param name="off">The offset into the source array where the signature starts.</param>
  15179. <param name="length">The number of bytes in source making up the signature.</param>
  15180. <returns>true if the signature verifies, false otherwise.</returns>
  15181. </member>
  15182. <member name="T:Org.BouncyCastle.Crypto.IVerifierFactory">
  15183. <summary>
  15184. Base interface for operators that serve as stream-based signature verifiers.
  15185. </summary>
  15186. </member>
  15187. <member name="P:Org.BouncyCastle.Crypto.IVerifierFactory.AlgorithmDetails">
  15188. <summary>The algorithm details object for this verifier.</summary>
  15189. </member>
  15190. <member name="M:Org.BouncyCastle.Crypto.IVerifierFactory.CreateCalculator">
  15191. <summary>
  15192. Create a stream calculator for this verifier. The stream
  15193. calculator is used for the actual operation of entering the data to be verified
  15194. and producing a result which can be used to verify the original signature.
  15195. </summary>
  15196. <returns>A calculator producing an IVerifier which can verify the signature.</returns>
  15197. </member>
  15198. <member name="T:Org.BouncyCastle.Crypto.IVerifierFactoryProvider">
  15199. <summary>
  15200. Base interface for a provider to support the dynamic creation of signature verifiers.
  15201. </summary>
  15202. </member>
  15203. <member name="M:Org.BouncyCastle.Crypto.IVerifierFactoryProvider.CreateVerifierFactory(System.Object)">
  15204. <summary>
  15205. Return a signature verfier for signature algorithm described in the passed in algorithm details object.
  15206. </summary>
  15207. <param name="algorithmDetails">The details of the signature algorithm verification is required for.</param>
  15208. <returns>A new signature verifier.</returns>
  15209. </member>
  15210. <member name="P:Org.BouncyCastle.Crypto.IWrapper.AlgorithmName">
  15211. <summary>The name of the algorithm this cipher implements.</summary>
  15212. </member>
  15213. <member name="T:Org.BouncyCastle.Crypto.IXof">
  15214. <remarks>
  15215. With FIPS PUB 202 a new kind of message digest was announced which supported extendable output, or variable digest sizes.
  15216. This interface provides the extra method required to support variable output on a digest implementation.
  15217. </remarks>
  15218. </member>
  15219. <member name="M:Org.BouncyCastle.Crypto.IXof.DoFinal(System.Byte[],System.Int32,System.Int32)">
  15220. <summary>
  15221. Output the results of the final calculation for this digest to outLen number of bytes.
  15222. </summary>
  15223. <param name="output">output array to write the output bytes to.</param>
  15224. <param name="outOff">offset to start writing the bytes at.</param>
  15225. <param name="outLen">the number of output bytes requested.</param>
  15226. <returns>the number of bytes written</returns>
  15227. </member>
  15228. <member name="M:Org.BouncyCastle.Crypto.IXof.DoOutput(System.Byte[],System.Int32,System.Int32)">
  15229. <summary>
  15230. Start outputting the results of the final calculation for this digest. Unlike DoFinal, this method
  15231. will continue producing output until the Xof is explicitly reset, or signals otherwise.
  15232. </summary>
  15233. <param name="output">output array to write the output bytes to.</param>
  15234. <param name="outOff">offset to start writing the bytes at.</param>
  15235. <param name="outLen">the number of output bytes requested.</param>
  15236. <returns>the number of bytes written</returns>
  15237. </member>
  15238. <member name="T:Org.BouncyCastle.Crypto.KeyGenerationParameters">
  15239. The base class for parameters to key generators.
  15240. </member>
  15241. <member name="M:Org.BouncyCastle.Crypto.KeyGenerationParameters.#ctor(Org.BouncyCastle.Security.SecureRandom,System.Int32)">
  15242. initialise the generator with a source of randomness
  15243. and a strength (in bits).
  15244. @param random the random byte source.
  15245. @param strength the size, in bits, of the keys we want to produce.
  15246. </member>
  15247. <member name="P:Org.BouncyCastle.Crypto.KeyGenerationParameters.Random">
  15248. return the random source associated with this
  15249. generator.
  15250. @return the generators random source.
  15251. </member>
  15252. <member name="P:Org.BouncyCastle.Crypto.KeyGenerationParameters.Strength">
  15253. return the bit strength for keys produced by this generator,
  15254. @return the strength of the keys this generator produces (in bits).
  15255. </member>
  15256. <member name="T:Org.BouncyCastle.Crypto.Macs.CbcBlockCipherMac">
  15257. standard CBC Block Cipher MAC - if no padding is specified the default of
  15258. pad of zeroes is used.
  15259. </member>
  15260. <member name="M:Org.BouncyCastle.Crypto.Macs.CbcBlockCipherMac.#ctor(Org.BouncyCastle.Crypto.IBlockCipher)">
  15261. create a standard MAC based on a CBC block cipher. This will produce an
  15262. authentication code half the length of the block size of the cipher.
  15263. @param cipher the cipher to be used as the basis of the MAC generation.
  15264. </member>
  15265. <member name="M:Org.BouncyCastle.Crypto.Macs.CbcBlockCipherMac.#ctor(Org.BouncyCastle.Crypto.IBlockCipher,Org.BouncyCastle.Crypto.Paddings.IBlockCipherPadding)">
  15266. create a standard MAC based on a CBC block cipher. This will produce an
  15267. authentication code half the length of the block size of the cipher.
  15268. @param cipher the cipher to be used as the basis of the MAC generation.
  15269. @param padding the padding to be used to complete the last block.
  15270. </member>
  15271. <member name="M:Org.BouncyCastle.Crypto.Macs.CbcBlockCipherMac.#ctor(Org.BouncyCastle.Crypto.IBlockCipher,System.Int32)">
  15272. create a standard MAC based on a block cipher with the size of the
  15273. MAC been given in bits. This class uses CBC mode as the basis for the
  15274. MAC generation.
  15275. <p>
  15276. Note: the size of the MAC must be at least 24 bits (FIPS Publication 81),
  15277. or 16 bits if being used as a data authenticator (FIPS Publication 113),
  15278. and in general should be less than the size of the block cipher as it reduces
  15279. the chance of an exhaustive attack (see Handbook of Applied Cryptography).
  15280. </p>
  15281. @param cipher the cipher to be used as the basis of the MAC generation.
  15282. @param macSizeInBits the size of the MAC in bits, must be a multiple of 8.
  15283. </member>
  15284. <member name="M:Org.BouncyCastle.Crypto.Macs.CbcBlockCipherMac.#ctor(Org.BouncyCastle.Crypto.IBlockCipher,System.Int32,Org.BouncyCastle.Crypto.Paddings.IBlockCipherPadding)">
  15285. create a standard MAC based on a block cipher with the size of the
  15286. MAC been given in bits. This class uses CBC mode as the basis for the
  15287. MAC generation.
  15288. <p>
  15289. Note: the size of the MAC must be at least 24 bits (FIPS Publication 81),
  15290. or 16 bits if being used as a data authenticator (FIPS Publication 113),
  15291. and in general should be less than the size of the block cipher as it reduces
  15292. the chance of an exhaustive attack (see Handbook of Applied Cryptography).
  15293. </p>
  15294. @param cipher the cipher to be used as the basis of the MAC generation.
  15295. @param macSizeInBits the size of the MAC in bits, must be a multiple of 8.
  15296. @param padding the padding to be used to complete the last block.
  15297. </member>
  15298. <member name="M:Org.BouncyCastle.Crypto.Macs.CbcBlockCipherMac.Reset">
  15299. Reset the mac generator.
  15300. </member>
  15301. <member name="T:Org.BouncyCastle.Crypto.Macs.MacCFBBlockCipher">
  15302. implements a Cipher-FeedBack (CFB) mode on top of a simple cipher.
  15303. </member>
  15304. <member name="M:Org.BouncyCastle.Crypto.Macs.MacCFBBlockCipher.#ctor(Org.BouncyCastle.Crypto.IBlockCipher,System.Int32)">
  15305. Basic constructor.
  15306. @param cipher the block cipher to be used as the basis of the
  15307. feedback mode.
  15308. @param blockSize the block size in bits (note: a multiple of 8)
  15309. </member>
  15310. <member name="M:Org.BouncyCastle.Crypto.Macs.MacCFBBlockCipher.Init(System.Boolean,Org.BouncyCastle.Crypto.ICipherParameters)">
  15311. Initialise the cipher and, possibly, the initialisation vector (IV).
  15312. If an IV isn't passed as part of the parameter, the IV will be all zeros.
  15313. An IV which is too short is handled in FIPS compliant fashion.
  15314. @param param the key and other data required by the cipher.
  15315. @exception ArgumentException if the parameters argument is
  15316. inappropriate.
  15317. </member>
  15318. <member name="P:Org.BouncyCastle.Crypto.Macs.MacCFBBlockCipher.AlgorithmName">
  15319. return the algorithm name and mode.
  15320. @return the name of the underlying algorithm followed by "/CFB"
  15321. and the block size in bits.
  15322. </member>
  15323. <member name="M:Org.BouncyCastle.Crypto.Macs.MacCFBBlockCipher.GetBlockSize">
  15324. return the block size we are operating at.
  15325. @return the block size we are operating at (in bytes).
  15326. </member>
  15327. <member name="M:Org.BouncyCastle.Crypto.Macs.MacCFBBlockCipher.ProcessBlock(System.Byte[],System.Int32,System.Byte[],System.Int32)">
  15328. Process one block of input from the array in and write it to
  15329. the out array.
  15330. @param in the array containing the input data.
  15331. @param inOff offset into the in array the data starts at.
  15332. @param out the array the output data will be copied into.
  15333. @param outOff the offset into the out array the output will start at.
  15334. @exception DataLengthException if there isn't enough data in in, or
  15335. space in out.
  15336. @exception InvalidOperationException if the cipher isn't initialised.
  15337. @return the number of bytes processed and produced.
  15338. </member>
  15339. <member name="M:Org.BouncyCastle.Crypto.Macs.MacCFBBlockCipher.Reset">
  15340. reset the chaining vector back to the IV and reset the underlying
  15341. cipher.
  15342. </member>
  15343. <member name="M:Org.BouncyCastle.Crypto.Macs.CfbBlockCipherMac.#ctor(Org.BouncyCastle.Crypto.IBlockCipher)">
  15344. create a standard MAC based on a CFB block cipher. This will produce an
  15345. authentication code half the length of the block size of the cipher, with
  15346. the CFB mode set to 8 bits.
  15347. @param cipher the cipher to be used as the basis of the MAC generation.
  15348. </member>
  15349. <member name="M:Org.BouncyCastle.Crypto.Macs.CfbBlockCipherMac.#ctor(Org.BouncyCastle.Crypto.IBlockCipher,Org.BouncyCastle.Crypto.Paddings.IBlockCipherPadding)">
  15350. create a standard MAC based on a CFB block cipher. This will produce an
  15351. authentication code half the length of the block size of the cipher, with
  15352. the CFB mode set to 8 bits.
  15353. @param cipher the cipher to be used as the basis of the MAC generation.
  15354. @param padding the padding to be used.
  15355. </member>
  15356. <member name="M:Org.BouncyCastle.Crypto.Macs.CfbBlockCipherMac.#ctor(Org.BouncyCastle.Crypto.IBlockCipher,System.Int32,System.Int32)">
  15357. create a standard MAC based on a block cipher with the size of the
  15358. MAC been given in bits. This class uses CFB mode as the basis for the
  15359. MAC generation.
  15360. <p>
  15361. Note: the size of the MAC must be at least 24 bits (FIPS Publication 81),
  15362. or 16 bits if being used as a data authenticator (FIPS Publication 113),
  15363. and in general should be less than the size of the block cipher as it reduces
  15364. the chance of an exhaustive attack (see Handbook of Applied Cryptography).
  15365. </p>
  15366. @param cipher the cipher to be used as the basis of the MAC generation.
  15367. @param cfbBitSize the size of an output block produced by the CFB mode.
  15368. @param macSizeInBits the size of the MAC in bits, must be a multiple of 8.
  15369. </member>
  15370. <member name="M:Org.BouncyCastle.Crypto.Macs.CfbBlockCipherMac.#ctor(Org.BouncyCastle.Crypto.IBlockCipher,System.Int32,System.Int32,Org.BouncyCastle.Crypto.Paddings.IBlockCipherPadding)">
  15371. create a standard MAC based on a block cipher with the size of the
  15372. MAC been given in bits. This class uses CFB mode as the basis for the
  15373. MAC generation.
  15374. <p>
  15375. Note: the size of the MAC must be at least 24 bits (FIPS Publication 81),
  15376. or 16 bits if being used as a data authenticator (FIPS Publication 113),
  15377. and in general should be less than the size of the block cipher as it reduces
  15378. the chance of an exhaustive attack (see Handbook of Applied Cryptography).
  15379. </p>
  15380. @param cipher the cipher to be used as the basis of the MAC generation.
  15381. @param cfbBitSize the size of an output block produced by the CFB mode.
  15382. @param macSizeInBits the size of the MAC in bits, must be a multiple of 8.
  15383. @param padding a padding to be used.
  15384. </member>
  15385. <member name="M:Org.BouncyCastle.Crypto.Macs.CfbBlockCipherMac.Reset">
  15386. Reset the mac generator.
  15387. </member>
  15388. <member name="T:Org.BouncyCastle.Crypto.Macs.CMac">
  15389. CMAC - as specified at www.nuee.nagoya-u.ac.jp/labs/tiwata/omac/omac.html
  15390. <p>
  15391. CMAC is analogous to OMAC1 - see also en.wikipedia.org/wiki/CMAC
  15392. </p><p>
  15393. CMAC is a NIST recomendation - see
  15394. csrc.nist.gov/CryptoToolkit/modes/800-38_Series_Publications/SP800-38B.pdf
  15395. </p><p>
  15396. CMAC/OMAC1 is a blockcipher-based message authentication code designed and
  15397. analyzed by Tetsu Iwata and Kaoru Kurosawa.
  15398. </p><p>
  15399. CMAC/OMAC1 is a simple variant of the CBC MAC (Cipher Block Chaining Message
  15400. Authentication Code). OMAC stands for One-Key CBC MAC.
  15401. </p><p>
  15402. It supports 128- or 64-bits block ciphers, with any key size, and returns
  15403. a MAC with dimension less or equal to the block size of the underlying
  15404. cipher.
  15405. </p>
  15406. </member>
  15407. <member name="M:Org.BouncyCastle.Crypto.Macs.CMac.#ctor(Org.BouncyCastle.Crypto.IBlockCipher)">
  15408. create a standard MAC based on a CBC block cipher (64 or 128 bit block).
  15409. This will produce an authentication code the length of the block size
  15410. of the cipher.
  15411. @param cipher the cipher to be used as the basis of the MAC generation.
  15412. </member>
  15413. <member name="M:Org.BouncyCastle.Crypto.Macs.CMac.#ctor(Org.BouncyCastle.Crypto.IBlockCipher,System.Int32)">
  15414. create a standard MAC based on a block cipher with the size of the
  15415. MAC been given in bits.
  15416. <p/>
  15417. Note: the size of the MAC must be at least 24 bits (FIPS Publication 81),
  15418. or 16 bits if being used as a data authenticator (FIPS Publication 113),
  15419. and in general should be less than the size of the block cipher as it reduces
  15420. the chance of an exhaustive attack (see Handbook of Applied Cryptography).
  15421. @param cipher the cipher to be used as the basis of the MAC generation.
  15422. @param macSizeInBits the size of the MAC in bits, must be a multiple of 8 and @lt;= 128.
  15423. </member>
  15424. <member name="M:Org.BouncyCastle.Crypto.Macs.CMac.Reset">
  15425. Reset the mac generator.
  15426. </member>
  15427. <member name="T:Org.BouncyCastle.Crypto.Macs.Dstu7564Mac">
  15428. <summary>
  15429. Implementation of DSTU7564 mac mode
  15430. </summary>
  15431. </member>
  15432. <member name="T:Org.BouncyCastle.Crypto.Macs.Dstu7624Mac">
  15433. implementation of DSTU 7624 MAC
  15434. </member>
  15435. <member name="T:Org.BouncyCastle.Crypto.Macs.GMac">
  15436. <summary>
  15437. The GMAC specialisation of Galois/Counter mode (GCM) detailed in NIST Special Publication
  15438. 800-38D.
  15439. </summary>
  15440. <remarks>
  15441. GMac is an invocation of the GCM mode where no data is encrypted (i.e. all input data to the Mac
  15442. is processed as additional authenticated data with the underlying GCM block cipher).
  15443. </remarks>
  15444. </member>
  15445. <member name="M:Org.BouncyCastle.Crypto.Macs.GMac.#ctor(Org.BouncyCastle.Crypto.Modes.GcmBlockCipher)">
  15446. <summary>
  15447. Creates a GMAC based on the operation of a block cipher in GCM mode.
  15448. </summary>
  15449. <remarks>
  15450. This will produce an authentication code the length of the block size of the cipher.
  15451. </remarks>
  15452. <param name="cipher">the cipher to be used in GCM mode to generate the MAC.</param>
  15453. </member>
  15454. <member name="M:Org.BouncyCastle.Crypto.Macs.GMac.#ctor(Org.BouncyCastle.Crypto.Modes.GcmBlockCipher,System.Int32)">
  15455. <summary>
  15456. Creates a GMAC based on the operation of a 128 bit block cipher in GCM mode.
  15457. </summary>
  15458. <remarks>
  15459. This will produce an authentication code the length of the block size of the cipher.
  15460. </remarks>
  15461. <param name="cipher">the cipher to be used in GCM mode to generate the MAC.</param>
  15462. <param name="macSizeBits">the mac size to generate, in bits. Must be a multiple of 8, between 32 and 128 (inclusive).
  15463. Sizes less than 96 are not recommended, but are supported for specialized applications.</param>
  15464. </member>
  15465. <member name="M:Org.BouncyCastle.Crypto.Macs.GMac.Init(Org.BouncyCastle.Crypto.ICipherParameters)">
  15466. <summary>
  15467. Initialises the GMAC - requires a <see cref="T:Org.BouncyCastle.Crypto.Parameters.ParametersWithIV"/>
  15468. providing a <see cref="T:Org.BouncyCastle.Crypto.Parameters.KeyParameter"/> and a nonce.
  15469. </summary>
  15470. </member>
  15471. <member name="T:Org.BouncyCastle.Crypto.Macs.Gost28147Mac">
  15472. implementation of GOST 28147-89 MAC
  15473. </member>
  15474. <member name="T:Org.BouncyCastle.Crypto.Macs.HMac">
  15475. HMAC implementation based on RFC2104
  15476. H(K XOR opad, H(K XOR ipad, text))
  15477. </member>
  15478. <member name="M:Org.BouncyCastle.Crypto.Macs.HMac.Reset">
  15479. Reset the mac generator.
  15480. </member>
  15481. <member name="T:Org.BouncyCastle.Crypto.Macs.ISO9797Alg3Mac">
  15482. DES based CBC Block Cipher MAC according to ISO9797, algorithm 3 (ANSI X9.19 Retail MAC)
  15483. This could as well be derived from CBCBlockCipherMac, but then the property mac in the base
  15484. class must be changed to protected
  15485. </member>
  15486. <member name="M:Org.BouncyCastle.Crypto.Macs.ISO9797Alg3Mac.#ctor(Org.BouncyCastle.Crypto.IBlockCipher)">
  15487. create a Retail-MAC based on a CBC block cipher. This will produce an
  15488. authentication code of the length of the block size of the cipher.
  15489. @param cipher the cipher to be used as the basis of the MAC generation. This must
  15490. be DESEngine.
  15491. </member>
  15492. <member name="M:Org.BouncyCastle.Crypto.Macs.ISO9797Alg3Mac.#ctor(Org.BouncyCastle.Crypto.IBlockCipher,Org.BouncyCastle.Crypto.Paddings.IBlockCipherPadding)">
  15493. create a Retail-MAC based on a CBC block cipher. This will produce an
  15494. authentication code of the length of the block size of the cipher.
  15495. @param cipher the cipher to be used as the basis of the MAC generation.
  15496. @param padding the padding to be used to complete the last block.
  15497. </member>
  15498. <member name="M:Org.BouncyCastle.Crypto.Macs.ISO9797Alg3Mac.#ctor(Org.BouncyCastle.Crypto.IBlockCipher,System.Int32)">
  15499. create a Retail-MAC based on a block cipher with the size of the
  15500. MAC been given in bits. This class uses single DES CBC mode as the basis for the
  15501. MAC generation.
  15502. <p>
  15503. Note: the size of the MAC must be at least 24 bits (FIPS Publication 81),
  15504. or 16 bits if being used as a data authenticator (FIPS Publication 113),
  15505. and in general should be less than the size of the block cipher as it reduces
  15506. the chance of an exhaustive attack (see Handbook of Applied Cryptography).
  15507. </p>
  15508. @param cipher the cipher to be used as the basis of the MAC generation.
  15509. @param macSizeInBits the size of the MAC in bits, must be a multiple of 8.
  15510. </member>
  15511. <member name="M:Org.BouncyCastle.Crypto.Macs.ISO9797Alg3Mac.#ctor(Org.BouncyCastle.Crypto.IBlockCipher,System.Int32,Org.BouncyCastle.Crypto.Paddings.IBlockCipherPadding)">
  15512. create a standard MAC based on a block cipher with the size of the
  15513. MAC been given in bits. This class uses single DES CBC mode as the basis for the
  15514. MAC generation. The final block is decrypted and then encrypted using the
  15515. middle and right part of the key.
  15516. <p>
  15517. Note: the size of the MAC must be at least 24 bits (FIPS Publication 81),
  15518. or 16 bits if being used as a data authenticator (FIPS Publication 113),
  15519. and in general should be less than the size of the block cipher as it reduces
  15520. the chance of an exhaustive attack (see Handbook of Applied Cryptography).
  15521. </p>
  15522. @param cipher the cipher to be used as the basis of the MAC generation.
  15523. @param macSizeInBits the size of the MAC in bits, must be a multiple of 8.
  15524. @param padding the padding to be used to complete the last block.
  15525. </member>
  15526. <member name="M:Org.BouncyCastle.Crypto.Macs.ISO9797Alg3Mac.Reset">
  15527. Reset the mac generator.
  15528. </member>
  15529. <member name="T:Org.BouncyCastle.Crypto.Macs.Poly1305">
  15530. <summary>
  15531. Poly1305 message authentication code, designed by D. J. Bernstein.
  15532. </summary>
  15533. <remarks>
  15534. Poly1305 computes a 128-bit (16 bytes) authenticator, using a 128 bit nonce and a 256 bit key
  15535. consisting of a 128 bit key applied to an underlying cipher, and a 128 bit key (with 106
  15536. effective key bits) used in the authenticator.
  15537. The polynomial calculation in this implementation is adapted from the public domain <a
  15538. href="https://github.com/floodyberry/poly1305-donna">poly1305-donna-unrolled</a> C implementation
  15539. by Andrew M (@floodyberry).
  15540. </remarks>
  15541. <seealso cref="T:Org.BouncyCastle.Crypto.Generators.Poly1305KeyGenerator"/>
  15542. </member>
  15543. <member name="F:Org.BouncyCastle.Crypto.Macs.Poly1305.r0">
  15544. Polynomial key
  15545. </member>
  15546. <member name="F:Org.BouncyCastle.Crypto.Macs.Poly1305.r1">
  15547. Polynomial key
  15548. </member>
  15549. <member name="F:Org.BouncyCastle.Crypto.Macs.Poly1305.r2">
  15550. Polynomial key
  15551. </member>
  15552. <member name="F:Org.BouncyCastle.Crypto.Macs.Poly1305.r3">
  15553. Polynomial key
  15554. </member>
  15555. <member name="F:Org.BouncyCastle.Crypto.Macs.Poly1305.r4">
  15556. Polynomial key
  15557. </member>
  15558. <member name="F:Org.BouncyCastle.Crypto.Macs.Poly1305.s1">
  15559. Precomputed 5 * r[1..4]
  15560. </member>
  15561. <member name="F:Org.BouncyCastle.Crypto.Macs.Poly1305.s2">
  15562. Precomputed 5 * r[1..4]
  15563. </member>
  15564. <member name="F:Org.BouncyCastle.Crypto.Macs.Poly1305.s3">
  15565. Precomputed 5 * r[1..4]
  15566. </member>
  15567. <member name="F:Org.BouncyCastle.Crypto.Macs.Poly1305.s4">
  15568. Precomputed 5 * r[1..4]
  15569. </member>
  15570. <member name="F:Org.BouncyCastle.Crypto.Macs.Poly1305.k0">
  15571. Encrypted nonce
  15572. </member>
  15573. <member name="F:Org.BouncyCastle.Crypto.Macs.Poly1305.k1">
  15574. Encrypted nonce
  15575. </member>
  15576. <member name="F:Org.BouncyCastle.Crypto.Macs.Poly1305.k2">
  15577. Encrypted nonce
  15578. </member>
  15579. <member name="F:Org.BouncyCastle.Crypto.Macs.Poly1305.k3">
  15580. Encrypted nonce
  15581. </member>
  15582. <member name="F:Org.BouncyCastle.Crypto.Macs.Poly1305.currentBlock">
  15583. Current block of buffered input
  15584. </member>
  15585. <member name="F:Org.BouncyCastle.Crypto.Macs.Poly1305.currentBlockOffset">
  15586. Current offset in input buffer
  15587. </member>
  15588. <member name="F:Org.BouncyCastle.Crypto.Macs.Poly1305.h0">
  15589. Polynomial accumulator
  15590. </member>
  15591. <member name="F:Org.BouncyCastle.Crypto.Macs.Poly1305.h1">
  15592. Polynomial accumulator
  15593. </member>
  15594. <member name="F:Org.BouncyCastle.Crypto.Macs.Poly1305.h2">
  15595. Polynomial accumulator
  15596. </member>
  15597. <member name="F:Org.BouncyCastle.Crypto.Macs.Poly1305.h3">
  15598. Polynomial accumulator
  15599. </member>
  15600. <member name="F:Org.BouncyCastle.Crypto.Macs.Poly1305.h4">
  15601. Polynomial accumulator
  15602. </member>
  15603. <member name="M:Org.BouncyCastle.Crypto.Macs.Poly1305.#ctor">
  15604. Constructs a Poly1305 MAC, where the key passed to init() will be used directly.
  15605. </member>
  15606. <member name="M:Org.BouncyCastle.Crypto.Macs.Poly1305.#ctor(Org.BouncyCastle.Crypto.IBlockCipher)">
  15607. Constructs a Poly1305 MAC, using a 128 bit block cipher.
  15608. </member>
  15609. <member name="M:Org.BouncyCastle.Crypto.Macs.Poly1305.Init(Org.BouncyCastle.Crypto.ICipherParameters)">
  15610. <summary>
  15611. Initialises the Poly1305 MAC.
  15612. </summary>
  15613. <param name="parameters">a {@link ParametersWithIV} containing a 128 bit nonce and a {@link KeyParameter} with
  15614. a 256 bit key complying to the {@link Poly1305KeyGenerator Poly1305 key format}.</param>
  15615. </member>
  15616. <member name="T:Org.BouncyCastle.Crypto.Macs.SipHash">
  15617. <summary>
  15618. Implementation of SipHash as specified in "SipHash: a fast short-input PRF", by Jean-Philippe
  15619. Aumasson and Daniel J. Bernstein (https://131002.net/siphash/siphash.pdf).
  15620. </summary>
  15621. <remarks>
  15622. "SipHash is a family of PRFs SipHash-c-d where the integer parameters c and d are the number of
  15623. compression rounds and the number of finalization rounds. A compression round is identical to a
  15624. finalization round and this round function is called SipRound. Given a 128-bit key k and a
  15625. (possibly empty) byte string m, SipHash-c-d returns a 64-bit value..."
  15626. </remarks>
  15627. </member>
  15628. <member name="M:Org.BouncyCastle.Crypto.Macs.SipHash.#ctor">
  15629. <summary>SipHash-2-4</summary>
  15630. </member>
  15631. <member name="M:Org.BouncyCastle.Crypto.Macs.SipHash.#ctor(System.Int32,System.Int32)">
  15632. <summary>SipHash-c-d</summary>
  15633. <param name="c">the number of compression rounds</param>
  15634. <param name="d">the number of finalization rounds</param>
  15635. </member>
  15636. <member name="T:Org.BouncyCastle.Crypto.Macs.SkeinMac">
  15637. <summary>
  15638. Implementation of the Skein parameterised MAC function in 256, 512 and 1024 bit block sizes,
  15639. based on the <see cref="T:Org.BouncyCastle.Crypto.Engines.ThreefishEngine">Threefish</see> tweakable block cipher.
  15640. </summary>
  15641. <remarks>
  15642. This is the 1.3 version of Skein defined in the Skein hash function submission to the NIST SHA-3
  15643. competition in October 2010.
  15644. <p/>
  15645. Skein was designed by Niels Ferguson - Stefan Lucks - Bruce Schneier - Doug Whiting - Mihir
  15646. Bellare - Tadayoshi Kohno - Jon Callas - Jesse Walker.
  15647. </remarks>
  15648. <seealso cref="T:Org.BouncyCastle.Crypto.Digests.SkeinEngine"/>
  15649. <seealso cref="T:Org.BouncyCastle.Crypto.Parameters.SkeinParameters"/>
  15650. </member>
  15651. <member name="F:Org.BouncyCastle.Crypto.Macs.SkeinMac.SKEIN_256">
  15652. <summary>
  15653. 256 bit block size - Skein-256
  15654. </summary>
  15655. </member>
  15656. <member name="F:Org.BouncyCastle.Crypto.Macs.SkeinMac.SKEIN_512">
  15657. <summary>
  15658. 512 bit block size - Skein-512
  15659. </summary>
  15660. </member>
  15661. <member name="F:Org.BouncyCastle.Crypto.Macs.SkeinMac.SKEIN_1024">
  15662. <summary>
  15663. 1024 bit block size - Skein-1024
  15664. </summary>
  15665. </member>
  15666. <member name="M:Org.BouncyCastle.Crypto.Macs.SkeinMac.#ctor(System.Int32,System.Int32)">
  15667. <summary>
  15668. Constructs a Skein MAC with an internal state size and output size.
  15669. </summary>
  15670. <param name="stateSizeBits">the internal state size in bits - one of <see cref="F:Org.BouncyCastle.Crypto.Macs.SkeinMac.SKEIN_256"/> <see cref="F:Org.BouncyCastle.Crypto.Macs.SkeinMac.SKEIN_512"/> or
  15671. <see cref="F:Org.BouncyCastle.Crypto.Macs.SkeinMac.SKEIN_1024"/>.</param>
  15672. <param name="digestSizeBits">the output/MAC size to produce in bits, which must be an integral number of
  15673. bytes.</param>
  15674. </member>
  15675. <member name="M:Org.BouncyCastle.Crypto.Macs.SkeinMac.Init(Org.BouncyCastle.Crypto.ICipherParameters)">
  15676. <summary>
  15677. Optionally initialises the Skein digest with the provided parameters.
  15678. </summary>
  15679. See <see cref="T:Org.BouncyCastle.Crypto.Parameters.SkeinParameters"></see> for details on the parameterisation of the Skein hash function.
  15680. <param name="parameters">the parameters to apply to this engine, or <code>null</code> to use no parameters.</param>
  15681. </member>
  15682. <member name="T:Org.BouncyCastle.Crypto.MaxBytesExceededException">
  15683. <summary>
  15684. This exception is thrown whenever a cipher requires a change of key, iv
  15685. or similar after x amount of bytes enciphered
  15686. </summary>
  15687. </member>
  15688. <member name="T:Org.BouncyCastle.Crypto.Modes.CbcBlockCipher">
  15689. implements Cipher-Block-Chaining (CBC) mode on top of a simple cipher.
  15690. </member>
  15691. <member name="M:Org.BouncyCastle.Crypto.Modes.CbcBlockCipher.#ctor(Org.BouncyCastle.Crypto.IBlockCipher)">
  15692. Basic constructor.
  15693. @param cipher the block cipher to be used as the basis of chaining.
  15694. </member>
  15695. <member name="M:Org.BouncyCastle.Crypto.Modes.CbcBlockCipher.GetUnderlyingCipher">
  15696. return the underlying block cipher that we are wrapping.
  15697. @return the underlying block cipher that we are wrapping.
  15698. </member>
  15699. <member name="M:Org.BouncyCastle.Crypto.Modes.CbcBlockCipher.Init(System.Boolean,Org.BouncyCastle.Crypto.ICipherParameters)">
  15700. Initialise the cipher and, possibly, the initialisation vector (IV).
  15701. If an IV isn't passed as part of the parameter, the IV will be all zeros.
  15702. @param forEncryption if true the cipher is initialised for
  15703. encryption, if false for decryption.
  15704. @param param the key and other data required by the cipher.
  15705. @exception ArgumentException if the parameters argument is
  15706. inappropriate.
  15707. </member>
  15708. <member name="P:Org.BouncyCastle.Crypto.Modes.CbcBlockCipher.AlgorithmName">
  15709. return the algorithm name and mode.
  15710. @return the name of the underlying algorithm followed by "/CBC".
  15711. </member>
  15712. <member name="M:Org.BouncyCastle.Crypto.Modes.CbcBlockCipher.GetBlockSize">
  15713. return the block size of the underlying cipher.
  15714. @return the block size of the underlying cipher.
  15715. </member>
  15716. <member name="M:Org.BouncyCastle.Crypto.Modes.CbcBlockCipher.ProcessBlock(System.Byte[],System.Int32,System.Byte[],System.Int32)">
  15717. Process one block of input from the array in and write it to
  15718. the out array.
  15719. @param in the array containing the input data.
  15720. @param inOff offset into the in array the data starts at.
  15721. @param out the array the output data will be copied into.
  15722. @param outOff the offset into the out array the output will start at.
  15723. @exception DataLengthException if there isn't enough data in in, or
  15724. space in out.
  15725. @exception InvalidOperationException if the cipher isn't initialised.
  15726. @return the number of bytes processed and produced.
  15727. </member>
  15728. <member name="M:Org.BouncyCastle.Crypto.Modes.CbcBlockCipher.Reset">
  15729. reset the chaining vector back to the IV and reset the underlying
  15730. cipher.
  15731. </member>
  15732. <member name="M:Org.BouncyCastle.Crypto.Modes.CbcBlockCipher.EncryptBlock(System.Byte[],System.Int32,System.Byte[],System.Int32)">
  15733. Do the appropriate chaining step for CBC mode encryption.
  15734. @param in the array containing the data to be encrypted.
  15735. @param inOff offset into the in array the data starts at.
  15736. @param out the array the encrypted data will be copied into.
  15737. @param outOff the offset into the out array the output will start at.
  15738. @exception DataLengthException if there isn't enough data in in, or
  15739. space in out.
  15740. @exception InvalidOperationException if the cipher isn't initialised.
  15741. @return the number of bytes processed and produced.
  15742. </member>
  15743. <member name="M:Org.BouncyCastle.Crypto.Modes.CbcBlockCipher.DecryptBlock(System.Byte[],System.Int32,System.Byte[],System.Int32)">
  15744. Do the appropriate chaining step for CBC mode decryption.
  15745. @param in the array containing the data to be decrypted.
  15746. @param inOff offset into the in array the data starts at.
  15747. @param out the array the decrypted data will be copied into.
  15748. @param outOff the offset into the out array the output will start at.
  15749. @exception DataLengthException if there isn't enough data in in, or
  15750. space in out.
  15751. @exception InvalidOperationException if the cipher isn't initialised.
  15752. @return the number of bytes processed and produced.
  15753. </member>
  15754. <member name="T:Org.BouncyCastle.Crypto.Modes.CcmBlockCipher">
  15755. Implements the Counter with Cipher Block Chaining mode (CCM) detailed in
  15756. NIST Special Publication 800-38C.
  15757. <p>
  15758. <b>Note</b>: this mode is a packet mode - it needs all the data up front.
  15759. </p>
  15760. </member>
  15761. <member name="M:Org.BouncyCastle.Crypto.Modes.CcmBlockCipher.#ctor(Org.BouncyCastle.Crypto.IBlockCipher)">
  15762. Basic constructor.
  15763. @param cipher the block cipher to be used.
  15764. </member>
  15765. <member name="M:Org.BouncyCastle.Crypto.Modes.CcmBlockCipher.GetUnderlyingCipher">
  15766. return the underlying block cipher that we are wrapping.
  15767. @return the underlying block cipher that we are wrapping.
  15768. </member>
  15769. <member name="M:Org.BouncyCastle.Crypto.Modes.CcmBlockCipher.GetMac">
  15770. Returns a byte array containing the mac calculated as part of the
  15771. last encrypt or decrypt operation.
  15772. @return the last mac calculated.
  15773. </member>
  15774. <member name="M:Org.BouncyCastle.Crypto.Modes.CcmBlockCipher.ProcessPacket(System.Byte[],System.Int32,System.Int32)">
  15775. Process a packet of data for either CCM decryption or encryption.
  15776. @param in data for processing.
  15777. @param inOff offset at which data starts in the input array.
  15778. @param inLen length of the data in the input array.
  15779. @return a byte array containing the processed input..
  15780. @throws IllegalStateException if the cipher is not appropriately set up.
  15781. @throws InvalidCipherTextException if the input data is truncated or the mac check fails.
  15782. </member>
  15783. <member name="M:Org.BouncyCastle.Crypto.Modes.CcmBlockCipher.ProcessPacket(System.Byte[],System.Int32,System.Int32,System.Byte[],System.Int32)">
  15784. Process a packet of data for either CCM decryption or encryption.
  15785. @param in data for processing.
  15786. @param inOff offset at which data starts in the input array.
  15787. @param inLen length of the data in the input array.
  15788. @param output output array.
  15789. @param outOff offset into output array to start putting processed bytes.
  15790. @return the number of bytes added to output.
  15791. @throws IllegalStateException if the cipher is not appropriately set up.
  15792. @throws InvalidCipherTextException if the input data is truncated or the mac check fails.
  15793. @throws DataLengthException if output buffer too short.
  15794. </member>
  15795. <member name="T:Org.BouncyCastle.Crypto.Modes.CfbBlockCipher">
  15796. implements a Cipher-FeedBack (CFB) mode on top of a simple cipher.
  15797. </member>
  15798. <member name="M:Org.BouncyCastle.Crypto.Modes.CfbBlockCipher.#ctor(Org.BouncyCastle.Crypto.IBlockCipher,System.Int32)">
  15799. Basic constructor.
  15800. @param cipher the block cipher to be used as the basis of the
  15801. feedback mode.
  15802. @param blockSize the block size in bits (note: a multiple of 8)
  15803. </member>
  15804. <member name="M:Org.BouncyCastle.Crypto.Modes.CfbBlockCipher.GetUnderlyingCipher">
  15805. return the underlying block cipher that we are wrapping.
  15806. @return the underlying block cipher that we are wrapping.
  15807. </member>
  15808. <member name="M:Org.BouncyCastle.Crypto.Modes.CfbBlockCipher.Init(System.Boolean,Org.BouncyCastle.Crypto.ICipherParameters)">
  15809. Initialise the cipher and, possibly, the initialisation vector (IV).
  15810. If an IV isn't passed as part of the parameter, the IV will be all zeros.
  15811. An IV which is too short is handled in FIPS compliant fashion.
  15812. @param forEncryption if true the cipher is initialised for
  15813. encryption, if false for decryption.
  15814. @param param the key and other data required by the cipher.
  15815. @exception ArgumentException if the parameters argument is
  15816. inappropriate.
  15817. </member>
  15818. <member name="P:Org.BouncyCastle.Crypto.Modes.CfbBlockCipher.AlgorithmName">
  15819. return the algorithm name and mode.
  15820. @return the name of the underlying algorithm followed by "/CFB"
  15821. and the block size in bits.
  15822. </member>
  15823. <member name="M:Org.BouncyCastle.Crypto.Modes.CfbBlockCipher.GetBlockSize">
  15824. return the block size we are operating at.
  15825. @return the block size we are operating at (in bytes).
  15826. </member>
  15827. <member name="M:Org.BouncyCastle.Crypto.Modes.CfbBlockCipher.ProcessBlock(System.Byte[],System.Int32,System.Byte[],System.Int32)">
  15828. Process one block of input from the array in and write it to
  15829. the out array.
  15830. @param in the array containing the input data.
  15831. @param inOff offset into the in array the data starts at.
  15832. @param out the array the output data will be copied into.
  15833. @param outOff the offset into the out array the output will start at.
  15834. @exception DataLengthException if there isn't enough data in in, or
  15835. space in out.
  15836. @exception InvalidOperationException if the cipher isn't initialised.
  15837. @return the number of bytes processed and produced.
  15838. </member>
  15839. <member name="M:Org.BouncyCastle.Crypto.Modes.CfbBlockCipher.EncryptBlock(System.Byte[],System.Int32,System.Byte[],System.Int32)">
  15840. Do the appropriate processing for CFB mode encryption.
  15841. @param in the array containing the data to be encrypted.
  15842. @param inOff offset into the in array the data starts at.
  15843. @param out the array the encrypted data will be copied into.
  15844. @param outOff the offset into the out array the output will start at.
  15845. @exception DataLengthException if there isn't enough data in in, or
  15846. space in out.
  15847. @exception InvalidOperationException if the cipher isn't initialised.
  15848. @return the number of bytes processed and produced.
  15849. </member>
  15850. <member name="M:Org.BouncyCastle.Crypto.Modes.CfbBlockCipher.DecryptBlock(System.Byte[],System.Int32,System.Byte[],System.Int32)">
  15851. Do the appropriate processing for CFB mode decryption.
  15852. @param in the array containing the data to be decrypted.
  15853. @param inOff offset into the in array the data starts at.
  15854. @param out the array the encrypted data will be copied into.
  15855. @param outOff the offset into the out array the output will start at.
  15856. @exception DataLengthException if there isn't enough data in in, or
  15857. space in out.
  15858. @exception InvalidOperationException if the cipher isn't initialised.
  15859. @return the number of bytes processed and produced.
  15860. </member>
  15861. <member name="M:Org.BouncyCastle.Crypto.Modes.CfbBlockCipher.Reset">
  15862. reset the chaining vector back to the IV and reset the underlying
  15863. cipher.
  15864. </member>
  15865. <member name="T:Org.BouncyCastle.Crypto.Modes.CtsBlockCipher">
  15866. A Cipher Text Stealing (CTS) mode cipher. CTS allows block ciphers to
  15867. be used to produce cipher text which is the same outLength as the plain text.
  15868. </member>
  15869. <member name="M:Org.BouncyCastle.Crypto.Modes.CtsBlockCipher.#ctor(Org.BouncyCastle.Crypto.IBlockCipher)">
  15870. Create a buffered block cipher that uses Cipher Text Stealing
  15871. @param cipher the underlying block cipher this buffering object wraps.
  15872. </member>
  15873. <member name="M:Org.BouncyCastle.Crypto.Modes.CtsBlockCipher.GetUpdateOutputSize(System.Int32)">
  15874. return the size of the output buffer required for an update of 'length' bytes.
  15875. @param length the outLength of the input.
  15876. @return the space required to accommodate a call to update
  15877. with length bytes of input.
  15878. </member>
  15879. <member name="M:Org.BouncyCastle.Crypto.Modes.CtsBlockCipher.GetOutputSize(System.Int32)">
  15880. return the size of the output buffer required for an update plus a
  15881. doFinal with an input of length bytes.
  15882. @param length the outLength of the input.
  15883. @return the space required to accommodate a call to update and doFinal
  15884. with length bytes of input.
  15885. </member>
  15886. <member name="M:Org.BouncyCastle.Crypto.Modes.CtsBlockCipher.ProcessByte(System.Byte,System.Byte[],System.Int32)">
  15887. process a single byte, producing an output block if necessary.
  15888. @param in the input byte.
  15889. @param out the space for any output that might be produced.
  15890. @param outOff the offset from which the output will be copied.
  15891. @return the number of output bytes copied to out.
  15892. @exception DataLengthException if there isn't enough space in out.
  15893. @exception InvalidOperationException if the cipher isn't initialised.
  15894. </member>
  15895. <member name="M:Org.BouncyCastle.Crypto.Modes.CtsBlockCipher.ProcessBytes(System.Byte[],System.Int32,System.Int32,System.Byte[],System.Int32)">
  15896. process an array of bytes, producing output if necessary.
  15897. @param in the input byte array.
  15898. @param inOff the offset at which the input data starts.
  15899. @param length the number of bytes to be copied out of the input array.
  15900. @param out the space for any output that might be produced.
  15901. @param outOff the offset from which the output will be copied.
  15902. @return the number of output bytes copied to out.
  15903. @exception DataLengthException if there isn't enough space in out.
  15904. @exception InvalidOperationException if the cipher isn't initialised.
  15905. </member>
  15906. <member name="M:Org.BouncyCastle.Crypto.Modes.CtsBlockCipher.DoFinal(System.Byte[],System.Int32)">
  15907. Process the last block in the buffer.
  15908. @param out the array the block currently being held is copied into.
  15909. @param outOff the offset at which the copying starts.
  15910. @return the number of output bytes copied to out.
  15911. @exception DataLengthException if there is insufficient space in out for
  15912. the output.
  15913. @exception InvalidOperationException if the underlying cipher is not
  15914. initialised.
  15915. @exception InvalidCipherTextException if cipher text decrypts wrongly (in
  15916. case the exception will never Get thrown).
  15917. </member>
  15918. <member name="T:Org.BouncyCastle.Crypto.Modes.EaxBlockCipher">
  15919. A Two-Pass Authenticated-Encryption Scheme Optimized for Simplicity and
  15920. Efficiency - by M. Bellare, P. Rogaway, D. Wagner.
  15921. http://www.cs.ucdavis.edu/~rogaway/papers/eax.pdf
  15922. EAX is an AEAD scheme based on CTR and OMAC1/CMAC, that uses a single block
  15923. cipher to encrypt and authenticate data. It's on-line (the length of a
  15924. message isn't needed to begin processing it), has good performances, it's
  15925. simple and provably secure (provided the underlying block cipher is secure).
  15926. Of course, this implementations is NOT thread-safe.
  15927. </member>
  15928. <member name="M:Org.BouncyCastle.Crypto.Modes.EaxBlockCipher.#ctor(Org.BouncyCastle.Crypto.IBlockCipher)">
  15929. Constructor that accepts an instance of a block cipher engine.
  15930. @param cipher the engine to use
  15931. </member>
  15932. <member name="T:Org.BouncyCastle.Crypto.Modes.GcmBlockCipher">
  15933. <summary>
  15934. Implements the Galois/Counter mode (GCM) detailed in
  15935. NIST Special Publication 800-38D.
  15936. </summary>
  15937. </member>
  15938. <member name="M:Org.BouncyCastle.Crypto.Modes.GcmBlockCipher.Init(System.Boolean,Org.BouncyCastle.Crypto.ICipherParameters)">
  15939. <remarks>
  15940. MAC sizes from 32 bits to 128 bits (must be a multiple of 8) are supported. The default is 128 bits.
  15941. Sizes less than 96 are not recommended, but are supported for specialized applications.
  15942. </remarks>
  15943. </member>
  15944. <member name="T:Org.BouncyCastle.Crypto.Modes.GcmSivBlockCipher">
  15945. GCM-SIV Mode.
  15946. <p>It should be noted that the specified limit of 2<sup>36</sup> bytes is not supported. This is because all bytes are
  15947. cached in a <b>ByteArrayOutputStream</b> object (which has a limit of a little less than 2<sup>31</sup> bytes),
  15948. and are output on the <b>DoFinal</b>() call (which can only process a maximum of 2<sup>31</sup> bytes).</p>
  15949. <p>The practical limit of 2<sup>31</sup> - 24 bytes is policed, and attempts to breach the limit will be rejected</p>
  15950. <p>In order to properly support the higher limit, an extended form of <b>ByteArrayOutputStream</b> would be needed
  15951. which would use multiple arrays to store the data. In addition, a new <b>doOutput</b> method would be required (similar
  15952. to that in <b>XOF</b> digests), which would allow the data to be output over multiple calls. Alternatively an extended
  15953. form of <b>ByteArrayInputStream</b> could be used to deliver the data.</p>
  15954. </member>
  15955. <member name="F:Org.BouncyCastle.Crypto.Modes.GcmSivBlockCipher.BUFLEN">
  15956. <summary>The buffer length.</summary>
  15957. </member>
  15958. <member name="F:Org.BouncyCastle.Crypto.Modes.GcmSivBlockCipher.HALFBUFLEN">
  15959. <summary>The halfBuffer length.</summary>
  15960. </member>
  15961. <member name="F:Org.BouncyCastle.Crypto.Modes.GcmSivBlockCipher.NONCELEN">
  15962. <summary>The nonce length.</summary>
  15963. </member>
  15964. <member name="F:Org.BouncyCastle.Crypto.Modes.GcmSivBlockCipher.MAX_DATALEN">
  15965. The maximum data length (AEAD/PlainText). Due to implementation constraints this is restricted to the maximum
  15966. array length (https://programming.guide/java/array-maximum-length.html) minus the BUFLEN to allow for the MAC
  15967. </member>
  15968. <member name="F:Org.BouncyCastle.Crypto.Modes.GcmSivBlockCipher.MASK">
  15969. The top bit mask.
  15970. </member>
  15971. <member name="F:Org.BouncyCastle.Crypto.Modes.GcmSivBlockCipher.ADD">
  15972. The addition constant.
  15973. </member>
  15974. <member name="F:Org.BouncyCastle.Crypto.Modes.GcmSivBlockCipher.INIT">
  15975. The initialisation flag.
  15976. </member>
  15977. <member name="F:Org.BouncyCastle.Crypto.Modes.GcmSivBlockCipher.AEAD_COMPLETE">
  15978. The aeadComplete flag.
  15979. </member>
  15980. <member name="F:Org.BouncyCastle.Crypto.Modes.GcmSivBlockCipher.theCipher">
  15981. The cipher.
  15982. </member>
  15983. <member name="F:Org.BouncyCastle.Crypto.Modes.GcmSivBlockCipher.theMultiplier">
  15984. The multiplier.
  15985. </member>
  15986. <member name="F:Org.BouncyCastle.Crypto.Modes.GcmSivBlockCipher.theGHash">
  15987. The gHash buffer.
  15988. </member>
  15989. <member name="F:Org.BouncyCastle.Crypto.Modes.GcmSivBlockCipher.theReverse">
  15990. The reverse buffer.
  15991. </member>
  15992. <member name="F:Org.BouncyCastle.Crypto.Modes.GcmSivBlockCipher.theAEADHasher">
  15993. The aeadHasher.
  15994. </member>
  15995. <member name="F:Org.BouncyCastle.Crypto.Modes.GcmSivBlockCipher.theDataHasher">
  15996. The dataHasher.
  15997. </member>
  15998. <member name="F:Org.BouncyCastle.Crypto.Modes.GcmSivBlockCipher.thePlain">
  15999. The plainDataStream.
  16000. </member>
  16001. <member name="F:Org.BouncyCastle.Crypto.Modes.GcmSivBlockCipher.theEncData">
  16002. The encryptedDataStream (decryption only).
  16003. </member>
  16004. <member name="F:Org.BouncyCastle.Crypto.Modes.GcmSivBlockCipher.forEncryption">
  16005. Are we encrypting?
  16006. </member>
  16007. <member name="F:Org.BouncyCastle.Crypto.Modes.GcmSivBlockCipher.theInitialAEAD">
  16008. The initialAEAD.
  16009. </member>
  16010. <member name="F:Org.BouncyCastle.Crypto.Modes.GcmSivBlockCipher.theNonce">
  16011. The nonce.
  16012. </member>
  16013. <member name="F:Org.BouncyCastle.Crypto.Modes.GcmSivBlockCipher.theFlags">
  16014. The flags.
  16015. </member>
  16016. <member name="M:Org.BouncyCastle.Crypto.Modes.GcmSivBlockCipher.#ctor">
  16017. Constructor.
  16018. </member>
  16019. <member name="M:Org.BouncyCastle.Crypto.Modes.GcmSivBlockCipher.#ctor(Org.BouncyCastle.Crypto.IBlockCipher)">
  16020. Constructor.
  16021. @param pCipher the underlying cipher
  16022. </member>
  16023. <member name="M:Org.BouncyCastle.Crypto.Modes.GcmSivBlockCipher.#ctor(Org.BouncyCastle.Crypto.IBlockCipher,Org.BouncyCastle.Crypto.Modes.Gcm.IGcmMultiplier)">
  16024. Constructor.
  16025. @param pCipher the underlying cipher
  16026. @param pMultiplier the multiplier
  16027. </member>
  16028. <member name="M:Org.BouncyCastle.Crypto.Modes.GcmSivBlockCipher.CheckAeadStatus(System.Int32)">
  16029. check AEAD status.
  16030. @param pLen the aeadLength
  16031. </member>
  16032. <member name="M:Org.BouncyCastle.Crypto.Modes.GcmSivBlockCipher.CheckStatus(System.Int32)">
  16033. check status.
  16034. @param pLen the dataLength
  16035. </member>
  16036. <member name="M:Org.BouncyCastle.Crypto.Modes.GcmSivBlockCipher.ResetStreams">
  16037. Reset Streams.
  16038. </member>
  16039. <member name="M:Org.BouncyCastle.Crypto.Modes.GcmSivBlockCipher.bufLength(System.Byte[])">
  16040. Obtain buffer length (allowing for null).
  16041. @param pBuffer the buffere
  16042. @return the length
  16043. </member>
  16044. <member name="M:Org.BouncyCastle.Crypto.Modes.GcmSivBlockCipher.CheckBuffer(System.Byte[],System.Int32,System.Int32,System.Boolean)">
  16045. Check buffer.
  16046. @param pBuffer the buffer
  16047. @param pOffset the offset
  16048. @param pLen the length
  16049. @param pOutput is this an output buffer?
  16050. </member>
  16051. <member name="M:Org.BouncyCastle.Crypto.Modes.GcmSivBlockCipher.encryptPlain(System.Byte[],System.Byte[],System.Int32)">
  16052. encrypt data stream.
  16053. @param pCounter the counter
  16054. @param pTarget the target buffer
  16055. @param pOffset the target offset
  16056. @return the length of data encrypted
  16057. </member>
  16058. <member name="M:Org.BouncyCastle.Crypto.Modes.GcmSivBlockCipher.decryptPlain">
  16059. decrypt data stream.
  16060. @throws InvalidCipherTextException on data too short or mac check failed
  16061. </member>
  16062. <member name="M:Org.BouncyCastle.Crypto.Modes.GcmSivBlockCipher.calculateTag">
  16063. calculate tag.
  16064. @return the calculated tag
  16065. </member>
  16066. <member name="M:Org.BouncyCastle.Crypto.Modes.GcmSivBlockCipher.completePolyVal">
  16067. complete polyVAL.
  16068. @return the calculated value
  16069. </member>
  16070. <member name="M:Org.BouncyCastle.Crypto.Modes.GcmSivBlockCipher.gHashLengths">
  16071. process lengths.
  16072. </member>
  16073. <member name="M:Org.BouncyCastle.Crypto.Modes.GcmSivBlockCipher.gHASH(System.Byte[])">
  16074. perform the next GHASH step.
  16075. @param pNext the next value
  16076. </member>
  16077. <!-- Badly formed XML comment ignored for member "M:Org.BouncyCastle.Crypto.Modes.GcmSivBlockCipher.fillReverse(System.Byte[],System.Int32,System.Int32,System.Byte[])" -->
  16078. <member name="M:Org.BouncyCastle.Crypto.Modes.GcmSivBlockCipher.xorBlock(System.Byte[],System.Byte[])">
  16079. xor a full block buffer.
  16080. @param pLeft the left operand and result
  16081. @param pRight the right operand
  16082. </member>
  16083. <member name="M:Org.BouncyCastle.Crypto.Modes.GcmSivBlockCipher.xorBlock(System.Byte[],System.Byte[],System.Int32,System.Int32)">
  16084. xor a partial block buffer.
  16085. @param pLeft the left operand and result
  16086. @param pRight the right operand
  16087. @param pOffset the offset in the right operand
  16088. @param pLength the length of data in the right operand
  16089. </member>
  16090. <member name="M:Org.BouncyCastle.Crypto.Modes.GcmSivBlockCipher.incrementCounter(System.Byte[])">
  16091. increment the counter.
  16092. @param pCounter the counter to increment
  16093. </member>
  16094. <member name="M:Org.BouncyCastle.Crypto.Modes.GcmSivBlockCipher.mulX(System.Byte[])">
  16095. multiply by X.
  16096. @param pValue the value to adjust
  16097. </member>
  16098. <member name="M:Org.BouncyCastle.Crypto.Modes.GcmSivBlockCipher.deriveKeys(Org.BouncyCastle.Crypto.Parameters.KeyParameter)">
  16099. Derive Keys.
  16100. @param pKey the keyGeneration key
  16101. </member>
  16102. <member name="T:Org.BouncyCastle.Crypto.Modes.GcmSivBlockCipher.GcmSivHasher">
  16103. Hash Control.
  16104. </member>
  16105. <member name="F:Org.BouncyCastle.Crypto.Modes.GcmSivBlockCipher.GcmSivHasher.theBuffer">
  16106. Cache.
  16107. </member>
  16108. <member name="F:Org.BouncyCastle.Crypto.Modes.GcmSivBlockCipher.GcmSivHasher.theByte">
  16109. Single byte cache.
  16110. </member>
  16111. <member name="F:Org.BouncyCastle.Crypto.Modes.GcmSivBlockCipher.GcmSivHasher.numActive">
  16112. Count of active bytes in cache.
  16113. </member>
  16114. <member name="F:Org.BouncyCastle.Crypto.Modes.GcmSivBlockCipher.GcmSivHasher.numHashed">
  16115. Count of hashed bytes.
  16116. </member>
  16117. <member name="M:Org.BouncyCastle.Crypto.Modes.GcmSivBlockCipher.GcmSivHasher.getBytesProcessed">
  16118. Obtain the count of bytes hashed.
  16119. @return the count
  16120. </member>
  16121. <member name="M:Org.BouncyCastle.Crypto.Modes.GcmSivBlockCipher.GcmSivHasher.Reset">
  16122. Reset the hasher.
  16123. </member>
  16124. <member name="M:Org.BouncyCastle.Crypto.Modes.GcmSivBlockCipher.GcmSivHasher.updateHash(System.Byte)">
  16125. update hash.
  16126. @param pByte the byte
  16127. </member>
  16128. <member name="M:Org.BouncyCastle.Crypto.Modes.GcmSivBlockCipher.GcmSivHasher.updateHash(System.Byte[],System.Int32,System.Int32)">
  16129. update hash.
  16130. @param pBuffer the buffer
  16131. @param pOffset the offset within the buffer
  16132. @param pLen the length of data
  16133. </member>
  16134. <member name="M:Org.BouncyCastle.Crypto.Modes.GcmSivBlockCipher.GcmSivHasher.completeHash">
  16135. complete hash.
  16136. </member>
  16137. <member name="T:Org.BouncyCastle.Crypto.Modes.GOfbBlockCipher">
  16138. implements the GOST 28147 OFB counter mode (GCTR).
  16139. </member>
  16140. <member name="M:Org.BouncyCastle.Crypto.Modes.GOfbBlockCipher.#ctor(Org.BouncyCastle.Crypto.IBlockCipher)">
  16141. Basic constructor.
  16142. @param cipher the block cipher to be used as the basis of the
  16143. counter mode (must have a 64 bit block size).
  16144. </member>
  16145. <member name="M:Org.BouncyCastle.Crypto.Modes.GOfbBlockCipher.GetUnderlyingCipher">
  16146. return the underlying block cipher that we are wrapping.
  16147. @return the underlying block cipher that we are wrapping.
  16148. </member>
  16149. <member name="M:Org.BouncyCastle.Crypto.Modes.GOfbBlockCipher.Init(System.Boolean,Org.BouncyCastle.Crypto.ICipherParameters)">
  16150. Initialise the cipher and, possibly, the initialisation vector (IV).
  16151. If an IV isn't passed as part of the parameter, the IV will be all zeros.
  16152. An IV which is too short is handled in FIPS compliant fashion.
  16153. @param encrypting if true the cipher is initialised for
  16154. encryption, if false for decryption.
  16155. @param parameters the key and other data required by the cipher.
  16156. @exception ArgumentException if the parameters argument is inappropriate.
  16157. </member>
  16158. <member name="P:Org.BouncyCastle.Crypto.Modes.GOfbBlockCipher.AlgorithmName">
  16159. return the algorithm name and mode.
  16160. @return the name of the underlying algorithm followed by "/GCTR"
  16161. and the block size in bits
  16162. </member>
  16163. <member name="M:Org.BouncyCastle.Crypto.Modes.GOfbBlockCipher.GetBlockSize">
  16164. return the block size we are operating at (in bytes).
  16165. @return the block size we are operating at (in bytes).
  16166. </member>
  16167. <member name="M:Org.BouncyCastle.Crypto.Modes.GOfbBlockCipher.ProcessBlock(System.Byte[],System.Int32,System.Byte[],System.Int32)">
  16168. Process one block of input from the array in and write it to
  16169. the out array.
  16170. @param in the array containing the input data.
  16171. @param inOff offset into the in array the data starts at.
  16172. @param out the array the output data will be copied into.
  16173. @param outOff the offset into the out array the output will start at.
  16174. @exception DataLengthException if there isn't enough data in in, or
  16175. space in out.
  16176. @exception InvalidOperationException if the cipher isn't initialised.
  16177. @return the number of bytes processed and produced.
  16178. </member>
  16179. <member name="M:Org.BouncyCastle.Crypto.Modes.GOfbBlockCipher.Reset">
  16180. reset the feedback vector back to the IV and reset the underlying
  16181. cipher.
  16182. </member>
  16183. <member name="T:Org.BouncyCastle.Crypto.Modes.IAeadBlockCipher">
  16184. <summary>An IAeadCipher based on an IBlockCipher.</summary>
  16185. </member>
  16186. <member name="M:Org.BouncyCastle.Crypto.Modes.IAeadBlockCipher.GetBlockSize">
  16187. <returns>The block size for this cipher, in bytes.</returns>
  16188. </member>
  16189. <member name="M:Org.BouncyCastle.Crypto.Modes.IAeadBlockCipher.GetUnderlyingCipher">
  16190. <summary>The block cipher underlying this algorithm.</summary>
  16191. </member>
  16192. <member name="T:Org.BouncyCastle.Crypto.Modes.IAeadCipher">
  16193. <summary>
  16194. A cipher mode that includes authenticated encryption with a streaming mode and optional
  16195. associated data.
  16196. </summary>
  16197. <remarks>
  16198. Implementations of this interface may operate in a packet mode (where all input data is
  16199. buffered and processed during the call to DoFinal, or in a streaming mode (where output
  16200. data is incrementally produced with each call to ProcessByte or ProcessBytes. This is
  16201. important to consider during decryption: in a streaming mode, unauthenticated plaintext
  16202. data may be output prior to the call to DoFinal that results in an authentication failure.
  16203. The higher level protocol utilising this cipher must ensure the plaintext data is handled
  16204. appropriately until the end of data is reached and the entire ciphertext is authenticated.
  16205. </remarks>
  16206. <see cref="T:Org.BouncyCastle.Crypto.Parameters.AeadParameters"/>
  16207. </member>
  16208. <member name="P:Org.BouncyCastle.Crypto.Modes.IAeadCipher.AlgorithmName">
  16209. <summary>The name of the algorithm this cipher implements.</summary>
  16210. </member>
  16211. <member name="M:Org.BouncyCastle.Crypto.Modes.IAeadCipher.Init(System.Boolean,Org.BouncyCastle.Crypto.ICipherParameters)">
  16212. <summary>Initialise the cipher.</summary>
  16213. <remarks>Parameter can either be an AeadParameters or a ParametersWithIV object.</remarks>
  16214. <param name="forEncryption">Initialise for encryption if true, for decryption if false.</param>
  16215. <param name="parameters">The key or other data required by the cipher.</param>
  16216. </member>
  16217. <member name="M:Org.BouncyCastle.Crypto.Modes.IAeadCipher.ProcessAadByte(System.Byte)">
  16218. <summary>Add a single byte to the associated data check.</summary>
  16219. <remarks>If the implementation supports it, this will be an online operation and will not retain the associated data.</remarks>
  16220. <param name="input">The byte to be processed.</param>
  16221. </member>
  16222. <member name="M:Org.BouncyCastle.Crypto.Modes.IAeadCipher.ProcessAadBytes(System.Byte[],System.Int32,System.Int32)">
  16223. <summary>Add a sequence of bytes to the associated data check.</summary>
  16224. <remarks>If the implementation supports it, this will be an online operation and will not retain the associated data.</remarks>
  16225. <param name="inBytes">The input byte array.</param>
  16226. <param name="inOff">The offset into the input array where the data to be processed starts.</param>
  16227. <param name="len">The number of bytes to be processed.</param>
  16228. </member>
  16229. <member name="M:Org.BouncyCastle.Crypto.Modes.IAeadCipher.ProcessByte(System.Byte,System.Byte[],System.Int32)">
  16230. Encrypt/decrypt a single byte.
  16231. @param input the byte to be processed.
  16232. @param outBytes the output buffer the processed byte goes into.
  16233. @param outOff the offset into the output byte array the processed data starts at.
  16234. @return the number of bytes written to out.
  16235. @exception DataLengthException if the output buffer is too small.
  16236. </member>
  16237. <member name="M:Org.BouncyCastle.Crypto.Modes.IAeadCipher.ProcessBytes(System.Byte[],System.Int32,System.Int32,System.Byte[],System.Int32)">
  16238. Process a block of bytes from in putting the result into out.
  16239. @param inBytes the input byte array.
  16240. @param inOff the offset into the in array where the data to be processed starts.
  16241. @param len the number of bytes to be processed.
  16242. @param outBytes the output buffer the processed bytes go into.
  16243. @param outOff the offset into the output byte array the processed data starts at.
  16244. @return the number of bytes written to out.
  16245. @exception DataLengthException if the output buffer is too small.
  16246. </member>
  16247. <member name="M:Org.BouncyCastle.Crypto.Modes.IAeadCipher.DoFinal(System.Byte[],System.Int32)">
  16248. Finish the operation either appending or verifying the MAC at the end of the data.
  16249. @param outBytes space for any resulting output data.
  16250. @param outOff offset into out to start copying the data at.
  16251. @return number of bytes written into out.
  16252. @throws InvalidOperationException if the cipher is in an inappropriate state.
  16253. @throws InvalidCipherTextException if the MAC fails to match.
  16254. </member>
  16255. <member name="M:Org.BouncyCastle.Crypto.Modes.IAeadCipher.GetMac">
  16256. Return the value of the MAC associated with the last stream processed.
  16257. @return MAC for plaintext data.
  16258. </member>
  16259. <member name="M:Org.BouncyCastle.Crypto.Modes.IAeadCipher.GetUpdateOutputSize(System.Int32)">
  16260. Return the size of the output buffer required for a ProcessBytes
  16261. an input of len bytes.
  16262. @param len the length of the input.
  16263. @return the space required to accommodate a call to ProcessBytes
  16264. with len bytes of input.
  16265. </member>
  16266. <member name="M:Org.BouncyCastle.Crypto.Modes.IAeadCipher.GetOutputSize(System.Int32)">
  16267. Return the size of the output buffer required for a ProcessBytes plus a
  16268. DoFinal with an input of len bytes.
  16269. @param len the length of the input.
  16270. @return the space required to accommodate a call to ProcessBytes and DoFinal
  16271. with len bytes of input.
  16272. </member>
  16273. <member name="M:Org.BouncyCastle.Crypto.Modes.IAeadCipher.Reset">
  16274. <summary>
  16275. Reset the cipher to the same state as it was after the last init (if there was one).
  16276. </summary>
  16277. </member>
  16278. <member name="M:Org.BouncyCastle.Crypto.Modes.KCcmBlockCipher.#ctor(Org.BouncyCastle.Crypto.IBlockCipher)">
  16279. <summary>
  16280. Base constructor. Nb value is set to 4.
  16281. </summary>
  16282. <param name="engine">base cipher to use under CCM.</param>
  16283. </member>
  16284. <member name="M:Org.BouncyCastle.Crypto.Modes.KCcmBlockCipher.#ctor(Org.BouncyCastle.Crypto.IBlockCipher,System.Int32)">
  16285. <summary>
  16286. Constructor allowing Nb configuration.
  16287. Nb is a parameter specified in CCM mode of DSTU7624 standard.
  16288. This parameter specifies maximum possible length of input.It should
  16289. be calculated as follows: Nb = 1 / 8 * (-3 + log[2]Nmax) + 1,
  16290. where Nmax - length of input message in bits.For practical reasons
  16291. Nmax usually less than 4Gb, e.g. for Nmax = 2^32 - 1, Nb = 4.
  16292. </summary>
  16293. <param name="engine">base cipher to use under CCM.</param>
  16294. <param name="Nb">Nb value to use.</param>
  16295. </member>
  16296. <member name="T:Org.BouncyCastle.Crypto.Modes.KCtrBlockCipher">
  16297. Implements a Gamming or Counter (CTR) mode on top of a DSTU 7624 block cipher.
  16298. </member>
  16299. <member name="M:Org.BouncyCastle.Crypto.Modes.KCtrBlockCipher.#ctor(Org.BouncyCastle.Crypto.IBlockCipher)">
  16300. Basic constructor.
  16301. @param cipher the block cipher to be used as the basis of the
  16302. feedback mode.
  16303. </member>
  16304. <member name="M:Org.BouncyCastle.Crypto.Modes.KCtrBlockCipher.GetUnderlyingCipher">
  16305. return the underlying block cipher that we are wrapping.
  16306. @return the underlying block cipher that we are wrapping.
  16307. </member>
  16308. <member name="M:Org.BouncyCastle.Crypto.Modes.KCtrBlockCipher.Init(System.Boolean,Org.BouncyCastle.Crypto.ICipherParameters)">
  16309. Initialise the cipher and, possibly, the initialisation vector (IV).
  16310. If an IV isn't passed as part of the parameter, the IV will be all zeros.
  16311. An IV which is too short is handled in FIPS compliant fashion.
  16312. @param forEncryption if true the cipher is initialised for
  16313. encryption, if false for decryption.
  16314. @param param the key and other data required by the cipher.
  16315. @exception ArgumentException if the parameters argument is
  16316. inappropriate.
  16317. </member>
  16318. <member name="P:Org.BouncyCastle.Crypto.Modes.KCtrBlockCipher.AlgorithmName">
  16319. return the algorithm name and mode.
  16320. @return the name of the underlying algorithm followed by "/KCTR"
  16321. and the block size in bits.
  16322. </member>
  16323. <member name="M:Org.BouncyCastle.Crypto.Modes.KCtrBlockCipher.GetBlockSize">
  16324. return the block size we are operating at.
  16325. @return the block size we are operating at (in bytes).
  16326. </member>
  16327. <member name="M:Org.BouncyCastle.Crypto.Modes.KCtrBlockCipher.ProcessBlock(System.Byte[],System.Int32,System.Byte[],System.Int32)">
  16328. Process one block of input from the array in and write it to
  16329. the out array.
  16330. @param input the array containing the input data.
  16331. @param inOff offset into the in array the data starts at.
  16332. @param output the array the output data will be copied into.
  16333. @param outOff the offset into the out array the output will start at.
  16334. @exception DataLengthException if there isn't enough data in in, or
  16335. space in out.
  16336. @exception InvalidOperationException if the cipher isn't initialised.
  16337. @return the number of bytes processed and produced.
  16338. </member>
  16339. <member name="M:Org.BouncyCastle.Crypto.Modes.KCtrBlockCipher.Reset">
  16340. reset the chaining vector back to the IV and reset the underlying
  16341. cipher.
  16342. </member>
  16343. <member name="T:Org.BouncyCastle.Crypto.Modes.OcbBlockCipher">
  16344. An implementation of <a href="http://tools.ietf.org/html/rfc7253">RFC 7253 on The OCB
  16345. Authenticated-Encryption Algorithm</a>, licensed per:
  16346. <blockquote><p><a href="http://www.cs.ucdavis.edu/~rogaway/ocb/license1.pdf">License for
  16347. Open-Source Software Implementations of OCB</a> (Jan 9, 2013) - 'License 1'<br/>
  16348. Under this license, you are authorized to make, use, and distribute open-source software
  16349. implementations of OCB. This license terminates for you if you sue someone over their open-source
  16350. software implementation of OCB claiming that you have a patent covering their implementation.
  16351. </p><p>
  16352. This is a non-binding summary of a legal document (the link above). The parameters of the license
  16353. are specified in the license document and that document is controlling.</p></blockquote>
  16354. </member>
  16355. <member name="T:Org.BouncyCastle.Crypto.Modes.OfbBlockCipher">
  16356. implements a Output-FeedBack (OFB) mode on top of a simple cipher.
  16357. </member>
  16358. <member name="M:Org.BouncyCastle.Crypto.Modes.OfbBlockCipher.#ctor(Org.BouncyCastle.Crypto.IBlockCipher,System.Int32)">
  16359. Basic constructor.
  16360. @param cipher the block cipher to be used as the basis of the
  16361. feedback mode.
  16362. @param blockSize the block size in bits (note: a multiple of 8)
  16363. </member>
  16364. <member name="M:Org.BouncyCastle.Crypto.Modes.OfbBlockCipher.GetUnderlyingCipher">
  16365. return the underlying block cipher that we are wrapping.
  16366. @return the underlying block cipher that we are wrapping.
  16367. </member>
  16368. <member name="M:Org.BouncyCastle.Crypto.Modes.OfbBlockCipher.Init(System.Boolean,Org.BouncyCastle.Crypto.ICipherParameters)">
  16369. Initialise the cipher and, possibly, the initialisation vector (IV).
  16370. If an IV isn't passed as part of the parameter, the IV will be all zeros.
  16371. An IV which is too short is handled in FIPS compliant fashion.
  16372. @param forEncryption if true the cipher is initialised for
  16373. encryption, if false for decryption.
  16374. @param param the key and other data required by the cipher.
  16375. @exception ArgumentException if the parameters argument is
  16376. inappropriate.
  16377. </member>
  16378. <member name="P:Org.BouncyCastle.Crypto.Modes.OfbBlockCipher.AlgorithmName">
  16379. return the algorithm name and mode.
  16380. @return the name of the underlying algorithm followed by "/OFB"
  16381. and the block size in bits
  16382. </member>
  16383. <member name="M:Org.BouncyCastle.Crypto.Modes.OfbBlockCipher.GetBlockSize">
  16384. return the block size we are operating at (in bytes).
  16385. @return the block size we are operating at (in bytes).
  16386. </member>
  16387. <member name="M:Org.BouncyCastle.Crypto.Modes.OfbBlockCipher.ProcessBlock(System.Byte[],System.Int32,System.Byte[],System.Int32)">
  16388. Process one block of input from the array in and write it to
  16389. the out array.
  16390. @param in the array containing the input data.
  16391. @param inOff offset into the in array the data starts at.
  16392. @param out the array the output data will be copied into.
  16393. @param outOff the offset into the out array the output will start at.
  16394. @exception DataLengthException if there isn't enough data in in, or
  16395. space in out.
  16396. @exception InvalidOperationException if the cipher isn't initialised.
  16397. @return the number of bytes processed and produced.
  16398. </member>
  16399. <member name="M:Org.BouncyCastle.Crypto.Modes.OfbBlockCipher.Reset">
  16400. reset the feedback vector back to the IV and reset the underlying
  16401. cipher.
  16402. </member>
  16403. <member name="T:Org.BouncyCastle.Crypto.Modes.OpenPgpCfbBlockCipher">
  16404. * Implements OpenPGP's rather strange version of Cipher-FeedBack (CFB) mode
  16405. * on top of a simple cipher. This class assumes the IV has been prepended
  16406. * to the data stream already, and just accomodates the reset after
  16407. * (blockSize + 2) bytes have been read.
  16408. * <p>
  16409. * For further info see <a href="http://www.ietf.org/rfc/rfc2440.html">RFC 2440</a>.
  16410. * </p>
  16411. </member>
  16412. <member name="M:Org.BouncyCastle.Crypto.Modes.OpenPgpCfbBlockCipher.#ctor(Org.BouncyCastle.Crypto.IBlockCipher)">
  16413. Basic constructor.
  16414. @param cipher the block cipher to be used as the basis of the
  16415. feedback mode.
  16416. </member>
  16417. <member name="M:Org.BouncyCastle.Crypto.Modes.OpenPgpCfbBlockCipher.GetUnderlyingCipher">
  16418. return the underlying block cipher that we are wrapping.
  16419. @return the underlying block cipher that we are wrapping.
  16420. </member>
  16421. <member name="P:Org.BouncyCastle.Crypto.Modes.OpenPgpCfbBlockCipher.AlgorithmName">
  16422. return the algorithm name and mode.
  16423. @return the name of the underlying algorithm followed by "/PGPCFB"
  16424. and the block size in bits.
  16425. </member>
  16426. <member name="M:Org.BouncyCastle.Crypto.Modes.OpenPgpCfbBlockCipher.GetBlockSize">
  16427. return the block size we are operating at.
  16428. @return the block size we are operating at (in bytes).
  16429. </member>
  16430. <member name="M:Org.BouncyCastle.Crypto.Modes.OpenPgpCfbBlockCipher.ProcessBlock(System.Byte[],System.Int32,System.Byte[],System.Int32)">
  16431. Process one block of input from the array in and write it to
  16432. the out array.
  16433. @param in the array containing the input data.
  16434. @param inOff offset into the in array the data starts at.
  16435. @param out the array the output data will be copied into.
  16436. @param outOff the offset into the out array the output will start at.
  16437. @exception DataLengthException if there isn't enough data in in, or
  16438. space in out.
  16439. @exception InvalidOperationException if the cipher isn't initialised.
  16440. @return the number of bytes processed and produced.
  16441. </member>
  16442. <member name="M:Org.BouncyCastle.Crypto.Modes.OpenPgpCfbBlockCipher.Reset">
  16443. reset the chaining vector back to the IV and reset the underlying
  16444. cipher.
  16445. </member>
  16446. <member name="M:Org.BouncyCastle.Crypto.Modes.OpenPgpCfbBlockCipher.Init(System.Boolean,Org.BouncyCastle.Crypto.ICipherParameters)">
  16447. Initialise the cipher and, possibly, the initialisation vector (IV).
  16448. If an IV isn't passed as part of the parameter, the IV will be all zeros.
  16449. An IV which is too short is handled in FIPS compliant fashion.
  16450. @param forEncryption if true the cipher is initialised for
  16451. encryption, if false for decryption.
  16452. @param parameters the key and other data required by the cipher.
  16453. @exception ArgumentException if the parameters argument is
  16454. inappropriate.
  16455. </member>
  16456. <member name="M:Org.BouncyCastle.Crypto.Modes.OpenPgpCfbBlockCipher.EncryptByte(System.Byte,System.Int32)">
  16457. Encrypt one byte of data according to CFB mode.
  16458. @param data the byte to encrypt
  16459. @param blockOff offset in the current block
  16460. @returns the encrypted byte
  16461. </member>
  16462. <member name="M:Org.BouncyCastle.Crypto.Modes.OpenPgpCfbBlockCipher.EncryptBlock(System.Byte[],System.Int32,System.Byte[],System.Int32)">
  16463. Do the appropriate processing for CFB IV mode encryption.
  16464. @param in the array containing the data to be encrypted.
  16465. @param inOff offset into the in array the data starts at.
  16466. @param out the array the encrypted data will be copied into.
  16467. @param outOff the offset into the out array the output will start at.
  16468. @exception DataLengthException if there isn't enough data in in, or
  16469. space in out.
  16470. @exception InvalidOperationException if the cipher isn't initialised.
  16471. @return the number of bytes processed and produced.
  16472. </member>
  16473. <member name="M:Org.BouncyCastle.Crypto.Modes.OpenPgpCfbBlockCipher.DecryptBlock(System.Byte[],System.Int32,System.Byte[],System.Int32)">
  16474. Do the appropriate processing for CFB IV mode decryption.
  16475. @param in the array containing the data to be decrypted.
  16476. @param inOff offset into the in array the data starts at.
  16477. @param out the array the encrypted data will be copied into.
  16478. @param outOff the offset into the out array the output will start at.
  16479. @exception DataLengthException if there isn't enough data in in, or
  16480. space in out.
  16481. @exception InvalidOperationException if the cipher isn't initialised.
  16482. @return the number of bytes processed and produced.
  16483. </member>
  16484. <member name="T:Org.BouncyCastle.Crypto.Modes.SicBlockCipher">
  16485. Implements the Segmented Integer Counter (SIC) mode on top of a simple
  16486. block cipher.
  16487. </member>
  16488. <member name="M:Org.BouncyCastle.Crypto.Modes.SicBlockCipher.#ctor(Org.BouncyCastle.Crypto.IBlockCipher)">
  16489. Basic constructor.
  16490. @param c the block cipher to be used.
  16491. </member>
  16492. <member name="M:Org.BouncyCastle.Crypto.Modes.SicBlockCipher.GetUnderlyingCipher">
  16493. return the underlying block cipher that we are wrapping.
  16494. @return the underlying block cipher that we are wrapping.
  16495. </member>
  16496. <member name="M:Org.BouncyCastle.Crypto.Operators.X509Utilities.GetDigestAlgName(Org.BouncyCastle.Asn1.DerObjectIdentifier)">
  16497. Return the digest algorithm using one of the standard JCA string
  16498. representations rather than the algorithm identifier (if possible).
  16499. </member>
  16500. <member name="T:Org.BouncyCastle.Crypto.Operators.Asn1SignatureFactory">
  16501. <summary>
  16502. Calculator factory class for signature generation in ASN.1 based profiles that use an AlgorithmIdentifier to preserve
  16503. signature algorithm details.
  16504. </summary>
  16505. </member>
  16506. <member name="M:Org.BouncyCastle.Crypto.Operators.Asn1SignatureFactory.#ctor(System.String,Org.BouncyCastle.Crypto.AsymmetricKeyParameter)">
  16507. <summary>
  16508. Base constructor.
  16509. </summary>
  16510. <param name="algorithm">The name of the signature algorithm to use.</param>
  16511. <param name="privateKey">The private key to be used in the signing operation.</param>
  16512. </member>
  16513. <member name="M:Org.BouncyCastle.Crypto.Operators.Asn1SignatureFactory.#ctor(System.String,Org.BouncyCastle.Crypto.AsymmetricKeyParameter,Org.BouncyCastle.Security.SecureRandom)">
  16514. <summary>
  16515. Constructor which also specifies a source of randomness to be used if one is required.
  16516. </summary>
  16517. <param name="algorithm">The name of the signature algorithm to use.</param>
  16518. <param name="privateKey">The private key to be used in the signing operation.</param>
  16519. <param name="random">The source of randomness to be used in signature calculation.</param>
  16520. </member>
  16521. <member name="P:Org.BouncyCastle.Crypto.Operators.Asn1SignatureFactory.SignatureAlgNames">
  16522. <summary>
  16523. Allows enumeration of the signature names supported by the verifier provider.
  16524. </summary>
  16525. </member>
  16526. <member name="T:Org.BouncyCastle.Crypto.Operators.Asn1VerifierFactory">
  16527. <summary>
  16528. Verifier class for signature verification in ASN.1 based profiles that use an AlgorithmIdentifier to preserve
  16529. signature algorithm details.
  16530. </summary>
  16531. </member>
  16532. <member name="M:Org.BouncyCastle.Crypto.Operators.Asn1VerifierFactory.#ctor(System.String,Org.BouncyCastle.Crypto.AsymmetricKeyParameter)">
  16533. <summary>
  16534. Base constructor.
  16535. </summary>
  16536. <param name="algorithm">The name of the signature algorithm to use.</param>
  16537. <param name="publicKey">The public key to be used in the verification operation.</param>
  16538. </member>
  16539. <member name="T:Org.BouncyCastle.Crypto.Operators.Asn1VerifierFactoryProvider">
  16540. <summary>
  16541. Provider class which supports dynamic creation of signature verifiers.
  16542. </summary>
  16543. </member>
  16544. <member name="M:Org.BouncyCastle.Crypto.Operators.Asn1VerifierFactoryProvider.#ctor(Org.BouncyCastle.Crypto.AsymmetricKeyParameter)">
  16545. <summary>
  16546. Base constructor - specify the public key to be used in verification.
  16547. </summary>
  16548. <param name="publicKey">The public key to be used in creating verifiers provided by this object.</param>
  16549. </member>
  16550. <member name="P:Org.BouncyCastle.Crypto.Operators.Asn1VerifierFactoryProvider.SignatureAlgNames">
  16551. <summary>
  16552. Allows enumeration of the signature names supported by the verifier provider.
  16553. </summary>
  16554. </member>
  16555. <member name="T:Org.BouncyCastle.Crypto.Paddings.IBlockCipherPadding">
  16556. Block cipher padders are expected to conform to this interface
  16557. </member>
  16558. <member name="M:Org.BouncyCastle.Crypto.Paddings.IBlockCipherPadding.Init(Org.BouncyCastle.Security.SecureRandom)">
  16559. Initialise the padder.
  16560. @param param parameters, if any required.
  16561. </member>
  16562. <member name="P:Org.BouncyCastle.Crypto.Paddings.IBlockCipherPadding.PaddingName">
  16563. Return the name of the algorithm the cipher implements.
  16564. @return the name of the algorithm the cipher implements.
  16565. </member>
  16566. <member name="M:Org.BouncyCastle.Crypto.Paddings.IBlockCipherPadding.AddPadding(System.Byte[],System.Int32)">
  16567. add the pad bytes to the passed in block, returning the
  16568. number of bytes added.
  16569. </member>
  16570. <member name="M:Org.BouncyCastle.Crypto.Paddings.IBlockCipherPadding.PadCount(System.Byte[])">
  16571. return the number of pad bytes present in the block.
  16572. @exception InvalidCipherTextException if the padding is badly formed
  16573. or invalid.
  16574. </member>
  16575. <member name="T:Org.BouncyCastle.Crypto.Paddings.ISO10126d2Padding">
  16576. A padder that adds ISO10126-2 padding to a block.
  16577. </member>
  16578. <member name="M:Org.BouncyCastle.Crypto.Paddings.ISO10126d2Padding.Init(Org.BouncyCastle.Security.SecureRandom)">
  16579. Initialise the padder.
  16580. @param random a SecureRandom if available.
  16581. </member>
  16582. <member name="P:Org.BouncyCastle.Crypto.Paddings.ISO10126d2Padding.PaddingName">
  16583. Return the name of the algorithm the cipher implements.
  16584. @return the name of the algorithm the cipher implements.
  16585. </member>
  16586. <member name="M:Org.BouncyCastle.Crypto.Paddings.ISO10126d2Padding.AddPadding(System.Byte[],System.Int32)">
  16587. add the pad bytes to the passed in block, returning the
  16588. number of bytes added.
  16589. </member>
  16590. <member name="M:Org.BouncyCastle.Crypto.Paddings.ISO10126d2Padding.PadCount(System.Byte[])">
  16591. return the number of pad bytes present in the block.
  16592. </member>
  16593. <member name="T:Org.BouncyCastle.Crypto.Paddings.ISO7816d4Padding">
  16594. A padder that adds the padding according to the scheme referenced in
  16595. ISO 7814-4 - scheme 2 from ISO 9797-1. The first byte is 0x80, rest is 0x00
  16596. </member>
  16597. <member name="M:Org.BouncyCastle.Crypto.Paddings.ISO7816d4Padding.Init(Org.BouncyCastle.Security.SecureRandom)">
  16598. Initialise the padder.
  16599. @param random - a SecureRandom if available.
  16600. </member>
  16601. <member name="P:Org.BouncyCastle.Crypto.Paddings.ISO7816d4Padding.PaddingName">
  16602. Return the name of the algorithm the padder implements.
  16603. @return the name of the algorithm the padder implements.
  16604. </member>
  16605. <member name="M:Org.BouncyCastle.Crypto.Paddings.ISO7816d4Padding.AddPadding(System.Byte[],System.Int32)">
  16606. add the pad bytes to the passed in block, returning the
  16607. number of bytes added.
  16608. </member>
  16609. <member name="M:Org.BouncyCastle.Crypto.Paddings.ISO7816d4Padding.PadCount(System.Byte[])">
  16610. return the number of pad bytes present in the block.
  16611. </member>
  16612. <member name="T:Org.BouncyCastle.Crypto.Paddings.PaddedBufferedBlockCipher">
  16613. A wrapper class that allows block ciphers to be used to process data in
  16614. a piecemeal fashion with padding. The PaddedBufferedBlockCipher
  16615. outputs a block only when the buffer is full and more data is being added,
  16616. or on a doFinal (unless the current block in the buffer is a pad block).
  16617. The default padding mechanism used is the one outlined in Pkcs5/Pkcs7.
  16618. </member>
  16619. <member name="M:Org.BouncyCastle.Crypto.Paddings.PaddedBufferedBlockCipher.#ctor(Org.BouncyCastle.Crypto.IBlockCipher,Org.BouncyCastle.Crypto.Paddings.IBlockCipherPadding)">
  16620. Create a buffered block cipher with the desired padding.
  16621. @param cipher the underlying block cipher this buffering object wraps.
  16622. @param padding the padding type.
  16623. </member>
  16624. <member name="M:Org.BouncyCastle.Crypto.Paddings.PaddedBufferedBlockCipher.#ctor(Org.BouncyCastle.Crypto.IBlockCipher)">
  16625. Create a buffered block cipher Pkcs7 padding
  16626. @param cipher the underlying block cipher this buffering object wraps.
  16627. </member>
  16628. <member name="M:Org.BouncyCastle.Crypto.Paddings.PaddedBufferedBlockCipher.Init(System.Boolean,Org.BouncyCastle.Crypto.ICipherParameters)">
  16629. initialise the cipher.
  16630. @param forEncryption if true the cipher is initialised for
  16631. encryption, if false for decryption.
  16632. @param param the key and other data required by the cipher.
  16633. @exception ArgumentException if the parameters argument is
  16634. inappropriate.
  16635. </member>
  16636. <member name="M:Org.BouncyCastle.Crypto.Paddings.PaddedBufferedBlockCipher.GetOutputSize(System.Int32)">
  16637. return the minimum size of the output buffer required for an update
  16638. plus a doFinal with an input of len bytes.
  16639. @param len the length of the input.
  16640. @return the space required to accommodate a call to update and doFinal
  16641. with len bytes of input.
  16642. </member>
  16643. <member name="M:Org.BouncyCastle.Crypto.Paddings.PaddedBufferedBlockCipher.GetUpdateOutputSize(System.Int32)">
  16644. return the size of the output buffer required for an update
  16645. an input of len bytes.
  16646. @param len the length of the input.
  16647. @return the space required to accommodate a call to update
  16648. with len bytes of input.
  16649. </member>
  16650. <member name="M:Org.BouncyCastle.Crypto.Paddings.PaddedBufferedBlockCipher.ProcessByte(System.Byte,System.Byte[],System.Int32)">
  16651. process a single byte, producing an output block if necessary.
  16652. @param in the input byte.
  16653. @param out the space for any output that might be produced.
  16654. @param outOff the offset from which the output will be copied.
  16655. @return the number of output bytes copied to out.
  16656. @exception DataLengthException if there isn't enough space in out.
  16657. @exception InvalidOperationException if the cipher isn't initialised.
  16658. </member>
  16659. <member name="M:Org.BouncyCastle.Crypto.Paddings.PaddedBufferedBlockCipher.ProcessBytes(System.Byte[],System.Int32,System.Int32,System.Byte[],System.Int32)">
  16660. process an array of bytes, producing output if necessary.
  16661. @param in the input byte array.
  16662. @param inOff the offset at which the input data starts.
  16663. @param len the number of bytes to be copied out of the input array.
  16664. @param out the space for any output that might be produced.
  16665. @param outOff the offset from which the output will be copied.
  16666. @return the number of output bytes copied to out.
  16667. @exception DataLengthException if there isn't enough space in out.
  16668. @exception InvalidOperationException if the cipher isn't initialised.
  16669. </member>
  16670. <member name="M:Org.BouncyCastle.Crypto.Paddings.PaddedBufferedBlockCipher.DoFinal(System.Byte[],System.Int32)">
  16671. Process the last block in the buffer. If the buffer is currently
  16672. full and padding needs to be added a call to doFinal will produce
  16673. 2 * GetBlockSize() bytes.
  16674. @param out the array the block currently being held is copied into.
  16675. @param outOff the offset at which the copying starts.
  16676. @return the number of output bytes copied to out.
  16677. @exception DataLengthException if there is insufficient space in out for
  16678. the output or we are decrypting and the input is not block size aligned.
  16679. @exception InvalidOperationException if the underlying cipher is not
  16680. initialised.
  16681. @exception InvalidCipherTextException if padding is expected and not found.
  16682. </member>
  16683. <member name="T:Org.BouncyCastle.Crypto.Paddings.Pkcs7Padding">
  16684. A padder that adds Pkcs7/Pkcs5 padding to a block.
  16685. </member>
  16686. <member name="M:Org.BouncyCastle.Crypto.Paddings.Pkcs7Padding.Init(Org.BouncyCastle.Security.SecureRandom)">
  16687. Initialise the padder.
  16688. @param random - a SecureRandom if available.
  16689. </member>
  16690. <member name="P:Org.BouncyCastle.Crypto.Paddings.Pkcs7Padding.PaddingName">
  16691. Return the name of the algorithm the cipher implements.
  16692. @return the name of the algorithm the cipher implements.
  16693. </member>
  16694. <member name="M:Org.BouncyCastle.Crypto.Paddings.Pkcs7Padding.AddPadding(System.Byte[],System.Int32)">
  16695. add the pad bytes to the passed in block, returning the
  16696. number of bytes added.
  16697. </member>
  16698. <member name="M:Org.BouncyCastle.Crypto.Paddings.Pkcs7Padding.PadCount(System.Byte[])">
  16699. return the number of pad bytes present in the block.
  16700. </member>
  16701. <member name="T:Org.BouncyCastle.Crypto.Paddings.TbcPadding">
  16702. <summary> A padder that adds Trailing-Bit-Compliment padding to a block.
  16703. <p>
  16704. This padding pads the block out compliment of the last bit
  16705. of the plain text.
  16706. </p>
  16707. </summary>
  16708. </member>
  16709. <member name="P:Org.BouncyCastle.Crypto.Paddings.TbcPadding.PaddingName">
  16710. <summary> Return the name of the algorithm the cipher implements.</summary>
  16711. <returns> the name of the algorithm the cipher implements.
  16712. </returns>
  16713. </member>
  16714. <member name="M:Org.BouncyCastle.Crypto.Paddings.TbcPadding.Init(Org.BouncyCastle.Security.SecureRandom)">
  16715. <summary> Initialise the padder.</summary>
  16716. <param name="random">- a SecureRandom if available.
  16717. </param>
  16718. </member>
  16719. <member name="M:Org.BouncyCastle.Crypto.Paddings.TbcPadding.AddPadding(System.Byte[],System.Int32)">
  16720. <summary> add the pad bytes to the passed in block, returning the
  16721. number of bytes added.
  16722. <p>
  16723. Note: this assumes that the last block of plain text is always
  16724. passed to it inside in. i.e. if inOff is zero, indicating the
  16725. entire block is to be overwritten with padding the value of in
  16726. should be the same as the last block of plain text.
  16727. </p>
  16728. </summary>
  16729. </member>
  16730. <member name="M:Org.BouncyCastle.Crypto.Paddings.TbcPadding.PadCount(System.Byte[])">
  16731. <summary> return the number of pad bytes present in the block.</summary>
  16732. </member>
  16733. <member name="T:Org.BouncyCastle.Crypto.Paddings.X923Padding">
  16734. A padder that adds X9.23 padding to a block - if a SecureRandom is
  16735. passed in random padding is assumed, otherwise padding with zeros is used.
  16736. </member>
  16737. <member name="M:Org.BouncyCastle.Crypto.Paddings.X923Padding.Init(Org.BouncyCastle.Security.SecureRandom)">
  16738. Initialise the padder.
  16739. @param random a SecureRandom if one is available.
  16740. </member>
  16741. <member name="P:Org.BouncyCastle.Crypto.Paddings.X923Padding.PaddingName">
  16742. Return the name of the algorithm the cipher implements.
  16743. @return the name of the algorithm the cipher implements.
  16744. </member>
  16745. <member name="M:Org.BouncyCastle.Crypto.Paddings.X923Padding.AddPadding(System.Byte[],System.Int32)">
  16746. add the pad bytes to the passed in block, returning the
  16747. number of bytes added.
  16748. </member>
  16749. <member name="M:Org.BouncyCastle.Crypto.Paddings.X923Padding.PadCount(System.Byte[])">
  16750. return the number of pad bytes present in the block.
  16751. </member>
  16752. <member name="T:Org.BouncyCastle.Crypto.Paddings.ZeroBytePadding">
  16753. <summary> A padder that adds Null byte padding to a block.</summary>
  16754. </member>
  16755. <member name="P:Org.BouncyCastle.Crypto.Paddings.ZeroBytePadding.PaddingName">
  16756. <summary> Return the name of the algorithm the cipher implements.
  16757. </summary>
  16758. <returns> the name of the algorithm the cipher implements.
  16759. </returns>
  16760. </member>
  16761. <member name="M:Org.BouncyCastle.Crypto.Paddings.ZeroBytePadding.Init(Org.BouncyCastle.Security.SecureRandom)">
  16762. <summary> Initialise the padder.
  16763. </summary>
  16764. <param name="random">- a SecureRandom if available.
  16765. </param>
  16766. </member>
  16767. <member name="M:Org.BouncyCastle.Crypto.Paddings.ZeroBytePadding.AddPadding(System.Byte[],System.Int32)">
  16768. <summary> add the pad bytes to the passed in block, returning the
  16769. number of bytes added.
  16770. </summary>
  16771. </member>
  16772. <member name="M:Org.BouncyCastle.Crypto.Paddings.ZeroBytePadding.PadCount(System.Byte[])">
  16773. <summary> return the number of pad bytes present in the block.</summary>
  16774. </member>
  16775. <member name="M:Org.BouncyCastle.Crypto.Parameters.AeadParameters.#ctor(Org.BouncyCastle.Crypto.Parameters.KeyParameter,System.Int32,System.Byte[])">
  16776. Base constructor.
  16777. @param key key to be used by underlying cipher
  16778. @param macSize macSize in bits
  16779. @param nonce nonce to be used
  16780. </member>
  16781. <member name="M:Org.BouncyCastle.Crypto.Parameters.AeadParameters.#ctor(Org.BouncyCastle.Crypto.Parameters.KeyParameter,System.Int32,System.Byte[],System.Byte[])">
  16782. Base constructor.
  16783. @param key key to be used by underlying cipher
  16784. @param macSize macSize in bits
  16785. @param nonce nonce to be used
  16786. @param associatedText associated text, if any
  16787. </member>
  16788. <member name="M:Org.BouncyCastle.Crypto.Parameters.CcmParameters.#ctor(Org.BouncyCastle.Crypto.Parameters.KeyParameter,System.Int32,System.Byte[],System.Byte[])">
  16789. Base constructor.
  16790. @param key key to be used by underlying cipher
  16791. @param macSize macSize in bits
  16792. @param nonce nonce to be used
  16793. @param associatedText associated text, if any
  16794. </member>
  16795. <member name="M:Org.BouncyCastle.Crypto.Parameters.DesEdeParameters.IsWeakKey(System.Byte[],System.Int32,System.Int32)">
  16796. return true if the passed in key is a DES-EDE weak key.
  16797. @param key bytes making up the key
  16798. @param offset offset into the byte array the key starts at
  16799. @param length number of bytes making up the key
  16800. </member>
  16801. <member name="M:Org.BouncyCastle.Crypto.Parameters.DesEdeParameters.IsWeakKey(System.Byte[],System.Int32)">
  16802. return true if the passed in key is a DES-EDE weak key.
  16803. @param key bytes making up the key
  16804. @param offset offset into the byte array the key starts at
  16805. </member>
  16806. <member name="M:Org.BouncyCastle.Crypto.Parameters.DesEdeParameters.IsRealEdeKey(System.Byte[],System.Int32)">
  16807. return true if the passed in key is a real 2/3 part DES-EDE key.
  16808. @param key bytes making up the key
  16809. @param offset offset into the byte array the key starts at
  16810. </member>
  16811. <member name="M:Org.BouncyCastle.Crypto.Parameters.DesEdeParameters.IsReal2Key(System.Byte[],System.Int32)">
  16812. return true if the passed in key is a real 2 part DES-EDE key.
  16813. @param key bytes making up the key
  16814. @param offset offset into the byte array the key starts at
  16815. </member>
  16816. <member name="M:Org.BouncyCastle.Crypto.Parameters.DesEdeParameters.IsReal3Key(System.Byte[],System.Int32)">
  16817. return true if the passed in key is a real 3 part DES-EDE key.
  16818. @param key bytes making up the key
  16819. @param offset offset into the byte array the key starts at
  16820. </member>
  16821. <member name="M:Org.BouncyCastle.Crypto.Parameters.DesParameters.IsWeakKey(System.Byte[],System.Int32)">
  16822. DES has 16 weak keys. This method will check
  16823. if the given DES key material is weak or semi-weak.
  16824. Key material that is too short is regarded as weak.
  16825. <p>
  16826. See <a href="http://www.counterpane.com/applied.html">"Applied
  16827. Cryptography"</a> by Bruce Schneier for more information.
  16828. </p>
  16829. @return true if the given DES key material is weak or semi-weak,
  16830. false otherwise.
  16831. </member>
  16832. <member name="M:Org.BouncyCastle.Crypto.Parameters.DesParameters.SetOddParity(System.Byte[])">
  16833. DES Keys use the LSB as the odd parity bit. This can
  16834. be used to check for corrupt keys.
  16835. @param bytes the byte array to set the parity on.
  16836. </member>
  16837. <member name="P:Org.BouncyCastle.Crypto.Parameters.DHParameters.M">
  16838. <summary>The minimum bitlength of the private value.</summary>
  16839. </member>
  16840. <member name="P:Org.BouncyCastle.Crypto.Parameters.DHParameters.L">
  16841. <summary>The bitlength of the private value.</summary>
  16842. </member>
  16843. <member name="M:Org.BouncyCastle.Crypto.Parameters.DsaParameterGenerationParameters.#ctor(System.Int32,System.Int32,System.Int32,Org.BouncyCastle.Security.SecureRandom)">
  16844. Construct without a usage index, this will do a random construction of G.
  16845. @param L desired length of prime P in bits (the effective key size).
  16846. @param N desired length of prime Q in bits.
  16847. @param certainty certainty level for prime number generation.
  16848. @param random the source of randomness to use.
  16849. </member>
  16850. <member name="M:Org.BouncyCastle.Crypto.Parameters.DsaParameterGenerationParameters.#ctor(System.Int32,System.Int32,System.Int32,Org.BouncyCastle.Security.SecureRandom,System.Int32)">
  16851. Construct for a specific usage index - this has the effect of using verifiable canonical generation of G.
  16852. @param L desired length of prime P in bits (the effective key size).
  16853. @param N desired length of prime Q in bits.
  16854. @param certainty certainty level for prime number generation.
  16855. @param random the source of randomness to use.
  16856. @param usageIndex a valid usage index.
  16857. </member>
  16858. <member name="P:Org.BouncyCastle.Crypto.Parameters.ElGamalParameters.G">
  16859. return the generator - g
  16860. </member>
  16861. <member name="P:Org.BouncyCastle.Crypto.Parameters.ElGamalParameters.L">
  16862. return private value limit - l
  16863. </member>
  16864. <member name="T:Org.BouncyCastle.Crypto.Parameters.HkdfParameters">
  16865. Parameter class for the HkdfBytesGenerator class.
  16866. </member>
  16867. <member name="M:Org.BouncyCastle.Crypto.Parameters.HkdfParameters.#ctor(System.Byte[],System.Byte[],System.Byte[])">
  16868. Generates parameters for HKDF, specifying both the optional salt and
  16869. optional info. Step 1: Extract won't be skipped.
  16870. @param ikm the input keying material or seed
  16871. @param salt the salt to use, may be null for a salt for hashLen zeros
  16872. @param info the info to use, may be null for an info field of zero bytes
  16873. </member>
  16874. <member name="M:Org.BouncyCastle.Crypto.Parameters.HkdfParameters.SkipExtractParameters(System.Byte[],System.Byte[])">
  16875. Factory method that makes the HKDF skip the extract part of the key
  16876. derivation function.
  16877. @param ikm the input keying material or seed, directly used for step 2:
  16878. Expand
  16879. @param info the info to use, may be null for an info field of zero bytes
  16880. @return HKDFParameters that makes the implementation skip step 1
  16881. </member>
  16882. <member name="M:Org.BouncyCastle.Crypto.Parameters.HkdfParameters.GetIkm">
  16883. Returns the input keying material or seed.
  16884. @return the keying material
  16885. </member>
  16886. <member name="P:Org.BouncyCastle.Crypto.Parameters.HkdfParameters.SkipExtract">
  16887. Returns if step 1: extract has to be skipped or not
  16888. @return true for skipping, false for no skipping of step 1
  16889. </member>
  16890. <member name="M:Org.BouncyCastle.Crypto.Parameters.HkdfParameters.GetSalt">
  16891. Returns the salt, or null if the salt should be generated as a byte array
  16892. of HashLen zeros.
  16893. @return the salt, or null
  16894. </member>
  16895. <member name="M:Org.BouncyCastle.Crypto.Parameters.HkdfParameters.GetInfo">
  16896. Returns the info field, which may be empty (null is converted to empty).
  16897. @return the info field, never null
  16898. </member>
  16899. <member name="T:Org.BouncyCastle.Crypto.Parameters.IesParameters">
  16900. parameters for using an integrated cipher in stream mode.
  16901. </member>
  16902. <member name="M:Org.BouncyCastle.Crypto.Parameters.IesParameters.#ctor(System.Byte[],System.Byte[],System.Int32)">
  16903. @param derivation the derivation parameter for the KDF function.
  16904. @param encoding the encoding parameter for the KDF function.
  16905. @param macKeySize the size of the MAC key (in bits).
  16906. </member>
  16907. <member name="M:Org.BouncyCastle.Crypto.Parameters.IesWithCipherParameters.#ctor(System.Byte[],System.Byte[],System.Int32,System.Int32)">
  16908. @param derivation the derivation parameter for the KDF function.
  16909. @param encoding the encoding parameter for the KDF function.
  16910. @param macKeySize the size of the MAC key (in bits).
  16911. @param cipherKeySize the size of the associated Cipher key (in bits).
  16912. </member>
  16913. <member name="T:Org.BouncyCastle.Crypto.Parameters.Iso18033KdfParameters">
  16914. parameters for Key derivation functions for ISO-18033
  16915. </member>
  16916. <member name="M:Org.BouncyCastle.Crypto.Parameters.KdfCounterParameters.#ctor(System.Byte[],System.Byte[],System.Int32)">
  16917. <summary>
  16918. Base constructor - suffix fixed input data only.
  16919. </summary>
  16920. <param name="ki">the KDF seed</param>
  16921. <param name="fixedInputDataCounterSuffix">fixed input data to follow counter.</param>
  16922. <param name="r">length of the counter in bits</param>
  16923. </member>
  16924. <member name="M:Org.BouncyCastle.Crypto.Parameters.KdfCounterParameters.#ctor(System.Byte[],System.Byte[],System.Byte[],System.Int32)">
  16925. <summary>
  16926. Base constructor - prefix and suffix fixed input data.
  16927. </summary>
  16928. <param name="ki">the KDF seed</param>
  16929. <param name="fixedInputDataCounterPrefix">fixed input data to precede counter</param>
  16930. <param name="fixedInputDataCounterSuffix">fixed input data to follow counter.</param>
  16931. <param name="r">length of the counter in bits.</param>
  16932. </member>
  16933. <member name="T:Org.BouncyCastle.Crypto.Parameters.KdfParameters">
  16934. parameters for Key derivation functions for IEEE P1363a
  16935. </member>
  16936. <member name="T:Org.BouncyCastle.Crypto.Parameters.MgfParameters">
  16937. <remarks>Parameters for mask derivation functions.</remarks>
  16938. </member>
  16939. <member name="T:Org.BouncyCastle.Crypto.Parameters.NaccacheSternKeyGenerationParameters">
  16940. Parameters for NaccacheStern public private key generation. For details on
  16941. this cipher, please see
  16942. http://www.gemplus.com/smart/rd/publications/pdf/NS98pkcs.pdf
  16943. </member>
  16944. <member name="M:Org.BouncyCastle.Crypto.Parameters.NaccacheSternKeyGenerationParameters.#ctor(Org.BouncyCastle.Security.SecureRandom,System.Int32,System.Int32,System.Int32)">
  16945. Parameters for generating a NaccacheStern KeyPair.
  16946. @param random
  16947. The source of randomness
  16948. @param strength
  16949. The desired strength of the Key in Bits
  16950. @param certainty
  16951. the probability that the generated primes are not really prime
  16952. as integer: 2^(-certainty) is then the probability
  16953. @param countSmallPrimes
  16954. How many small key factors are desired
  16955. </member>
  16956. <member name="M:Org.BouncyCastle.Crypto.Parameters.NaccacheSternKeyGenerationParameters.#ctor(Org.BouncyCastle.Security.SecureRandom,System.Int32,System.Int32,System.Int32,System.Boolean)">
  16957. * Parameters for a NaccacheStern KeyPair.
  16958. *
  16959. * @param random
  16960. * The source of randomness
  16961. * @param strength
  16962. * The desired strength of the Key in Bits
  16963. * @param certainty
  16964. * the probability that the generated primes are not really prime
  16965. * as integer: 2^(-certainty) is then the probability
  16966. * @param cntSmallPrimes
  16967. * How many small key factors are desired
  16968. * @param debug
  16969. * Ignored
  16970. </member>
  16971. <member name="P:Org.BouncyCastle.Crypto.Parameters.NaccacheSternKeyGenerationParameters.Certainty">
  16972. @return Returns the certainty.
  16973. </member>
  16974. <member name="P:Org.BouncyCastle.Crypto.Parameters.NaccacheSternKeyGenerationParameters.CountSmallPrimes">
  16975. @return Returns the countSmallPrimes.
  16976. </member>
  16977. <member name="T:Org.BouncyCastle.Crypto.Parameters.NaccacheSternKeyParameters">
  16978. Public key parameters for NaccacheStern cipher. For details on this cipher,
  16979. please see
  16980. http://www.gemplus.com/smart/rd/publications/pdf/NS98pkcs.pdf
  16981. </member>
  16982. <member name="M:Org.BouncyCastle.Crypto.Parameters.NaccacheSternKeyParameters.#ctor(System.Boolean,Org.BouncyCastle.Math.BigInteger,Org.BouncyCastle.Math.BigInteger,System.Int32)">
  16983. @param privateKey
  16984. </member>
  16985. <member name="P:Org.BouncyCastle.Crypto.Parameters.NaccacheSternKeyParameters.G">
  16986. @return Returns the g.
  16987. </member>
  16988. <member name="P:Org.BouncyCastle.Crypto.Parameters.NaccacheSternKeyParameters.LowerSigmaBound">
  16989. @return Returns the lowerSigmaBound.
  16990. </member>
  16991. <member name="P:Org.BouncyCastle.Crypto.Parameters.NaccacheSternKeyParameters.Modulus">
  16992. @return Returns the n.
  16993. </member>
  16994. <member name="T:Org.BouncyCastle.Crypto.Parameters.NaccacheSternPrivateKeyParameters">
  16995. Private key parameters for NaccacheStern cipher. For details on this cipher,
  16996. please see
  16997. http://www.gemplus.com/smart/rd/publications/pdf/NS98pkcs.pdf
  16998. </member>
  16999. <member name="M:Org.BouncyCastle.Crypto.Parameters.NaccacheSternPrivateKeyParameters.#ctor(Org.BouncyCastle.Math.BigInteger,Org.BouncyCastle.Math.BigInteger,System.Int32,System.Collections.IList,Org.BouncyCastle.Math.BigInteger)">
  17000. Constructs a NaccacheSternPrivateKey
  17001. @param g
  17002. the public enryption parameter g
  17003. @param n
  17004. the public modulus n = p*q
  17005. @param lowerSigmaBound
  17006. the public lower sigma bound up to which data can be encrypted
  17007. @param smallPrimes
  17008. the small primes, of which sigma is constructed in the right
  17009. order
  17010. @param phi_n
  17011. the private modulus phi(n) = (p-1)(q-1)
  17012. </member>
  17013. <member name="T:Org.BouncyCastle.Crypto.Parameters.ParametersWithSalt">
  17014. <summary> Cipher parameters with a fixed salt value associated with them.</summary>
  17015. </member>
  17016. <member name="T:Org.BouncyCastle.Crypto.Parameters.SkeinParameters">
  17017. <summary>
  17018. Parameters for the Skein hash function - a series of byte[] strings identified by integer tags.
  17019. </summary>
  17020. <remarks>
  17021. Parameterised Skein can be used for:
  17022. <ul>
  17023. <li>MAC generation, by providing a <see cref="M:Org.BouncyCastle.Crypto.Parameters.SkeinParameters.Builder.SetKey(System.Byte[])">key</see>.</li>
  17024. <li>Randomised hashing, by providing a <see cref="M:Org.BouncyCastle.Crypto.Parameters.SkeinParameters.Builder.SetNonce(System.Byte[])">nonce</see>.</li>
  17025. <li>A hash function for digital signatures, associating a
  17026. <see cref="M:Org.BouncyCastle.Crypto.Parameters.SkeinParameters.Builder.SetPublicKey(System.Byte[])">public key</see> with the message digest.</li>
  17027. <li>A key derivation function, by providing a
  17028. <see cref="M:Org.BouncyCastle.Crypto.Parameters.SkeinParameters.Builder.SetKeyIdentifier(System.Byte[])">key identifier</see>.</li>
  17029. <li>Personalised hashing, by providing a
  17030. <see cref="M:Org.BouncyCastle.Crypto.Parameters.SkeinParameters.Builder.SetPersonalisation(System.DateTime,System.String,System.String)">recommended format</see> or
  17031. <see cref="M:Org.BouncyCastle.Crypto.Parameters.SkeinParameters.Builder.SetPersonalisation(System.Byte[])">arbitrary</see> personalisation string.</li>
  17032. </ul>
  17033. </remarks>
  17034. <seealso cref="T:Org.BouncyCastle.Crypto.Digests.SkeinEngine"/>
  17035. <seealso cref="T:Org.BouncyCastle.Crypto.Digests.SkeinDigest"/>
  17036. <seealso cref="T:Org.BouncyCastle.Crypto.Macs.SkeinMac"/>
  17037. </member>
  17038. <member name="F:Org.BouncyCastle.Crypto.Parameters.SkeinParameters.PARAM_TYPE_KEY">
  17039. <summary>
  17040. The parameter type for a secret key, supporting MAC or KDF functions: 0
  17041. </summary>
  17042. </member>
  17043. <member name="F:Org.BouncyCastle.Crypto.Parameters.SkeinParameters.PARAM_TYPE_CONFIG">
  17044. <summary>
  17045. The parameter type for the Skein configuration block: 4
  17046. </summary>
  17047. </member>
  17048. <member name="F:Org.BouncyCastle.Crypto.Parameters.SkeinParameters.PARAM_TYPE_PERSONALISATION">
  17049. <summary>
  17050. The parameter type for a personalisation string: 8
  17051. </summary>
  17052. </member>
  17053. <member name="F:Org.BouncyCastle.Crypto.Parameters.SkeinParameters.PARAM_TYPE_PUBLIC_KEY">
  17054. <summary>
  17055. The parameter type for a public key: 12
  17056. </summary>
  17057. </member>
  17058. <member name="F:Org.BouncyCastle.Crypto.Parameters.SkeinParameters.PARAM_TYPE_KEY_IDENTIFIER">
  17059. <summary>
  17060. The parameter type for a key identifier string: 16
  17061. </summary>
  17062. </member>
  17063. <member name="F:Org.BouncyCastle.Crypto.Parameters.SkeinParameters.PARAM_TYPE_NONCE">
  17064. <summary>
  17065. The parameter type for a nonce: 20
  17066. </summary>
  17067. </member>
  17068. <member name="F:Org.BouncyCastle.Crypto.Parameters.SkeinParameters.PARAM_TYPE_MESSAGE">
  17069. <summary>
  17070. The parameter type for the message: 48
  17071. </summary>
  17072. </member>
  17073. <member name="F:Org.BouncyCastle.Crypto.Parameters.SkeinParameters.PARAM_TYPE_OUTPUT">
  17074. <summary>
  17075. The parameter type for the output transformation: 63
  17076. </summary>
  17077. </member>
  17078. <member name="M:Org.BouncyCastle.Crypto.Parameters.SkeinParameters.GetParameters">
  17079. <summary>
  17080. Obtains a map of type (int) to value (byte[]) for the parameters tracked in this object.
  17081. </summary>
  17082. </member>
  17083. <member name="M:Org.BouncyCastle.Crypto.Parameters.SkeinParameters.GetKey">
  17084. <summary>
  17085. Obtains the value of the <see cref="F:Org.BouncyCastle.Crypto.Parameters.SkeinParameters.PARAM_TYPE_KEY">key parameter</see>, or <code>null</code> if not
  17086. set.
  17087. </summary>
  17088. <returns>The key.</returns>
  17089. </member>
  17090. <member name="M:Org.BouncyCastle.Crypto.Parameters.SkeinParameters.GetPersonalisation">
  17091. <summary>
  17092. Obtains the value of the <see cref="F:Org.BouncyCastle.Crypto.Parameters.SkeinParameters.PARAM_TYPE_PERSONALISATION">personalisation parameter</see>, or
  17093. <code>null</code> if not set.
  17094. </summary>
  17095. </member>
  17096. <member name="M:Org.BouncyCastle.Crypto.Parameters.SkeinParameters.GetPublicKey">
  17097. <summary>
  17098. Obtains the value of the <see cref="F:Org.BouncyCastle.Crypto.Parameters.SkeinParameters.PARAM_TYPE_PUBLIC_KEY">public key parameter</see>, or
  17099. <code>null</code> if not set.
  17100. </summary>
  17101. </member>
  17102. <member name="M:Org.BouncyCastle.Crypto.Parameters.SkeinParameters.GetKeyIdentifier">
  17103. <summary>
  17104. Obtains the value of the <see cref="F:Org.BouncyCastle.Crypto.Parameters.SkeinParameters.PARAM_TYPE_KEY_IDENTIFIER">key identifier parameter</see>, or
  17105. <code>null</code> if not set.
  17106. </summary>
  17107. </member>
  17108. <member name="M:Org.BouncyCastle.Crypto.Parameters.SkeinParameters.GetNonce">
  17109. <summary>
  17110. Obtains the value of the <see cref="F:Org.BouncyCastle.Crypto.Parameters.SkeinParameters.PARAM_TYPE_NONCE">nonce parameter</see>, or <code>null</code> if
  17111. not set.
  17112. </summary>
  17113. </member>
  17114. <member name="T:Org.BouncyCastle.Crypto.Parameters.SkeinParameters.Builder">
  17115. <summary>
  17116. A builder for <see cref="T:Org.BouncyCastle.Crypto.Parameters.SkeinParameters"/>.
  17117. </summary>
  17118. </member>
  17119. <member name="M:Org.BouncyCastle.Crypto.Parameters.SkeinParameters.Builder.Set(System.Int32,System.Byte[])">
  17120. <summary>
  17121. Sets a parameters to apply to the Skein hash function.
  17122. </summary>
  17123. <remarks>
  17124. Parameter types must be in the range 0,5..62, and cannot use the value 48
  17125. (reserved for message body).
  17126. <p/>
  17127. Parameters with type &lt; 48 are processed before
  17128. the message content, parameters with type &gt; 48
  17129. are processed after the message and prior to output.
  17130. </remarks>
  17131. <param name="type">the type of the parameter, in the range 5..62.</param>
  17132. <param name="value">the byte sequence of the parameter.</param>
  17133. </member>
  17134. <member name="M:Org.BouncyCastle.Crypto.Parameters.SkeinParameters.Builder.SetKey(System.Byte[])">
  17135. <summary>
  17136. Sets the <see cref="F:Org.BouncyCastle.Crypto.Parameters.SkeinParameters.PARAM_TYPE_KEY"/> parameter.
  17137. </summary>
  17138. </member>
  17139. <member name="M:Org.BouncyCastle.Crypto.Parameters.SkeinParameters.Builder.SetPersonalisation(System.Byte[])">
  17140. <summary>
  17141. Sets the <see cref="F:Org.BouncyCastle.Crypto.Parameters.SkeinParameters.PARAM_TYPE_PERSONALISATION"/> parameter.
  17142. </summary>
  17143. </member>
  17144. <member name="M:Org.BouncyCastle.Crypto.Parameters.SkeinParameters.Builder.SetPersonalisation(System.DateTime,System.String,System.String)">
  17145. <summary>
  17146. Implements the recommended personalisation format for Skein defined in Section 4.11 of
  17147. the Skein 1.3 specification.
  17148. </summary>
  17149. <remarks>
  17150. The format is <code>YYYYMMDD email@address distinguisher</code>, encoded to a byte
  17151. sequence using UTF-8 encoding.
  17152. </remarks>
  17153. <param name="date">the date the personalised application of the Skein was defined.</param>
  17154. <param name="emailAddress">the email address of the creation of the personalised application.</param>
  17155. <param name="distinguisher">an arbitrary personalisation string distinguishing the application.</param>
  17156. </member>
  17157. <member name="M:Org.BouncyCastle.Crypto.Parameters.SkeinParameters.Builder.SetPublicKey(System.Byte[])">
  17158. <summary>
  17159. Sets the <see cref="F:Org.BouncyCastle.Crypto.Parameters.SkeinParameters.PARAM_TYPE_KEY_IDENTIFIER"/> parameter.
  17160. </summary>
  17161. </member>
  17162. <member name="M:Org.BouncyCastle.Crypto.Parameters.SkeinParameters.Builder.SetKeyIdentifier(System.Byte[])">
  17163. <summary>
  17164. Sets the <see cref="F:Org.BouncyCastle.Crypto.Parameters.SkeinParameters.PARAM_TYPE_KEY_IDENTIFIER"/> parameter.
  17165. </summary>
  17166. </member>
  17167. <member name="M:Org.BouncyCastle.Crypto.Parameters.SkeinParameters.Builder.SetNonce(System.Byte[])">
  17168. <summary>
  17169. Sets the <see cref="F:Org.BouncyCastle.Crypto.Parameters.SkeinParameters.PARAM_TYPE_NONCE"/> parameter.
  17170. </summary>
  17171. </member>
  17172. <member name="M:Org.BouncyCastle.Crypto.Parameters.SkeinParameters.Builder.Build">
  17173. <summary>
  17174. Constructs a new <see cref="T:Org.BouncyCastle.Crypto.Parameters.SkeinParameters"/> instance with the parameters provided to this
  17175. builder.
  17176. </summary>
  17177. </member>
  17178. <member name="T:Org.BouncyCastle.Crypto.Parameters.SM2KeyExchangePrivateParameters">
  17179. <summary>Private parameters for an SM2 key exchange.</summary>
  17180. <remarks>The ephemeralPrivateKey is used to calculate the random point used in the algorithm.</remarks>
  17181. </member>
  17182. <member name="T:Org.BouncyCastle.Crypto.Parameters.SM2KeyExchangePublicParameters">
  17183. <summary>Public parameters for an SM2 key exchange.</summary>
  17184. <remarks>In this case the ephemeralPublicKey provides the random point used in the algorithm.</remarks>
  17185. </member>
  17186. <member name="T:Org.BouncyCastle.Crypto.Parameters.TweakableBlockCipherParameters">
  17187. <summary>
  17188. Parameters for tweakable block ciphers.
  17189. </summary>
  17190. </member>
  17191. <member name="P:Org.BouncyCastle.Crypto.Parameters.TweakableBlockCipherParameters.Key">
  17192. <summary>
  17193. Gets the key.
  17194. </summary>
  17195. <value>the key to use, or <code>null</code> to use the current key.</value>
  17196. </member>
  17197. <member name="P:Org.BouncyCastle.Crypto.Parameters.TweakableBlockCipherParameters.Tweak">
  17198. <summary>
  17199. Gets the tweak value.
  17200. </summary>
  17201. <value>The tweak to use, or <code>null</code> to use the current tweak.</value>
  17202. </member>
  17203. <member name="T:Org.BouncyCastle.Crypto.PbeParametersGenerator">
  17204. super class for all Password Based Encyrption (Pbe) parameter generator classes.
  17205. </member>
  17206. <member name="M:Org.BouncyCastle.Crypto.PbeParametersGenerator.#ctor">
  17207. base constructor.
  17208. </member>
  17209. <member name="M:Org.BouncyCastle.Crypto.PbeParametersGenerator.Init(System.Byte[],System.Byte[],System.Int32)">
  17210. initialise the Pbe generator.
  17211. @param password the password converted into bytes (see below).
  17212. @param salt the salt to be mixed with the password.
  17213. @param iterationCount the number of iterations the "mixing" function
  17214. is to be applied for.
  17215. </member>
  17216. <member name="M:Org.BouncyCastle.Crypto.PbeParametersGenerator.GetPassword">
  17217. return the password byte array.
  17218. @return the password byte array.
  17219. </member>
  17220. <member name="M:Org.BouncyCastle.Crypto.PbeParametersGenerator.GetSalt">
  17221. return the salt byte array.
  17222. @return the salt byte array.
  17223. </member>
  17224. <member name="P:Org.BouncyCastle.Crypto.PbeParametersGenerator.IterationCount">
  17225. return the iteration count.
  17226. @return the iteration count.
  17227. </member>
  17228. <member name="M:Org.BouncyCastle.Crypto.PbeParametersGenerator.GenerateDerivedParameters(System.Int32)">
  17229. Generate derived parameters for a key of length keySize.
  17230. @param keySize the length, in bits, of the key required.
  17231. @return a parameters object representing a key.
  17232. </member>
  17233. <member name="M:Org.BouncyCastle.Crypto.PbeParametersGenerator.GenerateDerivedParameters(System.Int32,System.Int32)">
  17234. Generate derived parameters for a key of length keySize, and
  17235. an initialisation vector (IV) of length ivSize.
  17236. @param keySize the length, in bits, of the key required.
  17237. @param ivSize the length, in bits, of the iv required.
  17238. @return a parameters object representing a key and an IV.
  17239. </member>
  17240. <member name="M:Org.BouncyCastle.Crypto.PbeParametersGenerator.GenerateDerivedMacParameters(System.Int32)">
  17241. Generate derived parameters for a key of length keySize, specifically
  17242. for use with a MAC.
  17243. @param keySize the length, in bits, of the key required.
  17244. @return a parameters object representing a key.
  17245. </member>
  17246. <member name="M:Org.BouncyCastle.Crypto.PbeParametersGenerator.Pkcs5PasswordToBytes(System.Char[])">
  17247. converts a password to a byte array according to the scheme in
  17248. Pkcs5 (ascii, no padding)
  17249. @param password a character array representing the password.
  17250. @return a byte array representing the password.
  17251. </member>
  17252. <member name="M:Org.BouncyCastle.Crypto.PbeParametersGenerator.Pkcs5PasswordToUtf8Bytes(System.Char[])">
  17253. converts a password to a byte array according to the scheme in
  17254. PKCS5 (UTF-8, no padding)
  17255. @param password a character array representing the password.
  17256. @return a byte array representing the password.
  17257. </member>
  17258. <member name="M:Org.BouncyCastle.Crypto.PbeParametersGenerator.Pkcs12PasswordToBytes(System.Char[])">
  17259. converts a password to a byte array according to the scheme in
  17260. Pkcs12 (unicode, big endian, 2 zero pad bytes at the end).
  17261. @param password a character array representing the password.
  17262. @return a byte array representing the password.
  17263. </member>
  17264. <member name="T:Org.BouncyCastle.Crypto.Prng.BasicEntropySourceProvider">
  17265. An EntropySourceProvider where entropy generation is based on a SecureRandom output using SecureRandom.generateSeed().
  17266. </member>
  17267. <member name="M:Org.BouncyCastle.Crypto.Prng.BasicEntropySourceProvider.#ctor(Org.BouncyCastle.Security.SecureRandom,System.Boolean)">
  17268. Create a entropy source provider based on the passed in SecureRandom.
  17269. @param secureRandom the SecureRandom to base EntropySource construction on.
  17270. @param isPredictionResistant boolean indicating if the SecureRandom is based on prediction resistant entropy or not (true if it is).
  17271. </member>
  17272. <member name="M:Org.BouncyCastle.Crypto.Prng.BasicEntropySourceProvider.Get(System.Int32)">
  17273. Return an entropy source that will create bitsRequired bits of entropy on
  17274. each invocation of getEntropy().
  17275. @param bitsRequired size (in bits) of entropy to be created by the provided source.
  17276. @return an EntropySource that generates bitsRequired bits of entropy on each call to its getEntropy() method.
  17277. </member>
  17278. <member name="T:Org.BouncyCastle.Crypto.Prng.CryptoApiRandomGenerator">
  17279. <summary>
  17280. Uses RandomNumberGenerator.Create() to get randomness generator
  17281. </summary>
  17282. </member>
  17283. <member name="T:Org.BouncyCastle.Crypto.Prng.DigestRandomGenerator">
  17284. Random generation based on the digest with counter. Calling AddSeedMaterial will
  17285. always increase the entropy of the hash.
  17286. <p>
  17287. Internal access to the digest is synchronized so a single one of these can be shared.
  17288. </p>
  17289. </member>
  17290. <member name="T:Org.BouncyCastle.Crypto.Prng.Drbg.CtrSP800Drbg">
  17291. A SP800-90A CTR DRBG.
  17292. </member>
  17293. <member name="M:Org.BouncyCastle.Crypto.Prng.Drbg.CtrSP800Drbg.#ctor(Org.BouncyCastle.Crypto.IBlockCipher,System.Int32,System.Int32,Org.BouncyCastle.Crypto.IEntropySource,System.Byte[],System.Byte[])">
  17294. Construct a SP800-90A CTR DRBG.
  17295. <p>
  17296. Minimum entropy requirement is the security strength requested.
  17297. </p>
  17298. @param engine underlying block cipher to use to support DRBG
  17299. @param keySizeInBits size of the key to use with the block cipher.
  17300. @param securityStrength security strength required (in bits)
  17301. @param entropySource source of entropy to use for seeding/reseeding.
  17302. @param personalizationString personalization string to distinguish this DRBG (may be null).
  17303. @param nonce nonce to further distinguish this DRBG (may be null).
  17304. </member>
  17305. <member name="P:Org.BouncyCastle.Crypto.Prng.Drbg.CtrSP800Drbg.BlockSize">
  17306. Return the block size (in bits) of the DRBG.
  17307. @return the number of bits produced on each internal round of the DRBG.
  17308. </member>
  17309. <member name="M:Org.BouncyCastle.Crypto.Prng.Drbg.CtrSP800Drbg.Generate(System.Byte[],System.Byte[],System.Boolean)">
  17310. Populate a passed in array with random data.
  17311. @param output output array for generated bits.
  17312. @param additionalInput additional input to be added to the DRBG in this step.
  17313. @param predictionResistant true if a reseed should be forced, false otherwise.
  17314. @return number of bits generated, -1 if a reseed required.
  17315. </member>
  17316. <member name="M:Org.BouncyCastle.Crypto.Prng.Drbg.CtrSP800Drbg.Reseed(System.Byte[])">
  17317. Reseed the DRBG.
  17318. @param additionalInput additional input to be added to the DRBG in this step.
  17319. </member>
  17320. <member name="M:Org.BouncyCastle.Crypto.Prng.Drbg.CtrSP800Drbg.PadKey(System.Byte[],System.Int32,System.Byte[],System.Int32)">
  17321. Pad out a key for TDEA, setting odd parity for each byte.
  17322. @param keyMaster
  17323. @param keyOff
  17324. @param tmp
  17325. @param tmpOff
  17326. </member>
  17327. <member name="M:Org.BouncyCastle.Crypto.Prng.Drbg.DrbgUtilities.HashDF(Org.BouncyCastle.Crypto.IDigest,System.Byte[],System.Int32)">
  17328. Used by both Dual EC and Hash.
  17329. </member>
  17330. <member name="T:Org.BouncyCastle.Crypto.Prng.Drbg.HashSP800Drbg">
  17331. A SP800-90A Hash DRBG.
  17332. </member>
  17333. <member name="M:Org.BouncyCastle.Crypto.Prng.Drbg.HashSP800Drbg.#ctor(Org.BouncyCastle.Crypto.IDigest,System.Int32,Org.BouncyCastle.Crypto.IEntropySource,System.Byte[],System.Byte[])">
  17334. Construct a SP800-90A Hash DRBG.
  17335. <p>
  17336. Minimum entropy requirement is the security strength requested.
  17337. </p>
  17338. @param digest source digest to use for DRB stream.
  17339. @param securityStrength security strength required (in bits)
  17340. @param entropySource source of entropy to use for seeding/reseeding.
  17341. @param personalizationString personalization string to distinguish this DRBG (may be null).
  17342. @param nonce nonce to further distinguish this DRBG (may be null).
  17343. </member>
  17344. <member name="P:Org.BouncyCastle.Crypto.Prng.Drbg.HashSP800Drbg.BlockSize">
  17345. Return the block size (in bits) of the DRBG.
  17346. @return the number of bits produced on each internal round of the DRBG.
  17347. </member>
  17348. <member name="M:Org.BouncyCastle.Crypto.Prng.Drbg.HashSP800Drbg.Generate(System.Byte[],System.Byte[],System.Boolean)">
  17349. Populate a passed in array with random data.
  17350. @param output output array for generated bits.
  17351. @param additionalInput additional input to be added to the DRBG in this step.
  17352. @param predictionResistant true if a reseed should be forced, false otherwise.
  17353. @return number of bits generated, -1 if a reseed required.
  17354. </member>
  17355. <member name="M:Org.BouncyCastle.Crypto.Prng.Drbg.HashSP800Drbg.Reseed(System.Byte[])">
  17356. Reseed the DRBG.
  17357. @param additionalInput additional input to be added to the DRBG in this step.
  17358. </member>
  17359. <member name="T:Org.BouncyCastle.Crypto.Prng.Drbg.HMacSP800Drbg">
  17360. A SP800-90A HMAC DRBG.
  17361. </member>
  17362. <member name="M:Org.BouncyCastle.Crypto.Prng.Drbg.HMacSP800Drbg.#ctor(Org.BouncyCastle.Crypto.IMac,System.Int32,Org.BouncyCastle.Crypto.IEntropySource,System.Byte[],System.Byte[])">
  17363. Construct a SP800-90A Hash DRBG.
  17364. <p>
  17365. Minimum entropy requirement is the security strength requested.
  17366. </p>
  17367. @param hMac Hash MAC to base the DRBG on.
  17368. @param securityStrength security strength required (in bits)
  17369. @param entropySource source of entropy to use for seeding/reseeding.
  17370. @param personalizationString personalization string to distinguish this DRBG (may be null).
  17371. @param nonce nonce to further distinguish this DRBG (may be null).
  17372. </member>
  17373. <member name="P:Org.BouncyCastle.Crypto.Prng.Drbg.HMacSP800Drbg.BlockSize">
  17374. Return the block size (in bits) of the DRBG.
  17375. @return the number of bits produced on each round of the DRBG.
  17376. </member>
  17377. <member name="M:Org.BouncyCastle.Crypto.Prng.Drbg.HMacSP800Drbg.Generate(System.Byte[],System.Byte[],System.Boolean)">
  17378. Populate a passed in array with random data.
  17379. @param output output array for generated bits.
  17380. @param additionalInput additional input to be added to the DRBG in this step.
  17381. @param predictionResistant true if a reseed should be forced, false otherwise.
  17382. @return number of bits generated, -1 if a reseed required.
  17383. </member>
  17384. <member name="M:Org.BouncyCastle.Crypto.Prng.Drbg.HMacSP800Drbg.Reseed(System.Byte[])">
  17385. Reseed the DRBG.
  17386. @param additionalInput additional input to be added to the DRBG in this step.
  17387. </member>
  17388. <member name="T:Org.BouncyCastle.Crypto.Prng.Drbg.ISP80090Drbg">
  17389. Interface to SP800-90A deterministic random bit generators.
  17390. </member>
  17391. <member name="P:Org.BouncyCastle.Crypto.Prng.Drbg.ISP80090Drbg.BlockSize">
  17392. Return the block size of the DRBG.
  17393. @return the block size (in bits) produced by each round of the DRBG.
  17394. </member>
  17395. <member name="M:Org.BouncyCastle.Crypto.Prng.Drbg.ISP80090Drbg.Generate(System.Byte[],System.Byte[],System.Boolean)">
  17396. Populate a passed in array with random data.
  17397. @param output output array for generated bits.
  17398. @param additionalInput additional input to be added to the DRBG in this step.
  17399. @param predictionResistant true if a reseed should be forced, false otherwise.
  17400. @return number of bits generated, -1 if a reseed required.
  17401. </member>
  17402. <member name="M:Org.BouncyCastle.Crypto.Prng.Drbg.ISP80090Drbg.Reseed(System.Byte[])">
  17403. Reseed the DRBG.
  17404. @param additionalInput additional input to be added to the DRBG in this step.
  17405. </member>
  17406. <member name="M:Org.BouncyCastle.Crypto.Prng.EntropyUtilities.GenerateSeed(Org.BouncyCastle.Crypto.IEntropySource,System.Int32)">
  17407. Generate numBytes worth of entropy from the passed in entropy source.
  17408. @param entropySource the entropy source to request the data from.
  17409. @param numBytes the number of bytes of entropy requested.
  17410. @return a byte array populated with the random data.
  17411. </member>
  17412. <member name="T:Org.BouncyCastle.Crypto.Prng.IRandomGenerator">
  17413. <remarks>Generic interface for objects generating random bytes.</remarks>
  17414. </member>
  17415. <member name="M:Org.BouncyCastle.Crypto.Prng.IRandomGenerator.AddSeedMaterial(System.Byte[])">
  17416. <summary>Add more seed material to the generator.</summary>
  17417. <param name="seed">A byte array to be mixed into the generator's state.</param>
  17418. </member>
  17419. <member name="M:Org.BouncyCastle.Crypto.Prng.IRandomGenerator.AddSeedMaterial(System.Int64)">
  17420. <summary>Add more seed material to the generator.</summary>
  17421. <param name="seed">A long value to be mixed into the generator's state.</param>
  17422. </member>
  17423. <member name="M:Org.BouncyCastle.Crypto.Prng.IRandomGenerator.NextBytes(System.Byte[])">
  17424. <summary>Fill byte array with random values.</summary>
  17425. <param name="bytes">Array to be filled.</param>
  17426. </member>
  17427. <member name="M:Org.BouncyCastle.Crypto.Prng.IRandomGenerator.NextBytes(System.Byte[],System.Int32,System.Int32)">
  17428. <summary>Fill byte array with random values.</summary>
  17429. <param name="bytes">Array to receive bytes.</param>
  17430. <param name="start">Index to start filling at.</param>
  17431. <param name="len">Length of segment to fill.</param>
  17432. </member>
  17433. <member name="T:Org.BouncyCastle.Crypto.Prng.ReversedWindowGenerator">
  17434. <remarks>
  17435. Takes bytes generated by an underling RandomGenerator and reverses the order in
  17436. each small window (of configurable size).
  17437. <p>
  17438. Access to internals is synchronized so a single one of these can be shared.
  17439. </p>
  17440. </remarks>
  17441. </member>
  17442. <member name="M:Org.BouncyCastle.Crypto.Prng.ReversedWindowGenerator.AddSeedMaterial(System.Byte[])">
  17443. <summary>Add more seed material to the generator.</summary>
  17444. <param name="seed">A byte array to be mixed into the generator's state.</param>
  17445. </member>
  17446. <member name="M:Org.BouncyCastle.Crypto.Prng.ReversedWindowGenerator.AddSeedMaterial(System.Int64)">
  17447. <summary>Add more seed material to the generator.</summary>
  17448. <param name="seed">A long value to be mixed into the generator's state.</param>
  17449. </member>
  17450. <member name="M:Org.BouncyCastle.Crypto.Prng.ReversedWindowGenerator.NextBytes(System.Byte[])">
  17451. <summary>Fill byte array with random values.</summary>
  17452. <param name="bytes">Array to be filled.</param>
  17453. </member>
  17454. <member name="M:Org.BouncyCastle.Crypto.Prng.ReversedWindowGenerator.NextBytes(System.Byte[],System.Int32,System.Int32)">
  17455. <summary>Fill byte array with random values.</summary>
  17456. <param name="bytes">Array to receive bytes.</param>
  17457. <param name="start">Index to start filling at.</param>
  17458. <param name="len">Length of segment to fill.</param>
  17459. </member>
  17460. <member name="M:Org.BouncyCastle.Crypto.Prng.SP800SecureRandom.Reseed(System.Byte[])">
  17461. <summary>Force a reseed of the DRBG.</summary>
  17462. <param name="additionalInput">optional additional input</param>
  17463. </member>
  17464. <member name="T:Org.BouncyCastle.Crypto.Prng.SP800SecureRandomBuilder">
  17465. Builder class for making SecureRandom objects based on SP 800-90A Deterministic Random Bit Generators (DRBG).
  17466. </member>
  17467. <member name="M:Org.BouncyCastle.Crypto.Prng.SP800SecureRandomBuilder.#ctor">
  17468. Basic constructor, creates a builder using an EntropySourceProvider based on the default SecureRandom with
  17469. predictionResistant set to false.
  17470. <p>
  17471. Any SecureRandom created from a builder constructed like this will make use of input passed to SecureRandom.setSeed() if
  17472. the default SecureRandom does for its generateSeed() call.
  17473. </p>
  17474. </member>
  17475. <member name="M:Org.BouncyCastle.Crypto.Prng.SP800SecureRandomBuilder.#ctor(Org.BouncyCastle.Security.SecureRandom,System.Boolean)">
  17476. Construct a builder with an EntropySourceProvider based on the passed in SecureRandom and the passed in value
  17477. for prediction resistance.
  17478. <p>
  17479. Any SecureRandom created from a builder constructed like this will make use of input passed to SecureRandom.setSeed() if
  17480. the passed in SecureRandom does for its generateSeed() call.
  17481. </p>
  17482. @param entropySource
  17483. @param predictionResistant
  17484. </member>
  17485. <member name="M:Org.BouncyCastle.Crypto.Prng.SP800SecureRandomBuilder.#ctor(Org.BouncyCastle.Crypto.IEntropySourceProvider)">
  17486. Create a builder which makes creates the SecureRandom objects from a specified entropy source provider.
  17487. <p>
  17488. <b>Note:</b> If this constructor is used any calls to setSeed() in the resulting SecureRandom will be ignored.
  17489. </p>
  17490. @param entropySourceProvider a provider of EntropySource objects.
  17491. </member>
  17492. <member name="M:Org.BouncyCastle.Crypto.Prng.SP800SecureRandomBuilder.SetPersonalizationString(System.Byte[])">
  17493. Set the personalization string for DRBG SecureRandoms created by this builder
  17494. @param personalizationString the personalisation string for the underlying DRBG.
  17495. @return the current builder.
  17496. </member>
  17497. <member name="M:Org.BouncyCastle.Crypto.Prng.SP800SecureRandomBuilder.SetSecurityStrength(System.Int32)">
  17498. Set the security strength required for DRBGs used in building SecureRandom objects.
  17499. @param securityStrength the security strength (in bits)
  17500. @return the current builder.
  17501. </member>
  17502. <member name="M:Org.BouncyCastle.Crypto.Prng.SP800SecureRandomBuilder.SetEntropyBitsRequired(System.Int32)">
  17503. Set the amount of entropy bits required for seeding and reseeding DRBGs used in building SecureRandom objects.
  17504. @param entropyBitsRequired the number of bits of entropy to be requested from the entropy source on each seed/reseed.
  17505. @return the current builder.
  17506. </member>
  17507. <member name="M:Org.BouncyCastle.Crypto.Prng.SP800SecureRandomBuilder.BuildHash(Org.BouncyCastle.Crypto.IDigest,System.Byte[],System.Boolean)">
  17508. Build a SecureRandom based on a SP 800-90A Hash DRBG.
  17509. @param digest digest algorithm to use in the DRBG underneath the SecureRandom.
  17510. @param nonce nonce value to use in DRBG construction.
  17511. @param predictionResistant specify whether the underlying DRBG in the resulting SecureRandom should reseed on each request for bytes.
  17512. @return a SecureRandom supported by a Hash DRBG.
  17513. </member>
  17514. <member name="M:Org.BouncyCastle.Crypto.Prng.SP800SecureRandomBuilder.BuildCtr(Org.BouncyCastle.Crypto.IBlockCipher,System.Int32,System.Byte[],System.Boolean)">
  17515. Build a SecureRandom based on a SP 800-90A CTR DRBG.
  17516. @param cipher the block cipher to base the DRBG on.
  17517. @param keySizeInBits key size in bits to be used with the block cipher.
  17518. @param nonce nonce value to use in DRBG construction.
  17519. @param predictionResistant specify whether the underlying DRBG in the resulting SecureRandom should reseed on each request for bytes.
  17520. @return a SecureRandom supported by a CTR DRBG.
  17521. </member>
  17522. <member name="M:Org.BouncyCastle.Crypto.Prng.SP800SecureRandomBuilder.BuildHMac(Org.BouncyCastle.Crypto.IMac,System.Byte[],System.Boolean)">
  17523. Build a SecureRandom based on a SP 800-90A HMAC DRBG.
  17524. @param hMac HMAC algorithm to use in the DRBG underneath the SecureRandom.
  17525. @param nonce nonce value to use in DRBG construction.
  17526. @param predictionResistant specify whether the underlying DRBG in the resulting SecureRandom should reseed on each request for bytes.
  17527. @return a SecureRandom supported by a HMAC DRBG.
  17528. </member>
  17529. <member name="T:Org.BouncyCastle.Crypto.Prng.ThreadedSeedGenerator">
  17530. A thread based seed generator - one source of randomness.
  17531. <p>
  17532. Based on an idea from Marcus Lippert.
  17533. </p>
  17534. </member>
  17535. <member name="M:Org.BouncyCastle.Crypto.Prng.ThreadedSeedGenerator.GenerateSeed(System.Int32,System.Boolean)">
  17536. Generate seed bytes. Set fast to false for best quality.
  17537. <p>
  17538. If fast is set to true, the code should be round about 8 times faster when
  17539. generating a long sequence of random bytes. 20 bytes of random values using
  17540. the fast mode take less than half a second on a Nokia e70. If fast is set to false,
  17541. it takes round about 2500 ms.
  17542. </p>
  17543. @param numBytes the number of bytes to generate
  17544. @param fast true if fast mode should be used
  17545. </member>
  17546. <member name="F:Org.BouncyCastle.Crypto.Prng.VmpcRandomGenerator.P">
  17547. <remarks>
  17548. Permutation generated by code:
  17549. <code>
  17550. // First 1850 fractional digit of Pi number.
  17551. byte[] key = new BigInteger("14159265358979323846...5068006422512520511").ToByteArray();
  17552. s = 0;
  17553. P = new byte[256];
  17554. for (int i = 0; i &lt; 256; i++)
  17555. {
  17556. P[i] = (byte) i;
  17557. }
  17558. for (int m = 0; m &lt; 768; m++)
  17559. {
  17560. s = P[(s + P[m &amp; 0xff] + key[m % key.length]) &amp; 0xff];
  17561. byte temp = P[m &amp; 0xff];
  17562. P[m &amp; 0xff] = P[s &amp; 0xff];
  17563. P[s &amp; 0xff] = temp;
  17564. } </code>
  17565. </remarks>
  17566. </member>
  17567. <member name="F:Org.BouncyCastle.Crypto.Prng.VmpcRandomGenerator.s">
  17568. <remarks>Value generated in the same way as <c>P</c>.</remarks>
  17569. </member>
  17570. <member name="M:Org.BouncyCastle.Crypto.Prng.X931Rng.#ctor(Org.BouncyCastle.Crypto.IBlockCipher,System.Byte[],Org.BouncyCastle.Crypto.IEntropySource)">
  17571. @param engine
  17572. @param entropySource
  17573. </member>
  17574. <member name="M:Org.BouncyCastle.Crypto.Prng.X931Rng.Generate(System.Byte[],System.Boolean)">
  17575. Populate a passed in array with random data.
  17576. @param output output array for generated bits.
  17577. @param predictionResistant true if a reseed should be forced, false otherwise.
  17578. @return number of bits generated, -1 if a reseed required.
  17579. </member>
  17580. <member name="M:Org.BouncyCastle.Crypto.Prng.X931Rng.Reseed">
  17581. Reseed the RNG.
  17582. </member>
  17583. <member name="M:Org.BouncyCastle.Crypto.Prng.X931SecureRandomBuilder.#ctor">
  17584. Basic constructor, creates a builder using an EntropySourceProvider based on the default SecureRandom with
  17585. predictionResistant set to false.
  17586. <p>
  17587. Any SecureRandom created from a builder constructed like this will make use of input passed to SecureRandom.setSeed() if
  17588. the default SecureRandom does for its generateSeed() call.
  17589. </p>
  17590. </member>
  17591. <member name="M:Org.BouncyCastle.Crypto.Prng.X931SecureRandomBuilder.#ctor(Org.BouncyCastle.Security.SecureRandom,System.Boolean)">
  17592. Construct a builder with an EntropySourceProvider based on the passed in SecureRandom and the passed in value
  17593. for prediction resistance.
  17594. <p>
  17595. Any SecureRandom created from a builder constructed like this will make use of input passed to SecureRandom.setSeed() if
  17596. the passed in SecureRandom does for its generateSeed() call.
  17597. </p>
  17598. @param entropySource
  17599. @param predictionResistant
  17600. </member>
  17601. <member name="M:Org.BouncyCastle.Crypto.Prng.X931SecureRandomBuilder.#ctor(Org.BouncyCastle.Crypto.IEntropySourceProvider)">
  17602. Create a builder which makes creates the SecureRandom objects from a specified entropy source provider.
  17603. <p>
  17604. <b>Note:</b> If this constructor is used any calls to setSeed() in the resulting SecureRandom will be ignored.
  17605. </p>
  17606. @param entropySourceProvider a provider of EntropySource objects.
  17607. </member>
  17608. <member name="M:Org.BouncyCastle.Crypto.Prng.X931SecureRandomBuilder.Build(Org.BouncyCastle.Crypto.IBlockCipher,Org.BouncyCastle.Crypto.Parameters.KeyParameter,System.Boolean)">
  17609. Construct a X9.31 secure random generator using the passed in engine and key. If predictionResistant is true the
  17610. generator will be reseeded on each request.
  17611. @param engine a block cipher to use as the operator.
  17612. @param key the block cipher key to initialise engine with.
  17613. @param predictionResistant true if engine to be reseeded on each use, false otherwise.
  17614. @return a SecureRandom.
  17615. </member>
  17616. <member name="M:Org.BouncyCastle.Crypto.Signers.DsaDigestSigner.Update(System.Byte)">
  17617. update the internal digest with the byte b
  17618. </member>
  17619. <member name="M:Org.BouncyCastle.Crypto.Signers.DsaDigestSigner.BlockUpdate(System.Byte[],System.Int32,System.Int32)">
  17620. update the internal digest with the byte array in
  17621. </member>
  17622. <member name="M:Org.BouncyCastle.Crypto.Signers.DsaDigestSigner.GenerateSignature">
  17623. Generate a signature for the message we've been loaded with using
  17624. the key we were initialised with.
  17625. </member>
  17626. <member name="M:Org.BouncyCastle.Crypto.Signers.DsaDigestSigner.VerifySignature(System.Byte[])">
  17627. <returns>true if the internal state represents the signature described in the passed in array.</returns>
  17628. </member>
  17629. <member name="M:Org.BouncyCastle.Crypto.Signers.DsaDigestSigner.Reset">
  17630. <summary>Reset the internal state</summary>
  17631. </member>
  17632. <member name="T:Org.BouncyCastle.Crypto.Signers.DsaSigner">
  17633. The Digital Signature Algorithm - as described in "Handbook of Applied
  17634. Cryptography", pages 452 - 453.
  17635. </member>
  17636. <member name="M:Org.BouncyCastle.Crypto.Signers.DsaSigner.#ctor">
  17637. Default configuration, random K values.
  17638. </member>
  17639. <member name="M:Org.BouncyCastle.Crypto.Signers.DsaSigner.#ctor(Org.BouncyCastle.Crypto.Signers.IDsaKCalculator)">
  17640. Configuration with an alternate, possibly deterministic calculator of K.
  17641. @param kCalculator a K value calculator.
  17642. </member>
  17643. <member name="M:Org.BouncyCastle.Crypto.Signers.DsaSigner.GenerateSignature(System.Byte[])">
  17644. Generate a signature for the given message using the key we were
  17645. initialised with. For conventional DSA the message should be a SHA-1
  17646. hash of the message of interest.
  17647. @param message the message that will be verified later.
  17648. </member>
  17649. <member name="M:Org.BouncyCastle.Crypto.Signers.DsaSigner.VerifySignature(System.Byte[],Org.BouncyCastle.Math.BigInteger,Org.BouncyCastle.Math.BigInteger)">
  17650. return true if the value r and s represent a DSA signature for
  17651. the passed in message for standard DSA the message should be a
  17652. SHA-1 hash of the real message to be verified.
  17653. </member>
  17654. <member name="T:Org.BouncyCastle.Crypto.Signers.ECDsaSigner">
  17655. EC-DSA as described in X9.62
  17656. </member>
  17657. <member name="M:Org.BouncyCastle.Crypto.Signers.ECDsaSigner.#ctor">
  17658. Default configuration, random K values.
  17659. </member>
  17660. <member name="M:Org.BouncyCastle.Crypto.Signers.ECDsaSigner.#ctor(Org.BouncyCastle.Crypto.Signers.IDsaKCalculator)">
  17661. Configuration with an alternate, possibly deterministic calculator of K.
  17662. @param kCalculator a K value calculator.
  17663. </member>
  17664. <member name="M:Org.BouncyCastle.Crypto.Signers.ECDsaSigner.GenerateSignature(System.Byte[])">
  17665. Generate a signature for the given message using the key we were
  17666. initialised with. For conventional DSA the message should be a SHA-1
  17667. hash of the message of interest.
  17668. @param message the message that will be verified later.
  17669. </member>
  17670. <member name="M:Org.BouncyCastle.Crypto.Signers.ECDsaSigner.VerifySignature(System.Byte[],Org.BouncyCastle.Math.BigInteger,Org.BouncyCastle.Math.BigInteger)">
  17671. return true if the value r and s represent a DSA signature for
  17672. the passed in message (for standard DSA the message should be
  17673. a SHA-1 hash of the real message to be verified).
  17674. </member>
  17675. <member name="T:Org.BouncyCastle.Crypto.Signers.ECGost3410Signer">
  17676. GOST R 34.10-2001 Signature Algorithm
  17677. </member>
  17678. <member name="M:Org.BouncyCastle.Crypto.Signers.ECGost3410Signer.GenerateSignature(System.Byte[])">
  17679. generate a signature for the given message using the key we were
  17680. initialised with. For conventional GOST3410 the message should be a GOST3411
  17681. hash of the message of interest.
  17682. @param message the message that will be verified later.
  17683. </member>
  17684. <member name="M:Org.BouncyCastle.Crypto.Signers.ECGost3410Signer.VerifySignature(System.Byte[],Org.BouncyCastle.Math.BigInteger,Org.BouncyCastle.Math.BigInteger)">
  17685. return true if the value r and s represent a GOST3410 signature for
  17686. the passed in message (for standard GOST3410 the message should be
  17687. a GOST3411 hash of the real message to be verified).
  17688. </member>
  17689. <member name="T:Org.BouncyCastle.Crypto.Signers.ECNRSigner">
  17690. EC-NR as described in IEEE 1363-2000
  17691. </member>
  17692. <member name="M:Org.BouncyCastle.Crypto.Signers.ECNRSigner.GenerateSignature(System.Byte[])">
  17693. generate a signature for the given message using the key we were
  17694. initialised with. Generally, the order of the curve should be at
  17695. least as long as the hash of the message of interest, and with
  17696. ECNR it *must* be at least as long.
  17697. @param digest the digest to be signed.
  17698. @exception DataLengthException if the digest is longer than the key allows
  17699. </member>
  17700. <member name="M:Org.BouncyCastle.Crypto.Signers.ECNRSigner.VerifySignature(System.Byte[],Org.BouncyCastle.Math.BigInteger,Org.BouncyCastle.Math.BigInteger)">
  17701. return true if the value r and s represent a signature for the
  17702. message passed in. Generally, the order of the curve should be at
  17703. least as long as the hash of the message of interest, and with
  17704. ECNR, it *must* be at least as long. But just in case the signer
  17705. applied mod(n) to the longer digest, this implementation will
  17706. apply mod(n) during verification.
  17707. @param digest the digest to be verified.
  17708. @param r the r value of the signature.
  17709. @param s the s value of the signature.
  17710. @exception DataLengthException if the digest is longer than the key allows
  17711. </member>
  17712. <member name="M:Org.BouncyCastle.Crypto.Signers.GenericSigner.Init(System.Boolean,Org.BouncyCastle.Crypto.ICipherParameters)">
  17713. initialise the signer for signing or verification.
  17714. @param forSigning
  17715. true if for signing, false otherwise
  17716. @param parameters
  17717. necessary parameters.
  17718. </member>
  17719. <member name="M:Org.BouncyCastle.Crypto.Signers.GenericSigner.Update(System.Byte)">
  17720. update the internal digest with the byte b
  17721. </member>
  17722. <member name="M:Org.BouncyCastle.Crypto.Signers.GenericSigner.BlockUpdate(System.Byte[],System.Int32,System.Int32)">
  17723. update the internal digest with the byte array in
  17724. </member>
  17725. <member name="M:Org.BouncyCastle.Crypto.Signers.GenericSigner.GenerateSignature">
  17726. Generate a signature for the message we've been loaded with using the key
  17727. we were initialised with.
  17728. </member>
  17729. <member name="M:Org.BouncyCastle.Crypto.Signers.GenericSigner.VerifySignature(System.Byte[])">
  17730. return true if the internal state represents the signature described in
  17731. the passed in array.
  17732. </member>
  17733. <member name="M:Org.BouncyCastle.Crypto.Signers.Gost3410DigestSigner.Update(System.Byte)">
  17734. update the internal digest with the byte b
  17735. </member>
  17736. <member name="M:Org.BouncyCastle.Crypto.Signers.Gost3410DigestSigner.BlockUpdate(System.Byte[],System.Int32,System.Int32)">
  17737. update the internal digest with the byte array in
  17738. </member>
  17739. <member name="M:Org.BouncyCastle.Crypto.Signers.Gost3410DigestSigner.GenerateSignature">
  17740. Generate a signature for the message we've been loaded with using
  17741. the key we were initialised with.
  17742. </member>
  17743. <member name="M:Org.BouncyCastle.Crypto.Signers.Gost3410DigestSigner.VerifySignature(System.Byte[])">
  17744. <returns>true if the internal state represents the signature described in the passed in array.</returns>
  17745. </member>
  17746. <member name="M:Org.BouncyCastle.Crypto.Signers.Gost3410DigestSigner.Reset">
  17747. <summary>Reset the internal state</summary>
  17748. </member>
  17749. <member name="T:Org.BouncyCastle.Crypto.Signers.Gost3410Signer">
  17750. Gost R 34.10-94 Signature Algorithm
  17751. </member>
  17752. <member name="M:Org.BouncyCastle.Crypto.Signers.Gost3410Signer.GenerateSignature(System.Byte[])">
  17753. generate a signature for the given message using the key we were
  17754. initialised with. For conventional Gost3410 the message should be a Gost3411
  17755. hash of the message of interest.
  17756. @param message the message that will be verified later.
  17757. </member>
  17758. <member name="M:Org.BouncyCastle.Crypto.Signers.Gost3410Signer.VerifySignature(System.Byte[],Org.BouncyCastle.Math.BigInteger,Org.BouncyCastle.Math.BigInteger)">
  17759. return true if the value r and s represent a Gost3410 signature for
  17760. the passed in message for standard Gost3410 the message should be a
  17761. Gost3411 hash of the real message to be verified.
  17762. </member>
  17763. <member name="T:Org.BouncyCastle.Crypto.Signers.HMacDsaKCalculator">
  17764. A deterministic K calculator based on the algorithm in section 3.2 of RFC 6979.
  17765. </member>
  17766. <member name="M:Org.BouncyCastle.Crypto.Signers.HMacDsaKCalculator.#ctor(Org.BouncyCastle.Crypto.IDigest)">
  17767. Base constructor.
  17768. @param digest digest to build the HMAC on.
  17769. </member>
  17770. <member name="T:Org.BouncyCastle.Crypto.Signers.IDsaEncoding">
  17771. <summary>
  17772. An interface for different encoding formats for DSA signatures.
  17773. </summary>
  17774. </member>
  17775. <member name="M:Org.BouncyCastle.Crypto.Signers.IDsaEncoding.Decode(Org.BouncyCastle.Math.BigInteger,System.Byte[])">
  17776. <summary>Decode the (r, s) pair of a DSA signature.</summary>
  17777. <param name="n">The order of the group that r, s belong to.</param>
  17778. <param name="encoding">An encoding of the (r, s) pair of a DSA signature.</param>
  17779. <returns>The (r, s) of a DSA signature, stored in an array of exactly two elements, r followed by s.</returns>
  17780. </member>
  17781. <member name="M:Org.BouncyCastle.Crypto.Signers.IDsaEncoding.Encode(Org.BouncyCastle.Math.BigInteger,Org.BouncyCastle.Math.BigInteger,Org.BouncyCastle.Math.BigInteger)">
  17782. <summary>Encode the (r, s) pair of a DSA signature.</summary>
  17783. <param name="n">The order of the group that r, s belong to.</param>
  17784. <param name="r">The r value of a DSA signature.</param>
  17785. <param name="s">The s value of a DSA signature.</param>
  17786. <returns>An encoding of the DSA signature given by the provided (r, s) pair.</returns>
  17787. </member>
  17788. <member name="T:Org.BouncyCastle.Crypto.Signers.IDsaKCalculator">
  17789. Interface define calculators of K values for DSA/ECDSA.
  17790. </member>
  17791. <member name="P:Org.BouncyCastle.Crypto.Signers.IDsaKCalculator.IsDeterministic">
  17792. Return true if this calculator is deterministic, false otherwise.
  17793. @return true if deterministic, otherwise false.
  17794. </member>
  17795. <member name="M:Org.BouncyCastle.Crypto.Signers.IDsaKCalculator.Init(Org.BouncyCastle.Math.BigInteger,Org.BouncyCastle.Security.SecureRandom)">
  17796. Non-deterministic initialiser.
  17797. @param n the order of the DSA group.
  17798. @param random a source of randomness.
  17799. </member>
  17800. <member name="M:Org.BouncyCastle.Crypto.Signers.IDsaKCalculator.Init(Org.BouncyCastle.Math.BigInteger,Org.BouncyCastle.Math.BigInteger,System.Byte[])">
  17801. Deterministic initialiser.
  17802. @param n the order of the DSA group.
  17803. @param d the DSA private value.
  17804. @param message the message being signed.
  17805. </member>
  17806. <member name="M:Org.BouncyCastle.Crypto.Signers.IDsaKCalculator.NextK">
  17807. Return the next valid value of K.
  17808. @return a K value.
  17809. </member>
  17810. <member name="T:Org.BouncyCastle.Crypto.Signers.Iso9796d2PssSigner">
  17811. <summary> ISO9796-2 - mechanism using a hash function with recovery (scheme 2 and 3).
  17812. <p>
  17813. Note: the usual length for the salt is the length of the hash
  17814. function used in bytes.</p>
  17815. </summary>
  17816. </member>
  17817. <member name="M:Org.BouncyCastle.Crypto.Signers.Iso9796d2PssSigner.GetRecoveredMessage">
  17818. <summary>
  17819. Return a reference to the recoveredMessage message.
  17820. </summary>
  17821. <returns>The full/partial recoveredMessage message.</returns>
  17822. <seealso cref="M:Org.BouncyCastle.Crypto.ISignerWithRecovery.GetRecoveredMessage"/>
  17823. </member>
  17824. <member name="M:Org.BouncyCastle.Crypto.Signers.Iso9796d2PssSigner.#ctor(Org.BouncyCastle.Crypto.IAsymmetricBlockCipher,Org.BouncyCastle.Crypto.IDigest,System.Int32,System.Boolean)">
  17825. <summary>
  17826. Generate a signer with either implicit or explicit trailers for ISO9796-2, scheme 2 or 3.
  17827. </summary>
  17828. <param name="cipher">base cipher to use for signature creation/verification</param>
  17829. <param name="digest">digest to use.</param>
  17830. <param name="saltLength">length of salt in bytes.</param>
  17831. <param name="isImplicit">whether or not the trailer is implicit or gives the hash.</param>
  17832. </member>
  17833. <member name="M:Org.BouncyCastle.Crypto.Signers.Iso9796d2PssSigner.#ctor(Org.BouncyCastle.Crypto.IAsymmetricBlockCipher,Org.BouncyCastle.Crypto.IDigest,System.Int32)">
  17834. <summary> Constructor for a signer with an explicit digest trailer.
  17835. </summary>
  17836. <param name="cipher">cipher to use.
  17837. </param>
  17838. <param name="digest">digest to sign with.
  17839. </param>
  17840. <param name="saltLength">length of salt in bytes.
  17841. </param>
  17842. </member>
  17843. <member name="M:Org.BouncyCastle.Crypto.Signers.Iso9796d2PssSigner.Init(System.Boolean,Org.BouncyCastle.Crypto.ICipherParameters)">
  17844. <summary>Initialise the signer.</summary>
  17845. <param name="forSigning">true if for signing, false if for verification.</param>
  17846. <param name="parameters">parameters for signature generation/verification. If the
  17847. parameters are for generation they should be a ParametersWithRandom,
  17848. a ParametersWithSalt, or just an RsaKeyParameters object. If RsaKeyParameters
  17849. are passed in a SecureRandom will be created.
  17850. </param>
  17851. <exception cref="T:System.ArgumentException">if wrong parameter type or a fixed
  17852. salt is passed in which is the wrong length.
  17853. </exception>
  17854. </member>
  17855. <member name="M:Org.BouncyCastle.Crypto.Signers.Iso9796d2PssSigner.IsSameAs(System.Byte[],System.Byte[])">
  17856. <summary> compare two byte arrays - constant time.</summary>
  17857. </member>
  17858. <member name="M:Org.BouncyCastle.Crypto.Signers.Iso9796d2PssSigner.ClearBlock(System.Byte[])">
  17859. <summary> clear possible sensitive data</summary>
  17860. </member>
  17861. <member name="M:Org.BouncyCastle.Crypto.Signers.Iso9796d2PssSigner.Update(System.Byte)">
  17862. <summary> update the internal digest with the byte b</summary>
  17863. </member>
  17864. <member name="M:Org.BouncyCastle.Crypto.Signers.Iso9796d2PssSigner.BlockUpdate(System.Byte[],System.Int32,System.Int32)">
  17865. <summary> update the internal digest with the byte array in</summary>
  17866. </member>
  17867. <member name="M:Org.BouncyCastle.Crypto.Signers.Iso9796d2PssSigner.Reset">
  17868. <summary> reset the internal state</summary>
  17869. </member>
  17870. <member name="M:Org.BouncyCastle.Crypto.Signers.Iso9796d2PssSigner.GenerateSignature">
  17871. <summary> Generate a signature for the loaded message using the key we were
  17872. initialised with.
  17873. </summary>
  17874. </member>
  17875. <member name="M:Org.BouncyCastle.Crypto.Signers.Iso9796d2PssSigner.VerifySignature(System.Byte[])">
  17876. <summary> return true if the signature represents a ISO9796-2 signature
  17877. for the passed in message.
  17878. </summary>
  17879. </member>
  17880. <member name="M:Org.BouncyCastle.Crypto.Signers.Iso9796d2PssSigner.HasFullMessage">
  17881. <summary>
  17882. Return true if the full message was recoveredMessage.
  17883. </summary>
  17884. <returns>true on full message recovery, false otherwise, or if not sure.</returns>
  17885. <seealso cref="M:Org.BouncyCastle.Crypto.ISignerWithRecovery.HasFullMessage"/>
  17886. </member>
  17887. <member name="M:Org.BouncyCastle.Crypto.Signers.Iso9796d2PssSigner.ItoOSP(System.Int32,System.Byte[])">
  17888. <summary> int to octet string.</summary>
  17889. <summary> int to octet string.</summary>
  17890. </member>
  17891. <member name="M:Org.BouncyCastle.Crypto.Signers.Iso9796d2PssSigner.LtoOSP(System.Int64,System.Byte[])">
  17892. <summary> long to octet string.</summary>
  17893. </member>
  17894. <member name="M:Org.BouncyCastle.Crypto.Signers.Iso9796d2PssSigner.MaskGeneratorFunction1(System.Byte[],System.Int32,System.Int32,System.Int32)">
  17895. <summary> mask generator function, as described in Pkcs1v2.</summary>
  17896. </member>
  17897. <member name="T:Org.BouncyCastle.Crypto.Signers.Iso9796d2Signer">
  17898. <summary> ISO9796-2 - mechanism using a hash function with recovery (scheme 1)</summary>
  17899. </member>
  17900. <member name="M:Org.BouncyCastle.Crypto.Signers.Iso9796d2Signer.GetRecoveredMessage">
  17901. <summary>
  17902. Return a reference to the recoveredMessage message.
  17903. </summary>
  17904. <returns>The full/partial recoveredMessage message.</returns>
  17905. <seealso cref="M:Org.BouncyCastle.Crypto.ISignerWithRecovery.GetRecoveredMessage"/>
  17906. </member>
  17907. <member name="M:Org.BouncyCastle.Crypto.Signers.Iso9796d2Signer.#ctor(Org.BouncyCastle.Crypto.IAsymmetricBlockCipher,Org.BouncyCastle.Crypto.IDigest,System.Boolean)">
  17908. <summary>
  17909. Generate a signer with either implicit or explicit trailers for ISO9796-2.
  17910. </summary>
  17911. <param name="cipher">base cipher to use for signature creation/verification</param>
  17912. <param name="digest">digest to use.</param>
  17913. <param name="isImplicit">whether or not the trailer is implicit or gives the hash.</param>
  17914. </member>
  17915. <member name="M:Org.BouncyCastle.Crypto.Signers.Iso9796d2Signer.#ctor(Org.BouncyCastle.Crypto.IAsymmetricBlockCipher,Org.BouncyCastle.Crypto.IDigest)">
  17916. <summary> Constructor for a signer with an explicit digest trailer.
  17917. </summary>
  17918. <param name="cipher">cipher to use.
  17919. </param>
  17920. <param name="digest">digest to sign with.
  17921. </param>
  17922. </member>
  17923. <member name="M:Org.BouncyCastle.Crypto.Signers.Iso9796d2Signer.IsSameAs(System.Byte[],System.Byte[])">
  17924. <summary> compare two byte arrays - constant time.</summary>
  17925. </member>
  17926. <member name="M:Org.BouncyCastle.Crypto.Signers.Iso9796d2Signer.ClearBlock(System.Byte[])">
  17927. <summary> clear possible sensitive data</summary>
  17928. </member>
  17929. <member name="M:Org.BouncyCastle.Crypto.Signers.Iso9796d2Signer.Update(System.Byte)">
  17930. <summary> update the internal digest with the byte b</summary>
  17931. </member>
  17932. <member name="M:Org.BouncyCastle.Crypto.Signers.Iso9796d2Signer.BlockUpdate(System.Byte[],System.Int32,System.Int32)">
  17933. <summary> update the internal digest with the byte array in</summary>
  17934. </member>
  17935. <member name="M:Org.BouncyCastle.Crypto.Signers.Iso9796d2Signer.Reset">
  17936. <summary> reset the internal state</summary>
  17937. </member>
  17938. <member name="M:Org.BouncyCastle.Crypto.Signers.Iso9796d2Signer.GenerateSignature">
  17939. <summary> Generate a signature for the loaded message using the key we were
  17940. initialised with.
  17941. </summary>
  17942. </member>
  17943. <member name="M:Org.BouncyCastle.Crypto.Signers.Iso9796d2Signer.VerifySignature(System.Byte[])">
  17944. <summary> return true if the signature represents a ISO9796-2 signature
  17945. for the passed in message.
  17946. </summary>
  17947. </member>
  17948. <member name="M:Org.BouncyCastle.Crypto.Signers.Iso9796d2Signer.HasFullMessage">
  17949. <summary>
  17950. Return true if the full message was recoveredMessage.
  17951. </summary>
  17952. <returns> true on full message recovery, false otherwise.</returns>
  17953. <seealso cref="M:Org.BouncyCastle.Crypto.ISignerWithRecovery.HasFullMessage"/>
  17954. </member>
  17955. <member name="T:Org.BouncyCastle.Crypto.Signers.PssSigner">
  17956. <summary> RSA-PSS as described in Pkcs# 1 v 2.1.
  17957. <p>
  17958. Note: the usual value for the salt length is the number of
  17959. bytes in the hash function.</p>
  17960. </summary>
  17961. </member>
  17962. <member name="M:Org.BouncyCastle.Crypto.Signers.PssSigner.#ctor(Org.BouncyCastle.Crypto.IAsymmetricBlockCipher,Org.BouncyCastle.Crypto.IDigest,System.Int32)">
  17963. <summary>Basic constructor</summary>
  17964. <param name="cipher">the asymmetric cipher to use.</param>
  17965. <param name="digest">the digest to use.</param>
  17966. <param name="saltLen">the length of the salt to use (in bytes).</param>
  17967. </member>
  17968. <member name="M:Org.BouncyCastle.Crypto.Signers.PssSigner.#ctor(Org.BouncyCastle.Crypto.IAsymmetricBlockCipher,Org.BouncyCastle.Crypto.IDigest,System.Byte[])">
  17969. <summary>Basic constructor</summary>
  17970. <param name="cipher">the asymmetric cipher to use.</param>
  17971. <param name="digest">the digest to use.</param>
  17972. <param name="salt">the fixed salt to be used.</param>
  17973. </member>
  17974. <member name="M:Org.BouncyCastle.Crypto.Signers.PssSigner.ClearBlock(System.Byte[])">
  17975. <summary> clear possible sensitive data</summary>
  17976. </member>
  17977. <member name="M:Org.BouncyCastle.Crypto.Signers.PssSigner.Update(System.Byte)">
  17978. <summary> update the internal digest with the byte b</summary>
  17979. </member>
  17980. <member name="M:Org.BouncyCastle.Crypto.Signers.PssSigner.BlockUpdate(System.Byte[],System.Int32,System.Int32)">
  17981. <summary> update the internal digest with the byte array in</summary>
  17982. </member>
  17983. <member name="M:Org.BouncyCastle.Crypto.Signers.PssSigner.Reset">
  17984. <summary> reset the internal state</summary>
  17985. </member>
  17986. <member name="M:Org.BouncyCastle.Crypto.Signers.PssSigner.GenerateSignature">
  17987. <summary> Generate a signature for the message we've been loaded with using
  17988. the key we were initialised with.
  17989. </summary>
  17990. </member>
  17991. <member name="M:Org.BouncyCastle.Crypto.Signers.PssSigner.VerifySignature(System.Byte[])">
  17992. <summary> return true if the internal state represents the signature described
  17993. in the passed in array.
  17994. </summary>
  17995. </member>
  17996. <member name="M:Org.BouncyCastle.Crypto.Signers.PssSigner.ItoOSP(System.Int32,System.Byte[])">
  17997. <summary> int to octet string.</summary>
  17998. </member>
  17999. <member name="M:Org.BouncyCastle.Crypto.Signers.PssSigner.MaskGeneratorFunction1(System.Byte[],System.Int32,System.Int32,System.Int32)">
  18000. <summary> mask generator function, as described in Pkcs1v2.</summary>
  18001. </member>
  18002. <member name="M:Org.BouncyCastle.Crypto.Signers.RsaDigestSigner.#cctor">
  18003. <summary>
  18004. Load oid table.
  18005. </summary>
  18006. </member>
  18007. <member name="M:Org.BouncyCastle.Crypto.Signers.RsaDigestSigner.Init(System.Boolean,Org.BouncyCastle.Crypto.ICipherParameters)">
  18008. Initialise the signer for signing or verification.
  18009. @param forSigning true if for signing, false otherwise
  18010. @param param necessary parameters.
  18011. </member>
  18012. <member name="M:Org.BouncyCastle.Crypto.Signers.RsaDigestSigner.Update(System.Byte)">
  18013. update the internal digest with the byte b
  18014. </member>
  18015. <member name="M:Org.BouncyCastle.Crypto.Signers.RsaDigestSigner.BlockUpdate(System.Byte[],System.Int32,System.Int32)">
  18016. update the internal digest with the byte array in
  18017. </member>
  18018. <member name="M:Org.BouncyCastle.Crypto.Signers.RsaDigestSigner.GenerateSignature">
  18019. Generate a signature for the message we've been loaded with using
  18020. the key we were initialised with.
  18021. </member>
  18022. <member name="M:Org.BouncyCastle.Crypto.Signers.RsaDigestSigner.VerifySignature(System.Byte[])">
  18023. return true if the internal state represents the signature described
  18024. in the passed in array.
  18025. </member>
  18026. <member name="T:Org.BouncyCastle.Crypto.Signers.SM2Signer">
  18027. <summary>The SM2 Digital Signature algorithm.</summary>
  18028. </member>
  18029. <member name="T:Org.BouncyCastle.Crypto.Signers.X931Signer">
  18030. X9.31-1998 - signing using a hash.
  18031. <p>
  18032. The message digest hash, H, is encapsulated to form a byte string as follows
  18033. </p>
  18034. <pre>
  18035. EB = 06 || PS || 0xBA || H || TRAILER
  18036. </pre>
  18037. where PS is a string of bytes all of value 0xBB of length such that |EB|=|n|, and TRAILER is the ISO/IEC 10118 part number† for the digest. The byte string, EB, is converted to an integer value, the message representative, f.
  18038. </member>
  18039. <member name="M:Org.BouncyCastle.Crypto.Signers.X931Signer.#ctor(Org.BouncyCastle.Crypto.IAsymmetricBlockCipher,Org.BouncyCastle.Crypto.IDigest,System.Boolean)">
  18040. Generate a signer with either implicit or explicit trailers for X9.31.
  18041. @param cipher base cipher to use for signature creation/verification
  18042. @param digest digest to use.
  18043. @param implicit whether or not the trailer is implicit or gives the hash.
  18044. </member>
  18045. <member name="M:Org.BouncyCastle.Crypto.Signers.X931Signer.#ctor(Org.BouncyCastle.Crypto.IAsymmetricBlockCipher,Org.BouncyCastle.Crypto.IDigest)">
  18046. Constructor for a signer with an explicit digest trailer.
  18047. @param cipher cipher to use.
  18048. @param digest digest to sign with.
  18049. </member>
  18050. <member name="M:Org.BouncyCastle.Crypto.Signers.X931Signer.ClearBlock(System.Byte[])">
  18051. <summary> clear possible sensitive data</summary>
  18052. </member>
  18053. <member name="M:Org.BouncyCastle.Crypto.Signers.X931Signer.Update(System.Byte)">
  18054. update the internal digest with the byte b
  18055. </member>
  18056. <member name="M:Org.BouncyCastle.Crypto.Signers.X931Signer.BlockUpdate(System.Byte[],System.Int32,System.Int32)">
  18057. update the internal digest with the byte array in
  18058. </member>
  18059. <member name="M:Org.BouncyCastle.Crypto.Signers.X931Signer.Reset">
  18060. reset the internal state
  18061. </member>
  18062. <member name="M:Org.BouncyCastle.Crypto.Signers.X931Signer.GenerateSignature">
  18063. generate a signature for the loaded message using the key we were
  18064. initialised with.
  18065. </member>
  18066. <member name="M:Org.BouncyCastle.Crypto.Signers.X931Signer.VerifySignature(System.Byte[])">
  18067. return true if the signature represents a ISO9796-2 signature
  18068. for the passed in message.
  18069. </member>
  18070. <member name="T:Org.BouncyCastle.Crypto.SimpleBlockResult">
  18071. <summary>
  18072. A simple block result object which just carries a byte array.
  18073. </summary>
  18074. </member>
  18075. <member name="M:Org.BouncyCastle.Crypto.SimpleBlockResult.#ctor(System.Byte[])">
  18076. <summary>
  18077. Base constructor - a wrapper for the passed in byte array.
  18078. </summary>
  18079. <param name="result">The byte array to be wrapped.</param>
  18080. </member>
  18081. <member name="P:Org.BouncyCastle.Crypto.SimpleBlockResult.Length">
  18082. <summary>
  18083. Return the number of bytes in the result
  18084. </summary>
  18085. <value>The length of the result in bytes.</value>
  18086. </member>
  18087. <member name="M:Org.BouncyCastle.Crypto.SimpleBlockResult.Collect">
  18088. <summary>
  18089. Return the final result of the operation.
  18090. </summary>
  18091. <returns>A block of bytes, representing the result of an operation.</returns>
  18092. </member>
  18093. <member name="M:Org.BouncyCastle.Crypto.SimpleBlockResult.Collect(System.Byte[],System.Int32)">
  18094. <summary>
  18095. Store the final result of the operation by copying it into the destination array.
  18096. </summary>
  18097. <returns>The number of bytes copied into destination.</returns>
  18098. <param name="destination">The byte array to copy the result into.</param>
  18099. <param name="offset">The offset into destination to start copying the result at.</param>
  18100. </member>
  18101. <member name="T:Org.BouncyCastle.Crypto.StreamBlockCipher">
  18102. a wrapper for block ciphers with a single byte block size, so that they
  18103. can be treated like stream ciphers.
  18104. </member>
  18105. <member name="M:Org.BouncyCastle.Crypto.StreamBlockCipher.#ctor(Org.BouncyCastle.Crypto.IBlockCipher)">
  18106. basic constructor.
  18107. @param cipher the block cipher to be wrapped.
  18108. @exception ArgumentException if the cipher has a block size other than
  18109. one.
  18110. </member>
  18111. <member name="M:Org.BouncyCastle.Crypto.StreamBlockCipher.Init(System.Boolean,Org.BouncyCastle.Crypto.ICipherParameters)">
  18112. initialise the underlying cipher.
  18113. @param forEncryption true if we are setting up for encryption, false otherwise.
  18114. @param param the necessary parameters for the underlying cipher to be initialised.
  18115. </member>
  18116. <member name="P:Org.BouncyCastle.Crypto.StreamBlockCipher.AlgorithmName">
  18117. return the name of the algorithm we are wrapping.
  18118. @return the name of the algorithm we are wrapping.
  18119. </member>
  18120. <member name="M:Org.BouncyCastle.Crypto.StreamBlockCipher.ReturnByte(System.Byte)">
  18121. encrypt/decrypt a single byte returning the result.
  18122. @param in the byte to be processed.
  18123. @return the result of processing the input byte.
  18124. </member>
  18125. <member name="M:Org.BouncyCastle.Crypto.StreamBlockCipher.ProcessBytes(System.Byte[],System.Int32,System.Int32,System.Byte[],System.Int32)">
  18126. process a block of bytes from in putting the result into out.
  18127. @param in the input byte array.
  18128. @param inOff the offset into the in array where the data to be processed starts.
  18129. @param len the number of bytes to be processed.
  18130. @param out the output buffer the processed bytes go into.
  18131. @param outOff the offset into the output byte array the processed data stars at.
  18132. @exception DataLengthException if the output buffer is too small.
  18133. </member>
  18134. <member name="M:Org.BouncyCastle.Crypto.StreamBlockCipher.Reset">
  18135. reset the underlying cipher. This leaves it in the same state
  18136. it was at after the last init (if there was one).
  18137. </member>
  18138. <member name="M:Org.BouncyCastle.Crypto.Tls.AbstractTlsAgreementCredentials.GenerateAgreement(Org.BouncyCastle.Crypto.AsymmetricKeyParameter)">
  18139. <exception cref="T:System.IO.IOException"></exception>
  18140. </member>
  18141. <member name="M:Org.BouncyCastle.Crypto.Tls.AbstractTlsCipherFactory.CreateCipher(Org.BouncyCastle.Crypto.Tls.TlsContext,System.Int32,System.Int32)">
  18142. <exception cref="T:System.IO.IOException"></exception>
  18143. </member>
  18144. <member name="M:Org.BouncyCastle.Crypto.Tls.AbstractTlsEncryptionCredentials.DecryptPreMasterSecret(System.Byte[])">
  18145. <exception cref="T:System.IO.IOException"></exception>
  18146. </member>
  18147. <member name="M:Org.BouncyCastle.Crypto.Tls.AbstractTlsPeer.Cancel">
  18148. <exception cref="T:System.IO.IOException"/>
  18149. </member>
  18150. <member name="M:Org.BouncyCastle.Crypto.Tls.AbstractTlsSignerCredentials.GenerateCertificateSignature(System.Byte[])">
  18151. <exception cref="T:System.IO.IOException"></exception>
  18152. </member>
  18153. <member name="T:Org.BouncyCastle.Crypto.Tls.AlertDescription">
  18154. <summary>
  18155. RFC 5246 7.2
  18156. </summary>
  18157. </member>
  18158. <member name="F:Org.BouncyCastle.Crypto.Tls.AlertDescription.close_notify">
  18159. This message notifies the recipient that the sender will not send any more messages on this
  18160. connection. Note that as of TLS 1.1, failure to properly close a connection no longer
  18161. requires that a session not be resumed. This is a change from TLS 1.0 ("The session becomes
  18162. unresumable if any connection is terminated without proper close_notify messages with level
  18163. equal to warning.") to conform with widespread implementation practice.
  18164. </member>
  18165. <member name="F:Org.BouncyCastle.Crypto.Tls.AlertDescription.unexpected_message">
  18166. An inappropriate message was received. This alert is always fatal and should never be
  18167. observed in communication between proper implementations.
  18168. </member>
  18169. <member name="F:Org.BouncyCastle.Crypto.Tls.AlertDescription.bad_record_mac">
  18170. This alert is returned if a record is received with an incorrect MAC. This alert also MUST be
  18171. returned if an alert is sent because a TLSCiphertext decrypted in an invalid way: either it
  18172. wasn't an even multiple of the block length, or its padding values, when checked, weren't
  18173. correct. This message is always fatal and should never be observed in communication between
  18174. proper implementations (except when messages were corrupted in the network).
  18175. </member>
  18176. <member name="F:Org.BouncyCastle.Crypto.Tls.AlertDescription.decryption_failed">
  18177. This alert was used in some earlier versions of TLS, and may have permitted certain attacks
  18178. against the CBC mode [CBCATT]. It MUST NOT be sent by compliant implementations.
  18179. </member>
  18180. <member name="F:Org.BouncyCastle.Crypto.Tls.AlertDescription.record_overflow">
  18181. A TLSCiphertext record was received that had a length more than 2^14+2048 bytes, or a record
  18182. decrypted to a TLSCompressed record with more than 2^14+1024 bytes. This message is always
  18183. fatal and should never be observed in communication between proper implementations (except
  18184. when messages were corrupted in the network).
  18185. </member>
  18186. <member name="F:Org.BouncyCastle.Crypto.Tls.AlertDescription.decompression_failure">
  18187. The decompression function received improper input (e.g., data that would expand to excessive
  18188. length). This message is always fatal and should never be observed in communication between
  18189. proper implementations.
  18190. </member>
  18191. <member name="F:Org.BouncyCastle.Crypto.Tls.AlertDescription.handshake_failure">
  18192. Reception of a handshake_failure alert message indicates that the sender was unable to
  18193. negotiate an acceptable set of security parameters given the options available. This is a
  18194. fatal error.
  18195. </member>
  18196. <member name="F:Org.BouncyCastle.Crypto.Tls.AlertDescription.no_certificate">
  18197. This alert was used in SSLv3 but not any version of TLS. It MUST NOT be sent by compliant
  18198. implementations.
  18199. </member>
  18200. <member name="F:Org.BouncyCastle.Crypto.Tls.AlertDescription.bad_certificate">
  18201. A certificate was corrupt, contained signatures that did not verify correctly, etc.
  18202. </member>
  18203. <member name="F:Org.BouncyCastle.Crypto.Tls.AlertDescription.unsupported_certificate">
  18204. A certificate was of an unsupported type.
  18205. </member>
  18206. <member name="F:Org.BouncyCastle.Crypto.Tls.AlertDescription.certificate_revoked">
  18207. A certificate was revoked by its signer.
  18208. </member>
  18209. <member name="F:Org.BouncyCastle.Crypto.Tls.AlertDescription.certificate_expired">
  18210. A certificate has expired or is not currently valid.
  18211. </member>
  18212. <member name="F:Org.BouncyCastle.Crypto.Tls.AlertDescription.certificate_unknown">
  18213. Some other (unspecified) issue arose in processing the certificate, rendering it
  18214. unacceptable.
  18215. </member>
  18216. <member name="F:Org.BouncyCastle.Crypto.Tls.AlertDescription.illegal_parameter">
  18217. A field in the handshake was out of range or inconsistent with other fields. This message is
  18218. always fatal.
  18219. </member>
  18220. <member name="F:Org.BouncyCastle.Crypto.Tls.AlertDescription.unknown_ca">
  18221. A valid certificate chain or partial chain was received, but the certificate was not accepted
  18222. because the CA certificate could not be located or couldn't be matched with a known, trusted
  18223. CA. This message is always fatal.
  18224. </member>
  18225. <member name="F:Org.BouncyCastle.Crypto.Tls.AlertDescription.access_denied">
  18226. A valid certificate was received, but when access control was applied, the sender decided not
  18227. to proceed with negotiation. This message is always fatal.
  18228. </member>
  18229. <member name="F:Org.BouncyCastle.Crypto.Tls.AlertDescription.decode_error">
  18230. A message could not be decoded because some field was out of the specified range or the
  18231. length of the message was incorrect. This message is always fatal and should never be
  18232. observed in communication between proper implementations (except when messages were corrupted
  18233. in the network).
  18234. </member>
  18235. <member name="F:Org.BouncyCastle.Crypto.Tls.AlertDescription.decrypt_error">
  18236. A handshake cryptographic operation failed, including being unable to correctly verify a
  18237. signature or validate a Finished message. This message is always fatal.
  18238. </member>
  18239. <member name="F:Org.BouncyCastle.Crypto.Tls.AlertDescription.export_restriction">
  18240. This alert was used in some earlier versions of TLS. It MUST NOT be sent by compliant
  18241. implementations.
  18242. </member>
  18243. <member name="F:Org.BouncyCastle.Crypto.Tls.AlertDescription.protocol_version">
  18244. The protocol version the client has attempted to negotiate is recognized but not supported.
  18245. (For example, old protocol versions might be avoided for security reasons.) This message is
  18246. always fatal.
  18247. </member>
  18248. <member name="F:Org.BouncyCastle.Crypto.Tls.AlertDescription.insufficient_security">
  18249. Returned instead of handshake_failure when a negotiation has failed specifically because the
  18250. server requires ciphers more secure than those supported by the client. This message is
  18251. always fatal.
  18252. </member>
  18253. <member name="F:Org.BouncyCastle.Crypto.Tls.AlertDescription.internal_error">
  18254. An internal error unrelated to the peer or the correctness of the protocol (such as a memory
  18255. allocation failure) makes it impossible to continue. This message is always fatal.
  18256. </member>
  18257. <member name="F:Org.BouncyCastle.Crypto.Tls.AlertDescription.user_canceled">
  18258. This handshake is being canceled for some reason unrelated to a protocol failure. If the user
  18259. cancels an operation after the handshake is complete, just closing the connection by sending
  18260. a close_notify is more appropriate. This alert should be followed by a close_notify. This
  18261. message is generally a warning.
  18262. </member>
  18263. <member name="F:Org.BouncyCastle.Crypto.Tls.AlertDescription.no_renegotiation">
  18264. Sent by the client in response to a hello request or by the server in response to a client
  18265. hello after initial handshaking. Either of these would normally lead to renegotiation; when
  18266. that is not appropriate, the recipient should respond with this alert. At that point, the
  18267. original requester can decide whether to proceed with the connection. One case where this
  18268. would be appropriate is where a server has spawned a process to satisfy a request; the
  18269. process might receive security parameters (key length, authentication, etc.) at startup, and
  18270. it might be difficult to communicate changes to these parameters after that point. This
  18271. message is always a warning.
  18272. </member>
  18273. <member name="F:Org.BouncyCastle.Crypto.Tls.AlertDescription.unsupported_extension">
  18274. Sent by clients that receive an extended server hello containing an extension that they did
  18275. not put in the corresponding client hello. This message is always fatal.
  18276. </member>
  18277. <member name="F:Org.BouncyCastle.Crypto.Tls.AlertDescription.certificate_unobtainable">
  18278. This alert is sent by servers who are unable to retrieve a certificate chain from the URL
  18279. supplied by the client (see Section 3.3). This message MAY be fatal - for example if client
  18280. authentication is required by the server for the handshake to continue and the server is
  18281. unable to retrieve the certificate chain, it may send a fatal alert.
  18282. </member>
  18283. <member name="F:Org.BouncyCastle.Crypto.Tls.AlertDescription.unrecognized_name">
  18284. This alert is sent by servers that receive a server_name extension request, but do not
  18285. recognize the server name. This message MAY be fatal.
  18286. </member>
  18287. <member name="F:Org.BouncyCastle.Crypto.Tls.AlertDescription.bad_certificate_status_response">
  18288. This alert is sent by clients that receive an invalid certificate status response (see
  18289. Section 3.6). This message is always fatal.
  18290. </member>
  18291. <member name="F:Org.BouncyCastle.Crypto.Tls.AlertDescription.bad_certificate_hash_value">
  18292. This alert is sent by servers when a certificate hash does not match a client provided
  18293. certificate_hash. This message is always fatal.
  18294. </member>
  18295. <member name="F:Org.BouncyCastle.Crypto.Tls.AlertDescription.unknown_psk_identity">
  18296. If the server does not recognize the PSK identity, it MAY respond with an
  18297. "unknown_psk_identity" alert message.
  18298. </member>
  18299. <member name="F:Org.BouncyCastle.Crypto.Tls.AlertDescription.inappropriate_fallback">
  18300. If TLS_FALLBACK_SCSV appears in ClientHello.cipher_suites and the highest protocol version
  18301. supported by the server is higher than the version indicated in ClientHello.client_version,
  18302. the server MUST respond with a fatal inappropriate_fallback alert [..].
  18303. </member>
  18304. <member name="T:Org.BouncyCastle.Crypto.Tls.AlertLevel">
  18305. <summary>
  18306. RFC 5246 7.2
  18307. </summary>
  18308. </member>
  18309. <member name="T:Org.BouncyCastle.Crypto.Tls.BulkCipherAlgorithm">
  18310. <summary>RFC 2246</summary>
  18311. <remarks>
  18312. Note that the values here are implementation-specific and arbitrary. It is recommended not to
  18313. depend on the particular values (e.g. serialization).
  18314. </remarks>
  18315. </member>
  18316. <member name="T:Org.BouncyCastle.Crypto.Tls.ByteQueue">
  18317. <remarks>
  18318. A queue for bytes.
  18319. <p>
  18320. This file could be more optimized.
  18321. </p>
  18322. </remarks>
  18323. </member>
  18324. <member name="M:Org.BouncyCastle.Crypto.Tls.ByteQueue.NextTwoPow(System.Int32)">
  18325. <returns>The smallest number which can be written as 2^x which is bigger than i.</returns>
  18326. </member>
  18327. <member name="F:Org.BouncyCastle.Crypto.Tls.ByteQueue.DefaultCapacity">
  18328. The initial size for our buffer.
  18329. </member>
  18330. <member name="F:Org.BouncyCastle.Crypto.Tls.ByteQueue.databuf">
  18331. The buffer where we store our data.
  18332. </member>
  18333. <member name="F:Org.BouncyCastle.Crypto.Tls.ByteQueue.skipped">
  18334. How many bytes at the beginning of the buffer are skipped.
  18335. </member>
  18336. <member name="F:Org.BouncyCastle.Crypto.Tls.ByteQueue.available">
  18337. How many bytes in the buffer are valid data.
  18338. </member>
  18339. <member name="M:Org.BouncyCastle.Crypto.Tls.ByteQueue.AddData(System.Byte[],System.Int32,System.Int32)">
  18340. <summary>Add some data to our buffer.</summary>
  18341. <param name="data">A byte-array to read data from.</param>
  18342. <param name="offset">How many bytes to skip at the beginning of the array.</param>
  18343. <param name="len">How many bytes to read from the array.</param>
  18344. </member>
  18345. <member name="P:Org.BouncyCastle.Crypto.Tls.ByteQueue.Available">
  18346. <summary>The number of bytes which are available in this buffer.</summary>
  18347. </member>
  18348. <member name="M:Org.BouncyCastle.Crypto.Tls.ByteQueue.CopyTo(System.IO.Stream,System.Int32)">
  18349. <summary>Copy some bytes from the beginning of the data to the provided <c cref="T:System.IO.Stream">Stream</c>.</summary>
  18350. <param name="output">The <c cref="T:System.IO.Stream">Stream</c> to copy the bytes to.</param>
  18351. <param name="length">How many bytes to copy.</param>
  18352. <exception cref="T:System.InvalidOperationException">If insufficient data is available.</exception>
  18353. <exception cref="T:System.IO.IOException">If there is a problem copying the data.</exception>
  18354. </member>
  18355. <member name="M:Org.BouncyCastle.Crypto.Tls.ByteQueue.Read(System.Byte[],System.Int32,System.Int32,System.Int32)">
  18356. <summary>Read data from the buffer.</summary>
  18357. <param name="buf">The buffer where the read data will be copied to.</param>
  18358. <param name="offset">How many bytes to skip at the beginning of buf.</param>
  18359. <param name="len">How many bytes to read at all.</param>
  18360. <param name="skip">How many bytes from our data to skip.</param>
  18361. </member>
  18362. <member name="M:Org.BouncyCastle.Crypto.Tls.ByteQueue.ReadFrom(System.Int32)">
  18363. <summary>Return a <c cref="T:System.IO.MemoryStream">MemoryStream</c> over some bytes at the beginning of the data.</summary>
  18364. <param name="length">How many bytes will be readable.</param>
  18365. <returns>A <c cref="T:System.IO.MemoryStream">MemoryStream</c> over the data.</returns>
  18366. <exception cref="T:System.InvalidOperationException">If insufficient data is available.</exception>
  18367. </member>
  18368. <member name="M:Org.BouncyCastle.Crypto.Tls.ByteQueue.RemoveData(System.Int32)">
  18369. <summary>Remove some bytes from our data from the beginning.</summary>
  18370. <param name="i">How many bytes to remove.</param>
  18371. </member>
  18372. <member name="T:Org.BouncyCastle.Crypto.Tls.Certificate">
  18373. Parsing and encoding of a <i>Certificate</i> struct from RFC 4346.
  18374. <p/>
  18375. <pre>
  18376. opaque ASN.1Cert&lt;2^24-1&gt;;
  18377. struct {
  18378. ASN.1Cert certificate_list&lt;0..2^24-1&gt;;
  18379. } Certificate;
  18380. </pre>
  18381. @see Org.BouncyCastle.Asn1.X509.X509CertificateStructure
  18382. </member>
  18383. <member name="F:Org.BouncyCastle.Crypto.Tls.Certificate.mCertificateList">
  18384. The certificates.
  18385. </member>
  18386. <member name="M:Org.BouncyCastle.Crypto.Tls.Certificate.GetCertificateList">
  18387. @return an array of {@link org.bouncycastle.asn1.x509.Certificate} representing a certificate
  18388. chain.
  18389. </member>
  18390. <member name="P:Org.BouncyCastle.Crypto.Tls.Certificate.IsEmpty">
  18391. @return <code>true</code> if this certificate chain contains no certificates, or
  18392. <code>false</code> otherwise.
  18393. </member>
  18394. <member name="M:Org.BouncyCastle.Crypto.Tls.Certificate.Encode(System.IO.Stream)">
  18395. Encode this {@link Certificate} to a {@link Stream}.
  18396. @param output the {@link Stream} to encode to.
  18397. @throws IOException
  18398. </member>
  18399. <member name="M:Org.BouncyCastle.Crypto.Tls.Certificate.Parse(System.IO.Stream)">
  18400. Parse a {@link Certificate} from a {@link Stream}.
  18401. @param input the {@link Stream} to parse from.
  18402. @return a {@link Certificate} object.
  18403. @throws IOException
  18404. </member>
  18405. <member name="T:Org.BouncyCastle.Crypto.Tls.CertificateRequest">
  18406. Parsing and encoding of a <i>CertificateRequest</i> struct from RFC 4346.
  18407. <p/>
  18408. <pre>
  18409. struct {
  18410. ClientCertificateType certificate_types&lt;1..2^8-1&gt;;
  18411. DistinguishedName certificate_authorities&lt;3..2^16-1&gt;
  18412. } CertificateRequest;
  18413. </pre>
  18414. @see ClientCertificateType
  18415. @see X509Name
  18416. </member>
  18417. <member name="M:Org.BouncyCastle.Crypto.Tls.CertificateRequest.#ctor(System.Byte[],System.Collections.IList,System.Collections.IList)">
  18418. @param certificateTypes see {@link ClientCertificateType} for valid constants.
  18419. @param certificateAuthorities an {@link IList} of {@link X509Name}.
  18420. </member>
  18421. <member name="P:Org.BouncyCastle.Crypto.Tls.CertificateRequest.CertificateTypes">
  18422. @return an array of certificate types
  18423. @see {@link ClientCertificateType}
  18424. </member>
  18425. <member name="P:Org.BouncyCastle.Crypto.Tls.CertificateRequest.SupportedSignatureAlgorithms">
  18426. @return an {@link IList} of {@link SignatureAndHashAlgorithm} (or null before TLS 1.2).
  18427. </member>
  18428. <member name="P:Org.BouncyCastle.Crypto.Tls.CertificateRequest.CertificateAuthorities">
  18429. @return an {@link IList} of {@link X509Name}
  18430. </member>
  18431. <member name="M:Org.BouncyCastle.Crypto.Tls.CertificateRequest.Encode(System.IO.Stream)">
  18432. Encode this {@link CertificateRequest} to a {@link Stream}.
  18433. @param output the {@link Stream} to encode to.
  18434. @throws IOException
  18435. </member>
  18436. <member name="M:Org.BouncyCastle.Crypto.Tls.CertificateRequest.Parse(Org.BouncyCastle.Crypto.Tls.TlsContext,System.IO.Stream)">
  18437. Parse a {@link CertificateRequest} from a {@link Stream}.
  18438. @param context
  18439. the {@link TlsContext} of the current connection.
  18440. @param input
  18441. the {@link Stream} to parse from.
  18442. @return a {@link CertificateRequest} object.
  18443. @throws IOException
  18444. </member>
  18445. <member name="M:Org.BouncyCastle.Crypto.Tls.CertificateStatus.Encode(System.IO.Stream)">
  18446. Encode this {@link CertificateStatus} to a {@link Stream}.
  18447. @param output
  18448. the {@link Stream} to encode to.
  18449. @throws IOException
  18450. </member>
  18451. <member name="M:Org.BouncyCastle.Crypto.Tls.CertificateStatus.Parse(System.IO.Stream)">
  18452. Parse a {@link CertificateStatus} from a {@link Stream}.
  18453. @param input
  18454. the {@link Stream} to parse from.
  18455. @return a {@link CertificateStatus} object.
  18456. @throws IOException
  18457. </member>
  18458. <member name="M:Org.BouncyCastle.Crypto.Tls.CertificateStatusRequest.Encode(System.IO.Stream)">
  18459. Encode this {@link CertificateStatusRequest} to a {@link Stream}.
  18460. @param output
  18461. the {@link Stream} to encode to.
  18462. @throws IOException
  18463. </member>
  18464. <member name="M:Org.BouncyCastle.Crypto.Tls.CertificateStatusRequest.Parse(System.IO.Stream)">
  18465. Parse a {@link CertificateStatusRequest} from a {@link Stream}.
  18466. @param input
  18467. the {@link Stream} to parse from.
  18468. @return a {@link CertificateStatusRequest} object.
  18469. @throws IOException
  18470. </member>
  18471. <member name="T:Org.BouncyCastle.Crypto.Tls.CertificateType">
  18472. RFC 6091
  18473. </member>
  18474. <member name="M:Org.BouncyCastle.Crypto.Tls.CertificateUrl.#ctor(System.Byte,System.Collections.IList)">
  18475. @param type
  18476. see {@link CertChainType} for valid constants.
  18477. @param urlAndHashList
  18478. a {@link IList} of {@link UrlAndHash}.
  18479. </member>
  18480. <member name="P:Org.BouncyCastle.Crypto.Tls.CertificateUrl.Type">
  18481. @return {@link CertChainType}
  18482. </member>
  18483. <member name="P:Org.BouncyCastle.Crypto.Tls.CertificateUrl.UrlAndHashList">
  18484. @return an {@link IList} of {@link UrlAndHash}
  18485. </member>
  18486. <member name="M:Org.BouncyCastle.Crypto.Tls.CertificateUrl.Encode(System.IO.Stream)">
  18487. Encode this {@link CertificateUrl} to a {@link Stream}.
  18488. @param output the {@link Stream} to encode to.
  18489. @throws IOException
  18490. </member>
  18491. <member name="M:Org.BouncyCastle.Crypto.Tls.CertificateUrl.parse(Org.BouncyCastle.Crypto.Tls.TlsContext,System.IO.Stream)">
  18492. Parse a {@link CertificateUrl} from a {@link Stream}.
  18493. @param context
  18494. the {@link TlsContext} of the current connection.
  18495. @param input
  18496. the {@link Stream} to parse from.
  18497. @return a {@link CertificateUrl} object.
  18498. @throws IOException
  18499. </member>
  18500. <member name="T:Org.BouncyCastle.Crypto.Tls.Chacha20Poly1305">
  18501. draft-ietf-tls-chacha20-poly1305-04
  18502. </member>
  18503. <member name="M:Org.BouncyCastle.Crypto.Tls.Chacha20Poly1305.#ctor(Org.BouncyCastle.Crypto.Tls.TlsContext)">
  18504. <exception cref="T:System.IO.IOException"></exception>
  18505. </member>
  18506. <member name="M:Org.BouncyCastle.Crypto.Tls.Chacha20Poly1305.EncodePlaintext(System.Int64,System.Byte,System.Byte[],System.Int32,System.Int32)">
  18507. <exception cref="T:System.IO.IOException"></exception>
  18508. </member>
  18509. <member name="M:Org.BouncyCastle.Crypto.Tls.Chacha20Poly1305.DecodeCiphertext(System.Int64,System.Byte,System.Byte[],System.Int32,System.Int32)">
  18510. <exception cref="T:System.IO.IOException"></exception>
  18511. </member>
  18512. <member name="M:Org.BouncyCastle.Crypto.Tls.Chacha20Poly1305.GetAdditionalData(System.Int64,System.Byte,System.Int32)">
  18513. <exception cref="T:System.IO.IOException"></exception>
  18514. </member>
  18515. <member name="T:Org.BouncyCastle.Crypto.Tls.CipherSuite">
  18516. <summary>
  18517. RFC 2246 A.5
  18518. </summary>
  18519. </member>
  18520. <member name="T:Org.BouncyCastle.Crypto.Tls.CipherType">
  18521. <summary>RFC 2246</summary>
  18522. <remarks>
  18523. Note that the values here are implementation-specific and arbitrary. It is recommended not to
  18524. depend on the particular values (e.g. serialization).
  18525. </remarks>
  18526. </member>
  18527. <member name="T:Org.BouncyCastle.Crypto.Tls.CombinedHash">
  18528. A combined hash, which implements md5(m) || sha1(m).
  18529. </member>
  18530. <member name="M:Org.BouncyCastle.Crypto.Tls.CombinedHash.BlockUpdate(System.Byte[],System.Int32,System.Int32)">
  18531. @see org.bouncycastle.crypto.Digest#update(byte[], int, int)
  18532. </member>
  18533. <member name="M:Org.BouncyCastle.Crypto.Tls.CombinedHash.DoFinal(System.Byte[],System.Int32)">
  18534. @see org.bouncycastle.crypto.Digest#doFinal(byte[], int)
  18535. </member>
  18536. <member name="M:Org.BouncyCastle.Crypto.Tls.CombinedHash.Reset">
  18537. @see org.bouncycastle.crypto.Digest#reset()
  18538. </member>
  18539. <member name="T:Org.BouncyCastle.Crypto.Tls.CompressionMethod">
  18540. <summary>
  18541. RFC 2246 6.1
  18542. </summary>
  18543. </member>
  18544. <member name="T:Org.BouncyCastle.Crypto.Tls.ConnectionEnd">
  18545. <summary>RFC 2246</summary>
  18546. <remarks>
  18547. Note that the values here are implementation-specific and arbitrary. It is recommended not to
  18548. depend on the particular values (e.g. serialization).
  18549. </remarks>
  18550. </member>
  18551. <member name="T:Org.BouncyCastle.Crypto.Tls.ContentType">
  18552. RFC 2246 6.2.1
  18553. </member>
  18554. <member name="M:Org.BouncyCastle.Crypto.Tls.DatagramTransport.GetReceiveLimit">
  18555. <exception cref="T:System.IO.IOException"/>
  18556. </member>
  18557. <member name="M:Org.BouncyCastle.Crypto.Tls.DatagramTransport.GetSendLimit">
  18558. <exception cref="T:System.IO.IOException"/>
  18559. </member>
  18560. <member name="M:Org.BouncyCastle.Crypto.Tls.DatagramTransport.Receive(System.Byte[],System.Int32,System.Int32,System.Int32)">
  18561. <exception cref="T:System.IO.IOException"/>
  18562. </member>
  18563. <member name="M:Org.BouncyCastle.Crypto.Tls.DatagramTransport.Send(System.Byte[],System.Int32,System.Int32)">
  18564. <exception cref="T:System.IO.IOException"/>
  18565. </member>
  18566. <member name="M:Org.BouncyCastle.Crypto.Tls.DefaultTlsAgreementCredentials.GenerateAgreement(Org.BouncyCastle.Crypto.AsymmetricKeyParameter)">
  18567. <exception cref="T:System.IO.IOException"></exception>
  18568. </member>
  18569. <member name="M:Org.BouncyCastle.Crypto.Tls.DefaultTlsCipherFactory.CreateCipher(Org.BouncyCastle.Crypto.Tls.TlsContext,System.Int32,System.Int32)">
  18570. <exception cref="T:System.IO.IOException"></exception>
  18571. </member>
  18572. <member name="M:Org.BouncyCastle.Crypto.Tls.DefaultTlsCipherFactory.CreateAESCipher(Org.BouncyCastle.Crypto.Tls.TlsContext,System.Int32,System.Int32)">
  18573. <exception cref="T:System.IO.IOException"></exception>
  18574. </member>
  18575. <member name="M:Org.BouncyCastle.Crypto.Tls.DefaultTlsCipherFactory.CreateCamelliaCipher(Org.BouncyCastle.Crypto.Tls.TlsContext,System.Int32,System.Int32)">
  18576. <exception cref="T:System.IO.IOException"></exception>
  18577. </member>
  18578. <member name="M:Org.BouncyCastle.Crypto.Tls.DefaultTlsCipherFactory.CreateChaCha20Poly1305(Org.BouncyCastle.Crypto.Tls.TlsContext)">
  18579. <exception cref="T:System.IO.IOException"></exception>
  18580. </member>
  18581. <member name="M:Org.BouncyCastle.Crypto.Tls.DefaultTlsCipherFactory.CreateCipher_Aes_Ccm(Org.BouncyCastle.Crypto.Tls.TlsContext,System.Int32,System.Int32)">
  18582. <exception cref="T:System.IO.IOException"></exception>
  18583. </member>
  18584. <member name="M:Org.BouncyCastle.Crypto.Tls.DefaultTlsCipherFactory.CreateCipher_Aes_Gcm(Org.BouncyCastle.Crypto.Tls.TlsContext,System.Int32,System.Int32)">
  18585. <exception cref="T:System.IO.IOException"></exception>
  18586. </member>
  18587. <member name="M:Org.BouncyCastle.Crypto.Tls.DefaultTlsCipherFactory.CreateCipher_Aes_Ocb(Org.BouncyCastle.Crypto.Tls.TlsContext,System.Int32,System.Int32)">
  18588. <exception cref="T:System.IO.IOException"></exception>
  18589. </member>
  18590. <member name="M:Org.BouncyCastle.Crypto.Tls.DefaultTlsCipherFactory.CreateCipher_Camellia_Gcm(Org.BouncyCastle.Crypto.Tls.TlsContext,System.Int32,System.Int32)">
  18591. <exception cref="T:System.IO.IOException"></exception>
  18592. </member>
  18593. <member name="M:Org.BouncyCastle.Crypto.Tls.DefaultTlsCipherFactory.CreateDesEdeCipher(Org.BouncyCastle.Crypto.Tls.TlsContext,System.Int32)">
  18594. <exception cref="T:System.IO.IOException"></exception>
  18595. </member>
  18596. <member name="M:Org.BouncyCastle.Crypto.Tls.DefaultTlsCipherFactory.CreateNullCipher(Org.BouncyCastle.Crypto.Tls.TlsContext,System.Int32)">
  18597. <exception cref="T:System.IO.IOException"></exception>
  18598. </member>
  18599. <member name="M:Org.BouncyCastle.Crypto.Tls.DefaultTlsCipherFactory.CreateRC4Cipher(Org.BouncyCastle.Crypto.Tls.TlsContext,System.Int32,System.Int32)">
  18600. <exception cref="T:System.IO.IOException"></exception>
  18601. </member>
  18602. <member name="M:Org.BouncyCastle.Crypto.Tls.DefaultTlsCipherFactory.CreateSeedCipher(Org.BouncyCastle.Crypto.Tls.TlsContext,System.Int32)">
  18603. <exception cref="T:System.IO.IOException"></exception>
  18604. </member>
  18605. <member name="M:Org.BouncyCastle.Crypto.Tls.DefaultTlsCipherFactory.CreateHMacDigest(System.Int32)">
  18606. <exception cref="T:System.IO.IOException"></exception>
  18607. </member>
  18608. <member name="M:Org.BouncyCastle.Crypto.Tls.DefaultTlsDHVerifier.#ctor">
  18609. <summary>Accept various standard DH groups with 'P' at least <c>DefaultMinimumPrimeBits</c> bits.</summary>
  18610. </member>
  18611. <member name="M:Org.BouncyCastle.Crypto.Tls.DefaultTlsDHVerifier.#ctor(System.Int32)">
  18612. <summary>Accept various standard DH groups with 'P' at least the specified number of bits.</summary>
  18613. </member>
  18614. <member name="M:Org.BouncyCastle.Crypto.Tls.DefaultTlsDHVerifier.#ctor(System.Collections.IList,System.Int32)">
  18615. <summary>Accept a custom set of group parameters, subject to a minimum bitlength for 'P'.</summary>
  18616. <param name="groups">An <c>IList</c> of acceptable <c>DHParameters</c>.</param>
  18617. <param name="minimumPrimeBits">The minimum acceptable bitlength of the 'P' parameter.</param>
  18618. </member>
  18619. <member name="M:Org.BouncyCastle.Crypto.Tls.DefaultTlsEncryptionCredentials.DecryptPreMasterSecret(System.Byte[])">
  18620. <exception cref="T:System.IO.IOException"></exception>
  18621. </member>
  18622. <member name="M:Org.BouncyCastle.Crypto.Tls.DefaultTlsSignerCredentials.GenerateCertificateSignature(System.Byte[])">
  18623. <exception cref="T:System.IO.IOException"></exception>
  18624. </member>
  18625. <member name="M:Org.BouncyCastle.Crypto.Tls.DefaultTlsSrpGroupVerifier.#ctor">
  18626. Accept only the group parameters specified in RFC 5054 Appendix A.
  18627. </member>
  18628. <member name="M:Org.BouncyCastle.Crypto.Tls.DefaultTlsSrpGroupVerifier.#ctor(System.Collections.IList)">
  18629. Specify a custom set of acceptable group parameters.
  18630. @param groups a {@link Vector} of acceptable {@link SRP6GroupParameters}
  18631. </member>
  18632. <member name="T:Org.BouncyCastle.Crypto.Tls.DeferredHash">
  18633. Buffers input until the hash algorithm is determined.
  18634. </member>
  18635. <member name="P:Org.BouncyCastle.Crypto.Tls.DigitallySigned.Algorithm">
  18636. @return a {@link SignatureAndHashAlgorithm} (or null before TLS 1.2).
  18637. </member>
  18638. <member name="M:Org.BouncyCastle.Crypto.Tls.DigitallySigned.Encode(System.IO.Stream)">
  18639. Encode this {@link DigitallySigned} to a {@link Stream}.
  18640. @param output
  18641. the {@link Stream} to encode to.
  18642. @throws IOException
  18643. </member>
  18644. <member name="M:Org.BouncyCastle.Crypto.Tls.DigitallySigned.Parse(Org.BouncyCastle.Crypto.Tls.TlsContext,System.IO.Stream)">
  18645. Parse a {@link DigitallySigned} from a {@link Stream}.
  18646. @param context
  18647. the {@link TlsContext} of the current connection.
  18648. @param input
  18649. the {@link Stream} to parse from.
  18650. @return a {@link DigitallySigned} object.
  18651. @throws IOException
  18652. </member>
  18653. <member name="M:Org.BouncyCastle.Crypto.Tls.DtlsHandshakeRetransmit.ReceivedHandshakeRecord(System.Int32,System.Byte[],System.Int32,System.Int32)">
  18654. <exception cref="T:System.IO.IOException"/>
  18655. </member>
  18656. <member name="M:Org.BouncyCastle.Crypto.Tls.DtlsProtocol.ProcessFinished(System.Byte[],System.Byte[])">
  18657. <exception cref="T:System.IO.IOException"/>
  18658. </member>
  18659. <member name="M:Org.BouncyCastle.Crypto.Tls.DtlsProtocol.ApplyMaxFragmentLengthExtension(Org.BouncyCastle.Crypto.Tls.DtlsRecordLayer,System.Int16)">
  18660. <exception cref="T:System.IO.IOException"/>
  18661. </member>
  18662. <member name="M:Org.BouncyCastle.Crypto.Tls.DtlsProtocol.EvaluateMaxFragmentLengthExtension(System.Boolean,System.Collections.IDictionary,System.Collections.IDictionary,System.Byte)">
  18663. <exception cref="T:System.IO.IOException"/>
  18664. </member>
  18665. <member name="M:Org.BouncyCastle.Crypto.Tls.DtlsProtocol.GenerateCertificate(Org.BouncyCastle.Crypto.Tls.Certificate)">
  18666. <exception cref="T:System.IO.IOException"/>
  18667. </member>
  18668. <member name="M:Org.BouncyCastle.Crypto.Tls.DtlsProtocol.GenerateSupplementalData(System.Collections.IList)">
  18669. <exception cref="T:System.IO.IOException"/>
  18670. </member>
  18671. <member name="M:Org.BouncyCastle.Crypto.Tls.DtlsProtocol.ValidateSelectedCipherSuite(System.Int32,System.Byte)">
  18672. <exception cref="T:System.IO.IOException"/>
  18673. </member>
  18674. <member name="M:Org.BouncyCastle.Crypto.Tls.DtlsRecordLayer.Send(System.Byte[],System.Int32,System.Int32)">
  18675. <exception cref="T:System.IO.IOException"/>
  18676. </member>
  18677. <member name="M:Org.BouncyCastle.Crypto.Tls.DtlsReliableHandshake.CheckInboundFlight">
  18678. Check that there are no "extra" messages left in the current inbound flight
  18679. </member>
  18680. <member name="T:Org.BouncyCastle.Crypto.Tls.DtlsReplayWindow">
  18681. RFC 4347 4.1.2.5 Anti-replay
  18682. <p/>
  18683. Support fast rejection of duplicate records by maintaining a sliding receive window
  18684. </member>
  18685. <member name="M:Org.BouncyCastle.Crypto.Tls.DtlsReplayWindow.ShouldDiscard(System.Int64)">
  18686. Check whether a received record with the given sequence number should be rejected as a duplicate.
  18687. @param seq the 48-bit DTLSPlainText.sequence_number field of a received record.
  18688. @return true if the record should be discarded without further processing.
  18689. </member>
  18690. <member name="M:Org.BouncyCastle.Crypto.Tls.DtlsReplayWindow.ReportAuthenticated(System.Int64)">
  18691. Report that a received record with the given sequence number passed authentication checks.
  18692. @param seq the 48-bit DTLSPlainText.sequence_number field of an authenticated record.
  18693. </member>
  18694. <member name="M:Org.BouncyCastle.Crypto.Tls.DtlsReplayWindow.Reset">
  18695. When a new epoch begins, sequence numbers begin again at 0
  18696. </member>
  18697. <member name="T:Org.BouncyCastle.Crypto.Tls.ECBasisType">
  18698. <summary>RFC 4492 5.4. (Errata ID: 2389)</summary>
  18699. </member>
  18700. <member name="T:Org.BouncyCastle.Crypto.Tls.ECCurveType">
  18701. <summary>
  18702. RFC 4492 5.4
  18703. </summary>
  18704. </member>
  18705. <member name="F:Org.BouncyCastle.Crypto.Tls.ECCurveType.explicit_prime">
  18706. Indicates the elliptic curve domain parameters are conveyed verbosely, and the
  18707. underlying finite field is a prime field.
  18708. </member>
  18709. <member name="F:Org.BouncyCastle.Crypto.Tls.ECCurveType.explicit_char2">
  18710. Indicates the elliptic curve domain parameters are conveyed verbosely, and the
  18711. underlying finite field is a characteristic-2 field.
  18712. </member>
  18713. <member name="F:Org.BouncyCastle.Crypto.Tls.ECCurveType.named_curve">
  18714. Indicates that a named curve is used. This option SHOULD be used when applicable.
  18715. </member>
  18716. <member name="T:Org.BouncyCastle.Crypto.Tls.ECPointFormat">
  18717. <summary>
  18718. RFC 4492 5.1.2
  18719. </summary>
  18720. </member>
  18721. <member name="T:Org.BouncyCastle.Crypto.Tls.EncryptionAlgorithm">
  18722. <summary>RFC 2246</summary>
  18723. <remarks>
  18724. Note that the values here are implementation-specific and arbitrary. It is recommended not to
  18725. depend on the particular values (e.g. serialization).
  18726. </remarks>
  18727. </member>
  18728. <member name="T:Org.BouncyCastle.Crypto.Tls.ExporterLabel">
  18729. <summary>RFC 5705</summary>
  18730. </member>
  18731. <member name="T:Org.BouncyCastle.Crypto.Tls.HashAlgorithm">
  18732. <summary>RFC 5246 7.4.1.4.1</summary>
  18733. </member>
  18734. <member name="M:Org.BouncyCastle.Crypto.Tls.HeartbeatExtension.Encode(System.IO.Stream)">
  18735. Encode this {@link HeartbeatExtension} to a {@link Stream}.
  18736. @param output
  18737. the {@link Stream} to encode to.
  18738. @throws IOException
  18739. </member>
  18740. <member name="M:Org.BouncyCastle.Crypto.Tls.HeartbeatExtension.Parse(System.IO.Stream)">
  18741. Parse a {@link HeartbeatExtension} from a {@link Stream}.
  18742. @param input
  18743. the {@link Stream} to parse from.
  18744. @return a {@link HeartbeatExtension} object.
  18745. @throws IOException
  18746. </member>
  18747. <member name="M:Org.BouncyCastle.Crypto.Tls.HeartbeatMessage.Encode(Org.BouncyCastle.Crypto.Tls.TlsContext,System.IO.Stream)">
  18748. Encode this {@link HeartbeatMessage} to a {@link Stream}.
  18749. @param output
  18750. the {@link Stream} to encode to.
  18751. @throws IOException
  18752. </member>
  18753. <member name="M:Org.BouncyCastle.Crypto.Tls.HeartbeatMessage.Parse(System.IO.Stream)">
  18754. Parse a {@link HeartbeatMessage} from a {@link Stream}.
  18755. @param input
  18756. the {@link Stream} to parse from.
  18757. @return a {@link HeartbeatMessage} object.
  18758. @throws IOException
  18759. </member>
  18760. <member name="T:Org.BouncyCastle.Crypto.Tls.KeyExchangeAlgorithm">
  18761. <summary>RFC 2246</summary>
  18762. <remarks>
  18763. Note that the values here are implementation-specific and arbitrary. It is recommended not to
  18764. depend on the particular values (e.g. serialization).
  18765. </remarks>
  18766. </member>
  18767. <member name="T:Org.BouncyCastle.Crypto.Tls.MacAlgorithm">
  18768. <summary>RFC 2246</summary>
  18769. <remarks>
  18770. Note that the values here are implementation-specific and arbitrary. It is recommended not to
  18771. depend on the particular values (e.g. serialization).
  18772. </remarks>
  18773. </member>
  18774. <member name="T:Org.BouncyCastle.Crypto.Tls.NamedCurve">
  18775. <summary>
  18776. RFC 4492 5.1.1
  18777. The named curves defined here are those specified in SEC 2 [13]. Note that many of
  18778. these curves are also recommended in ANSI X9.62 [7] and FIPS 186-2 [11]. Values 0xFE00
  18779. through 0xFEFF are reserved for private use. Values 0xFF01 and 0xFF02 indicate that the
  18780. client supports arbitrary prime and characteristic-2 curves, respectively (the curve
  18781. parameters must be encoded explicitly in ECParameters).
  18782. </summary>
  18783. </member>
  18784. <member name="M:Org.BouncyCastle.Crypto.Tls.NewSessionTicket.Encode(System.IO.Stream)">
  18785. Encode this {@link NewSessionTicket} to a {@link Stream}.
  18786. @param output the {@link Stream} to encode to.
  18787. @throws IOException
  18788. </member>
  18789. <member name="M:Org.BouncyCastle.Crypto.Tls.NewSessionTicket.Parse(System.IO.Stream)">
  18790. Parse a {@link NewSessionTicket} from a {@link Stream}.
  18791. @param input the {@link Stream} to parse from.
  18792. @return a {@link NewSessionTicket} object.
  18793. @throws IOException
  18794. </member>
  18795. <member name="T:Org.BouncyCastle.Crypto.Tls.OcspStatusRequest">
  18796. RFC 3546 3.6
  18797. </member>
  18798. <member name="M:Org.BouncyCastle.Crypto.Tls.OcspStatusRequest.#ctor(System.Collections.IList,Org.BouncyCastle.Asn1.X509.X509Extensions)">
  18799. @param responderIDList
  18800. an {@link IList} of {@link ResponderID}, specifying the list of trusted OCSP
  18801. responders. An empty list has the special meaning that the responders are
  18802. implicitly known to the server - e.g., by prior arrangement.
  18803. @param requestExtensions
  18804. OCSP request extensions. A null value means that there are no extensions.
  18805. </member>
  18806. <member name="P:Org.BouncyCastle.Crypto.Tls.OcspStatusRequest.ResponderIDList">
  18807. @return an {@link IList} of {@link ResponderID}
  18808. </member>
  18809. <member name="P:Org.BouncyCastle.Crypto.Tls.OcspStatusRequest.RequestExtensions">
  18810. @return OCSP request extensions
  18811. </member>
  18812. <member name="M:Org.BouncyCastle.Crypto.Tls.OcspStatusRequest.Encode(System.IO.Stream)">
  18813. Encode this {@link OcspStatusRequest} to a {@link Stream}.
  18814. @param output
  18815. the {@link Stream} to encode to.
  18816. @throws IOException
  18817. </member>
  18818. <member name="M:Org.BouncyCastle.Crypto.Tls.OcspStatusRequest.Parse(System.IO.Stream)">
  18819. Parse a {@link OcspStatusRequest} from a {@link Stream}.
  18820. @param input
  18821. the {@link Stream} to parse from.
  18822. @return an {@link OcspStatusRequest} object.
  18823. @throws IOException
  18824. </member>
  18825. <member name="T:Org.BouncyCastle.Crypto.Tls.PrfAlgorithm">
  18826. <summary>RFC 5246</summary>
  18827. <remarks>
  18828. Note that the values here are implementation-specific and arbitrary. It is recommended not to
  18829. depend on the particular values (e.g. serialization).
  18830. </remarks>
  18831. </member>
  18832. <member name="M:Org.BouncyCastle.Crypto.Tls.ProtocolVersion.Get(System.Int32,System.Int32)">
  18833. <exception cref="T:System.IO.IOException"/>
  18834. </member>
  18835. <member name="T:Org.BouncyCastle.Crypto.Tls.RecordStream">
  18836. <summary>An implementation of the TLS 1.0/1.1/1.2 record layer, allowing downgrade to SSLv3.</summary>
  18837. </member>
  18838. <member name="M:Org.BouncyCastle.Crypto.Tls.RecordStream.SetRestrictReadVersion(System.Boolean)">
  18839. RFC 5246 E.1. "Earlier versions of the TLS specification were not fully clear on what the
  18840. record layer version number (TLSPlaintext.version) should contain when sending ClientHello
  18841. (i.e., before it is known which version of the protocol will be employed). Thus, TLS servers
  18842. compliant with this specification MUST accept any value {03,XX} as the record layer version
  18843. number for ClientHello."
  18844. </member>
  18845. <member name="P:Org.BouncyCastle.Crypto.Tls.SecurityParameters.Entity">
  18846. @return {@link ConnectionEnd}
  18847. </member>
  18848. <member name="P:Org.BouncyCastle.Crypto.Tls.SecurityParameters.CipherSuite">
  18849. @return {@link CipherSuite}
  18850. </member>
  18851. <member name="P:Org.BouncyCastle.Crypto.Tls.SecurityParameters.CompressionAlgorithm">
  18852. @return {@link CompressionMethod}
  18853. </member>
  18854. <member name="P:Org.BouncyCastle.Crypto.Tls.SecurityParameters.PrfAlgorithm">
  18855. @return {@link PRFAlgorithm}
  18856. </member>
  18857. <member name="M:Org.BouncyCastle.Crypto.Tls.ServerName.Encode(System.IO.Stream)">
  18858. Encode this {@link ServerName} to a {@link Stream}.
  18859. @param output
  18860. the {@link Stream} to encode to.
  18861. @throws IOException
  18862. </member>
  18863. <member name="M:Org.BouncyCastle.Crypto.Tls.ServerName.Parse(System.IO.Stream)">
  18864. Parse a {@link ServerName} from a {@link Stream}.
  18865. @param input
  18866. the {@link Stream} to parse from.
  18867. @return a {@link ServerName} object.
  18868. @throws IOException
  18869. </member>
  18870. <member name="M:Org.BouncyCastle.Crypto.Tls.ServerNameList.#ctor(System.Collections.IList)">
  18871. @param serverNameList an {@link IList} of {@link ServerName}.
  18872. </member>
  18873. <member name="P:Org.BouncyCastle.Crypto.Tls.ServerNameList.ServerNames">
  18874. @return an {@link IList} of {@link ServerName}.
  18875. </member>
  18876. <member name="M:Org.BouncyCastle.Crypto.Tls.ServerNameList.Encode(System.IO.Stream)">
  18877. Encode this {@link ServerNameList} to a {@link Stream}.
  18878. @param output
  18879. the {@link Stream} to encode to.
  18880. @throws IOException
  18881. </member>
  18882. <member name="M:Org.BouncyCastle.Crypto.Tls.ServerNameList.Parse(System.IO.Stream)">
  18883. Parse a {@link ServerNameList} from a {@link Stream}.
  18884. @param input
  18885. the {@link Stream} to parse from.
  18886. @return a {@link ServerNameList} object.
  18887. @throws IOException
  18888. </member>
  18889. <member name="M:Org.BouncyCastle.Crypto.Tls.ServerSrpParams.Encode(System.IO.Stream)">
  18890. Encode this {@link ServerSRPParams} to an {@link OutputStream}.
  18891. @param output
  18892. the {@link OutputStream} to encode to.
  18893. @throws IOException
  18894. </member>
  18895. <member name="M:Org.BouncyCastle.Crypto.Tls.ServerSrpParams.Parse(System.IO.Stream)">
  18896. Parse a {@link ServerSRPParams} from an {@link InputStream}.
  18897. @param input
  18898. the {@link InputStream} to parse from.
  18899. @return a {@link ServerSRPParams} object.
  18900. @throws IOException
  18901. </member>
  18902. <member name="T:Org.BouncyCastle.Crypto.Tls.SignatureAlgorithm">
  18903. RFC 5246 7.4.1.4.1 (in RFC 2246, there were no specific values assigned)
  18904. </member>
  18905. <member name="T:Org.BouncyCastle.Crypto.Tls.SignatureAndHashAlgorithm">
  18906. RFC 5246 7.4.1.4.1
  18907. </member>
  18908. <member name="M:Org.BouncyCastle.Crypto.Tls.SignatureAndHashAlgorithm.#ctor(System.Byte,System.Byte)">
  18909. @param hash {@link HashAlgorithm}
  18910. @param signature {@link SignatureAlgorithm}
  18911. </member>
  18912. <member name="P:Org.BouncyCastle.Crypto.Tls.SignatureAndHashAlgorithm.Hash">
  18913. @return {@link HashAlgorithm}
  18914. </member>
  18915. <member name="P:Org.BouncyCastle.Crypto.Tls.SignatureAndHashAlgorithm.Signature">
  18916. @return {@link SignatureAlgorithm}
  18917. </member>
  18918. <member name="M:Org.BouncyCastle.Crypto.Tls.SignatureAndHashAlgorithm.Encode(System.IO.Stream)">
  18919. Encode this {@link SignatureAndHashAlgorithm} to a {@link Stream}.
  18920. @param output the {@link Stream} to encode to.
  18921. @throws IOException
  18922. </member>
  18923. <member name="M:Org.BouncyCastle.Crypto.Tls.SignatureAndHashAlgorithm.Parse(System.IO.Stream)">
  18924. Parse a {@link SignatureAndHashAlgorithm} from a {@link Stream}.
  18925. @param input the {@link Stream} to parse from.
  18926. @return a {@link SignatureAndHashAlgorithm} object.
  18927. @throws IOException
  18928. </member>
  18929. <member name="T:Org.BouncyCastle.Crypto.Tls.SimulatedTlsSrpIdentityManager">
  18930. An implementation of {@link TlsSRPIdentityManager} that simulates the existence of "unknown" identities
  18931. to obscure the fact that there is no verifier for them.
  18932. </member>
  18933. <member name="M:Org.BouncyCastle.Crypto.Tls.SimulatedTlsSrpIdentityManager.GetRfc5054Default(Org.BouncyCastle.Crypto.Parameters.Srp6GroupParameters,System.Byte[])">
  18934. Create a {@link SimulatedTlsSRPIdentityManager} that implements the algorithm from RFC 5054 2.5.1.3
  18935. @param group the {@link SRP6GroupParameters} defining the group that SRP is operating in
  18936. @param seedKey the secret "seed key" referred to in RFC 5054 2.5.1.3
  18937. @return an instance of {@link SimulatedTlsSRPIdentityManager}
  18938. </member>
  18939. <member name="T:Org.BouncyCastle.Crypto.Tls.Ssl3Mac">
  18940. HMAC implementation based on original internet draft for HMAC (RFC 2104)
  18941. The difference is that padding is concatentated versus XORed with the key
  18942. H(K + opad, H(K + ipad, text))
  18943. </member>
  18944. <member name="M:Org.BouncyCastle.Crypto.Tls.Ssl3Mac.#ctor(Org.BouncyCastle.Crypto.IDigest)">
  18945. Base constructor for one of the standard digest algorithms that the byteLength of
  18946. the algorithm is know for. Behaviour is undefined for digests other than MD5 or SHA1.
  18947. @param digest the digest.
  18948. </member>
  18949. <member name="M:Org.BouncyCastle.Crypto.Tls.Ssl3Mac.Reset">
  18950. Reset the mac generator.
  18951. </member>
  18952. <member name="T:Org.BouncyCastle.Crypto.Tls.SupplementalDataType">
  18953. <summary>RFC 4680</summary>
  18954. </member>
  18955. <member name="M:Org.BouncyCastle.Crypto.Tls.TlsAeadCipher.#ctor(Org.BouncyCastle.Crypto.Tls.TlsContext,Org.BouncyCastle.Crypto.Modes.IAeadBlockCipher,Org.BouncyCastle.Crypto.Modes.IAeadBlockCipher,System.Int32,System.Int32)">
  18956. <exception cref="T:System.IO.IOException"></exception>
  18957. </member>
  18958. <member name="M:Org.BouncyCastle.Crypto.Tls.TlsAeadCipher.#ctor(Org.BouncyCastle.Crypto.Tls.TlsContext,Org.BouncyCastle.Crypto.Modes.IAeadBlockCipher,Org.BouncyCastle.Crypto.Modes.IAeadBlockCipher,System.Int32,System.Int32,System.Int32)">
  18959. <exception cref="T:System.IO.IOException"></exception>
  18960. </member>
  18961. <member name="M:Org.BouncyCastle.Crypto.Tls.TlsAeadCipher.EncodePlaintext(System.Int64,System.Byte,System.Byte[],System.Int32,System.Int32)">
  18962. <exception cref="T:System.IO.IOException"></exception>
  18963. </member>
  18964. <member name="M:Org.BouncyCastle.Crypto.Tls.TlsAeadCipher.DecodeCiphertext(System.Int64,System.Byte,System.Byte[],System.Int32,System.Int32)">
  18965. <exception cref="T:System.IO.IOException"></exception>
  18966. </member>
  18967. <member name="M:Org.BouncyCastle.Crypto.Tls.TlsAeadCipher.GetAdditionalData(System.Int64,System.Byte,System.Int32)">
  18968. <exception cref="T:System.IO.IOException"></exception>
  18969. </member>
  18970. <member name="M:Org.BouncyCastle.Crypto.Tls.TlsAgreementCredentials.GenerateAgreement(Org.BouncyCastle.Crypto.AsymmetricKeyParameter)">
  18971. <exception cref="T:System.IO.IOException"></exception>
  18972. </member>
  18973. <member name="M:Org.BouncyCastle.Crypto.Tls.TlsAuthentication.NotifyServerCertificate(Org.BouncyCastle.Crypto.Tls.Certificate)">
  18974. <summary>
  18975. Called by the protocol handler to report the server certificate.
  18976. </summary>
  18977. <remarks>
  18978. This method is responsible for certificate verification and validation
  18979. </remarks>
  18980. <param name="serverCertificate">The server <see cref="T:Org.BouncyCastle.Crypto.Tls.Certificate"/> received</param>
  18981. <exception cref="T:System.IO.IOException"></exception>
  18982. </member>
  18983. <member name="M:Org.BouncyCastle.Crypto.Tls.TlsAuthentication.GetClientCredentials(Org.BouncyCastle.Crypto.Tls.CertificateRequest)">
  18984. <summary>
  18985. Return client credentials in response to server's certificate request
  18986. </summary>
  18987. <param name="certificateRequest">
  18988. A <see cref="T:Org.BouncyCastle.Crypto.Tls.CertificateRequest"/> containing server certificate request details
  18989. </param>
  18990. <returns>
  18991. A <see cref="T:Org.BouncyCastle.Crypto.Tls.TlsCredentials"/> to be used for client authentication
  18992. (or <c>null</c> for no client authentication)
  18993. </returns>
  18994. <exception cref="T:System.IO.IOException"></exception>
  18995. </member>
  18996. <member name="T:Org.BouncyCastle.Crypto.Tls.TlsBlockCipher">
  18997. <summary>
  18998. A generic TLS 1.0-1.2 / SSLv3 block cipher. This can be used for AES or 3DES for example.
  18999. </summary>
  19000. </member>
  19001. <member name="M:Org.BouncyCastle.Crypto.Tls.TlsBlockCipher.#ctor(Org.BouncyCastle.Crypto.Tls.TlsContext,Org.BouncyCastle.Crypto.IBlockCipher,Org.BouncyCastle.Crypto.IBlockCipher,Org.BouncyCastle.Crypto.IDigest,Org.BouncyCastle.Crypto.IDigest,System.Int32)">
  19002. <exception cref="T:System.IO.IOException"></exception>
  19003. </member>
  19004. <member name="M:Org.BouncyCastle.Crypto.Tls.TlsBlockCipher.DecodeCiphertext(System.Int64,System.Byte,System.Byte[],System.Int32,System.Int32)">
  19005. <exception cref="T:System.IO.IOException"></exception>
  19006. </member>
  19007. <member name="M:Org.BouncyCastle.Crypto.Tls.TlsCipher.EncodePlaintext(System.Int64,System.Byte,System.Byte[],System.Int32,System.Int32)">
  19008. <exception cref="T:System.IO.IOException"></exception>
  19009. </member>
  19010. <member name="M:Org.BouncyCastle.Crypto.Tls.TlsCipher.DecodeCiphertext(System.Int64,System.Byte,System.Byte[],System.Int32,System.Int32)">
  19011. <exception cref="T:System.IO.IOException"></exception>
  19012. </member>
  19013. <member name="M:Org.BouncyCastle.Crypto.Tls.TlsCipherFactory.CreateCipher(Org.BouncyCastle.Crypto.Tls.TlsContext,System.Int32,System.Int32)">
  19014. <exception cref="T:System.IO.IOException"></exception>
  19015. </member>
  19016. <member name="M:Org.BouncyCastle.Crypto.Tls.TlsClient.Init(Org.BouncyCastle.Crypto.Tls.TlsClientContext)">
  19017. <summary>
  19018. Called at the start of a new TLS session, before any other methods.
  19019. </summary>
  19020. <param name="context">
  19021. A <see cref="T:Org.BouncyCastle.Crypto.Tls.TlsProtocolHandler"/>
  19022. </param>
  19023. </member>
  19024. <member name="M:Org.BouncyCastle.Crypto.Tls.TlsClient.GetSessionToResume">
  19025. <summary>Return the session this client wants to resume, if any.</summary>
  19026. <remarks>Note that the peer's certificate chain for the session (if any) may need to be periodically revalidated.</remarks>
  19027. <returns>
  19028. A <see cref="T:Org.BouncyCastle.Crypto.Tls.TlsSession"/> representing the resumable session to be used for this connection,
  19029. or null to use a new session.
  19030. </returns>
  19031. </member>
  19032. <member name="P:Org.BouncyCastle.Crypto.Tls.TlsClient.ClientHelloRecordLayerVersion">
  19033. <summary>
  19034. Return the <see cref="T:Org.BouncyCastle.Crypto.Tls.ProtocolVersion"/> to use for the <c>TLSPlaintext.version</c> field prior to
  19035. receiving the server version. NOTE: This method is <b>not</b> called for DTLS.
  19036. </summary>
  19037. <remarks>
  19038. See RFC 5246 E.1.: "TLS clients that wish to negotiate with older servers MAY send any value
  19039. {03,XX} as the record layer version number. Typical values would be {03,00}, the lowest
  19040. version number supported by the client, and the value of ClientHello.client_version. No
  19041. single value will guarantee interoperability with all old servers, but this is a complex
  19042. topic beyond the scope of this document."
  19043. </remarks>
  19044. <returns>The <see cref="T:Org.BouncyCastle.Crypto.Tls.ProtocolVersion"/> to use.</returns>
  19045. </member>
  19046. <member name="M:Org.BouncyCastle.Crypto.Tls.TlsClient.GetCipherSuites">
  19047. <summary>
  19048. Get the list of cipher suites that this client supports.
  19049. </summary>
  19050. <returns>
  19051. An array of <see cref="T:Org.BouncyCastle.Crypto.Tls.CipherSuite"/> values, each specifying a supported cipher suite.
  19052. </returns>
  19053. </member>
  19054. <member name="M:Org.BouncyCastle.Crypto.Tls.TlsClient.GetCompressionMethods">
  19055. <summary>
  19056. Get the list of compression methods that this client supports.
  19057. </summary>
  19058. <returns>
  19059. An array of <see cref="T:Org.BouncyCastle.Crypto.Tls.CompressionMethod"/> values, each specifying a supported compression method.
  19060. </returns>
  19061. </member>
  19062. <member name="M:Org.BouncyCastle.Crypto.Tls.TlsClient.GetClientExtensions">
  19063. <summary>
  19064. Get the (optional) table of client extensions to be included in (extended) client hello.
  19065. </summary>
  19066. <returns>
  19067. A <see cref="T:System.Collections.IDictionary"/> (Int32 -> byte[]). May be null.
  19068. </returns>
  19069. <exception cref="T:System.IO.IOException"></exception>
  19070. </member>
  19071. <member name="M:Org.BouncyCastle.Crypto.Tls.TlsClient.NotifyServerVersion(Org.BouncyCastle.Crypto.Tls.ProtocolVersion)">
  19072. <exception cref="T:System.IO.IOException"></exception>
  19073. </member>
  19074. <member name="M:Org.BouncyCastle.Crypto.Tls.TlsClient.NotifySessionID(System.Byte[])">
  19075. <summary>
  19076. Notifies the client of the session_id sent in the ServerHello.
  19077. </summary>
  19078. <param name="sessionID">An array of <see cref="T:System.Byte"/></param>
  19079. </member>
  19080. <member name="M:Org.BouncyCastle.Crypto.Tls.TlsClient.NotifySelectedCipherSuite(System.Int32)">
  19081. <summary>
  19082. Report the cipher suite that was selected by the server.
  19083. </summary>
  19084. <remarks>
  19085. The protocol handler validates this value against the offered cipher suites
  19086. <seealso cref="M:Org.BouncyCastle.Crypto.Tls.TlsClient.GetCipherSuites"/>
  19087. </remarks>
  19088. <param name="selectedCipherSuite">
  19089. A <see cref="T:Org.BouncyCastle.Crypto.Tls.CipherSuite"/>
  19090. </param>
  19091. </member>
  19092. <member name="M:Org.BouncyCastle.Crypto.Tls.TlsClient.NotifySelectedCompressionMethod(System.Byte)">
  19093. <summary>
  19094. Report the compression method that was selected by the server.
  19095. </summary>
  19096. <remarks>
  19097. The protocol handler validates this value against the offered compression methods
  19098. <seealso cref="M:Org.BouncyCastle.Crypto.Tls.TlsClient.GetCompressionMethods"/>
  19099. </remarks>
  19100. <param name="selectedCompressionMethod">
  19101. A <see cref="T:Org.BouncyCastle.Crypto.Tls.CompressionMethod"/>
  19102. </param>
  19103. </member>
  19104. <member name="M:Org.BouncyCastle.Crypto.Tls.TlsClient.ProcessServerExtensions(System.Collections.IDictionary)">
  19105. <summary>
  19106. Report the extensions from an extended server hello.
  19107. </summary>
  19108. <remarks>
  19109. Will only be called if we returned a non-null result from <see cref="M:Org.BouncyCastle.Crypto.Tls.TlsClient.GetClientExtensions"/>.
  19110. </remarks>
  19111. <param name="serverExtensions">
  19112. A <see cref="T:System.Collections.IDictionary"/> (Int32 -> byte[])
  19113. </param>
  19114. </member>
  19115. <member name="M:Org.BouncyCastle.Crypto.Tls.TlsClient.ProcessServerSupplementalData(System.Collections.IList)">
  19116. <param name="serverSupplementalData">A <see cref="T:System.Collections.IList">list</see> of <see cref="T:Org.BouncyCastle.Crypto.Tls.SupplementalDataEntry"/></param>
  19117. <exception cref="T:System.IO.IOException"/>
  19118. </member>
  19119. <member name="M:Org.BouncyCastle.Crypto.Tls.TlsClient.GetKeyExchange">
  19120. <summary>
  19121. Return an implementation of <see cref="T:Org.BouncyCastle.Crypto.Tls.TlsKeyExchange"/> to negotiate the key exchange
  19122. part of the protocol.
  19123. </summary>
  19124. <returns>
  19125. A <see cref="T:Org.BouncyCastle.Crypto.Tls.TlsKeyExchange"/>
  19126. </returns>
  19127. <exception cref="T:System.IO.IOException"/>
  19128. </member>
  19129. <member name="M:Org.BouncyCastle.Crypto.Tls.TlsClient.GetAuthentication">
  19130. <summary>
  19131. Return an implementation of <see cref="T:Org.BouncyCastle.Crypto.Tls.TlsAuthentication"/> to handle authentication
  19132. part of the protocol.
  19133. </summary>
  19134. <exception cref="T:System.IO.IOException"/>
  19135. </member>
  19136. <member name="M:Org.BouncyCastle.Crypto.Tls.TlsClient.GetClientSupplementalData">
  19137. <returns>A <see cref="T:System.Collections.IList">list</see> of <see cref="T:Org.BouncyCastle.Crypto.Tls.SupplementalDataEntry"/></returns>
  19138. <exception cref="T:System.IO.IOException"/>
  19139. </member>
  19140. <member name="M:Org.BouncyCastle.Crypto.Tls.TlsClient.NotifyNewSessionTicket(Org.BouncyCastle.Crypto.Tls.NewSessionTicket)">
  19141. <summary>RFC 5077 3.3. NewSessionTicket Handshake Message</summary>
  19142. <remarks>
  19143. This method will be called (only) when a NewSessionTicket handshake message is received. The
  19144. ticket is opaque to the client and clients MUST NOT examine the ticket under the assumption
  19145. that it complies with e.g. <i>RFC 5077 4. Recommended Ticket Construction</i>.
  19146. </remarks>
  19147. <param name="newSessionTicket">The <see cref="T:Org.BouncyCastle.Crypto.Tls.NewSessionTicket">ticket</see></param>
  19148. <exception cref="T:System.IO.IOException"/>
  19149. </member>
  19150. <member name="M:Org.BouncyCastle.Crypto.Tls.TlsClientProtocol.#ctor(System.IO.Stream,Org.BouncyCastle.Security.SecureRandom)">
  19151. Constructor for blocking mode.
  19152. @param stream The bi-directional stream of data to/from the server
  19153. @param secureRandom Random number generator for various cryptographic functions
  19154. </member>
  19155. <member name="M:Org.BouncyCastle.Crypto.Tls.TlsClientProtocol.#ctor(System.IO.Stream,System.IO.Stream,Org.BouncyCastle.Security.SecureRandom)">
  19156. Constructor for blocking mode.
  19157. @param input The stream of data from the server
  19158. @param output The stream of data to the server
  19159. @param secureRandom Random number generator for various cryptographic functions
  19160. </member>
  19161. <member name="M:Org.BouncyCastle.Crypto.Tls.TlsClientProtocol.#ctor(Org.BouncyCastle.Security.SecureRandom)">
  19162. Constructor for non-blocking mode.<br/>
  19163. <br/>
  19164. When data is received, use {@link #offerInput(java.nio.ByteBuffer)} to
  19165. provide the received ciphertext, then use
  19166. {@link #readInput(byte[], int, int)} to read the corresponding cleartext.<br/>
  19167. <br/>
  19168. Similarly, when data needs to be sent, use
  19169. {@link #offerOutput(byte[], int, int)} to provide the cleartext, then use
  19170. {@link #readOutput(byte[], int, int)} to get the corresponding
  19171. ciphertext.
  19172. @param secureRandom
  19173. Random number generator for various cryptographic functions
  19174. </member>
  19175. <member name="M:Org.BouncyCastle.Crypto.Tls.TlsClientProtocol.Connect(Org.BouncyCastle.Crypto.Tls.TlsClient)">
  19176. Initiates a TLS handshake in the role of client.<br/>
  19177. <br/>
  19178. In blocking mode, this will not return until the handshake is complete.
  19179. In non-blocking mode, use {@link TlsPeer#NotifyHandshakeComplete()} to
  19180. receive a callback when the handshake is complete.
  19181. @param tlsClient The {@link TlsClient} to use for the handshake.
  19182. @throws IOException If in blocking mode and handshake was not successful.
  19183. </member>
  19184. <member name="M:Org.BouncyCastle.Crypto.Tls.TlsCloseable.Close">
  19185. <exception cref="T:System.IO.IOException"/>
  19186. </member>
  19187. <member name="P:Org.BouncyCastle.Crypto.Tls.TlsContext.ResumableSession">
  19188. Used to get the resumable session, if any, used by this connection. Only available after the
  19189. handshake has successfully completed.
  19190. @return A {@link TlsSession} representing the resumable session used by this connection, or
  19191. null if no resumable session available.
  19192. @see TlsPeer#NotifyHandshakeComplete()
  19193. </member>
  19194. <member name="M:Org.BouncyCastle.Crypto.Tls.TlsContext.ExportKeyingMaterial(System.String,System.Byte[],System.Int32)">
  19195. Export keying material according to RFC 5705: "Keying Material Exporters for TLS".
  19196. @param asciiLabel indicates which application will use the exported keys.
  19197. @param context_value allows the application using the exporter to mix its own data with the TLS PRF for
  19198. the exporter output.
  19199. @param length the number of bytes to generate
  19200. @return a pseudorandom bit string of 'length' bytes generated from the master_secret.
  19201. </member>
  19202. <member name="T:Org.BouncyCastle.Crypto.Tls.TlsDHKeyExchange">
  19203. <summary>(D)TLS DH key exchange.</summary>
  19204. </member>
  19205. <member name="T:Org.BouncyCastle.Crypto.Tls.TlsDHVerifier">
  19206. <summary>An interface for verifying that Diffie-Hellman parameters are acceptable.</summary>
  19207. </member>
  19208. <member name="M:Org.BouncyCastle.Crypto.Tls.TlsDHVerifier.Accept(Org.BouncyCastle.Crypto.Parameters.DHParameters)">
  19209. <summary>Verify that the given <c>DHParameters</c> are acceptable.</summary>
  19210. <param name="dhParameters">The <c>DHParameters</c> to verify.</param>
  19211. <returns>true if (and only if) the specified parameters are acceptable.</returns>
  19212. </member>
  19213. <member name="T:Org.BouncyCastle.Crypto.Tls.TlsECDheKeyExchange">
  19214. <summary>(D)TLS ECDHE key exchange (see RFC 4492).</summary>
  19215. </member>
  19216. <member name="T:Org.BouncyCastle.Crypto.Tls.TlsECDHKeyExchange">
  19217. <summary>(D)TLS ECDH key exchange (see RFC 4492).</summary>
  19218. </member>
  19219. <member name="M:Org.BouncyCastle.Crypto.Tls.TlsEncryptionCredentials.DecryptPreMasterSecret(System.Byte[])">
  19220. <exception cref="T:System.IO.IOException"></exception>
  19221. </member>
  19222. <member name="M:Org.BouncyCastle.Crypto.Tls.TlsExtensionsUtilities.AddClientCertificateTypeExtensionClient(System.Collections.IDictionary,System.Byte[])">
  19223. <exception cref="T:System.IO.IOException"></exception>
  19224. </member>
  19225. <member name="M:Org.BouncyCastle.Crypto.Tls.TlsExtensionsUtilities.AddClientCertificateTypeExtensionServer(System.Collections.IDictionary,System.Byte)">
  19226. <exception cref="T:System.IO.IOException"></exception>
  19227. </member>
  19228. <member name="M:Org.BouncyCastle.Crypto.Tls.TlsExtensionsUtilities.AddHeartbeatExtension(System.Collections.IDictionary,Org.BouncyCastle.Crypto.Tls.HeartbeatExtension)">
  19229. <exception cref="T:System.IO.IOException"></exception>
  19230. </member>
  19231. <member name="M:Org.BouncyCastle.Crypto.Tls.TlsExtensionsUtilities.AddMaxFragmentLengthExtension(System.Collections.IDictionary,System.Byte)">
  19232. <exception cref="T:System.IO.IOException"></exception>
  19233. </member>
  19234. <member name="M:Org.BouncyCastle.Crypto.Tls.TlsExtensionsUtilities.AddPaddingExtension(System.Collections.IDictionary,System.Int32)">
  19235. <exception cref="T:System.IO.IOException"></exception>
  19236. </member>
  19237. <member name="M:Org.BouncyCastle.Crypto.Tls.TlsExtensionsUtilities.AddServerCertificateTypeExtensionClient(System.Collections.IDictionary,System.Byte[])">
  19238. <exception cref="T:System.IO.IOException"></exception>
  19239. </member>
  19240. <member name="M:Org.BouncyCastle.Crypto.Tls.TlsExtensionsUtilities.AddServerCertificateTypeExtensionServer(System.Collections.IDictionary,System.Byte)">
  19241. <exception cref="T:System.IO.IOException"></exception>
  19242. </member>
  19243. <member name="M:Org.BouncyCastle.Crypto.Tls.TlsExtensionsUtilities.AddServerNameExtension(System.Collections.IDictionary,Org.BouncyCastle.Crypto.Tls.ServerNameList)">
  19244. <exception cref="T:System.IO.IOException"></exception>
  19245. </member>
  19246. <member name="M:Org.BouncyCastle.Crypto.Tls.TlsExtensionsUtilities.AddStatusRequestExtension(System.Collections.IDictionary,Org.BouncyCastle.Crypto.Tls.CertificateStatusRequest)">
  19247. <exception cref="T:System.IO.IOException"></exception>
  19248. </member>
  19249. <member name="M:Org.BouncyCastle.Crypto.Tls.TlsExtensionsUtilities.GetClientCertificateTypeExtensionClient(System.Collections.IDictionary)">
  19250. <exception cref="T:System.IO.IOException"></exception>
  19251. </member>
  19252. <member name="M:Org.BouncyCastle.Crypto.Tls.TlsExtensionsUtilities.GetClientCertificateTypeExtensionServer(System.Collections.IDictionary)">
  19253. <exception cref="T:System.IO.IOException"></exception>
  19254. </member>
  19255. <member name="M:Org.BouncyCastle.Crypto.Tls.TlsExtensionsUtilities.GetHeartbeatExtension(System.Collections.IDictionary)">
  19256. <exception cref="T:System.IO.IOException"></exception>
  19257. </member>
  19258. <member name="M:Org.BouncyCastle.Crypto.Tls.TlsExtensionsUtilities.GetMaxFragmentLengthExtension(System.Collections.IDictionary)">
  19259. <exception cref="T:System.IO.IOException"></exception>
  19260. </member>
  19261. <member name="M:Org.BouncyCastle.Crypto.Tls.TlsExtensionsUtilities.GetPaddingExtension(System.Collections.IDictionary)">
  19262. <exception cref="T:System.IO.IOException"></exception>
  19263. </member>
  19264. <member name="M:Org.BouncyCastle.Crypto.Tls.TlsExtensionsUtilities.GetServerCertificateTypeExtensionClient(System.Collections.IDictionary)">
  19265. <exception cref="T:System.IO.IOException"></exception>
  19266. </member>
  19267. <member name="M:Org.BouncyCastle.Crypto.Tls.TlsExtensionsUtilities.GetServerCertificateTypeExtensionServer(System.Collections.IDictionary)">
  19268. <exception cref="T:System.IO.IOException"></exception>
  19269. </member>
  19270. <member name="M:Org.BouncyCastle.Crypto.Tls.TlsExtensionsUtilities.GetServerNameExtension(System.Collections.IDictionary)">
  19271. <exception cref="T:System.IO.IOException"></exception>
  19272. </member>
  19273. <member name="M:Org.BouncyCastle.Crypto.Tls.TlsExtensionsUtilities.GetStatusRequestExtension(System.Collections.IDictionary)">
  19274. <exception cref="T:System.IO.IOException"></exception>
  19275. </member>
  19276. <member name="M:Org.BouncyCastle.Crypto.Tls.TlsExtensionsUtilities.HasEncryptThenMacExtension(System.Collections.IDictionary)">
  19277. <exception cref="T:System.IO.IOException"></exception>
  19278. </member>
  19279. <member name="M:Org.BouncyCastle.Crypto.Tls.TlsExtensionsUtilities.HasExtendedMasterSecretExtension(System.Collections.IDictionary)">
  19280. <exception cref="T:System.IO.IOException"></exception>
  19281. </member>
  19282. <member name="M:Org.BouncyCastle.Crypto.Tls.TlsExtensionsUtilities.HasTruncatedHMacExtension(System.Collections.IDictionary)">
  19283. <exception cref="T:System.IO.IOException"></exception>
  19284. </member>
  19285. <member name="M:Org.BouncyCastle.Crypto.Tls.TlsExtensionsUtilities.CreateCertificateTypeExtensionClient(System.Byte[])">
  19286. <exception cref="T:System.IO.IOException"></exception>
  19287. </member>
  19288. <member name="M:Org.BouncyCastle.Crypto.Tls.TlsExtensionsUtilities.CreateCertificateTypeExtensionServer(System.Byte)">
  19289. <exception cref="T:System.IO.IOException"></exception>
  19290. </member>
  19291. <member name="M:Org.BouncyCastle.Crypto.Tls.TlsExtensionsUtilities.CreateHeartbeatExtension(Org.BouncyCastle.Crypto.Tls.HeartbeatExtension)">
  19292. <exception cref="T:System.IO.IOException"></exception>
  19293. </member>
  19294. <member name="M:Org.BouncyCastle.Crypto.Tls.TlsExtensionsUtilities.CreateMaxFragmentLengthExtension(System.Byte)">
  19295. <exception cref="T:System.IO.IOException"></exception>
  19296. </member>
  19297. <member name="M:Org.BouncyCastle.Crypto.Tls.TlsExtensionsUtilities.CreatePaddingExtension(System.Int32)">
  19298. <exception cref="T:System.IO.IOException"></exception>
  19299. </member>
  19300. <member name="M:Org.BouncyCastle.Crypto.Tls.TlsExtensionsUtilities.CreateServerNameExtension(Org.BouncyCastle.Crypto.Tls.ServerNameList)">
  19301. <exception cref="T:System.IO.IOException"></exception>
  19302. </member>
  19303. <member name="M:Org.BouncyCastle.Crypto.Tls.TlsExtensionsUtilities.CreateStatusRequestExtension(Org.BouncyCastle.Crypto.Tls.CertificateStatusRequest)">
  19304. <exception cref="T:System.IO.IOException"></exception>
  19305. </member>
  19306. <member name="M:Org.BouncyCastle.Crypto.Tls.TlsExtensionsUtilities.ReadEmptyExtensionData(System.Byte[])">
  19307. <exception cref="T:System.IO.IOException"></exception>
  19308. </member>
  19309. <member name="M:Org.BouncyCastle.Crypto.Tls.TlsExtensionsUtilities.ReadCertificateTypeExtensionClient(System.Byte[])">
  19310. <exception cref="T:System.IO.IOException"></exception>
  19311. </member>
  19312. <member name="M:Org.BouncyCastle.Crypto.Tls.TlsExtensionsUtilities.ReadCertificateTypeExtensionServer(System.Byte[])">
  19313. <exception cref="T:System.IO.IOException"></exception>
  19314. </member>
  19315. <member name="M:Org.BouncyCastle.Crypto.Tls.TlsExtensionsUtilities.ReadEncryptThenMacExtension(System.Byte[])">
  19316. <exception cref="T:System.IO.IOException"></exception>
  19317. </member>
  19318. <member name="M:Org.BouncyCastle.Crypto.Tls.TlsExtensionsUtilities.ReadExtendedMasterSecretExtension(System.Byte[])">
  19319. <exception cref="T:System.IO.IOException"></exception>
  19320. </member>
  19321. <member name="M:Org.BouncyCastle.Crypto.Tls.TlsExtensionsUtilities.ReadHeartbeatExtension(System.Byte[])">
  19322. <exception cref="T:System.IO.IOException"></exception>
  19323. </member>
  19324. <member name="M:Org.BouncyCastle.Crypto.Tls.TlsExtensionsUtilities.ReadMaxFragmentLengthExtension(System.Byte[])">
  19325. <exception cref="T:System.IO.IOException"></exception>
  19326. </member>
  19327. <member name="M:Org.BouncyCastle.Crypto.Tls.TlsExtensionsUtilities.ReadPaddingExtension(System.Byte[])">
  19328. <exception cref="T:System.IO.IOException"></exception>
  19329. </member>
  19330. <member name="M:Org.BouncyCastle.Crypto.Tls.TlsExtensionsUtilities.ReadServerNameExtension(System.Byte[])">
  19331. <exception cref="T:System.IO.IOException"></exception>
  19332. </member>
  19333. <member name="M:Org.BouncyCastle.Crypto.Tls.TlsExtensionsUtilities.ReadStatusRequestExtension(System.Byte[])">
  19334. <exception cref="T:System.IO.IOException"></exception>
  19335. </member>
  19336. <member name="M:Org.BouncyCastle.Crypto.Tls.TlsExtensionsUtilities.ReadTruncatedHMacExtension(System.Byte[])">
  19337. <exception cref="T:System.IO.IOException"></exception>
  19338. </member>
  19339. <member name="T:Org.BouncyCastle.Crypto.Tls.TlsKeyExchange">
  19340. <summary>
  19341. A generic interface for key exchange implementations in (D)TLS.
  19342. </summary>
  19343. </member>
  19344. <member name="M:Org.BouncyCastle.Crypto.Tls.TlsKeyExchange.SkipServerCredentials">
  19345. <exception cref="T:System.IO.IOException"/>
  19346. </member>
  19347. <member name="M:Org.BouncyCastle.Crypto.Tls.TlsKeyExchange.ProcessServerCredentials(Org.BouncyCastle.Crypto.Tls.TlsCredentials)">
  19348. <exception cref="T:System.IO.IOException"/>
  19349. </member>
  19350. <member name="M:Org.BouncyCastle.Crypto.Tls.TlsKeyExchange.ProcessServerCertificate(Org.BouncyCastle.Crypto.Tls.Certificate)">
  19351. <exception cref="T:System.IO.IOException"/>
  19352. </member>
  19353. <member name="M:Org.BouncyCastle.Crypto.Tls.TlsKeyExchange.GenerateServerKeyExchange">
  19354. <exception cref="T:System.IO.IOException"/>
  19355. </member>
  19356. <member name="M:Org.BouncyCastle.Crypto.Tls.TlsKeyExchange.SkipServerKeyExchange">
  19357. <exception cref="T:System.IO.IOException"/>
  19358. </member>
  19359. <member name="M:Org.BouncyCastle.Crypto.Tls.TlsKeyExchange.ProcessServerKeyExchange(System.IO.Stream)">
  19360. <exception cref="T:System.IO.IOException"/>
  19361. </member>
  19362. <member name="M:Org.BouncyCastle.Crypto.Tls.TlsKeyExchange.ValidateCertificateRequest(Org.BouncyCastle.Crypto.Tls.CertificateRequest)">
  19363. <exception cref="T:System.IO.IOException"/>
  19364. </member>
  19365. <member name="M:Org.BouncyCastle.Crypto.Tls.TlsKeyExchange.SkipClientCredentials">
  19366. <exception cref="T:System.IO.IOException"/>
  19367. </member>
  19368. <member name="M:Org.BouncyCastle.Crypto.Tls.TlsKeyExchange.ProcessClientCredentials(Org.BouncyCastle.Crypto.Tls.TlsCredentials)">
  19369. <exception cref="T:System.IO.IOException"/>
  19370. </member>
  19371. <member name="M:Org.BouncyCastle.Crypto.Tls.TlsKeyExchange.ProcessClientCertificate(Org.BouncyCastle.Crypto.Tls.Certificate)">
  19372. <exception cref="T:System.IO.IOException"/>
  19373. </member>
  19374. <member name="M:Org.BouncyCastle.Crypto.Tls.TlsKeyExchange.GenerateClientKeyExchange(System.IO.Stream)">
  19375. <exception cref="T:System.IO.IOException"/>
  19376. </member>
  19377. <member name="M:Org.BouncyCastle.Crypto.Tls.TlsKeyExchange.ProcessClientKeyExchange(System.IO.Stream)">
  19378. <exception cref="T:System.IO.IOException"/>
  19379. </member>
  19380. <member name="M:Org.BouncyCastle.Crypto.Tls.TlsKeyExchange.GeneratePremasterSecret">
  19381. <exception cref="T:System.IO.IOException"/>
  19382. </member>
  19383. <member name="T:Org.BouncyCastle.Crypto.Tls.TlsMac">
  19384. <summary>
  19385. A generic TLS MAC implementation, acting as an HMAC based on some underlying Digest.
  19386. </summary>
  19387. </member>
  19388. <member name="M:Org.BouncyCastle.Crypto.Tls.TlsMac.#ctor(Org.BouncyCastle.Crypto.Tls.TlsContext,Org.BouncyCastle.Crypto.IDigest,System.Byte[],System.Int32,System.Int32)">
  19389. Generate a new instance of an TlsMac.
  19390. @param context the TLS client context
  19391. @param digest The digest to use.
  19392. @param key A byte-array where the key for this MAC is located.
  19393. @param keyOff The number of bytes to skip, before the key starts in the buffer.
  19394. @param keyLen The length of the key.
  19395. </member>
  19396. <member name="P:Org.BouncyCastle.Crypto.Tls.TlsMac.MacSecret">
  19397. @return the MAC write secret
  19398. </member>
  19399. <member name="P:Org.BouncyCastle.Crypto.Tls.TlsMac.Size">
  19400. @return The output length of this MAC.
  19401. </member>
  19402. <member name="M:Org.BouncyCastle.Crypto.Tls.TlsMac.CalculateMac(System.Int64,System.Byte,System.Byte[],System.Int32,System.Int32)">
  19403. Calculate the MAC for some given data.
  19404. @param type The message type of the message.
  19405. @param message A byte-buffer containing the message.
  19406. @param offset The number of bytes to skip, before the message starts.
  19407. @param length The length of the message.
  19408. @return A new byte-buffer containing the MAC value.
  19409. </member>
  19410. <member name="T:Org.BouncyCastle.Crypto.Tls.TlsNoCloseNotifyException">
  19411. <summary>
  19412. This exception will be thrown(only) when the connection is closed by the peer without sending a
  19413. <code cref="F:Org.BouncyCastle.Crypto.Tls.AlertDescription.close_notify">close_notify</code> warning alert.
  19414. </summary>
  19415. <remarks>
  19416. If this happens, the TLS protocol cannot rule out truncation of the connection data (potentially
  19417. malicious). It may be possible to check for truncation via some property of a higher level protocol
  19418. built upon TLS, e.g.the Content-Length header for HTTPS.
  19419. </remarks>
  19420. </member>
  19421. <member name="T:Org.BouncyCastle.Crypto.Tls.TlsNullCipher">
  19422. <summary>
  19423. A NULL CipherSuite, with optional MAC.
  19424. </summary>
  19425. </member>
  19426. <member name="M:Org.BouncyCastle.Crypto.Tls.TlsNullCipher.#ctor(Org.BouncyCastle.Crypto.Tls.TlsContext,Org.BouncyCastle.Crypto.IDigest,Org.BouncyCastle.Crypto.IDigest)">
  19427. <exception cref="T:System.IO.IOException"></exception>
  19428. </member>
  19429. <member name="M:Org.BouncyCastle.Crypto.Tls.TlsNullCipher.EncodePlaintext(System.Int64,System.Byte,System.Byte[],System.Int32,System.Int32)">
  19430. <exception cref="T:System.IO.IOException"></exception>
  19431. </member>
  19432. <member name="M:Org.BouncyCastle.Crypto.Tls.TlsNullCipher.DecodeCiphertext(System.Int64,System.Byte,System.Byte[],System.Int32,System.Int32)">
  19433. <exception cref="T:System.IO.IOException"></exception>
  19434. </member>
  19435. <member name="M:Org.BouncyCastle.Crypto.Tls.TlsPeer.Cancel">
  19436. <exception cref="T:System.IO.IOException"/>
  19437. </member>
  19438. <member name="M:Org.BouncyCastle.Crypto.Tls.TlsPeer.GetHandshakeTimeoutMillis">
  19439. <summary>
  19440. Specify the timeout, in milliseconds, to use for the complete handshake process.
  19441. </summary>
  19442. <remarks>
  19443. Negative values are not allowed. A timeout of zero means an infinite timeout (i.e. the
  19444. handshake will never time out). NOTE: Currently only respected by DTLS protocols.
  19445. </remarks>
  19446. </member>
  19447. <member name="M:Org.BouncyCastle.Crypto.Tls.TlsPeer.RequiresExtendedMasterSecret">
  19448. <summary>
  19449. This implementation supports RFC 7627 and will always negotiate the extended_master_secret
  19450. extension where possible.
  19451. </summary>
  19452. <remarks>
  19453. When connecting to a peer that does not offer/accept this extension, it is recommended to
  19454. abort the handshake. This option is provided for interoperability with legacy peers,
  19455. although some TLS features will be disabled in that case (see RFC 7627 5.4).
  19456. </remarks>
  19457. <returns>
  19458. <code>true</code> if the handshake should be aborted when the peer does not negotiate the
  19459. extended_master_secret extension, or <code>false</code> to support legacy interoperability.
  19460. </returns>
  19461. </member>
  19462. <member name="M:Org.BouncyCastle.Crypto.Tls.TlsPeer.ShouldUseGmtUnixTime">
  19463. <summary>
  19464. draft-mathewson-no-gmtunixtime-00 2. "If existing users of a TLS implementation may rely on
  19465. gmt_unix_time containing the current time, we recommend that implementors MAY provide the
  19466. ability to set gmt_unix_time as an option only, off by default."
  19467. </summary>
  19468. <returns>
  19469. <code>true</code> if the current time should be used in the gmt_unix_time field of
  19470. Random, or <code>false</code> if gmt_unix_time should contain a cryptographically
  19471. random value.
  19472. </returns>
  19473. </member>
  19474. <member name="M:Org.BouncyCastle.Crypto.Tls.TlsPeer.NotifySecureRenegotiation(System.Boolean)">
  19475. <summary>
  19476. Report whether the server supports secure renegotiation
  19477. </summary>
  19478. <remarks>
  19479. The protocol handler automatically processes the relevant extensions
  19480. </remarks>
  19481. <param name="secureRenegotiation">
  19482. A <see cref="T:System.Boolean"/>, true if the server supports secure renegotiation
  19483. </param>
  19484. <exception cref="T:System.IO.IOException"></exception>
  19485. </member>
  19486. <member name="M:Org.BouncyCastle.Crypto.Tls.TlsPeer.GetCompression">
  19487. <summary>
  19488. Return an implementation of <see cref="T:Org.BouncyCastle.Crypto.Tls.TlsCompression"/> to handle record compression.
  19489. </summary>
  19490. <returns>A <see cref="T:Org.BouncyCastle.Crypto.Tls.TlsCompression"/></returns>
  19491. <exception cref="T:System.IO.IOException"/>
  19492. </member>
  19493. <member name="M:Org.BouncyCastle.Crypto.Tls.TlsPeer.GetCipher">
  19494. <summary>
  19495. Return an implementation of <see cref="T:Org.BouncyCastle.Crypto.Tls.TlsCipher"/> to use for encryption/decryption.
  19496. </summary>
  19497. <returns>A <see cref="T:Org.BouncyCastle.Crypto.Tls.TlsCipher"/></returns>
  19498. <exception cref="T:System.IO.IOException"/>
  19499. </member>
  19500. <member name="M:Org.BouncyCastle.Crypto.Tls.TlsPeer.NotifyAlertRaised(System.Byte,System.Byte,System.String,System.Exception)">
  19501. <summary>This method will be called when an alert is raised by the protocol.</summary>
  19502. <param name="alertLevel"><see cref="T:Org.BouncyCastle.Crypto.Tls.AlertLevel"/></param>
  19503. <param name="alertDescription"><see cref="T:Org.BouncyCastle.Crypto.Tls.AlertDescription"/></param>
  19504. <param name="message">A human-readable message explaining what caused this alert. May be null.</param>
  19505. <param name="cause">The <c>Exception</c> that caused this alert to be raised. May be null.</param>
  19506. </member>
  19507. <member name="M:Org.BouncyCastle.Crypto.Tls.TlsPeer.NotifyAlertReceived(System.Byte,System.Byte)">
  19508. <summary>This method will be called when an alert is received from the remote peer.</summary>
  19509. <param name="alertLevel"><see cref="T:Org.BouncyCastle.Crypto.Tls.AlertLevel"/></param>
  19510. <param name="alertDescription"><see cref="T:Org.BouncyCastle.Crypto.Tls.AlertDescription"/></param>
  19511. </member>
  19512. <member name="M:Org.BouncyCastle.Crypto.Tls.TlsPeer.NotifyHandshakeComplete">
  19513. <summary>Notifies the peer that the handshake has been successfully completed.</summary>
  19514. <exception cref="T:System.IO.IOException"></exception>
  19515. </member>
  19516. <member name="M:Org.BouncyCastle.Crypto.Tls.TlsProtocol.ProcessChangeCipherSpec(System.Byte[],System.Int32,System.Int32)">
  19517. This method is called, when a change cipher spec message is received.
  19518. @throws IOException If the message has an invalid content or the handshake is not in the correct
  19519. state.
  19520. </member>
  19521. <member name="M:Org.BouncyCastle.Crypto.Tls.TlsProtocol.ReadApplicationData(System.Byte[],System.Int32,System.Int32)">
  19522. Read data from the network. The method will return immediately, if there is still some data
  19523. left in the buffer, or block until some application data has been read from the network.
  19524. @param buf The buffer where the data will be copied to.
  19525. @param offset The position where the data will be placed in the buffer.
  19526. @param len The maximum number of bytes to read.
  19527. @return The number of bytes read.
  19528. @throws IOException If something goes wrong during reading data.
  19529. </member>
  19530. <member name="M:Org.BouncyCastle.Crypto.Tls.TlsProtocol.WriteData(System.Byte[],System.Int32,System.Int32)">
  19531. Send some application data to the remote system.
  19532. <p/>
  19533. The method will handle fragmentation internally.
  19534. @param buf The buffer with the data.
  19535. @param offset The position in the buffer where the data is placed.
  19536. @param len The length of the data.
  19537. @throws IOException If something goes wrong during sending.
  19538. </member>
  19539. <member name="P:Org.BouncyCastle.Crypto.Tls.TlsProtocol.Stream">
  19540. <summary>The secure bidirectional stream for this connection</summary>
  19541. <remarks>Only allowed in blocking mode.</remarks>
  19542. </member>
  19543. <member name="M:Org.BouncyCastle.Crypto.Tls.TlsProtocol.CloseInput">
  19544. Should be called in non-blocking mode when the input data reaches EOF.
  19545. </member>
  19546. <member name="M:Org.BouncyCastle.Crypto.Tls.TlsProtocol.OfferInput(System.Byte[])">
  19547. Equivalent to <code>OfferInput(input, 0, input.length)</code>
  19548. @see TlsProtocol#OfferInput(byte[], int, int)
  19549. @param input The input buffer to offer
  19550. @throws IOException If an error occurs while decrypting or processing a record
  19551. </member>
  19552. <member name="M:Org.BouncyCastle.Crypto.Tls.TlsProtocol.OfferInput(System.Byte[],System.Int32,System.Int32)">
  19553. Offer input from an arbitrary source. Only allowed in non-blocking mode.<br/>
  19554. <br/>
  19555. This method will decrypt and process all records that are fully available.
  19556. If only part of a record is available, the buffer will be retained until the
  19557. remainder of the record is offered.<br/>
  19558. <br/>
  19559. If any records containing application data were processed, the decrypted data
  19560. can be obtained using {@link #readInput(byte[], int, int)}. If any records
  19561. containing protocol data were processed, a response may have been generated.
  19562. You should always check to see if there is any available output after calling
  19563. this method by calling {@link #getAvailableOutputBytes()}.
  19564. @param input The input buffer to offer
  19565. @param inputOff The offset within the input buffer that input begins
  19566. @param inputLen The number of bytes of input being offered
  19567. @throws IOException If an error occurs while decrypting or processing a record
  19568. </member>
  19569. <member name="M:Org.BouncyCastle.Crypto.Tls.TlsProtocol.GetAvailableInputBytes">
  19570. Gets the amount of received application data. A call to {@link #readInput(byte[], int, int)}
  19571. is guaranteed to be able to return at least this much data.<br/>
  19572. <br/>
  19573. Only allowed in non-blocking mode.
  19574. @return The number of bytes of available application data
  19575. </member>
  19576. <member name="M:Org.BouncyCastle.Crypto.Tls.TlsProtocol.ReadInput(System.Byte[],System.Int32,System.Int32)">
  19577. Retrieves received application data. Use {@link #getAvailableInputBytes()} to check
  19578. how much application data is currently available. This method functions similarly to
  19579. {@link InputStream#read(byte[], int, int)}, except that it never blocks. If no data
  19580. is available, nothing will be copied and zero will be returned.<br/>
  19581. <br/>
  19582. Only allowed in non-blocking mode.
  19583. @param buffer The buffer to hold the application data
  19584. @param offset The start offset in the buffer at which the data is written
  19585. @param length The maximum number of bytes to read
  19586. @return The total number of bytes copied to the buffer. May be less than the
  19587. length specified if the length was greater than the amount of available data.
  19588. </member>
  19589. <member name="M:Org.BouncyCastle.Crypto.Tls.TlsProtocol.OfferOutput(System.Byte[],System.Int32,System.Int32)">
  19590. Offer output from an arbitrary source. Only allowed in non-blocking mode.<br/>
  19591. <br/>
  19592. After this method returns, the specified section of the buffer will have been
  19593. processed. Use {@link #readOutput(byte[], int, int)} to get the bytes to
  19594. transmit to the other peer.<br/>
  19595. <br/>
  19596. This method must not be called until after the handshake is complete! Attempting
  19597. to call it before the handshake is complete will result in an exception.
  19598. @param buffer The buffer containing application data to encrypt
  19599. @param offset The offset at which to begin reading data
  19600. @param length The number of bytes of data to read
  19601. @throws IOException If an error occurs encrypting the data, or the handshake is not complete
  19602. </member>
  19603. <member name="M:Org.BouncyCastle.Crypto.Tls.TlsProtocol.GetAvailableOutputBytes">
  19604. Gets the amount of encrypted data available to be sent. A call to
  19605. {@link #readOutput(byte[], int, int)} is guaranteed to be able to return at
  19606. least this much data.<br/>
  19607. <br/>
  19608. Only allowed in non-blocking mode.
  19609. @return The number of bytes of available encrypted data
  19610. </member>
  19611. <member name="M:Org.BouncyCastle.Crypto.Tls.TlsProtocol.ReadOutput(System.Byte[],System.Int32,System.Int32)">
  19612. Retrieves encrypted data to be sent. Use {@link #getAvailableOutputBytes()} to check
  19613. how much encrypted data is currently available. This method functions similarly to
  19614. {@link InputStream#read(byte[], int, int)}, except that it never blocks. If no data
  19615. is available, nothing will be copied and zero will be returned.<br/>
  19616. <br/>
  19617. Only allowed in non-blocking mode.
  19618. @param buffer The buffer to hold the encrypted data
  19619. @param offset The start offset in the buffer at which the data is written
  19620. @param length The maximum number of bytes to read
  19621. @return The total number of bytes copied to the buffer. May be less than the
  19622. length specified if the length was greater than the amount of available data.
  19623. </member>
  19624. <member name="M:Org.BouncyCastle.Crypto.Tls.TlsProtocol.Close">
  19625. Closes this connection.
  19626. @throws IOException If something goes wrong during closing.
  19627. </member>
  19628. <member name="M:Org.BouncyCastle.Crypto.Tls.TlsProtocol.AssertEmpty(System.IO.MemoryStream)">
  19629. Make sure the InputStream 'buf' now empty. Fail otherwise.
  19630. @param buf The InputStream to check.
  19631. @throws IOException If 'buf' is not empty.
  19632. </member>
  19633. <member name="M:Org.BouncyCastle.Crypto.Tls.TlsProtocol.GetCurrentPrfHash(Org.BouncyCastle.Crypto.Tls.TlsContext,Org.BouncyCastle.Crypto.Tls.TlsHandshakeHash,System.Byte[])">
  19634. 'sender' only relevant to SSLv3
  19635. </member>
  19636. <member name="M:Org.BouncyCastle.Crypto.Tls.TlsProtocolHandler.#ctor(System.IO.Stream,System.IO.Stream,Org.BouncyCastle.Security.SecureRandom)">
  19637. <remarks>Both streams can be the same object</remarks>
  19638. </member>
  19639. <member name="T:Org.BouncyCastle.Crypto.Tls.TlsPskKeyExchange">
  19640. <summary>(D)TLS PSK key exchange (RFC 4279).</summary>
  19641. </member>
  19642. <member name="T:Org.BouncyCastle.Crypto.Tls.TlsRsaKeyExchange">
  19643. <summary>(D)TLS and SSLv3 RSA key exchange.</summary>
  19644. </member>
  19645. <member name="M:Org.BouncyCastle.Crypto.Tls.TlsRsaUtilities.GenerateEncryptedPreMasterSecret(Org.BouncyCastle.Crypto.Tls.TlsContext,Org.BouncyCastle.Crypto.Parameters.RsaKeyParameters,System.IO.Stream)">
  19646. <exception cref="T:System.IO.IOException"></exception>
  19647. </member>
  19648. <member name="M:Org.BouncyCastle.Crypto.Tls.TlsServer.NotifyClientVersion(Org.BouncyCastle.Crypto.Tls.ProtocolVersion)">
  19649. <exception cref="T:System.IO.IOException"></exception>
  19650. </member>
  19651. <member name="M:Org.BouncyCastle.Crypto.Tls.TlsServer.NotifyFallback(System.Boolean)">
  19652. <exception cref="T:System.IO.IOException"></exception>
  19653. </member>
  19654. <member name="M:Org.BouncyCastle.Crypto.Tls.TlsServer.NotifyOfferedCipherSuites(System.Int32[])">
  19655. <exception cref="T:System.IO.IOException"></exception>
  19656. </member>
  19657. <member name="M:Org.BouncyCastle.Crypto.Tls.TlsServer.NotifyOfferedCompressionMethods(System.Byte[])">
  19658. <exception cref="T:System.IO.IOException"></exception>
  19659. </member>
  19660. <member name="M:Org.BouncyCastle.Crypto.Tls.TlsServer.ProcessClientExtensions(System.Collections.IDictionary)">
  19661. <param name="clientExtensions">A <see cref="T:System.Collections.IDictionary"/> (Int32 -> byte[]). Will never be null.</param>
  19662. <exception cref="T:System.IO.IOException"></exception>
  19663. </member>
  19664. <member name="M:Org.BouncyCastle.Crypto.Tls.TlsServer.GetServerVersion">
  19665. <exception cref="T:System.IO.IOException"></exception>
  19666. </member>
  19667. <member name="M:Org.BouncyCastle.Crypto.Tls.TlsServer.GetSelectedCipherSuite">
  19668. <exception cref="T:System.IO.IOException"></exception>
  19669. </member>
  19670. <member name="M:Org.BouncyCastle.Crypto.Tls.TlsServer.GetSelectedCompressionMethod">
  19671. <exception cref="T:System.IO.IOException"></exception>
  19672. </member>
  19673. <member name="M:Org.BouncyCastle.Crypto.Tls.TlsServer.GetServerExtensions">
  19674. <summary>
  19675. Get the (optional) table of server extensions to be included in (extended) server hello.
  19676. </summary>
  19677. <returns>
  19678. A <see cref="T:System.Collections.IDictionary"/> (Int32 -> byte[]). May be null.
  19679. </returns>
  19680. <exception cref="T:System.IO.IOException"></exception>
  19681. </member>
  19682. <member name="M:Org.BouncyCastle.Crypto.Tls.TlsServer.GetServerSupplementalData">
  19683. <returns>
  19684. A <see cref="T:System.Collections.IList"/> (<see cref="T:Org.BouncyCastle.Crypto.Tls.SupplementalDataEntry"/>). May be null.
  19685. </returns>
  19686. <exception cref="T:System.IO.IOException"></exception>
  19687. </member>
  19688. <member name="M:Org.BouncyCastle.Crypto.Tls.TlsServer.GetCredentials">
  19689. <exception cref="T:System.IO.IOException"></exception>
  19690. </member>
  19691. <member name="M:Org.BouncyCastle.Crypto.Tls.TlsServer.GetCertificateStatus">
  19692. <remarks>
  19693. This method will be called (only) if the server included an extension of type
  19694. "status_request" with empty "extension_data" in the extended server hello. See <i>RFC 3546
  19695. 3.6. Certificate Status Request</i>. If a non-null <see cref="T:Org.BouncyCastle.Crypto.Tls.CertificateStatus"/> is returned, it
  19696. is sent to the client as a handshake message of type "certificate_status".
  19697. </remarks>
  19698. <returns>A <see cref="T:Org.BouncyCastle.Crypto.Tls.CertificateStatus"/> to be sent to the client (or null for none).</returns>
  19699. <exception cref="T:System.IO.IOException"></exception>
  19700. </member>
  19701. <member name="M:Org.BouncyCastle.Crypto.Tls.TlsServer.GetKeyExchange">
  19702. <exception cref="T:System.IO.IOException"></exception>
  19703. </member>
  19704. <member name="M:Org.BouncyCastle.Crypto.Tls.TlsServer.GetCertificateRequest">
  19705. <exception cref="T:System.IO.IOException"></exception>
  19706. </member>
  19707. <member name="M:Org.BouncyCastle.Crypto.Tls.TlsServer.ProcessClientSupplementalData(System.Collections.IList)">
  19708. <param name="clientSupplementalData"><see cref="T:System.Collections.IList"/> (<see cref="T:Org.BouncyCastle.Crypto.Tls.SupplementalDataEntry"/>)</param>
  19709. <exception cref="T:System.IO.IOException"></exception>
  19710. </member>
  19711. <member name="M:Org.BouncyCastle.Crypto.Tls.TlsServer.NotifyClientCertificate(Org.BouncyCastle.Crypto.Tls.Certificate)">
  19712. <summary>
  19713. Called by the protocol handler to report the client certificate, only if <c>GetCertificateRequest</c>
  19714. returned non-null.
  19715. </summary>
  19716. <remarks>Note: this method is responsible for certificate verification and validation.</remarks>
  19717. <param name="clientCertificate">the effective client certificate (may be an empty chain).</param>
  19718. <exception cref="T:System.IO.IOException"></exception>
  19719. </member>
  19720. <member name="M:Org.BouncyCastle.Crypto.Tls.TlsServer.GetNewSessionTicket">
  19721. <summary>RFC 5077 3.3. NewSessionTicket Handshake Message.</summary>
  19722. <remarks>
  19723. This method will be called (only) if a NewSessionTicket extension was sent by the server. See
  19724. <i>RFC 5077 4. Recommended Ticket Construction</i> for recommended format and protection.
  19725. </remarks>
  19726. <returns>The <see cref="T:Org.BouncyCastle.Crypto.Tls.NewSessionTicket">ticket</see>)</returns>
  19727. <exception cref="T:System.IO.IOException"></exception>
  19728. </member>
  19729. <member name="M:Org.BouncyCastle.Crypto.Tls.TlsServerProtocol.#ctor(System.IO.Stream,Org.BouncyCastle.Security.SecureRandom)">
  19730. Constructor for blocking mode.
  19731. @param stream The bi-directional stream of data to/from the client
  19732. @param output The stream of data to the client
  19733. @param secureRandom Random number generator for various cryptographic functions
  19734. </member>
  19735. <member name="M:Org.BouncyCastle.Crypto.Tls.TlsServerProtocol.#ctor(System.IO.Stream,System.IO.Stream,Org.BouncyCastle.Security.SecureRandom)">
  19736. Constructor for blocking mode.
  19737. @param input The stream of data from the client
  19738. @param output The stream of data to the client
  19739. @param secureRandom Random number generator for various cryptographic functions
  19740. </member>
  19741. <member name="M:Org.BouncyCastle.Crypto.Tls.TlsServerProtocol.#ctor(Org.BouncyCastle.Security.SecureRandom)">
  19742. Constructor for non-blocking mode.<br/>
  19743. <br/>
  19744. When data is received, use {@link #offerInput(java.nio.ByteBuffer)} to
  19745. provide the received ciphertext, then use
  19746. {@link #readInput(byte[], int, int)} to read the corresponding cleartext.<br/>
  19747. <br/>
  19748. Similarly, when data needs to be sent, use
  19749. {@link #offerOutput(byte[], int, int)} to provide the cleartext, then use
  19750. {@link #readOutput(byte[], int, int)} to get the corresponding
  19751. ciphertext.
  19752. @param secureRandom
  19753. Random number generator for various cryptographic functions
  19754. </member>
  19755. <member name="M:Org.BouncyCastle.Crypto.Tls.TlsServerProtocol.Accept(Org.BouncyCastle.Crypto.Tls.TlsServer)">
  19756. Receives a TLS handshake in the role of server.<br/>
  19757. <br/>
  19758. In blocking mode, this will not return until the handshake is complete.
  19759. In non-blocking mode, use {@link TlsPeer#notifyHandshakeComplete()} to
  19760. receive a callback when the handshake is complete.
  19761. @param tlsServer
  19762. @throws IOException If in blocking mode and handshake was not successful.
  19763. </member>
  19764. <member name="M:Org.BouncyCastle.Crypto.Tls.TlsSignerCredentials.GenerateCertificateSignature(System.Byte[])">
  19765. <exception cref="T:System.IO.IOException"></exception>
  19766. </member>
  19767. <member name="M:Org.BouncyCastle.Crypto.Tls.TlsSrpGroupVerifier.Accept(Org.BouncyCastle.Crypto.Parameters.Srp6GroupParameters)">
  19768. Check whether the given SRP group parameters are acceptable for use.
  19769. @param group the {@link SRP6GroupParameters} to check
  19770. @return true if (and only if) the specified group parameters are acceptable
  19771. </member>
  19772. <member name="M:Org.BouncyCastle.Crypto.Tls.TlsSrpIdentityManager.GetLoginParameters(System.Byte[])">
  19773. Lookup the {@link TlsSRPLoginParameters} corresponding to the specified identity.
  19774. NOTE: To avoid "identity probing", unknown identities SHOULD be handled as recommended in RFC
  19775. 5054 2.5.1.3. {@link SimulatedTlsSRPIdentityManager} is provided for this purpose.
  19776. @param identity
  19777. the SRP identity sent by the connecting client
  19778. @return the {@link TlsSRPLoginParameters} for the specified identity, or else 'simulated'
  19779. parameters if the identity is not recognized. A null value is also allowed, but not
  19780. recommended.
  19781. </member>
  19782. <member name="T:Org.BouncyCastle.Crypto.Tls.TlsSrpKeyExchange">
  19783. <summary>(D)TLS SRP key exchange (RFC 5054).</summary>
  19784. </member>
  19785. <member name="T:Org.BouncyCastle.Crypto.Tls.TlsSRTPUtils">
  19786. RFC 5764 DTLS Extension to Establish Keys for SRTP.
  19787. </member>
  19788. <member name="M:Org.BouncyCastle.Crypto.Tls.TlsStreamCipher.#ctor(Org.BouncyCastle.Crypto.Tls.TlsContext,Org.BouncyCastle.Crypto.IStreamCipher,Org.BouncyCastle.Crypto.IStreamCipher,Org.BouncyCastle.Crypto.IDigest,Org.BouncyCastle.Crypto.IDigest,System.Int32,System.Boolean)">
  19789. <exception cref="T:System.IO.IOException"></exception>
  19790. </member>
  19791. <member name="M:Org.BouncyCastle.Crypto.Tls.TlsStreamCipher.DecodeCiphertext(System.Int64,System.Byte,System.Byte[],System.Int32,System.Int32)">
  19792. <exception cref="T:System.IO.IOException"></exception>
  19793. </member>
  19794. <member name="M:Org.BouncyCastle.Crypto.Tls.TlsStreamCipher.CheckMac(System.Int64,System.Byte,System.Byte[],System.Int32,System.Int32,System.Byte[],System.Int32,System.Int32)">
  19795. <exception cref="T:System.IO.IOException"></exception>
  19796. </member>
  19797. <member name="T:Org.BouncyCastle.Crypto.Tls.TlsUtilities">
  19798. <remarks>Some helper functions for MicroTLS.</remarks>
  19799. </member>
  19800. <member name="M:Org.BouncyCastle.Crypto.Tls.TlsUtilities.AddSignatureAlgorithmsExtension(System.Collections.IDictionary,System.Collections.IList)">
  19801. Add a 'signature_algorithms' extension to existing extensions.
  19802. @param extensions A {@link Hashtable} to add the extension to.
  19803. @param supportedSignatureAlgorithms {@link Vector} containing at least 1 {@link SignatureAndHashAlgorithm}.
  19804. @throws IOException
  19805. </member>
  19806. <member name="M:Org.BouncyCastle.Crypto.Tls.TlsUtilities.GetSignatureAlgorithmsExtension(System.Collections.IDictionary)">
  19807. Get a 'signature_algorithms' extension from extensions.
  19808. @param extensions A {@link Hashtable} to get the extension from, if it is present.
  19809. @return A {@link Vector} containing at least 1 {@link SignatureAndHashAlgorithm}, or null.
  19810. @throws IOException
  19811. </member>
  19812. <member name="M:Org.BouncyCastle.Crypto.Tls.TlsUtilities.CreateSignatureAlgorithmsExtension(System.Collections.IList)">
  19813. Create a 'signature_algorithms' extension value.
  19814. @param supportedSignatureAlgorithms A {@link Vector} containing at least 1 {@link SignatureAndHashAlgorithm}.
  19815. @return A byte array suitable for use as an extension value.
  19816. @throws IOException
  19817. </member>
  19818. <member name="M:Org.BouncyCastle.Crypto.Tls.TlsUtilities.ReadSignatureAlgorithmsExtension(System.Byte[])">
  19819. Read 'signature_algorithms' extension data.
  19820. @param extensionData The extension data.
  19821. @return A {@link Vector} containing at least 1 {@link SignatureAndHashAlgorithm}.
  19822. @throws IOException
  19823. </member>
  19824. <member name="T:Org.BouncyCastle.Crypto.Tls.UrlAndHash">
  19825. RFC 6066 5.
  19826. </member>
  19827. <member name="M:Org.BouncyCastle.Crypto.Tls.UrlAndHash.Encode(System.IO.Stream)">
  19828. Encode this {@link UrlAndHash} to a {@link Stream}.
  19829. @param output the {@link Stream} to encode to.
  19830. @throws IOException
  19831. </member>
  19832. <member name="M:Org.BouncyCastle.Crypto.Tls.UrlAndHash.Parse(Org.BouncyCastle.Crypto.Tls.TlsContext,System.IO.Stream)">
  19833. Parse a {@link UrlAndHash} from a {@link Stream}.
  19834. @param context
  19835. the {@link TlsContext} of the current connection.
  19836. @param input
  19837. the {@link Stream} to parse from.
  19838. @return a {@link UrlAndHash} object.
  19839. @throws IOException
  19840. </member>
  19841. <member name="T:Org.BouncyCastle.Crypto.Tls.UserMappingType">
  19842. <remarks>RFC 4681</remarks>
  19843. </member>
  19844. <member name="T:Org.BouncyCastle.Crypto.Tls.UseSrtpData">
  19845. RFC 5764 4.1.1
  19846. </member>
  19847. <member name="M:Org.BouncyCastle.Crypto.Tls.UseSrtpData.#ctor(System.Int32[],System.Byte[])">
  19848. @param protectionProfiles see {@link SrtpProtectionProfile} for valid constants.
  19849. @param mki valid lengths from 0 to 255.
  19850. </member>
  19851. <member name="P:Org.BouncyCastle.Crypto.Tls.UseSrtpData.ProtectionProfiles">
  19852. @return see {@link SrtpProtectionProfile} for valid constants.
  19853. </member>
  19854. <member name="P:Org.BouncyCastle.Crypto.Tls.UseSrtpData.Mki">
  19855. @return valid lengths from 0 to 255.
  19856. </member>
  19857. <member name="M:Org.BouncyCastle.Crypto.Utilities.AlgorithmIdentifierFactory.GenerateEncryptionAlgID(Org.BouncyCastle.Asn1.DerObjectIdentifier,System.Int32,Org.BouncyCastle.Security.SecureRandom)">
  19858. Create an AlgorithmIdentifier for the passed in encryption algorithm.
  19859. @param encryptionOID OID for the encryption algorithm
  19860. @param keySize key size in bits (-1 if unknown)
  19861. @param random SecureRandom to use for parameter generation.
  19862. @return a full AlgorithmIdentifier including parameters
  19863. @throws IllegalArgumentException if encryptionOID cannot be matched
  19864. </member>
  19865. <member name="T:Org.BouncyCastle.Crypto.Utilities.BasicAlphabetMapper">
  19866. A basic alphabet mapper that just creates a mapper based on the
  19867. passed in array of characters.
  19868. </member>
  19869. <member name="M:Org.BouncyCastle.Crypto.Utilities.BasicAlphabetMapper.#ctor(System.String)">
  19870. Base constructor.
  19871. @param alphabet a string of characters making up the alphabet.
  19872. </member>
  19873. <member name="M:Org.BouncyCastle.Crypto.Utilities.BasicAlphabetMapper.#ctor(System.Char[])">
  19874. Base constructor.
  19875. @param alphabet an array of characters making up the alphabet.
  19876. </member>
  19877. <member name="M:Org.BouncyCastle.Crypto.Utilities.CipherKeyGeneratorFactory.CreateKeyGenerator(Org.BouncyCastle.Asn1.DerObjectIdentifier,Org.BouncyCastle.Security.SecureRandom)">
  19878. Create a key generator for the passed in Object Identifier.
  19879. @param algorithm the Object Identifier indicating the algorithn the generator is for.
  19880. @param random a source of random to initialise the generator with.
  19881. @return an initialised CipherKeyGenerator.
  19882. @throws IllegalArgumentException if the algorithm cannot be identified.
  19883. </member>
  19884. <member name="T:Org.BouncyCastle.Operators.CmsKeyTransRecipientInfoGenerator">
  19885. <deprecated>Use KeyTransRecipientInfoGenerator</deprecated>
  19886. </member>
  19887. <member name="M:Org.BouncyCastle.Math.BigInteger.AddMagnitudes(System.Int32[],System.Int32[])">
  19888. return a = a + b - b preserved.
  19889. </member>
  19890. <member name="M:Org.BouncyCastle.Math.BigInteger.CompareTo(System.Int32,System.Int32[],System.Int32,System.Int32[])">
  19891. unsigned comparison on two arrays - note the arrays may
  19892. start with leading zeros.
  19893. </member>
  19894. <member name="M:Org.BouncyCastle.Math.BigInteger.Divide(System.Int32[],System.Int32[])">
  19895. return z = x / y - done in place (z value preserved, x contains the
  19896. remainder)
  19897. </member>
  19898. <member name="M:Org.BouncyCastle.Math.BigInteger.IsProbablePrime(System.Int32)">
  19899. return whether or not a BigInteger is probably prime with a
  19900. probability of 1 - (1/2)**certainty.
  19901. <p>From Knuth Vol 2, pg 395.</p>
  19902. </member>
  19903. <member name="M:Org.BouncyCastle.Math.BigInteger.ExtEuclid(Org.BouncyCastle.Math.BigInteger,Org.BouncyCastle.Math.BigInteger,Org.BouncyCastle.Math.BigInteger@)">
  19904. Calculate the numbers u1, u2, and u3 such that:
  19905. u1 * a + u2 * b = u3
  19906. where u3 is the greatest common divider of a and b.
  19907. a and b using the extended Euclid algorithm (refer p. 323
  19908. of The Art of Computer Programming vol 2, 2nd ed).
  19909. This also seems to have the side effect of calculating
  19910. some form of multiplicative inverse.
  19911. @param a First number to calculate gcd for
  19912. @param b Second number to calculate gcd for
  19913. @param u1Out the return object for the u1 value
  19914. @return The greatest common divisor of a and b
  19915. </member>
  19916. <member name="M:Org.BouncyCastle.Math.BigInteger.Square(System.Int32[],System.Int32[])">
  19917. return w with w = x * x - w is assumed to have enough space.
  19918. </member>
  19919. <member name="M:Org.BouncyCastle.Math.BigInteger.Multiply(System.Int32[],System.Int32[],System.Int32[])">
  19920. return x with x = y * z - x is assumed to have enough space.
  19921. </member>
  19922. <member name="M:Org.BouncyCastle.Math.BigInteger.GetMQuote">
  19923. Calculate mQuote = -m^(-1) mod b with b = 2^32 (32 = word size)
  19924. </member>
  19925. <member name="M:Org.BouncyCastle.Math.BigInteger.MultiplyMonty(System.Int32[],System.Int32[],System.Int32[],System.Int32[],System.UInt32,System.Boolean)">
  19926. Montgomery multiplication: a = x * y * R^(-1) mod m
  19927. <br/>
  19928. Based algorithm 14.36 of Handbook of Applied Cryptography.
  19929. <br/>
  19930. <li> m, x, y should have length n </li>
  19931. <li> a should have length (n + 1) </li>
  19932. <li> b = 2^32, R = b^n </li>
  19933. <br/>
  19934. The result is put in x
  19935. <br/>
  19936. NOTE: the indices of x, y, m, a different in HAC and in Java
  19937. </member>
  19938. <member name="M:Org.BouncyCastle.Math.BigInteger.Remainder(System.Int32[],System.Int32[])">
  19939. return x = x % y - done in place (y value preserved)
  19940. </member>
  19941. <member name="M:Org.BouncyCastle.Math.BigInteger.ShiftLeft(System.Int32[],System.Int32)">
  19942. do a left shift - this returns a new array.
  19943. </member>
  19944. <member name="M:Org.BouncyCastle.Math.BigInteger.ShiftRightInPlace(System.Int32,System.Int32[],System.Int32)">
  19945. do a right shift - this does it in place.
  19946. </member>
  19947. <member name="M:Org.BouncyCastle.Math.BigInteger.ShiftRightOneInPlace(System.Int32,System.Int32[])">
  19948. do a right shift by one - this does it in place.
  19949. </member>
  19950. <member name="M:Org.BouncyCastle.Math.BigInteger.Subtract(System.Int32,System.Int32[],System.Int32,System.Int32[])">
  19951. returns x = x - y - we assume x is >= y
  19952. </member>
  19953. <member name="T:Org.BouncyCastle.Math.EC.Abc.SimpleBigDecimal">
  19954. Class representing a simple version of a big decimal. A
  19955. <code>SimpleBigDecimal</code> is basically a
  19956. {@link java.math.BigInteger BigInteger} with a few digits on the right of
  19957. the decimal point. The number of (binary) digits on the right of the decimal
  19958. point is called the <code>scale</code> of the <code>SimpleBigDecimal</code>.
  19959. Unlike in {@link java.math.BigDecimal BigDecimal}, the scale is not adjusted
  19960. automatically, but must be set manually. All <code>SimpleBigDecimal</code>s
  19961. taking part in the same arithmetic operation must have equal scale. The
  19962. result of a multiplication of two <code>SimpleBigDecimal</code>s returns a
  19963. <code>SimpleBigDecimal</code> with double scale.
  19964. </member>
  19965. <member name="M:Org.BouncyCastle.Math.EC.Abc.SimpleBigDecimal.GetInstance(Org.BouncyCastle.Math.BigInteger,System.Int32)">
  19966. Returns a <code>SimpleBigDecimal</code> representing the same numerical
  19967. value as <code>value</code>.
  19968. @param value The value of the <code>SimpleBigDecimal</code> to be
  19969. created.
  19970. @param scale The scale of the <code>SimpleBigDecimal</code> to be
  19971. created.
  19972. @return The such created <code>SimpleBigDecimal</code>.
  19973. </member>
  19974. <member name="M:Org.BouncyCastle.Math.EC.Abc.SimpleBigDecimal.#ctor(Org.BouncyCastle.Math.BigInteger,System.Int32)">
  19975. Constructor for <code>SimpleBigDecimal</code>. The value of the
  19976. constructed <code>SimpleBigDecimal</code> Equals <code>bigInt /
  19977. 2<sup>scale</sup></code>.
  19978. @param bigInt The <code>bigInt</code> value parameter.
  19979. @param scale The scale of the constructed <code>SimpleBigDecimal</code>.
  19980. </member>
  19981. <member name="T:Org.BouncyCastle.Math.EC.Abc.Tnaf">
  19982. Class holding methods for point multiplication based on the window
  19983. &#964;-adic nonadjacent form (WTNAF). The algorithms are based on the
  19984. paper "Improved Algorithms for Arithmetic on Anomalous Binary Curves"
  19985. by Jerome A. Solinas. The paper first appeared in the Proceedings of
  19986. Crypto 1997.
  19987. </member>
  19988. <member name="F:Org.BouncyCastle.Math.EC.Abc.Tnaf.Width">
  19989. The window width of WTNAF. The standard value of 4 is slightly less
  19990. than optimal for running time, but keeps space requirements for
  19991. precomputation low. For typical curves, a value of 5 or 6 results in
  19992. a better running time. When changing this value, the
  19993. <code>&#945;<sub>u</sub></code>'s must be computed differently, see
  19994. e.g. "Guide to Elliptic Curve Cryptography", Darrel Hankerson,
  19995. Alfred Menezes, Scott Vanstone, Springer-Verlag New York Inc., 2004,
  19996. p. 121-122
  19997. </member>
  19998. <member name="F:Org.BouncyCastle.Math.EC.Abc.Tnaf.Pow2Width">
  19999. 2<sup>4</sup>
  20000. </member>
  20001. <member name="F:Org.BouncyCastle.Math.EC.Abc.Tnaf.Alpha0">
  20002. The <code>&#945;<sub>u</sub></code>'s for <code>a=0</code> as an array
  20003. of <code>ZTauElement</code>s.
  20004. </member>
  20005. <member name="F:Org.BouncyCastle.Math.EC.Abc.Tnaf.Alpha0Tnaf">
  20006. The <code>&#945;<sub>u</sub></code>'s for <code>a=0</code> as an array
  20007. of TNAFs.
  20008. </member>
  20009. <member name="F:Org.BouncyCastle.Math.EC.Abc.Tnaf.Alpha1">
  20010. The <code>&#945;<sub>u</sub></code>'s for <code>a=1</code> as an array
  20011. of <code>ZTauElement</code>s.
  20012. </member>
  20013. <member name="F:Org.BouncyCastle.Math.EC.Abc.Tnaf.Alpha1Tnaf">
  20014. The <code>&#945;<sub>u</sub></code>'s for <code>a=1</code> as an array
  20015. of TNAFs.
  20016. </member>
  20017. <member name="M:Org.BouncyCastle.Math.EC.Abc.Tnaf.Norm(System.SByte,Org.BouncyCastle.Math.EC.Abc.ZTauElement)">
  20018. Computes the norm of an element <code>&#955;</code> of
  20019. <code><b>Z</b>[&#964;]</code>.
  20020. @param mu The parameter <code>&#956;</code> of the elliptic curve.
  20021. @param lambda The element <code>&#955;</code> of
  20022. <code><b>Z</b>[&#964;]</code>.
  20023. @return The norm of <code>&#955;</code>.
  20024. </member>
  20025. <member name="M:Org.BouncyCastle.Math.EC.Abc.Tnaf.Norm(System.SByte,Org.BouncyCastle.Math.EC.Abc.SimpleBigDecimal,Org.BouncyCastle.Math.EC.Abc.SimpleBigDecimal)">
  20026. Computes the norm of an element <code>&#955;</code> of
  20027. <code><b>R</b>[&#964;]</code>, where <code>&#955; = u + v&#964;</code>
  20028. and <code>u</code> and <code>u</code> are real numbers (elements of
  20029. <code><b>R</b></code>).
  20030. @param mu The parameter <code>&#956;</code> of the elliptic curve.
  20031. @param u The real part of the element <code>&#955;</code> of
  20032. <code><b>R</b>[&#964;]</code>.
  20033. @param v The <code>&#964;</code>-adic part of the element
  20034. <code>&#955;</code> of <code><b>R</b>[&#964;]</code>.
  20035. @return The norm of <code>&#955;</code>.
  20036. </member>
  20037. <member name="M:Org.BouncyCastle.Math.EC.Abc.Tnaf.Round(Org.BouncyCastle.Math.EC.Abc.SimpleBigDecimal,Org.BouncyCastle.Math.EC.Abc.SimpleBigDecimal,System.SByte)">
  20038. Rounds an element <code>&#955;</code> of <code><b>R</b>[&#964;]</code>
  20039. to an element of <code><b>Z</b>[&#964;]</code>, such that their difference
  20040. has minimal norm. <code>&#955;</code> is given as
  20041. <code>&#955; = &#955;<sub>0</sub> + &#955;<sub>1</sub>&#964;</code>.
  20042. @param lambda0 The component <code>&#955;<sub>0</sub></code>.
  20043. @param lambda1 The component <code>&#955;<sub>1</sub></code>.
  20044. @param mu The parameter <code>&#956;</code> of the elliptic curve. Must
  20045. equal 1 or -1.
  20046. @return The rounded element of <code><b>Z</b>[&#964;]</code>.
  20047. @throws ArgumentException if <code>lambda0</code> and
  20048. <code>lambda1</code> do not have same scale.
  20049. </member>
  20050. <member name="M:Org.BouncyCastle.Math.EC.Abc.Tnaf.ApproximateDivisionByN(Org.BouncyCastle.Math.BigInteger,Org.BouncyCastle.Math.BigInteger,Org.BouncyCastle.Math.BigInteger,System.SByte,System.Int32,System.Int32)">
  20051. Approximate division by <code>n</code>. For an integer
  20052. <code>k</code>, the value <code>&#955; = s k / n</code> is
  20053. computed to <code>c</code> bits of accuracy.
  20054. @param k The parameter <code>k</code>.
  20055. @param s The curve parameter <code>s<sub>0</sub></code> or
  20056. <code>s<sub>1</sub></code>.
  20057. @param vm The Lucas Sequence element <code>V<sub>m</sub></code>.
  20058. @param a The parameter <code>a</code> of the elliptic curve.
  20059. @param m The bit length of the finite field
  20060. <code><b>F</b><sub>m</sub></code>.
  20061. @param c The number of bits of accuracy, i.e. the scale of the returned
  20062. <code>SimpleBigDecimal</code>.
  20063. @return The value <code>&#955; = s k / n</code> computed to
  20064. <code>c</code> bits of accuracy.
  20065. </member>
  20066. <member name="M:Org.BouncyCastle.Math.EC.Abc.Tnaf.TauAdicNaf(System.SByte,Org.BouncyCastle.Math.EC.Abc.ZTauElement)">
  20067. Computes the <code>&#964;</code>-adic NAF (non-adjacent form) of an
  20068. element <code>&#955;</code> of <code><b>Z</b>[&#964;]</code>.
  20069. @param mu The parameter <code>&#956;</code> of the elliptic curve.
  20070. @param lambda The element <code>&#955;</code> of
  20071. <code><b>Z</b>[&#964;]</code>.
  20072. @return The <code>&#964;</code>-adic NAF of <code>&#955;</code>.
  20073. </member>
  20074. <member name="M:Org.BouncyCastle.Math.EC.Abc.Tnaf.Tau(Org.BouncyCastle.Math.EC.AbstractF2mPoint)">
  20075. Applies the operation <code>&#964;()</code> to an
  20076. <code>AbstractF2mPoint</code>.
  20077. @param p The AbstractF2mPoint to which <code>&#964;()</code> is applied.
  20078. @return <code>&#964;(p)</code>
  20079. </member>
  20080. <member name="M:Org.BouncyCastle.Math.EC.Abc.Tnaf.GetMu(Org.BouncyCastle.Math.EC.AbstractF2mCurve)">
  20081. Returns the parameter <code>&#956;</code> of the elliptic curve.
  20082. @param curve The elliptic curve from which to obtain <code>&#956;</code>.
  20083. The curve must be a Koblitz curve, i.e. <code>a</code> Equals
  20084. <code>0</code> or <code>1</code> and <code>b</code> Equals
  20085. <code>1</code>.
  20086. @return <code>&#956;</code> of the elliptic curve.
  20087. @throws ArgumentException if the given ECCurve is not a Koblitz
  20088. curve.
  20089. </member>
  20090. <member name="M:Org.BouncyCastle.Math.EC.Abc.Tnaf.GetLucas(System.SByte,System.Int32,System.Boolean)">
  20091. Calculates the Lucas Sequence elements <code>U<sub>k-1</sub></code> and
  20092. <code>U<sub>k</sub></code> or <code>V<sub>k-1</sub></code> and
  20093. <code>V<sub>k</sub></code>.
  20094. @param mu The parameter <code>&#956;</code> of the elliptic curve.
  20095. @param k The index of the second element of the Lucas Sequence to be
  20096. returned.
  20097. @param doV If set to true, computes <code>V<sub>k-1</sub></code> and
  20098. <code>V<sub>k</sub></code>, otherwise <code>U<sub>k-1</sub></code> and
  20099. <code>U<sub>k</sub></code>.
  20100. @return An array with 2 elements, containing <code>U<sub>k-1</sub></code>
  20101. and <code>U<sub>k</sub></code> or <code>V<sub>k-1</sub></code>
  20102. and <code>V<sub>k</sub></code>.
  20103. </member>
  20104. <member name="M:Org.BouncyCastle.Math.EC.Abc.Tnaf.GetTw(System.SByte,System.Int32)">
  20105. Computes the auxiliary value <code>t<sub>w</sub></code>. If the width is
  20106. 4, then for <code>mu = 1</code>, <code>t<sub>w</sub> = 6</code> and for
  20107. <code>mu = -1</code>, <code>t<sub>w</sub> = 10</code>
  20108. @param mu The parameter <code>&#956;</code> of the elliptic curve.
  20109. @param w The window width of the WTNAF.
  20110. @return the auxiliary value <code>t<sub>w</sub></code>
  20111. </member>
  20112. <member name="M:Org.BouncyCastle.Math.EC.Abc.Tnaf.GetSi(Org.BouncyCastle.Math.EC.AbstractF2mCurve)">
  20113. Computes the auxiliary values <code>s<sub>0</sub></code> and
  20114. <code>s<sub>1</sub></code> used for partial modular reduction.
  20115. @param curve The elliptic curve for which to compute
  20116. <code>s<sub>0</sub></code> and <code>s<sub>1</sub></code>.
  20117. @throws ArgumentException if <code>curve</code> is not a
  20118. Koblitz curve (Anomalous Binary Curve, ABC).
  20119. </member>
  20120. <member name="M:Org.BouncyCastle.Math.EC.Abc.Tnaf.PartModReduction(Org.BouncyCastle.Math.BigInteger,System.Int32,System.SByte,Org.BouncyCastle.Math.BigInteger[],System.SByte,System.SByte)">
  20121. Partial modular reduction modulo
  20122. <code>(&#964;<sup>m</sup> - 1)/(&#964; - 1)</code>.
  20123. @param k The integer to be reduced.
  20124. @param m The bitlength of the underlying finite field.
  20125. @param a The parameter <code>a</code> of the elliptic curve.
  20126. @param s The auxiliary values <code>s<sub>0</sub></code> and
  20127. <code>s<sub>1</sub></code>.
  20128. @param mu The parameter &#956; of the elliptic curve.
  20129. @param c The precision (number of bits of accuracy) of the partial
  20130. modular reduction.
  20131. @return <code>&#961; := k partmod (&#964;<sup>m</sup> - 1)/(&#964; - 1)</code>
  20132. </member>
  20133. <member name="M:Org.BouncyCastle.Math.EC.Abc.Tnaf.MultiplyRTnaf(Org.BouncyCastle.Math.EC.AbstractF2mPoint,Org.BouncyCastle.Math.BigInteger)">
  20134. Multiplies a {@link org.bouncycastle.math.ec.AbstractF2mPoint AbstractF2mPoint}
  20135. by a <code>BigInteger</code> using the reduced <code>&#964;</code>-adic
  20136. NAF (RTNAF) method.
  20137. @param p The AbstractF2mPoint to Multiply.
  20138. @param k The <code>BigInteger</code> by which to Multiply <code>p</code>.
  20139. @return <code>k * p</code>
  20140. </member>
  20141. <member name="M:Org.BouncyCastle.Math.EC.Abc.Tnaf.MultiplyTnaf(Org.BouncyCastle.Math.EC.AbstractF2mPoint,Org.BouncyCastle.Math.EC.Abc.ZTauElement)">
  20142. Multiplies a {@link org.bouncycastle.math.ec.AbstractF2mPoint AbstractF2mPoint}
  20143. by an element <code>&#955;</code> of <code><b>Z</b>[&#964;]</code>
  20144. using the <code>&#964;</code>-adic NAF (TNAF) method.
  20145. @param p The AbstractF2mPoint to Multiply.
  20146. @param lambda The element <code>&#955;</code> of
  20147. <code><b>Z</b>[&#964;]</code>.
  20148. @return <code>&#955; * p</code>
  20149. </member>
  20150. <member name="M:Org.BouncyCastle.Math.EC.Abc.Tnaf.MultiplyFromTnaf(Org.BouncyCastle.Math.EC.AbstractF2mPoint,System.SByte[])">
  20151. Multiplies a {@link org.bouncycastle.math.ec.AbstractF2mPoint AbstractF2mPoint}
  20152. by an element <code>&#955;</code> of <code><b>Z</b>[&#964;]</code>
  20153. using the <code>&#964;</code>-adic NAF (TNAF) method, given the TNAF
  20154. of <code>&#955;</code>.
  20155. @param p The AbstractF2mPoint to Multiply.
  20156. @param u The the TNAF of <code>&#955;</code>..
  20157. @return <code>&#955; * p</code>
  20158. </member>
  20159. <member name="M:Org.BouncyCastle.Math.EC.Abc.Tnaf.TauAdicWNaf(System.SByte,Org.BouncyCastle.Math.EC.Abc.ZTauElement,System.SByte,Org.BouncyCastle.Math.BigInteger,Org.BouncyCastle.Math.BigInteger,Org.BouncyCastle.Math.EC.Abc.ZTauElement[])">
  20160. Computes the <code>[&#964;]</code>-adic window NAF of an element
  20161. <code>&#955;</code> of <code><b>Z</b>[&#964;]</code>.
  20162. @param mu The parameter &#956; of the elliptic curve.
  20163. @param lambda The element <code>&#955;</code> of
  20164. <code><b>Z</b>[&#964;]</code> of which to compute the
  20165. <code>[&#964;]</code>-adic NAF.
  20166. @param width The window width of the resulting WNAF.
  20167. @param pow2w 2<sup>width</sup>.
  20168. @param tw The auxiliary value <code>t<sub>w</sub></code>.
  20169. @param alpha The <code>&#945;<sub>u</sub></code>'s for the window width.
  20170. @return The <code>[&#964;]</code>-adic window NAF of
  20171. <code>&#955;</code>.
  20172. </member>
  20173. <member name="M:Org.BouncyCastle.Math.EC.Abc.Tnaf.GetPreComp(Org.BouncyCastle.Math.EC.AbstractF2mPoint,System.SByte)">
  20174. Does the precomputation for WTNAF multiplication.
  20175. @param p The <code>ECPoint</code> for which to do the precomputation.
  20176. @param a The parameter <code>a</code> of the elliptic curve.
  20177. @return The precomputation array for <code>p</code>.
  20178. </member>
  20179. <member name="T:Org.BouncyCastle.Math.EC.Abc.ZTauElement">
  20180. Class representing an element of <code><b>Z</b>[&#964;]</code>. Let
  20181. <code>&#955;</code> be an element of <code><b>Z</b>[&#964;]</code>. Then
  20182. <code>&#955;</code> is given as <code>&#955; = u + v&#964;</code>. The
  20183. components <code>u</code> and <code>v</code> may be used directly, there
  20184. are no accessor methods.
  20185. Immutable class.
  20186. </member>
  20187. <member name="F:Org.BouncyCastle.Math.EC.Abc.ZTauElement.u">
  20188. The &quot;real&quot; part of <code>&#955;</code>.
  20189. </member>
  20190. <member name="F:Org.BouncyCastle.Math.EC.Abc.ZTauElement.v">
  20191. The &quot;<code>&#964;</code>-adic&quot; part of <code>&#955;</code>.
  20192. </member>
  20193. <member name="M:Org.BouncyCastle.Math.EC.Abc.ZTauElement.#ctor(Org.BouncyCastle.Math.BigInteger,Org.BouncyCastle.Math.BigInteger)">
  20194. Constructor for an element <code>&#955;</code> of
  20195. <code><b>Z</b>[&#964;]</code>.
  20196. @param u The &quot;real&quot; part of <code>&#955;</code>.
  20197. @param v The &quot;<code>&#964;</code>-adic&quot; part of
  20198. <code>&#955;</code>.
  20199. </member>
  20200. <member name="M:Org.BouncyCastle.Math.EC.Custom.Djb.Curve25519FieldElement.Sqrt">
  20201. return a sqrt root - the routine verifies that the calculation returns the right value - if
  20202. none exists it returns null.
  20203. </member>
  20204. <member name="M:Org.BouncyCastle.Math.EC.Custom.Djb.Curve25519Point.#ctor(Org.BouncyCastle.Math.EC.ECCurve,Org.BouncyCastle.Math.EC.ECFieldElement,Org.BouncyCastle.Math.EC.ECFieldElement)">
  20205. Create a point which encodes with point compression.
  20206. @param curve the curve to use
  20207. @param x affine x co-ordinate
  20208. @param y affine y co-ordinate
  20209. @deprecated Use ECCurve.CreatePoint to construct points
  20210. </member>
  20211. <member name="M:Org.BouncyCastle.Math.EC.Custom.Djb.Curve25519Point.#ctor(Org.BouncyCastle.Math.EC.ECCurve,Org.BouncyCastle.Math.EC.ECFieldElement,Org.BouncyCastle.Math.EC.ECFieldElement,System.Boolean)">
  20212. Create a point that encodes with or without point compresion.
  20213. @param curve the curve to use
  20214. @param x affine x co-ordinate
  20215. @param y affine y co-ordinate
  20216. @param withCompression if true encode with point compression
  20217. @deprecated per-point compression property will be removed, refer {@link #getEncoded(bool)}
  20218. </member>
  20219. <member name="M:Org.BouncyCastle.Math.EC.Custom.GM.SM2P256V1FieldElement.Sqrt">
  20220. return a sqrt root - the routine verifies that the calculation returns the right value - if
  20221. none exists it returns null.
  20222. </member>
  20223. <member name="M:Org.BouncyCastle.Math.EC.Custom.GM.SM2P256V1Point.#ctor(Org.BouncyCastle.Math.EC.ECCurve,Org.BouncyCastle.Math.EC.ECFieldElement,Org.BouncyCastle.Math.EC.ECFieldElement)">
  20224. Create a point which encodes with point compression.
  20225. @param curve
  20226. the curve to use
  20227. @param x
  20228. affine x co-ordinate
  20229. @param y
  20230. affine y co-ordinate
  20231. @deprecated Use ECCurve.createPoint to construct points
  20232. </member>
  20233. <member name="M:Org.BouncyCastle.Math.EC.Custom.GM.SM2P256V1Point.#ctor(Org.BouncyCastle.Math.EC.ECCurve,Org.BouncyCastle.Math.EC.ECFieldElement,Org.BouncyCastle.Math.EC.ECFieldElement,System.Boolean)">
  20234. Create a point that encodes with or without point compresion.
  20235. @param curve
  20236. the curve to use
  20237. @param x
  20238. affine x co-ordinate
  20239. @param y
  20240. affine y co-ordinate
  20241. @param withCompression
  20242. if true encode with point compression
  20243. @deprecated per-point compression property will be removed, refer
  20244. {@link #getEncoded(bool)}
  20245. </member>
  20246. <member name="M:Org.BouncyCastle.Math.EC.Custom.Sec.SecP128R1FieldElement.Sqrt">
  20247. return a sqrt root - the routine verifies that the calculation returns the right value - if
  20248. none exists it returns null.
  20249. </member>
  20250. <member name="M:Org.BouncyCastle.Math.EC.Custom.Sec.SecP128R1Point.#ctor(Org.BouncyCastle.Math.EC.ECCurve,Org.BouncyCastle.Math.EC.ECFieldElement,Org.BouncyCastle.Math.EC.ECFieldElement)">
  20251. Create a point which encodes with point compression.
  20252. @param curve
  20253. the curve to use
  20254. @param x
  20255. affine x co-ordinate
  20256. @param y
  20257. affine y co-ordinate
  20258. @deprecated Use ECCurve.createPoint to construct points
  20259. </member>
  20260. <member name="M:Org.BouncyCastle.Math.EC.Custom.Sec.SecP128R1Point.#ctor(Org.BouncyCastle.Math.EC.ECCurve,Org.BouncyCastle.Math.EC.ECFieldElement,Org.BouncyCastle.Math.EC.ECFieldElement,System.Boolean)">
  20261. Create a point that encodes with or without point compresion.
  20262. @param curve
  20263. the curve to use
  20264. @param x
  20265. affine x co-ordinate
  20266. @param y
  20267. affine y co-ordinate
  20268. @param withCompression
  20269. if true encode with point compression
  20270. @deprecated per-point compression property will be removed, refer
  20271. {@link #getEncoded(boolean)}
  20272. </member>
  20273. <member name="M:Org.BouncyCastle.Math.EC.Custom.Sec.SecP160K1Point.#ctor(Org.BouncyCastle.Math.EC.ECCurve,Org.BouncyCastle.Math.EC.ECFieldElement,Org.BouncyCastle.Math.EC.ECFieldElement)">
  20274. Create a point which encodes with point compression.
  20275. @param curve
  20276. the curve to use
  20277. @param x
  20278. affine x co-ordinate
  20279. @param y
  20280. affine y co-ordinate
  20281. @deprecated Use ECCurve.CreatePoint to construct points
  20282. </member>
  20283. <member name="M:Org.BouncyCastle.Math.EC.Custom.Sec.SecP160K1Point.#ctor(Org.BouncyCastle.Math.EC.ECCurve,Org.BouncyCastle.Math.EC.ECFieldElement,Org.BouncyCastle.Math.EC.ECFieldElement,System.Boolean)">
  20284. Create a point that encodes with or without point compresion.
  20285. @param curve
  20286. the curve to use
  20287. @param x
  20288. affine x co-ordinate
  20289. @param y
  20290. affine y co-ordinate
  20291. @param withCompression
  20292. if true encode with point compression
  20293. @deprecated per-point compression property will be removed, refer
  20294. {@link #getEncoded(bool)}
  20295. </member>
  20296. <member name="M:Org.BouncyCastle.Math.EC.Custom.Sec.SecP160R1FieldElement.Sqrt">
  20297. return a sqrt root - the routine verifies that the calculation returns the right value - if
  20298. none exists it returns null.
  20299. </member>
  20300. <member name="M:Org.BouncyCastle.Math.EC.Custom.Sec.SecP160R1Point.#ctor(Org.BouncyCastle.Math.EC.ECCurve,Org.BouncyCastle.Math.EC.ECFieldElement,Org.BouncyCastle.Math.EC.ECFieldElement)">
  20301. Create a point which encodes with point compression.
  20302. @param curve
  20303. the curve to use
  20304. @param x
  20305. affine x co-ordinate
  20306. @param y
  20307. affine y co-ordinate
  20308. @deprecated Use ECCurve.CreatePoint to construct points
  20309. </member>
  20310. <member name="M:Org.BouncyCastle.Math.EC.Custom.Sec.SecP160R1Point.#ctor(Org.BouncyCastle.Math.EC.ECCurve,Org.BouncyCastle.Math.EC.ECFieldElement,Org.BouncyCastle.Math.EC.ECFieldElement,System.Boolean)">
  20311. Create a point that encodes with or without point compresion.
  20312. @param curve
  20313. the curve to use
  20314. @param x
  20315. affine x co-ordinate
  20316. @param y
  20317. affine y co-ordinate
  20318. @param withCompression
  20319. if true encode with point compression
  20320. @deprecated per-point compression property will be removed, refer
  20321. {@link #getEncoded(bool)}
  20322. </member>
  20323. <member name="M:Org.BouncyCastle.Math.EC.Custom.Sec.SecP160R2FieldElement.Sqrt">
  20324. return a sqrt root - the routine verifies that the calculation returns the right value - if
  20325. none exists it returns null.
  20326. </member>
  20327. <member name="M:Org.BouncyCastle.Math.EC.Custom.Sec.SecP160R2Point.#ctor(Org.BouncyCastle.Math.EC.ECCurve,Org.BouncyCastle.Math.EC.ECFieldElement,Org.BouncyCastle.Math.EC.ECFieldElement)">
  20328. Create a point which encodes with point compression.
  20329. @param curve
  20330. the curve to use
  20331. @param x
  20332. affine x co-ordinate
  20333. @param y
  20334. affine y co-ordinate
  20335. @deprecated Use ECCurve.CreatePoint to construct points
  20336. </member>
  20337. <member name="M:Org.BouncyCastle.Math.EC.Custom.Sec.SecP160R2Point.#ctor(Org.BouncyCastle.Math.EC.ECCurve,Org.BouncyCastle.Math.EC.ECFieldElement,Org.BouncyCastle.Math.EC.ECFieldElement,System.Boolean)">
  20338. Create a point that encodes with or without point compresion.
  20339. @param curve
  20340. the curve to use
  20341. @param x
  20342. affine x co-ordinate
  20343. @param y
  20344. affine y co-ordinate
  20345. @param withCompression
  20346. if true encode with point compression
  20347. @deprecated per-point compression property will be removed, refer
  20348. {@link #getEncoded(bool)}
  20349. </member>
  20350. <member name="M:Org.BouncyCastle.Math.EC.Custom.Sec.SecP192K1FieldElement.Sqrt">
  20351. return a sqrt root - the routine verifies that the calculation returns the right value - if
  20352. none exists it returns null.
  20353. </member>
  20354. <member name="M:Org.BouncyCastle.Math.EC.Custom.Sec.SecP192K1Point.#ctor(Org.BouncyCastle.Math.EC.ECCurve,Org.BouncyCastle.Math.EC.ECFieldElement,Org.BouncyCastle.Math.EC.ECFieldElement)">
  20355. Create a point which encodes with point compression.
  20356. @param curve
  20357. the curve to use
  20358. @param x
  20359. affine x co-ordinate
  20360. @param y
  20361. affine y co-ordinate
  20362. @deprecated Use ECCurve.createPoint to construct points
  20363. </member>
  20364. <member name="M:Org.BouncyCastle.Math.EC.Custom.Sec.SecP192K1Point.#ctor(Org.BouncyCastle.Math.EC.ECCurve,Org.BouncyCastle.Math.EC.ECFieldElement,Org.BouncyCastle.Math.EC.ECFieldElement,System.Boolean)">
  20365. Create a point that encodes with or without point compresion.
  20366. @param curve
  20367. the curve to use
  20368. @param x
  20369. affine x co-ordinate
  20370. @param y
  20371. affine y co-ordinate
  20372. @param withCompression
  20373. if true encode with point compression
  20374. @deprecated per-point compression property will be removed, refer
  20375. {@link #getEncoded(bool)}
  20376. </member>
  20377. <member name="M:Org.BouncyCastle.Math.EC.Custom.Sec.SecP192R1FieldElement.Sqrt">
  20378. return a sqrt root - the routine verifies that the calculation returns the right value - if
  20379. none exists it returns null.
  20380. </member>
  20381. <member name="M:Org.BouncyCastle.Math.EC.Custom.Sec.SecP192R1Point.#ctor(Org.BouncyCastle.Math.EC.ECCurve,Org.BouncyCastle.Math.EC.ECFieldElement,Org.BouncyCastle.Math.EC.ECFieldElement)">
  20382. Create a point which encodes with point compression.
  20383. @param curve
  20384. the curve to use
  20385. @param x
  20386. affine x co-ordinate
  20387. @param y
  20388. affine y co-ordinate
  20389. @deprecated Use ECCurve.createPoint to construct points
  20390. </member>
  20391. <member name="M:Org.BouncyCastle.Math.EC.Custom.Sec.SecP192R1Point.#ctor(Org.BouncyCastle.Math.EC.ECCurve,Org.BouncyCastle.Math.EC.ECFieldElement,Org.BouncyCastle.Math.EC.ECFieldElement,System.Boolean)">
  20392. Create a point that encodes with or without point compresion.
  20393. @param curve
  20394. the curve to use
  20395. @param x
  20396. affine x co-ordinate
  20397. @param y
  20398. affine y co-ordinate
  20399. @param withCompression
  20400. if true encode with point compression
  20401. @deprecated per-point compression property will be removed, refer
  20402. {@link #getEncoded(bool)}
  20403. </member>
  20404. <member name="M:Org.BouncyCastle.Math.EC.Custom.Sec.SecP224K1FieldElement.Sqrt">
  20405. return a sqrt root - the routine verifies that the calculation returns the right value - if
  20406. none exists it returns null.
  20407. </member>
  20408. <member name="M:Org.BouncyCastle.Math.EC.Custom.Sec.SecP224K1Point.#ctor(Org.BouncyCastle.Math.EC.ECCurve,Org.BouncyCastle.Math.EC.ECFieldElement,Org.BouncyCastle.Math.EC.ECFieldElement)">
  20409. Create a point which encodes with point compression.
  20410. @param curve
  20411. the curve to use
  20412. @param x
  20413. affine x co-ordinate
  20414. @param y
  20415. affine y co-ordinate
  20416. @deprecated Use ECCurve.createPoint to construct points
  20417. </member>
  20418. <member name="M:Org.BouncyCastle.Math.EC.Custom.Sec.SecP224K1Point.#ctor(Org.BouncyCastle.Math.EC.ECCurve,Org.BouncyCastle.Math.EC.ECFieldElement,Org.BouncyCastle.Math.EC.ECFieldElement,System.Boolean)">
  20419. Create a point that encodes with or without point compresion.
  20420. @param curve
  20421. the curve to use
  20422. @param x
  20423. affine x co-ordinate
  20424. @param y
  20425. affine y co-ordinate
  20426. @param withCompression
  20427. if true encode with point compression
  20428. @deprecated per-point compression property will be removed, refer
  20429. {@link #getEncoded(bool)}
  20430. </member>
  20431. <member name="M:Org.BouncyCastle.Math.EC.Custom.Sec.SecP224R1FieldElement.Sqrt">
  20432. return a sqrt root - the routine verifies that the calculation returns the right value - if
  20433. none exists it returns null.
  20434. </member>
  20435. <member name="M:Org.BouncyCastle.Math.EC.Custom.Sec.SecP224R1Point.#ctor(Org.BouncyCastle.Math.EC.ECCurve,Org.BouncyCastle.Math.EC.ECFieldElement,Org.BouncyCastle.Math.EC.ECFieldElement)">
  20436. Create a point which encodes with point compression.
  20437. @param curve
  20438. the curve to use
  20439. @param x
  20440. affine x co-ordinate
  20441. @param y
  20442. affine y co-ordinate
  20443. @deprecated Use ECCurve.createPoint to construct points
  20444. </member>
  20445. <member name="M:Org.BouncyCastle.Math.EC.Custom.Sec.SecP224R1Point.#ctor(Org.BouncyCastle.Math.EC.ECCurve,Org.BouncyCastle.Math.EC.ECFieldElement,Org.BouncyCastle.Math.EC.ECFieldElement,System.Boolean)">
  20446. Create a point that encodes with or without point compresion.
  20447. @param curve
  20448. the curve to use
  20449. @param x
  20450. affine x co-ordinate
  20451. @param y
  20452. affine y co-ordinate
  20453. @param withCompression
  20454. if true encode with point compression
  20455. @deprecated per-point compression property will be removed, refer
  20456. {@link #getEncoded(bool)}
  20457. </member>
  20458. <member name="M:Org.BouncyCastle.Math.EC.Custom.Sec.SecP256K1FieldElement.Sqrt">
  20459. return a sqrt root - the routine verifies that the calculation returns the right value - if
  20460. none exists it returns null.
  20461. </member>
  20462. <member name="M:Org.BouncyCastle.Math.EC.Custom.Sec.SecP256K1Point.#ctor(Org.BouncyCastle.Math.EC.ECCurve,Org.BouncyCastle.Math.EC.ECFieldElement,Org.BouncyCastle.Math.EC.ECFieldElement)">
  20463. Create a point which encodes with point compression.
  20464. @param curve
  20465. the curve to use
  20466. @param x
  20467. affine x co-ordinate
  20468. @param y
  20469. affine y co-ordinate
  20470. @deprecated Use ECCurve.createPoint to construct points
  20471. </member>
  20472. <member name="M:Org.BouncyCastle.Math.EC.Custom.Sec.SecP256K1Point.#ctor(Org.BouncyCastle.Math.EC.ECCurve,Org.BouncyCastle.Math.EC.ECFieldElement,Org.BouncyCastle.Math.EC.ECFieldElement,System.Boolean)">
  20473. Create a point that encodes with or without point compresion.
  20474. @param curve
  20475. the curve to use
  20476. @param x
  20477. affine x co-ordinate
  20478. @param y
  20479. affine y co-ordinate
  20480. @param withCompression
  20481. if true encode with point compression
  20482. @deprecated per-point compression property will be removed, refer
  20483. {@link #getEncoded(bool)}
  20484. </member>
  20485. <member name="M:Org.BouncyCastle.Math.EC.Custom.Sec.SecP256R1FieldElement.Sqrt">
  20486. return a sqrt root - the routine verifies that the calculation returns the right value - if
  20487. none exists it returns null.
  20488. </member>
  20489. <member name="M:Org.BouncyCastle.Math.EC.Custom.Sec.SecP256R1Point.#ctor(Org.BouncyCastle.Math.EC.ECCurve,Org.BouncyCastle.Math.EC.ECFieldElement,Org.BouncyCastle.Math.EC.ECFieldElement)">
  20490. Create a point which encodes with point compression.
  20491. @param curve
  20492. the curve to use
  20493. @param x
  20494. affine x co-ordinate
  20495. @param y
  20496. affine y co-ordinate
  20497. @deprecated Use ECCurve.createPoint to construct points
  20498. </member>
  20499. <member name="M:Org.BouncyCastle.Math.EC.Custom.Sec.SecP256R1Point.#ctor(Org.BouncyCastle.Math.EC.ECCurve,Org.BouncyCastle.Math.EC.ECFieldElement,Org.BouncyCastle.Math.EC.ECFieldElement,System.Boolean)">
  20500. Create a point that encodes with or without point compresion.
  20501. @param curve
  20502. the curve to use
  20503. @param x
  20504. affine x co-ordinate
  20505. @param y
  20506. affine y co-ordinate
  20507. @param withCompression
  20508. if true encode with point compression
  20509. @deprecated per-point compression property will be removed, refer
  20510. {@link #getEncoded(bool)}
  20511. </member>
  20512. <member name="M:Org.BouncyCastle.Math.EC.Custom.Sec.SecP384R1FieldElement.Sqrt">
  20513. return a sqrt root - the routine verifies that the calculation returns the right value - if
  20514. none exists it returns null.
  20515. </member>
  20516. <member name="M:Org.BouncyCastle.Math.EC.Custom.Sec.SecP384R1Point.#ctor(Org.BouncyCastle.Math.EC.ECCurve,Org.BouncyCastle.Math.EC.ECFieldElement,Org.BouncyCastle.Math.EC.ECFieldElement)">
  20517. Create a point which encodes with point compression.
  20518. @param curve
  20519. the curve to use
  20520. @param x
  20521. affine x co-ordinate
  20522. @param y
  20523. affine y co-ordinate
  20524. @deprecated Use ECCurve.createPoint to construct points
  20525. </member>
  20526. <member name="M:Org.BouncyCastle.Math.EC.Custom.Sec.SecP384R1Point.#ctor(Org.BouncyCastle.Math.EC.ECCurve,Org.BouncyCastle.Math.EC.ECFieldElement,Org.BouncyCastle.Math.EC.ECFieldElement,System.Boolean)">
  20527. Create a point that encodes with or without point compresion.
  20528. @param curve
  20529. the curve to use
  20530. @param x
  20531. affine x co-ordinate
  20532. @param y
  20533. affine y co-ordinate
  20534. @param withCompression
  20535. if true encode with point compression
  20536. @deprecated per-point compression property will be removed, refer
  20537. {@link #getEncoded(bool)}
  20538. </member>
  20539. <member name="M:Org.BouncyCastle.Math.EC.Custom.Sec.SecP521R1FieldElement.Sqrt">
  20540. return a sqrt root - the routine verifies that the calculation returns the right value - if
  20541. none exists it returns null.
  20542. </member>
  20543. <member name="M:Org.BouncyCastle.Math.EC.Custom.Sec.SecP521R1Point.#ctor(Org.BouncyCastle.Math.EC.ECCurve,Org.BouncyCastle.Math.EC.ECFieldElement,Org.BouncyCastle.Math.EC.ECFieldElement)">
  20544. Create a point which encodes with point compression.
  20545. @param curve
  20546. the curve to use
  20547. @param x
  20548. affine x co-ordinate
  20549. @param y
  20550. affine y co-ordinate
  20551. @deprecated Use ECCurve.createPoint to construct points
  20552. </member>
  20553. <member name="M:Org.BouncyCastle.Math.EC.Custom.Sec.SecP521R1Point.#ctor(Org.BouncyCastle.Math.EC.ECCurve,Org.BouncyCastle.Math.EC.ECFieldElement,Org.BouncyCastle.Math.EC.ECFieldElement,System.Boolean)">
  20554. Create a point that encodes with or without point compresion.
  20555. @param curve
  20556. the curve to use
  20557. @param x
  20558. affine x co-ordinate
  20559. @param y
  20560. affine y co-ordinate
  20561. @param withCompression
  20562. if true encode with point compression
  20563. @deprecated per-point compression property will be removed, refer
  20564. {@link #getEncoded(bool)}
  20565. </member>
  20566. <member name="M:Org.BouncyCastle.Math.EC.Custom.Sec.SecT113R1Point.#ctor(Org.BouncyCastle.Math.EC.ECCurve,Org.BouncyCastle.Math.EC.ECFieldElement,Org.BouncyCastle.Math.EC.ECFieldElement)">
  20567. @deprecated Use ECCurve.createPoint to construct points
  20568. </member>
  20569. <member name="M:Org.BouncyCastle.Math.EC.Custom.Sec.SecT113R1Point.#ctor(Org.BouncyCastle.Math.EC.ECCurve,Org.BouncyCastle.Math.EC.ECFieldElement,Org.BouncyCastle.Math.EC.ECFieldElement,System.Boolean)">
  20570. @deprecated per-point compression property will be removed, refer {@link #getEncoded(bool)}
  20571. </member>
  20572. <member name="M:Org.BouncyCastle.Math.EC.Custom.Sec.SecT113R2Point.#ctor(Org.BouncyCastle.Math.EC.ECCurve,Org.BouncyCastle.Math.EC.ECFieldElement,Org.BouncyCastle.Math.EC.ECFieldElement)">
  20573. @deprecated Use ECCurve.createPoint to construct points
  20574. </member>
  20575. <member name="M:Org.BouncyCastle.Math.EC.Custom.Sec.SecT113R2Point.#ctor(Org.BouncyCastle.Math.EC.ECCurve,Org.BouncyCastle.Math.EC.ECFieldElement,Org.BouncyCastle.Math.EC.ECFieldElement,System.Boolean)">
  20576. @deprecated per-point compression property will be removed, refer {@link #getEncoded(bool)}
  20577. </member>
  20578. <member name="M:Org.BouncyCastle.Math.EC.Custom.Sec.SecT131R1Point.#ctor(Org.BouncyCastle.Math.EC.ECCurve,Org.BouncyCastle.Math.EC.ECFieldElement,Org.BouncyCastle.Math.EC.ECFieldElement)">
  20579. @deprecated Use ECCurve.createPoint to construct points
  20580. </member>
  20581. <member name="M:Org.BouncyCastle.Math.EC.Custom.Sec.SecT131R1Point.#ctor(Org.BouncyCastle.Math.EC.ECCurve,Org.BouncyCastle.Math.EC.ECFieldElement,Org.BouncyCastle.Math.EC.ECFieldElement,System.Boolean)">
  20582. @deprecated per-point compression property will be removed, refer {@link #getEncoded(bool)}
  20583. </member>
  20584. <member name="M:Org.BouncyCastle.Math.EC.Custom.Sec.SecT131R2Point.#ctor(Org.BouncyCastle.Math.EC.ECCurve,Org.BouncyCastle.Math.EC.ECFieldElement,Org.BouncyCastle.Math.EC.ECFieldElement)">
  20585. @deprecated Use ECCurve.createPoint to construct points
  20586. </member>
  20587. <member name="M:Org.BouncyCastle.Math.EC.Custom.Sec.SecT131R2Point.#ctor(Org.BouncyCastle.Math.EC.ECCurve,Org.BouncyCastle.Math.EC.ECFieldElement,Org.BouncyCastle.Math.EC.ECFieldElement,System.Boolean)">
  20588. @deprecated per-point compression property will be removed, refer {@link #getEncoded(bool)}
  20589. </member>
  20590. <member name="M:Org.BouncyCastle.Math.EC.Custom.Sec.SecT163K1Point.#ctor(Org.BouncyCastle.Math.EC.ECCurve,Org.BouncyCastle.Math.EC.ECFieldElement,Org.BouncyCastle.Math.EC.ECFieldElement)">
  20591. @deprecated Use ECCurve.createPoint to construct points
  20592. </member>
  20593. <member name="M:Org.BouncyCastle.Math.EC.Custom.Sec.SecT163K1Point.#ctor(Org.BouncyCastle.Math.EC.ECCurve,Org.BouncyCastle.Math.EC.ECFieldElement,Org.BouncyCastle.Math.EC.ECFieldElement,System.Boolean)">
  20594. @deprecated per-point compression property will be removed, refer {@link #getEncoded(bool)}
  20595. </member>
  20596. <member name="M:Org.BouncyCastle.Math.EC.Custom.Sec.SecT163R1Point.#ctor(Org.BouncyCastle.Math.EC.ECCurve,Org.BouncyCastle.Math.EC.ECFieldElement,Org.BouncyCastle.Math.EC.ECFieldElement)">
  20597. @deprecated Use ECCurve.createPoint to construct points
  20598. </member>
  20599. <member name="M:Org.BouncyCastle.Math.EC.Custom.Sec.SecT163R1Point.#ctor(Org.BouncyCastle.Math.EC.ECCurve,Org.BouncyCastle.Math.EC.ECFieldElement,Org.BouncyCastle.Math.EC.ECFieldElement,System.Boolean)">
  20600. @deprecated per-point compression property will be removed, refer {@link #getEncoded(bool)}
  20601. </member>
  20602. <member name="M:Org.BouncyCastle.Math.EC.Custom.Sec.SecT163R2Point.#ctor(Org.BouncyCastle.Math.EC.ECCurve,Org.BouncyCastle.Math.EC.ECFieldElement,Org.BouncyCastle.Math.EC.ECFieldElement)">
  20603. @deprecated Use ECCurve.createPoint to construct points
  20604. </member>
  20605. <member name="M:Org.BouncyCastle.Math.EC.Custom.Sec.SecT163R2Point.#ctor(Org.BouncyCastle.Math.EC.ECCurve,Org.BouncyCastle.Math.EC.ECFieldElement,Org.BouncyCastle.Math.EC.ECFieldElement,System.Boolean)">
  20606. @deprecated per-point compression property will be removed, refer {@link #getEncoded(bool)}
  20607. </member>
  20608. <member name="M:Org.BouncyCastle.Math.EC.Custom.Sec.SecT193R1Point.#ctor(Org.BouncyCastle.Math.EC.ECCurve,Org.BouncyCastle.Math.EC.ECFieldElement,Org.BouncyCastle.Math.EC.ECFieldElement)">
  20609. @deprecated Use ECCurve.createPoint to construct points
  20610. </member>
  20611. <member name="M:Org.BouncyCastle.Math.EC.Custom.Sec.SecT193R1Point.#ctor(Org.BouncyCastle.Math.EC.ECCurve,Org.BouncyCastle.Math.EC.ECFieldElement,Org.BouncyCastle.Math.EC.ECFieldElement,System.Boolean)">
  20612. @deprecated per-point compression property will be removed, refer {@link #getEncoded(bool)}
  20613. </member>
  20614. <member name="M:Org.BouncyCastle.Math.EC.Custom.Sec.SecT193R2Point.#ctor(Org.BouncyCastle.Math.EC.ECCurve,Org.BouncyCastle.Math.EC.ECFieldElement,Org.BouncyCastle.Math.EC.ECFieldElement)">
  20615. @deprecated Use ECCurve.createPoint to construct points
  20616. </member>
  20617. <member name="M:Org.BouncyCastle.Math.EC.Custom.Sec.SecT193R2Point.#ctor(Org.BouncyCastle.Math.EC.ECCurve,Org.BouncyCastle.Math.EC.ECFieldElement,Org.BouncyCastle.Math.EC.ECFieldElement,System.Boolean)">
  20618. @deprecated per-point compression property will be removed, refer {@link #getEncoded(bool)}
  20619. </member>
  20620. <member name="M:Org.BouncyCastle.Math.EC.Custom.Sec.SecT233K1Point.#ctor(Org.BouncyCastle.Math.EC.ECCurve,Org.BouncyCastle.Math.EC.ECFieldElement,Org.BouncyCastle.Math.EC.ECFieldElement)">
  20621. @deprecated Use ECCurve.createPoint to construct points
  20622. </member>
  20623. <member name="M:Org.BouncyCastle.Math.EC.Custom.Sec.SecT233K1Point.#ctor(Org.BouncyCastle.Math.EC.ECCurve,Org.BouncyCastle.Math.EC.ECFieldElement,Org.BouncyCastle.Math.EC.ECFieldElement,System.Boolean)">
  20624. @deprecated per-point compression property will be removed, refer {@link #getEncoded(bool)}
  20625. </member>
  20626. <member name="M:Org.BouncyCastle.Math.EC.Custom.Sec.SecT233R1Point.#ctor(Org.BouncyCastle.Math.EC.ECCurve,Org.BouncyCastle.Math.EC.ECFieldElement,Org.BouncyCastle.Math.EC.ECFieldElement)">
  20627. @deprecated Use ECCurve.createPoint to construct points
  20628. </member>
  20629. <member name="M:Org.BouncyCastle.Math.EC.Custom.Sec.SecT233R1Point.#ctor(Org.BouncyCastle.Math.EC.ECCurve,Org.BouncyCastle.Math.EC.ECFieldElement,Org.BouncyCastle.Math.EC.ECFieldElement,System.Boolean)">
  20630. @deprecated per-point compression property will be removed, refer {@link #getEncoded(bool)}
  20631. </member>
  20632. <member name="M:Org.BouncyCastle.Math.EC.Custom.Sec.SecT239K1Point.#ctor(Org.BouncyCastle.Math.EC.ECCurve,Org.BouncyCastle.Math.EC.ECFieldElement,Org.BouncyCastle.Math.EC.ECFieldElement)">
  20633. @deprecated Use ECCurve.createPoint to construct points
  20634. </member>
  20635. <member name="M:Org.BouncyCastle.Math.EC.Custom.Sec.SecT239K1Point.#ctor(Org.BouncyCastle.Math.EC.ECCurve,Org.BouncyCastle.Math.EC.ECFieldElement,Org.BouncyCastle.Math.EC.ECFieldElement,System.Boolean)">
  20636. @deprecated per-point compression property will be removed, refer {@link #getEncoded(bool)}
  20637. </member>
  20638. <member name="M:Org.BouncyCastle.Math.EC.Custom.Sec.SecT283K1Point.#ctor(Org.BouncyCastle.Math.EC.ECCurve,Org.BouncyCastle.Math.EC.ECFieldElement,Org.BouncyCastle.Math.EC.ECFieldElement)">
  20639. @deprecated Use ECCurve.createPoint to construct points
  20640. </member>
  20641. <member name="M:Org.BouncyCastle.Math.EC.Custom.Sec.SecT283K1Point.#ctor(Org.BouncyCastle.Math.EC.ECCurve,Org.BouncyCastle.Math.EC.ECFieldElement,Org.BouncyCastle.Math.EC.ECFieldElement,System.Boolean)">
  20642. @deprecated per-point compression property will be removed, refer {@link #getEncoded(bool)}
  20643. </member>
  20644. <member name="M:Org.BouncyCastle.Math.EC.Custom.Sec.SecT283R1Point.#ctor(Org.BouncyCastle.Math.EC.ECCurve,Org.BouncyCastle.Math.EC.ECFieldElement,Org.BouncyCastle.Math.EC.ECFieldElement)">
  20645. @deprecated Use ECCurve.createPoint to construct points
  20646. </member>
  20647. <member name="M:Org.BouncyCastle.Math.EC.Custom.Sec.SecT283R1Point.#ctor(Org.BouncyCastle.Math.EC.ECCurve,Org.BouncyCastle.Math.EC.ECFieldElement,Org.BouncyCastle.Math.EC.ECFieldElement,System.Boolean)">
  20648. @deprecated per-point compression property will be removed, refer {@link #getEncoded(bool)}
  20649. </member>
  20650. <member name="M:Org.BouncyCastle.Math.EC.Custom.Sec.SecT409K1Point.#ctor(Org.BouncyCastle.Math.EC.ECCurve,Org.BouncyCastle.Math.EC.ECFieldElement,Org.BouncyCastle.Math.EC.ECFieldElement)">
  20651. @deprecated Use ECCurve.createPoint to construct points
  20652. </member>
  20653. <member name="M:Org.BouncyCastle.Math.EC.Custom.Sec.SecT409K1Point.#ctor(Org.BouncyCastle.Math.EC.ECCurve,Org.BouncyCastle.Math.EC.ECFieldElement,Org.BouncyCastle.Math.EC.ECFieldElement,System.Boolean)">
  20654. @deprecated per-point compression property will be removed, refer {@link #getEncoded(bool)}
  20655. </member>
  20656. <member name="M:Org.BouncyCastle.Math.EC.Custom.Sec.SecT409R1Point.#ctor(Org.BouncyCastle.Math.EC.ECCurve,Org.BouncyCastle.Math.EC.ECFieldElement,Org.BouncyCastle.Math.EC.ECFieldElement)">
  20657. @deprecated Use ECCurve.createPoint to construct points
  20658. </member>
  20659. <member name="M:Org.BouncyCastle.Math.EC.Custom.Sec.SecT409R1Point.#ctor(Org.BouncyCastle.Math.EC.ECCurve,Org.BouncyCastle.Math.EC.ECFieldElement,Org.BouncyCastle.Math.EC.ECFieldElement,System.Boolean)">
  20660. @deprecated per-point compression property will be removed, refer {@link #getEncoded(bool)}
  20661. </member>
  20662. <member name="M:Org.BouncyCastle.Math.EC.Custom.Sec.SecT571K1Point.#ctor(Org.BouncyCastle.Math.EC.ECCurve,Org.BouncyCastle.Math.EC.ECFieldElement,Org.BouncyCastle.Math.EC.ECFieldElement)">
  20663. @deprecated Use ECCurve.createPoint to construct points
  20664. </member>
  20665. <member name="M:Org.BouncyCastle.Math.EC.Custom.Sec.SecT571K1Point.#ctor(Org.BouncyCastle.Math.EC.ECCurve,Org.BouncyCastle.Math.EC.ECFieldElement,Org.BouncyCastle.Math.EC.ECFieldElement,System.Boolean)">
  20666. @deprecated per-point compression property will be removed, refer {@link #getEncoded(bool)}
  20667. </member>
  20668. <member name="M:Org.BouncyCastle.Math.EC.Custom.Sec.SecT571R1Point.#ctor(Org.BouncyCastle.Math.EC.ECCurve,Org.BouncyCastle.Math.EC.ECFieldElement,Org.BouncyCastle.Math.EC.ECFieldElement)">
  20669. @deprecated Use ECCurve.createPoint to construct points
  20670. </member>
  20671. <member name="M:Org.BouncyCastle.Math.EC.Custom.Sec.SecT571R1Point.#ctor(Org.BouncyCastle.Math.EC.ECCurve,Org.BouncyCastle.Math.EC.ECFieldElement,Org.BouncyCastle.Math.EC.ECFieldElement,System.Boolean)">
  20672. @deprecated per-point compression property will be removed, refer {@link #getEncoded(bool)}
  20673. </member>
  20674. <member name="M:Org.BouncyCastle.Math.EC.ECAlgorithms.ReferenceMultiply(Org.BouncyCastle.Math.EC.ECPoint,Org.BouncyCastle.Math.BigInteger)">
  20675. Simple shift-and-add multiplication. Serves as reference implementation to verify (possibly
  20676. faster) implementations, and for very small scalars. CAUTION: This implementation is NOT
  20677. constant-time in any way. It is only intended to be used for diagnostics.
  20678. @param p
  20679. The point to multiply.
  20680. @param k
  20681. The multiplier.
  20682. @return The result of the point multiplication <code>kP</code>.
  20683. </member>
  20684. <member name="T:Org.BouncyCastle.Math.EC.ECCurve">
  20685. <remarks>Base class for an elliptic curve.</remarks>
  20686. </member>
  20687. <member name="M:Org.BouncyCastle.Math.EC.ECCurve.Precompute(Org.BouncyCastle.Math.EC.ECPoint,System.String,Org.BouncyCastle.Math.EC.Multiplier.IPreCompCallback)">
  20688. Compute a <code>PreCompInfo</code> for a point on this curve, under a given name. Used by
  20689. <code>ECMultiplier</code>s to save the precomputation for this <code>ECPoint</code> for use
  20690. by subsequent multiplication.
  20691. @param point
  20692. The <code>ECPoint</code> to store precomputations for.
  20693. @param name
  20694. A <code>String</code> used to index precomputations of different types.
  20695. @param callback
  20696. Called to calculate the <code>PreCompInfo</code>.
  20697. </member>
  20698. <member name="M:Org.BouncyCastle.Math.EC.ECCurve.NormalizeAll(Org.BouncyCastle.Math.EC.ECPoint[])">
  20699. Normalization ensures that any projective coordinate is 1, and therefore that the x, y
  20700. coordinates reflect those of the equivalent point in an affine coordinate system. Where more
  20701. than one point is to be normalized, this method will generally be more efficient than
  20702. normalizing each point separately.
  20703. @param points
  20704. An array of points that will be updated in place with their normalized versions,
  20705. where necessary
  20706. </member>
  20707. <member name="M:Org.BouncyCastle.Math.EC.ECCurve.NormalizeAll(Org.BouncyCastle.Math.EC.ECPoint[],System.Int32,System.Int32,Org.BouncyCastle.Math.EC.ECFieldElement)">
  20708. Normalization ensures that any projective coordinate is 1, and therefore that the x, y
  20709. coordinates reflect those of the equivalent point in an affine coordinate system. Where more
  20710. than one point is to be normalized, this method will generally be more efficient than
  20711. normalizing each point separately. An (optional) z-scaling factor can be applied; effectively
  20712. each z coordinate is scaled by this value prior to normalization (but only one
  20713. actual multiplication is needed).
  20714. @param points
  20715. An array of points that will be updated in place with their normalized versions,
  20716. where necessary
  20717. @param off
  20718. The start of the range of points to normalize
  20719. @param len
  20720. The length of the range of points to normalize
  20721. @param iso
  20722. The (optional) z-scaling factor - can be null
  20723. </member>
  20724. <member name="M:Org.BouncyCastle.Math.EC.ECCurve.CreateCacheSafeLookupTable(Org.BouncyCastle.Math.EC.ECPoint[],System.Int32,System.Int32)">
  20725. Create a cache-safe lookup table for the specified sequence of points. All the points MUST
  20726. belong to this <code>ECCurve</code> instance, and MUST already be normalized.
  20727. </member>
  20728. <member name="M:Org.BouncyCastle.Math.EC.ECCurve.GetMultiplier">
  20729. Sets the default <code>ECMultiplier</code>, unless already set.
  20730. We avoid locking for performance reasons, so there is no uniqueness guarantee.
  20731. </member>
  20732. <member name="M:Org.BouncyCastle.Math.EC.ECCurve.DecodePoint(System.Byte[])">
  20733. Decode a point on this curve from its ASN.1 encoding. The different
  20734. encodings are taken account of, including point compression for
  20735. <code>F<sub>p</sub></code> (X9.62 s 4.2.1 pg 17).
  20736. @return The decoded point.
  20737. </member>
  20738. <member name="T:Org.BouncyCastle.Math.EC.FpCurve">
  20739. Elliptic curve over Fp
  20740. </member>
  20741. <member name="F:Org.BouncyCastle.Math.EC.AbstractF2mCurve.si">
  20742. The auxiliary values <code>s<sub>0</sub></code> and
  20743. <code>s<sub>1</sub></code> used for partial modular reduction for
  20744. Koblitz curves.
  20745. </member>
  20746. <member name="M:Org.BouncyCastle.Math.EC.AbstractF2mCurve.SolveQuadraticEquation(Org.BouncyCastle.Math.EC.ECFieldElement)">
  20747. Solves a quadratic equation <code>z<sup>2</sup> + z = beta</code>(X9.62
  20748. D.1.6) The other solution is <code>z + 1</code>.
  20749. @param beta
  20750. The value to solve the quadratic equation for.
  20751. @return the solution for <code>z<sup>2</sup> + z = beta</code> or
  20752. <code>null</code> if no solution exists.
  20753. </member>
  20754. <member name="M:Org.BouncyCastle.Math.EC.AbstractF2mCurve.GetSi">
  20755. @return the auxiliary values <code>s<sub>0</sub></code> and
  20756. <code>s<sub>1</sub></code> used for partial modular reduction for
  20757. Koblitz curves.
  20758. </member>
  20759. <member name="P:Org.BouncyCastle.Math.EC.AbstractF2mCurve.IsKoblitz">
  20760. Returns true if this is a Koblitz curve (ABC curve).
  20761. @return true if this is a Koblitz curve (ABC curve), false otherwise
  20762. </member>
  20763. <member name="T:Org.BouncyCastle.Math.EC.F2mCurve">
  20764. Elliptic curves over F2m. The Weierstrass equation is given by
  20765. <code>y<sup>2</sup> + xy = x<sup>3</sup> + ax<sup>2</sup> + b</code>.
  20766. </member>
  20767. <member name="F:Org.BouncyCastle.Math.EC.F2mCurve.m">
  20768. The exponent <code>m</code> of <code>F<sub>2<sup>m</sup></sub></code>.
  20769. </member>
  20770. <member name="F:Org.BouncyCastle.Math.EC.F2mCurve.k1">
  20771. TPB: The integer <code>k</code> where <code>x<sup>m</sup> +
  20772. x<sup>k</sup> + 1</code> represents the reduction polynomial
  20773. <code>f(z)</code>.<br/>
  20774. PPB: The integer <code>k1</code> where <code>x<sup>m</sup> +
  20775. x<sup>k3</sup> + x<sup>k2</sup> + x<sup>k1</sup> + 1</code>
  20776. represents the reduction polynomial <code>f(z)</code>.<br/>
  20777. </member>
  20778. <member name="F:Org.BouncyCastle.Math.EC.F2mCurve.k2">
  20779. TPB: Always set to <code>0</code><br/>
  20780. PPB: The integer <code>k2</code> where <code>x<sup>m</sup> +
  20781. x<sup>k3</sup> + x<sup>k2</sup> + x<sup>k1</sup> + 1</code>
  20782. represents the reduction polynomial <code>f(z)</code>.<br/>
  20783. </member>
  20784. <member name="F:Org.BouncyCastle.Math.EC.F2mCurve.k3">
  20785. TPB: Always set to <code>0</code><br/>
  20786. PPB: The integer <code>k3</code> where <code>x<sup>m</sup> +
  20787. x<sup>k3</sup> + x<sup>k2</sup> + x<sup>k1</sup> + 1</code>
  20788. represents the reduction polynomial <code>f(z)</code>.<br/>
  20789. </member>
  20790. <member name="F:Org.BouncyCastle.Math.EC.F2mCurve.m_infinity">
  20791. The point at infinity on this curve.
  20792. </member>
  20793. <member name="M:Org.BouncyCastle.Math.EC.F2mCurve.#ctor(System.Int32,System.Int32,Org.BouncyCastle.Math.BigInteger,Org.BouncyCastle.Math.BigInteger)">
  20794. Constructor for Trinomial Polynomial Basis (TPB).
  20795. @param m The exponent <code>m</code> of
  20796. <code>F<sub>2<sup>m</sup></sub></code>.
  20797. @param k The integer <code>k</code> where <code>x<sup>m</sup> +
  20798. x<sup>k</sup> + 1</code> represents the reduction
  20799. polynomial <code>f(z)</code>.
  20800. @param a The coefficient <code>a</code> in the Weierstrass equation
  20801. for non-supersingular elliptic curves over
  20802. <code>F<sub>2<sup>m</sup></sub></code>.
  20803. @param b The coefficient <code>b</code> in the Weierstrass equation
  20804. for non-supersingular elliptic curves over
  20805. <code>F<sub>2<sup>m</sup></sub></code>.
  20806. </member>
  20807. <member name="M:Org.BouncyCastle.Math.EC.F2mCurve.#ctor(System.Int32,System.Int32,Org.BouncyCastle.Math.BigInteger,Org.BouncyCastle.Math.BigInteger,Org.BouncyCastle.Math.BigInteger,Org.BouncyCastle.Math.BigInteger)">
  20808. Constructor for Trinomial Polynomial Basis (TPB).
  20809. @param m The exponent <code>m</code> of
  20810. <code>F<sub>2<sup>m</sup></sub></code>.
  20811. @param k The integer <code>k</code> where <code>x<sup>m</sup> +
  20812. x<sup>k</sup> + 1</code> represents the reduction
  20813. polynomial <code>f(z)</code>.
  20814. @param a The coefficient <code>a</code> in the Weierstrass equation
  20815. for non-supersingular elliptic curves over
  20816. <code>F<sub>2<sup>m</sup></sub></code>.
  20817. @param b The coefficient <code>b</code> in the Weierstrass equation
  20818. for non-supersingular elliptic curves over
  20819. <code>F<sub>2<sup>m</sup></sub></code>.
  20820. @param order The order of the main subgroup of the elliptic curve.
  20821. @param cofactor The cofactor of the elliptic curve, i.e.
  20822. <code>#E<sub>a</sub>(F<sub>2<sup>m</sup></sub>) = h * n</code>.
  20823. </member>
  20824. <member name="M:Org.BouncyCastle.Math.EC.F2mCurve.#ctor(System.Int32,System.Int32,System.Int32,System.Int32,Org.BouncyCastle.Math.BigInteger,Org.BouncyCastle.Math.BigInteger)">
  20825. Constructor for Pentanomial Polynomial Basis (PPB).
  20826. @param m The exponent <code>m</code> of
  20827. <code>F<sub>2<sup>m</sup></sub></code>.
  20828. @param k1 The integer <code>k1</code> where <code>x<sup>m</sup> +
  20829. x<sup>k3</sup> + x<sup>k2</sup> + x<sup>k1</sup> + 1</code>
  20830. represents the reduction polynomial <code>f(z)</code>.
  20831. @param k2 The integer <code>k2</code> where <code>x<sup>m</sup> +
  20832. x<sup>k3</sup> + x<sup>k2</sup> + x<sup>k1</sup> + 1</code>
  20833. represents the reduction polynomial <code>f(z)</code>.
  20834. @param k3 The integer <code>k3</code> where <code>x<sup>m</sup> +
  20835. x<sup>k3</sup> + x<sup>k2</sup> + x<sup>k1</sup> + 1</code>
  20836. represents the reduction polynomial <code>f(z)</code>.
  20837. @param a The coefficient <code>a</code> in the Weierstrass equation
  20838. for non-supersingular elliptic curves over
  20839. <code>F<sub>2<sup>m</sup></sub></code>.
  20840. @param b The coefficient <code>b</code> in the Weierstrass equation
  20841. for non-supersingular elliptic curves over
  20842. <code>F<sub>2<sup>m</sup></sub></code>.
  20843. </member>
  20844. <member name="M:Org.BouncyCastle.Math.EC.F2mCurve.#ctor(System.Int32,System.Int32,System.Int32,System.Int32,Org.BouncyCastle.Math.BigInteger,Org.BouncyCastle.Math.BigInteger,Org.BouncyCastle.Math.BigInteger,Org.BouncyCastle.Math.BigInteger)">
  20845. Constructor for Pentanomial Polynomial Basis (PPB).
  20846. @param m The exponent <code>m</code> of
  20847. <code>F<sub>2<sup>m</sup></sub></code>.
  20848. @param k1 The integer <code>k1</code> where <code>x<sup>m</sup> +
  20849. x<sup>k3</sup> + x<sup>k2</sup> + x<sup>k1</sup> + 1</code>
  20850. represents the reduction polynomial <code>f(z)</code>.
  20851. @param k2 The integer <code>k2</code> where <code>x<sup>m</sup> +
  20852. x<sup>k3</sup> + x<sup>k2</sup> + x<sup>k1</sup> + 1</code>
  20853. represents the reduction polynomial <code>f(z)</code>.
  20854. @param k3 The integer <code>k3</code> where <code>x<sup>m</sup> +
  20855. x<sup>k3</sup> + x<sup>k2</sup> + x<sup>k1</sup> + 1</code>
  20856. represents the reduction polynomial <code>f(z)</code>.
  20857. @param a The coefficient <code>a</code> in the Weierstrass equation
  20858. for non-supersingular elliptic curves over
  20859. <code>F<sub>2<sup>m</sup></sub></code>.
  20860. @param b The coefficient <code>b</code> in the Weierstrass equation
  20861. for non-supersingular elliptic curves over
  20862. <code>F<sub>2<sup>m</sup></sub></code>.
  20863. @param order The order of the main subgroup of the elliptic curve.
  20864. @param cofactor The cofactor of the elliptic curve, i.e.
  20865. <code>#E<sub>a</sub>(F<sub>2<sup>m</sup></sub>) = h * n</code>.
  20866. </member>
  20867. <member name="M:Org.BouncyCastle.Math.EC.F2mCurve.IsTrinomial">
  20868. Return true if curve uses a Trinomial basis.
  20869. @return true if curve Trinomial, false otherwise.
  20870. </member>
  20871. <member name="P:Org.BouncyCastle.Math.EC.FpFieldElement.FieldName">
  20872. return the field name for this field.
  20873. @return the string "Fp".
  20874. </member>
  20875. <member name="M:Org.BouncyCastle.Math.EC.FpFieldElement.Sqrt">
  20876. return a sqrt root - the routine verifies that the calculation
  20877. returns the right value - if none exists it returns null.
  20878. </member>
  20879. <member name="T:Org.BouncyCastle.Math.EC.F2mFieldElement">
  20880. Class representing the Elements of the finite field
  20881. <code>F<sub>2<sup>m</sup></sub></code> in polynomial basis (PB)
  20882. representation. Both trinomial (Tpb) and pentanomial (Ppb) polynomial
  20883. basis representations are supported. Gaussian normal basis (GNB)
  20884. representation is not supported.
  20885. </member>
  20886. <member name="F:Org.BouncyCastle.Math.EC.F2mFieldElement.Gnb">
  20887. Indicates gaussian normal basis representation (GNB). Number chosen
  20888. according to X9.62. GNB is not implemented at present.
  20889. </member>
  20890. <member name="F:Org.BouncyCastle.Math.EC.F2mFieldElement.Tpb">
  20891. Indicates trinomial basis representation (Tpb). Number chosen
  20892. according to X9.62.
  20893. </member>
  20894. <member name="F:Org.BouncyCastle.Math.EC.F2mFieldElement.Ppb">
  20895. Indicates pentanomial basis representation (Ppb). Number chosen
  20896. according to X9.62.
  20897. </member>
  20898. <member name="F:Org.BouncyCastle.Math.EC.F2mFieldElement.representation">
  20899. Tpb or Ppb.
  20900. </member>
  20901. <member name="F:Org.BouncyCastle.Math.EC.F2mFieldElement.m">
  20902. The exponent <code>m</code> of <code>F<sub>2<sup>m</sup></sub></code>.
  20903. </member>
  20904. <member name="F:Org.BouncyCastle.Math.EC.F2mFieldElement.x">
  20905. The <code>LongArray</code> holding the bits.
  20906. </member>
  20907. <member name="M:Org.BouncyCastle.Math.EC.F2mFieldElement.#ctor(System.Int32,System.Int32,System.Int32,System.Int32,Org.BouncyCastle.Math.BigInteger)">
  20908. Constructor for Ppb.
  20909. @param m The exponent <code>m</code> of
  20910. <code>F<sub>2<sup>m</sup></sub></code>.
  20911. @param k1 The integer <code>k1</code> where <code>x<sup>m</sup> +
  20912. x<sup>k3</sup> + x<sup>k2</sup> + x<sup>k1</sup> + 1</code>
  20913. represents the reduction polynomial <code>f(z)</code>.
  20914. @param k2 The integer <code>k2</code> where <code>x<sup>m</sup> +
  20915. x<sup>k3</sup> + x<sup>k2</sup> + x<sup>k1</sup> + 1</code>
  20916. represents the reduction polynomial <code>f(z)</code>.
  20917. @param k3 The integer <code>k3</code> where <code>x<sup>m</sup> +
  20918. x<sup>k3</sup> + x<sup>k2</sup> + x<sup>k1</sup> + 1</code>
  20919. represents the reduction polynomial <code>f(z)</code>.
  20920. @param x The BigInteger representing the value of the field element.
  20921. </member>
  20922. <member name="M:Org.BouncyCastle.Math.EC.F2mFieldElement.#ctor(System.Int32,System.Int32,Org.BouncyCastle.Math.BigInteger)">
  20923. Constructor for Tpb.
  20924. @param m The exponent <code>m</code> of
  20925. <code>F<sub>2<sup>m</sup></sub></code>.
  20926. @param k The integer <code>k</code> where <code>x<sup>m</sup> +
  20927. x<sup>k</sup> + 1</code> represents the reduction
  20928. polynomial <code>f(z)</code>.
  20929. @param x The BigInteger representing the value of the field element.
  20930. </member>
  20931. <member name="M:Org.BouncyCastle.Math.EC.F2mFieldElement.CheckFieldElements(Org.BouncyCastle.Math.EC.ECFieldElement,Org.BouncyCastle.Math.EC.ECFieldElement)">
  20932. Checks, if the ECFieldElements <code>a</code> and <code>b</code>
  20933. are elements of the same field <code>F<sub>2<sup>m</sup></sub></code>
  20934. (having the same representation).
  20935. @param a field element.
  20936. @param b field element to be compared.
  20937. @throws ArgumentException if <code>a</code> and <code>b</code>
  20938. are not elements of the same field
  20939. <code>F<sub>2<sup>m</sup></sub></code> (having the same
  20940. representation).
  20941. </member>
  20942. <member name="P:Org.BouncyCastle.Math.EC.F2mFieldElement.Representation">
  20943. @return the representation of the field
  20944. <code>F<sub>2<sup>m</sup></sub></code>, either of
  20945. {@link F2mFieldElement.Tpb} (trinomial
  20946. basis representation) or
  20947. {@link F2mFieldElement.Ppb} (pentanomial
  20948. basis representation).
  20949. </member>
  20950. <member name="P:Org.BouncyCastle.Math.EC.F2mFieldElement.M">
  20951. @return the degree <code>m</code> of the reduction polynomial
  20952. <code>f(z)</code>.
  20953. </member>
  20954. <member name="P:Org.BouncyCastle.Math.EC.F2mFieldElement.K1">
  20955. @return Tpb: The integer <code>k</code> where <code>x<sup>m</sup> +
  20956. x<sup>k</sup> + 1</code> represents the reduction polynomial
  20957. <code>f(z)</code>.<br/>
  20958. Ppb: The integer <code>k1</code> where <code>x<sup>m</sup> +
  20959. x<sup>k3</sup> + x<sup>k2</sup> + x<sup>k1</sup> + 1</code>
  20960. represents the reduction polynomial <code>f(z)</code>.<br/>
  20961. </member>
  20962. <member name="P:Org.BouncyCastle.Math.EC.F2mFieldElement.K2">
  20963. @return Tpb: Always returns <code>0</code><br/>
  20964. Ppb: The integer <code>k2</code> where <code>x<sup>m</sup> +
  20965. x<sup>k3</sup> + x<sup>k2</sup> + x<sup>k1</sup> + 1</code>
  20966. represents the reduction polynomial <code>f(z)</code>.<br/>
  20967. </member>
  20968. <member name="P:Org.BouncyCastle.Math.EC.F2mFieldElement.K3">
  20969. @return Tpb: Always set to <code>0</code><br/>
  20970. Ppb: The integer <code>k3</code> where <code>x<sup>m</sup> +
  20971. x<sup>k3</sup> + x<sup>k2</sup> + x<sup>k1</sup> + 1</code>
  20972. represents the reduction polynomial <code>f(z)</code>.<br/>
  20973. </member>
  20974. <member name="T:Org.BouncyCastle.Math.EC.ECPoint">
  20975. base class for points on elliptic curves.
  20976. </member>
  20977. <member name="P:Org.BouncyCastle.Math.EC.ECPoint.AffineXCoord">
  20978. Returns the affine x-coordinate after checking that this point is normalized.
  20979. @return The affine x-coordinate of this point
  20980. @throws IllegalStateException if the point is not normalized
  20981. </member>
  20982. <member name="P:Org.BouncyCastle.Math.EC.ECPoint.AffineYCoord">
  20983. Returns the affine y-coordinate after checking that this point is normalized
  20984. @return The affine y-coordinate of this point
  20985. @throws IllegalStateException if the point is not normalized
  20986. </member>
  20987. <member name="P:Org.BouncyCastle.Math.EC.ECPoint.XCoord">
  20988. Returns the x-coordinate.
  20989. Caution: depending on the curve's coordinate system, this may not be the same value as in an
  20990. affine coordinate system; use Normalize() to get a point where the coordinates have their
  20991. affine values, or use AffineXCoord if you expect the point to already have been normalized.
  20992. @return the x-coordinate of this point
  20993. </member>
  20994. <member name="P:Org.BouncyCastle.Math.EC.ECPoint.YCoord">
  20995. Returns the y-coordinate.
  20996. Caution: depending on the curve's coordinate system, this may not be the same value as in an
  20997. affine coordinate system; use Normalize() to get a point where the coordinates have their
  20998. affine values, or use AffineYCoord if you expect the point to already have been normalized.
  20999. @return the y-coordinate of this point
  21000. </member>
  21001. <member name="M:Org.BouncyCastle.Math.EC.ECPoint.Normalize">
  21002. Normalization ensures that any projective coordinate is 1, and therefore that the x, y
  21003. coordinates reflect those of the equivalent point in an affine coordinate system.
  21004. @return a new ECPoint instance representing the same point, but with normalized coordinates
  21005. </member>
  21006. <member name="M:Org.BouncyCastle.Math.EC.ECPointBase.GetEncoded(System.Boolean)">
  21007. return the field element encoded with point compression. (S 4.3.6)
  21008. </member>
  21009. <member name="M:Org.BouncyCastle.Math.EC.ECPointBase.Multiply(Org.BouncyCastle.Math.BigInteger)">
  21010. Multiplies this <code>ECPoint</code> by the given number.
  21011. @param k The multiplicator.
  21012. @return <code>k * this</code>.
  21013. </member>
  21014. <member name="T:Org.BouncyCastle.Math.EC.FpPoint">
  21015. Elliptic curve points over Fp
  21016. </member>
  21017. <member name="M:Org.BouncyCastle.Math.EC.FpPoint.#ctor(Org.BouncyCastle.Math.EC.ECCurve,Org.BouncyCastle.Math.EC.ECFieldElement,Org.BouncyCastle.Math.EC.ECFieldElement)">
  21018. Create a point which encodes without point compression.
  21019. @param curve the curve to use
  21020. @param x affine x co-ordinate
  21021. @param y affine y co-ordinate
  21022. </member>
  21023. <member name="M:Org.BouncyCastle.Math.EC.FpPoint.#ctor(Org.BouncyCastle.Math.EC.ECCurve,Org.BouncyCastle.Math.EC.ECFieldElement,Org.BouncyCastle.Math.EC.ECFieldElement,System.Boolean)">
  21024. Create a point that encodes with or without point compression.
  21025. @param curve the curve to use
  21026. @param x affine x co-ordinate
  21027. @param y affine y co-ordinate
  21028. @param withCompression if true encode with point compression
  21029. </member>
  21030. <member name="T:Org.BouncyCastle.Math.EC.F2mPoint">
  21031. Elliptic curve points over F2m
  21032. </member>
  21033. <member name="M:Org.BouncyCastle.Math.EC.F2mPoint.#ctor(Org.BouncyCastle.Math.EC.ECCurve,Org.BouncyCastle.Math.EC.ECFieldElement,Org.BouncyCastle.Math.EC.ECFieldElement)">
  21034. @param curve base curve
  21035. @param x x point
  21036. @param y y point
  21037. </member>
  21038. <member name="M:Org.BouncyCastle.Math.EC.F2mPoint.#ctor(Org.BouncyCastle.Math.EC.ECCurve,Org.BouncyCastle.Math.EC.ECFieldElement,Org.BouncyCastle.Math.EC.ECFieldElement,System.Boolean)">
  21039. @param curve base curve
  21040. @param x x point
  21041. @param y y point
  21042. @param withCompression true if encode with point compression.
  21043. </member>
  21044. <member name="M:Org.BouncyCastle.Math.EC.Multiplier.DoubleAddMultiplier.MultiplyPositive(Org.BouncyCastle.Math.EC.ECPoint,Org.BouncyCastle.Math.BigInteger)">
  21045. Joye's double-add algorithm.
  21046. </member>
  21047. <member name="T:Org.BouncyCastle.Math.EC.Multiplier.ECMultiplier">
  21048. Interface for classes encapsulating a point multiplication algorithm
  21049. for <code>ECPoint</code>s.
  21050. </member>
  21051. <member name="M:Org.BouncyCastle.Math.EC.Multiplier.ECMultiplier.Multiply(Org.BouncyCastle.Math.EC.ECPoint,Org.BouncyCastle.Math.BigInteger)">
  21052. Multiplies the <code>ECPoint p</code> by <code>k</code>, i.e.
  21053. <code>p</code> is added <code>k</code> times to itself.
  21054. @param p The <code>ECPoint</code> to be multiplied.
  21055. @param k The factor by which <code>p</code> is multiplied.
  21056. @return <code>p</code> multiplied by <code>k</code>.
  21057. </member>
  21058. <member name="T:Org.BouncyCastle.Math.EC.Multiplier.FixedPointPreCompInfo">
  21059. Class holding precomputation data for fixed-point multiplications.
  21060. </member>
  21061. <member name="F:Org.BouncyCastle.Math.EC.Multiplier.FixedPointPreCompInfo.m_lookupTable">
  21062. Lookup table for the precomputed <code>ECPoint</code>s used for a fixed point multiplication.
  21063. </member>
  21064. <member name="F:Org.BouncyCastle.Math.EC.Multiplier.FixedPointPreCompInfo.m_width">
  21065. The width used for the precomputation. If a larger width precomputation
  21066. is already available this may be larger than was requested, so calling
  21067. code should refer to the actual width.
  21068. </member>
  21069. <member name="T:Org.BouncyCastle.Math.EC.Multiplier.MixedNafR2LMultiplier">
  21070. Class implementing the NAF (Non-Adjacent Form) multiplication algorithm (right-to-left) using
  21071. mixed coordinates.
  21072. </member>
  21073. <member name="M:Org.BouncyCastle.Math.EC.Multiplier.MixedNafR2LMultiplier.#ctor">
  21074. By default, addition will be done in Jacobian coordinates, and doubling will be done in
  21075. Modified Jacobian coordinates (independent of the original coordinate system of each point).
  21076. </member>
  21077. <member name="M:Org.BouncyCastle.Math.EC.Multiplier.MontgomeryLadderMultiplier.MultiplyPositive(Org.BouncyCastle.Math.EC.ECPoint,Org.BouncyCastle.Math.BigInteger)">
  21078. Montgomery ladder.
  21079. </member>
  21080. <member name="T:Org.BouncyCastle.Math.EC.Multiplier.NafL2RMultiplier">
  21081. Class implementing the NAF (Non-Adjacent Form) multiplication algorithm (left-to-right).
  21082. </member>
  21083. <member name="T:Org.BouncyCastle.Math.EC.Multiplier.NafR2LMultiplier">
  21084. Class implementing the NAF (Non-Adjacent Form) multiplication algorithm (right-to-left).
  21085. </member>
  21086. <member name="T:Org.BouncyCastle.Math.EC.Multiplier.PreCompInfo">
  21087. Interface for classes storing precomputation data for multiplication
  21088. algorithms. Used as a Memento (see GOF patterns) for
  21089. <code>WNafMultiplier</code>.
  21090. </member>
  21091. <member name="T:Org.BouncyCastle.Math.EC.Multiplier.WNafL2RMultiplier">
  21092. Class implementing the WNAF (Window Non-Adjacent Form) multiplication
  21093. algorithm.
  21094. </member>
  21095. <member name="M:Org.BouncyCastle.Math.EC.Multiplier.WNafL2RMultiplier.MultiplyPositive(Org.BouncyCastle.Math.EC.ECPoint,Org.BouncyCastle.Math.BigInteger)">
  21096. Multiplies <code>this</code> by an integer <code>k</code> using the
  21097. Window NAF method.
  21098. @param k The integer by which <code>this</code> is multiplied.
  21099. @return A new <code>ECPoint</code> which equals <code>this</code>
  21100. multiplied by <code>k</code>.
  21101. </member>
  21102. <member name="T:Org.BouncyCastle.Math.EC.Multiplier.WNafPreCompInfo">
  21103. Class holding precomputation data for the WNAF (Window Non-Adjacent Form)
  21104. algorithm.
  21105. </member>
  21106. <member name="F:Org.BouncyCastle.Math.EC.Multiplier.WNafPreCompInfo.m_preComp">
  21107. Array holding the precomputed <code>ECPoint</code>s used for a Window
  21108. NAF multiplication.
  21109. </member>
  21110. <member name="F:Org.BouncyCastle.Math.EC.Multiplier.WNafPreCompInfo.m_preCompNeg">
  21111. Array holding the negations of the precomputed <code>ECPoint</code>s used
  21112. for a Window NAF multiplication.
  21113. </member>
  21114. <member name="F:Org.BouncyCastle.Math.EC.Multiplier.WNafPreCompInfo.m_twice">
  21115. Holds an <code>ECPoint</code> representing Twice(this). Used for the
  21116. Window NAF multiplication to create or extend the precomputed values.
  21117. </member>
  21118. <member name="M:Org.BouncyCastle.Math.EC.Multiplier.WNafUtilities.GenerateWindowNaf(System.Int32,Org.BouncyCastle.Math.BigInteger)">
  21119. Computes the Window NAF (non-adjacent Form) of an integer.
  21120. @param width The width <code>w</code> of the Window NAF. The width is
  21121. defined as the minimal number <code>w</code>, such that for any
  21122. <code>w</code> consecutive digits in the resulting representation, at
  21123. most one is non-zero.
  21124. @param k The integer of which the Window NAF is computed.
  21125. @return The Window NAF of the given width, such that the following holds:
  21126. <code>k = &amp;sum;<sub>i=0</sub><sup>l-1</sup> k<sub>i</sub>2<sup>i</sup>
  21127. </code>, where the <code>k<sub>i</sub></code> denote the elements of the
  21128. returned <code>byte[]</code>.
  21129. </member>
  21130. <member name="M:Org.BouncyCastle.Math.EC.Multiplier.WNafUtilities.GetWindowSize(System.Int32)">
  21131. Determine window width to use for a scalar multiplication of the given size.
  21132. @param bits the bit-length of the scalar to multiply by
  21133. @return the window size to use
  21134. </member>
  21135. <member name="M:Org.BouncyCastle.Math.EC.Multiplier.WNafUtilities.GetWindowSize(System.Int32,System.Int32)">
  21136. Determine window width to use for a scalar multiplication of the given size.
  21137. @param bits the bit-length of the scalar to multiply by
  21138. @param maxWidth the maximum window width to return
  21139. @return the window size to use
  21140. </member>
  21141. <member name="M:Org.BouncyCastle.Math.EC.Multiplier.WNafUtilities.GetWindowSize(System.Int32,System.Int32[])">
  21142. Determine window width to use for a scalar multiplication of the given size.
  21143. @param bits the bit-length of the scalar to multiply by
  21144. @param windowSizeCutoffs a monotonically increasing list of bit sizes at which to increment the window width
  21145. @return the window size to use
  21146. </member>
  21147. <member name="M:Org.BouncyCastle.Math.EC.Multiplier.WNafUtilities.GetWindowSize(System.Int32,System.Int32[],System.Int32)">
  21148. Determine window width to use for a scalar multiplication of the given size.
  21149. @param bits the bit-length of the scalar to multiply by
  21150. @param windowSizeCutoffs a monotonically increasing list of bit sizes at which to increment the window width
  21151. @param maxWidth the maximum window width to return
  21152. @return the window size to use
  21153. </member>
  21154. <member name="T:Org.BouncyCastle.Math.EC.Multiplier.WTauNafMultiplier">
  21155. Class implementing the WTNAF (Window
  21156. <code>&#964;</code>-adic Non-Adjacent Form) algorithm.
  21157. </member>
  21158. <member name="M:Org.BouncyCastle.Math.EC.Multiplier.WTauNafMultiplier.MultiplyPositive(Org.BouncyCastle.Math.EC.ECPoint,Org.BouncyCastle.Math.BigInteger)">
  21159. Multiplies a {@link org.bouncycastle.math.ec.AbstractF2mPoint AbstractF2mPoint}
  21160. by <code>k</code> using the reduced <code>&#964;</code>-adic NAF (RTNAF)
  21161. method.
  21162. @param p The AbstractF2mPoint to multiply.
  21163. @param k The integer by which to multiply <code>k</code>.
  21164. @return <code>p</code> multiplied by <code>k</code>.
  21165. </member>
  21166. <member name="M:Org.BouncyCastle.Math.EC.Multiplier.WTauNafMultiplier.MultiplyWTnaf(Org.BouncyCastle.Math.EC.AbstractF2mPoint,Org.BouncyCastle.Math.EC.Abc.ZTauElement,System.SByte,System.SByte)">
  21167. Multiplies a {@link org.bouncycastle.math.ec.AbstractF2mPoint AbstractF2mPoint}
  21168. by an element <code>&#955;</code> of <code><b>Z</b>[&#964;]</code> using
  21169. the <code>&#964;</code>-adic NAF (TNAF) method.
  21170. @param p The AbstractF2mPoint to multiply.
  21171. @param lambda The element <code>&#955;</code> of
  21172. <code><b>Z</b>[&#964;]</code> of which to compute the
  21173. <code>[&#964;]</code>-adic NAF.
  21174. @return <code>p</code> multiplied by <code>&#955;</code>.
  21175. </member>
  21176. <member name="M:Org.BouncyCastle.Math.EC.Multiplier.WTauNafMultiplier.MultiplyFromWTnaf(Org.BouncyCastle.Math.EC.AbstractF2mPoint,System.SByte[])">
  21177. Multiplies a {@link org.bouncycastle.math.ec.AbstractF2mPoint AbstractF2mPoint}
  21178. by an element <code>&#955;</code> of <code><b>Z</b>[&#964;]</code>
  21179. using the window <code>&#964;</code>-adic NAF (TNAF) method, given the
  21180. WTNAF of <code>&#955;</code>.
  21181. @param p The AbstractF2mPoint to multiply.
  21182. @param u The the WTNAF of <code>&#955;</code>..
  21183. @return <code>&#955; * p</code>
  21184. </member>
  21185. <member name="T:Org.BouncyCastle.Math.EC.Multiplier.WTauNafPreCompInfo">
  21186. Class holding precomputation data for the WTNAF (Window
  21187. <code>&#964;</code>-adic Non-Adjacent Form) algorithm.
  21188. </member>
  21189. <member name="F:Org.BouncyCastle.Math.EC.Multiplier.WTauNafPreCompInfo.m_preComp">
  21190. Array holding the precomputed <code>AbstractF2mPoint</code>s used for the
  21191. WTNAF multiplication in <code>
  21192. {@link org.bouncycastle.math.ec.multiplier.WTauNafMultiplier.multiply()
  21193. WTauNafMultiplier.multiply()}</code>.
  21194. </member>
  21195. <member name="M:Org.BouncyCastle.Math.EC.Multiplier.ZSignedDigitL2RMultiplier.MultiplyPositive(Org.BouncyCastle.Math.EC.ECPoint,Org.BouncyCastle.Math.BigInteger)">
  21196. 'Zeroless' Signed Digit Left-to-Right.
  21197. </member>
  21198. <member name="M:Org.BouncyCastle.Math.EC.Multiplier.ZSignedDigitR2LMultiplier.MultiplyPositive(Org.BouncyCastle.Math.EC.ECPoint,Org.BouncyCastle.Math.BigInteger)">
  21199. 'Zeroless' Signed Digit Right-to-Left.
  21200. </member>
  21201. <member name="T:Org.BouncyCastle.Math.Primes">
  21202. Utility methods for generating primes and testing for primality.
  21203. </member>
  21204. <member name="T:Org.BouncyCastle.Math.Primes.MROutput">
  21205. Used to return the output from the
  21206. {@linkplain Primes#enhancedMRProbablePrimeTest(BigInteger, SecureRandom, int) Enhanced
  21207. Miller-Rabin Probabilistic Primality Test}
  21208. </member>
  21209. <member name="T:Org.BouncyCastle.Math.Primes.STOutput">
  21210. Used to return the output from the {@linkplain Primes#generateSTRandomPrime(Digest, int, byte[]) Shawe-Taylor Random_Prime Routine}
  21211. </member>
  21212. <member name="M:Org.BouncyCastle.Math.Primes.GenerateSTRandomPrime(Org.BouncyCastle.Crypto.IDigest,System.Int32,System.Byte[])">
  21213. FIPS 186-4 C.6 Shawe-Taylor Random_Prime Routine
  21214. Construct a provable prime number using a hash function.
  21215. @param hash
  21216. the {@link Digest} instance to use (as "Hash()"). Cannot be null.
  21217. @param length
  21218. the length (in bits) of the prime to be generated. Must be at least 2.
  21219. @param inputSeed
  21220. the seed to be used for the generation of the requested prime. Cannot be null or
  21221. empty.
  21222. @return an {@link STOutput} instance containing the requested prime.
  21223. </member>
  21224. <member name="M:Org.BouncyCastle.Math.Primes.EnhancedMRProbablePrimeTest(Org.BouncyCastle.Math.BigInteger,Org.BouncyCastle.Security.SecureRandom,System.Int32)">
  21225. FIPS 186-4 C.3.2 Enhanced Miller-Rabin Probabilistic Primality Test
  21226. Run several iterations of the Miller-Rabin algorithm with randomly-chosen bases. This is an
  21227. alternative to {@link #isMRProbablePrime(BigInteger, SecureRandom, int)} that provides more
  21228. information about a composite candidate, which may be useful when generating or validating
  21229. RSA moduli.
  21230. @param candidate
  21231. the {@link BigInteger} instance to test for primality.
  21232. @param random
  21233. the source of randomness to use to choose bases.
  21234. @param iterations
  21235. the number of randomly-chosen bases to perform the test for.
  21236. @return an {@link MROutput} instance that can be further queried for details.
  21237. </member>
  21238. <member name="M:Org.BouncyCastle.Math.Primes.HasAnySmallFactors(Org.BouncyCastle.Math.BigInteger)">
  21239. A fast check for small divisors, up to some implementation-specific limit.
  21240. @param candidate
  21241. the {@link BigInteger} instance to test for division by small factors.
  21242. @return <code>true</code> if the candidate is found to have any small factors,
  21243. <code>false</code> otherwise.
  21244. </member>
  21245. <member name="M:Org.BouncyCastle.Math.Primes.IsMRProbablePrime(Org.BouncyCastle.Math.BigInteger,Org.BouncyCastle.Security.SecureRandom,System.Int32)">
  21246. FIPS 186-4 C.3.1 Miller-Rabin Probabilistic Primality Test
  21247. Run several iterations of the Miller-Rabin algorithm with randomly-chosen bases.
  21248. @param candidate
  21249. the {@link BigInteger} instance to test for primality.
  21250. @param random
  21251. the source of randomness to use to choose bases.
  21252. @param iterations
  21253. the number of randomly-chosen bases to perform the test for.
  21254. @return <code>false</code> if any witness to compositeness is found amongst the chosen bases
  21255. (so <code>candidate</code> is definitely NOT prime), or else <code>true</code>
  21256. (indicating primality with some probability dependent on the number of iterations
  21257. that were performed).
  21258. </member>
  21259. <member name="M:Org.BouncyCastle.Math.Primes.IsMRProbablePrimeToBase(Org.BouncyCastle.Math.BigInteger,Org.BouncyCastle.Math.BigInteger)">
  21260. FIPS 186-4 C.3.1 Miller-Rabin Probabilistic Primality Test (to a fixed base).
  21261. Run a single iteration of the Miller-Rabin algorithm against the specified base.
  21262. @param candidate
  21263. the {@link BigInteger} instance to test for primality.
  21264. @param baseValue
  21265. the base value to use for this iteration.
  21266. @return <code>false</code> if the specified base is a witness to compositeness (so
  21267. <code>candidate</code> is definitely NOT prime), or else <code>true</code>.
  21268. </member>
  21269. <member name="T:Org.BouncyCastle.Ocsp.BasicOcspResp">
  21270. <remarks>
  21271. <code>
  21272. BasicOcspResponse ::= SEQUENCE {
  21273. tbsResponseData ResponseData,
  21274. signatureAlgorithm AlgorithmIdentifier,
  21275. signature BIT STRING,
  21276. certs [0] EXPLICIT SEQUENCE OF Certificate OPTIONAL
  21277. }
  21278. </code>
  21279. </remarks>
  21280. </member>
  21281. <member name="M:Org.BouncyCastle.Ocsp.BasicOcspResp.GetTbsResponseData">
  21282. <returns>The DER encoding of the tbsResponseData field.</returns>
  21283. <exception cref="T:Org.BouncyCastle.Ocsp.OcspException">In the event of an encoding error.</exception>
  21284. </member>
  21285. <member name="M:Org.BouncyCastle.Ocsp.BasicOcspResp.GetCertificates(System.String)">
  21286. <returns>The certificates, if any, associated with the response.</returns>
  21287. <exception cref="T:Org.BouncyCastle.Ocsp.OcspException">In the event of an encoding error.</exception>
  21288. </member>
  21289. <member name="M:Org.BouncyCastle.Ocsp.BasicOcspResp.Verify(Org.BouncyCastle.Crypto.AsymmetricKeyParameter)">
  21290. <summary>
  21291. Verify the signature against the tbsResponseData object we contain.
  21292. </summary>
  21293. </member>
  21294. <member name="M:Org.BouncyCastle.Ocsp.BasicOcspResp.GetEncoded">
  21295. <returns>The ASN.1 encoded representation of this object.</returns>
  21296. </member>
  21297. <member name="T:Org.BouncyCastle.Ocsp.BasicOcspRespGenerator">
  21298. Generator for basic OCSP response objects.
  21299. </member>
  21300. <member name="M:Org.BouncyCastle.Ocsp.BasicOcspRespGenerator.#ctor(Org.BouncyCastle.Ocsp.RespID)">
  21301. basic constructor
  21302. </member>
  21303. <member name="M:Org.BouncyCastle.Ocsp.BasicOcspRespGenerator.#ctor(Org.BouncyCastle.Crypto.AsymmetricKeyParameter)">
  21304. construct with the responderID to be the SHA-1 keyHash of the passed in public key.
  21305. </member>
  21306. <member name="M:Org.BouncyCastle.Ocsp.BasicOcspRespGenerator.AddResponse(Org.BouncyCastle.Ocsp.CertificateID,Org.BouncyCastle.Ocsp.CertificateStatus)">
  21307. Add a response for a particular Certificate ID.
  21308. @param certID certificate ID details
  21309. @param certStatus status of the certificate - null if okay
  21310. </member>
  21311. <member name="M:Org.BouncyCastle.Ocsp.BasicOcspRespGenerator.AddResponse(Org.BouncyCastle.Ocsp.CertificateID,Org.BouncyCastle.Ocsp.CertificateStatus,Org.BouncyCastle.Asn1.X509.X509Extensions)">
  21312. Add a response for a particular Certificate ID.
  21313. @param certID certificate ID details
  21314. @param certStatus status of the certificate - null if okay
  21315. @param singleExtensions optional extensions
  21316. </member>
  21317. <member name="M:Org.BouncyCastle.Ocsp.BasicOcspRespGenerator.AddResponse(Org.BouncyCastle.Ocsp.CertificateID,Org.BouncyCastle.Ocsp.CertificateStatus,System.DateTime,Org.BouncyCastle.Asn1.X509.X509Extensions)">
  21318. Add a response for a particular Certificate ID.
  21319. @param certID certificate ID details
  21320. @param nextUpdate date when next update should be requested
  21321. @param certStatus status of the certificate - null if okay
  21322. @param singleExtensions optional extensions
  21323. </member>
  21324. <member name="M:Org.BouncyCastle.Ocsp.BasicOcspRespGenerator.AddResponse(Org.BouncyCastle.Ocsp.CertificateID,Org.BouncyCastle.Ocsp.CertificateStatus,System.DateTime,System.DateTime,Org.BouncyCastle.Asn1.X509.X509Extensions)">
  21325. Add a response for a particular Certificate ID.
  21326. @param certID certificate ID details
  21327. @param thisUpdate date this response was valid on
  21328. @param nextUpdate date when next update should be requested
  21329. @param certStatus status of the certificate - null if okay
  21330. @param singleExtensions optional extensions
  21331. </member>
  21332. <member name="M:Org.BouncyCastle.Ocsp.BasicOcspRespGenerator.SetResponseExtensions(Org.BouncyCastle.Asn1.X509.X509Extensions)">
  21333. Set the extensions for the response.
  21334. @param responseExtensions the extension object to carry.
  21335. </member>
  21336. <member name="M:Org.BouncyCastle.Ocsp.BasicOcspRespGenerator.Generate(Org.BouncyCastle.Crypto.ISignatureFactory,Org.BouncyCastle.X509.X509Certificate[],System.DateTime)">
  21337. <summary>
  21338. Generate the signed response using the passed in signature calculator.
  21339. </summary>
  21340. <param name="signatureCalculatorFactory">Implementation of signing calculator factory.</param>
  21341. <param name="chain">The certificate chain associated with the response signer.</param>
  21342. <param name="producedAt">"produced at" date.</param>
  21343. <returns></returns>
  21344. </member>
  21345. <member name="P:Org.BouncyCastle.Ocsp.BasicOcspRespGenerator.SignatureAlgNames">
  21346. Return an IEnumerable of the signature names supported by the generator.
  21347. @return an IEnumerable containing recognised names.
  21348. </member>
  21349. <member name="M:Org.BouncyCastle.Ocsp.CertificateID.#ctor(System.String,Org.BouncyCastle.X509.X509Certificate,Org.BouncyCastle.Math.BigInteger)">
  21350. create from an issuer certificate and the serial number of the
  21351. certificate it signed.
  21352. @exception OcspException if any problems occur creating the id fields.
  21353. </member>
  21354. <member name="P:Org.BouncyCastle.Ocsp.CertificateID.SerialNumber">
  21355. return the serial number for the certificate associated
  21356. with this request.
  21357. </member>
  21358. <member name="M:Org.BouncyCastle.Ocsp.CertificateID.DeriveCertificateID(Org.BouncyCastle.Ocsp.CertificateID,Org.BouncyCastle.Math.BigInteger)">
  21359. Create a new CertificateID for a new serial number derived from a previous one
  21360. calculated for the same CA certificate.
  21361. @param original the previously calculated CertificateID for the CA.
  21362. @param newSerialNumber the serial number for the new certificate of interest.
  21363. @return a new CertificateID for newSerialNumber
  21364. </member>
  21365. <member name="T:Org.BouncyCastle.Ocsp.OcspReq">
  21366. <pre>
  21367. OcspRequest ::= SEQUENCE {
  21368. tbsRequest TBSRequest,
  21369. optionalSignature [0] EXPLICIT Signature OPTIONAL }
  21370. TBSRequest ::= SEQUENCE {
  21371. version [0] EXPLICIT Version DEFAULT v1,
  21372. requestorName [1] EXPLICIT GeneralName OPTIONAL,
  21373. requestList SEQUENCE OF Request,
  21374. requestExtensions [2] EXPLICIT Extensions OPTIONAL }
  21375. Signature ::= SEQUENCE {
  21376. signatureAlgorithm AlgorithmIdentifier,
  21377. signature BIT STRING,
  21378. certs [0] EXPLICIT SEQUENCE OF Certificate OPTIONAL}
  21379. Version ::= INTEGER { v1(0) }
  21380. Request ::= SEQUENCE {
  21381. reqCert CertID,
  21382. singleRequestExtensions [0] EXPLICIT Extensions OPTIONAL }
  21383. CertID ::= SEQUENCE {
  21384. hashAlgorithm AlgorithmIdentifier,
  21385. issuerNameHash OCTET STRING, -- Hash of Issuer's DN
  21386. issuerKeyHash OCTET STRING, -- Hash of Issuers public key
  21387. serialNumber CertificateSerialNumber }
  21388. </pre>
  21389. </member>
  21390. <member name="M:Org.BouncyCastle.Ocsp.OcspReq.GetTbsRequest">
  21391. Return the DER encoding of the tbsRequest field.
  21392. @return DER encoding of tbsRequest
  21393. @throws OcspException in the event of an encoding error.
  21394. </member>
  21395. <member name="P:Org.BouncyCastle.Ocsp.OcspReq.SignatureAlgOid">
  21396. return the object identifier representing the signature algorithm
  21397. </member>
  21398. <member name="M:Org.BouncyCastle.Ocsp.OcspReq.GetCertificates(System.String)">
  21399. If the request is signed return a possibly empty CertStore containing the certificates in the
  21400. request. If the request is not signed the method returns null.
  21401. @return null if not signed, a CertStore otherwise
  21402. @throws OcspException
  21403. </member>
  21404. <member name="P:Org.BouncyCastle.Ocsp.OcspReq.IsSigned">
  21405. Return whether or not this request is signed.
  21406. @return true if signed false otherwise.
  21407. </member>
  21408. <member name="M:Org.BouncyCastle.Ocsp.OcspReq.Verify(Org.BouncyCastle.Crypto.AsymmetricKeyParameter)">
  21409. Verify the signature against the TBSRequest object we contain.
  21410. </member>
  21411. <member name="M:Org.BouncyCastle.Ocsp.OcspReq.GetEncoded">
  21412. return the ASN.1 encoded representation of this object.
  21413. </member>
  21414. <member name="M:Org.BouncyCastle.Ocsp.OcspReqGenerator.AddRequest(Org.BouncyCastle.Ocsp.CertificateID)">
  21415. Add a request for the given CertificateID.
  21416. @param certId certificate ID of interest
  21417. </member>
  21418. <member name="M:Org.BouncyCastle.Ocsp.OcspReqGenerator.AddRequest(Org.BouncyCastle.Ocsp.CertificateID,Org.BouncyCastle.Asn1.X509.X509Extensions)">
  21419. Add a request with extensions
  21420. @param certId certificate ID of interest
  21421. @param singleRequestExtensions the extensions to attach to the request
  21422. </member>
  21423. <member name="M:Org.BouncyCastle.Ocsp.OcspReqGenerator.SetRequestorName(Org.BouncyCastle.Asn1.X509.X509Name)">
  21424. Set the requestor name to the passed in X509Principal
  21425. @param requestorName a X509Principal representing the requestor name.
  21426. </member>
  21427. <member name="M:Org.BouncyCastle.Ocsp.OcspReqGenerator.Generate">
  21428. Generate an unsigned request
  21429. @return the OcspReq
  21430. @throws OcspException
  21431. </member>
  21432. <member name="P:Org.BouncyCastle.Ocsp.OcspReqGenerator.SignatureAlgNames">
  21433. Return an IEnumerable of the signature names supported by the generator.
  21434. @return an IEnumerable containing recognised names.
  21435. </member>
  21436. <member name="M:Org.BouncyCastle.Ocsp.OcspResp.GetEncoded">
  21437. return the ASN.1 encoded representation of this object.
  21438. </member>
  21439. <member name="T:Org.BouncyCastle.Ocsp.OCSPRespGenerator">
  21440. base generator for an OCSP response - at the moment this only supports the
  21441. generation of responses containing BasicOCSP responses.
  21442. </member>
  21443. <member name="F:Org.BouncyCastle.Ocsp.OcspRespStatus.Successful">
  21444. note 4 is not used.
  21445. </member>
  21446. <member name="T:Org.BouncyCastle.Ocsp.RespID">
  21447. Carrier for a ResponderID.
  21448. </member>
  21449. <member name="T:Org.BouncyCastle.Ocsp.RevokedStatus">
  21450. wrapper for the RevokedInfo object
  21451. </member>
  21452. <member name="P:Org.BouncyCastle.Ocsp.RevokedStatus.RevocationReason">
  21453. return the revocation reason. Note: this field is optional, test for it
  21454. with hasRevocationReason() first.
  21455. @exception InvalidOperationException if a reason is asked for and none is avaliable
  21456. </member>
  21457. <member name="M:Org.BouncyCastle.Ocsp.SingleResp.GetCertStatus">
  21458. Return the status object for the response - null indicates good.
  21459. @return the status object for the response, null if it is good.
  21460. </member>
  21461. <member name="P:Org.BouncyCastle.Ocsp.SingleResp.NextUpdate">
  21462. return the NextUpdate value - note: this is an optional field so may
  21463. be returned as null.
  21464. @return nextUpdate, or null if not present.
  21465. </member>
  21466. <member name="T:Org.BouncyCastle.Ocsp.UnknownStatus">
  21467. wrapper for the UnknownInfo object
  21468. </member>
  21469. <member name="T:Org.BouncyCastle.Security.AgreementUtilities">
  21470. <remarks>
  21471. Utility class for creating IBasicAgreement objects from their names/Oids
  21472. </remarks>
  21473. </member>
  21474. <member name="T:Org.BouncyCastle.Security.CipherUtilities">
  21475. <remarks>
  21476. Cipher Utility class contains methods that can not be specifically grouped into other classes.
  21477. </remarks>
  21478. </member>
  21479. <member name="M:Org.BouncyCastle.Security.CipherUtilities.GetObjectIdentifier(System.String)">
  21480. <summary>
  21481. Returns a ObjectIdentifier for a give encoding.
  21482. </summary>
  21483. <param name="mechanism">A string representation of the encoding.</param>
  21484. <returns>A DerObjectIdentifier, null if the Oid is not available.</returns>
  21485. </member>
  21486. <member name="T:Org.BouncyCastle.Security.DigestUtilities">
  21487. <remarks>
  21488. Utility class for creating IDigest objects from their names/Oids
  21489. </remarks>
  21490. </member>
  21491. <member name="M:Org.BouncyCastle.Security.DigestUtilities.GetObjectIdentifier(System.String)">
  21492. <summary>
  21493. Returns a ObjectIdentifier for a given digest mechanism.
  21494. </summary>
  21495. <param name="mechanism">A string representation of the digest meanism.</param>
  21496. <returns>A DerObjectIdentifier, null if the Oid is not available.</returns>
  21497. </member>
  21498. <member name="T:Org.BouncyCastle.Security.DotNetUtilities">
  21499. <summary>
  21500. A class containing methods to interface the BouncyCastle world to the .NET Crypto world.
  21501. </summary>
  21502. </member>
  21503. <member name="M:Org.BouncyCastle.Security.DotNetUtilities.ToX509Certificate(Org.BouncyCastle.Asn1.X509.X509CertificateStructure)">
  21504. <summary>
  21505. Create an System.Security.Cryptography.X509Certificate from an X509Certificate Structure.
  21506. </summary>
  21507. <param name="x509Struct"></param>
  21508. <returns>A System.Security.Cryptography.X509Certificate.</returns>
  21509. </member>
  21510. <member name="T:Org.BouncyCastle.Security.MacUtilities">
  21511. <remarks>
  21512. Utility class for creating HMac object from their names/Oids
  21513. </remarks>
  21514. </member>
  21515. <member name="T:Org.BouncyCastle.Security.PbeUtilities">
  21516. <summary>
  21517. </summary>
  21518. </member>
  21519. <member name="M:Org.BouncyCastle.Security.PbeUtilities.GetObjectIdentifier(System.String)">
  21520. <summary>
  21521. Returns a ObjectIdentifier for a give encoding.
  21522. </summary>
  21523. <param name="mechanism">A string representation of the encoding.</param>
  21524. <returns>A DerObjectIdentifier, null if the Oid is not available.</returns>
  21525. </member>
  21526. <member name="M:Org.BouncyCastle.Security.SecureRandom.GetInstance(System.String)">
  21527. <summary>
  21528. Create and auto-seed an instance based on the given algorithm.
  21529. </summary>
  21530. <remarks>Equivalent to GetInstance(algorithm, true)</remarks>
  21531. <param name="algorithm">e.g. "SHA256PRNG"</param>
  21532. </member>
  21533. <member name="M:Org.BouncyCastle.Security.SecureRandom.GetInstance(System.String,System.Boolean)">
  21534. <summary>
  21535. Create an instance based on the given algorithm, with optional auto-seeding
  21536. </summary>
  21537. <param name="algorithm">e.g. "SHA256PRNG"</param>
  21538. <param name="autoSeed">If true, the instance will be auto-seeded.</param>
  21539. </member>
  21540. <member name="M:Org.BouncyCastle.Security.SecureRandom.#ctor(System.Byte[])">
  21541. <remarks>
  21542. To replicate existing predictable output, replace with GetInstance("SHA1PRNG", false), followed by SetSeed(seed)
  21543. </remarks>
  21544. </member>
  21545. <member name="M:Org.BouncyCastle.Security.SecureRandom.#ctor(Org.BouncyCastle.Crypto.Prng.IRandomGenerator)">
  21546. <summary>Use the specified instance of IRandomGenerator as random source.</summary>
  21547. <remarks>
  21548. This constructor performs no seeding of either the <c>IRandomGenerator</c> or the
  21549. constructed <c>SecureRandom</c>. It is the responsibility of the client to provide
  21550. proper seed material as necessary/appropriate for the given <c>IRandomGenerator</c>
  21551. implementation.
  21552. </remarks>
  21553. <param name="generator">The source to generate all random bytes from.</param>
  21554. </member>
  21555. <member name="M:Org.BouncyCastle.Security.SecurityUtilityException.#ctor">
  21556. base constructor.
  21557. </member>
  21558. <member name="M:Org.BouncyCastle.Security.SecurityUtilityException.#ctor(System.String)">
  21559. create a SecurityUtilityException with the given message.
  21560. @param message the message to be carried with the exception.
  21561. </member>
  21562. <member name="T:Org.BouncyCastle.Security.SignerUtilities">
  21563. <summary>
  21564. Signer Utility class contains methods that can not be specifically grouped into other classes.
  21565. </summary>
  21566. </member>
  21567. <member name="M:Org.BouncyCastle.Security.SignerUtilities.GetObjectIdentifier(System.String)">
  21568. <summary>
  21569. Returns an ObjectIdentifier for a given encoding.
  21570. </summary>
  21571. <param name="mechanism">A string representation of the encoding.</param>
  21572. <returns>A DerObjectIdentifier, null if the OID is not available.</returns>
  21573. </member>
  21574. <member name="T:Org.BouncyCastle.Security.WrapperUtilities">
  21575. <remarks>
  21576. Utility class for creating IWrapper objects from their names/Oids
  21577. </remarks>
  21578. </member>
  21579. <member name="T:Org.BouncyCastle.OpenSsl.MiscPemGenerator">
  21580. PEM generator for the original set of PEM objects used in Open SSL.
  21581. </member>
  21582. <member name="T:Org.BouncyCastle.OpenSsl.PemReader">
  21583. Class for reading OpenSSL PEM encoded streams containing
  21584. X509 certificates, PKCS8 encoded keys and PKCS7 objects.
  21585. <p>
  21586. In the case of PKCS7 objects the reader will return a CMS ContentInfo object. Keys and
  21587. Certificates will be returned using the appropriate java.security type.</p>
  21588. </member>
  21589. <member name="M:Org.BouncyCastle.OpenSsl.PemReader.#ctor(System.IO.TextReader)">
  21590. Create a new PemReader
  21591. @param reader the Reader
  21592. </member>
  21593. <member name="M:Org.BouncyCastle.OpenSsl.PemReader.#ctor(System.IO.TextReader,Org.BouncyCastle.OpenSsl.IPasswordFinder)">
  21594. Create a new PemReader with a password finder
  21595. @param reader the Reader
  21596. @param pFinder the password finder
  21597. </member>
  21598. <member name="M:Org.BouncyCastle.OpenSsl.PemReader.ReadCertificate(Org.BouncyCastle.Utilities.IO.Pem.PemObject)">
  21599. Reads in a X509Certificate.
  21600. @return the X509Certificate
  21601. @throws IOException if an I/O error occured
  21602. </member>
  21603. <member name="M:Org.BouncyCastle.OpenSsl.PemReader.ReadCrl(Org.BouncyCastle.Utilities.IO.Pem.PemObject)">
  21604. Reads in a X509CRL.
  21605. @return the X509Certificate
  21606. @throws IOException if an I/O error occured
  21607. </member>
  21608. <member name="M:Org.BouncyCastle.OpenSsl.PemReader.ReadCertificateRequest(Org.BouncyCastle.Utilities.IO.Pem.PemObject)">
  21609. Reads in a PKCS10 certification request.
  21610. @return the certificate request.
  21611. @throws IOException if an I/O error occured
  21612. </member>
  21613. <member name="M:Org.BouncyCastle.OpenSsl.PemReader.ReadAttributeCertificate(Org.BouncyCastle.Utilities.IO.Pem.PemObject)">
  21614. Reads in a X509 Attribute Certificate.
  21615. @return the X509 Attribute Certificate
  21616. @throws IOException if an I/O error occured
  21617. </member>
  21618. <member name="M:Org.BouncyCastle.OpenSsl.PemReader.ReadPkcs7(Org.BouncyCastle.Utilities.IO.Pem.PemObject)">
  21619. Reads in a PKCS7 object. This returns a ContentInfo object suitable for use with the CMS
  21620. API.
  21621. @return the X509Certificate
  21622. @throws IOException if an I/O error occured
  21623. </member>
  21624. <member name="M:Org.BouncyCastle.OpenSsl.PemReader.ReadPrivateKey(Org.BouncyCastle.Utilities.IO.Pem.PemObject)">
  21625. Read a Key Pair
  21626. </member>
  21627. <member name="T:Org.BouncyCastle.OpenSsl.PemWriter">
  21628. <remarks>General purpose writer for OpenSSL PEM objects.</remarks>
  21629. </member>
  21630. <member name="M:Org.BouncyCastle.OpenSsl.PemWriter.#ctor(System.IO.TextWriter)">
  21631. <param name="writer">The TextWriter object to write the output to.</param>
  21632. </member>
  21633. <member name="M:Org.BouncyCastle.OpenSsl.Pkcs8Generator.#ctor(Org.BouncyCastle.Crypto.AsymmetricKeyParameter)">
  21634. Constructor for an unencrypted private key PEM object.
  21635. @param key private key to be encoded.
  21636. </member>
  21637. <member name="M:Org.BouncyCastle.OpenSsl.Pkcs8Generator.#ctor(Org.BouncyCastle.Crypto.AsymmetricKeyParameter,System.String)">
  21638. Constructor for an encrypted private key PEM object.
  21639. @param key private key to be encoded
  21640. @param algorithm encryption algorithm to use
  21641. @param provider provider to use
  21642. @throws NoSuchAlgorithmException if algorithm/mode cannot be found
  21643. </member>
  21644. <member name="T:Org.BouncyCastle.Pkcs.Pkcs10CertificationRequest">
  21645. <remarks>
  21646. A class for verifying and creating Pkcs10 Certification requests.
  21647. </remarks>
  21648. <code>
  21649. CertificationRequest ::= Sequence {
  21650. certificationRequestInfo CertificationRequestInfo,
  21651. signatureAlgorithm AlgorithmIdentifier{{ SignatureAlgorithms }},
  21652. signature BIT STRING
  21653. }
  21654. CertificationRequestInfo ::= Sequence {
  21655. version Integer { v1(0) } (v1,...),
  21656. subject Name,
  21657. subjectPKInfo SubjectPublicKeyInfo{{ PKInfoAlgorithms }},
  21658. attributes [0] Attributes{{ CRIAttributes }}
  21659. }
  21660. Attributes { ATTRIBUTE:IOSet } ::= Set OF Attr{{ IOSet }}
  21661. Attr { ATTRIBUTE:IOSet } ::= Sequence {
  21662. type ATTRIBUTE.&amp;id({IOSet}),
  21663. values Set SIZE(1..MAX) OF ATTRIBUTE.&amp;Type({IOSet}{\@type})
  21664. }
  21665. </code>
  21666. see <a href="http://www.rsasecurity.com/rsalabs/node.asp?id=2132"/>
  21667. </member>
  21668. <member name="M:Org.BouncyCastle.Pkcs.Pkcs10CertificationRequest.#ctor(System.String,Org.BouncyCastle.Asn1.X509.X509Name,Org.BouncyCastle.Crypto.AsymmetricKeyParameter,Org.BouncyCastle.Asn1.Asn1Set,Org.BouncyCastle.Crypto.AsymmetricKeyParameter)">
  21669. <summary>
  21670. Instantiate a Pkcs10CertificationRequest object with the necessary credentials.
  21671. </summary>
  21672. <param name="signatureAlgorithm">Name of Sig Alg.</param>
  21673. <param name="subject">X509Name of subject eg OU="My unit." O="My Organisatioin" C="au" </param>
  21674. <param name="publicKey">Public Key to be included in cert reqest.</param>
  21675. <param name="attributes">ASN1Set of Attributes.</param>
  21676. <param name="signingKey">Matching Private key for nominated (above) public key to be used to sign the request.</param>
  21677. </member>
  21678. <member name="M:Org.BouncyCastle.Pkcs.Pkcs10CertificationRequest.#ctor(Org.BouncyCastle.Crypto.ISignatureFactory,Org.BouncyCastle.Asn1.X509.X509Name,Org.BouncyCastle.Crypto.AsymmetricKeyParameter,Org.BouncyCastle.Asn1.Asn1Set,Org.BouncyCastle.Crypto.AsymmetricKeyParameter)">
  21679. <summary>
  21680. Instantiate a Pkcs10CertificationRequest object with the necessary credentials.
  21681. </summary>
  21682. <param name="signatureFactory">The factory for signature calculators to sign the PKCS#10 request with.</param>
  21683. <param name="subject">X509Name of subject eg OU="My unit." O="My Organisatioin" C="au" </param>
  21684. <param name="publicKey">Public Key to be included in cert reqest.</param>
  21685. <param name="attributes">ASN1Set of Attributes.</param>
  21686. <param name="signingKey">Ignored.</param>
  21687. </member>
  21688. <member name="M:Org.BouncyCastle.Pkcs.Pkcs10CertificationRequest.#ctor(Org.BouncyCastle.Crypto.ISignatureFactory,Org.BouncyCastle.Asn1.X509.X509Name,Org.BouncyCastle.Crypto.AsymmetricKeyParameter,Org.BouncyCastle.Asn1.Asn1Set)">
  21689. <summary>
  21690. Instantiate a Pkcs10CertificationRequest object with the necessary credentials.
  21691. </summary>
  21692. <param name="signatureFactory">The factory for signature calculators to sign the PKCS#10 request with.</param>
  21693. <param name="subject">X509Name of subject eg OU="My unit." O="My Organisatioin" C="au" </param>
  21694. <param name="publicKey">Public Key to be included in cert reqest.</param>
  21695. <param name="attributes">ASN1Set of Attributes.</param>
  21696. </member>
  21697. <member name="M:Org.BouncyCastle.Pkcs.Pkcs10CertificationRequest.GetPublicKey">
  21698. <summary>
  21699. Get the public key.
  21700. </summary>
  21701. <returns>The public key.</returns>
  21702. </member>
  21703. <member name="M:Org.BouncyCastle.Pkcs.Pkcs10CertificationRequest.Verify">
  21704. <summary>
  21705. Verify Pkcs10 Cert Request is valid.
  21706. </summary>
  21707. <returns>true = valid.</returns>
  21708. </member>
  21709. <member name="M:Org.BouncyCastle.Pkcs.Pkcs10CertificationRequest.GetRequestedExtensions">
  21710. <summary>
  21711. Returns X509Extensions if the Extensions Request attribute can be found and returns the extensions block.
  21712. </summary>
  21713. <returns>X509Extensions block or null if one cannot be found.</returns>
  21714. </member>
  21715. <member name="T:Org.BouncyCastle.Pkcs.Pkcs10CertificationRequestDelaySigned">
  21716. <remarks>
  21717. A class for creating and verifying Pkcs10 Certification requests (this is an extension on <see cref="T:Org.BouncyCastle.Pkcs.Pkcs10CertificationRequest"/>).
  21718. The requests are made using delay signing. This is useful for situations where
  21719. the private key is in another environment and not directly accessible (e.g. HSM)
  21720. So the first step creates the request, then the signing is done outside this
  21721. object and the signature is then used to complete the request.
  21722. </remarks>
  21723. <code>
  21724. CertificationRequest ::= Sequence {
  21725. certificationRequestInfo CertificationRequestInfo,
  21726. signatureAlgorithm AlgorithmIdentifier{{ SignatureAlgorithms }},
  21727. signature BIT STRING
  21728. }
  21729. CertificationRequestInfo ::= Sequence {
  21730. version Integer { v1(0) } (v1,...),
  21731. subject Name,
  21732. subjectPKInfo SubjectPublicKeyInfo{{ PKInfoAlgorithms }},
  21733. attributes [0] Attributes{{ CRIAttributes }}
  21734. }
  21735. Attributes { ATTRIBUTE:IOSet } ::= Set OF Attr{{ IOSet }}
  21736. Attr { ATTRIBUTE:IOSet } ::= Sequence {
  21737. type ATTRIBUTE.&amp;id({IOSet}),
  21738. values Set SIZE(1..MAX) OF ATTRIBUTE.&amp;Type({IOSet}{\@type})
  21739. }
  21740. </code>
  21741. see <a href="http://www.rsasecurity.com/rsalabs/node.asp?id=2132"/>
  21742. </member>
  21743. <member name="M:Org.BouncyCastle.Pkcs.Pkcs10CertificationRequestDelaySigned.#ctor(System.String,Org.BouncyCastle.Asn1.X509.X509Name,Org.BouncyCastle.Crypto.AsymmetricKeyParameter,Org.BouncyCastle.Asn1.Asn1Set)">
  21744. <summary>
  21745. Instantiate a Pkcs10CertificationRequest object with the necessary credentials.
  21746. </summary>
  21747. <param name="signatureAlgorithm">Name of Sig Alg.</param>
  21748. <param name="subject">X509Name of subject eg OU="My unit." O="My Organisatioin" C="au" </param>
  21749. <param name="publicKey">Public Key to be included in cert reqest.</param>
  21750. <param name="attributes">ASN1Set of Attributes.</param>
  21751. <remarks>
  21752. After the object is constructed use the <see cref="M:Org.BouncyCastle.Pkcs.Pkcs10CertificationRequestDelaySigned.GetDataToSign"/> and finally the
  21753. SignRequest methods to finalize the request.
  21754. </remarks>
  21755. </member>
  21756. <member name="M:Org.BouncyCastle.Pkcs.Pkcs12Store.GetCertificate(System.String)">
  21757. simply return the cert entry for the private key
  21758. </member>
  21759. <member name="T:Org.BouncyCastle.Pkcs.Pkcs12Utilities">
  21760. Utility class for reencoding PKCS#12 files to definite length.
  21761. </member>
  21762. <member name="M:Org.BouncyCastle.Pkcs.Pkcs12Utilities.ConvertToDefiniteLength(System.Byte[])">
  21763. Just re-encode the outer layer of the PKCS#12 file to definite length encoding.
  21764. @param berPKCS12File - original PKCS#12 file
  21765. @return a byte array representing the DER encoding of the PFX structure
  21766. @throws IOException
  21767. </member>
  21768. <member name="M:Org.BouncyCastle.Pkcs.Pkcs12Utilities.ConvertToDefiniteLength(System.Byte[],System.Char[])">
  21769. Re-encode the PKCS#12 structure to definite length encoding at the inner layer
  21770. as well, recomputing the MAC accordingly.
  21771. @param berPKCS12File - original PKCS12 file.
  21772. @param provider - provider to use for MAC calculation.
  21773. @return a byte array representing the DER encoding of the PFX structure.
  21774. @throws IOException on parsing, encoding errors.
  21775. </member>
  21776. <member name="T:Org.BouncyCastle.Pkcs.Pkcs8EncryptedPrivateKeyInfo">
  21777. <summary>
  21778. A holding class for a PKCS#8 encrypted private key info object that allows for its decryption.
  21779. </summary>
  21780. </member>
  21781. <member name="M:Org.BouncyCastle.Pkcs.Pkcs8EncryptedPrivateKeyInfo.#ctor(Org.BouncyCastle.Asn1.Pkcs.EncryptedPrivateKeyInfo)">
  21782. <summary>
  21783. Base constructor from a PKCS#8 EncryptedPrivateKeyInfo object.
  21784. </summary>
  21785. <param name="encryptedPrivateKeyInfo">A PKCS#8 EncryptedPrivateKeyInfo object.</param>
  21786. </member>
  21787. <member name="M:Org.BouncyCastle.Pkcs.Pkcs8EncryptedPrivateKeyInfo.#ctor(System.Byte[])">
  21788. <summary>
  21789. Base constructor from a BER encoding of a PKCS#8 EncryptedPrivateKeyInfo object.
  21790. </summary>
  21791. <param name="encryptedPrivateKeyInfo">A BER encoding of a PKCS#8 EncryptedPrivateKeyInfo objects.</param>
  21792. </member>
  21793. <member name="M:Org.BouncyCastle.Pkcs.Pkcs8EncryptedPrivateKeyInfo.ToAsn1Structure">
  21794. <summary>
  21795. Returns the underlying ASN.1 structure inside this object.
  21796. </summary>
  21797. <returns>Return the EncryptedPrivateKeyInfo structure in this object.</returns>
  21798. </member>
  21799. <member name="M:Org.BouncyCastle.Pkcs.Pkcs8EncryptedPrivateKeyInfo.GetEncryptedData">
  21800. <summary>
  21801. Returns a copy of the encrypted data in this structure.
  21802. </summary>
  21803. <returns>Return a copy of the encrypted data in this object.</returns>
  21804. </member>
  21805. <member name="M:Org.BouncyCastle.Pkcs.Pkcs8EncryptedPrivateKeyInfo.GetEncoded">
  21806. <summary>
  21807. Return a binary ASN.1 encoding of the EncryptedPrivateKeyInfo structure in this object.
  21808. </summary>
  21809. <returns>A byte array containing the encoded object.</returns>
  21810. </member>
  21811. <member name="M:Org.BouncyCastle.Pkcs.Pkcs8EncryptedPrivateKeyInfo.DecryptPrivateKeyInfo(Org.BouncyCastle.Crypto.IDecryptorBuilderProvider)">
  21812. <summary>
  21813. Get a decryptor from the passed in provider and decrypt the encrypted private key info, returning the result.
  21814. </summary>
  21815. <param name="inputDecryptorProvider">A provider to query for decryptors for the object.</param>
  21816. <returns>The decrypted private key info structure.</returns>
  21817. </member>
  21818. <member name="M:Org.BouncyCastle.Pkcs.Pkcs8EncryptedPrivateKeyInfoBuilder.Build(Org.BouncyCastle.Crypto.ICipherBuilder)">
  21819. <summary>
  21820. Create the encrypted private key info using the passed in encryptor.
  21821. </summary>
  21822. <param name="encryptor">The encryptor to use.</param>
  21823. <returns>An encrypted private key info containing the original private key info.</returns>
  21824. </member>
  21825. <member name="T:Org.BouncyCastle.Pkcs.PkcsException">
  21826. <summary>
  21827. Base exception for PKCS related issues.
  21828. </summary>
  21829. </member>
  21830. <member name="T:Org.BouncyCastle.Pkcs.PkcsIOException">
  21831. <summary>
  21832. Base exception for parsing related issues in the PKCS namespace.
  21833. </summary>
  21834. </member>
  21835. <member name="M:Org.BouncyCastle.Pkcs.PrivateKeyInfoFactory.CreatePrivateKeyInfo(Org.BouncyCastle.Crypto.AsymmetricKeyParameter,Org.BouncyCastle.Asn1.Asn1Set)">
  21836. Create a PrivateKeyInfo representation of a private key with attributes.
  21837. @param privateKey the key to be encoded into the info object.
  21838. @param attributes the set of attributes to be included.
  21839. @return the appropriate PrivateKeyInfo
  21840. @throws java.io.IOException on an error encoding the key
  21841. </member>
  21842. <member name="P:Org.BouncyCastle.Pkix.CertStatus.RevocationDate">
  21843. <summary>
  21844. Returns the revocationDate.
  21845. </summary>
  21846. </member>
  21847. <member name="P:Org.BouncyCastle.Pkix.CertStatus.Status">
  21848. <summary>
  21849. Returns the certStatus.
  21850. </summary>
  21851. </member>
  21852. <member name="M:Org.BouncyCastle.Pkix.PkixAttrCertChecker.GetSupportedExtensions">
  21853. Returns an immutable <code>Set</code> of X.509 attribute certificate
  21854. extensions that this <code>PkixAttrCertChecker</code> supports or
  21855. <code>null</code> if no extensions are supported.
  21856. <p>
  21857. Each element of the set is a <code>String</code> representing the
  21858. Object Identifier (OID) of the X.509 extension that is supported.
  21859. </p>
  21860. <p>
  21861. All X.509 attribute certificate extensions that a
  21862. <code>PkixAttrCertChecker</code> might possibly be able to process
  21863. should be included in the set.
  21864. </p>
  21865. @return an immutable <code>Set</code> of X.509 extension OIDs (in
  21866. <code>String</code> format) supported by this
  21867. <code>PkixAttrCertChecker</code>, or <code>null</code> if no
  21868. extensions are supported
  21869. </member>
  21870. <member name="M:Org.BouncyCastle.Pkix.PkixAttrCertChecker.Check(Org.BouncyCastle.X509.IX509AttributeCertificate,Org.BouncyCastle.Pkix.PkixCertPath,Org.BouncyCastle.Pkix.PkixCertPath,System.Collections.ICollection)">
  21871. Performs checks on the specified attribute certificate. Every handled
  21872. extension is rmeoved from the <code>unresolvedCritExts</code>
  21873. collection.
  21874. @param attrCert The attribute certificate to be checked.
  21875. @param certPath The certificate path which belongs to the attribute
  21876. certificate issuer public key certificate.
  21877. @param holderCertPath The certificate path which belongs to the holder
  21878. certificate.
  21879. @param unresolvedCritExts a <code>Collection</code> of OID strings
  21880. representing the current set of unresolved critical extensions
  21881. @throws CertPathValidatorException if the specified attribute certificate
  21882. does not pass the check.
  21883. </member>
  21884. <member name="M:Org.BouncyCastle.Pkix.PkixAttrCertChecker.Clone">
  21885. Returns a clone of this object.
  21886. @return a copy of this <code>PkixAttrCertChecker</code>
  21887. </member>
  21888. <member name="M:Org.BouncyCastle.Pkix.PkixAttrCertPathBuilder.Build(Org.BouncyCastle.Pkix.PkixBuilderParameters)">
  21889. Build and validate a CertPath using the given parameter.
  21890. @param params PKIXBuilderParameters object containing all information to
  21891. build the CertPath
  21892. </member>
  21893. <member name="T:Org.BouncyCastle.Pkix.PkixAttrCertPathValidator">
  21894. CertPathValidatorSpi implementation for X.509 Attribute Certificates la RFC 3281.
  21895. @see org.bouncycastle.x509.ExtendedPkixParameters
  21896. </member>
  21897. <member name="M:Org.BouncyCastle.Pkix.PkixAttrCertPathValidator.Validate(Org.BouncyCastle.Pkix.PkixCertPath,Org.BouncyCastle.Pkix.PkixParameters)">
  21898. Validates an attribute certificate with the given certificate path.
  21899. <p>
  21900. <code>params</code> must be an instance of
  21901. <code>ExtendedPkixParameters</code>.
  21902. </p><p>
  21903. The target constraints in the <code>params</code> must be an
  21904. <code>X509AttrCertStoreSelector</code> with at least the attribute
  21905. certificate criterion set. Obey that also target informations may be
  21906. necessary to correctly validate this attribute certificate.
  21907. </p><p>
  21908. The attribute certificate issuer must be added to the trusted attribute
  21909. issuers with {@link ExtendedPkixParameters#setTrustedACIssuers(Set)}.
  21910. </p>
  21911. @param certPath The certificate path which belongs to the attribute
  21912. certificate issuer public key certificate.
  21913. @param params The PKIX parameters.
  21914. @return A <code>PKIXCertPathValidatorResult</code> of the result of
  21915. validating the <code>certPath</code>.
  21916. @throws InvalidAlgorithmParameterException if <code>params</code> is
  21917. inappropriate for this validator.
  21918. @throws CertPathValidatorException if the verification fails.
  21919. </member>
  21920. <member name="T:Org.BouncyCastle.Pkix.PkixBuilderParameters">
  21921. <summary>
  21922. Summary description for PkixBuilderParameters.
  21923. </summary>
  21924. </member>
  21925. <member name="M:Org.BouncyCastle.Pkix.PkixBuilderParameters.GetInstance(Org.BouncyCastle.Pkix.PkixParameters)">
  21926. Returns an instance of <code>PkixBuilderParameters</code>.
  21927. <p>
  21928. This method can be used to get a copy from other
  21929. <code>PKIXBuilderParameters</code>, <code>PKIXParameters</code>,
  21930. and <code>ExtendedPKIXParameters</code> instances.
  21931. </p>
  21932. @param pkixParams The PKIX parameters to create a copy of.
  21933. @return An <code>PkixBuilderParameters</code> instance.
  21934. </member>
  21935. <member name="M:Org.BouncyCastle.Pkix.PkixBuilderParameters.GetExcludedCerts">
  21936. <summary>
  21937. Excluded certificates are not used for building a certification path.
  21938. </summary>
  21939. <returns>the excluded certificates.</returns>
  21940. </member>
  21941. <member name="M:Org.BouncyCastle.Pkix.PkixBuilderParameters.SetExcludedCerts(Org.BouncyCastle.Utilities.Collections.ISet)">
  21942. <summary>
  21943. Sets the excluded certificates which are not used for building a
  21944. certification path. If the <code>ISet</code> is <code>null</code> an
  21945. empty set is assumed.
  21946. </summary>
  21947. <remarks>
  21948. The given set is cloned to protect it against subsequent modifications.
  21949. </remarks>
  21950. <param name="excludedCerts">The excluded certificates to set.</param>
  21951. </member>
  21952. <member name="M:Org.BouncyCastle.Pkix.PkixBuilderParameters.SetParams(Org.BouncyCastle.Pkix.PkixParameters)">
  21953. Can alse handle <code>ExtendedPKIXBuilderParameters</code> and
  21954. <code>PKIXBuilderParameters</code>.
  21955. @param params Parameters to set.
  21956. @see org.bouncycastle.x509.ExtendedPKIXParameters#setParams(java.security.cert.PKIXParameters)
  21957. </member>
  21958. <member name="M:Org.BouncyCastle.Pkix.PkixBuilderParameters.Clone">
  21959. Makes a copy of this <code>PKIXParameters</code> object. Changes to the
  21960. copy will not affect the original and vice versa.
  21961. @return a copy of this <code>PKIXParameters</code> object
  21962. </member>
  21963. <member name="T:Org.BouncyCastle.Pkix.PkixCertPath">
  21964. An immutable sequence of certificates (a certification path).<br />
  21965. <br />
  21966. This is an abstract class that defines the methods common to all CertPaths.
  21967. Subclasses can handle different kinds of certificates (X.509, PGP, etc.).<br />
  21968. <br />
  21969. All CertPath objects have a type, a list of Certificates, and one or more
  21970. supported encodings. Because the CertPath class is immutable, a CertPath
  21971. cannot change in any externally visible way after being constructed. This
  21972. stipulation applies to all public fields and methods of this class and any
  21973. added or overridden by subclasses.<br />
  21974. <br />
  21975. The type is a string that identifies the type of Certificates in the
  21976. certification path. For each certificate cert in a certification path
  21977. certPath, cert.getType().equals(certPath.getType()) must be true.<br />
  21978. <br />
  21979. The list of Certificates is an ordered List of zero or more Certificates.
  21980. This List and all of the Certificates contained in it must be immutable.<br />
  21981. <br />
  21982. Each CertPath object must support one or more encodings so that the object
  21983. can be translated into a byte array for storage or transmission to other
  21984. parties. Preferably, these encodings should be well-documented standards
  21985. (such as PKCS#7). One of the encodings supported by a CertPath is considered
  21986. the default encoding. This encoding is used if no encoding is explicitly
  21987. requested (for the {@link #getEncoded()} method, for instance).<br />
  21988. <br />
  21989. All CertPath objects are also Serializable. CertPath objects are resolved
  21990. into an alternate {@link CertPathRep} object during serialization. This
  21991. allows a CertPath object to be serialized into an equivalent representation
  21992. regardless of its underlying implementation.<br />
  21993. <br />
  21994. CertPath objects can be created with a CertificateFactory or they can be
  21995. returned by other classes, such as a CertPathBuilder.<br />
  21996. <br />
  21997. By convention, X.509 CertPaths (consisting of X509Certificates), are ordered
  21998. starting with the target certificate and ending with a certificate issued by
  21999. the trust anchor. That is, the issuer of one certificate is the subject of
  22000. the following one. The certificate representing the
  22001. {@link TrustAnchor TrustAnchor} should not be included in the certification
  22002. path. Unvalidated X.509 CertPaths may not follow these conventions. PKIX
  22003. CertPathValidators will detect any departure from these conventions that
  22004. cause the certification path to be invalid and throw a
  22005. CertPathValidatorException.<br />
  22006. <br />
  22007. <strong>Concurrent Access</strong><br />
  22008. <br />
  22009. All CertPath objects must be thread-safe. That is, multiple threads may
  22010. concurrently invoke the methods defined in this class on a single CertPath
  22011. object (or more than one) with no ill effects. This is also true for the List
  22012. returned by CertPath.getCertificates.<br />
  22013. <br />
  22014. Requiring CertPath objects to be immutable and thread-safe allows them to be
  22015. passed around to various pieces of code without worrying about coordinating
  22016. access. Providing this thread-safety is generally not difficult, since the
  22017. CertPath and List objects in question are immutable.
  22018. @see CertificateFactory
  22019. @see CertPathBuilder
  22020. <summary>
  22021. CertPath implementation for X.509 certificates.
  22022. </summary>
  22023. </member>
  22024. <member name="M:Org.BouncyCastle.Pkix.PkixCertPath.SortCerts(System.Collections.IList)">
  22025. @param certs
  22026. </member>
  22027. <member name="M:Org.BouncyCastle.Pkix.PkixCertPath.#ctor(System.Collections.ICollection)">
  22028. Creates a CertPath of the specified type.
  22029. This constructor is protected because most users should use
  22030. a CertificateFactory to create CertPaths.
  22031. @param type the standard name of the type of Certificatesin this path
  22032. </member>
  22033. <member name="M:Org.BouncyCastle.Pkix.PkixCertPath.#ctor(System.IO.Stream,System.String)">
  22034. Creates a CertPath of the specified type.
  22035. This constructor is protected because most users should use
  22036. a CertificateFactory to create CertPaths.
  22037. @param type the standard name of the type of Certificatesin this path
  22038. </member>
  22039. <member name="P:Org.BouncyCastle.Pkix.PkixCertPath.Encodings">
  22040. Returns an iteration of the encodings supported by this
  22041. certification path, with the default encoding
  22042. first. Attempts to modify the returned Iterator via its
  22043. remove method result in an UnsupportedOperationException.
  22044. @return an Iterator over the names of the supported encodings (as Strings)
  22045. </member>
  22046. <member name="M:Org.BouncyCastle.Pkix.PkixCertPath.Equals(System.Object)">
  22047. Compares this certification path for equality with the specified object.
  22048. Two CertPaths are equal if and only if their types are equal and their
  22049. certificate Lists (and by implication the Certificates in those Lists)
  22050. are equal. A CertPath is never equal to an object that is not a CertPath.<br />
  22051. <br />
  22052. This algorithm is implemented by this method. If it is overridden, the
  22053. behavior specified here must be maintained.
  22054. @param other
  22055. the object to test for equality with this certification path
  22056. @return true if the specified object is equal to this certification path,
  22057. false otherwise
  22058. @see Object#hashCode() Object.hashCode()
  22059. </member>
  22060. <member name="M:Org.BouncyCastle.Pkix.PkixCertPath.GetEncoded">
  22061. Returns the encoded form of this certification path, using
  22062. the default encoding.
  22063. @return the encoded bytes
  22064. @exception CertificateEncodingException if an encoding error occurs
  22065. </member>
  22066. <member name="M:Org.BouncyCastle.Pkix.PkixCertPath.GetEncoded(System.String)">
  22067. Returns the encoded form of this certification path, using
  22068. the specified encoding.
  22069. @param encoding the name of the encoding to use
  22070. @return the encoded bytes
  22071. @exception CertificateEncodingException if an encoding error
  22072. occurs or the encoding requested is not supported
  22073. </member>
  22074. <member name="P:Org.BouncyCastle.Pkix.PkixCertPath.Certificates">
  22075. <summary>
  22076. Returns the list of certificates in this certification
  22077. path.
  22078. </summary>
  22079. </member>
  22080. <member name="M:Org.BouncyCastle.Pkix.PkixCertPath.ToAsn1Object(Org.BouncyCastle.X509.X509Certificate)">
  22081. Return a DERObject containing the encoded certificate.
  22082. @param cert the X509Certificate object to be encoded
  22083. @return the DERObject
  22084. </member>
  22085. <member name="T:Org.BouncyCastle.Pkix.PkixCertPathBuilder">
  22086. Implements the PKIX CertPathBuilding algorithm for BouncyCastle.
  22087. @see CertPathBuilderSpi
  22088. </member>
  22089. <member name="M:Org.BouncyCastle.Pkix.PkixCertPathBuilder.Build(Org.BouncyCastle.Pkix.PkixBuilderParameters)">
  22090. Build and validate a CertPath using the given parameter.
  22091. @param params PKIXBuilderParameters object containing all information to
  22092. build the CertPath
  22093. </member>
  22094. <member name="T:Org.BouncyCastle.Pkix.PkixCertPathBuilderException">
  22095. <summary>
  22096. Summary description for PkixCertPathBuilderException.
  22097. </summary>
  22098. </member>
  22099. <member name="T:Org.BouncyCastle.Pkix.PkixCertPathBuilderResult">
  22100. <summary>
  22101. Summary description for PkixCertPathBuilderResult.
  22102. </summary>
  22103. </member>
  22104. <member name="M:Org.BouncyCastle.Pkix.PkixCertPathChecker.Init(System.Boolean)">
  22105. * Initializes the internal state of this <code>PKIXCertPathChecker</code>.
  22106. * <p>
  22107. * The <code>forward</code> flag specifies the order that certificates
  22108. * will be passed to the {@link #check check} method (forward or reverse). A
  22109. * <code>PKIXCertPathChecker</code> <b>must</b> support reverse checking
  22110. * and <b>may</b> support forward checking.
  22111. * </p>
  22112. *
  22113. * @param forward
  22114. * the order that certificates are presented to the
  22115. * <code>check</code> method. If <code>true</code>,
  22116. * certificates are presented from target to most-trusted CA
  22117. * (forward); if <code>false</code>, from most-trusted CA to
  22118. * target (reverse).
  22119. * @exception CertPathValidatorException
  22120. * if this <code>PKIXCertPathChecker</code> is unable to
  22121. * check certificates in the specified order; it should never
  22122. * be thrown if the forward flag is false since reverse
  22123. * checking must be supported
  22124. </member>
  22125. <member name="M:Org.BouncyCastle.Pkix.PkixCertPathChecker.IsForwardCheckingSupported">
  22126. Indicates if forward checking is supported. Forward checking refers to
  22127. the ability of the <code>PKIXCertPathChecker</code> to perform its
  22128. checks when certificates are presented to the <code>check</code> method
  22129. in the forward direction (from target to most-trusted CA).
  22130. @return <code>true</code> if forward checking is supported,
  22131. <code>false</code> otherwise
  22132. </member>
  22133. <member name="M:Org.BouncyCastle.Pkix.PkixCertPathChecker.GetSupportedExtensions">
  22134. * Returns an immutable <code>Set</code> of X.509 certificate extensions
  22135. * that this <code>PKIXCertPathChecker</code> supports (i.e. recognizes,
  22136. * is able to process), or <code>null</code> if no extensions are
  22137. * supported.
  22138. * <p>
  22139. * Each element of the set is a <code>String</code> representing the
  22140. * Object Identifier (OID) of the X.509 extension that is supported. The OID
  22141. * is represented by a set of nonnegative integers separated by periods.
  22142. * </p><p>
  22143. * All X.509 certificate extensions that a <code>PKIXCertPathChecker</code>
  22144. * might possibly be able to process should be included in the set.
  22145. * </p>
  22146. *
  22147. * @return an immutable <code>Set</code> of X.509 extension OIDs (in
  22148. * <code>String</code> format) supported by this
  22149. * <code>PKIXCertPathChecker</code>, or <code>null</code> if no
  22150. * extensions are supported
  22151. </member>
  22152. <member name="M:Org.BouncyCastle.Pkix.PkixCertPathChecker.Check(Org.BouncyCastle.X509.X509Certificate,Org.BouncyCastle.Utilities.Collections.ISet)">
  22153. Performs the check(s) on the specified certificate using its internal
  22154. state and removes any critical extensions that it processes from the
  22155. specified collection of OID strings that represent the unresolved
  22156. critical extensions. The certificates are presented in the order
  22157. specified by the <code>init</code> method.
  22158. @param cert
  22159. the <code>Certificate</code> to be checked
  22160. @param unresolvedCritExts
  22161. a <code>Collection</code> of OID strings representing the
  22162. current set of unresolved critical extensions
  22163. @exception CertPathValidatorException
  22164. if the specified certificate does not pass the check
  22165. </member>
  22166. <member name="M:Org.BouncyCastle.Pkix.PkixCertPathChecker.Clone">
  22167. Returns a clone of this object. Calls the <code>Object.clone()</code>
  22168. method. All subclasses which maintain state must support and override
  22169. this method, if necessary.
  22170. @return a copy of this <code>PKIXCertPathChecker</code>
  22171. </member>
  22172. <member name="T:Org.BouncyCastle.Pkix.PkixCertPathValidator">
  22173. The <i>Service Provider Interface</i> (<b>SPI</b>)
  22174. for the {@link CertPathValidator CertPathValidator} class. All
  22175. <code>CertPathValidator</code> implementations must include a class (the
  22176. SPI class) that extends this class (<code>CertPathValidatorSpi</code>)
  22177. and implements all of its methods. In general, instances of this class
  22178. should only be accessed through the <code>CertPathValidator</code> class.
  22179. For details, see the Java Cryptography Architecture.<br />
  22180. <br />
  22181. <b>Concurrent Access</b><br />
  22182. <br />
  22183. Instances of this class need not be protected against concurrent
  22184. access from multiple threads. Threads that need to access a single
  22185. <code>CertPathValidatorSpi</code> instance concurrently should synchronize
  22186. amongst themselves and provide the necessary locking before calling the
  22187. wrapping <code>CertPathValidator</code> object.<br />
  22188. <br />
  22189. However, implementations of <code>CertPathValidatorSpi</code> may still
  22190. encounter concurrency issues, since multiple threads each
  22191. manipulating a different <code>CertPathValidatorSpi</code> instance need not
  22192. synchronize.
  22193. <summary>
  22194. CertPathValidatorSpi implementation for X.509 Certificate validation a la RFC
  22195. 3280.
  22196. </summary>
  22197. </member>
  22198. <member name="T:Org.BouncyCastle.Pkix.PkixCertPathValidatorException">
  22199. An exception indicating one of a variety of problems encountered when
  22200. validating a certification path. <br />
  22201. <br />
  22202. A <code>CertPathValidatorException</code> provides support for wrapping
  22203. exceptions. The {@link #getCause getCause} method returns the throwable,
  22204. if any, that caused this exception to be thrown. <br />
  22205. <br />
  22206. A <code>CertPathValidatorException</code> may also include the
  22207. certification path that was being validated when the exception was thrown
  22208. and the index of the certificate in the certification path that caused the
  22209. exception to be thrown. Use the {@link #getCertPath getCertPath} and
  22210. {@link #getIndex getIndex} methods to retrieve this information.<br />
  22211. <br />
  22212. <b>Concurrent Access</b><br />
  22213. <br />
  22214. Unless otherwise specified, the methods defined in this class are not
  22215. thread-safe. Multiple threads that need to access a single
  22216. object concurrently should synchronize amongst themselves and
  22217. provide the necessary locking. Multiple threads each manipulating
  22218. separate objects need not synchronize.
  22219. @see CertPathValidator
  22220. </member>
  22221. <member name="M:Org.BouncyCastle.Pkix.PkixCertPathValidatorException.#ctor(System.String)">
  22222. <summary>
  22223. Creates a <code>PkixCertPathValidatorException</code> with the given detail
  22224. message. A detail message is a <code>String</code> that describes this
  22225. particular exception.
  22226. </summary>
  22227. <param name="message">the detail message</param>
  22228. </member>
  22229. <member name="M:Org.BouncyCastle.Pkix.PkixCertPathValidatorException.#ctor(System.String,System.Exception)">
  22230. <summary>
  22231. Creates a <code>PkixCertPathValidatorException</code> with the specified
  22232. detail message and cause.
  22233. </summary>
  22234. <param name="message">the detail message</param>
  22235. <param name="cause">the cause (which is saved for later retrieval by the
  22236. {@link #getCause getCause()} method). (A <code>null</code>
  22237. value is permitted, and indicates that the cause is
  22238. nonexistent or unknown.)</param>
  22239. </member>
  22240. <member name="M:Org.BouncyCastle.Pkix.PkixCertPathValidatorException.#ctor(System.String,System.Exception,Org.BouncyCastle.Pkix.PkixCertPath,System.Int32)">
  22241. <summary>
  22242. Creates a <code>PkixCertPathValidatorException</code> with the specified
  22243. detail message, cause, certification path, and index.
  22244. </summary>
  22245. <param name="message">the detail message (or <code>null</code> if none)</param>
  22246. <param name="cause">the cause (or <code>null</code> if none)</param>
  22247. <param name="certPath">the certification path that was in the process of being
  22248. validated when the error was encountered</param>
  22249. <param name="index">the index of the certificate in the certification path that</param> *
  22250. </member>
  22251. <member name="P:Org.BouncyCastle.Pkix.PkixCertPathValidatorException.Message">
  22252. <summary>
  22253. Returns the detail message for this <code>CertPathValidatorException</code>.
  22254. </summary>
  22255. <returns>the detail message, or <code>null</code> if neither the message nor cause were specified</returns>
  22256. </member>
  22257. <member name="P:Org.BouncyCastle.Pkix.PkixCertPathValidatorException.CertPath">
  22258. Returns the certification path that was being validated when the
  22259. exception was thrown.
  22260. @return the <code>CertPath</code> that was being validated when the
  22261. exception was thrown (or <code>null</code> if not specified)
  22262. </member>
  22263. <member name="P:Org.BouncyCastle.Pkix.PkixCertPathValidatorException.Index">
  22264. Returns the index of the certificate in the certification path that
  22265. caused the exception to be thrown. Note that the list of certificates in
  22266. a <code>CertPath</code> is zero based. If no index has been set, -1 is
  22267. returned.
  22268. @return the index that has been set, or -1 if none has been set
  22269. </member>
  22270. <member name="T:Org.BouncyCastle.Pkix.PkixCertPathValidatorResult">
  22271. <summary>
  22272. Summary description for PkixCertPathValidatorResult.
  22273. </summary>
  22274. </member>
  22275. <member name="T:Org.BouncyCastle.Pkix.PkixCertPathValidatorUtilities">
  22276. <summary>
  22277. Summary description for PkixCertPathValidatorUtilities.
  22278. </summary>
  22279. </member>
  22280. <member name="F:Org.BouncyCastle.Pkix.PkixCertPathValidatorUtilities.KEY_CERT_SIGN">
  22281. <summary>
  22282. key usage bits
  22283. </summary>
  22284. </member>
  22285. <member name="M:Org.BouncyCastle.Pkix.PkixCertPathValidatorUtilities.FindTrustAnchor(Org.BouncyCastle.X509.X509Certificate,Org.BouncyCastle.Utilities.Collections.ISet)">
  22286. <summary>
  22287. Search the given Set of TrustAnchor's for one that is the
  22288. issuer of the given X509 certificate.
  22289. </summary>
  22290. <param name="cert">the X509 certificate</param>
  22291. <param name="trustAnchors">a Set of TrustAnchor's</param>
  22292. <returns>the <code>TrustAnchor</code> object if found or
  22293. <code>null</code> if not.
  22294. </returns>
  22295. @exception
  22296. </member>
  22297. <member name="M:Org.BouncyCastle.Pkix.PkixCertPathValidatorUtilities.GetIssuerPrincipal(System.Object)">
  22298. <summary>
  22299. Returns the issuer of an attribute certificate or certificate.
  22300. </summary>
  22301. <param name="cert">The attribute certificate or certificate.</param>
  22302. <returns>The issuer as <code>X500Principal</code>.</returns>
  22303. </member>
  22304. <member name="M:Org.BouncyCastle.Pkix.PkixCertPathValidatorUtilities.GetNextWorkingKey(System.Collections.IList,System.Int32)">
  22305. Return the next working key inheriting DSA parameters if necessary.
  22306. <p>
  22307. This methods inherits DSA parameters from the indexed certificate or
  22308. previous certificates in the certificate chain to the returned
  22309. <code>PublicKey</code>. The list is searched upwards, meaning the end
  22310. certificate is at position 0 and previous certificates are following.
  22311. </p>
  22312. <p>
  22313. If the indexed certificate does not contain a DSA key this method simply
  22314. returns the public key. If the DSA key already contains DSA parameters
  22315. the key is also only returned.
  22316. </p>
  22317. @param certs The certification path.
  22318. @param index The index of the certificate which contains the public key
  22319. which should be extended with DSA parameters.
  22320. @return The public key of the certificate in list position
  22321. <code>index</code> extended with DSA parameters if applicable.
  22322. @throws Exception if DSA parameters cannot be inherited.
  22323. </member>
  22324. <member name="M:Org.BouncyCastle.Pkix.PkixCertPathValidatorUtilities.FindCertificates(Org.BouncyCastle.X509.Store.X509CertStoreSelector,System.Collections.IList)">
  22325. <summary>
  22326. Return a Collection of all certificates or attribute certificates found
  22327. in the X509Store's that are matching the certSelect criteriums.
  22328. </summary>
  22329. <param name="certSelect">a {@link Selector} object that will be used to select
  22330. the certificates</param>
  22331. <param name="certStores">a List containing only X509Store objects. These
  22332. are used to search for certificates.</param>
  22333. <returns>a Collection of all found <see cref="T:Org.BouncyCastle.X509.X509Certificate"/> or
  22334. <see cref="T:Org.BouncyCastle.X509.IX509AttributeCertificate"/> objects.
  22335. May be empty but never <code>null</code>.</returns>
  22336. <exception cref="T:System.Exception"></exception>
  22337. </member>
  22338. <member name="M:Org.BouncyCastle.Pkix.PkixCertPathValidatorUtilities.GetCrlIssuersFromDistributionPoint(Org.BouncyCastle.Asn1.X509.DistributionPoint,System.Collections.ICollection,Org.BouncyCastle.X509.Store.X509CrlStoreSelector,Org.BouncyCastle.Pkix.PkixParameters)">
  22339. Add the CRL issuers from the cRLIssuer field of the distribution point or
  22340. from the certificate if not given to the issuer criterion of the
  22341. <code>selector</code>.
  22342. <p>
  22343. The <code>issuerPrincipals</code> are a collection with a single
  22344. <code>X500Principal</code> for <code>X509Certificate</code>s. For
  22345. {@link X509AttributeCertificate}s the issuer may contain more than one
  22346. <code>X500Principal</code>.
  22347. </p>
  22348. @param dp The distribution point.
  22349. @param issuerPrincipals The issuers of the certificate or attribute
  22350. certificate which contains the distribution point.
  22351. @param selector The CRL selector.
  22352. @param pkixParams The PKIX parameters containing the cert stores.
  22353. @throws Exception if an exception occurs while processing.
  22354. @throws ClassCastException if <code>issuerPrincipals</code> does not
  22355. contain only <code>X500Principal</code>s.
  22356. </member>
  22357. <member name="M:Org.BouncyCastle.Pkix.PkixCertPathValidatorUtilities.GetCompleteCrls(Org.BouncyCastle.Asn1.X509.DistributionPoint,System.Object,System.DateTime,Org.BouncyCastle.Pkix.PkixParameters)">
  22358. Fetches complete CRLs according to RFC 3280.
  22359. @param dp The distribution point for which the complete CRL
  22360. @param cert The <code>X509Certificate</code> or
  22361. {@link org.bouncycastle.x509.X509AttributeCertificate} for
  22362. which the CRL should be searched.
  22363. @param currentDate The date for which the delta CRLs must be valid.
  22364. @param paramsPKIX The extended PKIX parameters.
  22365. @return A <code>Set</code> of <code>X509CRL</code>s with complete
  22366. CRLs.
  22367. @throws Exception if an exception occurs while picking the CRLs
  22368. or no CRLs are found.
  22369. </member>
  22370. <member name="M:Org.BouncyCastle.Pkix.PkixCertPathValidatorUtilities.GetDeltaCrls(System.DateTime,Org.BouncyCastle.Pkix.PkixParameters,Org.BouncyCastle.X509.X509Crl)">
  22371. Fetches delta CRLs according to RFC 3280 section 5.2.4.
  22372. @param currentDate The date for which the delta CRLs must be valid.
  22373. @param paramsPKIX The extended PKIX parameters.
  22374. @param completeCRL The complete CRL the delta CRL is for.
  22375. @return A <code>Set</code> of <code>X509CRL</code>s with delta CRLs.
  22376. @throws Exception if an exception occurs while picking the delta
  22377. CRLs.
  22378. </member>
  22379. <member name="M:Org.BouncyCastle.Pkix.PkixCertPathValidatorUtilities.FindIssuerCerts(Org.BouncyCastle.X509.X509Certificate,Org.BouncyCastle.Pkix.PkixBuilderParameters)">
  22380. Find the issuer certificates of a given certificate.
  22381. @param cert
  22382. The certificate for which an issuer should be found.
  22383. @param pkixParams
  22384. @return A <code>Collection</code> object containing the issuer
  22385. <code>X509Certificate</code>s. Never <code>null</code>.
  22386. @exception Exception
  22387. if an error occurs.
  22388. </member>
  22389. <member name="M:Org.BouncyCastle.Pkix.PkixCertPathValidatorUtilities.GetExtensionValue(Org.BouncyCastle.X509.IX509Extension,Org.BouncyCastle.Asn1.DerObjectIdentifier)">
  22390. <summary>
  22391. Extract the value of the given extension, if it exists.
  22392. </summary>
  22393. <param name="ext">The extension object.</param>
  22394. <param name="oid">The object identifier to obtain.</param>
  22395. <returns>Asn1Object</returns>
  22396. <exception cref="T:System.Exception">if the extension cannot be read.</exception>
  22397. </member>
  22398. <member name="M:Org.BouncyCastle.Pkix.PkixCrlUtilities.FindCrls(Org.BouncyCastle.X509.Store.X509CrlStoreSelector,System.Collections.IList)">
  22399. <summary>
  22400. crl checking
  22401. Return a Collection of all CRLs found in the X509Store's that are
  22402. matching the crlSelect criteriums.
  22403. </summary>
  22404. <param name="crlSelect">a {@link X509CRLStoreSelector} object that will be used
  22405. to select the CRLs</param>
  22406. <param name="crlStores">a List containing only {@link org.bouncycastle.x509.X509Store
  22407. X509Store} objects. These are used to search for CRLs</param>
  22408. <returns>a Collection of all found {@link X509CRL X509CRL} objects. May be
  22409. empty but never <code>null</code>.
  22410. </returns>
  22411. </member>
  22412. <member name="M:Org.BouncyCastle.Pkix.PkixNameConstraintValidator.IntersectIP(Org.BouncyCastle.Utilities.Collections.ISet,Org.BouncyCastle.Utilities.Collections.ISet)">
  22413. Returns the intersection of the permitted IP ranges in
  22414. <code>permitted</code> with <code>ip</code>.
  22415. @param permitted A <code>Set</code> of permitted IP addresses with
  22416. their subnet mask as byte arrays.
  22417. @param ips The IP address with its subnet mask.
  22418. @return The <code>Set</code> of permitted IP ranges intersected with
  22419. <code>ip</code>.
  22420. </member>
  22421. <member name="M:Org.BouncyCastle.Pkix.PkixNameConstraintValidator.UnionIP(Org.BouncyCastle.Utilities.Collections.ISet,System.Byte[])">
  22422. Returns the union of the excluded IP ranges in <code>excluded</code>
  22423. with <code>ip</code>.
  22424. @param excluded A <code>Set</code> of excluded IP addresses with their
  22425. subnet mask as byte arrays.
  22426. @param ip The IP address with its subnet mask.
  22427. @return The <code>Set</code> of excluded IP ranges unified with
  22428. <code>ip</code> as byte arrays.
  22429. </member>
  22430. <member name="M:Org.BouncyCastle.Pkix.PkixNameConstraintValidator.UnionIPRange(System.Byte[],System.Byte[])">
  22431. Calculates the union if two IP ranges.
  22432. @param ipWithSubmask1 The first IP address with its subnet mask.
  22433. @param ipWithSubmask2 The second IP address with its subnet mask.
  22434. @return A <code>Set</code> with the union of both addresses.
  22435. </member>
  22436. <member name="M:Org.BouncyCastle.Pkix.PkixNameConstraintValidator.IntersectIPRange(System.Byte[],System.Byte[])">
  22437. Calculates the interesction if two IP ranges.
  22438. @param ipWithSubmask1 The first IP address with its subnet mask.
  22439. @param ipWithSubmask2 The second IP address with its subnet mask.
  22440. @return A <code>Set</code> with the single IP address with its subnet
  22441. mask as a byte array or an empty <code>Set</code>.
  22442. </member>
  22443. <member name="M:Org.BouncyCastle.Pkix.PkixNameConstraintValidator.IpWithSubnetMask(System.Byte[],System.Byte[])">
  22444. Concatenates the IP address with its subnet mask.
  22445. @param ip The IP address.
  22446. @param subnetMask Its subnet mask.
  22447. @return The concatenated IP address with its subnet mask.
  22448. </member>
  22449. <member name="M:Org.BouncyCastle.Pkix.PkixNameConstraintValidator.ExtractIPsAndSubnetMasks(System.Byte[],System.Byte[])">
  22450. Splits the IP addresses and their subnet mask.
  22451. @param ipWithSubmask1 The first IP address with the subnet mask.
  22452. @param ipWithSubmask2 The second IP address with the subnet mask.
  22453. @return An array with two elements. Each element contains the IP address
  22454. and the subnet mask in this order.
  22455. </member>
  22456. <member name="M:Org.BouncyCastle.Pkix.PkixNameConstraintValidator.MinMaxIPs(System.Byte[],System.Byte[],System.Byte[],System.Byte[])">
  22457. Based on the two IP addresses and their subnet masks the IP range is
  22458. computed for each IP address - subnet mask pair and returned as the
  22459. minimum IP address and the maximum address of the range.
  22460. @param ip1 The first IP address.
  22461. @param subnetmask1 The subnet mask of the first IP address.
  22462. @param ip2 The second IP address.
  22463. @param subnetmask2 The subnet mask of the second IP address.
  22464. @return A array with two elements. The first/second element contains the
  22465. min and max IP address of the first/second IP address and its
  22466. subnet mask.
  22467. </member>
  22468. <member name="M:Org.BouncyCastle.Pkix.PkixNameConstraintValidator.IsIPConstrained(System.Byte[],System.Byte[])">
  22469. Checks if the IP address <code>ip</code> is constrained by
  22470. <code>constraint</code>.
  22471. @param constraint The constraint. This is an IP address concatenated with
  22472. its subnetmask.
  22473. @param ip The IP address.
  22474. @return <code>true</code> if constrained, <code>false</code>
  22475. otherwise.
  22476. </member>
  22477. <member name="M:Org.BouncyCastle.Pkix.PkixNameConstraintValidator.CheckPermittedIP(Org.BouncyCastle.Utilities.Collections.ISet,System.Byte[])">
  22478. Checks if the IP <code>ip</code> is included in the permitted ISet
  22479. <code>permitted</code>.
  22480. @param permitted A <code>Set</code> of permitted IP addresses with
  22481. their subnet mask as byte arrays.
  22482. @param ip The IP address.
  22483. @throws PkixNameConstraintValidatorException
  22484. if the IP is not permitted.
  22485. </member>
  22486. <member name="M:Org.BouncyCastle.Pkix.PkixNameConstraintValidator.CheckExcludedIP(Org.BouncyCastle.Utilities.Collections.ISet,System.Byte[])">
  22487. Checks if the IP <code>ip</code> is included in the excluded ISet
  22488. <code>excluded</code>.
  22489. @param excluded A <code>Set</code> of excluded IP addresses with their
  22490. subnet mask as byte arrays.
  22491. @param ip The IP address.
  22492. @throws PkixNameConstraintValidatorException
  22493. if the IP is excluded.
  22494. </member>
  22495. <member name="M:Org.BouncyCastle.Pkix.PkixNameConstraintValidator.UnionEmail(System.String,System.String,Org.BouncyCastle.Utilities.Collections.ISet)">
  22496. The common part of <code>email1</code> and <code>email2</code> is
  22497. added to the union <code>union</code>. If <code>email1</code> and
  22498. <code>email2</code> have nothing in common they are added both.
  22499. @param email1 Email address constraint 1.
  22500. @param email2 Email address constraint 2.
  22501. @param union The union.
  22502. </member>
  22503. <member name="M:Org.BouncyCastle.Pkix.PkixNameConstraintValidator.IntersectEmail(System.String,System.String,Org.BouncyCastle.Utilities.Collections.ISet)">
  22504. The most restricting part from <code>email1</code> and
  22505. <code>email2</code> is added to the intersection <code>intersect</code>.
  22506. @param email1 Email address constraint 1.
  22507. @param email2 Email address constraint 2.
  22508. @param intersect The intersection.
  22509. </member>
  22510. <member name="M:Org.BouncyCastle.Pkix.PkixNameConstraintValidator.checkPermitted(Org.BouncyCastle.Asn1.X509.GeneralName)">
  22511. Checks if the given GeneralName is in the permitted ISet.
  22512. @param name The GeneralName
  22513. @throws PkixNameConstraintValidatorException
  22514. If the <code>name</code>
  22515. </member>
  22516. <member name="M:Org.BouncyCastle.Pkix.PkixNameConstraintValidator.checkExcluded(Org.BouncyCastle.Asn1.X509.GeneralName)">
  22517. Check if the given GeneralName is contained in the excluded ISet.
  22518. @param name The GeneralName.
  22519. @throws PkixNameConstraintValidatorException
  22520. If the <code>name</code> is
  22521. excluded.
  22522. </member>
  22523. <member name="M:Org.BouncyCastle.Pkix.PkixNameConstraintValidator.IntersectPermittedSubtree(Org.BouncyCastle.Asn1.Asn1Sequence)">
  22524. Updates the permitted ISet of these name constraints with the intersection
  22525. with the given subtree.
  22526. @param permitted The permitted subtrees
  22527. </member>
  22528. <member name="M:Org.BouncyCastle.Pkix.PkixNameConstraintValidator.AddExcludedSubtree(Org.BouncyCastle.Asn1.X509.GeneralSubtree)">
  22529. Adds a subtree to the excluded ISet of these name constraints.
  22530. @param subtree A subtree with an excluded GeneralName.
  22531. </member>
  22532. <member name="M:Org.BouncyCastle.Pkix.PkixNameConstraintValidator.Max(System.Byte[],System.Byte[])">
  22533. Returns the maximum IP address.
  22534. @param ip1 The first IP address.
  22535. @param ip2 The second IP address.
  22536. @return The maximum IP address.
  22537. </member>
  22538. <member name="M:Org.BouncyCastle.Pkix.PkixNameConstraintValidator.Min(System.Byte[],System.Byte[])">
  22539. Returns the minimum IP address.
  22540. @param ip1 The first IP address.
  22541. @param ip2 The second IP address.
  22542. @return The minimum IP address.
  22543. </member>
  22544. <member name="M:Org.BouncyCastle.Pkix.PkixNameConstraintValidator.CompareTo(System.Byte[],System.Byte[])">
  22545. Compares IP address <code>ip1</code> with <code>ip2</code>. If ip1
  22546. is equal to ip2 0 is returned. If ip1 is bigger 1 is returned, -1
  22547. otherwise.
  22548. @param ip1 The first IP address.
  22549. @param ip2 The second IP address.
  22550. @return 0 if ip1 is equal to ip2, 1 if ip1 is bigger, -1 otherwise.
  22551. </member>
  22552. <member name="M:Org.BouncyCastle.Pkix.PkixNameConstraintValidator.Or(System.Byte[],System.Byte[])">
  22553. Returns the logical OR of the IP addresses <code>ip1</code> and
  22554. <code>ip2</code>.
  22555. @param ip1 The first IP address.
  22556. @param ip2 The second IP address.
  22557. @return The OR of <code>ip1</code> and <code>ip2</code>.
  22558. </member>
  22559. <member name="M:Org.BouncyCastle.Pkix.PkixNameConstraintValidator.StringifyIP(System.Byte[])">
  22560. Stringifies an IPv4 or v6 address with subnet mask.
  22561. @param ip The IP with subnet mask.
  22562. @return The stringified IP address.
  22563. </member>
  22564. <member name="T:Org.BouncyCastle.Pkix.PkixParameters">
  22565. <summary>
  22566. Summary description for PkixParameters.
  22567. </summary>
  22568. </member>
  22569. <member name="F:Org.BouncyCastle.Pkix.PkixParameters.PkixValidityModel">
  22570. This is the default PKIX validity model. Actually there are two variants
  22571. of this: The PKIX model and the modified PKIX model. The PKIX model
  22572. verifies that all involved certificates must have been valid at the
  22573. current time. The modified PKIX model verifies that all involved
  22574. certificates were valid at the signing time. Both are indirectly choosen
  22575. with the {@link PKIXParameters#setDate(java.util.Date)} method, so this
  22576. methods sets the Date when <em>all</em> certificates must have been
  22577. valid.
  22578. </member>
  22579. <member name="F:Org.BouncyCastle.Pkix.PkixParameters.ChainValidityModel">
  22580. This model uses the following validity model. Each certificate must have
  22581. been valid at the moment where is was used. That means the end
  22582. certificate must have been valid at the time the signature was done. The
  22583. CA certificate which signed the end certificate must have been valid,
  22584. when the end certificate was signed. The CA (or Root CA) certificate must
  22585. have been valid, when the CA certificate was signed and so on. So the
  22586. {@link PKIXParameters#setDate(java.util.Date)} method sets the time, when
  22587. the <em>end certificate</em> must have been valid. <p/> It is used e.g.
  22588. in the German signature law.
  22589. </member>
  22590. <member name="M:Org.BouncyCastle.Pkix.PkixParameters.#ctor(Org.BouncyCastle.Utilities.Collections.ISet)">
  22591. Creates an instance of PKIXParameters with the specified Set of
  22592. most-trusted CAs. Each element of the set is a TrustAnchor.<br />
  22593. <br />
  22594. Note that the Set is copied to protect against subsequent modifications.
  22595. @param trustAnchors
  22596. a Set of TrustAnchors
  22597. @exception InvalidAlgorithmParameterException
  22598. if the specified Set is empty
  22599. <code>(trustAnchors.isEmpty() == true)</code>
  22600. @exception NullPointerException
  22601. if the specified Set is <code>null</code>
  22602. @exception ClassCastException
  22603. if any of the elements in the Set are not of type
  22604. <code>java.security.cert.TrustAnchor</code>
  22605. </member>
  22606. <member name="M:Org.BouncyCastle.Pkix.PkixParameters.GetTargetCertConstraints">
  22607. Returns the required constraints on the target certificate. The
  22608. constraints are returned as an instance of CertSelector. If
  22609. <code>null</code>, no constraints are defined.<br />
  22610. <br />
  22611. Note that the CertSelector returned is cloned to protect against
  22612. subsequent modifications.
  22613. @return a CertSelector specifying the constraints on the target
  22614. certificate (or <code>null</code>)
  22615. @see #setTargetCertConstraints(CertSelector)
  22616. </member>
  22617. <member name="M:Org.BouncyCastle.Pkix.PkixParameters.SetTargetCertConstraints(Org.BouncyCastle.X509.Store.IX509Selector)">
  22618. Sets the required constraints on the target certificate. The constraints
  22619. are specified as an instance of CertSelector. If null, no constraints are
  22620. defined.<br />
  22621. <br />
  22622. Note that the CertSelector specified is cloned to protect against
  22623. subsequent modifications.
  22624. @param selector
  22625. a CertSelector specifying the constraints on the target
  22626. certificate (or <code>null</code>)
  22627. @see #getTargetCertConstraints()
  22628. </member>
  22629. <member name="M:Org.BouncyCastle.Pkix.PkixParameters.GetInitialPolicies">
  22630. Returns an immutable Set of initial policy identifiers (OID strings),
  22631. indicating that any one of these policies would be acceptable to the
  22632. certificate user for the purposes of certification path processing. The
  22633. default return value is an empty <code>Set</code>, which is
  22634. interpreted as meaning that any policy would be acceptable.
  22635. @return an immutable <code>Set</code> of initial policy OIDs in String
  22636. format, or an empty <code>Set</code> (implying any policy is
  22637. acceptable). Never returns <code>null</code>.
  22638. @see #setInitialPolicies(java.util.Set)
  22639. </member>
  22640. <member name="M:Org.BouncyCastle.Pkix.PkixParameters.SetInitialPolicies(Org.BouncyCastle.Utilities.Collections.ISet)">
  22641. Sets the <code>Set</code> of initial policy identifiers (OID strings),
  22642. indicating that any one of these policies would be acceptable to the
  22643. certificate user for the purposes of certification path processing. By
  22644. default, any policy is acceptable (i.e. all policies), so a user that
  22645. wants to allow any policy as acceptable does not need to call this
  22646. method, or can call it with an empty <code>Set</code> (or
  22647. <code>null</code>).<br />
  22648. <br />
  22649. Note that the Set is copied to protect against subsequent modifications.<br />
  22650. <br />
  22651. @param initialPolicies
  22652. a Set of initial policy OIDs in String format (or
  22653. <code>null</code>)
  22654. @exception ClassCastException
  22655. if any of the elements in the set are not of type String
  22656. @see #getInitialPolicies()
  22657. </member>
  22658. <member name="M:Org.BouncyCastle.Pkix.PkixParameters.SetCertPathCheckers(System.Collections.IList)">
  22659. Sets a <code>List</code> of additional certification path checkers. If
  22660. the specified List contains an object that is not a PKIXCertPathChecker,
  22661. it is ignored.<br />
  22662. <br />
  22663. Each <code>PKIXCertPathChecker</code> specified implements additional
  22664. checks on a certificate. Typically, these are checks to process and
  22665. verify private extensions contained in certificates. Each
  22666. <code>PKIXCertPathChecker</code> should be instantiated with any
  22667. initialization parameters needed to execute the check.<br />
  22668. <br />
  22669. This method allows sophisticated applications to extend a PKIX
  22670. <code>CertPathValidator</code> or <code>CertPathBuilder</code>. Each
  22671. of the specified PKIXCertPathCheckers will be called, in turn, by a PKIX
  22672. <code>CertPathValidator</code> or <code>CertPathBuilder</code> for
  22673. each certificate processed or validated.<br />
  22674. <br />
  22675. Regardless of whether these additional PKIXCertPathCheckers are set, a
  22676. PKIX <code>CertPathValidator</code> or <code>CertPathBuilder</code>
  22677. must perform all of the required PKIX checks on each certificate. The one
  22678. exception to this rule is if the RevocationEnabled flag is set to false
  22679. (see the {@link #setRevocationEnabled(boolean) setRevocationEnabled}
  22680. method).<br />
  22681. <br />
  22682. Note that the List supplied here is copied and each PKIXCertPathChecker
  22683. in the list is cloned to protect against subsequent modifications.
  22684. @param checkers
  22685. a List of PKIXCertPathCheckers. May be null, in which case no
  22686. additional checkers will be used.
  22687. @exception ClassCastException
  22688. if any of the elements in the list are not of type
  22689. <code>java.security.cert.PKIXCertPathChecker</code>
  22690. @see #getCertPathCheckers()
  22691. </member>
  22692. <member name="M:Org.BouncyCastle.Pkix.PkixParameters.GetCertPathCheckers">
  22693. Returns the List of certification path checkers. Each PKIXCertPathChecker
  22694. in the returned IList is cloned to protect against subsequent modifications.
  22695. @return an immutable List of PKIXCertPathCheckers (may be empty, but not
  22696. <code>null</code>)
  22697. @see #setCertPathCheckers(java.util.List)
  22698. </member>
  22699. <member name="M:Org.BouncyCastle.Pkix.PkixParameters.AddCertPathChecker(Org.BouncyCastle.Pkix.PkixCertPathChecker)">
  22700. Adds a <code>PKIXCertPathChecker</code> to the list of certification
  22701. path checkers. See the {@link #setCertPathCheckers setCertPathCheckers}
  22702. method for more details.
  22703. <p>
  22704. Note that the <code>PKIXCertPathChecker</code> is cloned to protect
  22705. against subsequent modifications.</p>
  22706. @param checker a <code>PKIXCertPathChecker</code> to add to the list of
  22707. checks. If <code>null</code>, the checker is ignored (not added to list).
  22708. </member>
  22709. <member name="M:Org.BouncyCastle.Pkix.PkixParameters.SetParams(Org.BouncyCastle.Pkix.PkixParameters)">
  22710. Method to support <code>Clone()</code> under J2ME.
  22711. <code>super.Clone()</code> does not exist and fields are not copied.
  22712. @param params Parameters to set. If this are
  22713. <code>ExtendedPkixParameters</code> they are copied to.
  22714. </member>
  22715. <member name="P:Org.BouncyCastle.Pkix.PkixParameters.IsUseDeltasEnabled">
  22716. Whether delta CRLs should be used for checking the revocation status.
  22717. Defaults to <code>false</code>.
  22718. </member>
  22719. <member name="P:Org.BouncyCastle.Pkix.PkixParameters.ValidityModel">
  22720. The validity model.
  22721. @see #CHAIN_VALIDITY_MODEL
  22722. @see #PKIX_VALIDITY_MODEL
  22723. </member>
  22724. <member name="M:Org.BouncyCastle.Pkix.PkixParameters.SetStores(System.Collections.IList)">
  22725. Sets the Bouncy Castle Stores for finding CRLs, certificates, attribute
  22726. certificates or cross certificates.
  22727. <p>
  22728. The <code>IList</code> is cloned.
  22729. </p>
  22730. @param stores A list of stores to use.
  22731. @see #getStores
  22732. @throws ClassCastException if an element of <code>stores</code> is not
  22733. a {@link Store}.
  22734. </member>
  22735. <member name="M:Org.BouncyCastle.Pkix.PkixParameters.AddStore(Org.BouncyCastle.X509.Store.IX509Store)">
  22736. Adds a Bouncy Castle {@link Store} to find CRLs, certificates, attribute
  22737. certificates or cross certificates.
  22738. <p>
  22739. This method should be used to add local stores, like collection based
  22740. X.509 stores, if available. Local stores should be considered first,
  22741. before trying to use additional (remote) locations, because they do not
  22742. need possible additional network traffic.
  22743. </p><p>
  22744. If <code>store</code> is <code>null</code> it is ignored.
  22745. </p>
  22746. @param store The store to add.
  22747. @see #getStores
  22748. </member>
  22749. <member name="M:Org.BouncyCastle.Pkix.PkixParameters.AddAdditionalStore(Org.BouncyCastle.X509.Store.IX509Store)">
  22750. Adds an additional Bouncy Castle {@link Store} to find CRLs, certificates,
  22751. attribute certificates or cross certificates.
  22752. <p>
  22753. You should not use this method. This method is used for adding additional
  22754. X.509 stores, which are used to add (remote) locations, e.g. LDAP, found
  22755. during X.509 object processing, e.g. in certificates or CRLs. This method
  22756. is used in PKIX certification path processing.
  22757. </p><p>
  22758. If <code>store</code> is <code>null</code> it is ignored.
  22759. </p>
  22760. @param store The store to add.
  22761. @see #getStores()
  22762. </member>
  22763. <member name="M:Org.BouncyCastle.Pkix.PkixParameters.GetAdditionalStores">
  22764. Returns an <code>IList</code> of additional Bouncy Castle
  22765. <code>Store</code>s used for finding CRLs, certificates, attribute
  22766. certificates or cross certificates.
  22767. @return an immutable <code>IList</code> of additional Bouncy Castle
  22768. <code>Store</code>s. Never <code>null</code>.
  22769. @see #addAddionalStore(Store)
  22770. </member>
  22771. <member name="M:Org.BouncyCastle.Pkix.PkixParameters.GetStores">
  22772. Returns an <code>IList</code> of Bouncy Castle
  22773. <code>Store</code>s used for finding CRLs, certificates, attribute
  22774. certificates or cross certificates.
  22775. @return an immutable <code>IList</code> of Bouncy Castle
  22776. <code>Store</code>s. Never <code>null</code>.
  22777. @see #setStores(IList)
  22778. </member>
  22779. <member name="P:Org.BouncyCastle.Pkix.PkixParameters.IsAdditionalLocationsEnabled">
  22780. Returns if additional {@link X509Store}s for locations like LDAP found
  22781. in certificates or CRLs should be used.
  22782. @return Returns <code>true</code> if additional stores are used.
  22783. </member>
  22784. <member name="M:Org.BouncyCastle.Pkix.PkixParameters.SetAdditionalLocationsEnabled(System.Boolean)">
  22785. Sets if additional {@link X509Store}s for locations like LDAP found in
  22786. certificates or CRLs should be used.
  22787. @param enabled <code>true</code> if additional stores are used.
  22788. </member>
  22789. <member name="M:Org.BouncyCastle.Pkix.PkixParameters.GetTargetConstraints">
  22790. Returns the required constraints on the target certificate or attribute
  22791. certificate. The constraints are returned as an instance of
  22792. <code>IX509Selector</code>. If <code>null</code>, no constraints are
  22793. defined.
  22794. <p>
  22795. The target certificate in a PKIX path may be a certificate or an
  22796. attribute certificate.
  22797. </p><p>
  22798. Note that the <code>IX509Selector</code> returned is cloned to protect
  22799. against subsequent modifications.
  22800. </p>
  22801. @return a <code>IX509Selector</code> specifying the constraints on the
  22802. target certificate or attribute certificate (or <code>null</code>)
  22803. @see #setTargetConstraints
  22804. @see X509CertStoreSelector
  22805. @see X509AttributeCertStoreSelector
  22806. </member>
  22807. <member name="M:Org.BouncyCastle.Pkix.PkixParameters.SetTargetConstraints(Org.BouncyCastle.X509.Store.IX509Selector)">
  22808. Sets the required constraints on the target certificate or attribute
  22809. certificate. The constraints are specified as an instance of
  22810. <code>IX509Selector</code>. If <code>null</code>, no constraints are
  22811. defined.
  22812. <p>
  22813. The target certificate in a PKIX path may be a certificate or an
  22814. attribute certificate.
  22815. </p><p>
  22816. Note that the <code>IX509Selector</code> specified is cloned to protect
  22817. against subsequent modifications.
  22818. </p>
  22819. @param selector a <code>IX509Selector</code> specifying the constraints on
  22820. the target certificate or attribute certificate (or
  22821. <code>null</code>)
  22822. @see #getTargetConstraints
  22823. @see X509CertStoreSelector
  22824. @see X509AttributeCertStoreSelector
  22825. </member>
  22826. <member name="M:Org.BouncyCastle.Pkix.PkixParameters.GetTrustedACIssuers">
  22827. Returns the trusted attribute certificate issuers. If attribute
  22828. certificates is verified the trusted AC issuers must be set.
  22829. <p>
  22830. The returned <code>ISet</code> consists of <code>TrustAnchor</code>s.
  22831. </p><p>
  22832. The returned <code>ISet</code> is immutable. Never <code>null</code>
  22833. </p>
  22834. @return Returns an immutable set of the trusted AC issuers.
  22835. </member>
  22836. <member name="M:Org.BouncyCastle.Pkix.PkixParameters.SetTrustedACIssuers(Org.BouncyCastle.Utilities.Collections.ISet)">
  22837. Sets the trusted attribute certificate issuers. If attribute certificates
  22838. is verified the trusted AC issuers must be set.
  22839. <p>
  22840. The <code>trustedACIssuers</code> must be a <code>ISet</code> of
  22841. <code>TrustAnchor</code>
  22842. </p><p>
  22843. The given set is cloned.
  22844. </p>
  22845. @param trustedACIssuers The trusted AC issuers to set. Is never
  22846. <code>null</code>.
  22847. @throws ClassCastException if an element of <code>stores</code> is not
  22848. a <code>TrustAnchor</code>.
  22849. </member>
  22850. <member name="M:Org.BouncyCastle.Pkix.PkixParameters.GetNecessaryACAttributes">
  22851. Returns the necessary attributes which must be contained in an attribute
  22852. certificate.
  22853. <p>
  22854. The returned <code>ISet</code> is immutable and contains
  22855. <code>String</code>s with the OIDs.
  22856. </p>
  22857. @return Returns the necessary AC attributes.
  22858. </member>
  22859. <member name="M:Org.BouncyCastle.Pkix.PkixParameters.SetNecessaryACAttributes(Org.BouncyCastle.Utilities.Collections.ISet)">
  22860. Sets the necessary which must be contained in an attribute certificate.
  22861. <p>
  22862. The <code>ISet</code> must contain <code>String</code>s with the
  22863. OIDs.
  22864. </p><p>
  22865. The set is cloned.
  22866. </p>
  22867. @param necessaryACAttributes The necessary AC attributes to set.
  22868. @throws ClassCastException if an element of
  22869. <code>necessaryACAttributes</code> is not a
  22870. <code>String</code>.
  22871. </member>
  22872. <member name="M:Org.BouncyCastle.Pkix.PkixParameters.GetProhibitedACAttributes">
  22873. Returns the attribute certificates which are not allowed.
  22874. <p>
  22875. The returned <code>ISet</code> is immutable and contains
  22876. <code>String</code>s with the OIDs.
  22877. </p>
  22878. @return Returns the prohibited AC attributes. Is never <code>null</code>.
  22879. </member>
  22880. <member name="M:Org.BouncyCastle.Pkix.PkixParameters.SetProhibitedACAttributes(Org.BouncyCastle.Utilities.Collections.ISet)">
  22881. Sets the attribute certificates which are not allowed.
  22882. <p>
  22883. The <code>ISet</code> must contain <code>String</code>s with the
  22884. OIDs.
  22885. </p><p>
  22886. The set is cloned.
  22887. </p>
  22888. @param prohibitedACAttributes The prohibited AC attributes to set.
  22889. @throws ClassCastException if an element of
  22890. <code>prohibitedACAttributes</code> is not a
  22891. <code>String</code>.
  22892. </member>
  22893. <member name="M:Org.BouncyCastle.Pkix.PkixParameters.GetAttrCertCheckers">
  22894. Returns the attribute certificate checker. The returned set contains
  22895. {@link PKIXAttrCertChecker}s and is immutable.
  22896. @return Returns the attribute certificate checker. Is never
  22897. <code>null</code>.
  22898. </member>
  22899. <member name="M:Org.BouncyCastle.Pkix.PkixParameters.SetAttrCertCheckers(Org.BouncyCastle.Utilities.Collections.ISet)">
  22900. Sets the attribute certificate checkers.
  22901. <p>
  22902. All elements in the <code>ISet</code> must a {@link PKIXAttrCertChecker}.
  22903. </p>
  22904. <p>
  22905. The given set is cloned.
  22906. </p>
  22907. @param attrCertCheckers The attribute certificate checkers to set. Is
  22908. never <code>null</code>.
  22909. @throws ClassCastException if an element of <code>attrCertCheckers</code>
  22910. is not a <code>PKIXAttrCertChecker</code>.
  22911. </member>
  22912. <member name="T:Org.BouncyCastle.Pkix.PkixPolicyNode">
  22913. <summary>
  22914. Summary description for PkixPolicyNode.
  22915. </summary>
  22916. </member>
  22917. <member name="M:Org.BouncyCastle.Pkix.PkixPolicyNode.#ctor(System.Collections.IList,System.Int32,Org.BouncyCastle.Utilities.Collections.ISet,Org.BouncyCastle.Pkix.PkixPolicyNode,Org.BouncyCastle.Utilities.Collections.ISet,System.String,System.Boolean)">
  22918. Constructors
  22919. </member>
  22920. <member name="T:Org.BouncyCastle.Pkix.ReasonsMask">
  22921. <summary>
  22922. This class helps to handle CRL revocation reasons mask. Each CRL handles a
  22923. certain set of revocation reasons.
  22924. </summary>
  22925. </member>
  22926. <member name="M:Org.BouncyCastle.Pkix.ReasonsMask.#ctor(System.Int32)">
  22927. <summary>
  22928. Constructs are reason mask with the reasons.
  22929. </summary>
  22930. <param name="reasons">The reasons.</param>
  22931. </member>
  22932. <member name="M:Org.BouncyCastle.Pkix.ReasonsMask.#ctor">
  22933. <summary>
  22934. A reason mask with no reason.
  22935. </summary>
  22936. </member>
  22937. <member name="F:Org.BouncyCastle.Pkix.ReasonsMask.AllReasons">
  22938. <summary>
  22939. A mask with all revocation reasons.
  22940. </summary>
  22941. </member>
  22942. <member name="M:Org.BouncyCastle.Pkix.ReasonsMask.AddReasons(Org.BouncyCastle.Pkix.ReasonsMask)">
  22943. Adds all reasons from the reasons mask to this mask.
  22944. @param mask The reasons mask to add.
  22945. </member>
  22946. <member name="P:Org.BouncyCastle.Pkix.ReasonsMask.IsAllReasons">
  22947. <summary>
  22948. Returns <code>true</code> if this reasons mask contains all possible
  22949. reasons.
  22950. </summary>
  22951. <returns>true if this reasons mask contains all possible reasons.
  22952. </returns>
  22953. </member>
  22954. <member name="M:Org.BouncyCastle.Pkix.ReasonsMask.Intersect(Org.BouncyCastle.Pkix.ReasonsMask)">
  22955. <summary>
  22956. Intersects this mask with the given reasons mask.
  22957. </summary>
  22958. <param name="mask">mask The mask to intersect with.</param>
  22959. <returns>The intersection of this and teh given mask.</returns>
  22960. </member>
  22961. <member name="M:Org.BouncyCastle.Pkix.ReasonsMask.HasNewReasons(Org.BouncyCastle.Pkix.ReasonsMask)">
  22962. <summary>
  22963. Returns <c>true</c> if the passed reasons mask has new reasons.
  22964. </summary>
  22965. <param name="mask">The reasons mask which should be tested for new reasons.</param>
  22966. <returns><c>true</c> if the passed reasons mask has new reasons.</returns>
  22967. </member>
  22968. <member name="P:Org.BouncyCastle.Pkix.ReasonsMask.Reasons">
  22969. <summary>
  22970. Returns the reasons in this mask.
  22971. </summary>
  22972. </member>
  22973. <member name="M:Org.BouncyCastle.Pkix.Rfc3280CertPathUtilities.ProcessCrlB2(Org.BouncyCastle.Asn1.X509.DistributionPoint,System.Object,Org.BouncyCastle.X509.X509Crl)">
  22974. If the complete CRL includes an issuing distribution point (IDP) CRL
  22975. extension check the following:
  22976. <p>
  22977. (i) If the distribution point name is present in the IDP CRL extension
  22978. and the distribution field is present in the DP, then verify that one of
  22979. the names in the IDP matches one of the names in the DP. If the
  22980. distribution point name is present in the IDP CRL extension and the
  22981. distribution field is omitted from the DP, then verify that one of the
  22982. names in the IDP matches one of the names in the cRLIssuer field of the
  22983. DP.
  22984. </p>
  22985. <p>
  22986. (ii) If the onlyContainsUserCerts boolean is asserted in the IDP CRL
  22987. extension, verify that the certificate does not include the basic
  22988. constraints extension with the cA boolean asserted.
  22989. </p>
  22990. <p>
  22991. (iii) If the onlyContainsCACerts boolean is asserted in the IDP CRL
  22992. extension, verify that the certificate includes the basic constraints
  22993. extension with the cA boolean asserted.
  22994. </p>
  22995. <p>
  22996. (iv) Verify that the onlyContainsAttributeCerts boolean is not asserted.
  22997. </p>
  22998. @param dp The distribution point.
  22999. @param cert The certificate.
  23000. @param crl The CRL.
  23001. @throws AnnotatedException if one of the conditions is not met or an error occurs.
  23002. </member>
  23003. <member name="M:Org.BouncyCastle.Pkix.Rfc3280CertPathUtilities.ProcessCrlB1(Org.BouncyCastle.Asn1.X509.DistributionPoint,System.Object,Org.BouncyCastle.X509.X509Crl)">
  23004. If the DP includes cRLIssuer, then verify that the issuer field in the
  23005. complete CRL matches cRLIssuer in the DP and that the complete CRL
  23006. contains an
  23007. g distribution point extension with the indirectCRL
  23008. boolean asserted. Otherwise, verify that the CRL issuer matches the
  23009. certificate issuer.
  23010. @param dp The distribution point.
  23011. @param cert The certificate ot attribute certificate.
  23012. @param crl The CRL for <code>cert</code>.
  23013. @throws AnnotatedException if one of the above conditions does not apply or an error
  23014. occurs.
  23015. </member>
  23016. <member name="M:Org.BouncyCastle.Pkix.Rfc3280CertPathUtilities.ProcessCrlF(Org.BouncyCastle.X509.X509Crl,System.Object,Org.BouncyCastle.X509.X509Certificate,Org.BouncyCastle.Crypto.AsymmetricKeyParameter,Org.BouncyCastle.Pkix.PkixParameters,System.Collections.IList)">
  23017. Obtain and validate the certification path for the complete CRL issuer.
  23018. If a key usage extension is present in the CRL issuer's certificate,
  23019. verify that the cRLSign bit is set.
  23020. @param crl CRL which contains revocation information for the certificate
  23021. <code>cert</code>.
  23022. @param cert The attribute certificate or certificate to check if it is
  23023. revoked.
  23024. @param defaultCRLSignCert The issuer certificate of the certificate <code>cert</code>.
  23025. @param defaultCRLSignKey The public key of the issuer certificate
  23026. <code>defaultCRLSignCert</code>.
  23027. @param paramsPKIX paramsPKIX PKIX parameters.
  23028. @param certPathCerts The certificates on the certification path.
  23029. @return A <code>Set</code> with all keys of possible CRL issuer
  23030. certificates.
  23031. @throws AnnotatedException if the CRL is not valid or the status cannot be checked or
  23032. some error occurs.
  23033. </member>
  23034. <member name="M:Org.BouncyCastle.Pkix.Rfc3280CertPathUtilities.CheckCrl(Org.BouncyCastle.Asn1.X509.DistributionPoint,Org.BouncyCastle.Pkix.PkixParameters,Org.BouncyCastle.X509.X509Certificate,System.DateTime,Org.BouncyCastle.X509.X509Certificate,Org.BouncyCastle.Crypto.AsymmetricKeyParameter,Org.BouncyCastle.Pkix.CertStatus,Org.BouncyCastle.Pkix.ReasonsMask,System.Collections.IList)">
  23035. Checks a distribution point for revocation information for the
  23036. certificate <code>cert</code>.
  23037. @param dp The distribution point to consider.
  23038. @param paramsPKIX PKIX parameters.
  23039. @param cert Certificate to check if it is revoked.
  23040. @param validDate The date when the certificate revocation status should be
  23041. checked.
  23042. @param defaultCRLSignCert The issuer certificate of the certificate <code>cert</code>.
  23043. @param defaultCRLSignKey The public key of the issuer certificate
  23044. <code>defaultCRLSignCert</code>.
  23045. @param certStatus The current certificate revocation status.
  23046. @param reasonMask The reasons mask which is already checked.
  23047. @param certPathCerts The certificates of the certification path.
  23048. @throws AnnotatedException if the certificate is revoked or the status cannot be checked
  23049. or some error occurs.
  23050. </member>
  23051. <member name="M:Org.BouncyCastle.Pkix.Rfc3280CertPathUtilities.CheckCrls(Org.BouncyCastle.Pkix.PkixParameters,Org.BouncyCastle.X509.X509Certificate,System.DateTime,Org.BouncyCastle.X509.X509Certificate,Org.BouncyCastle.Crypto.AsymmetricKeyParameter,System.Collections.IList)">
  23052. Checks a certificate if it is revoked.
  23053. @param paramsPKIX PKIX parameters.
  23054. @param cert Certificate to check if it is revoked.
  23055. @param validDate The date when the certificate revocation status should be
  23056. checked.
  23057. @param sign The issuer certificate of the certificate <code>cert</code>.
  23058. @param workingPublicKey The public key of the issuer certificate <code>sign</code>.
  23059. @param certPathCerts The certificates of the certification path.
  23060. @throws AnnotatedException if the certificate is revoked or the status cannot be checked
  23061. or some error occurs.
  23062. </member>
  23063. <member name="M:Org.BouncyCastle.Pkix.Rfc3280CertPathUtilities.ProcessCrlC(Org.BouncyCastle.X509.X509Crl,Org.BouncyCastle.X509.X509Crl,Org.BouncyCastle.Pkix.PkixParameters)">
  23064. If use-deltas is set, verify the issuer and scope of the delta CRL.
  23065. @param deltaCRL The delta CRL.
  23066. @param completeCRL The complete CRL.
  23067. @param pkixParams The PKIX paramaters.
  23068. @throws AnnotatedException if an exception occurs.
  23069. </member>
  23070. <member name="M:Org.BouncyCastle.Pkix.Rfc3281CertPathUtilities.CheckCrls(Org.BouncyCastle.X509.IX509AttributeCertificate,Org.BouncyCastle.Pkix.PkixParameters,Org.BouncyCastle.X509.X509Certificate,System.DateTime,System.Collections.IList)">
  23071. Checks if an attribute certificate is revoked.
  23072. @param attrCert Attribute certificate to check if it is revoked.
  23073. @param paramsPKIX PKIX parameters.
  23074. @param issuerCert The issuer certificate of the attribute certificate
  23075. <code>attrCert</code>.
  23076. @param validDate The date when the certificate revocation status should
  23077. be checked.
  23078. @param certPathCerts The certificates of the certification path to be
  23079. checked.
  23080. @throws CertPathValidatorException if the certificate is revoked or the
  23081. status cannot be checked or some error occurs.
  23082. </member>
  23083. <member name="M:Org.BouncyCastle.Pkix.Rfc3281CertPathUtilities.ProcessAttrCert1(Org.BouncyCastle.X509.IX509AttributeCertificate,Org.BouncyCastle.Pkix.PkixParameters)">
  23084. Searches for a holder public key certificate and verifies its
  23085. certification path.
  23086. @param attrCert the attribute certificate.
  23087. @param pkixParams The PKIX parameters.
  23088. @return The certificate path of the holder certificate.
  23089. @throws Exception if
  23090. <ul>
  23091. <li>no public key certificate can be found although holder
  23092. information is given by an entity name or a base certificate
  23093. ID</li>
  23094. <li>support classes cannot be created</li>
  23095. <li>no certification path for the public key certificate can
  23096. be built</li>
  23097. </ul>
  23098. </member>
  23099. <member name="M:Org.BouncyCastle.Pkix.Rfc3281CertPathUtilities.CheckCrl(Org.BouncyCastle.Asn1.X509.DistributionPoint,Org.BouncyCastle.X509.IX509AttributeCertificate,Org.BouncyCastle.Pkix.PkixParameters,System.DateTime,Org.BouncyCastle.X509.X509Certificate,Org.BouncyCastle.Pkix.CertStatus,Org.BouncyCastle.Pkix.ReasonsMask,System.Collections.IList)">
  23100. Checks a distribution point for revocation information for the
  23101. certificate <code>attrCert</code>.
  23102. @param dp The distribution point to consider.
  23103. @param attrCert The attribute certificate which should be checked.
  23104. @param paramsPKIX PKIX parameters.
  23105. @param validDate The date when the certificate revocation status should
  23106. be checked.
  23107. @param issuerCert Certificate to check if it is revoked.
  23108. @param reasonMask The reasons mask which is already checked.
  23109. @param certPathCerts The certificates of the certification path to be
  23110. checked.
  23111. @throws Exception if the certificate is revoked or the status
  23112. cannot be checked or some error occurs.
  23113. </member>
  23114. <member name="T:Org.BouncyCastle.Pkix.TrustAnchor">
  23115. <summary>
  23116. A trust anchor or most-trusted Certification Authority (CA).
  23117. This class represents a "most-trusted CA", which is used as a trust anchor
  23118. for validating X.509 certification paths. A most-trusted CA includes the
  23119. public key of the CA, the CA's name, and any constraints upon the set of
  23120. paths which may be validated using this key. These parameters can be
  23121. specified in the form of a trusted X509Certificate or as individual
  23122. parameters.
  23123. </summary>
  23124. </member>
  23125. <member name="M:Org.BouncyCastle.Pkix.TrustAnchor.#ctor(Org.BouncyCastle.X509.X509Certificate,System.Byte[])">
  23126. <summary>
  23127. Creates an instance of TrustAnchor with the specified X509Certificate and
  23128. optional name constraints, which are intended to be used as additional
  23129. constraints when validating an X.509 certification path.
  23130. The name constraints are specified as a byte array. This byte array
  23131. should contain the DER encoded form of the name constraints, as they
  23132. would appear in the NameConstraints structure defined in RFC 2459 and
  23133. X.509. The ASN.1 definition of this structure appears below.
  23134. <pre>
  23135. NameConstraints ::= SEQUENCE {
  23136. permittedSubtrees [0] GeneralSubtrees OPTIONAL,
  23137. excludedSubtrees [1] GeneralSubtrees OPTIONAL }
  23138. GeneralSubtrees ::= SEQUENCE SIZE (1..MAX) OF GeneralSubtree
  23139. GeneralSubtree ::= SEQUENCE {
  23140. base GeneralName,
  23141. minimum [0] BaseDistance DEFAULT 0,
  23142. maximum [1] BaseDistance OPTIONAL }
  23143. BaseDistance ::= INTEGER (0..MAX)
  23144. GeneralName ::= CHOICE {
  23145. otherName [0] OtherName,
  23146. rfc822Name [1] IA5String,
  23147. dNSName [2] IA5String,
  23148. x400Address [3] ORAddress,
  23149. directoryName [4] Name,
  23150. ediPartyName [5] EDIPartyName,
  23151. uniformResourceIdentifier [6] IA5String,
  23152. iPAddress [7] OCTET STRING,
  23153. registeredID [8] OBJECT IDENTIFIER}
  23154. </pre>
  23155. Note that the name constraints byte array supplied is cloned to protect
  23156. against subsequent modifications.
  23157. </summary>
  23158. <param name="trustedCert">a trusted X509Certificate</param>
  23159. <param name="nameConstraints">a byte array containing the ASN.1 DER encoding of a
  23160. NameConstraints extension to be used for checking name
  23161. constraints. Only the value of the extension is included, not
  23162. the OID or criticality flag. Specify null to omit the
  23163. parameter.</param>
  23164. <exception cref="T:System.ArgumentNullException">if the specified X509Certificate is null</exception>
  23165. </member>
  23166. <member name="M:Org.BouncyCastle.Pkix.TrustAnchor.#ctor(Org.BouncyCastle.Asn1.X509.X509Name,Org.BouncyCastle.Crypto.AsymmetricKeyParameter,System.Byte[])">
  23167. <summary>
  23168. Creates an instance of <c>TrustAnchor</c> where the
  23169. most-trusted CA is specified as an X500Principal and public key.
  23170. </summary>
  23171. <remarks>
  23172. <p>
  23173. Name constraints are an optional parameter, and are intended to be used
  23174. as additional constraints when validating an X.509 certification path.
  23175. </p><p>
  23176. The name constraints are specified as a byte array. This byte array
  23177. contains the DER encoded form of the name constraints, as they
  23178. would appear in the NameConstraints structure defined in RFC 2459
  23179. and X.509. The ASN.1 notation for this structure is supplied in the
  23180. documentation for the other constructors.
  23181. </p><p>
  23182. Note that the name constraints byte array supplied here is cloned to
  23183. protect against subsequent modifications.
  23184. </p>
  23185. </remarks>
  23186. <param name="caPrincipal">the name of the most-trusted CA as X509Name</param>
  23187. <param name="pubKey">the public key of the most-trusted CA</param>
  23188. <param name="nameConstraints">
  23189. a byte array containing the ASN.1 DER encoding of a NameConstraints extension to
  23190. be used for checking name constraints. Only the value of the extension is included,
  23191. not the OID or criticality flag. Specify <c>null</c> to omit the parameter.
  23192. </param>
  23193. <exception cref="T:System.ArgumentNullException">
  23194. if <c>caPrincipal</c> or <c>pubKey</c> is null
  23195. </exception>
  23196. </member>
  23197. <member name="M:Org.BouncyCastle.Pkix.TrustAnchor.#ctor(System.String,Org.BouncyCastle.Crypto.AsymmetricKeyParameter,System.Byte[])">
  23198. <summary>
  23199. Creates an instance of <code>TrustAnchor</code> where the most-trusted
  23200. CA is specified as a distinguished name and public key. Name constraints
  23201. are an optional parameter, and are intended to be used as additional
  23202. constraints when validating an X.509 certification path.
  23203. <br/>
  23204. The name constraints are specified as a byte array. This byte array
  23205. contains the DER encoded form of the name constraints, as they would
  23206. appear in the NameConstraints structure defined in RFC 2459 and X.509.
  23207. </summary>
  23208. <param name="caName">the X.500 distinguished name of the most-trusted CA in RFC
  23209. 2253 string format</param>
  23210. <param name="pubKey">the public key of the most-trusted CA</param>
  23211. <param name="nameConstraints">a byte array containing the ASN.1 DER encoding of a
  23212. NameConstraints extension to be used for checking name
  23213. constraints. Only the value of the extension is included, not
  23214. the OID or criticality flag. Specify null to omit the
  23215. parameter.</param>
  23216. throws NullPointerException, IllegalArgumentException
  23217. </member>
  23218. <member name="P:Org.BouncyCastle.Pkix.TrustAnchor.TrustedCert">
  23219. <summary>
  23220. Returns the most-trusted CA certificate.
  23221. </summary>
  23222. </member>
  23223. <member name="P:Org.BouncyCastle.Pkix.TrustAnchor.CA">
  23224. <summary>
  23225. Returns the name of the most-trusted CA as an X509Name.
  23226. </summary>
  23227. </member>
  23228. <member name="P:Org.BouncyCastle.Pkix.TrustAnchor.CAName">
  23229. <summary>
  23230. Returns the name of the most-trusted CA in RFC 2253 string format.
  23231. </summary>
  23232. </member>
  23233. <member name="P:Org.BouncyCastle.Pkix.TrustAnchor.CAPublicKey">
  23234. <summary>
  23235. Returns the public key of the most-trusted CA.
  23236. </summary>
  23237. </member>
  23238. <member name="M:Org.BouncyCastle.Pkix.TrustAnchor.setNameConstraints(System.Byte[])">
  23239. <summary>
  23240. Decode the name constraints and clone them if not null.
  23241. </summary>
  23242. </member>
  23243. <member name="M:Org.BouncyCastle.Pkix.TrustAnchor.ToString">
  23244. <summary>
  23245. Returns a formatted string describing the <code>TrustAnchor</code>.
  23246. </summary>
  23247. <returns>a formatted string describing the <code>TrustAnchor</code></returns>
  23248. </member>
  23249. <member name="T:Org.BouncyCastle.Tls.AbstractTlsClient">
  23250. <summary>Base class for a TLS client.</summary>
  23251. </member>
  23252. <member name="M:Org.BouncyCastle.Tls.AbstractTlsClient.AllowUnexpectedServerExtension(System.Int32,System.Byte[])">
  23253. <exception cref="T:System.IO.IOException"/>
  23254. </member>
  23255. <member name="M:Org.BouncyCastle.Tls.AbstractTlsClient.CheckForUnexpectedServerExtension(System.Collections.IDictionary,System.Int32)">
  23256. <exception cref="T:System.IO.IOException"/>
  23257. </member>
  23258. <member name="M:Org.BouncyCastle.Tls.AbstractTlsClient.GetPskIdentity">
  23259. <exception cref="T:System.IO.IOException"/>
  23260. </member>
  23261. <member name="M:Org.BouncyCastle.Tls.AbstractTlsClient.GetSrpIdentity">
  23262. <exception cref="T:System.IO.IOException"/>
  23263. </member>
  23264. <member name="M:Org.BouncyCastle.Tls.AbstractTlsClient.GetMultiCertStatusRequest">
  23265. <returns>an <see cref="T:System.Collections.IList"/> of <see cref="T:Org.BouncyCastle.Tls.CertificateStatusRequestItemV2"/> (or null).</returns>
  23266. </member>
  23267. <member name="M:Org.BouncyCastle.Tls.AbstractTlsClient.GetSupportedGroups(System.Collections.IList)">
  23268. <summary>The default <see cref="M:Org.BouncyCastle.Tls.AbstractTlsClient.GetClientExtensions"/> implementation calls this to determine which named
  23269. groups to include in the supported_groups extension for the ClientHello.</summary>
  23270. <param name="namedGroupRoles">The <see cref="T:Org.BouncyCastle.Tls.NamedGroupRole">named group roles</see> for which there should
  23271. be at least one supported group. By default this is inferred from the offered cipher suites and signature
  23272. algorithms.</param>
  23273. <returns>an <see cref="T:System.Collections.IList"/> of <see cref="T:System.Int32"/>. See <see cref="T:Org.BouncyCastle.Tls.NamedGroup"/> for group constants.
  23274. </returns>
  23275. </member>
  23276. <member name="M:Org.BouncyCastle.Tls.AbstractTlsClient.NotifyHandshakeBeginning">
  23277. <exception cref="T:System.IO.IOException"/>
  23278. </member>
  23279. <member name="M:Org.BouncyCastle.Tls.AbstractTlsClient.GetClientExtensions">
  23280. <exception cref="T:System.IO.IOException"/>
  23281. </member>
  23282. <member name="M:Org.BouncyCastle.Tls.AbstractTlsClient.NotifyServerVersion(Org.BouncyCastle.Tls.ProtocolVersion)">
  23283. <exception cref="T:System.IO.IOException"/>
  23284. </member>
  23285. <member name="M:Org.BouncyCastle.Tls.AbstractTlsClient.NotifySelectedPsk(Org.BouncyCastle.Tls.TlsPsk)">
  23286. <exception cref="T:System.IO.IOException"/>
  23287. </member>
  23288. <member name="M:Org.BouncyCastle.Tls.AbstractTlsClient.ProcessServerExtensions(System.Collections.IDictionary)">
  23289. <exception cref="T:System.IO.IOException"/>
  23290. </member>
  23291. <member name="M:Org.BouncyCastle.Tls.AbstractTlsClient.ProcessServerSupplementalData(System.Collections.IList)">
  23292. <exception cref="T:System.IO.IOException"/>
  23293. </member>
  23294. <member name="M:Org.BouncyCastle.Tls.AbstractTlsClient.GetClientSupplementalData">
  23295. <exception cref="T:System.IO.IOException"/>
  23296. </member>
  23297. <member name="M:Org.BouncyCastle.Tls.AbstractTlsClient.NotifyNewSessionTicket(Org.BouncyCastle.Tls.NewSessionTicket)">
  23298. <exception cref="T:System.IO.IOException"/>
  23299. </member>
  23300. <member name="M:Org.BouncyCastle.Tls.AbstractTlsContext.HandshakeBeginning(Org.BouncyCastle.Tls.TlsPeer)">
  23301. <exception cref="T:System.IO.IOException"/>
  23302. </member>
  23303. <member name="M:Org.BouncyCastle.Tls.AbstractTlsContext.HandshakeComplete(Org.BouncyCastle.Tls.TlsPeer,Org.BouncyCastle.Tls.TlsSession)">
  23304. <exception cref="T:System.IO.IOException"/>
  23305. </member>
  23306. <member name="T:Org.BouncyCastle.Tls.AbstractTlsKeyExchange">
  23307. <summary>Base class for supporting a TLS key exchange implementation.</summary>
  23308. </member>
  23309. <member name="T:Org.BouncyCastle.Tls.AbstractTlsKeyExchangeFactory">
  23310. <summary>Base class for supporting a TLS key exchange factory implementation.</summary>
  23311. </member>
  23312. <member name="T:Org.BouncyCastle.Tls.AbstractTlsPeer">
  23313. <summary>Base class for a TLS client or server.</summary>
  23314. </member>
  23315. <member name="M:Org.BouncyCastle.Tls.AbstractTlsPeer.GetSupportedVersions">
  23316. <summary>Get the <see cref="T:Org.BouncyCastle.Tls.ProtocolVersion"/> values that are supported by this peer.</summary>
  23317. <remarks>
  23318. WARNING: Mixing DTLS and TLS versions in the returned array is currently NOT supported. Use a separate
  23319. (sub-)class for each case.
  23320. </remarks>
  23321. <returns>an array of supported <see cref="T:Org.BouncyCastle.Tls.ProtocolVersion"/> values.</returns>
  23322. </member>
  23323. <member name="M:Org.BouncyCastle.Tls.AbstractTlsPeer.Cancel">
  23324. <exception cref="T:System.IO.IOException"/>
  23325. </member>
  23326. <member name="M:Org.BouncyCastle.Tls.AbstractTlsPeer.NotifyHandshakeBeginning">
  23327. <exception cref="T:System.IO.IOException"/>
  23328. </member>
  23329. <member name="M:Org.BouncyCastle.Tls.AbstractTlsPeer.NotifySecureRenegotiation(System.Boolean)">
  23330. <exception cref="T:System.IO.IOException"/>
  23331. </member>
  23332. <member name="M:Org.BouncyCastle.Tls.AbstractTlsPeer.GetKeyExchangeFactory">
  23333. <exception cref="T:System.IO.IOException"/>
  23334. </member>
  23335. <member name="M:Org.BouncyCastle.Tls.AbstractTlsPeer.NotifyHandshakeComplete">
  23336. <exception cref="T:System.IO.IOException"/>
  23337. </member>
  23338. <member name="T:Org.BouncyCastle.Tls.AbstractTlsServer">
  23339. <summary>Base class for a TLS server.</summary>
  23340. </member>
  23341. <member name="M:Org.BouncyCastle.Tls.AbstractTlsServer.SelectCipherSuite(System.Int32)">
  23342. <exception cref="T:System.IO.IOException"/>
  23343. </member>
  23344. <member name="T:Org.BouncyCastle.Tls.AlertDescription">
  23345. <summary>RFC 5246 7.2.</summary>
  23346. </member>
  23347. <member name="F:Org.BouncyCastle.Tls.AlertDescription.close_notify">
  23348. <summary>This message notifies the recipient that the sender will not send any more messages on this
  23349. connection.</summary>
  23350. <remarks>
  23351. Note that as of TLS 1.1, failure to properly close a connection no longer requires that a session not be
  23352. resumed. This is a change from TLS 1.0 ("The session becomes unresumable if any connection is terminated
  23353. without proper close_notify messages with level equal to warning.") to conform with widespread
  23354. implementation practice.
  23355. </remarks>
  23356. </member>
  23357. <member name="F:Org.BouncyCastle.Tls.AlertDescription.unexpected_message">
  23358. <summary>An inappropriate message was received.</summary>
  23359. <remarks>
  23360. This alert is always fatal and should never be observed in communication between proper implementations.
  23361. </remarks>
  23362. </member>
  23363. <member name="F:Org.BouncyCastle.Tls.AlertDescription.bad_record_mac">
  23364. <summary>This alert is returned if a record is received with an incorrect MAC.</summary>
  23365. <remarks>
  23366. This alert also MUST be returned if an alert is sent because a TLSCiphertext decrypted in an invalid way:
  23367. either it wasn't an even multiple of the block length, or its padding values, when checked, weren't
  23368. correct. This message is always fatal and should never be observed in communication between proper
  23369. implementations (except when messages were corrupted in the network).
  23370. </remarks>
  23371. </member>
  23372. <member name="F:Org.BouncyCastle.Tls.AlertDescription.decryption_failed">
  23373. <remarks>
  23374. This alert was used in some earlier versions of TLS, and may have permitted certain attacks against the CBC
  23375. mode [CBCATT]. It MUST NOT be sent by compliant implementations.
  23376. </remarks>
  23377. </member>
  23378. <member name="F:Org.BouncyCastle.Tls.AlertDescription.record_overflow">
  23379. <summary>A TLSCiphertext record was received that had a length more than 2^14+2048 bytes, or a record
  23380. decrypted to a TLSCompressed record with more than 2^14+1024 bytes.</summary>
  23381. <remarks>
  23382. This message is always fatal and should never be observed in communication between proper implementations
  23383. (except when messages were corrupted in the network).
  23384. </remarks>
  23385. </member>
  23386. <member name="F:Org.BouncyCastle.Tls.AlertDescription.decompression_failure">
  23387. <summary>The decompression function received improper input (e.g., data that would expand to excessive
  23388. length).</summary>
  23389. <remarks>
  23390. This message is always fatal and should never be observed in communication between proper implementations.
  23391. </remarks>
  23392. </member>
  23393. <member name="F:Org.BouncyCastle.Tls.AlertDescription.handshake_failure">
  23394. <summary>Reception of a handshake_failure alert message indicates that the sender was unable to negotiate
  23395. an acceptable set of security parameters given the options available.</summary>
  23396. <remarks>
  23397. This is a fatal error.
  23398. </remarks>
  23399. </member>
  23400. <member name="F:Org.BouncyCastle.Tls.AlertDescription.no_certificate">
  23401. <remarks>
  23402. This alert was used in SSLv3 but not any version of TLS. It MUST NOT be sent by compliant implementations.
  23403. </remarks>
  23404. </member>
  23405. <member name="F:Org.BouncyCastle.Tls.AlertDescription.bad_certificate">
  23406. <summary>A certificate was corrupt, contained signatures that did not verify correctly, etc.</summary>
  23407. </member>
  23408. <member name="F:Org.BouncyCastle.Tls.AlertDescription.unsupported_certificate">
  23409. <summary>A certificate was of an unsupported type.</summary>
  23410. </member>
  23411. <member name="F:Org.BouncyCastle.Tls.AlertDescription.certificate_revoked">
  23412. <summary>A certificate was revoked by its signer.</summary>
  23413. </member>
  23414. <member name="F:Org.BouncyCastle.Tls.AlertDescription.certificate_expired">
  23415. <summary>A certificate has expired or is not currently valid.</summary>
  23416. </member>
  23417. <member name="F:Org.BouncyCastle.Tls.AlertDescription.certificate_unknown">
  23418. <summary>Some other (unspecified) issue arose in processing the certificate, rendering it unacceptable.
  23419. </summary>
  23420. </member>
  23421. <member name="F:Org.BouncyCastle.Tls.AlertDescription.illegal_parameter">
  23422. <summary>A field in the handshake was out of range or inconsistent with other fields.</summary>
  23423. <remarks>
  23424. This message is always fatal.
  23425. </remarks>
  23426. </member>
  23427. <member name="F:Org.BouncyCastle.Tls.AlertDescription.unknown_ca">
  23428. <summary>A valid certificate chain or partial chain was received, but the certificate was not accepted
  23429. because the CA certificate could not be located or couldn't be matched with a known, trusted CA.</summary>
  23430. <remarks>
  23431. This message is always fatal.
  23432. </remarks>
  23433. </member>
  23434. <member name="F:Org.BouncyCastle.Tls.AlertDescription.access_denied">
  23435. <summary>A valid certificate was received, but when access control was applied, the sender decided not to
  23436. proceed with negotiation.</summary>
  23437. <remarks>
  23438. This message is always fatal.
  23439. </remarks>
  23440. </member>
  23441. <member name="F:Org.BouncyCastle.Tls.AlertDescription.decode_error">
  23442. <summary>A message could not be decoded because some field was out of the specified range or the length of
  23443. the message was incorrect.</summary>
  23444. <remarks>
  23445. This message is always fatal and should never be observed in communication between proper
  23446. implementations (except when messages were corrupted in the network).
  23447. </remarks>
  23448. </member>
  23449. <member name="F:Org.BouncyCastle.Tls.AlertDescription.decrypt_error">
  23450. <summary>A handshake cryptographic operation failed, including being unable to correctly verify a signature
  23451. or validate a Finished message.</summary>
  23452. <remarks>
  23453. This message is always fatal.
  23454. </remarks>
  23455. </member>
  23456. <member name="F:Org.BouncyCastle.Tls.AlertDescription.export_restriction">
  23457. <remarks>
  23458. This alert was used in some earlier versions of TLS. It MUST NOT be sent by compliant implementations.
  23459. </remarks>
  23460. </member>
  23461. <member name="F:Org.BouncyCastle.Tls.AlertDescription.protocol_version">
  23462. <summary>The protocol version the client has attempted to negotiate is recognized but not supported.
  23463. </summary>
  23464. <remarks>
  23465. (For example, old protocol versions might be avoided for security reasons.) This message is always fatal.
  23466. </remarks>
  23467. </member>
  23468. <member name="F:Org.BouncyCastle.Tls.AlertDescription.insufficient_security">
  23469. <summary>Returned instead of handshake_failure when a negotiation has failed specifically because the
  23470. server requires ciphers more secure than those supported by the client.</summary>
  23471. <remarks>
  23472. This message is always fatal.
  23473. </remarks>
  23474. </member>
  23475. <member name="F:Org.BouncyCastle.Tls.AlertDescription.internal_error">
  23476. <summary>An internal error unrelated to the peer or the correctness of the protocol (such as a memory
  23477. allocation failure) makes it impossible to continue.</summary>
  23478. <remarks>
  23479. This message is always fatal.
  23480. </remarks>
  23481. </member>
  23482. <member name="F:Org.BouncyCastle.Tls.AlertDescription.user_canceled">
  23483. <summary>This handshake is being canceled for some reason unrelated to a protocol failure.</summary>
  23484. <remarks>
  23485. If the user cancels an operation after the handshake is complete, just closing the connection by sending a
  23486. close_notify is more appropriate. This alert should be followed by a close_notify. This message is
  23487. generally a warning.
  23488. </remarks>
  23489. </member>
  23490. <member name="F:Org.BouncyCastle.Tls.AlertDescription.no_renegotiation">
  23491. <summary>Sent by the client in response to a hello request or by the server in response to a client hello
  23492. after initial handshaking.</summary>
  23493. <remarks>
  23494. Either of these would normally lead to renegotiation; when that is not appropriate, the recipient should
  23495. respond with this alert. At that point, the original requester can decide whether to proceed with the
  23496. connection. One case where this would be appropriate is where a server has spawned a process to satisfy a
  23497. request; the process might receive security parameters (key length, authentication, etc.) at startup, and
  23498. it might be difficult to communicate changes to these parameters after that point. This message is always a
  23499. warning.
  23500. </remarks>
  23501. </member>
  23502. <member name="F:Org.BouncyCastle.Tls.AlertDescription.unsupported_extension">
  23503. <summary>Sent by clients that receive an extended server hello containing an extension that they did not
  23504. put in the corresponding client hello.</summary>
  23505. <remarks>
  23506. This message is always fatal.
  23507. </remarks>
  23508. </member>
  23509. <member name="F:Org.BouncyCastle.Tls.AlertDescription.certificate_unobtainable">
  23510. <summary>This alert is sent by servers who are unable to retrieve a certificate chain from the URL supplied
  23511. by the client(see Section 3.3).</summary>
  23512. <remarks>
  23513. This message MAY be fatal - for example if client authentication is required by the server for the
  23514. handshake to continue and the server is unable to retrieve the certificate chain, it may send a fatal
  23515. alert.
  23516. </remarks>
  23517. </member>
  23518. <member name="F:Org.BouncyCastle.Tls.AlertDescription.unrecognized_name">
  23519. <summary>This alert is sent by servers that receive a server_name extension request, but do not recognize
  23520. the server name.</summary>
  23521. <remarks>
  23522. This message MAY be fatal.
  23523. </remarks>
  23524. </member>
  23525. <member name="F:Org.BouncyCastle.Tls.AlertDescription.bad_certificate_status_response">
  23526. <summary>This alert is sent by clients that receive an invalid certificate status response (see Section 3.6
  23527. ).</summary>
  23528. <remarks>
  23529. This message is always fatal.
  23530. </remarks>
  23531. </member>
  23532. <member name="F:Org.BouncyCastle.Tls.AlertDescription.bad_certificate_hash_value">
  23533. <summary>This alert is sent by servers when a certificate hash does not match a client provided
  23534. certificate_hash.</summary>
  23535. <remarks>
  23536. This message is always fatal.
  23537. </remarks>
  23538. </member>
  23539. <member name="F:Org.BouncyCastle.Tls.AlertDescription.unknown_psk_identity">
  23540. <summary>If the server does not recognize the PSK identity, it MAY respond with an "unknown_psk_identity"
  23541. alert message.</summary>
  23542. </member>
  23543. <member name="F:Org.BouncyCastle.Tls.AlertDescription.no_application_protocol">
  23544. <summary>In the event that the server supports no protocols that the client advertises, then the server
  23545. SHALL respond with a fatal "no_application_protocol" alert.</summary>
  23546. </member>
  23547. <member name="F:Org.BouncyCastle.Tls.AlertDescription.inappropriate_fallback">
  23548. <summary>If TLS_FALLBACK_SCSV appears in ClientHello.cipher_suites and the highest protocol version
  23549. supported by the server is higher than the version indicated in ClientHello.client_version, the server MUST
  23550. respond with a fatal inappropriate_fallback alert[..].</summary>
  23551. </member>
  23552. <member name="F:Org.BouncyCastle.Tls.AlertDescription.missing_extension">
  23553. <summary>Sent by endpoints that receive a handshake message not containing an extension that is mandatory
  23554. to send for the offered TLS version or other negotiated parameters.</summary>
  23555. </member>
  23556. <member name="F:Org.BouncyCastle.Tls.AlertDescription.certificate_required">
  23557. <summary>Sent by servers when a client certificate is desired but none was provided by the client.
  23558. </summary>
  23559. </member>
  23560. <member name="T:Org.BouncyCastle.Tls.AlertLevel">
  23561. <summary>RFC 5246 7.2</summary>
  23562. </member>
  23563. <member name="T:Org.BouncyCastle.Tls.BasicTlsPskIdentity">
  23564. <summary>A basic PSK Identity holder.</summary>
  23565. </member>
  23566. <member name="T:Org.BouncyCastle.Tls.BasicTlsSrpIdentity">
  23567. <summary>A basic SRP Identity holder.</summary>
  23568. </member>
  23569. <member name="T:Org.BouncyCastle.Tls.ByteQueue">
  23570. <summary>A queue for bytes. This file could be more optimized.</summary>
  23571. </member>
  23572. <member name="M:Org.BouncyCastle.Tls.ByteQueue.NextTwoPow(System.Int32)">
  23573. <returns>The smallest number which can be written as 2^x which is bigger than i.</returns>
  23574. </member>
  23575. <member name="F:Org.BouncyCastle.Tls.ByteQueue.m_databuf">
  23576. <summary>The buffer where we store our data.</summary>
  23577. </member>
  23578. <member name="F:Org.BouncyCastle.Tls.ByteQueue.m_skipped">
  23579. <summary>How many bytes at the beginning of the buffer are skipped.</summary>
  23580. </member>
  23581. <member name="F:Org.BouncyCastle.Tls.ByteQueue.m_available">
  23582. <summary>How many bytes in the buffer are valid data.</summary>
  23583. </member>
  23584. <member name="M:Org.BouncyCastle.Tls.ByteQueue.AddData(System.Byte[],System.Int32,System.Int32)">
  23585. <summary>Add some data to our buffer.</summary>
  23586. <param name="buf">A byte-array to read data from.</param>
  23587. <param name="off">How many bytes to skip at the beginning of the array.</param>
  23588. <param name="len">How many bytes to read from the array.</param>
  23589. </member>
  23590. <member name="P:Org.BouncyCastle.Tls.ByteQueue.Available">
  23591. <returns>The number of bytes which are available in this buffer.</returns>
  23592. </member>
  23593. <member name="M:Org.BouncyCastle.Tls.ByteQueue.CopyTo(System.IO.Stream,System.Int32)">
  23594. <summary>Copy some bytes from the beginning of the data to the provided <see cref="T:System.IO.Stream"/>.</summary>
  23595. <param name="output">The <see cref="T:System.IO.Stream"/> to copy the bytes to.</param>
  23596. <param name="length">How many bytes to copy.</param>
  23597. </member>
  23598. <member name="M:Org.BouncyCastle.Tls.ByteQueue.Read(System.Byte[],System.Int32,System.Int32,System.Int32)">
  23599. <summary>Read data from the buffer.</summary>
  23600. <param name="buf">The buffer where the read data will be copied to.</param>
  23601. <param name="offset">How many bytes to skip at the beginning of buf.</param>
  23602. <param name="len">How many bytes to read at all.</param>
  23603. <param name="skip">How many bytes from our data to skip.</param>
  23604. </member>
  23605. <member name="M:Org.BouncyCastle.Tls.ByteQueue.ReadHandshakeMessage(System.Int32)">
  23606. <summary>Return a <see cref="T:Org.BouncyCastle.Tls.HandshakeMessageInput"/> over some bytes at the beginning of the data.
  23607. </summary>
  23608. <param name="length">How many bytes will be readable.</param>
  23609. <returns>A <see cref="T:Org.BouncyCastle.Tls.HandshakeMessageInput"/> over the data.</returns>
  23610. </member>
  23611. <member name="M:Org.BouncyCastle.Tls.ByteQueue.RemoveData(System.Int32)">
  23612. <summary>Remove some bytes from our data from the beginning.</summary>
  23613. <param name="i">How many bytes to remove.</param>
  23614. </member>
  23615. <member name="M:Org.BouncyCastle.Tls.ByteQueue.RemoveData(System.Byte[],System.Int32,System.Int32,System.Int32)">
  23616. <summary>Remove data from the buffer.</summary>
  23617. <param name="buf">The buffer where the removed data will be copied to.</param>
  23618. <param name="off">How many bytes to skip at the beginning of buf.</param>
  23619. <param name="len">How many bytes to read at all.</param>
  23620. <param name="skip">How many bytes from our data to skip.</param>
  23621. </member>
  23622. <member name="T:Org.BouncyCastle.Tls.ByteQueueOutputStream">
  23623. <summary>OutputStream based on a ByteQueue implementation.</summary>
  23624. </member>
  23625. <member name="T:Org.BouncyCastle.Tls.CertChainType">
  23626. <summary>Implementation of the RFC 3546 3.3. CertChainType.</summary>
  23627. </member>
  23628. <member name="T:Org.BouncyCastle.Tls.Certificate">
  23629. <summary>Parsing and encoding of a <i>Certificate</i> struct from RFC 4346.</summary>
  23630. <remarks>
  23631. <pre>
  23632. opaque ASN.1Cert&lt;2^24-1&gt;;
  23633. struct {
  23634. ASN.1Cert certificate_list&lt;0..2^24-1&gt;;
  23635. } Certificate;
  23636. </pre>
  23637. </remarks>
  23638. </member>
  23639. <member name="M:Org.BouncyCastle.Tls.Certificate.GetCertificateList">
  23640. <returns>an array of <see cref="T:Org.BouncyCastle.Tls.Crypto.TlsCertificate"/> representing a certificate chain.</returns>
  23641. </member>
  23642. <member name="P:Org.BouncyCastle.Tls.Certificate.IsEmpty">
  23643. <returns><c>true</c> if this certificate chain contains no certificates, or <c>false</c> otherwise.
  23644. </returns>
  23645. </member>
  23646. <member name="M:Org.BouncyCastle.Tls.Certificate.Encode(Org.BouncyCastle.Tls.TlsContext,System.IO.Stream,System.IO.Stream)">
  23647. <summary>Encode this <see cref="T:Org.BouncyCastle.Tls.Certificate"/> to a <see cref="T:System.IO.Stream"/>, and optionally calculate the
  23648. "end point hash" (per RFC 5929's tls-server-end-point binding).</summary>
  23649. <param name="context">the <see cref="T:Org.BouncyCastle.Tls.TlsContext"/> of the current connection.</param>
  23650. <param name="messageOutput">the <see cref="T:System.IO.Stream"/> to encode to.</param>
  23651. <param name="endPointHashOutput">the <see cref="T:System.IO.Stream"/> to write the "end point hash" to (or null).
  23652. </param>
  23653. <exception cref="T:System.IO.IOException"/>
  23654. </member>
  23655. <member name="M:Org.BouncyCastle.Tls.Certificate.Parse(Org.BouncyCastle.Tls.Certificate.ParseOptions,Org.BouncyCastle.Tls.TlsContext,System.IO.Stream,System.IO.Stream)">
  23656. <summary>Parse a <see cref="T:Org.BouncyCastle.Tls.Certificate"/> from a <see cref="T:System.IO.Stream"/>.</summary>
  23657. <param name="options">the <see cref="T:Org.BouncyCastle.Tls.Certificate.ParseOptions"/> to apply during parsing.</param>
  23658. <param name="context">the <see cref="T:Org.BouncyCastle.Tls.TlsContext"/> of the current connection.</param>
  23659. <param name="messageInput">the <see cref="T:System.IO.Stream"/> to parse from.</param>
  23660. <param name="endPointHashOutput">the <see cref="T:System.IO.Stream"/> to write the "end point hash" to (or null).
  23661. </param>
  23662. <returns>a <see cref="T:Org.BouncyCastle.Tls.Certificate"/> object.</returns>
  23663. <exception cref="T:System.IO.IOException"/>
  23664. </member>
  23665. <member name="T:Org.BouncyCastle.Tls.CertificateRequest">
  23666. <summary>Parsing and encoding of a <i>CertificateRequest</i> struct from RFC 4346.</summary>
  23667. <remarks>
  23668. <pre>
  23669. struct {
  23670. ClientCertificateType certificate_types&lt;1..2^8-1&gt;;
  23671. DistinguishedName certificate_authorities&lt;3..2^16-1&gt;;
  23672. } CertificateRequest;
  23673. </pre>
  23674. Updated for RFC 5246:
  23675. <pre>
  23676. struct {
  23677. ClientCertificateType certificate_types &lt;1..2 ^ 8 - 1&gt;;
  23678. SignatureAndHashAlgorithm supported_signature_algorithms &lt;2 ^ 16 - 1&gt;;
  23679. DistinguishedName certificate_authorities &lt;0..2 ^ 16 - 1&gt;;
  23680. } CertificateRequest;
  23681. </pre>
  23682. Revised for RFC 8446:
  23683. <pre>
  23684. struct {
  23685. opaque certificate_request_context &lt;0..2 ^ 8 - 1&gt;;
  23686. Extension extensions &lt;2..2 ^ 16 - 1&gt;;
  23687. } CertificateRequest;
  23688. </pre>
  23689. </remarks>
  23690. <seealso cref="T:Org.BouncyCastle.Tls.ClientCertificateType"/>
  23691. <seealso cref="T:Org.BouncyCastle.Asn1.X509.X509Name"/>
  23692. </member>
  23693. <member name="M:Org.BouncyCastle.Tls.CertificateRequest.CheckSupportedSignatureAlgorithms(System.Collections.IList,System.Int16)">
  23694. <exception cref="T:System.IO.IOException"/>
  23695. </member>
  23696. <member name="M:Org.BouncyCastle.Tls.CertificateRequest.#ctor(System.Int16[],System.Collections.IList,System.Collections.IList)">
  23697. <param name="certificateTypes">see <see cref="T:Org.BouncyCastle.Tls.ClientCertificateType"/> for valid constants.</param>
  23698. <param name="supportedSignatureAlgorithms"></param>
  23699. <param name="certificateAuthorities">an <see cref="T:System.Collections.IList"/> of <see cref="T:Org.BouncyCastle.Asn1.X509.X509Name"/>.</param>
  23700. </member>
  23701. <member name="M:Org.BouncyCastle.Tls.CertificateRequest.#ctor(System.Byte[],System.Collections.IList,System.Collections.IList,System.Collections.IList)">
  23702. <exception cref="T:System.IO.IOException"/>
  23703. </member>
  23704. <member name="P:Org.BouncyCastle.Tls.CertificateRequest.CertificateTypes">
  23705. <returns>an array of certificate types</returns>
  23706. <seealso cref="T:Org.BouncyCastle.Tls.ClientCertificateType"/>
  23707. </member>
  23708. <member name="P:Org.BouncyCastle.Tls.CertificateRequest.SupportedSignatureAlgorithms">
  23709. <returns>an <see cref="T:System.Collections.IList"/> of <see cref="T:Org.BouncyCastle.Tls.SignatureAndHashAlgorithm"/> (or null before TLS 1.2).
  23710. </returns>
  23711. </member>
  23712. <member name="P:Org.BouncyCastle.Tls.CertificateRequest.SupportedSignatureAlgorithmsCert">
  23713. <returns>an optional <see cref="T:System.Collections.IList"/> of <see cref="T:Org.BouncyCastle.Tls.SignatureAndHashAlgorithm"/>. May be non-null from
  23714. TLS 1.3 onwards.</returns>
  23715. </member>
  23716. <member name="P:Org.BouncyCastle.Tls.CertificateRequest.CertificateAuthorities">
  23717. <returns>an <see cref="T:System.Collections.IList"/> of <see cref="T:Org.BouncyCastle.Asn1.X509.X509Name"/>.</returns>
  23718. </member>
  23719. <member name="M:Org.BouncyCastle.Tls.CertificateRequest.Encode(Org.BouncyCastle.Tls.TlsContext,System.IO.Stream)">
  23720. <summary>Encode this <see cref="T:Org.BouncyCastle.Tls.CertificateRequest"/> to a <see cref="T:System.IO.Stream"/>.</summary>
  23721. <param name="context">the <see cref="T:Org.BouncyCastle.Tls.TlsContext"/> of the current connection.</param>
  23722. <param name="output">the <see cref="T:System.IO.Stream"/> to encode to.</param>
  23723. <exception cref="T:System.IO.IOException"/>
  23724. </member>
  23725. <member name="M:Org.BouncyCastle.Tls.CertificateRequest.Parse(Org.BouncyCastle.Tls.TlsContext,System.IO.Stream)">
  23726. <summary>Parse a <see cref="T:Org.BouncyCastle.Tls.CertificateRequest"/> from a <see cref="T:System.IO.Stream"/></summary>
  23727. <param name="context">the <see cref="T:Org.BouncyCastle.Tls.TlsContext"/> of the current connection.</param>
  23728. <param name="input">the <see cref="T:System.IO.Stream"/> to parse from.</param>
  23729. <returns>a <see cref="T:Org.BouncyCastle.Tls.CertificateRequest"/> object.</returns>
  23730. <exception cref="T:System.IO.IOException"/>
  23731. </member>
  23732. <member name="P:Org.BouncyCastle.Tls.CertificateStatus.OcspResponseList">
  23733. <summary>an <see cref="T:System.Collections.IList"/> of (possibly null) <see cref="T:Org.BouncyCastle.Asn1.Ocsp.OcspResponse"/>.</summary>
  23734. </member>
  23735. <member name="M:Org.BouncyCastle.Tls.CertificateStatus.Encode(System.IO.Stream)">
  23736. <summary>Encode this <see cref="T:Org.BouncyCastle.Tls.CertificateStatus"/> to a <see cref="T:System.IO.Stream"/>.</summary>
  23737. <param name="output">the <see cref="T:System.IO.Stream"/> to encode to.</param>
  23738. <exception cref="T:System.IO.IOException"/>
  23739. </member>
  23740. <member name="M:Org.BouncyCastle.Tls.CertificateStatus.Parse(Org.BouncyCastle.Tls.TlsContext,System.IO.Stream)">
  23741. <summary>Parse a <see cref="T:Org.BouncyCastle.Tls.CertificateStatus"/> from a <see cref="T:System.IO.Stream"/>.</summary>
  23742. <param name="context">the <see cref="T:Org.BouncyCastle.Tls.TlsContext"/> of the current connection.</param>
  23743. <param name="input">the <see cref="T:System.IO.Stream"/> to parse from.</param>
  23744. <returns>a <see cref="T:Org.BouncyCastle.Tls.CertificateStatus"/> object.</returns>
  23745. <exception cref="T:System.IO.IOException"/>
  23746. </member>
  23747. <member name="M:Org.BouncyCastle.Tls.CertificateStatus.RequireStatusRequestVersion(System.Int32,System.Int32)">
  23748. <exception cref="T:System.IO.IOException"/>
  23749. </member>
  23750. <member name="T:Org.BouncyCastle.Tls.CertificateStatusRequest">
  23751. <summary>Implementation of the RFC 3546 3.6. CertificateStatusRequest.</summary>
  23752. </member>
  23753. <member name="M:Org.BouncyCastle.Tls.CertificateStatusRequest.Encode(System.IO.Stream)">
  23754. <summary>Encode this <see cref="T:Org.BouncyCastle.Tls.CertificateStatusRequest"/> to a <see cref="T:System.IO.Stream"/>.</summary>
  23755. <param name="output">the <see cref="T:System.IO.Stream"/> to encode to.</param>
  23756. <exception cref="T:System.IO.IOException"/>
  23757. </member>
  23758. <member name="M:Org.BouncyCastle.Tls.CertificateStatusRequest.Parse(System.IO.Stream)">
  23759. <summary>Parse a <see cref="T:Org.BouncyCastle.Tls.CertificateStatusRequest"/> from a <see cref="T:System.IO.Stream"/>.</summary>
  23760. <param name="input">the <see cref="T:System.IO.Stream"/> to parse from.</param>
  23761. <returns>a <see cref="T:Org.BouncyCastle.Tls.CertificateStatusRequest"/> object.</returns>
  23762. <exception cref="T:System.IO.IOException"/>
  23763. </member>
  23764. <member name="T:Org.BouncyCastle.Tls.CertificateStatusRequestItemV2">
  23765. <summary>Implementation of the RFC 6961 2.2. CertificateStatusRequestItemV2.</summary>
  23766. </member>
  23767. <member name="M:Org.BouncyCastle.Tls.CertificateStatusRequestItemV2.Encode(System.IO.Stream)">
  23768. <summary>Encode this <see cref="T:Org.BouncyCastle.Tls.CertificateStatusRequestItemV2"/> to a <see cref="T:System.IO.Stream"/>.</summary>
  23769. <param name="output">the <see cref="T:System.IO.Stream"/> to encode to.</param>
  23770. <exception cref="T:System.IO.IOException"/>
  23771. </member>
  23772. <member name="M:Org.BouncyCastle.Tls.CertificateStatusRequestItemV2.Parse(System.IO.Stream)">
  23773. <summary>Parse a <see cref="T:Org.BouncyCastle.Tls.CertificateStatusRequestItemV2"/> from a <see cref="T:System.IO.Stream"/>.</summary>
  23774. <param name="input">the <see cref="T:System.IO.Stream"/> to parse from.</param>
  23775. <returns>a <see cref="T:Org.BouncyCastle.Tls.CertificateStatusRequestItemV2"/> object.</returns>
  23776. <exception cref="T:System.IO.IOException"/>
  23777. </member>
  23778. <member name="T:Org.BouncyCastle.Tls.CertificateType">
  23779. <summary>RFC 6091</summary>
  23780. </member>
  23781. <member name="T:Org.BouncyCastle.Tls.CertificateUrl">
  23782. <summary>RFC 3546 3.3</summary>
  23783. </member>
  23784. <member name="M:Org.BouncyCastle.Tls.CertificateUrl.#ctor(System.Int16,System.Collections.IList)">
  23785. <param name="type">see <see cref="T:Org.BouncyCastle.Tls.CertChainType"/> for valid constants.</param>
  23786. <param name="urlAndHashList">an <see cref="T:System.Collections.IList"/> of <see cref="T:Org.BouncyCastle.Tls.UrlAndHash"/>.</param>
  23787. </member>
  23788. <member name="P:Org.BouncyCastle.Tls.CertificateUrl.Type">
  23789. <returns><see cref="T:Org.BouncyCastle.Tls.CertChainType"/></returns>
  23790. </member>
  23791. <member name="P:Org.BouncyCastle.Tls.CertificateUrl.UrlAndHashList">
  23792. <returns>an <see cref="T:System.Collections.IList"/> of <see cref="T:Org.BouncyCastle.Tls.UrlAndHash"/>.</returns>
  23793. </member>
  23794. <member name="M:Org.BouncyCastle.Tls.CertificateUrl.Encode(System.IO.Stream)">
  23795. <summary>Encode this <see cref="T:Org.BouncyCastle.Tls.CertificateUrl"/> to a <see cref="T:System.IO.Stream"/>.</summary>
  23796. <param name="output">the <see cref="T:System.IO.Stream"/> to encode to.</param>
  23797. <exception cref="T:System.IO.IOException"/>
  23798. </member>
  23799. <member name="M:Org.BouncyCastle.Tls.CertificateUrl.Parse(Org.BouncyCastle.Tls.TlsContext,System.IO.Stream)">
  23800. <summary>Parse a <see cref="T:Org.BouncyCastle.Tls.CertificateUrl"/> from a <see cref="T:System.IO.Stream"/>.</summary>
  23801. <param name="context">the <see cref="T:Org.BouncyCastle.Tls.TlsContext"/> of the current connection.</param>
  23802. <param name="input">the <see cref="T:System.IO.Stream"/> to parse from.</param>
  23803. <returns>a <see cref="T:Org.BouncyCastle.Tls.CertificateUrl"/> object.</returns>
  23804. <exception cref="T:System.IO.IOException"/>
  23805. </member>
  23806. <member name="T:Org.BouncyCastle.Tls.ChannelBinding">
  23807. <summary>RFC 5056</summary>
  23808. <remarks>
  23809. Note that the values here are implementation-specific and arbitrary. It is recommended not to depend on the
  23810. particular values (e.g.serialization).
  23811. </remarks>
  23812. </member>
  23813. <member name="T:Org.BouncyCastle.Tls.CipherSuite">
  23814. <summary>RFC 2246 A.5</summary>
  23815. </member>
  23816. <member name="T:Org.BouncyCastle.Tls.CipherType">
  23817. <summary>RFC 2246</summary>
  23818. <remarks>
  23819. Note that the values here are implementation-specific and arbitrary. It is recommended not to depend on the
  23820. particular values (e.g. serialization).
  23821. </remarks>
  23822. </member>
  23823. <member name="M:Org.BouncyCastle.Tls.ClientHello.Encode(Org.BouncyCastle.Tls.TlsContext,System.IO.Stream)">
  23824. <summary>Encode this <see cref="T:Org.BouncyCastle.Tls.ClientHello"/> to a <see cref="T:System.IO.Stream"/>.</summary>
  23825. <param name="context">the <see cref="T:Org.BouncyCastle.Tls.TlsContext"/> of the current connection.</param>
  23826. <param name="output">the <see cref="T:System.IO.Stream"/> to encode to.</param>
  23827. <exception cref="T:System.IO.IOException"/>
  23828. </member>
  23829. <member name="M:Org.BouncyCastle.Tls.ClientHello.Parse(System.IO.MemoryStream,System.IO.Stream)">
  23830. <summary>Parse a <see cref="T:Org.BouncyCastle.Tls.ClientHello"/> from a <see cref="T:System.IO.MemoryStream"/>.</summary>
  23831. <param name="messageInput">the <see cref="T:System.IO.MemoryStream"/> to parse from.</param>
  23832. <param name="dtlsOutput">for DTLS this should be non-null; the input is copied to this
  23833. <see cref="T:System.IO.Stream"/>, minus the cookie field.</param>
  23834. <returns>a <see cref="T:Org.BouncyCastle.Tls.ClientHello"/> object.</returns>
  23835. <exception cref="T:Org.BouncyCastle.Tls.TlsFatalAlert"/>
  23836. </member>
  23837. <member name="M:Org.BouncyCastle.Tls.ClientHello.ImplParse(System.IO.MemoryStream,System.IO.Stream)">
  23838. <exception cref="T:System.IO.IOException"/>
  23839. </member>
  23840. <member name="T:Org.BouncyCastle.Tls.CombinedHash">
  23841. <summary>A combined hash, which implements md5(m) || sha1(m).</summary>
  23842. </member>
  23843. <member name="T:Org.BouncyCastle.Tls.CompressionMethod">
  23844. <summary>RFC 2246 6.1</summary>
  23845. </member>
  23846. <member name="T:Org.BouncyCastle.Tls.ConnectionEnd">
  23847. <summary>RFC 2246</summary>
  23848. <remarks>
  23849. Note that the values here are implementation-specific and arbitrary. It is recommended not to depend on the
  23850. particular values(e.g.serialization).
  23851. </remarks>
  23852. </member>
  23853. <member name="T:Org.BouncyCastle.Tls.ContentType">
  23854. <summary>RFC 2246 6.2.1</summary>
  23855. </member>
  23856. <member name="T:Org.BouncyCastle.Tls.Crypto.DHGroup">
  23857. <summary>Carrier class for Diffie-Hellman group parameters.</summary>
  23858. </member>
  23859. <member name="M:Org.BouncyCastle.Tls.Crypto.DHGroup.#ctor(Org.BouncyCastle.Math.BigInteger,Org.BouncyCastle.Math.BigInteger,Org.BouncyCastle.Math.BigInteger,System.Int32)">
  23860. <summary>Base constructor with the prime factor of (p - 1).</summary>
  23861. <param name="p">the prime modulus.</param>
  23862. <param name="q">specifies the prime factor of (p - 1).</param>
  23863. <param name="g">the base generator.</param>
  23864. <param name="l"></param>
  23865. </member>
  23866. <member name="T:Org.BouncyCastle.Tls.Crypto.DHStandardGroups">
  23867. <summary>Standard Diffie-Hellman groups from various IETF specifications.</summary>
  23868. </member>
  23869. <member name="T:Org.BouncyCastle.Tls.Crypto.Impl.AbstractTlsCrypto">
  23870. <summary>Base class for a TlsCrypto implementation that provides some needed methods from elsewhere in the impl
  23871. package.</summary>
  23872. </member>
  23873. <member name="T:Org.BouncyCastle.Tls.Crypto.Impl.AbstractTlsSecret">
  23874. <summary>Base class for a TlsSecret implementation which captures common code and fields.</summary>
  23875. </member>
  23876. <member name="M:Org.BouncyCastle.Tls.Crypto.Impl.AbstractTlsSecret.#ctor(System.Byte[])">
  23877. <summary>Base constructor.</summary>
  23878. <param name="data">the byte[] making up the secret value.</param>
  23879. </member>
  23880. <member name="M:Org.BouncyCastle.Tls.Crypto.Impl.AbstractTlsSecret.Encrypt(Org.BouncyCastle.Tls.Crypto.TlsEncryptor)">
  23881. <exception cref="T:System.IO.IOException"/>
  23882. </member>
  23883. <member name="T:Org.BouncyCastle.Tls.Crypto.Impl.BC.BcDefaultTlsCredentialedAgreement">
  23884. <summay>Credentialed class generating agreed secrets from a peer's public key for our end of the TLS connection
  23885. using the BC light-weight API.</summay>
  23886. </member>
  23887. <member name="T:Org.BouncyCastle.Tls.Crypto.Impl.BC.BcDefaultTlsCredentialedDecryptor">
  23888. <summary>Credentialed class decrypting RSA encrypted secrets sent from a peer for our end of the TLS connection
  23889. using the BC light-weight API.</summary>
  23890. </member>
  23891. <member name="T:Org.BouncyCastle.Tls.Crypto.Impl.BC.BcDefaultTlsCredentialedSigner">
  23892. <summary>Credentialed class for generating signatures based on the use of primitives from the BC light-weight API.</summary>
  23893. </member>
  23894. <member name="T:Org.BouncyCastle.Tls.Crypto.Impl.BC.BcSsl3Hmac">
  23895. <summary>HMAC implementation based on original internet draft for HMAC (RFC 2104).</summary>
  23896. <remarks>
  23897. The difference is that padding is concatenated versus XORed with the key, e.g:
  23898. <code>H(K + opad, H(K + ipad, text))</code>
  23899. </remarks>
  23900. </member>
  23901. <member name="M:Org.BouncyCastle.Tls.Crypto.Impl.BC.BcSsl3Hmac.#ctor(Org.BouncyCastle.Crypto.IDigest)">
  23902. <summary>Base constructor for one of the standard digest algorithms for which the byteLength is known.
  23903. </summary>
  23904. <remarks>
  23905. Behaviour is undefined for digests other than MD5 or SHA1.
  23906. </remarks>
  23907. <param name="digest">the digest.</param>
  23908. </member>
  23909. <member name="M:Org.BouncyCastle.Tls.Crypto.Impl.BC.BcSsl3Hmac.Reset">
  23910. Reset the mac generator.
  23911. </member>
  23912. <member name="T:Org.BouncyCastle.Tls.Crypto.Impl.BC.BcTlsCertificate">
  23913. <summary>Implementation class for a single X.509 certificate based on the BC light-weight API.</summary>
  23914. </member>
  23915. <member name="M:Org.BouncyCastle.Tls.Crypto.Impl.BC.BcTlsCertificate.Convert(Org.BouncyCastle.Tls.Crypto.Impl.BC.BcTlsCrypto,Org.BouncyCastle.Tls.Crypto.TlsCertificate)">
  23916. <exception cref="T:System.IO.IOException"/>
  23917. </member>
  23918. <member name="M:Org.BouncyCastle.Tls.Crypto.Impl.BC.BcTlsCertificate.ParseCertificate(System.Byte[])">
  23919. <exception cref="T:System.IO.IOException"/>
  23920. </member>
  23921. <member name="M:Org.BouncyCastle.Tls.Crypto.Impl.BC.BcTlsCertificate.#ctor(Org.BouncyCastle.Tls.Crypto.Impl.BC.BcTlsCrypto,System.Byte[])">
  23922. <exception cref="T:System.IO.IOException"/>
  23923. </member>
  23924. <member name="M:Org.BouncyCastle.Tls.Crypto.Impl.BC.BcTlsCertificate.CreateEncryptor(System.Int32)">
  23925. <exception cref="T:System.IO.IOException"/>
  23926. </member>
  23927. <member name="M:Org.BouncyCastle.Tls.Crypto.Impl.BC.BcTlsCertificate.CreateVerifier(System.Int16)">
  23928. <exception cref="T:System.IO.IOException"/>
  23929. </member>
  23930. <member name="M:Org.BouncyCastle.Tls.Crypto.Impl.BC.BcTlsCertificate.CreateVerifier(System.Int32)">
  23931. <exception cref="T:System.IO.IOException"/>
  23932. </member>
  23933. <member name="M:Org.BouncyCastle.Tls.Crypto.Impl.BC.BcTlsCertificate.GetEncoded">
  23934. <exception cref="T:System.IO.IOException"/>
  23935. </member>
  23936. <member name="M:Org.BouncyCastle.Tls.Crypto.Impl.BC.BcTlsCertificate.GetExtension(Org.BouncyCastle.Asn1.DerObjectIdentifier)">
  23937. <exception cref="T:System.IO.IOException"/>
  23938. </member>
  23939. <member name="M:Org.BouncyCastle.Tls.Crypto.Impl.BC.BcTlsCertificate.GetLegacySignatureAlgorithm">
  23940. <exception cref="T:System.IO.IOException"/>
  23941. </member>
  23942. <member name="M:Org.BouncyCastle.Tls.Crypto.Impl.BC.BcTlsCertificate.GetPubKeyDH">
  23943. <exception cref="T:System.IO.IOException"/>
  23944. </member>
  23945. <member name="M:Org.BouncyCastle.Tls.Crypto.Impl.BC.BcTlsCertificate.GetPubKeyDss">
  23946. <exception cref="T:System.IO.IOException"/>
  23947. </member>
  23948. <member name="M:Org.BouncyCastle.Tls.Crypto.Impl.BC.BcTlsCertificate.GetPubKeyEC">
  23949. <exception cref="T:System.IO.IOException"/>
  23950. </member>
  23951. <member name="M:Org.BouncyCastle.Tls.Crypto.Impl.BC.BcTlsCertificate.GetPubKeyEd25519">
  23952. <exception cref="T:System.IO.IOException"/>
  23953. </member>
  23954. <member name="M:Org.BouncyCastle.Tls.Crypto.Impl.BC.BcTlsCertificate.GetPubKeyEd448">
  23955. <exception cref="T:System.IO.IOException"/>
  23956. </member>
  23957. <member name="M:Org.BouncyCastle.Tls.Crypto.Impl.BC.BcTlsCertificate.GetPubKeyRsa">
  23958. <exception cref="T:System.IO.IOException"/>
  23959. </member>
  23960. <member name="M:Org.BouncyCastle.Tls.Crypto.Impl.BC.BcTlsCertificate.SupportsSignatureAlgorithm(System.Int16)">
  23961. <exception cref="T:System.IO.IOException"/>
  23962. </member>
  23963. <member name="M:Org.BouncyCastle.Tls.Crypto.Impl.BC.BcTlsCertificate.SupportsSignatureAlgorithmCA(System.Int16)">
  23964. <exception cref="T:System.IO.IOException"/>
  23965. </member>
  23966. <member name="M:Org.BouncyCastle.Tls.Crypto.Impl.BC.BcTlsCertificate.CheckUsageInRole(System.Int32)">
  23967. <exception cref="T:System.IO.IOException"/>
  23968. </member>
  23969. <member name="M:Org.BouncyCastle.Tls.Crypto.Impl.BC.BcTlsCertificate.GetPublicKey">
  23970. <exception cref="T:System.IO.IOException"/>
  23971. </member>
  23972. <member name="M:Org.BouncyCastle.Tls.Crypto.Impl.BC.BcTlsCertificate.SupportsSignatureAlgorithm(System.Int16,System.Int32)">
  23973. <exception cref="T:System.IO.IOException"/>
  23974. </member>
  23975. <member name="M:Org.BouncyCastle.Tls.Crypto.Impl.BC.BcTlsCertificate.ValidateKeyUsage(System.Int32)">
  23976. <exception cref="T:System.IO.IOException"/>
  23977. </member>
  23978. <member name="M:Org.BouncyCastle.Tls.Crypto.Impl.BC.BcTlsCertificate.ValidateRsa_Pkcs1">
  23979. <exception cref="T:System.IO.IOException"/>
  23980. </member>
  23981. <member name="M:Org.BouncyCastle.Tls.Crypto.Impl.BC.BcTlsCertificate.ValidateRsa_Pss_Pss(System.Int16)">
  23982. <exception cref="T:System.IO.IOException"/>
  23983. </member>
  23984. <member name="M:Org.BouncyCastle.Tls.Crypto.Impl.BC.BcTlsCertificate.ValidateRsa_Pss_Rsae">
  23985. <exception cref="T:System.IO.IOException"/>
  23986. </member>
  23987. <member name="T:Org.BouncyCastle.Tls.Crypto.Impl.BC.BcTlsCrypto">
  23988. Class for providing cryptographic services for TLS based on implementations in the BC light-weight API.
  23989. <p>
  23990. This class provides default implementations for everything. If you need to customise it, extend the class
  23991. and override the appropriate methods.
  23992. </p>
  23993. </member>
  23994. <member name="T:Org.BouncyCastle.Tls.Crypto.Impl.BC.BcTlsDH">
  23995. <summary>Support class for ephemeral Diffie-Hellman using the BC light-weight library.</summary>
  23996. </member>
  23997. <member name="M:Org.BouncyCastle.Tls.Crypto.Impl.BC.BcTlsDH.GenerateEphemeral">
  23998. <exception cref="T:System.IO.IOException"/>
  23999. </member>
  24000. <member name="M:Org.BouncyCastle.Tls.Crypto.Impl.BC.BcTlsDH.ReceivePeerValue(System.Byte[])">
  24001. <exception cref="T:System.IO.IOException"/>
  24002. </member>
  24003. <member name="M:Org.BouncyCastle.Tls.Crypto.Impl.BC.BcTlsDH.CalculateSecret">
  24004. <exception cref="T:System.IO.IOException"/>
  24005. </member>
  24006. <member name="T:Org.BouncyCastle.Tls.Crypto.Impl.BC.BcTlsDHDomain">
  24007. <summary>BC light-weight support class for Diffie-Hellman key pair generation and key agreement over a
  24008. specified Diffie-Hellman configuration.</summary>
  24009. </member>
  24010. <member name="M:Org.BouncyCastle.Tls.Crypto.Impl.BC.BcTlsDHDomain.DecodeParameter(System.Byte[])">
  24011. <exception cref="T:System.IO.IOException"/>
  24012. </member>
  24013. <member name="M:Org.BouncyCastle.Tls.Crypto.Impl.BC.BcTlsDHDomain.DecodePublicKey(System.Byte[])">
  24014. <exception cref="T:System.IO.IOException"/>
  24015. </member>
  24016. <member name="M:Org.BouncyCastle.Tls.Crypto.Impl.BC.BcTlsDHDomain.EncodeParameter(Org.BouncyCastle.Math.BigInteger)">
  24017. <exception cref="T:System.IO.IOException"/>
  24018. </member>
  24019. <member name="M:Org.BouncyCastle.Tls.Crypto.Impl.BC.BcTlsDHDomain.EncodePublicKey(Org.BouncyCastle.Crypto.Parameters.DHPublicKeyParameters)">
  24020. <exception cref="T:System.IO.IOException"/>
  24021. </member>
  24022. <member name="T:Org.BouncyCastle.Tls.Crypto.Impl.BC.BcTlsDsaSigner">
  24023. <summary>Implementation class for generation of the raw DSA signature type using the BC light-weight API.
  24024. </summary>
  24025. </member>
  24026. <member name="T:Org.BouncyCastle.Tls.Crypto.Impl.BC.BcTlsDsaVerifier">
  24027. <summary>Implementation class for the verification of the raw DSA signature type using the BC light-weight API.
  24028. </summary>
  24029. </member>
  24030. <member name="T:Org.BouncyCastle.Tls.Crypto.Impl.BC.BcTlsDssSigner">
  24031. <summary>BC light-weight base class for the signers implementing the two DSA style algorithms from FIPS PUB
  24032. 186-4: DSA and ECDSA.</summary>
  24033. </member>
  24034. <member name="T:Org.BouncyCastle.Tls.Crypto.Impl.BC.BcTlsDssVerifier">
  24035. <summary>BC light-weight base class for the verifiers supporting the two DSA style algorithms from FIPS PUB
  24036. 186-4: DSA and ECDSA.</summary>
  24037. </member>
  24038. <member name="T:Org.BouncyCastle.Tls.Crypto.Impl.BC.BcTlsECDH">
  24039. <summary>Support class for ephemeral Elliptic Curve Diffie-Hellman using the BC light-weight library.</summary>
  24040. </member>
  24041. <member name="T:Org.BouncyCastle.Tls.Crypto.Impl.BC.BcTlsECDomain">
  24042. EC domain class for generating key pairs and performing key agreement.
  24043. </member>
  24044. <member name="T:Org.BouncyCastle.Tls.Crypto.Impl.BC.BcTlsECDsa13Signer">
  24045. <summary>Implementation class for generation of ECDSA signatures in TLS 1.3+ using the BC light-weight API.
  24046. </summary>
  24047. </member>
  24048. <member name="T:Org.BouncyCastle.Tls.Crypto.Impl.BC.BcTlsECDsa13Verifier">
  24049. <summary>Implementation class for verification of ECDSA signatures in TLS 1.3+ using the BC light-weight API.
  24050. </summary>
  24051. </member>
  24052. <member name="T:Org.BouncyCastle.Tls.Crypto.Impl.BC.BcTlsECDsaSigner">
  24053. <summary>Implementation class for generation of the raw ECDSA signature type using the BC light-weight API.
  24054. </summary>
  24055. </member>
  24056. <member name="T:Org.BouncyCastle.Tls.Crypto.Impl.BC.BcTlsECDsaVerifier">
  24057. <summary>Implementation class for the verification of the raw ECDSA signature type using the BC light-weight
  24058. API.</summary>
  24059. </member>
  24060. <member name="T:Org.BouncyCastle.Tls.Crypto.Impl.BC.BcTlsRsaPssSigner">
  24061. <summary>Operator supporting the generation of RSASSA-PSS signatures using the BC light-weight API.</summary>
  24062. </member>
  24063. <member name="T:Org.BouncyCastle.Tls.Crypto.Impl.BC.BcTlsRsaPssVerifier">
  24064. <summary>Operator supporting the verification of RSASSA-PSS signatures using the BC light-weight API.</summary>
  24065. </member>
  24066. <member name="T:Org.BouncyCastle.Tls.Crypto.Impl.BC.BcTlsRsaSigner">
  24067. <summary>Operator supporting the generation of RSASSA-PKCS1-v1_5 signatures using the BC light-weight API.
  24068. </summary>
  24069. </member>
  24070. <member name="T:Org.BouncyCastle.Tls.Crypto.Impl.BC.BcTlsRsaVerifier">
  24071. <summary>Operator supporting the verification of RSASSA-PKCS1-v1_5 signatures using the BC light-weight API.
  24072. </summary>
  24073. </member>
  24074. <member name="T:Org.BouncyCastle.Tls.Crypto.Impl.BC.BcTlsSecret">
  24075. <summary>BC light-weight support class for handling TLS secrets and deriving key material and other secrets
  24076. from them.</summary>
  24077. </member>
  24078. <member name="T:Org.BouncyCastle.Tls.Crypto.Impl.BC.BcX25519">
  24079. <summary>Support class for X25519 using the BC light-weight library.</summary>
  24080. </member>
  24081. <member name="T:Org.BouncyCastle.Tls.Crypto.Impl.BC.BcX448">
  24082. <summary>Support class for X448 using the BC light-weight library.</summary>
  24083. </member>
  24084. <member name="T:Org.BouncyCastle.Tls.Crypto.Impl.TlsAeadCipher">
  24085. <summary>A generic TLS 1.2 AEAD cipher.</summary>
  24086. </member>
  24087. <member name="M:Org.BouncyCastle.Tls.Crypto.Impl.TlsAeadCipher.#ctor(Org.BouncyCastle.Tls.Crypto.TlsCryptoParameters,Org.BouncyCastle.Tls.Crypto.Impl.TlsAeadCipherImpl,Org.BouncyCastle.Tls.Crypto.Impl.TlsAeadCipherImpl,System.Int32,System.Int32,System.Int32)">
  24088. <exception cref="T:System.IO.IOException"/>
  24089. </member>
  24090. <member name="T:Org.BouncyCastle.Tls.Crypto.Impl.TlsAeadCipherImpl">
  24091. <summary>Base interface for services supporting AEAD encryption/decryption.</summary>
  24092. </member>
  24093. <member name="M:Org.BouncyCastle.Tls.Crypto.Impl.TlsAeadCipherImpl.SetKey(System.Byte[],System.Int32,System.Int32)">
  24094. <summary>Set the key to be used by the AEAD cipher implementation supporting this service.</summary>
  24095. <param name="key">array holding the AEAD cipher key.</param>
  24096. <param name="keyOff">offset into the array the key starts at.</param>
  24097. <param name="keyLen">length of the key in the array.</param>
  24098. <exception cref="T:System.IO.IOException"/>
  24099. </member>
  24100. <member name="M:Org.BouncyCastle.Tls.Crypto.Impl.TlsAeadCipherImpl.Init(System.Byte[],System.Int32,System.Byte[])">
  24101. <summary>Initialise the parameters for the AEAD operator.</summary>
  24102. <param name="nonce">the nonce.</param>
  24103. <param name="macSize">MAC size in bytes.</param>
  24104. <param name="additionalData">any additional data to be included in the MAC calculation.</param>
  24105. <exception cref="T:System.IO.IOException">if the parameters are inappropriate.</exception>
  24106. </member>
  24107. <member name="M:Org.BouncyCastle.Tls.Crypto.Impl.TlsAeadCipherImpl.GetOutputSize(System.Int32)">
  24108. <summary>Return the maximum size of the output for input of inputLength bytes.</summary>
  24109. <param name="inputLength">the length (in bytes) of the proposed input.</param>
  24110. <returns>the maximum size of the output.</returns>
  24111. </member>
  24112. <member name="M:Org.BouncyCastle.Tls.Crypto.Impl.TlsAeadCipherImpl.DoFinal(System.Byte[],System.Int32,System.Int32,System.Byte[],System.Int32)">
  24113. <summary>Perform the cipher encryption/decryption returning the output in output.</summary>
  24114. <remarks>
  24115. Note: we have to use DoFinal() here as it is the only way to guarantee output from the underlying cipher.
  24116. </remarks>
  24117. <param name="input">array holding input data to the cipher.</param>
  24118. <param name="inputOffset">offset into input array data starts at.</param>
  24119. <param name="inputLength">length of the input data in the array.</param>
  24120. <param name="output">array to hold the cipher output.</param>
  24121. <param name="outputOffset">offset into output array to start saving output.</param>
  24122. <returns>the amount of data written to output.</returns>
  24123. <exception cref="T:System.IO.IOException">in case of failure.</exception>
  24124. </member>
  24125. <member name="T:Org.BouncyCastle.Tls.Crypto.Impl.TlsBlockCipher">
  24126. <summary>A generic TLS 1.0-1.2 block cipher. This can be used for AES or 3DES for example.</summary>
  24127. </member>
  24128. <member name="M:Org.BouncyCastle.Tls.Crypto.Impl.TlsBlockCipher.#ctor(Org.BouncyCastle.Tls.Crypto.TlsCryptoParameters,Org.BouncyCastle.Tls.Crypto.Impl.TlsBlockCipherImpl,Org.BouncyCastle.Tls.Crypto.Impl.TlsBlockCipherImpl,Org.BouncyCastle.Tls.Crypto.TlsHmac,Org.BouncyCastle.Tls.Crypto.TlsHmac,System.Int32)">
  24129. <exception cref="T:System.IO.IOException"/>
  24130. </member>
  24131. <member name="T:Org.BouncyCastle.Tls.Crypto.Impl.TlsBlockCipherImpl">
  24132. <summary>Interface for block cipher services.</summary>
  24133. </member>
  24134. <member name="M:Org.BouncyCastle.Tls.Crypto.Impl.TlsBlockCipherImpl.SetKey(System.Byte[],System.Int32,System.Int32)">
  24135. <summary>Set the key to be used by the block cipher implementation supporting this service.</summary>
  24136. <param name="key">array holding the block cipher key.</param>
  24137. <param name="keyOff">offset into the array the key starts at.</param>
  24138. <param name="keyLen">length of the key in the array.</param>
  24139. <exception cref="T:System.IO.IOException"/>
  24140. </member>
  24141. <member name="M:Org.BouncyCastle.Tls.Crypto.Impl.TlsBlockCipherImpl.Init(System.Byte[],System.Int32,System.Int32)">
  24142. <summary>Initialise the parameters for operator.</summary>
  24143. <param name="iv">array holding the initialization vector (IV).</param>
  24144. <param name="ivOff">offset into the array the IV starts at.</param>
  24145. <param name="ivLen">length of the IV in the array.</param>
  24146. <exception cref="T:System.IO.IOException">if the parameters are inappropriate.</exception>
  24147. </member>
  24148. <member name="M:Org.BouncyCastle.Tls.Crypto.Impl.TlsBlockCipherImpl.DoFinal(System.Byte[],System.Int32,System.Int32,System.Byte[],System.Int32)">
  24149. <summary>Perform the cipher encryption/decryption returning the output in output.</summary>
  24150. <remarks>
  24151. Note: we have to use DoFinal() here as it is the only way to guarantee output from the underlying cipher.
  24152. </remarks>
  24153. <param name="input">array holding input data to the cipher.</param>
  24154. <param name="inputOffset">offset into input array data starts at.</param>
  24155. <param name="inputLength">length of the input data in the array.</param>
  24156. <param name="output">array to hold the cipher output.</param>
  24157. <param name="outputOffset">offset into output array to start saving output.</param>
  24158. <returns>the amount of data written to output.</returns>
  24159. <exception cref="T:System.IO.IOException">in case of failure.</exception>
  24160. </member>
  24161. <member name="M:Org.BouncyCastle.Tls.Crypto.Impl.TlsBlockCipherImpl.GetBlockSize">
  24162. <summary>Return the blocksize (in bytes) of the underlying block cipher.</summary>
  24163. <returns>the cipher's blocksize.</returns>
  24164. </member>
  24165. <member name="T:Org.BouncyCastle.Tls.Crypto.Impl.TlsImplUtilities">
  24166. <summary>Useful utility methods.</summary>
  24167. </member>
  24168. <member name="T:Org.BouncyCastle.Tls.Crypto.Impl.TlsNullCipher">
  24169. <summary>The NULL cipher.</summary>
  24170. </member>
  24171. <member name="M:Org.BouncyCastle.Tls.Crypto.Impl.TlsNullCipher.#ctor(Org.BouncyCastle.Tls.Crypto.TlsCryptoParameters,Org.BouncyCastle.Tls.Crypto.TlsHmac,Org.BouncyCastle.Tls.Crypto.TlsHmac)">
  24172. <exception cref="T:System.IO.IOException"/>
  24173. </member>
  24174. <member name="T:Org.BouncyCastle.Tls.Crypto.Impl.TlsSuiteHmac">
  24175. <summary>A generic TLS MAC implementation, acting as an HMAC based on some underlying Digest.</summary>
  24176. </member>
  24177. <member name="M:Org.BouncyCastle.Tls.Crypto.Impl.TlsSuiteHmac.#ctor(Org.BouncyCastle.Tls.Crypto.TlsCryptoParameters,Org.BouncyCastle.Tls.Crypto.TlsHmac)">
  24178. <summary>Generate a new instance of a TlsMac.</summary>
  24179. <param name="cryptoParams">the TLS client context specific crypto parameters.</param>
  24180. <param name="mac">The MAC to use.</param>
  24181. </member>
  24182. <member name="T:Org.BouncyCastle.Tls.Crypto.Impl.TlsSuiteMac">
  24183. <summary>Base interface for a generic TLS MAC implementation for use with a bulk cipher.</summary>
  24184. </member>
  24185. <member name="P:Org.BouncyCastle.Tls.Crypto.Impl.TlsSuiteMac.Size">
  24186. <summary>Return the output length (in bytes) of this MAC.</summary>
  24187. <returns>The output length of this MAC.</returns>
  24188. </member>
  24189. <member name="M:Org.BouncyCastle.Tls.Crypto.Impl.TlsSuiteMac.CalculateMac(System.Int64,System.Int16,System.Byte[],System.Int32,System.Int32)">
  24190. <summary>Calculate the MAC for some given data.</summary>
  24191. <param name="seqNo">The sequence number of the record.</param>
  24192. <param name="type">The content type of the message.</param>
  24193. <param name="message">A byte array containing the message.</param>
  24194. <param name="offset">The number of bytes to skip, before the message starts.</param>
  24195. <param name="length">The length of the message.</param>
  24196. <returns>A new byte array containing the MAC value.</returns>
  24197. </member>
  24198. <member name="M:Org.BouncyCastle.Tls.Crypto.Impl.TlsSuiteMac.CalculateMacConstantTime(System.Int64,System.Int16,System.Byte[],System.Int32,System.Int32,System.Int32,System.Byte[])">
  24199. <summary>Constant time calculation of the MAC for some given data with a given expected length.</summary>
  24200. <param name="seqNo">The sequence number of the record.</param>
  24201. <param name="type">The content type of the message.</param>
  24202. <param name="message">A byte array containing the message.</param>
  24203. <param name="offset">The number of bytes to skip, before the message starts.</param>
  24204. <param name="length">The length of the message.</param>
  24205. <param name="expectedLength">The expected length of the full message.</param>
  24206. <param name="randomData">Random data for padding out the MAC calculation if required.</param>
  24207. <returns>A new byte array containing the MAC value.</returns>
  24208. </member>
  24209. <member name="T:Org.BouncyCastle.Tls.Crypto.Srp6Group">
  24210. <summary>Carrier class for SRP-6 group parameters.</summary>
  24211. </member>
  24212. <member name="M:Org.BouncyCastle.Tls.Crypto.Srp6Group.#ctor(Org.BouncyCastle.Math.BigInteger,Org.BouncyCastle.Math.BigInteger)">
  24213. <summary>Base constructor.</summary>
  24214. <param name="n">the n value.</param>
  24215. <param name="g">the g value.</param>
  24216. </member>
  24217. <member name="T:Org.BouncyCastle.Tls.Crypto.Srp6StandardGroups">
  24218. <summary>A selection of standard groups for SRP-6.</summary>
  24219. </member>
  24220. <member name="T:Org.BouncyCastle.Tls.Crypto.TlsAgreement">
  24221. <summary>Base interface for ephemeral key agreement calculator.</summary>
  24222. </member>
  24223. <member name="M:Org.BouncyCastle.Tls.Crypto.TlsAgreement.GenerateEphemeral">
  24224. <summary>Generate an ephemeral key pair, returning the encoding of the public key.</summary>
  24225. <returns>a byte encoding of the public key.</returns>
  24226. <exception cref="T:System.IO.IOException"/>
  24227. </member>
  24228. <member name="M:Org.BouncyCastle.Tls.Crypto.TlsAgreement.ReceivePeerValue(System.Byte[])">
  24229. <summary>Pass in the public key for the peer to the agreement calculator.</summary>
  24230. <param name="peerValue">a byte encoding of the peer public key.</param>
  24231. <exception cref="T:System.IO.IOException"/>
  24232. </member>
  24233. <member name="M:Org.BouncyCastle.Tls.Crypto.TlsAgreement.CalculateSecret">
  24234. <summary>Calculate the agreed secret based on the calculator's current state.</summary>
  24235. <returns>the calculated secret.</returns>
  24236. <exception cref="T:System.IO.IOException"/>
  24237. </member>
  24238. <member name="T:Org.BouncyCastle.Tls.Crypto.TlsCertificate">
  24239. <summary>Interface providing the functional representation of a single X.509 certificate.</summary>
  24240. </member>
  24241. <member name="M:Org.BouncyCastle.Tls.Crypto.TlsCertificate.CreateEncryptor(System.Int32)">
  24242. <summary>Return an encryptor based on the public key in this certificate.</summary>
  24243. <param name="tlsCertificateRole"><see cref="T:Org.BouncyCastle.Tls.Crypto.TlsCertificateRole"/></param>
  24244. <returns>a <see cref="T:Org.BouncyCastle.Tls.Crypto.TlsEncryptor"/> based on this certificate's public key.</returns>
  24245. <exception cref="T:System.IO.IOException"/>
  24246. </member>
  24247. <member name="M:Org.BouncyCastle.Tls.Crypto.TlsCertificate.CreateVerifier(System.Int16)">
  24248. <param name="signatureAlgorithm"><see cref="T:Org.BouncyCastle.Tls.SignatureAlgorithm"/></param>
  24249. <exception cref="T:System.IO.IOException"/>
  24250. </member>
  24251. <member name="M:Org.BouncyCastle.Tls.Crypto.TlsCertificate.CreateVerifier(System.Int32)">
  24252. <param name="signatureScheme"><see cref="T:Org.BouncyCastle.Tls.SignatureScheme"/></param>
  24253. <exception cref="T:System.IO.IOException"/>
  24254. </member>
  24255. <member name="M:Org.BouncyCastle.Tls.Crypto.TlsCertificate.GetEncoded">
  24256. <exception cref="T:System.IO.IOException"/>
  24257. </member>
  24258. <member name="M:Org.BouncyCastle.Tls.Crypto.TlsCertificate.GetExtension(Org.BouncyCastle.Asn1.DerObjectIdentifier)">
  24259. <exception cref="T:System.IO.IOException"/>
  24260. </member>
  24261. <member name="P:Org.BouncyCastle.Tls.Crypto.TlsCertificate.SigAlgOid">
  24262. <returns>the OID of this certificate's 'signatureAlgorithm', as a string.</returns>
  24263. </member>
  24264. <member name="M:Org.BouncyCastle.Tls.Crypto.TlsCertificate.GetSigAlgParams">
  24265. <exception cref="T:System.IO.IOException"/>
  24266. </member>
  24267. <member name="M:Org.BouncyCastle.Tls.Crypto.TlsCertificate.GetLegacySignatureAlgorithm">
  24268. <returns><see cref="T:Org.BouncyCastle.Tls.SignatureAlgorithm"/></returns>
  24269. <exception cref="T:System.IO.IOException"/>
  24270. </member>
  24271. <member name="M:Org.BouncyCastle.Tls.Crypto.TlsCertificate.SupportsSignatureAlgorithm(System.Int16)">
  24272. <param name="signatureAlgorithm"><see cref="T:Org.BouncyCastle.Tls.SignatureAlgorithm"/></param>
  24273. <returns>true if (and only if) this certificate can be used to verify the given signature algorithm.
  24274. </returns>
  24275. <exception cref="T:System.IO.IOException"/>
  24276. </member>
  24277. <member name="M:Org.BouncyCastle.Tls.Crypto.TlsCertificate.SupportsSignatureAlgorithmCA(System.Int16)">
  24278. <exception cref="T:System.IO.IOException"/>
  24279. </member>
  24280. <member name="M:Org.BouncyCastle.Tls.Crypto.TlsCertificate.CheckUsageInRole(System.Int32)">
  24281. <param name="tlsCertificateRole"><see cref="T:Org.BouncyCastle.Tls.Crypto.TlsCertificateRole"/></param>
  24282. <exception cref="T:System.IO.IOException"/>
  24283. </member>
  24284. <member name="T:Org.BouncyCastle.Tls.Crypto.TlsCipher">
  24285. <summary>Base interface for a TLS bulk cipher.</summary>
  24286. </member>
  24287. <member name="M:Org.BouncyCastle.Tls.Crypto.TlsCipher.GetCiphertextDecodeLimit(System.Int32)">
  24288. <summary>Return the maximum input size for a ciphertext given a maximum output size for the plaintext of
  24289. plaintextLimit bytes.</summary>
  24290. <param name="plaintextLimit">the maximum output size for the plaintext.</param>
  24291. <returns>the maximum input size of the ciphertext for plaintextlimit bytes of output.</returns>
  24292. </member>
  24293. <member name="M:Org.BouncyCastle.Tls.Crypto.TlsCipher.GetCiphertextEncodeLimit(System.Int32,System.Int32)">
  24294. <summary>Return the maximum output size for a ciphertext given an actual input plaintext size of
  24295. plaintextLength bytes and a maximum input plaintext size of plaintextLimit bytes.</summary>
  24296. <param name="plaintextLength">the actual input size for the plaintext.</param>
  24297. <param name="plaintextLimit">the maximum input size for the plaintext.</param>
  24298. <returns>the maximum output size of the ciphertext for plaintextlimit bytes of input.</returns>
  24299. </member>
  24300. <member name="M:Org.BouncyCastle.Tls.Crypto.TlsCipher.GetPlaintextLimit(System.Int32)">
  24301. <summary>Return the maximum size for the plaintext given ciphertextlimit bytes of ciphertext.</summary>
  24302. <param name="ciphertextLimit">the maximum number of bytes of ciphertext.</param>
  24303. <returns>the maximum size of the plaintext for ciphertextlimit bytes of input.</returns>
  24304. </member>
  24305. <member name="M:Org.BouncyCastle.Tls.Crypto.TlsCipher.EncodePlaintext(System.Int64,System.Int16,Org.BouncyCastle.Tls.ProtocolVersion,System.Int32,System.Byte[],System.Int32,System.Int32)">
  24306. <summary>Encode the passed in plaintext using the current bulk cipher.</summary>
  24307. <param name="seqNo">sequence number of the message represented by plaintext.</param>
  24308. <param name="contentType">content type of the message represented by plaintext.</param>
  24309. <param name="recordVersion"><see cref="T:Org.BouncyCastle.Tls.ProtocolVersion"/> used for the record.</param>
  24310. <param name="headerAllocation">extra bytes to allocate at start of returned byte array.</param>
  24311. <param name="plaintext">array holding input plaintext to the cipher.</param>
  24312. <param name="offset">offset into input array the plaintext starts at.</param>
  24313. <param name="len">length of the plaintext in the array.</param>
  24314. <returns>A <see cref="T:Org.BouncyCastle.Tls.Crypto.TlsEncodeResult"/> containing the result of encoding (after 'headerAllocation' unused
  24315. bytes).</returns>
  24316. <exception cref="T:System.IO.IOException"/>
  24317. </member>
  24318. <member name="M:Org.BouncyCastle.Tls.Crypto.TlsCipher.DecodeCiphertext(System.Int64,System.Int16,Org.BouncyCastle.Tls.ProtocolVersion,System.Byte[],System.Int32,System.Int32)">
  24319. <summary>Decode the passed in ciphertext using the current bulk cipher.</summary>
  24320. <param name="seqNo">sequence number of the message represented by ciphertext.</param>
  24321. <param name="recordType">content type used in the record for this message.</param>
  24322. <param name="recordVersion"><see cref="T:Org.BouncyCastle.Tls.ProtocolVersion"/> used for the record.</param>
  24323. <param name="ciphertext">array holding input ciphertext to the cipher.</param>
  24324. <param name="offset">offset into input array the ciphertext starts at.</param>
  24325. <param name="len">length of the ciphertext in the array.</param>
  24326. <returns>A <see cref="T:Org.BouncyCastle.Tls.Crypto.TlsDecodeResult"/> containing the result of decoding.</returns>
  24327. <exception cref="T:System.IO.IOException"/>
  24328. </member>
  24329. <member name="M:Org.BouncyCastle.Tls.Crypto.TlsCipher.RekeyDecoder">
  24330. <exception cref="T:System.IO.IOException"/>
  24331. </member>
  24332. <member name="M:Org.BouncyCastle.Tls.Crypto.TlsCipher.RekeyEncoder">
  24333. <exception cref="T:System.IO.IOException"/>
  24334. </member>
  24335. <member name="T:Org.BouncyCastle.Tls.Crypto.TlsCrypto">
  24336. <summary>Service and object creation interface for the primitive types and services that are associated with
  24337. cryptography in the API.</summary>
  24338. </member>
  24339. <member name="M:Org.BouncyCastle.Tls.Crypto.TlsCrypto.HasAllRawSignatureAlgorithms">
  24340. <summary>Return true if this TlsCrypto can perform raw signatures and verifications for all supported
  24341. algorithms.</summary>
  24342. <returns>true if this instance can perform raw signatures and verifications for all supported algorithms,
  24343. false otherwise.</returns>
  24344. </member>
  24345. <member name="M:Org.BouncyCastle.Tls.Crypto.TlsCrypto.HasDHAgreement">
  24346. <summary>Return true if this TlsCrypto can support DH key agreement.</summary>
  24347. <returns>true if this instance can support DH key agreement, false otherwise.</returns>
  24348. </member>
  24349. <member name="M:Org.BouncyCastle.Tls.Crypto.TlsCrypto.HasECDHAgreement">
  24350. <summary>Return true if this TlsCrypto can support ECDH key agreement.</summary>
  24351. <returns>true if this instance can support ECDH key agreement, false otherwise.</returns>
  24352. </member>
  24353. <member name="M:Org.BouncyCastle.Tls.Crypto.TlsCrypto.HasEncryptionAlgorithm(System.Int32)">
  24354. <summary>Return true if this TlsCrypto can support the passed in block/stream encryption algorithm.
  24355. </summary>
  24356. <param name="encryptionAlgorithm">the algorithm of interest.</param>
  24357. <returns>true if encryptionAlgorithm is supported, false otherwise.</returns>
  24358. </member>
  24359. <member name="M:Org.BouncyCastle.Tls.Crypto.TlsCrypto.HasCryptoHashAlgorithm(System.Int32)">
  24360. <summary>Return true if this TlsCrypto can support the passed in hash algorithm.</summary>
  24361. <param name="cryptoHashAlgorithm">the algorithm of interest.</param>
  24362. <returns>true if cryptoHashAlgorithm is supported, false otherwise.</returns>
  24363. </member>
  24364. <member name="M:Org.BouncyCastle.Tls.Crypto.TlsCrypto.HasCryptoSignatureAlgorithm(System.Int32)">
  24365. <summary>Return true if this TlsCrypto can support the passed in signature algorithm (not necessarily in
  24366. combination with EVERY hash algorithm).</summary>
  24367. <param name="cryptoSignatureAlgorithm">the algorithm of interest.</param>
  24368. <returns>true if cryptoSignatureAlgorithm is supported, false otherwise.</returns>
  24369. </member>
  24370. <member name="M:Org.BouncyCastle.Tls.Crypto.TlsCrypto.HasMacAlgorithm(System.Int32)">
  24371. <summary>Return true if this TlsCrypto can support the passed in MAC algorithm.</summary>
  24372. <param name="macAlgorithm">the algorithm of interest.</param>
  24373. <returns>true if macAlgorithm is supported, false otherwise.</returns>
  24374. </member>
  24375. <member name="M:Org.BouncyCastle.Tls.Crypto.TlsCrypto.HasNamedGroup(System.Int32)">
  24376. <summary>Return true if this TlsCrypto supports the passed in <see cref="T:Org.BouncyCastle.Tls.NamedGroup">named group</see>
  24377. value.</summary>
  24378. <returns>true if this instance supports the passed in <see cref="T:Org.BouncyCastle.Tls.NamedGroup">named group</see> value.
  24379. </returns>
  24380. </member>
  24381. <member name="M:Org.BouncyCastle.Tls.Crypto.TlsCrypto.HasRsaEncryption">
  24382. <summary>Return true if this TlsCrypto can support RSA encryption/decryption.</summary>
  24383. <returns>true if this instance can support RSA encryption/decryption, false otherwise.</returns>
  24384. </member>
  24385. <member name="M:Org.BouncyCastle.Tls.Crypto.TlsCrypto.HasSignatureAlgorithm(System.Int16)">
  24386. <summary>Return true if this TlsCrypto can support the passed in signature algorithm (not necessarily in
  24387. combination with EVERY hash algorithm).</summary>
  24388. <returns>true if signatureAlgorithm is supported, false otherwise.</returns>
  24389. </member>
  24390. <member name="M:Org.BouncyCastle.Tls.Crypto.TlsCrypto.HasSignatureAndHashAlgorithm(Org.BouncyCastle.Tls.SignatureAndHashAlgorithm)">
  24391. <summary>Return true if this TlsCrypto can support the passed in signature algorithm.</summary>
  24392. <param name="sigAndHashAlgorithm">the algorithm of interest.</param>
  24393. <returns>true if sigAndHashAlgorithm is supported, false otherwise.</returns>
  24394. </member>
  24395. <member name="M:Org.BouncyCastle.Tls.Crypto.TlsCrypto.HasSignatureScheme(System.Int32)">
  24396. <summary>Return true if this TlsCrypto can support the passed in signature scheme.</summary>
  24397. <param name="signatureScheme">the scheme of interest.</param>
  24398. <returns>true if signatureScheme is supported, false otherwise.</returns>
  24399. </member>
  24400. <member name="M:Org.BouncyCastle.Tls.Crypto.TlsCrypto.HasSrpAuthentication">
  24401. <summary>Return true if this TlsCrypto can support SRP authentication.</summary>
  24402. <returns>true if this instance can support SRP authentication, false otherwise.</returns>
  24403. </member>
  24404. <member name="M:Org.BouncyCastle.Tls.Crypto.TlsCrypto.CreateSecret(System.Byte[])">
  24405. <summary>Create a TlsSecret object based on provided data.</summary>
  24406. <param name="data">the data to base the TlsSecret on.</param>
  24407. <returns>a TlsSecret based on the provided data.</returns>
  24408. </member>
  24409. <member name="M:Org.BouncyCastle.Tls.Crypto.TlsCrypto.GenerateRsaPreMasterSecret(Org.BouncyCastle.Tls.ProtocolVersion)">
  24410. <summary>Create a TlsSecret object containing a randomly-generated RSA PreMasterSecret</summary>
  24411. <param name="clientVersion">the client version to place in the first 2 bytes</param>
  24412. <returns>a TlsSecret containing the PreMasterSecret.</returns>
  24413. </member>
  24414. <member name="P:Org.BouncyCastle.Tls.Crypto.TlsCrypto.SecureRandom">
  24415. <summary>Return the primary (safest) SecureRandom for this crypto.</summary>
  24416. <returns>a SecureRandom suitable for key generation.</returns>
  24417. </member>
  24418. <member name="M:Org.BouncyCastle.Tls.Crypto.TlsCrypto.CreateCertificate(System.Byte[])">
  24419. <summary>Create a TlsCertificate from an ASN.1 binary encoding of an X.509 certificate.</summary>
  24420. <param name="encoding">DER/BER encoding of the certificate of interest.</param>
  24421. <returns>a TlsCertificate.</returns>
  24422. <exception cref="T:System.IO.IOException">if there is an issue on decoding or constructing the certificate.</exception>
  24423. </member>
  24424. <member name="M:Org.BouncyCastle.Tls.Crypto.TlsCrypto.CreateCipher(Org.BouncyCastle.Tls.Crypto.TlsCryptoParameters,System.Int32,System.Int32)">
  24425. <summary>Create a cipher for the specified encryption and MAC algorithms.</summary>
  24426. <remarks>
  24427. See enumeration classes <see cref="T:Org.BouncyCastle.Tls.EncryptionAlgorithm"/>, <see cref="T:Org.BouncyCastle.Tls.MacAlgorithm"/> for appropriate
  24428. argument values.
  24429. </remarks>
  24430. <param name="cryptoParams">context specific parameters.</param>
  24431. <param name="encryptionAlgorithm">the encryption algorithm to be employed by the cipher.</param>
  24432. <param name="macAlgorithm">the MAC algorithm to be employed by the cipher.</param>
  24433. <returns>a <see cref="T:Org.BouncyCastle.Tls.Crypto.TlsCipher"/> implementing the encryption and MAC algorithms.</returns>
  24434. <exception cref="T:System.IO.IOException"/>
  24435. </member>
  24436. <member name="M:Org.BouncyCastle.Tls.Crypto.TlsCrypto.CreateDHDomain(Org.BouncyCastle.Tls.Crypto.TlsDHConfig)">
  24437. <summary>Create a domain object supporting the domain parameters described in dhConfig.</summary>
  24438. <param name="dhConfig">the config describing the DH parameters to use.</param>
  24439. <returns>a TlsDHDomain supporting the parameters in dhConfig.</returns>
  24440. </member>
  24441. <member name="M:Org.BouncyCastle.Tls.Crypto.TlsCrypto.CreateECDomain(Org.BouncyCastle.Tls.Crypto.TlsECConfig)">
  24442. <summary>Create a domain object supporting the domain parameters described in ecConfig.</summary>
  24443. <param name="ecConfig">the config describing the EC parameters to use.</param>
  24444. <returns>a TlsECDomain supporting the parameters in ecConfig.</returns>
  24445. </member>
  24446. <member name="M:Org.BouncyCastle.Tls.Crypto.TlsCrypto.AdoptSecret(Org.BouncyCastle.Tls.Crypto.TlsSecret)">
  24447. <summary>Adopt the passed in secret, creating a new copy of it.</summary>
  24448. <param name="secret">the secret to make a copy of.</param>
  24449. <returns>a TlsSecret based on the original secret.</returns>
  24450. </member>
  24451. <member name="M:Org.BouncyCastle.Tls.Crypto.TlsCrypto.CreateHash(System.Int32)">
  24452. <summary>Create a suitable hash for the hash algorithm identifier passed in.</summary>
  24453. <remarks>
  24454. See enumeration class <see cref="T:Org.BouncyCastle.Tls.Crypto.CryptoHashAlgorithm"/> for appropriate argument values.
  24455. </remarks>
  24456. <param name="cryptoHashAlgorithm">the hash algorithm the hash needs to implement.</param>
  24457. <returns>a <see cref="T:Org.BouncyCastle.Tls.Crypto.TlsHash"/>.</returns>
  24458. </member>
  24459. <member name="M:Org.BouncyCastle.Tls.Crypto.TlsCrypto.CreateHmac(System.Int32)">
  24460. <summary>Create a suitable HMAC for the MAC algorithm identifier passed in.</summary>
  24461. <remarks>
  24462. See enumeration class <see cref="T:Org.BouncyCastle.Tls.MacAlgorithm"/> for appropriate argument values.
  24463. </remarks>
  24464. <param name="macAlgorithm">the MAC algorithm the HMAC needs to match.</param>
  24465. <returns>a <see cref="T:Org.BouncyCastle.Tls.Crypto.TlsHmac"/>.</returns>
  24466. </member>
  24467. <member name="M:Org.BouncyCastle.Tls.Crypto.TlsCrypto.CreateHmacForHash(System.Int32)">
  24468. <summary>Create a suitable HMAC using the hash algorithm identifier passed in.</summary>
  24469. <remarks>
  24470. See enumeration class <see cref="T:Org.BouncyCastle.Tls.Crypto.CryptoHashAlgorithm"/> for appropriate argument values.
  24471. </remarks>
  24472. <param name="cryptoHashAlgorithm">the hash algorithm the HMAC should use.</param>
  24473. <returns>a <see cref="T:Org.BouncyCastle.Tls.Crypto.TlsHmac"/>.</returns>
  24474. </member>
  24475. <member name="M:Org.BouncyCastle.Tls.Crypto.TlsCrypto.CreateNonceGenerator(System.Byte[])">
  24476. <summary>Create a nonce generator.</summary>
  24477. <remarks>
  24478. Each call should construct a new generator, and the generator should be returned from this call only after
  24479. automatically seeding from this <see cref="T:Org.BouncyCastle.Tls.Crypto.TlsCrypto"/>'s entropy source, and from the provided additional
  24480. seed material. The output of each returned generator must be completely independent of the others.
  24481. </remarks>
  24482. <param name="additionalSeedMaterial">context-specific seed material</param>
  24483. <returns>a <see cref="T:Org.BouncyCastle.Tls.Crypto.TlsNonceGenerator"/>.</returns>
  24484. </member>
  24485. <member name="M:Org.BouncyCastle.Tls.Crypto.TlsCrypto.CreateSrp6Client(Org.BouncyCastle.Tls.Crypto.TlsSrpConfig)">
  24486. <summary>Create an SRP-6 client.</summary>
  24487. <param name="srpConfig">client config.</param>
  24488. <returns>an initialised SRP6 client object.</returns>
  24489. </member>
  24490. <member name="M:Org.BouncyCastle.Tls.Crypto.TlsCrypto.CreateSrp6Server(Org.BouncyCastle.Tls.Crypto.TlsSrpConfig,Org.BouncyCastle.Math.BigInteger)">
  24491. <summary>Create an SRP-6 server.</summary>
  24492. <param name="srpConfig">server config.</param>
  24493. <param name="srpVerifier">the SRP6 verifier value.</param>
  24494. <returns>an initialised SRP6 server object.</returns>
  24495. </member>
  24496. <member name="M:Org.BouncyCastle.Tls.Crypto.TlsCrypto.CreateSrp6VerifierGenerator(Org.BouncyCastle.Tls.Crypto.TlsSrpConfig)">
  24497. <summary>Create an SRP-6 verifier generator.</summary>
  24498. <param name="srpConfig">generator config.</param>
  24499. <returns>an initialized SRP6 verifier generator.</returns>
  24500. </member>
  24501. <member name="M:Org.BouncyCastle.Tls.Crypto.TlsCrypto.HkdfInit(System.Int32)">
  24502. <summary>Setup an initial "secret" for a chain of HKDF calls (RFC 5869), containing a string of HashLen
  24503. zeroes.</summary>
  24504. <param name="cryptoHashAlgorithm">the hash algorithm to instantiate HMAC with. See
  24505. <see cref="T:Org.BouncyCastle.Tls.Crypto.CryptoHashAlgorithm"/> for values.</param>
  24506. </member>
  24507. <member name="T:Org.BouncyCastle.Tls.Crypto.TlsCryptoException">
  24508. <summary>Basic exception class for crypto services to pass back a cause.</summary>
  24509. </member>
  24510. <member name="T:Org.BouncyCastle.Tls.Crypto.TlsCryptoParameters">
  24511. <summary>Carrier class for context-related parameters needed for creating secrets and ciphers.</summary>
  24512. </member>
  24513. <member name="M:Org.BouncyCastle.Tls.Crypto.TlsCryptoParameters.#ctor(Org.BouncyCastle.Tls.TlsContext)">
  24514. <summary>Base constructor.</summary>
  24515. <param name="context">the context for this parameters object.</param>
  24516. </member>
  24517. <member name="M:Org.BouncyCastle.Tls.Crypto.TlsCryptoUtilities.HkdfExpandLabel(Org.BouncyCastle.Tls.Crypto.TlsSecret,System.Int32,System.String,System.Byte[],System.Int32)">
  24518. <exception cref="T:System.IO.IOException"/>
  24519. </member>
  24520. <member name="T:Org.BouncyCastle.Tls.Crypto.TlsDHConfig">
  24521. <summary>Basic config for Diffie-Hellman.</summary>
  24522. </member>
  24523. <member name="T:Org.BouncyCastle.Tls.Crypto.TlsDHDomain">
  24524. <summary>Domain interface to service factory for creating Diffie-Hellman operators.</summary>
  24525. </member>
  24526. <member name="M:Org.BouncyCastle.Tls.Crypto.TlsDHDomain.CreateDH">
  24527. <summary>Return an agreement operator suitable for ephemeral Diffie-Hellman.</summary>
  24528. <returns>a key agreement operator.</returns>
  24529. </member>
  24530. <member name="T:Org.BouncyCastle.Tls.Crypto.TlsECConfig">
  24531. <summary>Carrier class for Elliptic Curve parameter configuration.</summary>
  24532. </member>
  24533. <member name="P:Org.BouncyCastle.Tls.Crypto.TlsECConfig.NamedGroup">
  24534. <summary>Return the group used.</summary>
  24535. <returns>the <see cref="P:Org.BouncyCastle.Tls.Crypto.TlsECConfig.NamedGroup">named group</see> used.</returns>
  24536. </member>
  24537. <member name="T:Org.BouncyCastle.Tls.Crypto.TlsECDomain">
  24538. <summary>Domain interface to service factory for creating Elliptic-Curve (EC) based operators.</summary>
  24539. </member>
  24540. <member name="M:Org.BouncyCastle.Tls.Crypto.TlsECDomain.CreateECDH">
  24541. <summary>Return an agreement operator suitable for ephemeral EC Diffie-Hellman.</summary>
  24542. <returns>a key agreement operator.</returns>
  24543. </member>
  24544. <member name="T:Org.BouncyCastle.Tls.Crypto.TlsEncryptor">
  24545. <summary>Base interface for an encryptor.</summary>
  24546. </member>
  24547. <member name="M:Org.BouncyCastle.Tls.Crypto.TlsEncryptor.Encrypt(System.Byte[],System.Int32,System.Int32)">
  24548. <summary>Encrypt data from the passed in input array.</summary>
  24549. <param name="input">byte array containing the input data.</param>
  24550. <param name="inOff">offset into input where the data starts.</param>
  24551. <param name="length">the length of the data to encrypt.</param>
  24552. <returns>the encrypted data.</returns>
  24553. <exception cref="T:System.IO.IOException"/>
  24554. </member>
  24555. <member name="T:Org.BouncyCastle.Tls.Crypto.TlsHash">
  24556. <summary>Interface for message digest, or hash, services.</summary>
  24557. </member>
  24558. <member name="M:Org.BouncyCastle.Tls.Crypto.TlsHash.Update(System.Byte[],System.Int32,System.Int32)">
  24559. <summary>Update the hash with the passed in input.</summary>
  24560. <param name="input">input array containing the data.</param>
  24561. <param name="inOff">offset into the input array the input starts at.</param>
  24562. <param name="length">the length of the input data.</param>
  24563. </member>
  24564. <member name="M:Org.BouncyCastle.Tls.Crypto.TlsHash.CalculateHash">
  24565. <summary>Return calculated hash for any input passed in.</summary>
  24566. <returns>the hash value.</returns>
  24567. </member>
  24568. <member name="M:Org.BouncyCastle.Tls.Crypto.TlsHash.CloneHash">
  24569. <summary>Return a clone of this hash object representing its current state.</summary>
  24570. <returns>a clone of the current hash.</returns>
  24571. </member>
  24572. <member name="M:Org.BouncyCastle.Tls.Crypto.TlsHash.Reset">
  24573. <summary>Reset the hash underlying this service.</summary>
  24574. </member>
  24575. <member name="T:Org.BouncyCastle.Tls.Crypto.TlsHmac">
  24576. <summary>Interface for MAC services based on HMAC.</summary>
  24577. </member>
  24578. <member name="P:Org.BouncyCastle.Tls.Crypto.TlsHmac.InternalBlockSize">
  24579. <summary>Return the internal block size for the message digest underlying this HMAC service.</summary>
  24580. <returns>the internal block size for the digest (in bytes).</returns>
  24581. </member>
  24582. <member name="T:Org.BouncyCastle.Tls.Crypto.TlsMac">
  24583. <summary>Interface for MAC services.</summary>
  24584. </member>
  24585. <member name="M:Org.BouncyCastle.Tls.Crypto.TlsMac.SetKey(System.Byte[],System.Int32,System.Int32)">
  24586. <summary>Set the key to be used by the MAC implementation supporting this service.</summary>
  24587. <param name="key">array holding the MAC key.</param>
  24588. <param name="keyOff">offset into the array the key starts at.</param>
  24589. <param name="keyLen">length of the key in the array.</param>
  24590. </member>
  24591. <member name="M:Org.BouncyCastle.Tls.Crypto.TlsMac.Update(System.Byte[],System.Int32,System.Int32)">
  24592. <summary>Update the MAC with the passed in input.</summary>
  24593. <param name="input">input array containing the data.</param>
  24594. <param name="inOff">offset into the input array the input starts at.</param>
  24595. <param name="length">the length of the input data.</param>
  24596. </member>
  24597. <member name="M:Org.BouncyCastle.Tls.Crypto.TlsMac.CalculateMac">
  24598. <summary>Return calculated MAC for any input passed in.</summary>
  24599. <returns>the MAC value.</returns>
  24600. </member>
  24601. <member name="M:Org.BouncyCastle.Tls.Crypto.TlsMac.CalculateMac(System.Byte[],System.Int32)">
  24602. <summary>Write the calculated MAC to an output buffer.</summary>
  24603. <param name="output">output array to write the MAC to.</param>
  24604. <param name="outOff">offset into the output array to write the MAC to.</param>
  24605. </member>
  24606. <member name="P:Org.BouncyCastle.Tls.Crypto.TlsMac.MacLength">
  24607. <summary>Return the length of the MAC generated by this service.</summary>
  24608. <returns>the MAC length.</returns>
  24609. </member>
  24610. <member name="M:Org.BouncyCastle.Tls.Crypto.TlsMac.Reset">
  24611. <summary>Reset the MAC underlying this service.</summary>
  24612. </member>
  24613. <member name="M:Org.BouncyCastle.Tls.Crypto.TlsNonceGenerator.GenerateNonce(System.Int32)">
  24614. <summary>Generate a nonce byte[] string.</summary>
  24615. <param name="size">the length, in bytes, of the nonce to generate.</param>
  24616. <returns>the nonce value.</returns>
  24617. </member>
  24618. <member name="T:Org.BouncyCastle.Tls.Crypto.TlsNullNullCipher">
  24619. <summary>The cipher for TLS_NULL_WITH_NULL_NULL.</summary>
  24620. </member>
  24621. <member name="T:Org.BouncyCastle.Tls.Crypto.TlsSecret">
  24622. <summary>Interface supporting the generation of key material and other SSL/TLS secret values from PRFs.
  24623. </summary>
  24624. </member>
  24625. <member name="M:Org.BouncyCastle.Tls.Crypto.TlsSecret.CalculateHmac(System.Int32,System.Byte[],System.Int32,System.Int32)">
  24626. <summary>Calculate an HMAC with this secret's data as the key.</summary>
  24627. <param name="cryptoHashAlgorithm">the hash algorithm to instantiate HMAC with. See
  24628. <see cref="T:Org.BouncyCastle.Tls.Crypto.CryptoHashAlgorithm"/> for values.</param>
  24629. <param name="buf">array containing the input data.</param>
  24630. <param name="off">offset into the input array the input starts at.</param>
  24631. <param name="len">the length of the input data.</param>
  24632. </member>
  24633. <member name="M:Org.BouncyCastle.Tls.Crypto.TlsSecret.DeriveUsingPrf(System.Int32,System.String,System.Byte[],System.Int32)">
  24634. <summary>Return a new secret based on applying a PRF to this one.</summary>
  24635. <param name="prfAlgorithm">PRF algorithm to use.</param>
  24636. <param name="label">the label details.</param>
  24637. <param name="seed">the seed details.</param>
  24638. <param name="length">the size (in bytes) of the secret to generate.</param>
  24639. <returns>the new secret.</returns>
  24640. </member>
  24641. <member name="M:Org.BouncyCastle.Tls.Crypto.TlsSecret.Destroy">
  24642. <summary>Destroy the internal state of the secret.</summary>
  24643. <remarks>
  24644. After this call, any attempt to use the <see cref="T:Org.BouncyCastle.Tls.Crypto.TlsSecret"/> will result in an
  24645. <see cref="T:System.InvalidOperationException"/> being thrown.
  24646. </remarks>
  24647. </member>
  24648. <member name="M:Org.BouncyCastle.Tls.Crypto.TlsSecret.Encrypt(Org.BouncyCastle.Tls.Crypto.TlsEncryptor)">
  24649. <summary>Return an encrypted copy of the data this secret is based on.</summary>
  24650. <param name="encryptor">the encryptor to use for protecting the internal data.</param>
  24651. <returns>an encrypted copy of this secret's internal data.</returns>
  24652. <exception cref="T:System.IO.IOException"/>
  24653. </member>
  24654. <member name="M:Org.BouncyCastle.Tls.Crypto.TlsSecret.Extract">
  24655. <summary>Return the internal data from this secret.</summary>
  24656. <remarks>
  24657. The <see cref="T:Org.BouncyCastle.Tls.Crypto.TlsSecret"/> does not keep a copy of the data. After this call, any attempt to use the
  24658. <see cref="T:Org.BouncyCastle.Tls.Crypto.TlsSecret"/> will result in an <see cref="T:System.InvalidOperationException"/> being thrown.
  24659. </remarks>
  24660. <returns>the secret's internal data.</returns>
  24661. </member>
  24662. <member name="M:Org.BouncyCastle.Tls.Crypto.TlsSecret.HkdfExpand(System.Int32,System.Byte[],System.Int32)">
  24663. <summary>RFC 5869 HKDF-Expand function, with this secret's data as the pseudo-random key ('prk').</summary>
  24664. <param name="cryptoHashAlgorithm">the hash algorithm to instantiate HMAC with. See
  24665. <see cref="T:Org.BouncyCastle.Tls.Crypto.CryptoHashAlgorithm"/> for values.</param>
  24666. <param name="info">optional context and application specific information (can be zero-length).</param>
  24667. <param name="length">length of output keying material in octets.</param>
  24668. <returns> output keying material (of 'length' octets).</returns>
  24669. </member>
  24670. <member name="M:Org.BouncyCastle.Tls.Crypto.TlsSecret.HkdfExtract(System.Int32,Org.BouncyCastle.Tls.Crypto.TlsSecret)">
  24671. <summary>RFC 5869 HKDF-Extract function, with this secret's data as the 'salt'.</summary>
  24672. <remarks>
  24673. The <see cref="T:Org.BouncyCastle.Tls.Crypto.TlsSecret"/> does not keep a copy of the data. After this call, any attempt to use
  24674. the <see cref="T:Org.BouncyCastle.Tls.Crypto.TlsSecret"/> will result in an <see cref="T:System.InvalidOperationException"/> being thrown.
  24675. </remarks>
  24676. <param name="cryptoHashAlgorithm">the hash algorithm to instantiate HMAC with. See
  24677. <see cref="T:Org.BouncyCastle.Tls.Crypto.CryptoHashAlgorithm"/> for values.</param>
  24678. <param name="ikm">input keying material.</param>
  24679. <returns>a pseudo-random key (of HashLen octets).</returns>
  24680. </member>
  24681. <member name="T:Org.BouncyCastle.Tls.Crypto.TlsSigner">
  24682. <summary>Base interface for a TLS signer that works on raw message digests.</summary>
  24683. </member>
  24684. <member name="M:Org.BouncyCastle.Tls.Crypto.TlsSigner.GenerateRawSignature(Org.BouncyCastle.Tls.SignatureAndHashAlgorithm,System.Byte[])">
  24685. <summary>Generate an encoded signature based on the passed in hash.</summary>
  24686. <param name="algorithm">the signature algorithm to use.</param>
  24687. <param name="hash">the hash calculated for the signature.</param>
  24688. <returns>an encoded signature.</returns>
  24689. <exception cref="T:System.IO.IOException">in case of an exception processing the hash.</exception>
  24690. </member>
  24691. <member name="M:Org.BouncyCastle.Tls.Crypto.TlsSigner.GetStreamSigner(Org.BouncyCastle.Tls.SignatureAndHashAlgorithm)">
  24692. <exception cref="T:System.IO.IOException"/>
  24693. </member>
  24694. <member name="T:Org.BouncyCastle.Tls.Crypto.TlsSrp6Client">
  24695. <summary>Basic interface for an SRP-6 client implementation.</summary>
  24696. </member>
  24697. <member name="M:Org.BouncyCastle.Tls.Crypto.TlsSrp6Client.CalculateSecret(Org.BouncyCastle.Math.BigInteger)">
  24698. <summary>Generates the secret S given the server's credentials</summary>
  24699. <param name="serverB">The server's credentials</param>
  24700. <returns>Client's verification message for the server</returns>
  24701. <exception cref="T:System.IO.IOException">If server's credentials are invalid</exception>
  24702. </member>
  24703. <member name="M:Org.BouncyCastle.Tls.Crypto.TlsSrp6Client.GenerateClientCredentials(System.Byte[],System.Byte[],System.Byte[])">
  24704. <summary>Generates client's credentials given the client's salt, identity and password</summary>
  24705. <param name="salt">The salt used in the client's verifier.</param>
  24706. <param name="identity">The user's identity (eg. username)</param>
  24707. <param name="password">The user's password</param>
  24708. <returns>Client's public value to send to server</returns>
  24709. </member>
  24710. <member name="T:Org.BouncyCastle.Tls.Crypto.TlsSrp6Server">
  24711. <summary>Basic interface for an SRP-6 server implementation.</summary>
  24712. </member>
  24713. <member name="M:Org.BouncyCastle.Tls.Crypto.TlsSrp6Server.GenerateServerCredentials">
  24714. <summary>Generates the server's credentials that are to be sent to the client.</summary>
  24715. <returns>The server's public value to the client</returns>
  24716. </member>
  24717. <member name="M:Org.BouncyCastle.Tls.Crypto.TlsSrp6Server.CalculateSecret(Org.BouncyCastle.Math.BigInteger)">
  24718. <summary>Processes the client's credentials. If valid the shared secret is generated and returned.
  24719. </summary>
  24720. <param name="clientA">The client's credentials.</param>
  24721. <returns>A shared secret <see cref="T:Org.BouncyCastle.Math.BigInteger"/>.</returns>
  24722. <exception cref="T:System.IO.IOException">If client's credentials are invalid.</exception>
  24723. </member>
  24724. <member name="T:Org.BouncyCastle.Tls.Crypto.TlsSrp6VerifierGenerator">
  24725. <summary>Base interface for a generator for SRP-6 verifiers.</summary>
  24726. </member>
  24727. <member name="M:Org.BouncyCastle.Tls.Crypto.TlsSrp6VerifierGenerator.GenerateVerifier(System.Byte[],System.Byte[],System.Byte[])">
  24728. <summary>Creates a new SRP-6 verifier value.</summary>
  24729. <param name="salt">The salt to use, generally should be large and random</param>
  24730. <param name="identity">The user's identifying information (eg. username)</param>
  24731. <param name="password">The user's password</param>
  24732. <returns>A new verifier for use in future SRP authentication</returns>
  24733. </member>
  24734. <member name="T:Org.BouncyCastle.Tls.Crypto.TlsSrpConfig">
  24735. <summary>Basic config for SRP.</summary>
  24736. </member>
  24737. <member name="M:Org.BouncyCastle.Tls.Crypto.TlsSrpConfig.GetExplicitNG">
  24738. <summary>Return the (N, g) values used in SRP-6.</summary>
  24739. <returns>(N, g) as a BigInteger array (N=[0], g=[1]).</returns>
  24740. </member>
  24741. <member name="M:Org.BouncyCastle.Tls.Crypto.TlsSrpConfig.SetExplicitNG(Org.BouncyCastle.Math.BigInteger[])">
  24742. <summary>Set the (N, g) values used for SRP-6.</summary>
  24743. <param name="explicitNG">(N, g) as a BigInteger array (N=[0], g=[1]).</param>
  24744. </member>
  24745. <member name="M:Org.BouncyCastle.Tls.Crypto.TlsStreamSigner.GetOutputStream">
  24746. <exception cref="T:System.IO.IOException"/>
  24747. </member>
  24748. <member name="M:Org.BouncyCastle.Tls.Crypto.TlsStreamSigner.GetSignature">
  24749. <exception cref="T:System.IO.IOException"/>
  24750. </member>
  24751. <member name="M:Org.BouncyCastle.Tls.Crypto.TlsStreamVerifier.GetOutputStream">
  24752. <exception cref="T:System.IO.IOException"/>
  24753. </member>
  24754. <member name="M:Org.BouncyCastle.Tls.Crypto.TlsStreamVerifier.IsVerified">
  24755. <exception cref="T:System.IO.IOException"/>
  24756. </member>
  24757. <member name="T:Org.BouncyCastle.Tls.Crypto.TlsVerifier">
  24758. <summary>Base interface for a TLS verifier that works with signatures and either raw message digests, or entire
  24759. messages.</summary>
  24760. </member>
  24761. <member name="M:Org.BouncyCastle.Tls.Crypto.TlsVerifier.GetStreamVerifier(Org.BouncyCastle.Tls.DigitallySigned)">
  24762. <exception cref="T:System.IO.IOException"/>
  24763. </member>
  24764. <member name="M:Org.BouncyCastle.Tls.Crypto.TlsVerifier.VerifyRawSignature(Org.BouncyCastle.Tls.DigitallySigned,System.Byte[])">
  24765. <summary>Return true if the passed in signature and hash represent a real signature.</summary>
  24766. <param name="signature">the signature object containing the signature to be verified.</param>
  24767. <param name="hash">the hash calculated for the signature.</param>
  24768. <returns>true if signature verifies, false otherwise.</returns>
  24769. <exception cref="T:System.IO.IOException">in case of an exception verifying signature.</exception>
  24770. </member>
  24771. <member name="M:Org.BouncyCastle.Tls.DatagramReceiver.GetReceiveLimit">
  24772. <exception cref="T:System.IO.IOException"/>
  24773. </member>
  24774. <member name="M:Org.BouncyCastle.Tls.DatagramReceiver.Receive(System.Byte[],System.Int32,System.Int32,System.Int32)">
  24775. <exception cref="T:System.IO.IOException"/>
  24776. </member>
  24777. <member name="M:Org.BouncyCastle.Tls.DatagramSender.GetSendLimit">
  24778. <exception cref="T:System.IO.IOException"/>
  24779. </member>
  24780. <member name="M:Org.BouncyCastle.Tls.DatagramSender.Send(System.Byte[],System.Int32,System.Int32)">
  24781. <exception cref="T:System.IO.IOException"/>
  24782. </member>
  24783. <member name="T:Org.BouncyCastle.Tls.DatagramTransport">
  24784. <summary>Base interface for an object sending and receiving DTLS data.</summary>
  24785. </member>
  24786. <member name="T:Org.BouncyCastle.Tls.DefaultTlsCredentialedSigner">
  24787. <summary>Container class for generating signatures that carries the signature type, parameters, public key
  24788. certificate and public key's associated signer object.</summary>
  24789. </member>
  24790. <member name="M:Org.BouncyCastle.Tls.DefaultTlsDHGroupVerifier.#ctor">
  24791. <summary>Accept named groups and various standard DH groups with 'P' at least
  24792. <see cref="F:Org.BouncyCastle.Tls.DefaultTlsDHGroupVerifier.DefaultMinimumPrimeBits"/> bits.</summary>
  24793. </member>
  24794. <member name="M:Org.BouncyCastle.Tls.DefaultTlsDHGroupVerifier.#ctor(System.Int32)">
  24795. <summary>Accept named groups and various standard DH groups with 'P' at least the specified number of bits.
  24796. </summary>
  24797. <param name="minimumPrimeBits">the minimum bitlength of 'P'.</param>
  24798. </member>
  24799. <member name="M:Org.BouncyCastle.Tls.DefaultTlsDHGroupVerifier.#ctor(System.Collections.IList,System.Int32)">
  24800. <summary>Accept named groups and a custom set of group parameters, subject to a minimum bitlength for 'P'.
  24801. </summary>
  24802. <param name="groups">a <see cref="T:System.Collections.IList">list</see> of acceptable <see cref="T:Org.BouncyCastle.Tls.Crypto.DHGroup"/>s.</param>
  24803. <param name="minimumPrimeBits">the minimum bitlength of 'P'.</param>
  24804. </member>
  24805. <member name="M:Org.BouncyCastle.Tls.DefaultTlsServer.GetDsaSignerCredentials">
  24806. <exception cref="T:System.IO.IOException"/>
  24807. </member>
  24808. <member name="M:Org.BouncyCastle.Tls.DefaultTlsServer.GetECDsaSignerCredentials">
  24809. <exception cref="T:System.IO.IOException"/>
  24810. </member>
  24811. <member name="M:Org.BouncyCastle.Tls.DefaultTlsServer.GetRsaEncryptionCredentials">
  24812. <exception cref="T:System.IO.IOException"/>
  24813. </member>
  24814. <member name="M:Org.BouncyCastle.Tls.DefaultTlsServer.GetRsaSignerCredentials">
  24815. <exception cref="T:System.IO.IOException"/>
  24816. </member>
  24817. <member name="M:Org.BouncyCastle.Tls.DefaultTlsSrpConfigVerifier.#ctor">
  24818. <summary>Accept only the group parameters specified in RFC 5054 Appendix A.</summary>
  24819. </member>
  24820. <member name="M:Org.BouncyCastle.Tls.DefaultTlsSrpConfigVerifier.#ctor(System.Collections.IList)">
  24821. <summary>Specify a custom set of acceptable group parameters.</summary>
  24822. <param name="groups">an <see cref="T:System.Collections.IList"/> of acceptable <see cref="T:Org.BouncyCastle.Tls.Crypto.Srp6Group"/>.</param>
  24823. </member>
  24824. <member name="T:Org.BouncyCastle.Tls.DeferredHash">
  24825. <summary>Buffers input until the hash algorithm is determined.</summary>
  24826. </member>
  24827. <member name="M:Org.BouncyCastle.Tls.DeferredHash.CopyBufferTo(System.IO.Stream)">
  24828. <exception cref="T:System.IO.IOException"/>
  24829. </member>
  24830. <member name="M:Org.BouncyCastle.Tls.DigestInputBuffer.CopyTo(System.IO.Stream)">
  24831. <exception cref="T:System.IO.IOException"/>
  24832. </member>
  24833. <member name="P:Org.BouncyCastle.Tls.DigitallySigned.Algorithm">
  24834. <returns>a <see cref="T:Org.BouncyCastle.Tls.SignatureAndHashAlgorithm"/> (or null before TLS 1.2).</returns>
  24835. </member>
  24836. <member name="M:Org.BouncyCastle.Tls.DigitallySigned.Encode(System.IO.Stream)">
  24837. <summary>Encode this <see cref="T:Org.BouncyCastle.Tls.DigitallySigned"/> to a <see cref="T:System.IO.Stream"/>.</summary>
  24838. <param name="output">the <see cref="T:System.IO.Stream"/> to encode to.</param>
  24839. <exception cref="T:System.IO.IOException"/>
  24840. </member>
  24841. <member name="M:Org.BouncyCastle.Tls.DigitallySigned.Parse(Org.BouncyCastle.Tls.TlsContext,System.IO.Stream)">
  24842. <summary>Parse a <see cref="T:Org.BouncyCastle.Tls.DigitallySigned"/> from a <see cref="T:System.IO.Stream"/>.</summary>
  24843. <param name="context">the <see cref="T:Org.BouncyCastle.Tls.TlsContext"/> of the current connection.</param>
  24844. <param name="input">the <see cref="T:System.IO.Stream"/> to parse from.</param>
  24845. <returns>a <see cref="T:Org.BouncyCastle.Tls.DigitallySigned"/> object.</returns>
  24846. <exception cref="T:System.IO.IOException"/>
  24847. </member>
  24848. <member name="M:Org.BouncyCastle.Tls.DtlsClientProtocol.Connect(Org.BouncyCastle.Tls.TlsClient,Org.BouncyCastle.Tls.DatagramTransport)">
  24849. <exception cref="T:System.IO.IOException"/>
  24850. </member>
  24851. <member name="M:Org.BouncyCastle.Tls.DtlsClientProtocol.ClientHandshake(Org.BouncyCastle.Tls.DtlsClientProtocol.ClientHandshakeState,Org.BouncyCastle.Tls.DtlsRecordLayer)">
  24852. <exception cref="T:System.IO.IOException"/>
  24853. </member>
  24854. <member name="M:Org.BouncyCastle.Tls.DtlsClientProtocol.GenerateCertificateVerify(Org.BouncyCastle.Tls.DtlsClientProtocol.ClientHandshakeState,Org.BouncyCastle.Tls.DigitallySigned)">
  24855. <exception cref="T:System.IO.IOException"/>
  24856. </member>
  24857. <member name="M:Org.BouncyCastle.Tls.DtlsClientProtocol.GenerateClientHello(Org.BouncyCastle.Tls.DtlsClientProtocol.ClientHandshakeState)">
  24858. <exception cref="T:System.IO.IOException"/>
  24859. </member>
  24860. <member name="M:Org.BouncyCastle.Tls.DtlsClientProtocol.GenerateClientKeyExchange(Org.BouncyCastle.Tls.DtlsClientProtocol.ClientHandshakeState)">
  24861. <exception cref="T:System.IO.IOException"/>
  24862. </member>
  24863. <member name="M:Org.BouncyCastle.Tls.DtlsClientProtocol.ProcessCertificateRequest(Org.BouncyCastle.Tls.DtlsClientProtocol.ClientHandshakeState,System.Byte[])">
  24864. <exception cref="T:System.IO.IOException"/>
  24865. </member>
  24866. <member name="M:Org.BouncyCastle.Tls.DtlsClientProtocol.ProcessCertificateStatus(Org.BouncyCastle.Tls.DtlsClientProtocol.ClientHandshakeState,System.Byte[])">
  24867. <exception cref="T:System.IO.IOException"/>
  24868. </member>
  24869. <member name="M:Org.BouncyCastle.Tls.DtlsClientProtocol.ProcessHelloVerifyRequest(Org.BouncyCastle.Tls.DtlsClientProtocol.ClientHandshakeState,System.Byte[])">
  24870. <exception cref="T:System.IO.IOException"/>
  24871. </member>
  24872. <member name="M:Org.BouncyCastle.Tls.DtlsClientProtocol.ProcessNewSessionTicket(Org.BouncyCastle.Tls.DtlsClientProtocol.ClientHandshakeState,System.Byte[])">
  24873. <exception cref="T:System.IO.IOException"/>
  24874. </member>
  24875. <member name="M:Org.BouncyCastle.Tls.DtlsClientProtocol.ProcessServerCertificate(Org.BouncyCastle.Tls.DtlsClientProtocol.ClientHandshakeState,System.Byte[])">
  24876. <exception cref="T:System.IO.IOException"/>
  24877. </member>
  24878. <member name="M:Org.BouncyCastle.Tls.DtlsClientProtocol.ProcessServerHello(Org.BouncyCastle.Tls.DtlsClientProtocol.ClientHandshakeState,System.Byte[])">
  24879. <exception cref="T:System.IO.IOException"/>
  24880. </member>
  24881. <member name="M:Org.BouncyCastle.Tls.DtlsClientProtocol.ProcessServerKeyExchange(Org.BouncyCastle.Tls.DtlsClientProtocol.ClientHandshakeState,System.Byte[])">
  24882. <exception cref="T:System.IO.IOException"/>
  24883. </member>
  24884. <member name="M:Org.BouncyCastle.Tls.DtlsClientProtocol.ProcessServerSupplementalData(Org.BouncyCastle.Tls.DtlsClientProtocol.ClientHandshakeState,System.Byte[])">
  24885. <exception cref="T:System.IO.IOException"/>
  24886. </member>
  24887. <member name="M:Org.BouncyCastle.Tls.DtlsClientProtocol.ReportServerVersion(Org.BouncyCastle.Tls.DtlsClientProtocol.ClientHandshakeState,Org.BouncyCastle.Tls.ProtocolVersion)">
  24888. <exception cref="T:System.IO.IOException"/>
  24889. </member>
  24890. <member name="M:Org.BouncyCastle.Tls.DtlsClientProtocol.PatchClientHelloWithCookie(System.Byte[],System.Byte[])">
  24891. <exception cref="T:System.IO.IOException"/>
  24892. </member>
  24893. <member name="M:Org.BouncyCastle.Tls.DtlsEpoch.AllocateSequenceNumber">
  24894. <exception cref="T:System.IO.IOException"/>
  24895. </member>
  24896. <member name="M:Org.BouncyCastle.Tls.DtlsHandshakeRetransmit.ReceivedHandshakeRecord(System.Int32,System.Byte[],System.Int32,System.Int32)">
  24897. <exception cref="T:System.IO.IOException"/>
  24898. </member>
  24899. <member name="M:Org.BouncyCastle.Tls.DtlsProtocol.ProcessFinished(System.Byte[],System.Byte[])">
  24900. <exception cref="T:System.IO.IOException"/>
  24901. </member>
  24902. <member name="M:Org.BouncyCastle.Tls.DtlsProtocol.ApplyMaxFragmentLengthExtension(Org.BouncyCastle.Tls.DtlsRecordLayer,System.Int16)">
  24903. <exception cref="T:System.IO.IOException"/>
  24904. </member>
  24905. <member name="M:Org.BouncyCastle.Tls.DtlsProtocol.EvaluateMaxFragmentLengthExtension(System.Boolean,System.Collections.IDictionary,System.Collections.IDictionary,System.Int16)">
  24906. <exception cref="T:System.IO.IOException"/>
  24907. </member>
  24908. <member name="M:Org.BouncyCastle.Tls.DtlsProtocol.GenerateCertificate(Org.BouncyCastle.Tls.TlsContext,Org.BouncyCastle.Tls.Certificate,System.IO.Stream)">
  24909. <exception cref="T:System.IO.IOException"/>
  24910. </member>
  24911. <member name="M:Org.BouncyCastle.Tls.DtlsProtocol.GenerateSupplementalData(System.Collections.IList)">
  24912. <exception cref="T:System.IO.IOException"/>
  24913. </member>
  24914. <member name="M:Org.BouncyCastle.Tls.DtlsProtocol.SendCertificateMessage(Org.BouncyCastle.Tls.TlsContext,Org.BouncyCastle.Tls.DtlsReliableHandshake,Org.BouncyCastle.Tls.Certificate,System.IO.Stream)">
  24915. <exception cref="T:System.IO.IOException"/>
  24916. </member>
  24917. <member name="M:Org.BouncyCastle.Tls.DtlsProtocol.ValidateSelectedCipherSuite(System.Int32,System.Int16)">
  24918. <exception cref="T:System.IO.IOException"/>
  24919. </member>
  24920. <member name="M:Org.BouncyCastle.Tls.DtlsRecordLayer.ReceiveClientHelloRecord(System.Byte[],System.Int32,System.Int32)">
  24921. <exception cref="T:System.IO.IOException"/>
  24922. </member>
  24923. <member name="M:Org.BouncyCastle.Tls.DtlsRecordLayer.SendHelloVerifyRequestRecord(Org.BouncyCastle.Tls.DatagramSender,System.Int64,System.Byte[])">
  24924. <exception cref="T:System.IO.IOException"/>
  24925. </member>
  24926. <member name="M:Org.BouncyCastle.Tls.DtlsRecordLayer.SendDatagram(Org.BouncyCastle.Tls.DatagramSender,System.Byte[],System.Int32,System.Int32)">
  24927. <exception cref="T:System.IO.IOException"/>
  24928. </member>
  24929. <member name="M:Org.BouncyCastle.Tls.DtlsRecordLayer.GetReceiveLimit">
  24930. <exception cref="T:System.IO.IOException"/>
  24931. </member>
  24932. <member name="M:Org.BouncyCastle.Tls.DtlsRecordLayer.GetSendLimit">
  24933. <exception cref="T:System.IO.IOException"/>
  24934. </member>
  24935. <member name="M:Org.BouncyCastle.Tls.DtlsRecordLayer.Receive(System.Byte[],System.Int32,System.Int32,System.Int32)">
  24936. <exception cref="T:System.IO.IOException"/>
  24937. </member>
  24938. <member name="M:Org.BouncyCastle.Tls.DtlsRecordLayer.Send(System.Byte[],System.Int32,System.Int32)">
  24939. <exception cref="T:System.IO.IOException"/>
  24940. </member>
  24941. <member name="M:Org.BouncyCastle.Tls.DtlsRecordLayer.Close">
  24942. <exception cref="T:System.IO.IOException"/>
  24943. </member>
  24944. <member name="M:Org.BouncyCastle.Tls.DtlsRecordLayer.Warn(System.Int16,System.String)">
  24945. <exception cref="T:System.IO.IOException"/>
  24946. </member>
  24947. <member name="M:Org.BouncyCastle.Tls.DtlsRecordLayer.RaiseAlert(System.Int16,System.Int16,System.String,System.Exception)">
  24948. <exception cref="T:System.IO.IOException"/>
  24949. </member>
  24950. <member name="M:Org.BouncyCastle.Tls.DtlsRecordLayer.ReceiveDatagram(System.Byte[],System.Int32,System.Int32,System.Int32)">
  24951. <exception cref="T:System.IO.IOException"/>
  24952. </member>
  24953. <member name="M:Org.BouncyCastle.Tls.DtlsRecordLayer.ProcessRecord(System.Int32,System.Byte[],System.Byte[],System.Int32)">
  24954. <exception cref="T:System.IO.IOException"/>
  24955. </member>
  24956. <member name="M:Org.BouncyCastle.Tls.DtlsRecordLayer.ReceiveRecord(System.Byte[],System.Int32,System.Int32,System.Int32)">
  24957. <exception cref="T:System.IO.IOException"/>
  24958. </member>
  24959. <member name="M:Org.BouncyCastle.Tls.DtlsRecordLayer.SendHeartbeatMessage(Org.BouncyCastle.Tls.HeartbeatMessage)">
  24960. <exception cref="T:System.IO.IOException"/>
  24961. </member>
  24962. <member name="M:Org.BouncyCastle.Tls.DtlsRecordLayer.SendRecord(System.Int16,System.Byte[],System.Int32,System.Int32)">
  24963. <exception cref="T:System.IO.IOException"/>
  24964. </member>
  24965. <member name="M:Org.BouncyCastle.Tls.DtlsReliableHandshake.ReadClientRequest(System.Byte[],System.Int32,System.Int32,System.IO.Stream)">
  24966. <exception cref="T:System.IO.IOException"/>
  24967. </member>
  24968. <member name="M:Org.BouncyCastle.Tls.DtlsReliableHandshake.SendHelloVerifyRequest(Org.BouncyCastle.Tls.DatagramSender,System.Int64,System.Byte[])">
  24969. <exception cref="T:System.IO.IOException"/>
  24970. </member>
  24971. <member name="M:Org.BouncyCastle.Tls.DtlsReliableHandshake.SendMessage(System.Int16,System.Byte[])">
  24972. <exception cref="T:System.IO.IOException"/>
  24973. </member>
  24974. <member name="M:Org.BouncyCastle.Tls.DtlsReliableHandshake.ReceiveMessageBody(System.Int16)">
  24975. <exception cref="T:System.IO.IOException"/>
  24976. </member>
  24977. <member name="M:Org.BouncyCastle.Tls.DtlsReliableHandshake.ReceiveMessage">
  24978. <exception cref="T:System.IO.IOException"/>
  24979. </member>
  24980. <member name="M:Org.BouncyCastle.Tls.DtlsReliableHandshake.CheckInboundFlight">
  24981. Check that there are no "extra" messages left in the current inbound flight
  24982. </member>
  24983. <member name="M:Org.BouncyCastle.Tls.DtlsReliableHandshake.GetPendingMessage">
  24984. <exception cref="T:System.IO.IOException"/>
  24985. </member>
  24986. <member name="M:Org.BouncyCastle.Tls.DtlsReliableHandshake.ProcessRecord(System.Int32,System.Int32,System.Byte[],System.Int32,System.Int32)">
  24987. <exception cref="T:System.IO.IOException"/>
  24988. </member>
  24989. <member name="M:Org.BouncyCastle.Tls.DtlsReliableHandshake.ResendOutboundFlight">
  24990. <exception cref="T:System.IO.IOException"/>
  24991. </member>
  24992. <member name="M:Org.BouncyCastle.Tls.DtlsReliableHandshake.UpdateHandshakeMessagesDigest(Org.BouncyCastle.Tls.DtlsReliableHandshake.Message)">
  24993. <exception cref="T:System.IO.IOException"/>
  24994. </member>
  24995. <member name="M:Org.BouncyCastle.Tls.DtlsReliableHandshake.WriteMessage(Org.BouncyCastle.Tls.DtlsReliableHandshake.Message)">
  24996. <exception cref="T:System.IO.IOException"/>
  24997. </member>
  24998. <member name="M:Org.BouncyCastle.Tls.DtlsReliableHandshake.WriteHandshakeFragment(Org.BouncyCastle.Tls.DtlsReliableHandshake.Message,System.Int32,System.Int32)">
  24999. <exception cref="T:System.IO.IOException"/>
  25000. </member>
  25001. <member name="T:Org.BouncyCastle.Tls.DtlsReplayWindow">
  25002. RFC 4347 4.1.2.5 Anti-replay
  25003. <p>
  25004. Support fast rejection of duplicate records by maintaining a sliding receive window
  25005. </p>
  25006. </member>
  25007. <member name="M:Org.BouncyCastle.Tls.DtlsReplayWindow.ShouldDiscard(System.Int64)">
  25008. <summary>Check whether a received record with the given sequence number should be rejected as a duplicate.
  25009. </summary>
  25010. <param name="seq">the 48-bit DTLSPlainText.sequence_number field of a received record.</param>
  25011. <returns>true if the record should be discarded without further processing.</returns>
  25012. </member>
  25013. <member name="M:Org.BouncyCastle.Tls.DtlsReplayWindow.ReportAuthenticated(System.Int64)">
  25014. <summary>Report that a received record with the given sequence number passed authentication checks.
  25015. </summary>
  25016. <param name="seq">the 48-bit DTLSPlainText.sequence_number field of an authenticated record.</param>
  25017. </member>
  25018. <member name="M:Org.BouncyCastle.Tls.DtlsServerProtocol.Accept(Org.BouncyCastle.Tls.TlsServer,Org.BouncyCastle.Tls.DatagramTransport)">
  25019. <exception cref="T:System.IO.IOException"/>
  25020. </member>
  25021. <member name="M:Org.BouncyCastle.Tls.DtlsServerProtocol.Accept(Org.BouncyCastle.Tls.TlsServer,Org.BouncyCastle.Tls.DatagramTransport,Org.BouncyCastle.Tls.DtlsRequest)">
  25022. <exception cref="T:System.IO.IOException"/>
  25023. </member>
  25024. <member name="M:Org.BouncyCastle.Tls.DtlsServerProtocol.ServerHandshake(Org.BouncyCastle.Tls.DtlsServerProtocol.ServerHandshakeState,Org.BouncyCastle.Tls.DtlsRecordLayer,Org.BouncyCastle.Tls.DtlsRequest)">
  25025. <exception cref="T:System.IO.IOException"/>
  25026. </member>
  25027. <member name="M:Org.BouncyCastle.Tls.DtlsServerProtocol.GenerateCertificateRequest(Org.BouncyCastle.Tls.DtlsServerProtocol.ServerHandshakeState,Org.BouncyCastle.Tls.CertificateRequest)">
  25028. <exception cref="T:System.IO.IOException"/>
  25029. </member>
  25030. <member name="M:Org.BouncyCastle.Tls.DtlsServerProtocol.GenerateCertificateStatus(Org.BouncyCastle.Tls.DtlsServerProtocol.ServerHandshakeState,Org.BouncyCastle.Tls.CertificateStatus)">
  25031. <exception cref="T:System.IO.IOException"/>
  25032. </member>
  25033. <member name="M:Org.BouncyCastle.Tls.DtlsServerProtocol.GenerateNewSessionTicket(Org.BouncyCastle.Tls.DtlsServerProtocol.ServerHandshakeState,Org.BouncyCastle.Tls.NewSessionTicket)">
  25034. <exception cref="T:System.IO.IOException"/>
  25035. </member>
  25036. <member name="M:Org.BouncyCastle.Tls.DtlsServerProtocol.GenerateServerHello(Org.BouncyCastle.Tls.DtlsServerProtocol.ServerHandshakeState,Org.BouncyCastle.Tls.DtlsRecordLayer)">
  25037. <exception cref="T:System.IO.IOException"/>
  25038. </member>
  25039. <member name="M:Org.BouncyCastle.Tls.DtlsServerProtocol.NotifyClientCertificate(Org.BouncyCastle.Tls.DtlsServerProtocol.ServerHandshakeState,Org.BouncyCastle.Tls.Certificate)">
  25040. <exception cref="T:System.IO.IOException"/>
  25041. </member>
  25042. <member name="M:Org.BouncyCastle.Tls.DtlsServerProtocol.ProcessClientCertificate(Org.BouncyCastle.Tls.DtlsServerProtocol.ServerHandshakeState,System.Byte[])">
  25043. <exception cref="T:System.IO.IOException"/>
  25044. </member>
  25045. <member name="M:Org.BouncyCastle.Tls.DtlsServerProtocol.ProcessCertificateVerify(Org.BouncyCastle.Tls.DtlsServerProtocol.ServerHandshakeState,System.Byte[],Org.BouncyCastle.Tls.TlsHandshakeHash)">
  25046. <exception cref="T:System.IO.IOException"/>
  25047. </member>
  25048. <member name="M:Org.BouncyCastle.Tls.DtlsServerProtocol.ProcessClientHello(Org.BouncyCastle.Tls.DtlsServerProtocol.ServerHandshakeState,System.Byte[])">
  25049. <exception cref="T:System.IO.IOException"/>
  25050. </member>
  25051. <member name="M:Org.BouncyCastle.Tls.DtlsServerProtocol.ProcessClientHello(Org.BouncyCastle.Tls.DtlsServerProtocol.ServerHandshakeState,Org.BouncyCastle.Tls.ClientHello)">
  25052. <exception cref="T:System.IO.IOException"/>
  25053. </member>
  25054. <member name="M:Org.BouncyCastle.Tls.DtlsServerProtocol.ProcessClientKeyExchange(Org.BouncyCastle.Tls.DtlsServerProtocol.ServerHandshakeState,System.Byte[])">
  25055. <exception cref="T:System.IO.IOException"/>
  25056. </member>
  25057. <member name="M:Org.BouncyCastle.Tls.DtlsServerProtocol.ProcessClientSupplementalData(Org.BouncyCastle.Tls.DtlsServerProtocol.ServerHandshakeState,System.Byte[])">
  25058. <exception cref="T:System.IO.IOException"/>
  25059. </member>
  25060. <member name="M:Org.BouncyCastle.Tls.DtlsTransport.GetReceiveLimit">
  25061. <exception cref="T:System.IO.IOException"/>
  25062. </member>
  25063. <member name="M:Org.BouncyCastle.Tls.DtlsTransport.GetSendLimit">
  25064. <exception cref="T:System.IO.IOException"/>
  25065. </member>
  25066. <member name="M:Org.BouncyCastle.Tls.DtlsTransport.Receive(System.Byte[],System.Int32,System.Int32,System.Int32)">
  25067. <exception cref="T:System.IO.IOException"/>
  25068. </member>
  25069. <member name="M:Org.BouncyCastle.Tls.DtlsTransport.Send(System.Byte[],System.Int32,System.Int32)">
  25070. <exception cref="T:System.IO.IOException"/>
  25071. </member>
  25072. <member name="M:Org.BouncyCastle.Tls.DtlsTransport.Close">
  25073. <exception cref="T:System.IO.IOException"/>
  25074. </member>
  25075. <member name="T:Org.BouncyCastle.Tls.ECCurveType">
  25076. <summary>RFC 4492 5.4</summary>
  25077. </member>
  25078. <member name="F:Org.BouncyCastle.Tls.ECCurveType.explicit_prime">
  25079. Indicates the elliptic curve domain parameters are conveyed verbosely, and the
  25080. underlying finite field is a prime field.
  25081. </member>
  25082. <member name="F:Org.BouncyCastle.Tls.ECCurveType.explicit_char2">
  25083. Indicates the elliptic curve domain parameters are conveyed verbosely, and the
  25084. underlying finite field is a characteristic-2 field.
  25085. </member>
  25086. <member name="F:Org.BouncyCastle.Tls.ECCurveType.named_curve">
  25087. Indicates that a named curve is used. This option SHOULD be used when applicable.
  25088. </member>
  25089. <member name="T:Org.BouncyCastle.Tls.ECPointFormat">
  25090. <summary>RFC 4492 5.1.2</summary>
  25091. </member>
  25092. <member name="T:Org.BouncyCastle.Tls.EncryptionAlgorithm">
  25093. <summary>RFC 2246</summary>
  25094. <remarks>
  25095. Note that the values here are implementation-specific and arbitrary. It is recommended not to depend on the
  25096. particular values (e.g. serialization).
  25097. </remarks>
  25098. </member>
  25099. <member name="T:Org.BouncyCastle.Tls.ExporterLabel">
  25100. <summary>RFC 5705</summary>
  25101. </member>
  25102. <member name="M:Org.BouncyCastle.Tls.HandshakeMessageOutput.Send(Org.BouncyCastle.Tls.TlsProtocol,System.Int16,System.Byte[])">
  25103. <exception cref="T:System.IO.IOException"/>
  25104. </member>
  25105. <member name="M:Org.BouncyCastle.Tls.HandshakeMessageOutput.#ctor(System.Int16)">
  25106. <exception cref="T:System.IO.IOException"/>
  25107. </member>
  25108. <member name="M:Org.BouncyCastle.Tls.HandshakeMessageOutput.#ctor(System.Int16,System.Int32)">
  25109. <exception cref="T:System.IO.IOException"/>
  25110. </member>
  25111. <member name="M:Org.BouncyCastle.Tls.HandshakeMessageOutput.Send(Org.BouncyCastle.Tls.TlsProtocol)">
  25112. <exception cref="T:System.IO.IOException"/>
  25113. </member>
  25114. <member name="T:Org.BouncyCastle.Tls.HashAlgorithm">
  25115. <summary>RFC 5246 7.4.1.4.1</summary>
  25116. </member>
  25117. <member name="M:Org.BouncyCastle.Tls.HeartbeatExtension.Encode(System.IO.Stream)">
  25118. <summary>Encode this <see cref="T:Org.BouncyCastle.Tls.HeartbeatExtension"/> to a <see cref="T:System.IO.Stream"/>.</summary>
  25119. <param name="output">the <see cref="T:System.IO.Stream"/> to encode to.</param>
  25120. <exception cref="T:System.IO.IOException"/>
  25121. </member>
  25122. <member name="M:Org.BouncyCastle.Tls.HeartbeatExtension.Parse(System.IO.Stream)">
  25123. <summary>Parse a <see cref="T:Org.BouncyCastle.Tls.HeartbeatExtension"/> from a <see cref="T:System.IO.Stream"/>.</summary>
  25124. <param name="input">the <see cref="T:System.IO.Stream"/> to parse from.</param>
  25125. <returns>a <see cref="T:Org.BouncyCastle.Tls.HeartbeatExtension"/> object.</returns>
  25126. <exception cref="T:System.IO.IOException"/>
  25127. </member>
  25128. <member name="M:Org.BouncyCastle.Tls.HeartbeatMessage.Encode(System.IO.Stream)">
  25129. <summary>Encode this <see cref="T:Org.BouncyCastle.Tls.HeartbeatMessage"/> to a <see cref="T:System.IO.Stream"/>.</summary>
  25130. <param name="output">the <see cref="T:System.IO.Stream"/> to encode to.</param>
  25131. <exception cref="T:System.IO.IOException"/>
  25132. </member>
  25133. <member name="M:Org.BouncyCastle.Tls.HeartbeatMessage.Parse(System.IO.Stream)">
  25134. <summary>Parse a <see cref="T:Org.BouncyCastle.Tls.HeartbeatMessage"/> from a <see cref="T:System.IO.Stream"/>.</summary>
  25135. <param name="input">the <see cref="T:System.IO.Stream"/> to parse from.</param>
  25136. <returns>a <see cref="T:Org.BouncyCastle.Tls.HeartbeatMessage"/> object.</returns>
  25137. <exception cref="T:System.IO.IOException"/>
  25138. </member>
  25139. <member name="T:Org.BouncyCastle.Tls.HeartbeatMessageType">
  25140. <summary>RFC 6520 3.</summary>
  25141. </member>
  25142. <member name="T:Org.BouncyCastle.Tls.IdentifierType">
  25143. <summary>RFC 6066</summary>
  25144. </member>
  25145. <member name="T:Org.BouncyCastle.Tls.KeyExchangeAlgorithm">
  25146. <summary>RFC 2246</summary>
  25147. <remarks>
  25148. Note that the values here are implementation-specific and arbitrary. It is recommended not to depend on the
  25149. particular values (e.g. serialization).
  25150. </remarks>
  25151. </member>
  25152. <member name="M:Org.BouncyCastle.Tls.KeyShareEntry.#ctor(System.Int32,System.Byte[])">
  25153. <param name="namedGroup"><see cref="P:Org.BouncyCastle.Tls.KeyShareEntry.NamedGroup"/></param>
  25154. <param name="keyExchange"></param>
  25155. </member>
  25156. <member name="P:Org.BouncyCastle.Tls.KeyShareEntry.NamedGroup">
  25157. <returns><see cref="P:Org.BouncyCastle.Tls.KeyShareEntry.NamedGroup"/></returns>
  25158. </member>
  25159. <member name="M:Org.BouncyCastle.Tls.KeyShareEntry.Encode(System.IO.Stream)">
  25160. <summary>Encode this <see cref="T:Org.BouncyCastle.Tls.KeyShareEntry"/> to a <see cref="T:System.IO.Stream"/>.</summary>
  25161. <param name="output">the <see cref="T:System.IO.Stream"/> to encode to.</param>
  25162. <exception cref="T:System.IO.IOException"/>
  25163. </member>
  25164. <member name="M:Org.BouncyCastle.Tls.KeyShareEntry.Parse(System.IO.Stream)">
  25165. <summary>Parse a <see cref="T:Org.BouncyCastle.Tls.KeyShareEntry"/> from a <see cref="T:System.IO.Stream"/>.</summary>
  25166. <param name="input">the <see cref="T:System.IO.Stream"/> to parse from.</param>
  25167. <returns>a <see cref="T:Org.BouncyCastle.Tls.KeyShareEntry"/> object.</returns>
  25168. <exception cref="T:System.IO.IOException"/>
  25169. </member>
  25170. <member name="T:Org.BouncyCastle.Tls.KeyUpdateRequest">
  25171. <summary>RFC 8446 4.6.3</summary>
  25172. </member>
  25173. <member name="T:Org.BouncyCastle.Tls.MacAlgorithm">
  25174. <summary>RFC 2246</summary>
  25175. <remarks>
  25176. Note that the values here are implementation-specific and arbitrary. It is recommended not to depend on the
  25177. particular values (e.g. serialization).
  25178. </remarks>
  25179. </member>
  25180. <member name="T:Org.BouncyCastle.Tls.NamedGroup">
  25181. <summary>RFC 7919</summary>
  25182. </member>
  25183. <member name="T:Org.BouncyCastle.Tls.NamedGroupRole">
  25184. <remarks>
  25185. Note that the values here are implementation-specific and arbitrary. It is recommended not to depend on the
  25186. particular values (e.g. serialization).
  25187. </remarks>
  25188. </member>
  25189. <member name="M:Org.BouncyCastle.Tls.NewSessionTicket.Encode(System.IO.Stream)">
  25190. <summary>Encode this <see cref="T:Org.BouncyCastle.Tls.NewSessionTicket"/> to a <see cref="T:System.IO.Stream"/>.</summary>
  25191. <param name="output">the <see cref="T:System.IO.Stream"/> to encode to.</param>
  25192. <exception cref="T:System.IO.IOException"/>
  25193. </member>
  25194. <member name="M:Org.BouncyCastle.Tls.NewSessionTicket.Parse(System.IO.Stream)">
  25195. <summary>Parse a <see cref="T:Org.BouncyCastle.Tls.NewSessionTicket"/> from a <see cref="T:System.IO.Stream"/>.</summary>
  25196. <param name="input">the <see cref="T:System.IO.Stream"/> to parse from.</param>
  25197. <returns>a <see cref="T:Org.BouncyCastle.Tls.NewSessionTicket"/> object.</returns>
  25198. <exception cref="T:System.IO.IOException"/>
  25199. </member>
  25200. <member name="T:Org.BouncyCastle.Tls.OcspStatusRequest">
  25201. <summary>RFC 3546 3.6</summary>
  25202. </member>
  25203. <member name="M:Org.BouncyCastle.Tls.OcspStatusRequest.#ctor(System.Collections.IList,Org.BouncyCastle.Asn1.X509.X509Extensions)">
  25204. <param name="responderIDList">an <see cref="T:System.Collections.IList"/> of <see cref="T:Org.BouncyCastle.Asn1.Ocsp.ResponderID"/>, specifying the list of
  25205. trusted OCSP responders. An empty list has the special meaning that the responders are implicitly known to
  25206. the server - e.g., by prior arrangement.</param>
  25207. <param name="requestExtensions">OCSP request extensions. A null value means that there are no extensions.
  25208. </param>
  25209. </member>
  25210. <member name="P:Org.BouncyCastle.Tls.OcspStatusRequest.ResponderIDList">
  25211. <returns>an <see cref="T:System.Collections.IList"/> of <see cref="T:Org.BouncyCastle.Asn1.Ocsp.ResponderID"/>.</returns>
  25212. </member>
  25213. <member name="P:Org.BouncyCastle.Tls.OcspStatusRequest.RequestExtensions">
  25214. <returns>OCSP request extensions.</returns>
  25215. </member>
  25216. <member name="M:Org.BouncyCastle.Tls.OcspStatusRequest.Encode(System.IO.Stream)">
  25217. <summary>Encode this <see cref="T:Org.BouncyCastle.Tls.OcspStatusRequest"/> to a <see cref="T:System.IO.Stream"/>.</summary>
  25218. <param name="output">the <see cref="T:System.IO.Stream"/> to encode to.</param>
  25219. <exception cref="T:System.IO.IOException"/>
  25220. </member>
  25221. <member name="M:Org.BouncyCastle.Tls.OcspStatusRequest.Parse(System.IO.Stream)">
  25222. <summary>Parse an <see cref="T:Org.BouncyCastle.Tls.OcspStatusRequest"/> from a <see cref="T:System.IO.Stream"/>.</summary>
  25223. <param name="input">the <see cref="T:System.IO.Stream"/> to parse from.</param>
  25224. <returns>an <see cref="T:Org.BouncyCastle.Tls.OcspStatusRequest"/> object.</returns>
  25225. <exception cref="T:System.IO.IOException"/>
  25226. </member>
  25227. <member name="M:Org.BouncyCastle.Tls.OfferedPsks.Encode(System.IO.Stream)">
  25228. <exception cref="T:System.IO.IOException"/>
  25229. </member>
  25230. <member name="M:Org.BouncyCastle.Tls.OfferedPsks.EncodeBinders(System.IO.Stream,Org.BouncyCastle.Tls.Crypto.TlsCrypto,Org.BouncyCastle.Tls.TlsHandshakeHash,Org.BouncyCastle.Tls.OfferedPsks.BindersConfig)">
  25231. <exception cref="T:System.IO.IOException"/>
  25232. </member>
  25233. <member name="M:Org.BouncyCastle.Tls.OfferedPsks.GetBindersSize(Org.BouncyCastle.Tls.TlsPsk[])">
  25234. <exception cref="T:System.IO.IOException"/>
  25235. </member>
  25236. <member name="M:Org.BouncyCastle.Tls.OfferedPsks.Parse(System.IO.Stream)">
  25237. <exception cref="T:System.IO.IOException"/>
  25238. </member>
  25239. <member name="T:Org.BouncyCastle.Tls.PrfAlgorithm">
  25240. <summary>RFC 5246</summary>
  25241. <remarks>
  25242. Note that the values here are implementation-specific and arbitrary. It is recommended not to depend on the
  25243. particular values (e.g. serialization).
  25244. </remarks>
  25245. </member>
  25246. <member name="T:Org.BouncyCastle.Tls.ProtocolName">
  25247. <summary>RFC 7301 Represents a protocol name for use with ALPN.</summary>
  25248. </member>
  25249. <member name="M:Org.BouncyCastle.Tls.ProtocolName.Encode(System.IO.Stream)">
  25250. <summary>Encode this <see cref="T:Org.BouncyCastle.Tls.ProtocolName"/> to a <see cref="T:System.IO.Stream"/>.</summary>
  25251. <param name="output">the <see cref="T:System.IO.Stream"/> to encode to.</param>
  25252. <exception cref="T:System.IO.IOException"/>
  25253. </member>
  25254. <member name="M:Org.BouncyCastle.Tls.ProtocolName.Parse(System.IO.Stream)">
  25255. <summary>Parse a <see cref="T:Org.BouncyCastle.Tls.ProtocolName"/> from a <see cref="T:System.IO.Stream"/>.</summary>
  25256. <param name="input">the <see cref="T:System.IO.Stream"/> to parse from.</param>
  25257. <returns>a <see cref="T:Org.BouncyCastle.Tls.ProtocolName"/> object.</returns>
  25258. <exception cref="T:System.IO.IOException"/>
  25259. </member>
  25260. <member name="M:Org.BouncyCastle.Tls.PskTlsClient.GetAuthentication">
  25261. <exception cref="T:System.IO.IOException"/>
  25262. </member>
  25263. <member name="M:Org.BouncyCastle.Tls.PskTlsServer.GetRsaEncryptionCredentials">
  25264. <exception cref="T:System.IO.IOException"/>
  25265. </member>
  25266. <member name="T:Org.BouncyCastle.Tls.RecordStream">
  25267. <summary>An implementation of the TLS 1.0/1.1/1.2 record layer.</summary>
  25268. </member>
  25269. <member name="M:Org.BouncyCastle.Tls.RecordStream.NotifyChangeCipherSpecReceived">
  25270. <exception cref="T:System.IO.IOException"/>
  25271. </member>
  25272. <member name="M:Org.BouncyCastle.Tls.RecordStream.EnablePendingCipherRead(System.Boolean)">
  25273. <exception cref="T:System.IO.IOException"/>
  25274. </member>
  25275. <member name="M:Org.BouncyCastle.Tls.RecordStream.EnablePendingCipherWrite">
  25276. <exception cref="T:System.IO.IOException"/>
  25277. </member>
  25278. <member name="M:Org.BouncyCastle.Tls.RecordStream.FinaliseHandshake">
  25279. <exception cref="T:System.IO.IOException"/>
  25280. </member>
  25281. <member name="M:Org.BouncyCastle.Tls.RecordStream.NotifyKeyUpdateReceived">
  25282. <exception cref="T:System.IO.IOException"/>
  25283. </member>
  25284. <member name="M:Org.BouncyCastle.Tls.RecordStream.NotifyKeyUpdateSent">
  25285. <exception cref="T:System.IO.IOException"/>
  25286. </member>
  25287. <member name="M:Org.BouncyCastle.Tls.RecordStream.PreviewRecordHeader(System.Byte[])">
  25288. <exception cref="T:System.IO.IOException"/>
  25289. </member>
  25290. <member name="M:Org.BouncyCastle.Tls.RecordStream.ReadFullRecord(System.Byte[],System.Int32,System.Int32)">
  25291. <exception cref="T:System.IO.IOException"/>
  25292. </member>
  25293. <member name="M:Org.BouncyCastle.Tls.RecordStream.ReadRecord">
  25294. <exception cref="T:System.IO.IOException"/>
  25295. </member>
  25296. <member name="M:Org.BouncyCastle.Tls.RecordStream.DecodeAndVerify(System.Int16,Org.BouncyCastle.Tls.ProtocolVersion,System.Byte[],System.Int32,System.Int32)">
  25297. <exception cref="T:System.IO.IOException"/>
  25298. </member>
  25299. <member name="M:Org.BouncyCastle.Tls.RecordStream.WriteRecord(System.Int16,System.Byte[],System.Int32,System.Int32)">
  25300. <exception cref="T:System.IO.IOException"/>
  25301. </member>
  25302. <member name="M:Org.BouncyCastle.Tls.RecordStream.Close">
  25303. <exception cref="T:System.IO.IOException"/>
  25304. </member>
  25305. <member name="M:Org.BouncyCastle.Tls.RecordStream.CheckChangeCipherSpec(System.Byte[],System.Int32,System.Int32)">
  25306. <exception cref="T:System.IO.IOException"/>
  25307. </member>
  25308. <member name="M:Org.BouncyCastle.Tls.RecordStream.CheckRecordType(System.Byte[],System.Int32)">
  25309. <exception cref="T:System.IO.IOException"/>
  25310. </member>
  25311. <member name="M:Org.BouncyCastle.Tls.RecordStream.CheckLength(System.Int32,System.Int32,System.Int16)">
  25312. <exception cref="T:System.IO.IOException"/>
  25313. </member>
  25314. <member name="M:Org.BouncyCastle.Tls.RecordStream.Record.FillTo(System.IO.Stream,System.Int32)">
  25315. <exception cref="T:System.IO.IOException"/>
  25316. </member>
  25317. <member name="M:Org.BouncyCastle.Tls.RecordStream.Record.ReadFragment(System.IO.Stream,System.Int32)">
  25318. <exception cref="T:System.IO.IOException"/>
  25319. </member>
  25320. <member name="M:Org.BouncyCastle.Tls.RecordStream.Record.ReadHeader(System.IO.Stream)">
  25321. <exception cref="T:System.IO.IOException"/>
  25322. </member>
  25323. <member name="M:Org.BouncyCastle.Tls.RecordStream.SequenceNumber.NextValue(System.Int16)">
  25324. <exception cref="T:Org.BouncyCastle.Tls.TlsFatalAlert"/>
  25325. </member>
  25326. <member name="M:Org.BouncyCastle.Tls.ServerHello.Encode(Org.BouncyCastle.Tls.TlsContext,System.IO.Stream)">
  25327. <summary>Encode this <see cref="T:Org.BouncyCastle.Tls.ServerHello"/> to a <see cref="T:System.IO.Stream"/>.</summary>
  25328. <param name="context">the <see cref="T:Org.BouncyCastle.Tls.TlsContext"/> of the current connection.</param>
  25329. <param name="output">the <see cref="T:System.IO.Stream"/> to encode to.</param>
  25330. <exception cref="T:System.IO.IOException"/>
  25331. </member>
  25332. <member name="M:Org.BouncyCastle.Tls.ServerHello.Parse(System.IO.MemoryStream)">
  25333. <summary>Parse a <see cref="T:Org.BouncyCastle.Tls.ServerHello"/> from a <see cref="T:System.IO.MemoryStream"/>.</summary>
  25334. <param name="input">the <see cref="T:System.IO.MemoryStream"/> to parse from.</param>
  25335. <returns>a <see cref="T:Org.BouncyCastle.Tls.ServerHello"/> object.</returns>
  25336. <exception cref="T:System.IO.IOException"/>
  25337. </member>
  25338. <member name="T:Org.BouncyCastle.Tls.ServerName">
  25339. <summary>RFC 6066 3. Server Name Indication</summary>
  25340. <remarks>
  25341. Current implementation uses this guidance: "For backward compatibility, all future data structures associated
  25342. with new NameTypes MUST begin with a 16-bit length field. TLS MAY treat provided server names as opaque data
  25343. and pass the names and types to the application.". RFC 6066 specifies ASCII encoding for host_name (possibly
  25344. using A-labels for IDNs), but note that the previous version (RFC 4366) specified UTF-8 encoding (see RFC 6066
  25345. Appendix A). For maximum compatibility, it is recommended that client code tolerate receiving UTF-8 from the
  25346. peer, but only generate ASCII itself.
  25347. </remarks>
  25348. </member>
  25349. <member name="M:Org.BouncyCastle.Tls.ServerName.Encode(System.IO.Stream)">
  25350. <summary>Encode this <see cref="T:Org.BouncyCastle.Tls.ServerName"/> to a <see cref="T:System.IO.Stream"/>.</summary>
  25351. <param name="output">the <see cref="T:System.IO.Stream"/> to encode to.</param>
  25352. <exception cref="T:System.IO.IOException"/>
  25353. </member>
  25354. <member name="M:Org.BouncyCastle.Tls.ServerName.Parse(System.IO.Stream)">
  25355. <summary>Parse a <see cref="T:Org.BouncyCastle.Tls.ServerName"/> from a <see cref="T:System.IO.Stream"/>.</summary>
  25356. <param name="input">the <see cref="T:System.IO.Stream"/> to parse from.</param>
  25357. <returns>a <see cref="T:Org.BouncyCastle.Tls.ServerName"/> object.</returns>
  25358. <exception cref="T:System.IO.IOException"/>
  25359. </member>
  25360. <member name="M:Org.BouncyCastle.Tls.ServerNameList.#ctor(System.Collections.IList)">
  25361. <param name="serverNameList">an <see cref="T:System.Collections.IList"/> of <see cref="T:Org.BouncyCastle.Tls.ServerName"/>.</param>
  25362. </member>
  25363. <member name="P:Org.BouncyCastle.Tls.ServerNameList.ServerNames">
  25364. <returns>an <see cref="T:System.Collections.IList"/> of <see cref="T:Org.BouncyCastle.Tls.ServerName"/>.</returns>
  25365. </member>
  25366. <member name="M:Org.BouncyCastle.Tls.ServerNameList.Encode(System.IO.Stream)">
  25367. <summary>Encode this <see cref="T:Org.BouncyCastle.Tls.ServerNameList"/> to a <see cref="T:System.IO.Stream"/>.</summary>
  25368. <param name="output">the <see cref="T:System.IO.Stream"/> to encode to .</param>
  25369. <exception cref="T:System.IO.IOException"/>
  25370. </member>
  25371. <member name="M:Org.BouncyCastle.Tls.ServerNameList.Parse(System.IO.Stream)">
  25372. <summary>Parse a <see cref="T:Org.BouncyCastle.Tls.ServerNameList"/> from a <see cref="T:System.IO.Stream"/>.</summary>
  25373. <param name="input">the <see cref="T:System.IO.Stream"/> to parse from.</param>
  25374. <returns>a <see cref="T:Org.BouncyCastle.Tls.ServerNameList"/> object.</returns>
  25375. <exception cref="T:System.IO.IOException"/>
  25376. </member>
  25377. <member name="M:Org.BouncyCastle.Tls.ServerSrpParams.Encode(System.IO.Stream)">
  25378. <summary>Encode this <see cref="T:Org.BouncyCastle.Tls.ServerSrpParams"/> to a <see cref="T:System.IO.Stream"/>.</summary>
  25379. <param name="output">the <see cref="T:System.IO.Stream"/> to encode to.</param>
  25380. <exception cref="T:System.IO.IOException"/>
  25381. </member>
  25382. <member name="M:Org.BouncyCastle.Tls.ServerSrpParams.Parse(System.IO.Stream)">
  25383. <summary>Parse a <see cref="T:Org.BouncyCastle.Tls.ServerSrpParams"/> from a <see cref="T:System.IO.Stream"/>.</summary>
  25384. <param name="input">the <see cref="T:System.IO.Stream"/> to parse from.</param>
  25385. <returns>a <see cref="T:Org.BouncyCastle.Tls.ServerSrpParams"/> object.</returns>
  25386. <exception cref="T:System.IO.IOException"/>
  25387. </member>
  25388. <member name="M:Org.BouncyCastle.Tls.SessionParameters.Builder.SetServerExtensions(System.Collections.IDictionary)">
  25389. <exception cref="T:System.IO.IOException"/>
  25390. </member>
  25391. <member name="M:Org.BouncyCastle.Tls.SessionParameters.ReadServerExtensions">
  25392. <exception cref="T:System.IO.IOException"/>
  25393. </member>
  25394. <member name="T:Org.BouncyCastle.Tls.SignatureAlgorithm">
  25395. RFC 5246 7.4.1.4.1 (in RFC 2246, there were no specific values assigned)
  25396. </member>
  25397. <member name="T:Org.BouncyCastle.Tls.SignatureAndHashAlgorithm">
  25398. <summary>RFC 5246 7.4.1.4.1</summary>
  25399. </member>
  25400. <member name="M:Org.BouncyCastle.Tls.SignatureAndHashAlgorithm.#ctor(System.Int16,System.Int16)">
  25401. <param name="hash"><see cref="T:Org.BouncyCastle.Tls.HashAlgorithm"/></param>
  25402. <param name="signature"><see cref="T:Org.BouncyCastle.Tls.SignatureAlgorithm"/></param>
  25403. </member>
  25404. <member name="P:Org.BouncyCastle.Tls.SignatureAndHashAlgorithm.Hash">
  25405. <returns><see cref="T:Org.BouncyCastle.Tls.HashAlgorithm"/></returns>
  25406. </member>
  25407. <member name="P:Org.BouncyCastle.Tls.SignatureAndHashAlgorithm.Signature">
  25408. <returns><see cref="T:Org.BouncyCastle.Tls.SignatureAlgorithm"/></returns>
  25409. </member>
  25410. <member name="M:Org.BouncyCastle.Tls.SignatureAndHashAlgorithm.Encode(System.IO.Stream)">
  25411. <summary>Encode this <see cref="T:Org.BouncyCastle.Tls.SignatureAndHashAlgorithm"/> to a <see cref="T:System.IO.Stream"/>.</summary>
  25412. <param name="output">the <see cref="T:System.IO.Stream"/> to encode to.</param>
  25413. <exception cref="T:System.IO.IOException"/>
  25414. </member>
  25415. <member name="M:Org.BouncyCastle.Tls.SignatureAndHashAlgorithm.Parse(System.IO.Stream)">
  25416. <summary>Parse a <see cref="T:Org.BouncyCastle.Tls.SignatureAndHashAlgorithm"/> from a <see cref="T:System.IO.Stream"/>.</summary>
  25417. <param name="input">the <see cref="T:System.IO.Stream"/> to parse from.</param>
  25418. <returns>a <see cref="T:Org.BouncyCastle.Tls.SignatureAndHashAlgorithm"/> object.</returns>
  25419. <exception cref="T:System.IO.IOException"/>
  25420. </member>
  25421. <member name="M:Org.BouncyCastle.Tls.SignatureScheme.GetNamedGroup(System.Int32)">
  25422. For TLS 1.3+ usage, some signature schemes are constrained to use a particular
  25423. ({@link NamedGroup}. Not relevant for TLS 1.2 and below.
  25424. </member>
  25425. <member name="T:Org.BouncyCastle.Tls.SimulatedTlsSrpIdentityManager">
  25426. <summary>An implementation of <see cref="T:Org.BouncyCastle.Tls.TlsSrpIdentityManager"/> that simulates the existence of "unknown"
  25427. identities to obscure the fact that there is no verifier for them.</summary>
  25428. </member>
  25429. <member name="M:Org.BouncyCastle.Tls.SimulatedTlsSrpIdentityManager.GetRfc5054Default(Org.BouncyCastle.Tls.Crypto.TlsCrypto,Org.BouncyCastle.Tls.Crypto.Srp6Group,System.Byte[])">
  25430. <summary>Create a <see cref="T:Org.BouncyCastle.Tls.SimulatedTlsSrpIdentityManager"/> that implements the algorithm from RFC 5054
  25431. 2.5.1.3.</summary>
  25432. <param name="crypto"><see cref="T:Org.BouncyCastle.Tls.Crypto.TlsCrypto"/></param>
  25433. <param name="group">the <see cref="T:Org.BouncyCastle.Tls.Crypto.Srp6Group"/> defining the group that SRP is operating in.</param>
  25434. <param name="seedKey">the secret "seed key" referred to in RFC 5054 2.5.1.3.</param>
  25435. <returns>an instance of <see cref="T:Org.BouncyCastle.Tls.SimulatedTlsSrpIdentityManager"/>.</returns>
  25436. <exception cref="T:System.IO.IOException"/>
  25437. </member>
  25438. <member name="M:Org.BouncyCastle.Tls.SrpTlsClient.GetClientExtensions">
  25439. <exception cref="T:System.IO.IOException"/>
  25440. </member>
  25441. <member name="M:Org.BouncyCastle.Tls.SrpTlsClient.ProcessServerExtensions(System.Collections.IDictionary)">
  25442. <exception cref="T:System.IO.IOException"/>
  25443. </member>
  25444. <member name="M:Org.BouncyCastle.Tls.SrpTlsClient.GetAuthentication">
  25445. <exception cref="T:System.IO.IOException"/>
  25446. </member>
  25447. <member name="M:Org.BouncyCastle.Tls.SrpTlsServer.GetDsaSignerCredentials">
  25448. <exception cref="T:System.IO.IOException"/>
  25449. </member>
  25450. <member name="M:Org.BouncyCastle.Tls.SrpTlsServer.GetRsaSignerCredentials">
  25451. <exception cref="T:System.IO.IOException"/>
  25452. </member>
  25453. <member name="M:Org.BouncyCastle.Tls.Ssl3Utilities.ReadEncryptedPms(System.IO.Stream)">
  25454. <exception cref="T:System.IO.IOException"/>
  25455. </member>
  25456. <member name="M:Org.BouncyCastle.Tls.Ssl3Utilities.WriteEncryptedPms(System.Byte[],System.IO.Stream)">
  25457. <exception cref="T:System.IO.IOException"/>
  25458. </member>
  25459. <member name="T:Org.BouncyCastle.Tls.SupplementalDataType">
  25460. <summary>RFC 4680</summary>
  25461. </member>
  25462. <member name="T:Org.BouncyCastle.Tls.TlsAuthentication">
  25463. <summary>Base interface to provide TLS authentication credentials.</summary>
  25464. </member>
  25465. <member name="M:Org.BouncyCastle.Tls.TlsAuthentication.NotifyServerCertificate(Org.BouncyCastle.Tls.TlsServerCertificate)">
  25466. <summary>Called by the protocol handler to report the server certificate.</summary>
  25467. <remarks>
  25468. Note: this method is responsible for certificate verification and validation.
  25469. </remarks>
  25470. <param name="serverCertificate">the server certificate received.</param>
  25471. <exception cref="T:System.IO.IOException"/>
  25472. </member>
  25473. <member name="M:Org.BouncyCastle.Tls.TlsAuthentication.GetClientCredentials(Org.BouncyCastle.Tls.CertificateRequest)">
  25474. <summary>Return client credentials in response to server's certificate request.</summary>
  25475. <remarks>
  25476. The returned value may be null, or else it MUST implement <em>exactly one</em> of
  25477. <see cref="T:Org.BouncyCastle.Tls.TlsCredentialedAgreement"/>, <see cref="T:Org.BouncyCastle.Tls.TlsCredentialedDecryptor"/>, or
  25478. <see cref="T:Org.BouncyCastle.Tls.TlsCredentialedSigner"/>, depending on the key exchange that was negotiated and the details of
  25479. the <see cref="T:Org.BouncyCastle.Tls.CertificateRequest"/>.
  25480. </remarks>
  25481. <param name="certificateRequest">details of the certificate request.</param>
  25482. <returns>a <see cref="T:Org.BouncyCastle.Tls.TlsCredentials"/> object or null for no client authentication.</returns>
  25483. <exception cref="T:System.IO.IOException"/>
  25484. </member>
  25485. <member name="M:Org.BouncyCastle.Tls.TlsClient.GetSessionToResume">
  25486. <summary>Return the session this client wants to resume, if any.</summary>
  25487. <remarks>
  25488. Note that the peer's certificate chain for the session (if any) may need to be periodically revalidated.
  25489. </remarks>
  25490. <returns>A <see cref="T:Org.BouncyCastle.Tls.TlsSession"/> representing the resumable session to be used for this connection, or
  25491. null to use a new session.</returns>
  25492. <seealso cref="P:Org.BouncyCastle.Tls.SessionParameters.PeerCertificate"/>
  25493. </member>
  25494. <member name="M:Org.BouncyCastle.Tls.TlsClient.GetExternalPsks">
  25495. <summary>Return the <see cref="T:Org.BouncyCastle.Tls.TlsPskExternal">external PSKs</see> to offer in the ClientHello.</summary>
  25496. <remarks>This will only be called when TLS 1.3 or higher is amongst the offered protocol versions.</remarks>
  25497. <returns>an <see cref="T:System.Collections.IList"/> of <see cref="T:Org.BouncyCastle.Tls.TlsPskExternal"/> instances, or null if none should be
  25498. offered.</returns>
  25499. </member>
  25500. <member name="M:Org.BouncyCastle.Tls.TlsClient.GetClientExtensions">
  25501. <returns>(Int32 -> byte[])</returns>
  25502. <exception cref="T:System.IO.IOException"/>
  25503. </member>
  25504. <member name="M:Org.BouncyCastle.Tls.TlsClient.GetEarlyKeyShareGroups">
  25505. <summary>If this client is offering TLS 1.3 or higher, this method may be called to determine for which
  25506. groups a key share should be included in the initial ClientHello.</summary>
  25507. <remarks>
  25508. Groups that were not included in the supported_groups extension (by <see cref="M:Org.BouncyCastle.Tls.TlsClient.GetClientExtensions"/> will
  25509. be ignored. The protocol will then add a suitable key_share extension to the ClientHello extensions.
  25510. </remarks>
  25511. <returns>an <see cref="T:System.Collections.IList"/> of <see cref="T:Org.BouncyCastle.Tls.NamedGroup">named group</see> values, possibly empty or null.
  25512. </returns>
  25513. </member>
  25514. <member name="M:Org.BouncyCastle.Tls.TlsClient.NotifyServerVersion(Org.BouncyCastle.Tls.ProtocolVersion)">
  25515. <exception cref="T:System.IO.IOException"/>
  25516. </member>
  25517. <member name="M:Org.BouncyCastle.Tls.TlsClient.NotifySessionToResume(Org.BouncyCastle.Tls.TlsSession)">
  25518. <summary>Notifies the client of the session that will be offered in ClientHello for resumption, if any.
  25519. </summary>
  25520. <remarks>
  25521. This will be either the session returned from {@link #getSessionToResume()} or null if that session was
  25522. unusable. NOTE: the actual negotiated session_id is notified by <see cref="M:Org.BouncyCastle.Tls.TlsClient.NotifySessionID(System.Byte[])"/>.
  25523. </remarks>
  25524. <param name="session">The <see cref="T:Org.BouncyCastle.Tls.TlsSession"/> representing the resumable session to be offered for
  25525. this connection, or null if there is none.</param>
  25526. <seealso cref="M:Org.BouncyCastle.Tls.TlsClient.NotifySessionID(System.Byte[])"/>
  25527. </member>
  25528. <member name="M:Org.BouncyCastle.Tls.TlsClient.NotifySessionID(System.Byte[])">
  25529. <summary>Notifies the client of the session_id sent in the ServerHello.</summary>
  25530. <param name="sessionID"/>
  25531. <seealso cref="P:Org.BouncyCastle.Tls.TlsContext.Session"/>
  25532. </member>
  25533. <member name="M:Org.BouncyCastle.Tls.TlsClient.NotifySelectedPsk(Org.BouncyCastle.Tls.TlsPsk)">
  25534. <exception cref="T:System.IO.IOException"/>
  25535. </member>
  25536. <member name="M:Org.BouncyCastle.Tls.TlsClient.ProcessServerExtensions(System.Collections.IDictionary)">
  25537. <summary>The protocol implementation validates that any server extensions received correspond to client
  25538. extensions sent.</summary>
  25539. <remarks>
  25540. If further processing of the server extensions is needed, it can be done in this callback. NOTE: This is
  25541. not called for session resumption handshakes.
  25542. </remarks>
  25543. <param name="serverExtensions">(Int32 -> byte[])</param>
  25544. <exception cref="T:System.IO.IOException"/>
  25545. </member>
  25546. <member name="M:Org.BouncyCastle.Tls.TlsClient.ProcessServerSupplementalData(System.Collections.IList)">
  25547. <param name="serverSupplementalData">(SupplementalDataEntry)</param>
  25548. <exception cref="T:System.IO.IOException"/>
  25549. </member>
  25550. <member name="M:Org.BouncyCastle.Tls.TlsClient.GetPskIdentity">
  25551. <exception cref="T:System.IO.IOException"/>
  25552. </member>
  25553. <member name="M:Org.BouncyCastle.Tls.TlsClient.GetSrpIdentity">
  25554. <exception cref="T:System.IO.IOException"/>
  25555. </member>
  25556. <member name="M:Org.BouncyCastle.Tls.TlsClient.GetDHGroupVerifier">
  25557. <exception cref="T:System.IO.IOException"/>
  25558. </member>
  25559. <member name="M:Org.BouncyCastle.Tls.TlsClient.GetSrpConfigVerifier">
  25560. <exception cref="T:System.IO.IOException"/>
  25561. </member>
  25562. <member name="M:Org.BouncyCastle.Tls.TlsClient.GetAuthentication">
  25563. <exception cref="T:System.IO.IOException"/>
  25564. </member>
  25565. <member name="M:Org.BouncyCastle.Tls.TlsClient.GetClientSupplementalData">
  25566. <returns>(SupplementalDataEntry)</returns>
  25567. <exception cref="T:System.IO.IOException"/>
  25568. </member>
  25569. <member name="M:Org.BouncyCastle.Tls.TlsClient.NotifyNewSessionTicket(Org.BouncyCastle.Tls.NewSessionTicket)">
  25570. <summary>RFC 5077 3.3. NewSessionTicket Handshake Message</summary>
  25571. <remarks>
  25572. This method will be called (only) when a NewSessionTicket handshake message is received. The ticket is
  25573. opaque to the client and clients MUST NOT examine the ticket under the assumption that it complies with e.g.
  25574. RFC 5077 4. "Recommended Ticket Construction".
  25575. </remarks>
  25576. <param name="newSessionTicket">The ticket.</param>
  25577. <exception cref="T:System.IO.IOException"/>
  25578. </member>
  25579. <member name="T:Org.BouncyCastle.Tls.TlsClientContext">
  25580. <summary>Marker interface to distinguish a TLS client context.</summary>
  25581. </member>
  25582. <member name="M:Org.BouncyCastle.Tls.TlsClientProtocol.#ctor">
  25583. <summary>Constructor for non-blocking mode.</summary>
  25584. <remarks>
  25585. When data is received, use <see cref="M:Org.BouncyCastle.Tls.TlsProtocol.OfferInput(System.Byte[])"/> to provide the received ciphertext,
  25586. then use <see cref="M:Org.BouncyCastle.Tls.TlsProtocol.ReadInput(System.Byte[],System.Int32,System.Int32)"/> to read the corresponding cleartext.<br/><br/>
  25587. Similarly, when data needs to be sent, use <see cref="M:Org.BouncyCastle.Tls.TlsProtocol.WriteApplicationData(System.Byte[],System.Int32,System.Int32)"/>
  25588. to provide the cleartext, then use <see cref="M:Org.BouncyCastle.Tls.TlsProtocol.ReadOutput(System.Byte[],System.Int32,System.Int32)"/> to get the
  25589. corresponding ciphertext.
  25590. </remarks>
  25591. </member>
  25592. <member name="M:Org.BouncyCastle.Tls.TlsClientProtocol.#ctor(System.IO.Stream)">
  25593. <summary>Constructor for blocking mode.</summary>
  25594. <param name="stream">The <see cref="T:System.IO.Stream"/> of data to/from the server.</param>
  25595. </member>
  25596. <member name="M:Org.BouncyCastle.Tls.TlsClientProtocol.#ctor(System.IO.Stream,System.IO.Stream)">
  25597. <summary>Constructor for blocking mode.</summary>
  25598. <param name="input">The <see cref="T:System.IO.Stream"/> of data from the server.</param>
  25599. <param name="output">The <see cref="T:System.IO.Stream"/> of data to the server.</param>
  25600. </member>
  25601. <member name="M:Org.BouncyCastle.Tls.TlsClientProtocol.Connect(Org.BouncyCastle.Tls.TlsClient)">
  25602. <summary>Initiates a TLS handshake in the role of client.</summary>
  25603. <remarks>
  25604. In blocking mode, this will not return until the handshake is complete. In non-blocking mode, use
  25605. <see cref="M:Org.BouncyCastle.Tls.TlsPeer.NotifyHandshakeComplete"/> to receive a callback when the handshake is complete.
  25606. </remarks>
  25607. <param name="tlsClient">The <see cref="T:Org.BouncyCastle.Tls.TlsClient"/> to use for the handshake.</param>
  25608. <exception cref="T:System.IO.IOException">If in blocking mode and handshake was not successful.</exception>
  25609. </member>
  25610. <member name="M:Org.BouncyCastle.Tls.TlsClientProtocol.Handle13HandshakeMessage(System.Int16,Org.BouncyCastle.Tls.HandshakeMessageInput)">
  25611. <exception cref="T:System.IO.IOException"/>
  25612. </member>
  25613. <member name="M:Org.BouncyCastle.Tls.TlsClientProtocol.HandleServerCertificate">
  25614. <exception cref="T:System.IO.IOException"/>
  25615. </member>
  25616. <member name="M:Org.BouncyCastle.Tls.TlsClientProtocol.HandleSupplementalData(System.Collections.IList)">
  25617. <exception cref="T:System.IO.IOException"/>
  25618. </member>
  25619. <member name="M:Org.BouncyCastle.Tls.TlsClientProtocol.Process13HelloRetryRequest(Org.BouncyCastle.Tls.ServerHello)">
  25620. <exception cref="T:System.IO.IOException"/>
  25621. </member>
  25622. <member name="M:Org.BouncyCastle.Tls.TlsClientProtocol.Process13ServerHello(Org.BouncyCastle.Tls.ServerHello,System.Boolean)">
  25623. <exception cref="T:System.IO.IOException"/>
  25624. </member>
  25625. <member name="M:Org.BouncyCastle.Tls.TlsClientProtocol.Process13ServerHelloCoda(Org.BouncyCastle.Tls.ServerHello,System.Boolean)">
  25626. <exception cref="T:System.IO.IOException"/>
  25627. </member>
  25628. <member name="M:Org.BouncyCastle.Tls.TlsClientProtocol.ProcessServerHello(Org.BouncyCastle.Tls.ServerHello)">
  25629. <exception cref="T:System.IO.IOException"/>
  25630. </member>
  25631. <member name="M:Org.BouncyCastle.Tls.TlsClientProtocol.Receive13CertificateRequest(System.IO.MemoryStream,System.Boolean)">
  25632. <exception cref="T:System.IO.IOException"/>
  25633. </member>
  25634. <member name="M:Org.BouncyCastle.Tls.TlsClientProtocol.Receive13EncryptedExtensions(System.IO.MemoryStream)">
  25635. <exception cref="T:System.IO.IOException"/>
  25636. </member>
  25637. <member name="M:Org.BouncyCastle.Tls.TlsClientProtocol.Receive13NewSessionTicket(System.IO.MemoryStream)">
  25638. <exception cref="T:System.IO.IOException"/>
  25639. </member>
  25640. <member name="M:Org.BouncyCastle.Tls.TlsClientProtocol.Receive13ServerCertificate(System.IO.MemoryStream)">
  25641. <exception cref="T:System.IO.IOException"/>
  25642. </member>
  25643. <member name="M:Org.BouncyCastle.Tls.TlsClientProtocol.Receive13ServerCertificateVerify(System.IO.MemoryStream)">
  25644. <exception cref="T:System.IO.IOException"/>
  25645. </member>
  25646. <member name="M:Org.BouncyCastle.Tls.TlsClientProtocol.Receive13ServerFinished(System.IO.MemoryStream)">
  25647. <exception cref="T:System.IO.IOException"/>
  25648. </member>
  25649. <member name="M:Org.BouncyCastle.Tls.TlsClientProtocol.ReceiveCertificateRequest(System.IO.MemoryStream)">
  25650. <exception cref="T:System.IO.IOException"/>
  25651. </member>
  25652. <member name="M:Org.BouncyCastle.Tls.TlsClientProtocol.ReceiveNewSessionTicket(System.IO.MemoryStream)">
  25653. <exception cref="T:System.IO.IOException"/>
  25654. </member>
  25655. <member name="M:Org.BouncyCastle.Tls.TlsClientProtocol.ReceiveServerHelloMessage(System.IO.MemoryStream)">
  25656. <exception cref="T:System.IO.IOException"/>
  25657. </member>
  25658. <member name="M:Org.BouncyCastle.Tls.TlsClientProtocol.Send13ClientHelloRetry">
  25659. <exception cref="T:System.IO.IOException"/>
  25660. </member>
  25661. <member name="M:Org.BouncyCastle.Tls.TlsClientProtocol.SendCertificateVerifyMessage(Org.BouncyCastle.Tls.DigitallySigned)">
  25662. <exception cref="T:System.IO.IOException"/>
  25663. </member>
  25664. <member name="M:Org.BouncyCastle.Tls.TlsClientProtocol.SendClientHello">
  25665. <exception cref="T:System.IO.IOException"/>
  25666. </member>
  25667. <member name="M:Org.BouncyCastle.Tls.TlsClientProtocol.SendClientHelloMessage">
  25668. <exception cref="T:System.IO.IOException"/>
  25669. </member>
  25670. <member name="M:Org.BouncyCastle.Tls.TlsClientProtocol.SendClientKeyExchange">
  25671. <exception cref="T:System.IO.IOException"/>
  25672. </member>
  25673. <member name="M:Org.BouncyCastle.Tls.TlsClientProtocol.Skip13CertificateRequest">
  25674. <exception cref="T:System.IO.IOException"/>
  25675. </member>
  25676. <member name="M:Org.BouncyCastle.Tls.TlsClientProtocol.Skip13ServerCertificate">
  25677. <exception cref="T:System.IO.IOException"/>
  25678. </member>
  25679. <member name="M:Org.BouncyCastle.Tls.TlsCloseable.Close">
  25680. <exception cref="T:System.IO.IOException"/>
  25681. </member>
  25682. <member name="T:Org.BouncyCastle.Tls.TlsContext">
  25683. <summary>Base interface for a TLS context implementation.</summary>
  25684. </member>
  25685. <member name="P:Org.BouncyCastle.Tls.TlsContext.IsServer">
  25686. <summary>Return true if this context is for a server, false otherwise.</summary>
  25687. <returns>true for a server based context, false for a client based one.</returns>
  25688. </member>
  25689. <member name="P:Org.BouncyCastle.Tls.TlsContext.ResumableSession">
  25690. <summary>Used to get the resumable session, if any, used by this connection.</summary>
  25691. <remarks>
  25692. Only available after the handshake has successfully completed.
  25693. </remarks>
  25694. <returns>A <see cref="T:Org.BouncyCastle.Tls.TlsSession"/> representing the resumable session used by this connection, or null if
  25695. no resumable session available.</returns>
  25696. <seealso cref="M:Org.BouncyCastle.Tls.TlsPeer.NotifyHandshakeComplete"/>
  25697. </member>
  25698. <member name="P:Org.BouncyCastle.Tls.TlsContext.Session">
  25699. <summary>Used to get the session information for this connection.</summary>
  25700. <remarks>
  25701. Only available after the handshake has successfully completed. Use <see cref="P:Org.BouncyCastle.Tls.TlsSession.IsResumable"/>
  25702. to find out if the session is resumable.
  25703. </remarks>
  25704. <returns>A <see cref="T:Org.BouncyCastle.Tls.TlsSession"/> representing the session used by this connection.</returns>
  25705. <seealso cref="M:Org.BouncyCastle.Tls.TlsPeer.NotifyHandshakeComplete"/>
  25706. </member>
  25707. <member name="M:Org.BouncyCastle.Tls.TlsContext.ExportChannelBinding(System.Int32)">
  25708. <summary>Export the value of the specified channel binding.</summary>
  25709. <remarks>
  25710. Only available after the handshake has successfully completed.
  25711. </remarks>
  25712. <param name="channelBinding">A <see cref="T:Org.BouncyCastle.Tls.ChannelBinding"/> constant specifying the channel binding to
  25713. export.</param>
  25714. <returns>A copy of the channel binding data as a <c>byte[]</c>, or null if the binding could not be
  25715. determined.</returns>
  25716. </member>
  25717. <member name="M:Org.BouncyCastle.Tls.TlsContext.ExportEarlyKeyingMaterial(System.String,System.Byte[],System.Int32)">
  25718. <summary>Export (early data) keying material according to RFC 5705: "Keying Material Exporters for TLS", as
  25719. updated for TLS 1.3 (RFC 8446).</summary>
  25720. <remarks>
  25721. NOTE: for use in settings where an exporter is needed for 0-RTT data.
  25722. </remarks>
  25723. <param name="asciiLabel">indicates which application will use the exported keys.</param>
  25724. <param name="context_value">allows the application using the exporter to mix its own data with the TLS PRF
  25725. for the exporter output.</param>
  25726. <param name="length">the number of bytes to generate.</param>
  25727. <returns>a pseudorandom bit string of 'length' bytes generated from the (exporter_)master_secret.</returns>
  25728. </member>
  25729. <member name="M:Org.BouncyCastle.Tls.TlsContext.ExportKeyingMaterial(System.String,System.Byte[],System.Int32)">
  25730. <summary>Export keying material according to RFC 5705: "Keying Material Exporters for TLS", as updated for
  25731. TLS 1.3 (RFC 8446) when negotiated.</summary>
  25732. <param name="asciiLabel">indicates which application will use the exported keys.</param>
  25733. <param name="context_value">allows the application using the exporter to mix its own data with the TLS PRF
  25734. for the exporter output.</param>
  25735. <param name="length">the number of bytes to generate.</param>
  25736. <returns>a pseudorandom bit string of 'length' bytes generated from the (exporter_)master_secret.</returns>
  25737. </member>
  25738. <member name="T:Org.BouncyCastle.Tls.TlsCredentialedAgreement">
  25739. <summary>Support interface for generating a secret based on the credentials sent by a TLS peer.</summary>
  25740. </member>
  25741. <member name="M:Org.BouncyCastle.Tls.TlsCredentialedAgreement.GenerateAgreement(Org.BouncyCastle.Tls.Crypto.TlsCertificate)">
  25742. <summary>Calculate an agreed secret based on our credentials and the public key credentials of our peer.
  25743. </summary>
  25744. <param name="peerCertificate">public key certificate of our TLS peer.</param>
  25745. <returns>the agreed secret.</returns>
  25746. <exception cref="T:System.IO.IOException">in case of an exception on generation of the secret.</exception>
  25747. </member>
  25748. <member name="T:Org.BouncyCastle.Tls.TlsCredentialedDecryptor">
  25749. <summary>Base interface for a class that decrypts TLS secrets.</summary>
  25750. </member>
  25751. <member name="M:Org.BouncyCastle.Tls.TlsCredentialedDecryptor.Decrypt(Org.BouncyCastle.Tls.Crypto.TlsCryptoParameters,System.Byte[])">
  25752. <summary>Decrypt the passed in cipher text using the parameters available.</summary>
  25753. <param name="cryptoParams">the parameters to use for the decryption.</param>
  25754. <param name="ciphertext">the cipher text containing the secret.</param>
  25755. <returns>a TLS secret.</returns>
  25756. <exception cref="T:System.IO.IOException">on a parsing or decryption error.</exception>
  25757. </member>
  25758. <member name="T:Org.BouncyCastle.Tls.TlsCredentialedSigner">
  25759. <summary>Support interface for generating a signature based on our private credentials.</summary>
  25760. </member>
  25761. <member name="M:Org.BouncyCastle.Tls.TlsCredentialedSigner.GenerateRawSignature(System.Byte[])">
  25762. <summary>Generate a signature against the passed in hash.</summary>
  25763. <param name="hash">a message digest calculated across the message the signature is to apply to.</param>
  25764. <returns>an encoded signature.</returns>
  25765. <exception cref="T:System.IO.IOException">if the hash cannot be processed, or there is an issue with the private
  25766. credentials.</exception>
  25767. </member>
  25768. <member name="P:Org.BouncyCastle.Tls.TlsCredentialedSigner.SignatureAndHashAlgorithm">
  25769. <summary>Return the algorithm IDs for the signature algorithm and the associated hash it uses.</summary>
  25770. <returns>the full algorithm details for the signature.</returns>
  25771. </member>
  25772. <member name="M:Org.BouncyCastle.Tls.TlsCredentialedSigner.GetStreamSigner">
  25773. <exception cref="T:System.IO.IOException"/>
  25774. </member>
  25775. <member name="T:Org.BouncyCastle.Tls.TlsCredentials">
  25776. <summary>Base interface for interfaces/classes carrying TLS credentials.</summary>
  25777. </member>
  25778. <member name="P:Org.BouncyCastle.Tls.TlsCredentials.Certificate">
  25779. <summary>Return the certificate structure representing our identity.</summary>
  25780. <returns>our certificate structure.</returns>
  25781. </member>
  25782. <member name="T:Org.BouncyCastle.Tls.TlsDHanonKeyExchange">
  25783. <summary>(D)TLS DH_anon key exchange.</summary>
  25784. </member>
  25785. <member name="T:Org.BouncyCastle.Tls.TlsDHGroupVerifier">
  25786. <summary>Interface for verifying explicit Diffie-Hellman group parameters.</summary>
  25787. </member>
  25788. <member name="M:Org.BouncyCastle.Tls.TlsDHGroupVerifier.Accept(Org.BouncyCastle.Tls.Crypto.DHGroup)">
  25789. <summary>Check whether the given DH group is acceptable for use.</summary>
  25790. <param name="dhGroup">the <see cref="T:Org.BouncyCastle.Tls.Crypto.DHGroup"/> to check.</param>
  25791. <returns>true if (and only if) the specified group is acceptable.</returns>
  25792. </member>
  25793. <member name="T:Org.BouncyCastle.Tls.TlsDHKeyExchange">
  25794. <summary>(D)TLS DH key exchange.</summary>
  25795. </member>
  25796. <member name="M:Org.BouncyCastle.Tls.TlsDHUtilities.ReceiveDHConfig(Org.BouncyCastle.Tls.TlsContext,Org.BouncyCastle.Tls.TlsDHGroupVerifier,System.IO.Stream)">
  25797. <exception cref="T:System.IO.IOException"/>
  25798. </member>
  25799. <member name="M:Org.BouncyCastle.Tls.TlsDHUtilities.ReadDHParameter(System.IO.Stream)">
  25800. <exception cref="T:System.IO.IOException"/>
  25801. </member>
  25802. <member name="M:Org.BouncyCastle.Tls.TlsDHUtilities.WriteDHConfig(Org.BouncyCastle.Tls.Crypto.TlsDHConfig,System.IO.Stream)">
  25803. <exception cref="T:System.IO.IOException"/>
  25804. </member>
  25805. <member name="M:Org.BouncyCastle.Tls.TlsDHUtilities.WriteDHParameter(Org.BouncyCastle.Math.BigInteger,System.IO.Stream)">
  25806. <exception cref="T:System.IO.IOException"/>
  25807. </member>
  25808. <member name="M:Org.BouncyCastle.Tls.TlsEccUtilities.CreateNamedECConfig(Org.BouncyCastle.Tls.TlsContext,System.Int32)">
  25809. <exception cref="T:System.IO.IOException"/>
  25810. </member>
  25811. <member name="M:Org.BouncyCastle.Tls.TlsEccUtilities.CheckPointEncoding(System.Int32,System.Byte[])">
  25812. <exception cref="T:System.IO.IOException"/>
  25813. </member>
  25814. <member name="M:Org.BouncyCastle.Tls.TlsEccUtilities.ReceiveECDHConfig(Org.BouncyCastle.Tls.TlsContext,System.IO.Stream)">
  25815. <exception cref="T:System.IO.IOException"/>
  25816. </member>
  25817. <member name="M:Org.BouncyCastle.Tls.TlsEccUtilities.WriteECConfig(Org.BouncyCastle.Tls.Crypto.TlsECConfig,System.IO.Stream)">
  25818. <exception cref="T:System.IO.IOException"/>
  25819. </member>
  25820. <member name="M:Org.BouncyCastle.Tls.TlsEccUtilities.WriteNamedECParameters(System.Int32,System.IO.Stream)">
  25821. <exception cref="T:System.IO.IOException"/>
  25822. </member>
  25823. <member name="T:Org.BouncyCastle.Tls.TlsECDHanonKeyExchange">
  25824. <summary>(D)TLS ECDH_anon key exchange (see RFC 4492).</summary>
  25825. </member>
  25826. <member name="T:Org.BouncyCastle.Tls.TlsECDheKeyExchange">
  25827. <summary>(D)TLS ECDHE key exchange (see RFC 4492).</summary>
  25828. </member>
  25829. <member name="T:Org.BouncyCastle.Tls.TlsECDHKeyExchange">
  25830. <summary>(D)TLS ECDH key exchange (see RFC 4492).</summary>
  25831. </member>
  25832. <member name="M:Org.BouncyCastle.Tls.TlsExtensionsUtilities.AddAlpnExtensionClient(System.Collections.IDictionary,System.Collections.IList)">
  25833. <param name="extensions">(Int32 -> byte[])</param>
  25834. <param name="protocolNameList">an <see cref="T:System.Collections.IList"/> of <see cref="T:Org.BouncyCastle.Tls.ProtocolName"/>.</param>
  25835. <exception cref="T:System.IO.IOException"/>
  25836. </member>
  25837. <member name="M:Org.BouncyCastle.Tls.TlsExtensionsUtilities.AddAlpnExtensionServer(System.Collections.IDictionary,Org.BouncyCastle.Tls.ProtocolName)">
  25838. <exception cref="T:System.IO.IOException"/>
  25839. </member>
  25840. <member name="M:Org.BouncyCastle.Tls.TlsExtensionsUtilities.AddCertificateAuthoritiesExtension(System.Collections.IDictionary,System.Collections.IList)">
  25841. <exception cref="T:System.IO.IOException"/>
  25842. </member>
  25843. <member name="M:Org.BouncyCastle.Tls.TlsExtensionsUtilities.AddClientCertificateTypeExtensionClient(System.Collections.IDictionary,System.Int16[])">
  25844. <exception cref="T:System.IO.IOException"/>
  25845. </member>
  25846. <member name="M:Org.BouncyCastle.Tls.TlsExtensionsUtilities.AddClientCertificateTypeExtensionServer(System.Collections.IDictionary,System.Int16)">
  25847. <exception cref="T:System.IO.IOException"/>
  25848. </member>
  25849. <member name="M:Org.BouncyCastle.Tls.TlsExtensionsUtilities.AddCookieExtension(System.Collections.IDictionary,System.Byte[])">
  25850. <exception cref="T:System.IO.IOException"/>
  25851. </member>
  25852. <member name="M:Org.BouncyCastle.Tls.TlsExtensionsUtilities.AddEarlyDataMaxSize(System.Collections.IDictionary,System.Int64)">
  25853. <exception cref="T:System.IO.IOException"/>
  25854. </member>
  25855. <member name="M:Org.BouncyCastle.Tls.TlsExtensionsUtilities.AddHeartbeatExtension(System.Collections.IDictionary,Org.BouncyCastle.Tls.HeartbeatExtension)">
  25856. <exception cref="T:System.IO.IOException"/>
  25857. </member>
  25858. <member name="M:Org.BouncyCastle.Tls.TlsExtensionsUtilities.AddKeyShareClientHello(System.Collections.IDictionary,System.Collections.IList)">
  25859. <exception cref="T:System.IO.IOException"/>
  25860. </member>
  25861. <member name="M:Org.BouncyCastle.Tls.TlsExtensionsUtilities.AddKeyShareHelloRetryRequest(System.Collections.IDictionary,System.Int32)">
  25862. <exception cref="T:System.IO.IOException"/>
  25863. </member>
  25864. <member name="M:Org.BouncyCastle.Tls.TlsExtensionsUtilities.AddKeyShareServerHello(System.Collections.IDictionary,Org.BouncyCastle.Tls.KeyShareEntry)">
  25865. <exception cref="T:System.IO.IOException"/>
  25866. </member>
  25867. <member name="M:Org.BouncyCastle.Tls.TlsExtensionsUtilities.AddMaxFragmentLengthExtension(System.Collections.IDictionary,System.Int16)">
  25868. <exception cref="T:System.IO.IOException"/>
  25869. </member>
  25870. <member name="M:Org.BouncyCastle.Tls.TlsExtensionsUtilities.AddOidFiltersExtension(System.Collections.IDictionary,System.Collections.IDictionary)">
  25871. <exception cref="T:System.IO.IOException"/>
  25872. </member>
  25873. <member name="M:Org.BouncyCastle.Tls.TlsExtensionsUtilities.AddPaddingExtension(System.Collections.IDictionary,System.Int32)">
  25874. <exception cref="T:System.IO.IOException"/>
  25875. </member>
  25876. <member name="M:Org.BouncyCastle.Tls.TlsExtensionsUtilities.AddPreSharedKeyClientHello(System.Collections.IDictionary,Org.BouncyCastle.Tls.OfferedPsks)">
  25877. <exception cref="T:System.IO.IOException"/>
  25878. </member>
  25879. <member name="M:Org.BouncyCastle.Tls.TlsExtensionsUtilities.AddPreSharedKeyServerHello(System.Collections.IDictionary,System.Int32)">
  25880. <exception cref="T:System.IO.IOException"/>
  25881. </member>
  25882. <member name="M:Org.BouncyCastle.Tls.TlsExtensionsUtilities.AddPskKeyExchangeModesExtension(System.Collections.IDictionary,System.Int16[])">
  25883. <exception cref="T:System.IO.IOException"/>
  25884. </member>
  25885. <member name="M:Org.BouncyCastle.Tls.TlsExtensionsUtilities.AddRecordSizeLimitExtension(System.Collections.IDictionary,System.Int32)">
  25886. <exception cref="T:System.IO.IOException"/>
  25887. </member>
  25888. <member name="M:Org.BouncyCastle.Tls.TlsExtensionsUtilities.AddServerCertificateTypeExtensionClient(System.Collections.IDictionary,System.Int16[])">
  25889. <exception cref="T:System.IO.IOException"/>
  25890. </member>
  25891. <member name="M:Org.BouncyCastle.Tls.TlsExtensionsUtilities.AddServerCertificateTypeExtensionServer(System.Collections.IDictionary,System.Int16)">
  25892. <exception cref="T:System.IO.IOException"/>
  25893. </member>
  25894. <member name="M:Org.BouncyCastle.Tls.TlsExtensionsUtilities.AddServerNameExtensionClient(System.Collections.IDictionary,System.Collections.IList)">
  25895. <exception cref="T:System.IO.IOException"/>
  25896. </member>
  25897. <member name="M:Org.BouncyCastle.Tls.TlsExtensionsUtilities.AddServerNameExtensionServer(System.Collections.IDictionary)">
  25898. <exception cref="T:System.IO.IOException"/>
  25899. </member>
  25900. <member name="M:Org.BouncyCastle.Tls.TlsExtensionsUtilities.AddSignatureAlgorithmsExtension(System.Collections.IDictionary,System.Collections.IList)">
  25901. <exception cref="T:System.IO.IOException"/>
  25902. </member>
  25903. <member name="M:Org.BouncyCastle.Tls.TlsExtensionsUtilities.AddSignatureAlgorithmsCertExtension(System.Collections.IDictionary,System.Collections.IList)">
  25904. <exception cref="T:System.IO.IOException"/>
  25905. </member>
  25906. <member name="M:Org.BouncyCastle.Tls.TlsExtensionsUtilities.AddStatusRequestExtension(System.Collections.IDictionary,Org.BouncyCastle.Tls.CertificateStatusRequest)">
  25907. <exception cref="T:System.IO.IOException"/>
  25908. </member>
  25909. <member name="M:Org.BouncyCastle.Tls.TlsExtensionsUtilities.AddStatusRequestV2Extension(System.Collections.IDictionary,System.Collections.IList)">
  25910. <exception cref="T:System.IO.IOException"/>
  25911. </member>
  25912. <member name="M:Org.BouncyCastle.Tls.TlsExtensionsUtilities.AddSupportedGroupsExtension(System.Collections.IDictionary,System.Collections.IList)">
  25913. <exception cref="T:System.IO.IOException"/>
  25914. </member>
  25915. <member name="M:Org.BouncyCastle.Tls.TlsExtensionsUtilities.AddSupportedPointFormatsExtension(System.Collections.IDictionary,System.Int16[])">
  25916. <exception cref="T:System.IO.IOException"/>
  25917. </member>
  25918. <member name="M:Org.BouncyCastle.Tls.TlsExtensionsUtilities.AddSupportedVersionsExtensionClient(System.Collections.IDictionary,Org.BouncyCastle.Tls.ProtocolVersion[])">
  25919. <exception cref="T:System.IO.IOException"/>
  25920. </member>
  25921. <member name="M:Org.BouncyCastle.Tls.TlsExtensionsUtilities.AddSupportedVersionsExtensionServer(System.Collections.IDictionary,Org.BouncyCastle.Tls.ProtocolVersion)">
  25922. <exception cref="T:System.IO.IOException"/>
  25923. </member>
  25924. <member name="M:Org.BouncyCastle.Tls.TlsExtensionsUtilities.AddTrustedCAKeysExtensionClient(System.Collections.IDictionary,System.Collections.IList)">
  25925. <exception cref="T:System.IO.IOException"/>
  25926. </member>
  25927. <member name="M:Org.BouncyCastle.Tls.TlsExtensionsUtilities.GetAlpnExtensionClient(System.Collections.IDictionary)">
  25928. <returns>an <see cref="T:System.Collections.IList"/> of <see cref="T:Org.BouncyCastle.Tls.ProtocolName"/>.</returns>
  25929. <exception cref="T:System.IO.IOException"/>
  25930. </member>
  25931. <member name="M:Org.BouncyCastle.Tls.TlsExtensionsUtilities.GetAlpnExtensionServer(System.Collections.IDictionary)">
  25932. <exception cref="T:System.IO.IOException"/>
  25933. </member>
  25934. <member name="M:Org.BouncyCastle.Tls.TlsExtensionsUtilities.GetCertificateAuthoritiesExtension(System.Collections.IDictionary)">
  25935. <exception cref="T:System.IO.IOException"/>
  25936. </member>
  25937. <member name="M:Org.BouncyCastle.Tls.TlsExtensionsUtilities.GetClientCertificateTypeExtensionClient(System.Collections.IDictionary)">
  25938. <exception cref="T:System.IO.IOException"/>
  25939. </member>
  25940. <member name="M:Org.BouncyCastle.Tls.TlsExtensionsUtilities.GetClientCertificateTypeExtensionServer(System.Collections.IDictionary)">
  25941. <exception cref="T:System.IO.IOException"/>
  25942. </member>
  25943. <member name="M:Org.BouncyCastle.Tls.TlsExtensionsUtilities.GetCookieExtension(System.Collections.IDictionary)">
  25944. <exception cref="T:System.IO.IOException"/>
  25945. </member>
  25946. <member name="M:Org.BouncyCastle.Tls.TlsExtensionsUtilities.GetEarlyDataMaxSize(System.Collections.IDictionary)">
  25947. <exception cref="T:System.IO.IOException"/>
  25948. </member>
  25949. <member name="M:Org.BouncyCastle.Tls.TlsExtensionsUtilities.GetHeartbeatExtension(System.Collections.IDictionary)">
  25950. <exception cref="T:System.IO.IOException"/>
  25951. </member>
  25952. <member name="M:Org.BouncyCastle.Tls.TlsExtensionsUtilities.GetKeyShareClientHello(System.Collections.IDictionary)">
  25953. <exception cref="T:System.IO.IOException"/>
  25954. </member>
  25955. <member name="M:Org.BouncyCastle.Tls.TlsExtensionsUtilities.GetKeyShareHelloRetryRequest(System.Collections.IDictionary)">
  25956. <exception cref="T:System.IO.IOException"/>
  25957. </member>
  25958. <member name="M:Org.BouncyCastle.Tls.TlsExtensionsUtilities.GetKeyShareServerHello(System.Collections.IDictionary)">
  25959. <exception cref="T:System.IO.IOException"/>
  25960. </member>
  25961. <member name="M:Org.BouncyCastle.Tls.TlsExtensionsUtilities.GetMaxFragmentLengthExtension(System.Collections.IDictionary)">
  25962. <exception cref="T:System.IO.IOException"/>
  25963. </member>
  25964. <member name="M:Org.BouncyCastle.Tls.TlsExtensionsUtilities.GetOidFiltersExtension(System.Collections.IDictionary)">
  25965. <exception cref="T:System.IO.IOException"/>
  25966. </member>
  25967. <member name="M:Org.BouncyCastle.Tls.TlsExtensionsUtilities.GetPaddingExtension(System.Collections.IDictionary)">
  25968. <exception cref="T:System.IO.IOException"/>
  25969. </member>
  25970. <member name="M:Org.BouncyCastle.Tls.TlsExtensionsUtilities.GetPreSharedKeyClientHello(System.Collections.IDictionary)">
  25971. <exception cref="T:System.IO.IOException"/>
  25972. </member>
  25973. <member name="M:Org.BouncyCastle.Tls.TlsExtensionsUtilities.GetPreSharedKeyServerHello(System.Collections.IDictionary)">
  25974. <exception cref="T:System.IO.IOException"/>
  25975. </member>
  25976. <member name="M:Org.BouncyCastle.Tls.TlsExtensionsUtilities.GetPskKeyExchangeModesExtension(System.Collections.IDictionary)">
  25977. <exception cref="T:System.IO.IOException"/>
  25978. </member>
  25979. <member name="M:Org.BouncyCastle.Tls.TlsExtensionsUtilities.GetRecordSizeLimitExtension(System.Collections.IDictionary)">
  25980. <exception cref="T:System.IO.IOException"/>
  25981. </member>
  25982. <member name="M:Org.BouncyCastle.Tls.TlsExtensionsUtilities.GetServerCertificateTypeExtensionClient(System.Collections.IDictionary)">
  25983. <exception cref="T:System.IO.IOException"/>
  25984. </member>
  25985. <member name="M:Org.BouncyCastle.Tls.TlsExtensionsUtilities.GetServerCertificateTypeExtensionServer(System.Collections.IDictionary)">
  25986. <exception cref="T:System.IO.IOException"/>
  25987. </member>
  25988. <member name="M:Org.BouncyCastle.Tls.TlsExtensionsUtilities.GetServerNameExtensionClient(System.Collections.IDictionary)">
  25989. <exception cref="T:System.IO.IOException"/>
  25990. </member>
  25991. <member name="M:Org.BouncyCastle.Tls.TlsExtensionsUtilities.GetSignatureAlgorithmsExtension(System.Collections.IDictionary)">
  25992. <exception cref="T:System.IO.IOException"/>
  25993. </member>
  25994. <member name="M:Org.BouncyCastle.Tls.TlsExtensionsUtilities.GetSignatureAlgorithmsCertExtension(System.Collections.IDictionary)">
  25995. <exception cref="T:System.IO.IOException"/>
  25996. </member>
  25997. <member name="M:Org.BouncyCastle.Tls.TlsExtensionsUtilities.GetStatusRequestExtension(System.Collections.IDictionary)">
  25998. <exception cref="T:System.IO.IOException"/>
  25999. </member>
  26000. <member name="M:Org.BouncyCastle.Tls.TlsExtensionsUtilities.GetStatusRequestV2Extension(System.Collections.IDictionary)">
  26001. <exception cref="T:System.IO.IOException"/>
  26002. </member>
  26003. <member name="M:Org.BouncyCastle.Tls.TlsExtensionsUtilities.GetSupportedGroupsExtension(System.Collections.IDictionary)">
  26004. <exception cref="T:System.IO.IOException"/>
  26005. </member>
  26006. <member name="M:Org.BouncyCastle.Tls.TlsExtensionsUtilities.GetSupportedPointFormatsExtension(System.Collections.IDictionary)">
  26007. <exception cref="T:System.IO.IOException"/>
  26008. </member>
  26009. <member name="M:Org.BouncyCastle.Tls.TlsExtensionsUtilities.GetSupportedVersionsExtensionClient(System.Collections.IDictionary)">
  26010. <exception cref="T:System.IO.IOException"/>
  26011. </member>
  26012. <member name="M:Org.BouncyCastle.Tls.TlsExtensionsUtilities.GetSupportedVersionsExtensionServer(System.Collections.IDictionary)">
  26013. <exception cref="T:System.IO.IOException"/>
  26014. </member>
  26015. <member name="M:Org.BouncyCastle.Tls.TlsExtensionsUtilities.GetTrustedCAKeysExtensionClient(System.Collections.IDictionary)">
  26016. <exception cref="T:System.IO.IOException"/>
  26017. </member>
  26018. <member name="M:Org.BouncyCastle.Tls.TlsExtensionsUtilities.HasClientCertificateUrlExtension(System.Collections.IDictionary)">
  26019. <exception cref="T:System.IO.IOException"/>
  26020. </member>
  26021. <member name="M:Org.BouncyCastle.Tls.TlsExtensionsUtilities.HasEarlyDataIndication(System.Collections.IDictionary)">
  26022. <exception cref="T:System.IO.IOException"/>
  26023. </member>
  26024. <member name="M:Org.BouncyCastle.Tls.TlsExtensionsUtilities.HasEncryptThenMacExtension(System.Collections.IDictionary)">
  26025. <exception cref="T:System.IO.IOException"/>
  26026. </member>
  26027. <member name="M:Org.BouncyCastle.Tls.TlsExtensionsUtilities.HasExtendedMasterSecretExtension(System.Collections.IDictionary)">
  26028. <exception cref="T:System.IO.IOException"/>
  26029. </member>
  26030. <member name="M:Org.BouncyCastle.Tls.TlsExtensionsUtilities.HasServerNameExtensionServer(System.Collections.IDictionary)">
  26031. <exception cref="T:System.IO.IOException"/>
  26032. </member>
  26033. <member name="M:Org.BouncyCastle.Tls.TlsExtensionsUtilities.HasPostHandshakeAuthExtension(System.Collections.IDictionary)">
  26034. <exception cref="T:System.IO.IOException"/>
  26035. </member>
  26036. <member name="M:Org.BouncyCastle.Tls.TlsExtensionsUtilities.HasTruncatedHmacExtension(System.Collections.IDictionary)">
  26037. <exception cref="T:System.IO.IOException"/>
  26038. </member>
  26039. <member name="M:Org.BouncyCastle.Tls.TlsExtensionsUtilities.HasTrustedCAKeysExtensionServer(System.Collections.IDictionary)">
  26040. <exception cref="T:System.IO.IOException"/>
  26041. </member>
  26042. <member name="M:Org.BouncyCastle.Tls.TlsExtensionsUtilities.CreateAlpnExtensionClient(System.Collections.IList)">
  26043. <param name="protocolNameList">an <see cref="T:System.Collections.IList"/> of <see cref="T:Org.BouncyCastle.Tls.ProtocolName"/>.</param>
  26044. <exception cref="T:System.IO.IOException"/>
  26045. </member>
  26046. <member name="M:Org.BouncyCastle.Tls.TlsExtensionsUtilities.CreateAlpnExtensionServer(Org.BouncyCastle.Tls.ProtocolName)">
  26047. <exception cref="T:System.IO.IOException"/>
  26048. </member>
  26049. <member name="M:Org.BouncyCastle.Tls.TlsExtensionsUtilities.CreateCertificateAuthoritiesExtension(System.Collections.IList)">
  26050. <exception cref="T:System.IO.IOException"/>
  26051. </member>
  26052. <member name="M:Org.BouncyCastle.Tls.TlsExtensionsUtilities.CreateCertificateTypeExtensionClient(System.Int16[])">
  26053. <exception cref="T:System.IO.IOException"/>
  26054. </member>
  26055. <member name="M:Org.BouncyCastle.Tls.TlsExtensionsUtilities.CreateCertificateTypeExtensionServer(System.Int16)">
  26056. <exception cref="T:System.IO.IOException"/>
  26057. </member>
  26058. <member name="M:Org.BouncyCastle.Tls.TlsExtensionsUtilities.CreateCookieExtension(System.Byte[])">
  26059. <exception cref="T:System.IO.IOException"/>
  26060. </member>
  26061. <member name="M:Org.BouncyCastle.Tls.TlsExtensionsUtilities.CreateEarlyDataMaxSize(System.Int64)">
  26062. <exception cref="T:System.IO.IOException"/>
  26063. </member>
  26064. <member name="M:Org.BouncyCastle.Tls.TlsExtensionsUtilities.CreateHeartbeatExtension(Org.BouncyCastle.Tls.HeartbeatExtension)">
  26065. <exception cref="T:System.IO.IOException"/>
  26066. </member>
  26067. <member name="M:Org.BouncyCastle.Tls.TlsExtensionsUtilities.CreateKeyShareClientHello(System.Collections.IList)">
  26068. <exception cref="T:System.IO.IOException"/>
  26069. </member>
  26070. <member name="M:Org.BouncyCastle.Tls.TlsExtensionsUtilities.CreateKeyShareHelloRetryRequest(System.Int32)">
  26071. <exception cref="T:System.IO.IOException"/>
  26072. </member>
  26073. <member name="M:Org.BouncyCastle.Tls.TlsExtensionsUtilities.CreateKeyShareServerHello(Org.BouncyCastle.Tls.KeyShareEntry)">
  26074. <exception cref="T:System.IO.IOException"/>
  26075. </member>
  26076. <member name="M:Org.BouncyCastle.Tls.TlsExtensionsUtilities.CreateMaxFragmentLengthExtension(System.Int16)">
  26077. <exception cref="T:System.IO.IOException"/>
  26078. </member>
  26079. <member name="M:Org.BouncyCastle.Tls.TlsExtensionsUtilities.CreateOidFiltersExtension(System.Collections.IDictionary)">
  26080. <exception cref="T:System.IO.IOException"/>
  26081. </member>
  26082. <member name="M:Org.BouncyCastle.Tls.TlsExtensionsUtilities.CreatePaddingExtension(System.Int32)">
  26083. <exception cref="T:System.IO.IOException"/>
  26084. </member>
  26085. <member name="M:Org.BouncyCastle.Tls.TlsExtensionsUtilities.CreatePreSharedKeyClientHello(Org.BouncyCastle.Tls.OfferedPsks)">
  26086. <exception cref="T:System.IO.IOException"/>
  26087. </member>
  26088. <member name="M:Org.BouncyCastle.Tls.TlsExtensionsUtilities.CreatePreSharedKeyServerHello(System.Int32)">
  26089. <exception cref="T:System.IO.IOException"/>
  26090. </member>
  26091. <member name="M:Org.BouncyCastle.Tls.TlsExtensionsUtilities.CreatePskKeyExchangeModesExtension(System.Int16[])">
  26092. <exception cref="T:System.IO.IOException"/>
  26093. </member>
  26094. <member name="M:Org.BouncyCastle.Tls.TlsExtensionsUtilities.CreateRecordSizeLimitExtension(System.Int32)">
  26095. <exception cref="T:System.IO.IOException"/>
  26096. </member>
  26097. <member name="M:Org.BouncyCastle.Tls.TlsExtensionsUtilities.CreateServerNameExtensionClient(System.Collections.IList)">
  26098. <exception cref="T:System.IO.IOException"/>
  26099. </member>
  26100. <member name="M:Org.BouncyCastle.Tls.TlsExtensionsUtilities.CreateSignatureAlgorithmsExtension(System.Collections.IList)">
  26101. <exception cref="T:System.IO.IOException"/>
  26102. </member>
  26103. <member name="M:Org.BouncyCastle.Tls.TlsExtensionsUtilities.CreateSignatureAlgorithmsCertExtension(System.Collections.IList)">
  26104. <exception cref="T:System.IO.IOException"/>
  26105. </member>
  26106. <member name="M:Org.BouncyCastle.Tls.TlsExtensionsUtilities.CreateStatusRequestExtension(Org.BouncyCastle.Tls.CertificateStatusRequest)">
  26107. <exception cref="T:System.IO.IOException"/>
  26108. </member>
  26109. <member name="M:Org.BouncyCastle.Tls.TlsExtensionsUtilities.CreateStatusRequestV2Extension(System.Collections.IList)">
  26110. <exception cref="T:System.IO.IOException"/>
  26111. </member>
  26112. <member name="M:Org.BouncyCastle.Tls.TlsExtensionsUtilities.CreateSupportedGroupsExtension(System.Collections.IList)">
  26113. <exception cref="T:System.IO.IOException"/>
  26114. </member>
  26115. <member name="M:Org.BouncyCastle.Tls.TlsExtensionsUtilities.CreateSupportedPointFormatsExtension(System.Int16[])">
  26116. <exception cref="T:System.IO.IOException"/>
  26117. </member>
  26118. <member name="M:Org.BouncyCastle.Tls.TlsExtensionsUtilities.CreateSupportedVersionsExtensionClient(Org.BouncyCastle.Tls.ProtocolVersion[])">
  26119. <exception cref="T:System.IO.IOException"/>
  26120. </member>
  26121. <member name="M:Org.BouncyCastle.Tls.TlsExtensionsUtilities.CreateSupportedVersionsExtensionServer(Org.BouncyCastle.Tls.ProtocolVersion)">
  26122. <exception cref="T:System.IO.IOException"/>
  26123. </member>
  26124. <member name="M:Org.BouncyCastle.Tls.TlsExtensionsUtilities.CreateTrustedCAKeysExtensionClient(System.Collections.IList)">
  26125. <exception cref="T:System.IO.IOException"/>
  26126. </member>
  26127. <member name="M:Org.BouncyCastle.Tls.TlsExtensionsUtilities.ReadEmptyExtensionData(System.Byte[])">
  26128. <exception cref="T:System.IO.IOException"/>
  26129. </member>
  26130. <member name="M:Org.BouncyCastle.Tls.TlsExtensionsUtilities.ReadAlpnExtensionClient(System.Byte[])">
  26131. <returns>an <see cref="T:System.Collections.IList"/> of <see cref="T:Org.BouncyCastle.Tls.ProtocolName"/>.</returns>
  26132. <exception cref="T:System.IO.IOException"/>
  26133. </member>
  26134. <member name="M:Org.BouncyCastle.Tls.TlsExtensionsUtilities.ReadAlpnExtensionServer(System.Byte[])">
  26135. <exception cref="T:System.IO.IOException"/>
  26136. </member>
  26137. <member name="M:Org.BouncyCastle.Tls.TlsExtensionsUtilities.ReadCertificateAuthoritiesExtension(System.Byte[])">
  26138. <exception cref="T:System.IO.IOException"/>
  26139. </member>
  26140. <member name="M:Org.BouncyCastle.Tls.TlsExtensionsUtilities.ReadCertificateTypeExtensionClient(System.Byte[])">
  26141. <exception cref="T:System.IO.IOException"/>
  26142. </member>
  26143. <member name="M:Org.BouncyCastle.Tls.TlsExtensionsUtilities.ReadCertificateTypeExtensionServer(System.Byte[])">
  26144. <exception cref="T:System.IO.IOException"/>
  26145. </member>
  26146. <member name="M:Org.BouncyCastle.Tls.TlsExtensionsUtilities.ReadClientCertificateUrlExtension(System.Byte[])">
  26147. <exception cref="T:System.IO.IOException"/>
  26148. </member>
  26149. <member name="M:Org.BouncyCastle.Tls.TlsExtensionsUtilities.ReadCookieExtension(System.Byte[])">
  26150. <exception cref="T:System.IO.IOException"/>
  26151. </member>
  26152. <member name="M:Org.BouncyCastle.Tls.TlsExtensionsUtilities.ReadEarlyDataIndication(System.Byte[])">
  26153. <exception cref="T:System.IO.IOException"/>
  26154. </member>
  26155. <member name="M:Org.BouncyCastle.Tls.TlsExtensionsUtilities.ReadEarlyDataMaxSize(System.Byte[])">
  26156. <exception cref="T:System.IO.IOException"/>
  26157. </member>
  26158. <member name="M:Org.BouncyCastle.Tls.TlsExtensionsUtilities.ReadEncryptThenMacExtension(System.Byte[])">
  26159. <exception cref="T:System.IO.IOException"/>
  26160. </member>
  26161. <member name="M:Org.BouncyCastle.Tls.TlsExtensionsUtilities.ReadExtendedMasterSecretExtension(System.Byte[])">
  26162. <exception cref="T:System.IO.IOException"/>
  26163. </member>
  26164. <member name="M:Org.BouncyCastle.Tls.TlsExtensionsUtilities.ReadHeartbeatExtension(System.Byte[])">
  26165. <exception cref="T:System.IO.IOException"/>
  26166. </member>
  26167. <member name="M:Org.BouncyCastle.Tls.TlsExtensionsUtilities.ReadKeyShareClientHello(System.Byte[])">
  26168. <exception cref="T:System.IO.IOException"/>
  26169. </member>
  26170. <member name="M:Org.BouncyCastle.Tls.TlsExtensionsUtilities.ReadKeyShareHelloRetryRequest(System.Byte[])">
  26171. <exception cref="T:System.IO.IOException"/>
  26172. </member>
  26173. <member name="M:Org.BouncyCastle.Tls.TlsExtensionsUtilities.ReadKeyShareServerHello(System.Byte[])">
  26174. <exception cref="T:System.IO.IOException"/>
  26175. </member>
  26176. <member name="M:Org.BouncyCastle.Tls.TlsExtensionsUtilities.ReadMaxFragmentLengthExtension(System.Byte[])">
  26177. <exception cref="T:System.IO.IOException"/>
  26178. </member>
  26179. <member name="M:Org.BouncyCastle.Tls.TlsExtensionsUtilities.ReadOidFiltersExtension(System.Byte[])">
  26180. <exception cref="T:System.IO.IOException"/>
  26181. </member>
  26182. <member name="M:Org.BouncyCastle.Tls.TlsExtensionsUtilities.ReadPaddingExtension(System.Byte[])">
  26183. <exception cref="T:System.IO.IOException"/>
  26184. </member>
  26185. <member name="M:Org.BouncyCastle.Tls.TlsExtensionsUtilities.ReadPostHandshakeAuthExtension(System.Byte[])">
  26186. <exception cref="T:System.IO.IOException"/>
  26187. </member>
  26188. <member name="M:Org.BouncyCastle.Tls.TlsExtensionsUtilities.ReadPreSharedKeyClientHello(System.Byte[])">
  26189. <exception cref="T:System.IO.IOException"/>
  26190. </member>
  26191. <member name="M:Org.BouncyCastle.Tls.TlsExtensionsUtilities.ReadPreSharedKeyServerHello(System.Byte[])">
  26192. <exception cref="T:System.IO.IOException"/>
  26193. </member>
  26194. <member name="M:Org.BouncyCastle.Tls.TlsExtensionsUtilities.ReadPskKeyExchangeModesExtension(System.Byte[])">
  26195. <exception cref="T:System.IO.IOException"/>
  26196. </member>
  26197. <member name="M:Org.BouncyCastle.Tls.TlsExtensionsUtilities.ReadRecordSizeLimitExtension(System.Byte[])">
  26198. <exception cref="T:System.IO.IOException"/>
  26199. </member>
  26200. <member name="M:Org.BouncyCastle.Tls.TlsExtensionsUtilities.ReadServerNameExtensionClient(System.Byte[])">
  26201. <exception cref="T:System.IO.IOException"/>
  26202. </member>
  26203. <member name="M:Org.BouncyCastle.Tls.TlsExtensionsUtilities.ReadServerNameExtensionServer(System.Byte[])">
  26204. <exception cref="T:System.IO.IOException"/>
  26205. </member>
  26206. <member name="M:Org.BouncyCastle.Tls.TlsExtensionsUtilities.ReadSignatureAlgorithmsExtension(System.Byte[])">
  26207. <exception cref="T:System.IO.IOException"/>
  26208. </member>
  26209. <member name="M:Org.BouncyCastle.Tls.TlsExtensionsUtilities.ReadSignatureAlgorithmsCertExtension(System.Byte[])">
  26210. <exception cref="T:System.IO.IOException"/>
  26211. </member>
  26212. <member name="M:Org.BouncyCastle.Tls.TlsExtensionsUtilities.ReadStatusRequestExtension(System.Byte[])">
  26213. <exception cref="T:System.IO.IOException"/>
  26214. </member>
  26215. <member name="M:Org.BouncyCastle.Tls.TlsExtensionsUtilities.ReadStatusRequestV2Extension(System.Byte[])">
  26216. <exception cref="T:System.IO.IOException"/>
  26217. </member>
  26218. <member name="M:Org.BouncyCastle.Tls.TlsExtensionsUtilities.ReadSupportedGroupsExtension(System.Byte[])">
  26219. <exception cref="T:System.IO.IOException"/>
  26220. </member>
  26221. <member name="M:Org.BouncyCastle.Tls.TlsExtensionsUtilities.ReadSupportedPointFormatsExtension(System.Byte[])">
  26222. <exception cref="T:System.IO.IOException"/>
  26223. </member>
  26224. <member name="M:Org.BouncyCastle.Tls.TlsExtensionsUtilities.ReadSupportedVersionsExtensionClient(System.Byte[])">
  26225. <exception cref="T:System.IO.IOException"/>
  26226. </member>
  26227. <member name="M:Org.BouncyCastle.Tls.TlsExtensionsUtilities.ReadSupportedVersionsExtensionServer(System.Byte[])">
  26228. <exception cref="T:System.IO.IOException"/>
  26229. </member>
  26230. <member name="M:Org.BouncyCastle.Tls.TlsExtensionsUtilities.ReadTruncatedHmacExtension(System.Byte[])">
  26231. <exception cref="T:System.IO.IOException"/>
  26232. </member>
  26233. <member name="M:Org.BouncyCastle.Tls.TlsExtensionsUtilities.ReadTrustedCAKeysExtensionClient(System.Byte[])">
  26234. <exception cref="T:System.IO.IOException"/>
  26235. </member>
  26236. <member name="M:Org.BouncyCastle.Tls.TlsExtensionsUtilities.ReadTrustedCAKeysExtensionServer(System.Byte[])">
  26237. <exception cref="T:System.IO.IOException"/>
  26238. </member>
  26239. <member name="M:Org.BouncyCastle.Tls.TlsExtensionsUtilities.PatchOpaque16(System.IO.MemoryStream)">
  26240. <exception cref="T:System.IO.IOException"/>
  26241. </member>
  26242. <member name="T:Org.BouncyCastle.Tls.TlsHandshakeHash">
  26243. <summary>Base interface for an object that can calculate a handshake hash.</summary>
  26244. </member>
  26245. <member name="M:Org.BouncyCastle.Tls.TlsHandshakeHash.CopyBufferTo(System.IO.Stream)">
  26246. <exception cref="T:System.IO.IOException"/>
  26247. </member>
  26248. <member name="T:Org.BouncyCastle.Tls.TlsKeyExchange">
  26249. <summary>A generic interface for key exchange implementations in (D)TLS.</summary>
  26250. </member>
  26251. <member name="M:Org.BouncyCastle.Tls.TlsKeyExchange.SkipServerCredentials">
  26252. <exception cref="T:System.IO.IOException"/>
  26253. </member>
  26254. <member name="M:Org.BouncyCastle.Tls.TlsKeyExchange.ProcessServerCredentials(Org.BouncyCastle.Tls.TlsCredentials)">
  26255. <exception cref="T:System.IO.IOException"/>
  26256. </member>
  26257. <member name="M:Org.BouncyCastle.Tls.TlsKeyExchange.ProcessServerCertificate(Org.BouncyCastle.Tls.Certificate)">
  26258. <exception cref="T:System.IO.IOException"/>
  26259. </member>
  26260. <member name="M:Org.BouncyCastle.Tls.TlsKeyExchange.GenerateServerKeyExchange">
  26261. <exception cref="T:System.IO.IOException"/>
  26262. </member>
  26263. <member name="M:Org.BouncyCastle.Tls.TlsKeyExchange.SkipServerKeyExchange">
  26264. <exception cref="T:System.IO.IOException"/>
  26265. </member>
  26266. <member name="M:Org.BouncyCastle.Tls.TlsKeyExchange.ProcessServerKeyExchange(System.IO.Stream)">
  26267. <exception cref="T:System.IO.IOException"/>
  26268. </member>
  26269. <member name="M:Org.BouncyCastle.Tls.TlsKeyExchange.SkipClientCredentials">
  26270. <exception cref="T:System.IO.IOException"/>
  26271. </member>
  26272. <member name="M:Org.BouncyCastle.Tls.TlsKeyExchange.ProcessClientCredentials(Org.BouncyCastle.Tls.TlsCredentials)">
  26273. <exception cref="T:System.IO.IOException"/>
  26274. </member>
  26275. <member name="M:Org.BouncyCastle.Tls.TlsKeyExchange.ProcessClientCertificate(Org.BouncyCastle.Tls.Certificate)">
  26276. <exception cref="T:System.IO.IOException"/>
  26277. </member>
  26278. <member name="M:Org.BouncyCastle.Tls.TlsKeyExchange.GenerateClientKeyExchange(System.IO.Stream)">
  26279. <exception cref="T:System.IO.IOException"/>
  26280. </member>
  26281. <member name="M:Org.BouncyCastle.Tls.TlsKeyExchange.ProcessClientKeyExchange(System.IO.Stream)">
  26282. <exception cref="T:System.IO.IOException"/>
  26283. </member>
  26284. <member name="M:Org.BouncyCastle.Tls.TlsKeyExchange.GeneratePreMasterSecret">
  26285. <exception cref="T:System.IO.IOException"/>
  26286. </member>
  26287. <member name="T:Org.BouncyCastle.Tls.TlsKeyExchangeFactory">
  26288. <summary>Interface for a key exchange factory offering a variety of specific algorithms.</summary>
  26289. </member>
  26290. <member name="M:Org.BouncyCastle.Tls.TlsKeyExchangeFactory.CreateDHKeyExchange(System.Int32)">
  26291. <exception cref="T:System.IO.IOException"/>
  26292. </member>
  26293. <member name="M:Org.BouncyCastle.Tls.TlsKeyExchangeFactory.CreateDHanonKeyExchangeClient(System.Int32,Org.BouncyCastle.Tls.TlsDHGroupVerifier)">
  26294. <exception cref="T:System.IO.IOException"/>
  26295. </member>
  26296. <member name="M:Org.BouncyCastle.Tls.TlsKeyExchangeFactory.CreateDHanonKeyExchangeServer(System.Int32,Org.BouncyCastle.Tls.Crypto.TlsDHConfig)">
  26297. <exception cref="T:System.IO.IOException"/>
  26298. </member>
  26299. <member name="M:Org.BouncyCastle.Tls.TlsKeyExchangeFactory.CreateDheKeyExchangeClient(System.Int32,Org.BouncyCastle.Tls.TlsDHGroupVerifier)">
  26300. <exception cref="T:System.IO.IOException"/>
  26301. </member>
  26302. <member name="M:Org.BouncyCastle.Tls.TlsKeyExchangeFactory.CreateDheKeyExchangeServer(System.Int32,Org.BouncyCastle.Tls.Crypto.TlsDHConfig)">
  26303. <exception cref="T:System.IO.IOException"/>
  26304. </member>
  26305. <member name="M:Org.BouncyCastle.Tls.TlsKeyExchangeFactory.CreateECDHKeyExchange(System.Int32)">
  26306. <exception cref="T:System.IO.IOException"/>
  26307. </member>
  26308. <member name="M:Org.BouncyCastle.Tls.TlsKeyExchangeFactory.CreateECDHanonKeyExchangeClient(System.Int32)">
  26309. <exception cref="T:System.IO.IOException"/>
  26310. </member>
  26311. <member name="M:Org.BouncyCastle.Tls.TlsKeyExchangeFactory.CreateECDHanonKeyExchangeServer(System.Int32,Org.BouncyCastle.Tls.Crypto.TlsECConfig)">
  26312. <exception cref="T:System.IO.IOException"/>
  26313. </member>
  26314. <member name="M:Org.BouncyCastle.Tls.TlsKeyExchangeFactory.CreateECDheKeyExchangeClient(System.Int32)">
  26315. <exception cref="T:System.IO.IOException"/>
  26316. </member>
  26317. <member name="M:Org.BouncyCastle.Tls.TlsKeyExchangeFactory.CreateECDheKeyExchangeServer(System.Int32,Org.BouncyCastle.Tls.Crypto.TlsECConfig)">
  26318. <exception cref="T:System.IO.IOException"/>
  26319. </member>
  26320. <member name="M:Org.BouncyCastle.Tls.TlsKeyExchangeFactory.CreatePskKeyExchangeClient(System.Int32,Org.BouncyCastle.Tls.TlsPskIdentity,Org.BouncyCastle.Tls.TlsDHGroupVerifier)">
  26321. <exception cref="T:System.IO.IOException"/>
  26322. </member>
  26323. <member name="M:Org.BouncyCastle.Tls.TlsKeyExchangeFactory.CreatePskKeyExchangeServer(System.Int32,Org.BouncyCastle.Tls.TlsPskIdentityManager,Org.BouncyCastle.Tls.Crypto.TlsDHConfig,Org.BouncyCastle.Tls.Crypto.TlsECConfig)">
  26324. <exception cref="T:System.IO.IOException"/>
  26325. </member>
  26326. <member name="M:Org.BouncyCastle.Tls.TlsKeyExchangeFactory.CreateRsaKeyExchange(System.Int32)">
  26327. <exception cref="T:System.IO.IOException"/>
  26328. </member>
  26329. <member name="M:Org.BouncyCastle.Tls.TlsKeyExchangeFactory.CreateSrpKeyExchangeClient(System.Int32,Org.BouncyCastle.Tls.TlsSrpIdentity,Org.BouncyCastle.Tls.TlsSrpConfigVerifier)">
  26330. <exception cref="T:System.IO.IOException"/>
  26331. </member>
  26332. <member name="M:Org.BouncyCastle.Tls.TlsKeyExchangeFactory.CreateSrpKeyExchangeServer(System.Int32,Org.BouncyCastle.Tls.TlsSrpLoginParameters)">
  26333. <exception cref="T:System.IO.IOException"/>
  26334. </member>
  26335. <member name="T:Org.BouncyCastle.Tls.TlsNoCloseNotifyException">
  26336. <summary>This exception will be thrown (only) when the connection is closed by the peer without sending a
  26337. <see cref="F:Org.BouncyCastle.Tls.AlertDescription.close_notify">close_notify</see> warning alert.</summary>
  26338. <remarks>
  26339. If this happens, the TLS protocol cannot rule out truncation of the connection data (potentially
  26340. malicious). It may be possible to check for truncation via some property of a higher level protocol
  26341. built upon TLS, e.g.the Content-Length header for HTTPS.
  26342. </remarks>
  26343. </member>
  26344. <member name="T:Org.BouncyCastle.Tls.TlsObjectIdentifiers">
  26345. <summary>Object Identifiers associated with TLS extensions.</summary>
  26346. </member>
  26347. <member name="F:Org.BouncyCastle.Tls.TlsObjectIdentifiers.id_pe_tlsfeature">
  26348. <summary>RFC 7633</summary>
  26349. </member>
  26350. <member name="T:Org.BouncyCastle.Tls.TlsPeer">
  26351. <summary>Base interface for a (D)TLS endpoint.</summary>
  26352. </member>
  26353. <member name="M:Org.BouncyCastle.Tls.TlsPeer.Cancel">
  26354. <exception cref="T:System.IO.IOException"/>
  26355. </member>
  26356. <member name="M:Org.BouncyCastle.Tls.TlsPeer.NotifyHandshakeBeginning">
  26357. <summary>Notifies the peer that a new handshake is about to begin.</summary>
  26358. <exception cref="T:System.IO.IOException"/>
  26359. </member>
  26360. <member name="M:Org.BouncyCastle.Tls.TlsPeer.GetHandshakeTimeoutMillis">
  26361. <summary>Specify the timeout, in milliseconds, to use for the complete handshake process.</summary>
  26362. <remarks>
  26363. NOTE: Currently only respected by DTLS protocols. Negative values are not allowed. A timeout of zero means
  26364. an infinite timeout (i.e.the handshake will never time out).
  26365. </remarks>
  26366. <returns>the handshake timeout, in milliseconds.</returns>
  26367. </member>
  26368. <member name="M:Org.BouncyCastle.Tls.TlsPeer.RequiresCloseNotify">
  26369. <remarks>
  26370. This option is provided as a last resort for interoperability with TLS peers that fail to correctly send a
  26371. close_notify alert at end of stream. Implementations SHOULD return true; caution is advised if returning
  26372. false without a full understanding of the implications.
  26373. </remarks>
  26374. </member>
  26375. <member name="M:Org.BouncyCastle.Tls.TlsPeer.RequiresExtendedMasterSecret">
  26376. <remarks>This implementation supports RFC 7627 and will always negotiate the extended_master_secret
  26377. extension where possible. When connecting to a peer that does not offer/accept this extension, it is
  26378. recommended to abort the handshake.This option is provided for interoperability with legacy peers, although
  26379. some TLS features will be disabled in that case (see RFC 7627 5.4).
  26380. </remarks>
  26381. <returns><c>true</c> if the handshake should be aborted when the peer does not negotiate the
  26382. extended_master_secret extension, or <c>false</c> to support legacy interoperability.</returns>
  26383. </member>
  26384. <member name="M:Org.BouncyCastle.Tls.TlsPeer.ShouldUseExtendedPadding">
  26385. <summary>See RFC 5246 6.2.3.2. Controls whether block cipher encryption may randomly add extra padding
  26386. beyond the minimum.</summary>
  26387. <remarks>
  26388. Note that in configurations where this is known to be potential security risk this setting will be ignored
  26389. (and extended padding disabled). Extra padding is always supported when decrypting received records.
  26390. </remarks>
  26391. <returns><c>true</c> if random extra padding should be added during block cipher encryption, or
  26392. <c>false</c> to always use the minimum amount of required padding.</returns>
  26393. </member>
  26394. <member name="M:Org.BouncyCastle.Tls.TlsPeer.ShouldUseGmtUnixTime">
  26395. <summary> draft-mathewson-no-gmtunixtime-00 2. "If existing users of a TLS implementation may rely on
  26396. gmt_unix_time containing the current time, we recommend that implementors MAY provide the ability to set
  26397. gmt_unix_time as an option only, off by default.".</summary>
  26398. <remarks>
  26399. NOTE: For a server that has negotiated TLS 1.3 (or later), or a client that has offered TLS 1.3 (or later),
  26400. this is not called and gmt_unix_time is not used.
  26401. </remarks>
  26402. <returns><c>true</c> if the current time should be used in the gmt_unix_time field of Random, or
  26403. <c>false</c> if gmt_unix_time should contain a cryptographically random value.</returns>
  26404. </member>
  26405. <member name="M:Org.BouncyCastle.Tls.TlsPeer.NotifySecureRenegotiation(System.Boolean)">
  26406. <summary>RFC 5746 3.4/3.6. In case this is false, peers may want to terminate the handshake instead of
  26407. continuing; see Section 4.1/4.3 for discussion.</summary>
  26408. <remarks>
  26409. NOTE: TLS 1.3 forbids renegotiation, so this is never called when TLS 1.3 (or later) was negotiated.
  26410. </remarks>
  26411. <exception cref="T:System.IO.IOException"/>
  26412. </member>
  26413. <member name="M:Org.BouncyCastle.Tls.TlsPeer.GetKeyExchangeFactory">
  26414. <exception cref="T:System.IO.IOException"/>
  26415. </member>
  26416. <member name="M:Org.BouncyCastle.Tls.TlsPeer.NotifyAlertRaised(System.Int16,System.Int16,System.String,System.Exception)">
  26417. <summary>This method will be called when an alert is raised by the protocol.</summary>
  26418. <param name="alertLevel"><see cref="T:Org.BouncyCastle.Tls.AlertLevel"/></param>
  26419. <param name="alertDescription"><see cref="T:Org.BouncyCastle.Tls.AlertDescription"/></param>
  26420. <param name="message">A human-readable message explaining what caused this alert. May be null.</param>
  26421. <param name="cause">The <see cref="T:System.Exception"/> that caused this alert to be raised. May be null.</param>
  26422. </member>
  26423. <member name="M:Org.BouncyCastle.Tls.TlsPeer.NotifyAlertReceived(System.Int16,System.Int16)">
  26424. <summary>This method will be called when an alert is received from the remote peer.</summary>
  26425. <param name="alertLevel"><see cref="T:Org.BouncyCastle.Tls.AlertLevel"/></param>
  26426. <param name="alertDescription"><see cref="T:Org.BouncyCastle.Tls.AlertDescription"/></param>
  26427. </member>
  26428. <member name="M:Org.BouncyCastle.Tls.TlsPeer.NotifyHandshakeComplete">
  26429. <summary>Notifies the peer that the handshake has been successfully completed.</summary>
  26430. <exception cref="T:System.IO.IOException"/>
  26431. </member>
  26432. <member name="M:Org.BouncyCastle.Tls.TlsPeer.GetHeartbeat">
  26433. <summary>Return a <see cref="T:Org.BouncyCastle.Tls.TlsHeartbeat"/> instance that will control the generation of heartbeats
  26434. locally (if permitted by the remote peer), or null to not generate heartbeats. Heartbeats are described in
  26435. RFC 6520.</summary>
  26436. <returns>an instance of <see cref="T:Org.BouncyCastle.Tls.TlsHeartbeat"/>.</returns>
  26437. <seealso cref="T:Org.BouncyCastle.Tls.DefaultTlsHeartbeat"/>
  26438. </member>
  26439. <member name="M:Org.BouncyCastle.Tls.TlsPeer.GetHeartbeatPolicy">
  26440. <summary>Return the heartbeat mode applicable to the remote peer. Heartbeats are described in RFC 6520.
  26441. </summary>
  26442. <remarks>
  26443. See enumeration class <see cref="T:Org.BouncyCastle.Tls.HeartbeatMode"/> for appropriate return values.
  26444. </remarks>
  26445. <returns>the <see cref="T:Org.BouncyCastle.Tls.HeartbeatMode"/> value.</returns>
  26446. </member>
  26447. <member name="M:Org.BouncyCastle.Tls.TlsProtocol.ResumeHandshake">
  26448. <exception cref="T:System.IO.IOException"/>
  26449. </member>
  26450. <member name="M:Org.BouncyCastle.Tls.TlsProtocol.CloseConnection">
  26451. <exception cref="T:System.IO.IOException"/>
  26452. </member>
  26453. <member name="M:Org.BouncyCastle.Tls.TlsProtocol.HandleAlertMessage(System.Int16,System.Int16)">
  26454. <exception cref="T:System.IO.IOException"/>
  26455. </member>
  26456. <member name="M:Org.BouncyCastle.Tls.TlsProtocol.HandleAlertWarningMessage(System.Int16)">
  26457. <exception cref="T:System.IO.IOException"/>
  26458. </member>
  26459. <member name="M:Org.BouncyCastle.Tls.TlsProtocol.HandleChangeCipherSpecMessage">
  26460. <exception cref="T:System.IO.IOException"/>
  26461. </member>
  26462. <member name="M:Org.BouncyCastle.Tls.TlsProtocol.HandleClose(System.Boolean)">
  26463. <exception cref="T:System.IO.IOException"/>
  26464. </member>
  26465. <member name="M:Org.BouncyCastle.Tls.TlsProtocol.HandleException(System.Int16,System.String,System.Exception)">
  26466. <exception cref="T:System.IO.IOException"/>
  26467. </member>
  26468. <member name="M:Org.BouncyCastle.Tls.TlsProtocol.HandleFailure">
  26469. <exception cref="T:System.IO.IOException"/>
  26470. </member>
  26471. <member name="M:Org.BouncyCastle.Tls.TlsProtocol.HandleHandshakeMessage(System.Int16,Org.BouncyCastle.Tls.HandshakeMessageInput)">
  26472. <exception cref="T:System.IO.IOException"/>
  26473. </member>
  26474. <member name="M:Org.BouncyCastle.Tls.TlsProtocol.ApplyMaxFragmentLengthExtension(System.Int16)">
  26475. <exception cref="T:System.IO.IOException"/>
  26476. </member>
  26477. <member name="M:Org.BouncyCastle.Tls.TlsProtocol.CheckReceivedChangeCipherSpec(System.Boolean)">
  26478. <exception cref="T:System.IO.IOException"/>
  26479. </member>
  26480. <member name="M:Org.BouncyCastle.Tls.TlsProtocol.BlockForHandshake">
  26481. <exception cref="T:System.IO.IOException"/>
  26482. </member>
  26483. <member name="M:Org.BouncyCastle.Tls.TlsProtocol.BeginHandshake">
  26484. <exception cref="T:System.IO.IOException"/>
  26485. </member>
  26486. <member name="M:Org.BouncyCastle.Tls.TlsProtocol.CompleteHandshake">
  26487. <exception cref="T:System.IO.IOException"/>
  26488. </member>
  26489. <member name="M:Org.BouncyCastle.Tls.TlsProtocol.ProcessRecord(System.Int16,System.Byte[],System.Int32,System.Int32)">
  26490. <exception cref="T:System.IO.IOException"/>
  26491. </member>
  26492. <member name="M:Org.BouncyCastle.Tls.TlsProtocol.ProcessHandshakeQueue(Org.BouncyCastle.Tls.ByteQueue)">
  26493. <exception cref="T:System.IO.IOException"/>
  26494. </member>
  26495. <member name="M:Org.BouncyCastle.Tls.TlsProtocol.ProcessAlertQueue">
  26496. <exception cref="T:System.IO.IOException"/>
  26497. </member>
  26498. <member name="M:Org.BouncyCastle.Tls.TlsProtocol.ProcessChangeCipherSpec(System.Byte[],System.Int32,System.Int32)">
  26499. <summary>This method is called, when a change cipher spec message is received.</summary>
  26500. <exception cref="T:System.IO.IOException">If the message has an invalid content or the handshake is not in the correct
  26501. state.</exception>
  26502. </member>
  26503. <member name="M:Org.BouncyCastle.Tls.TlsProtocol.ReadApplicationData(System.Byte[],System.Int32,System.Int32)">
  26504. <summary>Read data from the network.</summary>
  26505. <remarks>
  26506. The method will return immediately, if there is still some data left in the buffer, or block until some
  26507. application data has been read from the network.
  26508. </remarks>
  26509. <param name="buf">The buffer where the data will be copied to.</param>
  26510. <param name="off">The position where the data will be placed in the buffer.</param>
  26511. <param name="len">The maximum number of bytes to read.</param>
  26512. <returns>The number of bytes read.</returns>
  26513. <exception cref="T:System.IO.IOException">If something goes wrong during reading data.</exception>
  26514. </member>
  26515. <member name="M:Org.BouncyCastle.Tls.TlsProtocol.SafePreviewRecordHeader(System.Byte[])">
  26516. <exception cref="T:System.IO.IOException"/>
  26517. </member>
  26518. <member name="M:Org.BouncyCastle.Tls.TlsProtocol.SafeReadRecord">
  26519. <exception cref="T:System.IO.IOException"/>
  26520. </member>
  26521. <member name="M:Org.BouncyCastle.Tls.TlsProtocol.SafeReadFullRecord(System.Byte[],System.Int32,System.Int32)">
  26522. <exception cref="T:System.IO.IOException"/>
  26523. </member>
  26524. <member name="M:Org.BouncyCastle.Tls.TlsProtocol.SafeWriteRecord(System.Int16,System.Byte[],System.Int32,System.Int32)">
  26525. <exception cref="T:System.IO.IOException"/>
  26526. </member>
  26527. <member name="M:Org.BouncyCastle.Tls.TlsProtocol.WriteApplicationData(System.Byte[],System.Int32,System.Int32)">
  26528. <summary>Write some application data.</summary>
  26529. <remarks>
  26530. Fragmentation is handled internally. Usable in both blocking/non-blocking modes.<br/><br/>
  26531. In blocking mode, the output will be automatically sent via the underlying transport. In non-blocking mode,
  26532. call <see cref="M:Org.BouncyCastle.Tls.TlsProtocol.ReadOutput(System.Byte[],System.Int32,System.Int32)"/> to get the output bytes to send to the peer.<br/><br/>
  26533. This method must not be called until after the initial handshake is complete. Attempting to call it earlier
  26534. will result in an <see cref="T:System.InvalidOperationException"/>.
  26535. </remarks>
  26536. <param name="buf">The buffer containing application data to send.</param>
  26537. <param name="off">The offset at which the application data begins</param>
  26538. <param name="len">The number of bytes of application data.</param>
  26539. <exception cref="T:System.InvalidOperationException">If called before the initial handshake has completed.
  26540. </exception>
  26541. <exception cref="T:System.IO.IOException">If connection is already closed, or for encryption or transport errors.
  26542. </exception>
  26543. </member>
  26544. <member name="M:Org.BouncyCastle.Tls.TlsProtocol.WriteHandshakeMessage(System.Byte[],System.Int32,System.Int32)">
  26545. <exception cref="T:System.IO.IOException"/>
  26546. </member>
  26547. <member name="P:Org.BouncyCastle.Tls.TlsProtocol.Stream">
  26548. <summary>The secure bidirectional stream for this connection</summary>
  26549. <remarks>Only allowed in blocking mode.</remarks>
  26550. </member>
  26551. <member name="M:Org.BouncyCastle.Tls.TlsProtocol.CloseInput">
  26552. <summary>Should be called in non-blocking mode when the input data reaches EOF.</summary>
  26553. <exception cref="T:System.IO.IOException"/>
  26554. </member>
  26555. <member name="M:Org.BouncyCastle.Tls.TlsProtocol.PreviewInputRecord(System.Byte[])">
  26556. <exception cref="T:System.IO.IOException"/>
  26557. </member>
  26558. <member name="M:Org.BouncyCastle.Tls.TlsProtocol.PreviewOutputRecord(System.Int32)">
  26559. <exception cref="T:System.IO.IOException"/>
  26560. </member>
  26561. <member name="M:Org.BouncyCastle.Tls.TlsProtocol.OfferInput(System.Byte[])">
  26562. <summary>Equivalent to <code>OfferInput(input, 0, input.Length)</code>.</summary>
  26563. <param name="input">The input buffer to offer.</param>
  26564. <exception cref="T:System.IO.IOException"/>
  26565. <seealso cref="M:Org.BouncyCastle.Tls.TlsProtocol.OfferInput(System.Byte[],System.Int32,System.Int32)"/>
  26566. </member>
  26567. <member name="M:Org.BouncyCastle.Tls.TlsProtocol.OfferInput(System.Byte[],System.Int32,System.Int32)">
  26568. <summary>Offer input from an arbitrary source.</summary>
  26569. <remarks>Only allowed in non-blocking mode.<br/><br/>
  26570. This method will decrypt and process all records that are fully available. If only part of a record is
  26571. available, the buffer will be retained until the remainder of the record is offered.<br/><br/>
  26572. If any records containing application data were processed, the decrypted data can be obtained using
  26573. <see cref="M:Org.BouncyCastle.Tls.TlsProtocol.ReadInput(System.Byte[],System.Int32,System.Int32)"/>. If any records containing protocol data were processed, a
  26574. response may have been generated. You should always check to see if there is any available output after
  26575. calling this method by calling <see cref="M:Org.BouncyCastle.Tls.TlsProtocol.GetAvailableOutputBytes"/>.
  26576. </remarks>
  26577. <param name="input">The input buffer to offer.</param>
  26578. <param name="inputOff">The offset within the input buffer that input begins.</param>
  26579. <param name="inputLen">The number of bytes of input being offered.</param>
  26580. <exception cref="T:System.IO.IOException">If an error occurs while decrypting or processing a record.</exception>
  26581. </member>
  26582. <member name="M:Org.BouncyCastle.Tls.TlsProtocol.GetAvailableInputBytes">
  26583. <summary>Gets the amount of received application data.</summary>
  26584. <remarks>A call to <see cref="!:readInput(byte[], int, int)"/> is guaranteed to be able to return at least
  26585. this much data.<br/><br/>
  26586. Only allowed in non-blocking mode.
  26587. </remarks>
  26588. <returns>The number of bytes of available application data.</returns>
  26589. </member>
  26590. <member name="M:Org.BouncyCastle.Tls.TlsProtocol.ReadInput(System.Byte[],System.Int32,System.Int32)">
  26591. <summary>Retrieves received application data.</summary>
  26592. <remarks>
  26593. Use <see cref="M:Org.BouncyCastle.Tls.TlsProtocol.GetAvailableInputBytes"/> to check how much application data is currently available. This
  26594. method functions similarly to <see cref="M:System.IO.Stream.Read(System.Byte[],System.Int32,System.Int32)"/>, except that it never blocks. If
  26595. no data is available, nothing will be copied and zero will be returned.<br/><br/>
  26596. Only allowed in non-blocking mode.
  26597. </remarks>
  26598. <param name="buf">The buffer to hold the application data.</param>
  26599. <param name="off">The start offset in the buffer at which the data is written.</param>
  26600. <param name="len">The maximum number of bytes to read.</param>
  26601. <returns>The total number of bytes copied to the buffer. May be less than the length specified if the
  26602. length was greater than the amount of available data.</returns>
  26603. </member>
  26604. <member name="M:Org.BouncyCastle.Tls.TlsProtocol.GetAvailableOutputBytes">
  26605. <summary>Gets the amount of encrypted data available to be sent.</summary>
  26606. <remarks>
  26607. A call to <see cref="M:Org.BouncyCastle.Tls.TlsProtocol.ReadOutput(System.Byte[],System.Int32,System.Int32)"/> is guaranteed to be able to return at least this much
  26608. data. Only allowed in non-blocking mode.
  26609. </remarks>
  26610. <returns>The number of bytes of available encrypted data.</returns>
  26611. </member>
  26612. <member name="M:Org.BouncyCastle.Tls.TlsProtocol.ReadOutput(System.Byte[],System.Int32,System.Int32)">
  26613. <summary>Retrieves encrypted data to be sent.</summary>
  26614. <remarks>
  26615. Use <see cref="M:Org.BouncyCastle.Tls.TlsProtocol.GetAvailableOutputBytes"/> to check how much encrypted data is currently available. This
  26616. method functions similarly to <see cref="M:System.IO.Stream.Read(System.Byte[],System.Int32,System.Int32)"/>, except that it never blocks. If
  26617. no data is available, nothing will be copied and zero will be returned. Only allowed in non-blocking mode.
  26618. </remarks>
  26619. <param name="buffer">The buffer to hold the encrypted data.</param>
  26620. <param name="offset">The start offset in the buffer at which the data is written.</param>
  26621. <param name="length">The maximum number of bytes to read.</param>
  26622. <returns>The total number of bytes copied to the buffer. May be less than the length specified if the
  26623. length was greater than the amount of available data.</returns>
  26624. </member>
  26625. <member name="M:Org.BouncyCastle.Tls.TlsProtocol.ProcessFinishedMessage(System.IO.MemoryStream)">
  26626. <exception cref="T:System.IO.IOException"/>
  26627. </member>
  26628. <member name="M:Org.BouncyCastle.Tls.TlsProtocol.Process13FinishedMessage(System.IO.MemoryStream)">
  26629. <exception cref="T:System.IO.IOException"/>
  26630. </member>
  26631. <member name="M:Org.BouncyCastle.Tls.TlsProtocol.RaiseAlertFatal(System.Int16,System.String,System.Exception)">
  26632. <exception cref="T:System.IO.IOException"/>
  26633. </member>
  26634. <member name="M:Org.BouncyCastle.Tls.TlsProtocol.RaiseAlertWarning(System.Int16,System.String)">
  26635. <exception cref="T:System.IO.IOException"/>
  26636. </member>
  26637. <member name="M:Org.BouncyCastle.Tls.TlsProtocol.Receive13KeyUpdate(System.IO.MemoryStream)">
  26638. <exception cref="T:System.IO.IOException"/>
  26639. </member>
  26640. <member name="M:Org.BouncyCastle.Tls.TlsProtocol.SendCertificateMessage(Org.BouncyCastle.Tls.Certificate,System.IO.Stream)">
  26641. <exception cref="T:System.IO.IOException"/>
  26642. </member>
  26643. <member name="M:Org.BouncyCastle.Tls.TlsProtocol.Send13CertificateMessage(Org.BouncyCastle.Tls.Certificate)">
  26644. <exception cref="T:System.IO.IOException"/>
  26645. </member>
  26646. <member name="M:Org.BouncyCastle.Tls.TlsProtocol.Send13CertificateVerifyMessage(Org.BouncyCastle.Tls.DigitallySigned)">
  26647. <exception cref="T:System.IO.IOException"/>
  26648. </member>
  26649. <member name="M:Org.BouncyCastle.Tls.TlsProtocol.SendChangeCipherSpec">
  26650. <exception cref="T:System.IO.IOException"/>
  26651. </member>
  26652. <member name="M:Org.BouncyCastle.Tls.TlsProtocol.SendChangeCipherSpecMessage">
  26653. <exception cref="T:System.IO.IOException"/>
  26654. </member>
  26655. <member name="M:Org.BouncyCastle.Tls.TlsProtocol.SendFinishedMessage">
  26656. <exception cref="T:System.IO.IOException"/>
  26657. </member>
  26658. <member name="M:Org.BouncyCastle.Tls.TlsProtocol.Send13FinishedMessage">
  26659. <exception cref="T:System.IO.IOException"/>
  26660. </member>
  26661. <member name="M:Org.BouncyCastle.Tls.TlsProtocol.Send13KeyUpdate(System.Boolean)">
  26662. <exception cref="T:System.IO.IOException"/>
  26663. </member>
  26664. <member name="M:Org.BouncyCastle.Tls.TlsProtocol.SendSupplementalDataMessage(System.Collections.IList)">
  26665. <exception cref="T:System.IO.IOException"/>
  26666. </member>
  26667. <member name="M:Org.BouncyCastle.Tls.TlsProtocol.ProcessMaxFragmentLengthExtension(System.Collections.IDictionary,System.Collections.IDictionary,System.Int16)">
  26668. <exception cref="T:System.IO.IOException"/>
  26669. </member>
  26670. <member name="M:Org.BouncyCastle.Tls.TlsProtocol.RefuseRenegotiation">
  26671. <exception cref="T:System.IO.IOException"/>
  26672. </member>
  26673. <member name="M:Org.BouncyCastle.Tls.TlsProtocol.AssertEmpty(System.IO.MemoryStream)">
  26674. <summary>Make sure the <see cref="P:Org.BouncyCastle.Tls.TlsProtocol.Stream"/> 'buf' is now empty. Fail otherwise.</summary>
  26675. <param name="buf">The <see cref="P:Org.BouncyCastle.Tls.TlsProtocol.Stream"/> to check.</param>
  26676. <exception cref="T:System.IO.IOException"/>
  26677. </member>
  26678. <member name="M:Org.BouncyCastle.Tls.TlsProtocol.CreateRenegotiationInfo(System.Byte[])">
  26679. <exception cref="T:System.IO.IOException"/>
  26680. </member>
  26681. <member name="M:Org.BouncyCastle.Tls.TlsProtocol.EstablishMasterSecret(Org.BouncyCastle.Tls.TlsContext,Org.BouncyCastle.Tls.TlsKeyExchange)">
  26682. <exception cref="T:System.IO.IOException"/>
  26683. </member>
  26684. <member name="M:Org.BouncyCastle.Tls.TlsProtocol.ReadExtensions(System.IO.MemoryStream)">
  26685. <exception cref="T:System.IO.IOException"/>
  26686. </member>
  26687. <member name="M:Org.BouncyCastle.Tls.TlsProtocol.ReadExtensionsData(System.Byte[])">
  26688. <exception cref="T:System.IO.IOException"/>
  26689. </member>
  26690. <member name="M:Org.BouncyCastle.Tls.TlsProtocol.ReadExtensionsData13(System.Int32,System.Byte[])">
  26691. <exception cref="T:System.IO.IOException"/>
  26692. </member>
  26693. <member name="M:Org.BouncyCastle.Tls.TlsProtocol.ReadExtensionsDataClientHello(System.Byte[])">
  26694. <exception cref="T:System.IO.IOException"/>
  26695. </member>
  26696. <member name="M:Org.BouncyCastle.Tls.TlsProtocol.ReadSupplementalDataMessage(System.IO.MemoryStream)">
  26697. <exception cref="T:System.IO.IOException"/>
  26698. </member>
  26699. <member name="M:Org.BouncyCastle.Tls.TlsProtocol.WriteExtensions(System.IO.Stream,System.Collections.IDictionary)">
  26700. <exception cref="T:System.IO.IOException"/>
  26701. </member>
  26702. <member name="M:Org.BouncyCastle.Tls.TlsProtocol.WriteExtensions(System.IO.Stream,System.Collections.IDictionary,System.Int32)">
  26703. <exception cref="T:System.IO.IOException"/>
  26704. </member>
  26705. <member name="M:Org.BouncyCastle.Tls.TlsProtocol.WriteExtensionsData(System.Collections.IDictionary)">
  26706. <exception cref="T:System.IO.IOException"/>
  26707. </member>
  26708. <member name="M:Org.BouncyCastle.Tls.TlsProtocol.WriteExtensionsData(System.Collections.IDictionary,System.Int32)">
  26709. <exception cref="T:System.IO.IOException"/>
  26710. </member>
  26711. <member name="M:Org.BouncyCastle.Tls.TlsProtocol.WriteExtensionsData(System.Collections.IDictionary,System.IO.MemoryStream)">
  26712. <exception cref="T:System.IO.IOException"/>
  26713. </member>
  26714. <member name="M:Org.BouncyCastle.Tls.TlsProtocol.WriteExtensionsData(System.Collections.IDictionary,System.IO.MemoryStream,System.Int32)">
  26715. <exception cref="T:System.IO.IOException"/>
  26716. </member>
  26717. <member name="M:Org.BouncyCastle.Tls.TlsProtocol.WritePreSharedKeyExtension(System.IO.MemoryStream,System.Collections.IDictionary,System.Int32)">
  26718. <exception cref="T:System.IO.IOException"/>
  26719. </member>
  26720. <member name="M:Org.BouncyCastle.Tls.TlsProtocol.WriteSelectedExtensions(System.IO.Stream,System.Collections.IDictionary,System.Boolean)">
  26721. <exception cref="T:System.IO.IOException"/>
  26722. </member>
  26723. <member name="M:Org.BouncyCastle.Tls.TlsProtocol.WriteSupplementalData(System.IO.Stream,System.Collections.IList)">
  26724. <exception cref="T:System.IO.IOException"/>
  26725. </member>
  26726. <member name="T:Org.BouncyCastle.Tls.TlsPskIdentity">
  26727. <summary>Processor interface for a PSK identity.</summary>
  26728. </member>
  26729. <member name="T:Org.BouncyCastle.Tls.TlsPskIdentityManager">
  26730. <summary>Base interface for an object that can process a PSK identity.</summary>
  26731. </member>
  26732. <member name="T:Org.BouncyCastle.Tls.TlsPskKeyExchange">
  26733. <summary>(D)TLS PSK key exchange (RFC 4279).</summary>
  26734. </member>
  26735. <member name="T:Org.BouncyCastle.Tls.TlsRsaKeyExchange">
  26736. <summary>(D)TLS RSA key exchange.</summary>
  26737. </member>
  26738. <member name="T:Org.BouncyCastle.Tls.TlsServer">
  26739. <summary>Interface describing a TLS server endpoint.</summary>
  26740. </member>
  26741. <member name="M:Org.BouncyCastle.Tls.TlsServer.GetSessionToResume(System.Byte[])">
  26742. <summary>Return the specified session, if available.</summary>
  26743. <remarks>
  26744. Note that the peer's certificate chain for the session (if any) may need to be periodically revalidated.
  26745. </remarks>
  26746. <param name="sessionID">the ID of the session to resume.</param>
  26747. <returns>A <see cref="T:Org.BouncyCastle.Tls.TlsSession"/> with the specified session ID, or null.</returns>
  26748. <seealso cref="P:Org.BouncyCastle.Tls.SessionParameters.PeerCertificate"/>
  26749. </member>
  26750. <member name="M:Org.BouncyCastle.Tls.TlsServer.GetExternalPsk(System.Collections.IList)">
  26751. <summary>Return the <see cref="T:Org.BouncyCastle.Tls.TlsPskExternal">external PSK</see> to select from the ClientHello.</summary>
  26752. <remarks>
  26753. WARNING: EXPERIMENTAL FEATURE, UNSTABLE API
  26754. Note that this will only be called when TLS 1.3 or higher is amongst the offered protocol versions, and one
  26755. or more PSKs are actually offered.
  26756. </remarks>
  26757. <param name="identities">an <see cref="T:System.Collections.IList"/> of <see cref="T:Org.BouncyCastle.Tls.PskIdentity"/> instances.</param>
  26758. <returns>The <see cref="T:Org.BouncyCastle.Tls.TlsPskExternal"/> corresponding to the selected identity, or null to not select
  26759. any.</returns>
  26760. </member>
  26761. <member name="M:Org.BouncyCastle.Tls.TlsServer.NotifyClientVersion(Org.BouncyCastle.Tls.ProtocolVersion)">
  26762. <exception cref="T:System.IO.IOException"/>
  26763. </member>
  26764. <member name="M:Org.BouncyCastle.Tls.TlsServer.NotifyFallback(System.Boolean)">
  26765. <exception cref="T:System.IO.IOException"/>
  26766. </member>
  26767. <member name="M:Org.BouncyCastle.Tls.TlsServer.NotifyOfferedCipherSuites(System.Int32[])">
  26768. <exception cref="T:System.IO.IOException"/>
  26769. </member>
  26770. <member name="M:Org.BouncyCastle.Tls.TlsServer.ProcessClientExtensions(System.Collections.IDictionary)">
  26771. <param name="clientExtensions">(Int32 -> byte[])</param>
  26772. <exception cref="T:System.IO.IOException"/>
  26773. </member>
  26774. <member name="M:Org.BouncyCastle.Tls.TlsServer.GetServerVersion">
  26775. <exception cref="T:System.IO.IOException"/>
  26776. </member>
  26777. <member name="M:Org.BouncyCastle.Tls.TlsServer.GetSupportedGroups">
  26778. <exception cref="T:System.IO.IOException"/>
  26779. </member>
  26780. <member name="M:Org.BouncyCastle.Tls.TlsServer.GetSelectedCipherSuite">
  26781. <exception cref="T:System.IO.IOException"/>
  26782. </member>
  26783. <member name="M:Org.BouncyCastle.Tls.TlsServer.GetServerExtensions">
  26784. <returns>(Int32 -> byte[])</returns>
  26785. <exception cref="T:System.IO.IOException"/>
  26786. </member>
  26787. <member name="M:Org.BouncyCastle.Tls.TlsServer.GetServerExtensionsForConnection(System.Collections.IDictionary)">
  26788. <param name="serverExtensions">(Int32 -> byte[])</param>
  26789. <exception cref="T:System.IO.IOException"/>
  26790. </member>
  26791. <member name="M:Org.BouncyCastle.Tls.TlsServer.GetServerSupplementalData">
  26792. <returns>(SupplementalDataEntry)</returns>
  26793. <exception cref="T:System.IO.IOException"/>
  26794. </member>
  26795. <member name="M:Org.BouncyCastle.Tls.TlsServer.GetCredentials">
  26796. <summary>Return server credentials to use.</summary>
  26797. <remarks>
  26798. The returned value may be null, or else it MUST implement <em>exactly one</em> of
  26799. <see cref="T:Org.BouncyCastle.Tls.TlsCredentialedAgreement"/>, <see cref="T:Org.BouncyCastle.Tls.TlsCredentialedDecryptor"/>, or
  26800. <see cref = "T:Org.BouncyCastle.Tls.TlsCredentialedSigner"/>, depending on the key exchange that was negotiated.
  26801. </remarks>
  26802. <returns>a <see cref="T:Org.BouncyCastle.Tls.TlsCredentials"/> object or null for anonymous key exchanges.</returns>
  26803. <exception cref="T:System.IO.IOException"/>
  26804. </member>
  26805. <member name="M:Org.BouncyCastle.Tls.TlsServer.GetCertificateStatus">
  26806. <remarks>
  26807. This method will be called (only) if the server included an extension of type "status_request" with empty
  26808. "extension_data" in the extended server hello. See <i>RFC 3546 3.6. Certificate Status Request</i>. If a
  26809. non-null <see cref="T:Org.BouncyCastle.Tls.CertificateStatus"/> is returned, it is sent to the client as a handshake message of
  26810. type "certificate_status".
  26811. </remarks>
  26812. <returns>A <see cref="T:Org.BouncyCastle.Tls.CertificateStatus"/> to be sent to the client (or null for none).</returns>
  26813. <exception cref="T:System.IO.IOException"/>
  26814. </member>
  26815. <member name="M:Org.BouncyCastle.Tls.TlsServer.GetCertificateRequest">
  26816. <exception cref="T:System.IO.IOException"/>
  26817. </member>
  26818. <member name="M:Org.BouncyCastle.Tls.TlsServer.GetPskIdentityManager">
  26819. <exception cref="T:System.IO.IOException"/>
  26820. </member>
  26821. <member name="M:Org.BouncyCastle.Tls.TlsServer.GetSrpLoginParameters">
  26822. <exception cref="T:System.IO.IOException"/>
  26823. </member>
  26824. <member name="M:Org.BouncyCastle.Tls.TlsServer.GetDHConfig">
  26825. <exception cref="T:System.IO.IOException"/>
  26826. </member>
  26827. <member name="M:Org.BouncyCastle.Tls.TlsServer.GetECDHConfig">
  26828. <exception cref="T:System.IO.IOException"/>
  26829. </member>
  26830. <member name="M:Org.BouncyCastle.Tls.TlsServer.ProcessClientSupplementalData(System.Collections.IList)">
  26831. <param name="clientSupplementalData">(SupplementalDataEntry)</param>
  26832. <exception cref="T:System.IO.IOException"/>
  26833. </member>
  26834. <member name="M:Org.BouncyCastle.Tls.TlsServer.NotifyClientCertificate(Org.BouncyCastle.Tls.Certificate)">
  26835. <summary>Called by the protocol handler to report the client certificate, only if
  26836. <see cref="M:Org.BouncyCastle.Tls.TlsServer.GetCertificateRequest"/> returned non-null.</summary>
  26837. <remarks>
  26838. Note: this method is responsible for certificate verification and validation.
  26839. </remarks>
  26840. <param name="clientCertificate">the effective client certificate (may be an empty chain).</param>
  26841. <exception cref="T:System.IO.IOException"/>
  26842. </member>
  26843. <member name="M:Org.BouncyCastle.Tls.TlsServer.GetNewSessionTicket">
  26844. <summary>RFC 5077 3.3. NewSessionTicket Handshake Message.</summary>
  26845. <remarks>
  26846. This method will be called (only) if a NewSessionTicket extension was sent by the server. See <i>RFC 5077
  26847. 4. Recommended Ticket Construction</i> for recommended format and protection.
  26848. </remarks>
  26849. <returns>The ticket.</returns>
  26850. <exception cref="T:System.IO.IOException"/>
  26851. </member>
  26852. <member name="T:Org.BouncyCastle.Tls.TlsServerCertificate">
  26853. <summary>Server certificate carrier interface.</summary>
  26854. </member>
  26855. <member name="T:Org.BouncyCastle.Tls.TlsServerContext">
  26856. <summary>Marker interface to distinguish a TLS server context.</summary>
  26857. </member>
  26858. <member name="M:Org.BouncyCastle.Tls.TlsServerProtocol.#ctor">
  26859. <summary>Constructor for non-blocking mode.</summary>
  26860. <remarks>
  26861. When data is received, use <see cref="M:Org.BouncyCastle.Tls.TlsProtocol.OfferInput(System.Byte[])"/> to provide the received ciphertext,
  26862. then use <see cref="M:Org.BouncyCastle.Tls.TlsProtocol.ReadInput(System.Byte[],System.Int32,System.Int32)"/> to read the corresponding cleartext.<br/><br/>
  26863. Similarly, when data needs to be sent, use <see cref="M:Org.BouncyCastle.Tls.TlsProtocol.WriteApplicationData(System.Byte[],System.Int32,System.Int32)"/>
  26864. to provide the cleartext, then use <see cref="M:Org.BouncyCastle.Tls.TlsProtocol.ReadOutput(System.Byte[],System.Int32,System.Int32)"/> to get the
  26865. corresponding ciphertext.
  26866. </remarks>
  26867. </member>
  26868. <member name="M:Org.BouncyCastle.Tls.TlsServerProtocol.#ctor(System.IO.Stream)">
  26869. <summary>Constructor for blocking mode.</summary>
  26870. <param name="stream">The <see cref="T:System.IO.Stream"/> of data to/from the server.</param>
  26871. </member>
  26872. <member name="M:Org.BouncyCastle.Tls.TlsServerProtocol.#ctor(System.IO.Stream,System.IO.Stream)">
  26873. <summary>Constructor for blocking mode.</summary>
  26874. <param name="input">The <see cref="T:System.IO.Stream"/> of data from the server.</param>
  26875. <param name="output">The <see cref="T:System.IO.Stream"/> of data to the server.</param>
  26876. </member>
  26877. <member name="M:Org.BouncyCastle.Tls.TlsServerProtocol.Accept(Org.BouncyCastle.Tls.TlsServer)">
  26878. <summary>Receives a TLS handshake in the role of server.</summary>
  26879. <remarks>
  26880. In blocking mode, this will not return until the handshake is complete. In non-blocking mode, use
  26881. <see cref="M:Org.BouncyCastle.Tls.TlsPeer.NotifyHandshakeComplete"/> to receive a callback when the handshake is complete.
  26882. </remarks>
  26883. <param name="tlsServer">The <see cref="T:Org.BouncyCastle.Tls.TlsServer"/> to use for the handshake.</param>
  26884. <exception cref="T:System.IO.IOException">If in blocking mode and handshake was not successful.</exception>
  26885. </member>
  26886. <member name="M:Org.BouncyCastle.Tls.TlsServerProtocol.Generate13HelloRetryRequest(Org.BouncyCastle.Tls.ClientHello)">
  26887. <exception cref="T:System.IO.IOException"/>
  26888. </member>
  26889. <member name="M:Org.BouncyCastle.Tls.TlsServerProtocol.Generate13ServerHello(Org.BouncyCastle.Tls.ClientHello,Org.BouncyCastle.Tls.HandshakeMessageInput,System.Boolean)">
  26890. <exception cref="T:System.IO.IOException"/>
  26891. </member>
  26892. <member name="M:Org.BouncyCastle.Tls.TlsServerProtocol.GenerateServerHello(Org.BouncyCastle.Tls.ClientHello,Org.BouncyCastle.Tls.HandshakeMessageInput)">
  26893. <exception cref="T:System.IO.IOException"/>
  26894. </member>
  26895. <member name="M:Org.BouncyCastle.Tls.TlsServerProtocol.Handle13HandshakeMessage(System.Int16,Org.BouncyCastle.Tls.HandshakeMessageInput)">
  26896. <exception cref="T:System.IO.IOException"/>
  26897. </member>
  26898. <member name="M:Org.BouncyCastle.Tls.TlsServerProtocol.NotifyClientCertificate(Org.BouncyCastle.Tls.Certificate)">
  26899. <exception cref="T:System.IO.IOException"/>
  26900. </member>
  26901. <member name="M:Org.BouncyCastle.Tls.TlsServerProtocol.Receive13ClientCertificate(System.IO.MemoryStream)">
  26902. <exception cref="T:System.IO.IOException"/>
  26903. </member>
  26904. <member name="M:Org.BouncyCastle.Tls.TlsServerProtocol.Receive13ClientCertificateVerify(System.IO.MemoryStream)">
  26905. <exception cref="T:System.IO.IOException"/>
  26906. </member>
  26907. <member name="M:Org.BouncyCastle.Tls.TlsServerProtocol.Receive13ClientFinished(System.IO.MemoryStream)">
  26908. <exception cref="T:System.IO.IOException"/>
  26909. </member>
  26910. <member name="M:Org.BouncyCastle.Tls.TlsServerProtocol.ReceiveCertificateMessage(System.IO.MemoryStream)">
  26911. <exception cref="T:System.IO.IOException"/>
  26912. </member>
  26913. <member name="M:Org.BouncyCastle.Tls.TlsServerProtocol.ReceiveCertificateVerifyMessage(System.IO.MemoryStream)">
  26914. <exception cref="T:System.IO.IOException"/>
  26915. </member>
  26916. <member name="M:Org.BouncyCastle.Tls.TlsServerProtocol.ReceiveClientHelloMessage(System.IO.MemoryStream)">
  26917. <exception cref="T:System.IO.IOException"/>
  26918. </member>
  26919. <member name="M:Org.BouncyCastle.Tls.TlsServerProtocol.ReceiveClientKeyExchangeMessage(System.IO.MemoryStream)">
  26920. <exception cref="T:System.IO.IOException"/>
  26921. </member>
  26922. <member name="M:Org.BouncyCastle.Tls.TlsServerProtocol.Send13EncryptedExtensionsMessage(System.Collections.IDictionary)">
  26923. <exception cref="T:System.IO.IOException"/>
  26924. </member>
  26925. <member name="M:Org.BouncyCastle.Tls.TlsServerProtocol.Send13ServerHelloCoda(Org.BouncyCastle.Tls.ServerHello,System.Boolean)">
  26926. <exception cref="T:System.IO.IOException"/>
  26927. </member>
  26928. <member name="M:Org.BouncyCastle.Tls.TlsServerProtocol.SendCertificateRequestMessage(Org.BouncyCastle.Tls.CertificateRequest)">
  26929. <exception cref="T:System.IO.IOException"/>
  26930. </member>
  26931. <member name="M:Org.BouncyCastle.Tls.TlsServerProtocol.SendCertificateStatusMessage(Org.BouncyCastle.Tls.CertificateStatus)">
  26932. <exception cref="T:System.IO.IOException"/>
  26933. </member>
  26934. <member name="M:Org.BouncyCastle.Tls.TlsServerProtocol.SendHelloRequestMessage">
  26935. <exception cref="T:System.IO.IOException"/>
  26936. </member>
  26937. <member name="M:Org.BouncyCastle.Tls.TlsServerProtocol.SendNewSessionTicketMessage(Org.BouncyCastle.Tls.NewSessionTicket)">
  26938. <exception cref="T:System.IO.IOException"/>
  26939. </member>
  26940. <member name="M:Org.BouncyCastle.Tls.TlsServerProtocol.SendServerHelloDoneMessage">
  26941. <exception cref="T:System.IO.IOException"/>
  26942. </member>
  26943. <member name="M:Org.BouncyCastle.Tls.TlsServerProtocol.SendServerHelloMessage(Org.BouncyCastle.Tls.ServerHello)">
  26944. <exception cref="T:System.IO.IOException"/>
  26945. </member>
  26946. <member name="M:Org.BouncyCastle.Tls.TlsServerProtocol.SendServerKeyExchangeMessage(System.Byte[])">
  26947. <exception cref="T:System.IO.IOException"/>
  26948. </member>
  26949. <member name="M:Org.BouncyCastle.Tls.TlsServerProtocol.Skip13ClientCertificate">
  26950. <exception cref="T:System.IO.IOException"/>
  26951. </member>
  26952. <member name="M:Org.BouncyCastle.Tls.TlsServerProtocol.Skip13ClientCertificateVerify">
  26953. <exception cref="T:System.IO.IOException"/>
  26954. </member>
  26955. <member name="T:Org.BouncyCastle.Tls.TlsSession">
  26956. <summary>Base interface for a carrier object for a TLS session.</summary>
  26957. </member>
  26958. <member name="T:Org.BouncyCastle.Tls.TlsSrpConfigVerifier">
  26959. <summary>Interface for verifying SRP config needs to conform to.</summary>
  26960. </member>
  26961. <member name="M:Org.BouncyCastle.Tls.TlsSrpConfigVerifier.Accept(Org.BouncyCastle.Tls.Crypto.TlsSrpConfig)">
  26962. <summary>Check whether the given SRP configuration is acceptable for use.</summary>
  26963. <param name="srpConfig">the <see cref="T:Org.BouncyCastle.Tls.Crypto.TlsSrpConfig"/> to check.</param>
  26964. <returns>true if (and only if) the specified configuration is acceptable.</returns>
  26965. </member>
  26966. <member name="T:Org.BouncyCastle.Tls.TlsSrpIdentity">
  26967. <summary>Processor interface for an SRP identity.</summary>
  26968. </member>
  26969. <member name="T:Org.BouncyCastle.Tls.TlsSrpIdentityManager">
  26970. <summary>Base interface for an object that can return login parameters from an SRP identity.</summary>
  26971. </member>
  26972. <member name="M:Org.BouncyCastle.Tls.TlsSrpIdentityManager.GetLoginParameters(System.Byte[])">
  26973. <summary>Lookup the <see cref="T:Org.BouncyCastle.Tls.TlsSrpLoginParameters"/> corresponding to the specified identity.</summary>
  26974. <remarks>
  26975. NOTE: To avoid "identity probing", unknown identities SHOULD be handled as recommended in RFC 5054 2.5.1.3.
  26976. <see cref="T:Org.BouncyCastle.Tls.SimulatedTlsSrpIdentityManager"/> is provided for this purpose.
  26977. </remarks>
  26978. <param name="identity">the SRP identity sent by the connecting client.</param>
  26979. <returns>the <see cref="T:Org.BouncyCastle.Tls.TlsSrpLoginParameters"/> for the specified identity, or else 'simulated' parameters
  26980. if the identity is not recognized. A null value is also allowed, but not recommended.</returns>
  26981. </member>
  26982. <member name="T:Org.BouncyCastle.Tls.TlsSrpKeyExchange">
  26983. <summary>(D)TLS SRP key exchange (RFC 5054).</summary>
  26984. </member>
  26985. <member name="M:Org.BouncyCastle.Tls.TlsSrpUtilities.AddSrpExtension(System.Collections.IDictionary,System.Byte[])">
  26986. <exception cref="T:System.IO.IOException"/>
  26987. </member>
  26988. <member name="M:Org.BouncyCastle.Tls.TlsSrpUtilities.GetSrpExtension(System.Collections.IDictionary)">
  26989. <exception cref="T:System.IO.IOException"/>
  26990. </member>
  26991. <member name="M:Org.BouncyCastle.Tls.TlsSrpUtilities.CreateSrpExtension(System.Byte[])">
  26992. <exception cref="T:System.IO.IOException"/>
  26993. </member>
  26994. <member name="M:Org.BouncyCastle.Tls.TlsSrpUtilities.ReadSrpExtension(System.Byte[])">
  26995. <exception cref="T:System.IO.IOException"/>
  26996. </member>
  26997. <member name="M:Org.BouncyCastle.Tls.TlsSrpUtilities.ReadSrpParameter(System.IO.Stream)">
  26998. <exception cref="T:System.IO.IOException"/>
  26999. </member>
  27000. <member name="M:Org.BouncyCastle.Tls.TlsSrpUtilities.WriteSrpParameter(Org.BouncyCastle.Math.BigInteger,System.IO.Stream)">
  27001. <exception cref="T:System.IO.IOException"/>
  27002. </member>
  27003. <member name="T:Org.BouncyCastle.Tls.TlsSrtpUtilities">
  27004. <summary>RFC 5764 DTLS Extension to Establish Keys for SRTP.</summary>
  27005. </member>
  27006. <member name="M:Org.BouncyCastle.Tls.TlsSrtpUtilities.AddUseSrtpExtension(System.Collections.IDictionary,Org.BouncyCastle.Tls.UseSrtpData)">
  27007. <exception cref="T:System.IO.IOException"/>
  27008. </member>
  27009. <member name="M:Org.BouncyCastle.Tls.TlsSrtpUtilities.GetUseSrtpExtension(System.Collections.IDictionary)">
  27010. <exception cref="T:System.IO.IOException"/>
  27011. </member>
  27012. <member name="M:Org.BouncyCastle.Tls.TlsSrtpUtilities.CreateUseSrtpExtension(Org.BouncyCastle.Tls.UseSrtpData)">
  27013. <exception cref="T:System.IO.IOException"/>
  27014. </member>
  27015. <member name="M:Org.BouncyCastle.Tls.TlsSrtpUtilities.ReadUseSrtpExtension(System.Byte[])">
  27016. <exception cref="T:System.IO.IOException"/>
  27017. </member>
  27018. <member name="M:Org.BouncyCastle.Tls.TlsUtilities.EncodeSupportedSignatureAlgorithms(System.Collections.IList,System.IO.Stream)">
  27019. <exception cref="T:System.IO.IOException"/>
  27020. </member>
  27021. <member name="M:Org.BouncyCastle.Tls.TlsUtilities.ParseSupportedSignatureAlgorithms(System.IO.Stream)">
  27022. <exception cref="T:System.IO.IOException"/>
  27023. </member>
  27024. <member name="M:Org.BouncyCastle.Tls.TlsUtilities.VerifySupportedSignatureAlgorithm(System.Collections.IList,Org.BouncyCastle.Tls.SignatureAndHashAlgorithm)">
  27025. <exception cref="T:System.IO.IOException"/>
  27026. </member>
  27027. <member name="M:Org.BouncyCastle.Tls.TlsUtilities.ContainsSignatureAlgorithm(System.Collections.IList,Org.BouncyCastle.Tls.SignatureAndHashAlgorithm)">
  27028. <exception cref="T:System.IO.IOException"/>
  27029. </member>
  27030. <member name="M:Org.BouncyCastle.Tls.TlsUtilities.CalculateEndPointHash(Org.BouncyCastle.Tls.TlsContext,Org.BouncyCastle.Tls.Crypto.TlsCertificate,System.Byte[])">
  27031. <exception cref="T:System.IO.IOException"/>
  27032. </member>
  27033. <member name="M:Org.BouncyCastle.Tls.TlsUtilities.CalculateEndPointHash(Org.BouncyCastle.Tls.TlsContext,Org.BouncyCastle.Tls.Crypto.TlsCertificate,System.Byte[],System.Int32,System.Int32)">
  27034. <exception cref="T:System.IO.IOException"/>
  27035. </member>
  27036. <member name="M:Org.BouncyCastle.Tls.TlsUtilities.GenerateServerKeyExchangeSignature(Org.BouncyCastle.Tls.TlsContext,Org.BouncyCastle.Tls.TlsCredentialedSigner,System.Byte[],Org.BouncyCastle.Tls.DigestInputBuffer)">
  27037. <exception cref="T:System.IO.IOException"/>
  27038. </member>
  27039. <member name="M:Org.BouncyCastle.Tls.TlsUtilities.VerifyServerKeyExchangeSignature(Org.BouncyCastle.Tls.TlsContext,System.IO.Stream,Org.BouncyCastle.Tls.Crypto.TlsCertificate,System.Byte[],Org.BouncyCastle.Tls.DigestInputBuffer)">
  27040. <exception cref="T:System.IO.IOException"/>
  27041. </member>
  27042. <member name="M:Org.BouncyCastle.Tls.TlsUtilities.IsAeadCipherSuite(System.Int32)">
  27043. <exception cref="T:System.IO.IOException"/>
  27044. </member>
  27045. <member name="M:Org.BouncyCastle.Tls.TlsUtilities.IsBlockCipherSuite(System.Int32)">
  27046. <exception cref="T:System.IO.IOException"/>
  27047. </member>
  27048. <member name="M:Org.BouncyCastle.Tls.TlsUtilities.IsStreamCipherSuite(System.Int32)">
  27049. <exception cref="T:System.IO.IOException"/>
  27050. </member>
  27051. <member name="M:Org.BouncyCastle.Tls.TlsUtilities.IsValidCipherSuiteForSignatureAlgorithms(System.Int32,System.Collections.IList)">
  27052. <returns>Whether a server can select the specified cipher suite given the available signature algorithms
  27053. for ServerKeyExchange.</returns>
  27054. </member>
  27055. <member name="M:Org.BouncyCastle.Tls.TlsUtilities.ChooseSignatureAndHashAlgorithm(Org.BouncyCastle.Tls.TlsContext,System.Collections.IList,System.Int16)">
  27056. <exception cref="T:System.IO.IOException"/>
  27057. </member>
  27058. <member name="M:Org.BouncyCastle.Tls.TlsUtilities.ChooseSignatureAndHashAlgorithm(Org.BouncyCastle.Tls.ProtocolVersion,System.Collections.IList,System.Int16)">
  27059. <exception cref="T:System.IO.IOException"/>
  27060. </member>
  27061. <member name="M:Org.BouncyCastle.Tls.TlsUtilities.CreateKeyExchangeClient(Org.BouncyCastle.Tls.TlsClient,System.Int32)">
  27062. <exception cref="T:System.IO.IOException"/>
  27063. </member>
  27064. <member name="M:Org.BouncyCastle.Tls.TlsUtilities.CreateKeyExchangeServer(Org.BouncyCastle.Tls.TlsServer,System.Int32)">
  27065. <exception cref="T:System.IO.IOException"/>
  27066. </member>
  27067. <member name="M:Org.BouncyCastle.Tls.TlsUtilities.InitKeyExchangeClient(Org.BouncyCastle.Tls.TlsClientContext,Org.BouncyCastle.Tls.TlsClient)">
  27068. <exception cref="T:System.IO.IOException"/>
  27069. </member>
  27070. <member name="M:Org.BouncyCastle.Tls.TlsUtilities.InitKeyExchangeServer(Org.BouncyCastle.Tls.TlsServerContext,Org.BouncyCastle.Tls.TlsServer)">
  27071. <exception cref="T:System.IO.IOException"/>
  27072. </member>
  27073. <member name="M:Org.BouncyCastle.Tls.TlsUtilities.CheckPeerSigAlgs(Org.BouncyCastle.Tls.TlsContext,Org.BouncyCastle.Tls.Crypto.TlsCertificate[])">
  27074. <summary>Check the signature algorithm for certificates in the peer's CertPath as specified in RFC 5246
  27075. 7.4.2, 7.4.4, 7.4.6 and similar rules for earlier TLS versions.</summary>
  27076. <remarks>
  27077. The supplied CertPath should include the trust anchor (its signature algorithm isn't checked, but in the
  27078. general case checking a certificate requires the issuer certificate).
  27079. </remarks>
  27080. <exception cref="T:System.IO.IOException">if any certificate in the CertPath (excepting the trust anchor) has a
  27081. signature algorithm that is not one of the locally supported signature algorithms.</exception>
  27082. </member>
  27083. <member name="M:Org.BouncyCastle.Tls.TlsUtilities.RequireAgreementCredentials(Org.BouncyCastle.Tls.TlsCredentials)">
  27084. <exception cref="T:System.IO.IOException"/>
  27085. </member>
  27086. <member name="M:Org.BouncyCastle.Tls.TlsUtilities.RequireDecryptorCredentials(Org.BouncyCastle.Tls.TlsCredentials)">
  27087. <exception cref="T:System.IO.IOException"/>
  27088. </member>
  27089. <member name="M:Org.BouncyCastle.Tls.TlsUtilities.RequireSignerCredentials(Org.BouncyCastle.Tls.TlsCredentials)">
  27090. <exception cref="T:System.IO.IOException"/>
  27091. </member>
  27092. <member name="M:Org.BouncyCastle.Tls.TlsUtilities.CheckExtensionData13(System.Collections.IDictionary,System.Int32,System.Int16)">
  27093. <exception cref="T:System.IO.IOException"/>
  27094. </member>
  27095. <member name="M:Org.BouncyCastle.Tls.TlsUtilities.GenerateEncryptedPreMasterSecret(Org.BouncyCastle.Tls.TlsContext,Org.BouncyCastle.Tls.Crypto.TlsEncryptor,System.IO.Stream)">
  27096. <summary>Generate a pre_master_secret and send it encrypted to the server.</summary>
  27097. <exception cref="T:System.IO.IOException"/>
  27098. </member>
  27099. <member name="M:Org.BouncyCastle.Tls.TlsUtilities.AddPreSharedKeyToClientExtensions(Org.BouncyCastle.Tls.TlsPsk[],System.Collections.IDictionary)">
  27100. <exception cref="T:System.IO.IOException"/>
  27101. </member>
  27102. <member name="M:Org.BouncyCastle.Tls.TlsUtilities.AddPreSharedKeyToClientHello(Org.BouncyCastle.Tls.TlsClientContext,Org.BouncyCastle.Tls.TlsClient,System.Collections.IDictionary,System.Int32[])">
  27103. <exception cref="T:System.IO.IOException"/>
  27104. </member>
  27105. <member name="M:Org.BouncyCastle.Tls.TlsUtilities.AddPreSharedKeyToClientHelloRetry(Org.BouncyCastle.Tls.TlsClientContext,Org.BouncyCastle.Tls.OfferedPsks.BindersConfig,System.Collections.IDictionary)">
  27106. <exception cref="T:System.IO.IOException"/>
  27107. </member>
  27108. <member name="M:Org.BouncyCastle.Tls.TlsUtilities.GetPskExternalsClient(Org.BouncyCastle.Tls.TlsClient,System.Int32[])">
  27109. <exception cref="T:System.IO.IOException"/>
  27110. </member>
  27111. <member name="M:Org.BouncyCastle.Tls.TrustedAuthority.Encode(System.IO.Stream)">
  27112. <summary>Encode this <see cref="T:Org.BouncyCastle.Tls.TrustedAuthority"/> to a <see cref="T:System.IO.Stream"/>.</summary>
  27113. <param name="output">the <see cref="T:System.IO.Stream"/> to encode to.</param>
  27114. <exception cref="T:System.IO.IOException"/>
  27115. </member>
  27116. <member name="M:Org.BouncyCastle.Tls.TrustedAuthority.Parse(System.IO.Stream)">
  27117. <summary>Parse a <see cref="T:Org.BouncyCastle.Tls.TrustedAuthority"/> from a <see cref="T:System.IO.Stream"/>.</summary>
  27118. <param name="input">the <see cref="T:System.IO.Stream"/> to parse from.</param>
  27119. <returns>a <see cref="T:Org.BouncyCastle.Tls.TrustedAuthority"/> object.</returns>
  27120. <exception cref="T:System.IO.IOException"/>
  27121. </member>
  27122. <member name="T:Org.BouncyCastle.Tls.UrlAndHash">
  27123. <summary>RFC 6066 5.</summary>
  27124. </member>
  27125. <member name="M:Org.BouncyCastle.Tls.UrlAndHash.Encode(System.IO.Stream)">
  27126. <summary>Encode this <see cref="T:Org.BouncyCastle.Tls.UrlAndHash"/> to a <see cref="T:System.IO.Stream"/>.</summary>
  27127. <param name="output">the <see cref="T:System.IO.Stream"/> to encode to.</param>
  27128. <exception cref="T:System.IO.IOException"/>
  27129. </member>
  27130. <member name="M:Org.BouncyCastle.Tls.UrlAndHash.Parse(Org.BouncyCastle.Tls.TlsContext,System.IO.Stream)">
  27131. <summary>Parse a <see cref="T:Org.BouncyCastle.Tls.UrlAndHash"/> from a <see cref="T:System.IO.Stream"/>.</summary>
  27132. <param name="context">the <see cref="T:Org.BouncyCastle.Tls.TlsContext"/> of the current connection.</param>
  27133. <param name="input">the <see cref="T:System.IO.Stream"/> to parse from.</param>
  27134. <returns>a <see cref="T:Org.BouncyCastle.Tls.UrlAndHash"/> object.</returns>
  27135. <exception cref="T:System.IO.IOException"/>
  27136. </member>
  27137. <member name="T:Org.BouncyCastle.Tls.UserMappingType">
  27138. <summary>RFC 4681</summary>
  27139. </member>
  27140. <member name="T:Org.BouncyCastle.Tls.UseSrtpData">
  27141. <summary>RFC 5764 4.1.1</summary>
  27142. </member>
  27143. <member name="M:Org.BouncyCastle.Tls.UseSrtpData.#ctor(System.Int32[],System.Byte[])">
  27144. <param name="protectionProfiles">see <see cref="T:Org.BouncyCastle.Tls.SrtpProtectionProfile"/> for valid constants.</param>
  27145. <param name="mki">valid lengths from 0 to 255.</param>
  27146. </member>
  27147. <member name="P:Org.BouncyCastle.Tls.UseSrtpData.ProtectionProfiles">
  27148. <returns>see <see cref="T:Org.BouncyCastle.Tls.SrtpProtectionProfile"/> for valid constants.</returns>
  27149. </member>
  27150. <member name="P:Org.BouncyCastle.Tls.UseSrtpData.Mki">
  27151. <returns>valid lengths from 0 to 255.</returns>
  27152. </member>
  27153. <member name="T:Org.BouncyCastle.Tsp.TimeStampRequest">
  27154. Base class for an RFC 3161 Time Stamp Request.
  27155. </member>
  27156. <member name="M:Org.BouncyCastle.Tsp.TimeStampRequest.#ctor(System.Byte[])">
  27157. Create a TimeStampRequest from the past in byte array.
  27158. @param req byte array containing the request.
  27159. @throws IOException if the request is malformed.
  27160. </member>
  27161. <member name="M:Org.BouncyCastle.Tsp.TimeStampRequest.#ctor(System.IO.Stream)">
  27162. Create a TimeStampRequest from the past in input stream.
  27163. @param in input stream containing the request.
  27164. @throws IOException if the request is malformed.
  27165. </member>
  27166. <member name="M:Org.BouncyCastle.Tsp.TimeStampRequest.Validate(System.Collections.IList,System.Collections.IList,System.Collections.IList)">
  27167. Validate the timestamp request, checking the digest to see if it is of an
  27168. accepted type and whether it is of the correct length for the algorithm specified.
  27169. @param algorithms a set of string OIDS giving accepted algorithms.
  27170. @param policies if non-null a set of policies we are willing to sign under.
  27171. @param extensions if non-null a set of extensions we are willing to accept.
  27172. @throws TspException if the request is invalid, or processing fails.
  27173. </member>
  27174. <member name="M:Org.BouncyCastle.Tsp.TimeStampRequest.GetEncoded">
  27175. return the ASN.1 encoded representation of this object.
  27176. </member>
  27177. <member name="T:Org.BouncyCastle.Tsp.TimeStampRequestGenerator">
  27178. Generator for RFC 3161 Time Stamp Request objects.
  27179. </member>
  27180. <member name="M:Org.BouncyCastle.Tsp.TimeStampRequestGenerator.AddExtension(System.String,System.Boolean,Org.BouncyCastle.Asn1.Asn1Encodable)">
  27181. add a given extension field for the standard extensions tag (tag 3)
  27182. @throws IOException
  27183. </member>
  27184. <member name="M:Org.BouncyCastle.Tsp.TimeStampRequestGenerator.AddExtension(System.String,System.Boolean,System.Byte[])">
  27185. add a given extension field for the standard extensions tag
  27186. The value parameter becomes the contents of the octet string associated
  27187. with the extension.
  27188. </member>
  27189. <member name="M:Org.BouncyCastle.Tsp.TimeStampRequestGenerator.AddExtension(Org.BouncyCastle.Asn1.DerObjectIdentifier,System.Boolean,Org.BouncyCastle.Asn1.Asn1Encodable)">
  27190. add a given extension field for the standard extensions tag (tag 3)
  27191. @throws IOException
  27192. </member>
  27193. <member name="M:Org.BouncyCastle.Tsp.TimeStampRequestGenerator.AddExtension(Org.BouncyCastle.Asn1.DerObjectIdentifier,System.Boolean,System.Byte[])">
  27194. add a given extension field for the standard extensions tag
  27195. The value parameter becomes the contents of the octet string associated
  27196. with the extension.
  27197. </member>
  27198. <member name="T:Org.BouncyCastle.Tsp.TimeStampResponse">
  27199. Base class for an RFC 3161 Time Stamp Response object.
  27200. </member>
  27201. <member name="M:Org.BouncyCastle.Tsp.TimeStampResponse.#ctor(System.Byte[])">
  27202. Create a TimeStampResponse from a byte array containing an ASN.1 encoding.
  27203. @param resp the byte array containing the encoded response.
  27204. @throws TspException if the response is malformed.
  27205. @throws IOException if the byte array doesn't represent an ASN.1 encoding.
  27206. </member>
  27207. <member name="M:Org.BouncyCastle.Tsp.TimeStampResponse.#ctor(System.IO.Stream)">
  27208. Create a TimeStampResponse from an input stream containing an ASN.1 encoding.
  27209. @param input the input stream containing the encoded response.
  27210. @throws TspException if the response is malformed.
  27211. @throws IOException if the stream doesn't represent an ASN.1 encoding.
  27212. </member>
  27213. <member name="M:Org.BouncyCastle.Tsp.TimeStampResponse.Validate(Org.BouncyCastle.Tsp.TimeStampRequest)">
  27214. Check this response against to see if it a well formed response for
  27215. the passed in request. Validation will include checking the time stamp
  27216. token if the response status is GRANTED or GRANTED_WITH_MODS.
  27217. @param request the request to be checked against
  27218. @throws TspException if the request can not match this response.
  27219. </member>
  27220. <member name="M:Org.BouncyCastle.Tsp.TimeStampResponse.GetEncoded">
  27221. return the ASN.1 encoded representation of this object.
  27222. </member>
  27223. <member name="T:Org.BouncyCastle.Tsp.TimeStampResponseGenerator">
  27224. Generator for RFC 3161 Time Stamp Responses.
  27225. </member>
  27226. <member name="M:Org.BouncyCastle.Tsp.TimeStampResponseGenerator.Generate(Org.BouncyCastle.Tsp.TimeStampRequest,Org.BouncyCastle.Math.BigInteger,Org.BouncyCastle.Utilities.Date.DateTimeObject)">
  27227. Return an appropriate TimeStampResponse.
  27228. <p>
  27229. If genTime is null a timeNotAvailable error response will be returned.
  27230. @param request the request this response is for.
  27231. @param serialNumber serial number for the response token.
  27232. @param genTime generation time for the response token.
  27233. @param provider provider to use for signature calculation.
  27234. @return
  27235. @throws NoSuchAlgorithmException
  27236. @throws NoSuchProviderException
  27237. @throws TSPException
  27238. </p>
  27239. </member>
  27240. <member name="M:Org.BouncyCastle.Tsp.TimeStampResponseGenerator.GenerateFailResponse(Org.BouncyCastle.Asn1.Cmp.PkiStatus,System.Int32,System.String)">
  27241. Generate a TimeStampResponse with chosen status and FailInfoField.
  27242. @param status the PKIStatus to set.
  27243. @param failInfoField the FailInfoField to set.
  27244. @param statusString an optional string describing the failure.
  27245. @return a TimeStampResponse with a failInfoField and optional statusString
  27246. @throws TSPException in case the response could not be created
  27247. </member>
  27248. <member name="M:Org.BouncyCastle.Tsp.TimeStampToken.Validate(Org.BouncyCastle.X509.X509Certificate)">
  27249. Validate the time stamp token.
  27250. <p>
  27251. To be valid the token must be signed by the passed in certificate and
  27252. the certificate must be the one referred to by the SigningCertificate
  27253. attribute included in the hashed attributes of the token. The
  27254. certificate must also have the ExtendedKeyUsageExtension with only
  27255. KeyPurposeID.IdKPTimeStamping and have been valid at the time the
  27256. timestamp was created.
  27257. </p>
  27258. <p>
  27259. A successful call to validate means all the above are true.
  27260. </p>
  27261. </member>
  27262. <member name="M:Org.BouncyCastle.Tsp.TimeStampToken.ToCmsSignedData">
  27263. Return the underlying CmsSignedData object.
  27264. @return the underlying CMS structure.
  27265. </member>
  27266. <member name="M:Org.BouncyCastle.Tsp.TimeStampToken.GetEncoded">
  27267. Return a ASN.1 encoded byte stream representing the encoded object.
  27268. @throws IOException if encoding fails.
  27269. </member>
  27270. <member name="M:Org.BouncyCastle.Tsp.TimeStampToken.GetEncoded(System.String)">
  27271. return the ASN.1 encoded representation of this object using the specified encoding.
  27272. @param encoding the ASN.1 encoding format to use ("BER" or "DER").
  27273. </member>
  27274. <member name="M:Org.BouncyCastle.Tsp.TimeStampTokenGenerator.#ctor(Org.BouncyCastle.Crypto.AsymmetricKeyParameter,Org.BouncyCastle.X509.X509Certificate,System.String,System.String)">
  27275. basic creation - only the default attributes will be included here.
  27276. </member>
  27277. <member name="M:Org.BouncyCastle.Tsp.TimeStampTokenGenerator.#ctor(Org.BouncyCastle.Crypto.AsymmetricKeyParameter,Org.BouncyCastle.X509.X509Certificate,System.String,System.String,Org.BouncyCastle.Asn1.Cms.AttributeTable,Org.BouncyCastle.Asn1.Cms.AttributeTable)">
  27278. create with a signer with extra signed/unsigned attributes.
  27279. </member>
  27280. <member name="P:Org.BouncyCastle.Tsp.TimeStampTokenInfo.Nonce">
  27281. @return the nonce value, null if there isn't one.
  27282. </member>
  27283. <member name="T:Org.BouncyCastle.Tsp.TspAlgorithms">
  27284. Recognised hash algorithms for the time stamp protocol.
  27285. </member>
  27286. <member name="M:Org.BouncyCastle.Tsp.TspUtil.GetSignatureTimestamps(Org.BouncyCastle.Cms.SignerInformation)">
  27287. Fetches the signature time-stamp attributes from a SignerInformation object.
  27288. Checks that the MessageImprint for each time-stamp matches the signature field.
  27289. (see RFC 3161 Appendix A).
  27290. @param signerInfo a SignerInformation to search for time-stamps
  27291. @return a collection of TimeStampToken objects
  27292. @throws TSPValidationException
  27293. </member>
  27294. <member name="M:Org.BouncyCastle.Tsp.TspUtil.ValidateCertificate(Org.BouncyCastle.X509.X509Certificate)">
  27295. Validate the passed in certificate as being of the correct type to be used
  27296. for time stamping. To be valid it must have an ExtendedKeyUsage extension
  27297. which has a key purpose identifier of id-kp-timeStamping.
  27298. @param cert the certificate of interest.
  27299. @throws TspValidationException if the certicate fails on one of the check points.
  27300. </member>
  27301. <member name="M:Org.BouncyCastle.Tsp.TspUtil.GetDigestAlgName(System.String)">
  27302. <summary>
  27303. Return the digest algorithm using one of the standard JCA string
  27304. representations rather than the algorithm identifier (if possible).
  27305. </summary>
  27306. </member>
  27307. <member name="T:Org.BouncyCastle.Tsp.TspValidationException">
  27308. Exception thrown if a TSP request or response fails to validate.
  27309. <p>
  27310. If a failure code is associated with the exception it can be retrieved using
  27311. the getFailureCode() method.</p>
  27312. </member>
  27313. <member name="P:Org.BouncyCastle.Tsp.TspValidationException.FailureCode">
  27314. Return the failure code associated with this exception - if one is set.
  27315. @return the failure code if set, -1 otherwise.
  27316. </member>
  27317. <member name="T:Org.BouncyCastle.Utilities.Arrays">
  27318. <summary> General array utilities.</summary>
  27319. </member>
  27320. <member name="M:Org.BouncyCastle.Utilities.Arrays.AreEqual(System.Byte[],System.Byte[])">
  27321. <summary>
  27322. Are two arrays equal.
  27323. </summary>
  27324. <param name="a">Left side.</param>
  27325. <param name="b">Right side.</param>
  27326. <returns>True if equal.</returns>
  27327. </member>
  27328. <member name="M:Org.BouncyCastle.Utilities.Arrays.ConstantTimeAreEqual(System.Byte[],System.Byte[])">
  27329. <summary>
  27330. A constant time equals comparison - does not terminate early if
  27331. test will fail.
  27332. </summary>
  27333. <param name="a">first array</param>
  27334. <param name="b">second array</param>
  27335. <returns>true if arrays equal, false otherwise.</returns>
  27336. </member>
  27337. <member name="M:Org.BouncyCastle.Utilities.Arrays.CopyOfRange(System.Byte[],System.Int32,System.Int32)">
  27338. Make a copy of a range of bytes from the passed in data array. The range can
  27339. extend beyond the end of the input array, in which case the return array will
  27340. be padded with zeroes.
  27341. @param data the array from which the data is to be copied.
  27342. @param from the start index at which the copying should take place.
  27343. @param to the final index of the range (exclusive).
  27344. @return a new byte array containing the range given.
  27345. </member>
  27346. <member name="T:Org.BouncyCastle.Utilities.BigIntegers">
  27347. BigInteger utilities.
  27348. </member>
  27349. <member name="M:Org.BouncyCastle.Utilities.BigIntegers.AsUnsignedByteArray(Org.BouncyCastle.Math.BigInteger)">
  27350. Return the passed in value as an unsigned byte array.
  27351. @param value the value to be converted.
  27352. @return a byte array without a leading zero byte if present in the signed encoding.
  27353. </member>
  27354. <member name="M:Org.BouncyCastle.Utilities.BigIntegers.AsUnsignedByteArray(System.Int32,Org.BouncyCastle.Math.BigInteger)">
  27355. Return the passed in value as an unsigned byte array of the specified length, padded with
  27356. leading zeros as necessary.
  27357. @param length the fixed length of the result.
  27358. @param n the value to be converted.
  27359. @return a byte array padded to a fixed length with leading zeros.
  27360. </member>
  27361. <member name="M:Org.BouncyCastle.Utilities.BigIntegers.AsUnsignedByteArray(Org.BouncyCastle.Math.BigInteger,System.Byte[],System.Int32,System.Int32)">
  27362. Write the passed in value as unsigned bytes to the specified buffer range, padded with
  27363. leading zeros as necessary.
  27364. @param value
  27365. the value to be converted.
  27366. @param buf
  27367. the buffer to which the value is written.
  27368. @param off
  27369. the start offset in array <code>buf</code> at which the data is written.
  27370. @param len
  27371. the fixed length of data written (possibly padded with leading zeros).
  27372. </member>
  27373. <member name="M:Org.BouncyCastle.Utilities.BigIntegers.CreateRandomBigInteger(System.Int32,Org.BouncyCastle.Security.SecureRandom)">
  27374. <summary>
  27375. Creates a Random BigInteger from the secure random of a given bit length.
  27376. </summary>
  27377. <param name="bitLength"></param>
  27378. <param name="secureRandom"></param>
  27379. <returns></returns>
  27380. </member>
  27381. <member name="M:Org.BouncyCastle.Utilities.BigIntegers.CreateRandomInRange(Org.BouncyCastle.Math.BigInteger,Org.BouncyCastle.Math.BigInteger,Org.BouncyCastle.Security.SecureRandom)">
  27382. Return a random BigInteger not less than 'min' and not greater than 'max'
  27383. @param min the least value that may be generated
  27384. @param max the greatest value that may be generated
  27385. @param random the source of randomness
  27386. @return a random BigInteger value in the range [min,max]
  27387. </member>
  27388. <member name="M:Org.BouncyCastle.Utilities.Date.DateTimeUtilities.DateTimeToUnixMs(System.DateTime)">
  27389. <summary>
  27390. Return the number of milliseconds since the Unix epoch (1 Jan., 1970 UTC) for a given DateTime value.
  27391. </summary>
  27392. <param name="dateTime">A UTC DateTime value not before epoch.</param>
  27393. <returns>Number of whole milliseconds after epoch.</returns>
  27394. <exception cref="T:System.ArgumentException">'dateTime' is before epoch.</exception>
  27395. </member>
  27396. <member name="M:Org.BouncyCastle.Utilities.Date.DateTimeUtilities.UnixMsToDateTime(System.Int64)">
  27397. <summary>
  27398. Create a DateTime value from the number of milliseconds since the Unix epoch (1 Jan., 1970 UTC).
  27399. </summary>
  27400. <param name="unixMs">Number of milliseconds since the epoch.</param>
  27401. <returns>A UTC DateTime value</returns>
  27402. </member>
  27403. <member name="M:Org.BouncyCastle.Utilities.Date.DateTimeUtilities.CurrentUnixMs">
  27404. <summary>
  27405. Return the current number of milliseconds since the Unix epoch (1 Jan., 1970 UTC).
  27406. </summary>
  27407. </member>
  27408. <member name="M:Org.BouncyCastle.Utilities.Encoders.Base64.Encode(System.Byte[])">
  27409. encode the input data producing a base 64 encoded byte array.
  27410. @return a byte array containing the base 64 encoded data.
  27411. </member>
  27412. <member name="M:Org.BouncyCastle.Utilities.Encoders.Base64.Encode(System.Byte[],System.Int32,System.Int32)">
  27413. encode the input data producing a base 64 encoded byte array.
  27414. @return a byte array containing the base 64 encoded data.
  27415. </member>
  27416. <member name="M:Org.BouncyCastle.Utilities.Encoders.Base64.Encode(System.Byte[],System.IO.Stream)">
  27417. Encode the byte data to base 64 writing it to the given output stream.
  27418. @return the number of bytes produced.
  27419. </member>
  27420. <member name="M:Org.BouncyCastle.Utilities.Encoders.Base64.Encode(System.Byte[],System.Int32,System.Int32,System.IO.Stream)">
  27421. Encode the byte data to base 64 writing it to the given output stream.
  27422. @return the number of bytes produced.
  27423. </member>
  27424. <member name="M:Org.BouncyCastle.Utilities.Encoders.Base64.Decode(System.Byte[])">
  27425. decode the base 64 encoded input data. It is assumed the input data is valid.
  27426. @return a byte array representing the decoded data.
  27427. </member>
  27428. <member name="M:Org.BouncyCastle.Utilities.Encoders.Base64.Decode(System.String)">
  27429. decode the base 64 encoded string data - whitespace will be ignored.
  27430. @return a byte array representing the decoded data.
  27431. </member>
  27432. <member name="M:Org.BouncyCastle.Utilities.Encoders.Base64.Decode(System.String,System.IO.Stream)">
  27433. decode the base 64 encoded string data writing it to the given output stream,
  27434. whitespace characters will be ignored.
  27435. @return the number of bytes produced.
  27436. </member>
  27437. <member name="M:Org.BouncyCastle.Utilities.Encoders.Base64Encoder.Encode(System.Byte[],System.Int32,System.Int32,System.IO.Stream)">
  27438. encode the input data producing a base 64 output stream.
  27439. @return the number of bytes produced.
  27440. </member>
  27441. <member name="M:Org.BouncyCastle.Utilities.Encoders.Base64Encoder.Decode(System.Byte[],System.Int32,System.Int32,System.IO.Stream)">
  27442. decode the base 64 encoded byte data writing it to the given output stream,
  27443. whitespace characters will be ignored.
  27444. @return the number of bytes produced.
  27445. </member>
  27446. <member name="M:Org.BouncyCastle.Utilities.Encoders.Base64Encoder.DecodeString(System.String,System.IO.Stream)">
  27447. decode the base 64 encoded string data writing it to the given output stream,
  27448. whitespace characters will be ignored.
  27449. @return the number of bytes produced.
  27450. </member>
  27451. <member name="T:Org.BouncyCastle.Utilities.Encoders.BufferedDecoder">
  27452. <summary>
  27453. A buffering class to allow translation from one format to another to
  27454. be done in discrete chunks.
  27455. </summary>
  27456. </member>
  27457. <member name="M:Org.BouncyCastle.Utilities.Encoders.BufferedDecoder.#ctor(Org.BouncyCastle.Utilities.Encoders.ITranslator,System.Int32)">
  27458. <summary>
  27459. Create a buffered Decoder.
  27460. </summary>
  27461. <param name="translator">The translater to use.</param>
  27462. <param name="bufferSize">The size of the buffer.</param>
  27463. </member>
  27464. <member name="M:Org.BouncyCastle.Utilities.Encoders.BufferedDecoder.ProcessByte(System.Byte,System.Byte[],System.Int32)">
  27465. <summary>
  27466. Process one byte of data.
  27467. </summary>
  27468. <param name="input">Data in.</param>
  27469. <param name="output">Byte array for the output.</param>
  27470. <param name="outOff">The offset in the output byte array to start writing from.</param>
  27471. <returns>The amount of output bytes.</returns>
  27472. </member>
  27473. <member name="M:Org.BouncyCastle.Utilities.Encoders.BufferedDecoder.ProcessBytes(System.Byte[],System.Int32,System.Int32,System.Byte[],System.Int32)">
  27474. <summary>
  27475. Process data from a byte array.
  27476. </summary>
  27477. <param name="input">The input data.</param>
  27478. <param name="inOff">Start position within input data array.</param>
  27479. <param name="len">Amount of data to process from input data array.</param>
  27480. <param name="outBytes">Array to store output.</param>
  27481. <param name="outOff">Position in output array to start writing from.</param>
  27482. <returns>The amount of output bytes.</returns>
  27483. </member>
  27484. <member name="T:Org.BouncyCastle.Utilities.Encoders.BufferedEncoder">
  27485. <summary>
  27486. A class that allows encoding of data using a specific encoder to be processed in chunks.
  27487. </summary>
  27488. </member>
  27489. <member name="M:Org.BouncyCastle.Utilities.Encoders.BufferedEncoder.#ctor(Org.BouncyCastle.Utilities.Encoders.ITranslator,System.Int32)">
  27490. <summary>
  27491. Create.
  27492. </summary>
  27493. <param name="translator">The translator to use.</param>
  27494. <param name="bufferSize">Size of the chunks.</param>
  27495. </member>
  27496. <member name="M:Org.BouncyCastle.Utilities.Encoders.BufferedEncoder.ProcessByte(System.Byte,System.Byte[],System.Int32)">
  27497. <summary>
  27498. Process one byte of data.
  27499. </summary>
  27500. <param name="input">The byte.</param>
  27501. <param name="outBytes">An array to store output in.</param>
  27502. <param name="outOff">Offset within output array to start writing from.</param>
  27503. <returns></returns>
  27504. </member>
  27505. <member name="M:Org.BouncyCastle.Utilities.Encoders.BufferedEncoder.ProcessBytes(System.Byte[],System.Int32,System.Int32,System.Byte[],System.Int32)">
  27506. <summary>
  27507. Process data from a byte array.
  27508. </summary>
  27509. <param name="input">Input data Byte array containing data to be processed.</param>
  27510. <param name="inOff">Start position within input data array.</param>
  27511. <param name="len">Amount of input data to be processed.</param>
  27512. <param name="outBytes">Output data array.</param>
  27513. <param name="outOff">Offset within output data array to start writing to.</param>
  27514. <returns>The amount of data written.</returns>
  27515. </member>
  27516. <member name="T:Org.BouncyCastle.Utilities.Encoders.Hex">
  27517. <summary>
  27518. Class to decode and encode Hex.
  27519. </summary>
  27520. </member>
  27521. <member name="M:Org.BouncyCastle.Utilities.Encoders.Hex.Encode(System.Byte[])">
  27522. encode the input data producing a Hex encoded byte array.
  27523. @return a byte array containing the Hex encoded data.
  27524. </member>
  27525. <member name="M:Org.BouncyCastle.Utilities.Encoders.Hex.Encode(System.Byte[],System.Int32,System.Int32)">
  27526. encode the input data producing a Hex encoded byte array.
  27527. @return a byte array containing the Hex encoded data.
  27528. </member>
  27529. <member name="M:Org.BouncyCastle.Utilities.Encoders.Hex.Encode(System.Byte[],System.IO.Stream)">
  27530. Hex encode the byte data writing it to the given output stream.
  27531. @return the number of bytes produced.
  27532. </member>
  27533. <member name="M:Org.BouncyCastle.Utilities.Encoders.Hex.Encode(System.Byte[],System.Int32,System.Int32,System.IO.Stream)">
  27534. Hex encode the byte data writing it to the given output stream.
  27535. @return the number of bytes produced.
  27536. </member>
  27537. <member name="M:Org.BouncyCastle.Utilities.Encoders.Hex.Decode(System.Byte[])">
  27538. decode the Hex encoded input data. It is assumed the input data is valid.
  27539. @return a byte array representing the decoded data.
  27540. </member>
  27541. <member name="M:Org.BouncyCastle.Utilities.Encoders.Hex.Decode(System.String)">
  27542. decode the Hex encoded string data - whitespace will be ignored.
  27543. @return a byte array representing the decoded data.
  27544. </member>
  27545. <member name="M:Org.BouncyCastle.Utilities.Encoders.Hex.Decode(System.String,System.IO.Stream)">
  27546. decode the Hex encoded string data writing it to the given output stream,
  27547. whitespace characters will be ignored.
  27548. @return the number of bytes produced.
  27549. </member>
  27550. <member name="M:Org.BouncyCastle.Utilities.Encoders.Hex.DecodeStrict(System.String)">
  27551. Decode the hexadecimal-encoded string strictly i.e. any non-hexadecimal characters will be
  27552. considered an error.
  27553. @return a byte array representing the decoded data.
  27554. </member>
  27555. <member name="M:Org.BouncyCastle.Utilities.Encoders.Hex.DecodeStrict(System.String,System.Int32,System.Int32)">
  27556. Decode the hexadecimal-encoded string strictly i.e. any non-hexadecimal characters will be
  27557. considered an error.
  27558. @return a byte array representing the decoded data.
  27559. </member>
  27560. <member name="M:Org.BouncyCastle.Utilities.Encoders.HexEncoder.Encode(System.Byte[],System.Int32,System.Int32,System.IO.Stream)">
  27561. encode the input data producing a Hex output stream.
  27562. @return the number of bytes produced.
  27563. </member>
  27564. <member name="M:Org.BouncyCastle.Utilities.Encoders.HexEncoder.Decode(System.Byte[],System.Int32,System.Int32,System.IO.Stream)">
  27565. decode the Hex encoded byte data writing it to the given output stream,
  27566. whitespace characters will be ignored.
  27567. @return the number of bytes produced.
  27568. </member>
  27569. <member name="M:Org.BouncyCastle.Utilities.Encoders.HexEncoder.DecodeString(System.String,System.IO.Stream)">
  27570. decode the Hex encoded string data writing it to the given output stream,
  27571. whitespace characters will be ignored.
  27572. @return the number of bytes produced.
  27573. </member>
  27574. <member name="T:Org.BouncyCastle.Utilities.Encoders.HexTranslator">
  27575. <summary>
  27576. A hex translator.
  27577. </summary>
  27578. </member>
  27579. <member name="M:Org.BouncyCastle.Utilities.Encoders.HexTranslator.GetEncodedBlockSize">
  27580. <summary>
  27581. Return encoded block size.
  27582. </summary>
  27583. <returns>2</returns>
  27584. </member>
  27585. <member name="M:Org.BouncyCastle.Utilities.Encoders.HexTranslator.Encode(System.Byte[],System.Int32,System.Int32,System.Byte[],System.Int32)">
  27586. <summary>
  27587. Encode some data.
  27588. </summary>
  27589. <param name="input">Input data array.</param>
  27590. <param name="inOff">Start position within input data array.</param>
  27591. <param name="length">The amount of data to process.</param>
  27592. <param name="outBytes">The output data array.</param>
  27593. <param name="outOff">The offset within the output data array to start writing from.</param>
  27594. <returns>Amount of data encoded.</returns>
  27595. </member>
  27596. <member name="M:Org.BouncyCastle.Utilities.Encoders.HexTranslator.GetDecodedBlockSize">
  27597. <summary>
  27598. Returns the decoded block size.
  27599. </summary>
  27600. <returns>1</returns>
  27601. </member>
  27602. <member name="M:Org.BouncyCastle.Utilities.Encoders.HexTranslator.Decode(System.Byte[],System.Int32,System.Int32,System.Byte[],System.Int32)">
  27603. <summary>
  27604. Decode data from a byte array.
  27605. </summary>
  27606. <param name="input">The input data array.</param>
  27607. <param name="inOff">Start position within input data array.</param>
  27608. <param name="length">The amounty of data to process.</param>
  27609. <param name="outBytes">The output data array.</param>
  27610. <param name="outOff">The position within the output data array to start writing from.</param>
  27611. <returns>The amount of data written.</returns>
  27612. </member>
  27613. <member name="T:Org.BouncyCastle.Utilities.Encoders.IEncoder">
  27614. Encode and decode byte arrays (typically from binary to 7-bit ASCII
  27615. encodings).
  27616. </member>
  27617. <member name="T:Org.BouncyCastle.Utilities.Encoders.ITranslator">
  27618. <summary>
  27619. Translator interface.
  27620. </summary>
  27621. </member>
  27622. <member name="T:Org.BouncyCastle.Utilities.Encoders.UrlBase64">
  27623. Convert binary data to and from UrlBase64 encoding. This is identical to
  27624. Base64 encoding, except that the padding character is "." and the other
  27625. non-alphanumeric characters are "-" and "_" instead of "+" and "/".
  27626. <p>
  27627. The purpose of UrlBase64 encoding is to provide a compact encoding of binary
  27628. data that is safe for use as an URL parameter. Base64 encoding does not
  27629. produce encoded values that are safe for use in URLs, since "/" can be
  27630. interpreted as a path delimiter; "+" is the encoded form of a space; and
  27631. "=" is used to separate a name from the corresponding value in an URL
  27632. parameter.
  27633. </p>
  27634. </member>
  27635. <member name="M:Org.BouncyCastle.Utilities.Encoders.UrlBase64.Encode(System.Byte[])">
  27636. Encode the input data producing a URL safe base 64 encoded byte array.
  27637. @return a byte array containing the URL safe base 64 encoded data.
  27638. </member>
  27639. <member name="M:Org.BouncyCastle.Utilities.Encoders.UrlBase64.Encode(System.Byte[],System.IO.Stream)">
  27640. Encode the byte data writing it to the given output stream.
  27641. @return the number of bytes produced.
  27642. </member>
  27643. <member name="M:Org.BouncyCastle.Utilities.Encoders.UrlBase64.Decode(System.Byte[])">
  27644. Decode the URL safe base 64 encoded input data - white space will be ignored.
  27645. @return a byte array representing the decoded data.
  27646. </member>
  27647. <member name="M:Org.BouncyCastle.Utilities.Encoders.UrlBase64.Decode(System.Byte[],System.IO.Stream)">
  27648. decode the URL safe base 64 encoded byte data writing it to the given output stream,
  27649. whitespace characters will be ignored.
  27650. @return the number of bytes produced.
  27651. </member>
  27652. <member name="M:Org.BouncyCastle.Utilities.Encoders.UrlBase64.Decode(System.String)">
  27653. decode the URL safe base 64 encoded string data - whitespace will be ignored.
  27654. @return a byte array representing the decoded data.
  27655. </member>
  27656. <member name="M:Org.BouncyCastle.Utilities.Encoders.UrlBase64.Decode(System.String,System.IO.Stream)">
  27657. Decode the URL safe base 64 encoded string data writing it to the given output stream,
  27658. whitespace characters will be ignored.
  27659. @return the number of bytes produced.
  27660. </member>
  27661. <member name="T:Org.BouncyCastle.Utilities.Encoders.UrlBase64Encoder">
  27662. Convert binary data to and from UrlBase64 encoding. This is identical to
  27663. Base64 encoding, except that the padding character is "." and the other
  27664. non-alphanumeric characters are "-" and "_" instead of "+" and "/".
  27665. <p>
  27666. The purpose of UrlBase64 encoding is to provide a compact encoding of binary
  27667. data that is safe for use as an URL parameter. Base64 encoding does not
  27668. produce encoded values that are safe for use in URLs, since "/" can be
  27669. interpreted as a path delimiter; "+" is the encoded form of a space; and
  27670. "=" is used to separate a name from the corresponding value in an URL
  27671. parameter.
  27672. </p>
  27673. </member>
  27674. <member name="M:Org.BouncyCastle.Utilities.IMemoable.Copy">
  27675. <summary>
  27676. Produce a copy of this object with its configuration and in its current state.
  27677. </summary>
  27678. <remarks>
  27679. The returned object may be used simply to store the state, or may be used as a similar object
  27680. starting from the copied state.
  27681. </remarks>
  27682. </member>
  27683. <member name="M:Org.BouncyCastle.Utilities.IMemoable.Reset(Org.BouncyCastle.Utilities.IMemoable)">
  27684. <summary>
  27685. Restore a copied object state into this object.
  27686. </summary>
  27687. <remarks>
  27688. Implementations of this method <em>should</em> try to avoid or minimise memory allocation to perform the reset.
  27689. </remarks>
  27690. <param name="other">an object originally {@link #copy() copied} from an object of the same type as this instance.</param>
  27691. <exception cref="T:System.InvalidCastException">if the provided object is not of the correct type.</exception>
  27692. <exception cref="T:Org.BouncyCastle.Utilities.MemoableResetException">if the <b>other</b> parameter is in some other way invalid.</exception>
  27693. </member>
  27694. <member name="M:Org.BouncyCastle.Utilities.IO.Pem.PemObjectGenerator.Generate">
  27695. <returns>
  27696. A <see cref="T:Org.BouncyCastle.Utilities.IO.Pem.PemObject"/>
  27697. </returns>
  27698. <exception cref="T:Org.BouncyCastle.Utilities.IO.Pem.PemGenerationException"></exception>
  27699. </member>
  27700. <member name="M:Org.BouncyCastle.Utilities.IO.Pem.PemObjectParser.ParseObject(Org.BouncyCastle.Utilities.IO.Pem.PemObject)">
  27701. <param name="obj">
  27702. A <see cref="T:Org.BouncyCastle.Utilities.IO.Pem.PemObject"/>
  27703. </param>
  27704. <returns>
  27705. A <see cref="T:System.Object"/>
  27706. </returns>
  27707. <exception cref="T:System.IO.IOException"></exception>
  27708. </member>
  27709. <member name="M:Org.BouncyCastle.Utilities.IO.Pem.PemReader.ReadPemObject">
  27710. <returns>
  27711. A <see cref="T:Org.BouncyCastle.Utilities.IO.Pem.PemObject"/>
  27712. </returns>
  27713. <exception cref="T:System.IO.IOException"></exception>
  27714. </member>
  27715. <member name="M:Org.BouncyCastle.Utilities.IO.Pem.PemReader.seekColon(System.Int32)">
  27716. <summary>
  27717. Seek ':" up to the limit.
  27718. </summary>
  27719. <param name="upTo"></param>
  27720. <returns></returns>
  27721. </member>
  27722. <member name="M:Org.BouncyCastle.Utilities.IO.Pem.PemReader.consumeDash">
  27723. <summary>
  27724. Consume the dashes
  27725. </summary>
  27726. <returns></returns>
  27727. </member>
  27728. <member name="M:Org.BouncyCastle.Utilities.IO.Pem.PemReader.skipWhiteSpace">
  27729. <summary>
  27730. Skip white space leave char in stream.
  27731. </summary>
  27732. </member>
  27733. <member name="M:Org.BouncyCastle.Utilities.IO.Pem.PemReader.expect(System.String)">
  27734. <summary>
  27735. Read forward consuming the expected string.
  27736. </summary>
  27737. <param name="value">expected string</param>
  27738. <returns>false if not consumed</returns>
  27739. </member>
  27740. <member name="M:Org.BouncyCastle.Utilities.IO.Pem.PemReader.bufferUntilStopChar(System.Char,System.Boolean)">
  27741. <summary>
  27742. Consume until dash.
  27743. </summary>
  27744. <returns>true if stream end not met</returns>
  27745. </member>
  27746. <member name="T:Org.BouncyCastle.Utilities.IO.Pem.PemWriter">
  27747. A generic PEM writer, based on RFC 1421
  27748. </member>
  27749. <member name="M:Org.BouncyCastle.Utilities.IO.Pem.PemWriter.#ctor(System.IO.TextWriter)">
  27750. Base constructor.
  27751. @param out output stream to use.
  27752. </member>
  27753. <member name="M:Org.BouncyCastle.Utilities.IO.Pem.PemWriter.GetOutputSize(Org.BouncyCastle.Utilities.IO.Pem.PemObject)">
  27754. Return the number of bytes or characters required to contain the
  27755. passed in object if it is PEM encoded.
  27756. @param obj pem object to be output
  27757. @return an estimate of the number of bytes
  27758. </member>
  27759. <member name="M:Org.BouncyCastle.Utilities.IO.Streams.PipeAll(System.IO.Stream,System.IO.Stream)">
  27760. <summary>Write the full contents of inStr to the destination stream outStr.</summary>
  27761. <param name="inStr">Source stream.</param>
  27762. <param name="outStr">Destination stream.</param>
  27763. <exception cref="T:System.IO.IOException">In case of IO failure.</exception>
  27764. </member>
  27765. <member name="M:Org.BouncyCastle.Utilities.IO.Streams.PipeAll(System.IO.Stream,System.IO.Stream,System.Int32)">
  27766. <summary>Write the full contents of inStr to the destination stream outStr.</summary>
  27767. <param name="inStr">Source stream.</param>
  27768. <param name="outStr">Destination stream.</param>
  27769. <param name="bufferSize">The size of temporary buffer to use.</param>
  27770. <exception cref="T:System.IO.IOException">In case of IO failure.</exception>
  27771. </member>
  27772. <member name="M:Org.BouncyCastle.Utilities.IO.Streams.PipeAllLimited(System.IO.Stream,System.Int64,System.IO.Stream)">
  27773. <summary>
  27774. Pipe all bytes from <c>inStr</c> to <c>outStr</c>, throwing <c>StreamFlowException</c> if greater
  27775. than <c>limit</c> bytes in <c>inStr</c>.
  27776. </summary>
  27777. <param name="inStr">
  27778. A <see cref="T:System.IO.Stream"/>
  27779. </param>
  27780. <param name="limit">
  27781. A <see cref="T:System.Int64"/>
  27782. </param>
  27783. <param name="outStr">
  27784. A <see cref="T:System.IO.Stream"/>
  27785. </param>
  27786. <returns>The number of bytes actually transferred, if not greater than <c>limit</c></returns>
  27787. <exception cref="T:System.IO.IOException"></exception>
  27788. </member>
  27789. <member name="M:Org.BouncyCastle.Utilities.IO.Streams.WriteBufTo(System.IO.MemoryStream,System.IO.Stream)">
  27790. <exception cref="T:System.IO.IOException"></exception>
  27791. </member>
  27792. <member name="M:Org.BouncyCastle.Utilities.IO.Streams.WriteBufTo(System.IO.MemoryStream,System.Byte[],System.Int32)">
  27793. <exception cref="T:System.IO.IOException"></exception>
  27794. </member>
  27795. <member name="T:Org.BouncyCastle.Utilities.MemoableResetException">
  27796. Exception to be thrown on a failure to reset an object implementing Memoable.
  27797. <p>
  27798. The exception extends InvalidCastException to enable users to have a single handling case,
  27799. only introducing specific handling of this one if required.
  27800. </p>
  27801. </member>
  27802. <member name="M:Org.BouncyCastle.Utilities.MemoableResetException.#ctor(System.String)">
  27803. Basic Constructor.
  27804. @param msg message to be associated with this exception.
  27805. </member>
  27806. <member name="M:Org.BouncyCastle.Utilities.Net.IPAddress.IsValid(System.String)">
  27807. Validate the given IPv4 or IPv6 address.
  27808. @param address the IP address as a string.
  27809. @return true if a valid address, false otherwise
  27810. </member>
  27811. <member name="M:Org.BouncyCastle.Utilities.Net.IPAddress.IsValidWithNetMask(System.String)">
  27812. Validate the given IPv4 or IPv6 address and netmask.
  27813. @param address the IP address as a string.
  27814. @return true if a valid address with netmask, false otherwise
  27815. </member>
  27816. <member name="M:Org.BouncyCastle.Utilities.Net.IPAddress.IsValidIPv4(System.String)">
  27817. Validate the given IPv4 address.
  27818. @param address the IP address as a string.
  27819. @return true if a valid IPv4 address, false otherwise
  27820. </member>
  27821. <member name="M:Org.BouncyCastle.Utilities.Net.IPAddress.IsValidIPv6(System.String)">
  27822. Validate the given IPv6 address.
  27823. @param address the IP address as a string.
  27824. @return true if a valid IPv4 address, false otherwise
  27825. </member>
  27826. <member name="T:Org.BouncyCastle.Utilities.Strings">
  27827. <summary> General string utilities.</summary>
  27828. </member>
  27829. <member name="T:Org.BouncyCastle.Utilities.Zlib.ZDeflaterOutputStream">
  27830. <summary>
  27831. Summary description for DeflaterOutputStream.
  27832. </summary>
  27833. </member>
  27834. <member name="T:Org.BouncyCastle.Utilities.Zlib.ZInflaterInputStream">
  27835. <summary>
  27836. Summary description for DeflaterOutputStream.
  27837. </summary>
  27838. </member>
  27839. <member name="T:Org.BouncyCastle.X509.AttributeCertificateHolder">
  27840. <remarks>
  27841. The Holder object.
  27842. <pre>
  27843. Holder ::= SEQUENCE {
  27844. baseCertificateID [0] IssuerSerial OPTIONAL,
  27845. -- the issuer and serial number of
  27846. -- the holder's Public Key Certificate
  27847. entityName [1] GeneralNames OPTIONAL,
  27848. -- the name of the claimant or role
  27849. objectDigestInfo [2] ObjectDigestInfo OPTIONAL
  27850. -- used to directly authenticate the holder,
  27851. -- for example, an executable
  27852. }
  27853. </pre>
  27854. </remarks>
  27855. </member>
  27856. <member name="M:Org.BouncyCastle.X509.AttributeCertificateHolder.#ctor(System.Int32,System.String,System.String,System.Byte[])">
  27857. Constructs a holder for v2 attribute certificates with a hash value for
  27858. some type of object.
  27859. <p>
  27860. <code>digestedObjectType</code> can be one of the following:
  27861. <ul>
  27862. <li>0 - publicKey - A hash of the public key of the holder must be
  27863. passed.</li>
  27864. <li>1 - publicKeyCert - A hash of the public key certificate of the
  27865. holder must be passed.</li>
  27866. <li>2 - otherObjectDigest - A hash of some other object type must be
  27867. passed. <code>otherObjectTypeID</code> must not be empty.</li>
  27868. </ul>
  27869. </p>
  27870. <p>This cannot be used if a v1 attribute certificate is used.</p>
  27871. @param digestedObjectType The digest object type.
  27872. @param digestAlgorithm The algorithm identifier for the hash.
  27873. @param otherObjectTypeID The object type ID if
  27874. <code>digestedObjectType</code> is
  27875. <code>otherObjectDigest</code>.
  27876. @param objectDigest The hash value.
  27877. </member>
  27878. <member name="P:Org.BouncyCastle.X509.AttributeCertificateHolder.DigestedObjectType">
  27879. Returns the digest object type if an object digest info is used.
  27880. <p>
  27881. <ul>
  27882. <li>0 - publicKey - A hash of the public key of the holder must be
  27883. passed.</li>
  27884. <li>1 - publicKeyCert - A hash of the public key certificate of the
  27885. holder must be passed.</li>
  27886. <li>2 - otherObjectDigest - A hash of some other object type must be
  27887. passed. <code>otherObjectTypeID</code> must not be empty.</li>
  27888. </ul>
  27889. </p>
  27890. @return The digest object type or -1 if no object digest info is set.
  27891. </member>
  27892. <member name="P:Org.BouncyCastle.X509.AttributeCertificateHolder.DigestAlgorithm">
  27893. Returns the other object type ID if an object digest info is used.
  27894. @return The other object type ID or <code>null</code> if no object
  27895. digest info is set.
  27896. </member>
  27897. <member name="M:Org.BouncyCastle.X509.AttributeCertificateHolder.GetObjectDigest">
  27898. Returns the hash if an object digest info is used.
  27899. @return The hash or <code>null</code> if no object digest info is set.
  27900. </member>
  27901. <member name="P:Org.BouncyCastle.X509.AttributeCertificateHolder.OtherObjectTypeID">
  27902. Returns the digest algorithm ID if an object digest info is used.
  27903. @return The digest algorithm ID or <code>null</code> if no object
  27904. digest info is set.
  27905. </member>
  27906. <member name="M:Org.BouncyCastle.X509.AttributeCertificateHolder.GetEntityNames">
  27907. Return any principal objects inside the attribute certificate holder entity names field.
  27908. @return an array of IPrincipal objects (usually X509Name), null if no entity names field is set.
  27909. </member>
  27910. <member name="M:Org.BouncyCastle.X509.AttributeCertificateHolder.GetIssuer">
  27911. Return the principals associated with the issuer attached to this holder
  27912. @return an array of principals, null if no BaseCertificateID is set.
  27913. </member>
  27914. <member name="P:Org.BouncyCastle.X509.AttributeCertificateHolder.SerialNumber">
  27915. Return the serial number associated with the issuer attached to this holder.
  27916. @return the certificate serial number, null if no BaseCertificateID is set.
  27917. </member>
  27918. <member name="T:Org.BouncyCastle.X509.AttributeCertificateIssuer">
  27919. Carrying class for an attribute certificate issuer.
  27920. </member>
  27921. <member name="M:Org.BouncyCastle.X509.AttributeCertificateIssuer.#ctor(Org.BouncyCastle.Asn1.X509.AttCertIssuer)">
  27922. Set the issuer directly with the ASN.1 structure.
  27923. @param issuer The issuer
  27924. </member>
  27925. <member name="M:Org.BouncyCastle.X509.AttributeCertificateIssuer.GetPrincipals">
  27926. <summary>Return any principal objects inside the attribute certificate issuer object.</summary>
  27927. <returns>An array of IPrincipal objects (usually X509Principal).</returns>
  27928. </member>
  27929. <member name="T:Org.BouncyCastle.X509.Extension.AuthorityKeyIdentifierStructure">
  27930. <remarks>A high level authority key identifier.</remarks>
  27931. </member>
  27932. <member name="M:Org.BouncyCastle.X509.Extension.AuthorityKeyIdentifierStructure.#ctor(Org.BouncyCastle.Asn1.Asn1OctetString)">
  27933. Constructor which will take the byte[] returned from getExtensionValue()
  27934. @param encodedValue a DER octet encoded string with the extension structure in it.
  27935. @throws IOException on parsing errors.
  27936. </member>
  27937. <member name="M:Org.BouncyCastle.X509.Extension.AuthorityKeyIdentifierStructure.#ctor(Org.BouncyCastle.X509.X509Certificate)">
  27938. Create an AuthorityKeyIdentifier using the passed in certificate's public
  27939. key, issuer and serial number.
  27940. @param certificate the certificate providing the information.
  27941. @throws CertificateParsingException if there is a problem processing the certificate
  27942. </member>
  27943. <member name="M:Org.BouncyCastle.X509.Extension.AuthorityKeyIdentifierStructure.#ctor(Org.BouncyCastle.Crypto.AsymmetricKeyParameter)">
  27944. Create an AuthorityKeyIdentifier using just the hash of the
  27945. public key.
  27946. @param pubKey the key to generate the hash from.
  27947. @throws InvalidKeyException if there is a problem using the key.
  27948. </member>
  27949. <member name="T:Org.BouncyCastle.X509.Extension.SubjectKeyIdentifierStructure">
  27950. A high level subject key identifier.
  27951. </member>
  27952. <member name="M:Org.BouncyCastle.X509.Extension.SubjectKeyIdentifierStructure.#ctor(Org.BouncyCastle.Asn1.Asn1OctetString)">
  27953. Constructor which will take the byte[] returned from getExtensionValue()
  27954. @param encodedValue a DER octet encoded string with the extension structure in it.
  27955. @throws IOException on parsing errors.
  27956. </member>
  27957. <member name="T:Org.BouncyCastle.X509.IX509AttributeCertificate">
  27958. <remarks>Interface for an X.509 Attribute Certificate.</remarks>
  27959. </member>
  27960. <member name="P:Org.BouncyCastle.X509.IX509AttributeCertificate.Version">
  27961. <summary>The version number for the certificate.</summary>
  27962. </member>
  27963. <member name="P:Org.BouncyCastle.X509.IX509AttributeCertificate.SerialNumber">
  27964. <summary>The serial number for the certificate.</summary>
  27965. </member>
  27966. <member name="P:Org.BouncyCastle.X509.IX509AttributeCertificate.NotBefore">
  27967. <summary>The UTC DateTime before which the certificate is not valid.</summary>
  27968. </member>
  27969. <member name="P:Org.BouncyCastle.X509.IX509AttributeCertificate.NotAfter">
  27970. <summary>The UTC DateTime after which the certificate is not valid.</summary>
  27971. </member>
  27972. <member name="P:Org.BouncyCastle.X509.IX509AttributeCertificate.Holder">
  27973. <summary>The holder of the certificate.</summary>
  27974. </member>
  27975. <member name="P:Org.BouncyCastle.X509.IX509AttributeCertificate.Issuer">
  27976. <summary>The issuer details for the certificate.</summary>
  27977. </member>
  27978. <member name="M:Org.BouncyCastle.X509.IX509AttributeCertificate.GetAttributes">
  27979. <summary>Return the attributes contained in the attribute block in the certificate.</summary>
  27980. <returns>An array of attributes.</returns>
  27981. </member>
  27982. <member name="M:Org.BouncyCastle.X509.IX509AttributeCertificate.GetAttributes(System.String)">
  27983. <summary>Return the attributes with the same type as the passed in oid.</summary>
  27984. <param name="oid">The object identifier we wish to match.</param>
  27985. <returns>An array of matched attributes, null if there is no match.</returns>
  27986. </member>
  27987. <member name="M:Org.BouncyCastle.X509.IX509AttributeCertificate.GetEncoded">
  27988. <summary>Return an ASN.1 encoded byte array representing the attribute certificate.</summary>
  27989. <returns>An ASN.1 encoded byte array.</returns>
  27990. <exception cref="T:System.IO.IOException">If the certificate cannot be encoded.</exception>
  27991. </member>
  27992. <member name="M:Org.BouncyCastle.X509.IX509Extension.GetCriticalExtensionOids">
  27993. <summary>
  27994. Get all critical extension values, by oid
  27995. </summary>
  27996. <returns>IDictionary with string (OID) keys and Asn1OctetString values</returns>
  27997. </member>
  27998. <member name="M:Org.BouncyCastle.X509.IX509Extension.GetNonCriticalExtensionOids">
  27999. <summary>
  28000. Get all non-critical extension values, by oid
  28001. </summary>
  28002. <returns>IDictionary with string (OID) keys and Asn1OctetString values</returns>
  28003. </member>
  28004. <member name="T:Org.BouncyCastle.X509.PrincipalUtilities">
  28005. <remarks>
  28006. A utility class that will extract X509Principal objects from X.509 certificates.
  28007. <p>
  28008. Use this in preference to trying to recreate a principal from a string, not all
  28009. DNs are what they should be, so it's best to leave them encoded where they
  28010. can be.</p>
  28011. </remarks>
  28012. </member>
  28013. <member name="M:Org.BouncyCastle.X509.PrincipalUtilities.GetIssuerX509Principal(Org.BouncyCastle.X509.X509Certificate)">
  28014. <summary>Return the issuer of the given cert as an X509Principal.</summary>
  28015. </member>
  28016. <member name="M:Org.BouncyCastle.X509.PrincipalUtilities.GetSubjectX509Principal(Org.BouncyCastle.X509.X509Certificate)">
  28017. <summary>Return the subject of the given cert as an X509Principal.</summary>
  28018. </member>
  28019. <member name="M:Org.BouncyCastle.X509.PrincipalUtilities.GetIssuerX509Principal(Org.BouncyCastle.X509.X509Crl)">
  28020. <summary>Return the issuer of the given CRL as an X509Principal.</summary>
  28021. </member>
  28022. <member name="T:Org.BouncyCastle.X509.Store.X509AttrCertStoreSelector">
  28023. This class is an <code>Selector</code> like implementation to select
  28024. attribute certificates from a given set of criteria.
  28025. @see org.bouncycastle.x509.X509AttributeCertificate
  28026. @see org.bouncycastle.x509.X509Store
  28027. </member>
  28028. <member name="M:Org.BouncyCastle.X509.Store.X509AttrCertStoreSelector.Match(System.Object)">
  28029. <summary>
  28030. Decides if the given attribute certificate should be selected.
  28031. </summary>
  28032. <param name="obj">The attribute certificate to be checked.</param>
  28033. <returns><code>true</code> if the object matches this selector.</returns>
  28034. </member>
  28035. <member name="P:Org.BouncyCastle.X509.Store.X509AttrCertStoreSelector.AttributeCert">
  28036. <summary>The attribute certificate which must be matched.</summary>
  28037. <remarks>If <c>null</c> is given, any will do.</remarks>
  28038. </member>
  28039. <member name="P:Org.BouncyCastle.X509.Store.X509AttrCertStoreSelector.AttributeCertificateValid">
  28040. <summary>The criteria for validity</summary>
  28041. <remarks>If <c>null</c> is given any will do.</remarks>
  28042. </member>
  28043. <member name="P:Org.BouncyCastle.X509.Store.X509AttrCertStoreSelector.Holder">
  28044. <summary>The holder.</summary>
  28045. <remarks>If <c>null</c> is given any will do.</remarks>
  28046. </member>
  28047. <member name="P:Org.BouncyCastle.X509.Store.X509AttrCertStoreSelector.Issuer">
  28048. <summary>The issuer.</summary>
  28049. <remarks>If <c>null</c> is given any will do.</remarks>
  28050. </member>
  28051. <member name="P:Org.BouncyCastle.X509.Store.X509AttrCertStoreSelector.SerialNumber">
  28052. <summary>The serial number.</summary>
  28053. <remarks>If <c>null</c> is given any will do.</remarks>
  28054. </member>
  28055. <member name="M:Org.BouncyCastle.X509.Store.X509AttrCertStoreSelector.AddTargetName(Org.BouncyCastle.Asn1.X509.GeneralName)">
  28056. Adds a target name criterion for the attribute certificate to the target
  28057. information extension criteria. The <code>X509AttributeCertificate</code>
  28058. must contain at least one of the specified target names.
  28059. <p>
  28060. Each attribute certificate may contain a target information extension
  28061. limiting the servers where this attribute certificate can be used. If
  28062. this extension is not present, the attribute certificate is not targeted
  28063. and may be accepted by any server.
  28064. </p>
  28065. @param name The name as a GeneralName (not <code>null</code>)
  28066. </member>
  28067. <member name="M:Org.BouncyCastle.X509.Store.X509AttrCertStoreSelector.AddTargetName(System.Byte[])">
  28068. Adds a target name criterion for the attribute certificate to the target
  28069. information extension criteria. The <code>X509AttributeCertificate</code>
  28070. must contain at least one of the specified target names.
  28071. <p>
  28072. Each attribute certificate may contain a target information extension
  28073. limiting the servers where this attribute certificate can be used. If
  28074. this extension is not present, the attribute certificate is not targeted
  28075. and may be accepted by any server.
  28076. </p>
  28077. @param name a byte array containing the name in ASN.1 DER encoded form of a GeneralName
  28078. @throws IOException if a parsing error occurs.
  28079. </member>
  28080. <member name="M:Org.BouncyCastle.X509.Store.X509AttrCertStoreSelector.SetTargetNames(System.Collections.IEnumerable)">
  28081. Adds a collection with target names criteria. If <code>null</code> is
  28082. given any will do.
  28083. <p>
  28084. The collection consists of either GeneralName objects or byte[] arrays representing
  28085. DER encoded GeneralName structures.
  28086. </p>
  28087. @param names A collection of target names.
  28088. @throws IOException if a parsing error occurs.
  28089. @see #AddTargetName(byte[])
  28090. @see #AddTargetName(GeneralName)
  28091. </member>
  28092. <member name="M:Org.BouncyCastle.X509.Store.X509AttrCertStoreSelector.GetTargetNames">
  28093. Gets the target names. The collection consists of <code>List</code>s
  28094. made up of an <code>Integer</code> in the first entry and a DER encoded
  28095. byte array or a <code>String</code> in the second entry.
  28096. <p>The returned collection is immutable.</p>
  28097. @return The collection of target names
  28098. @see #setTargetNames(Collection)
  28099. </member>
  28100. <member name="M:Org.BouncyCastle.X509.Store.X509AttrCertStoreSelector.AddTargetGroup(Org.BouncyCastle.Asn1.X509.GeneralName)">
  28101. Adds a target group criterion for the attribute certificate to the target
  28102. information extension criteria. The <code>X509AttributeCertificate</code>
  28103. must contain at least one of the specified target groups.
  28104. <p>
  28105. Each attribute certificate may contain a target information extension
  28106. limiting the servers where this attribute certificate can be used. If
  28107. this extension is not present, the attribute certificate is not targeted
  28108. and may be accepted by any server.
  28109. </p>
  28110. @param group The group as GeneralName form (not <code>null</code>)
  28111. </member>
  28112. <member name="M:Org.BouncyCastle.X509.Store.X509AttrCertStoreSelector.AddTargetGroup(System.Byte[])">
  28113. Adds a target group criterion for the attribute certificate to the target
  28114. information extension criteria. The <code>X509AttributeCertificate</code>
  28115. must contain at least one of the specified target groups.
  28116. <p>
  28117. Each attribute certificate may contain a target information extension
  28118. limiting the servers where this attribute certificate can be used. If
  28119. this extension is not present, the attribute certificate is not targeted
  28120. and may be accepted by any server.
  28121. </p>
  28122. @param name a byte array containing the group in ASN.1 DER encoded form of a GeneralName
  28123. @throws IOException if a parsing error occurs.
  28124. </member>
  28125. <member name="M:Org.BouncyCastle.X509.Store.X509AttrCertStoreSelector.SetTargetGroups(System.Collections.IEnumerable)">
  28126. Adds a collection with target groups criteria. If <code>null</code> is
  28127. given any will do.
  28128. <p>
  28129. The collection consists of <code>GeneralName</code> objects or <code>byte[]</code>
  28130. representing DER encoded GeneralNames.
  28131. </p>
  28132. @param names A collection of target groups.
  28133. @throws IOException if a parsing error occurs.
  28134. @see #AddTargetGroup(byte[])
  28135. @see #AddTargetGroup(GeneralName)
  28136. </member>
  28137. <member name="M:Org.BouncyCastle.X509.Store.X509AttrCertStoreSelector.GetTargetGroups">
  28138. Gets the target groups. The collection consists of <code>List</code>s
  28139. made up of an <code>Integer</code> in the first entry and a DER encoded
  28140. byte array or a <code>String</code> in the second entry.
  28141. <p>The returned collection is immutable.</p>
  28142. @return The collection of target groups.
  28143. @see #setTargetGroups(Collection)
  28144. </member>
  28145. <member name="T:Org.BouncyCastle.X509.Store.X509CertPairStoreSelector">
  28146. <remarks>
  28147. This class is an <code>IX509Selector</code> implementation to select
  28148. certificate pairs, which are e.g. used for cross certificates. The set of
  28149. criteria is given from two <code>X509CertStoreSelector</code> objects,
  28150. each of which, if present, must match the respective component of a pair.
  28151. </remarks>
  28152. </member>
  28153. <member name="P:Org.BouncyCastle.X509.Store.X509CertPairStoreSelector.CertPair">
  28154. <summary>The certificate pair which is used for testing on equality.</summary>
  28155. </member>
  28156. <member name="P:Org.BouncyCastle.X509.Store.X509CertPairStoreSelector.ForwardSelector">
  28157. <summary>The certificate selector for the forward part.</summary>
  28158. </member>
  28159. <member name="P:Org.BouncyCastle.X509.Store.X509CertPairStoreSelector.ReverseSelector">
  28160. <summary>The certificate selector for the reverse part.</summary>
  28161. </member>
  28162. <member name="M:Org.BouncyCastle.X509.Store.X509CertPairStoreSelector.Match(System.Object)">
  28163. <summary>
  28164. Decides if the given certificate pair should be selected. If
  28165. <c>obj</c> is not a <code>X509CertificatePair</code>, this method
  28166. returns <code>false</code>.
  28167. </summary>
  28168. <param name="obj">The <code>X509CertificatePair</code> to be tested.</param>
  28169. <returns><code>true</code> if the object matches this selector.</returns>
  28170. </member>
  28171. <member name="P:Org.BouncyCastle.X509.Store.X509CertStoreSelector.Policy">
  28172. <summary>
  28173. An <code>ISet</code> of <code>DerObjectIdentifier</code> objects.
  28174. </summary>
  28175. </member>
  28176. <member name="T:Org.BouncyCastle.X509.Store.X509CollectionStore">
  28177. A simple collection backed store.
  28178. </member>
  28179. <member name="M:Org.BouncyCastle.X509.Store.X509CollectionStore.#ctor(System.Collections.ICollection)">
  28180. Basic constructor.
  28181. @param collection - initial contents for the store, this is copied.
  28182. </member>
  28183. <member name="M:Org.BouncyCastle.X509.Store.X509CollectionStore.GetMatches(Org.BouncyCastle.X509.Store.IX509Selector)">
  28184. Return the matches in the collection for the passed in selector.
  28185. @param selector the selector to match against.
  28186. @return a possibly empty collection of matching objects.
  28187. </member>
  28188. <member name="T:Org.BouncyCastle.X509.Store.X509CollectionStoreParameters">
  28189. <remarks>This class contains a collection for collection based <code>X509Store</code>s.</remarks>
  28190. </member>
  28191. <member name="M:Org.BouncyCastle.X509.Store.X509CollectionStoreParameters.#ctor(System.Collections.ICollection)">
  28192. <summary>
  28193. Constructor.
  28194. <p>
  28195. The collection is copied.
  28196. </p>
  28197. </summary>
  28198. <param name="collection">The collection containing X.509 object types.</param>
  28199. <exception cref="T:System.ArgumentNullException">If collection is null.</exception>
  28200. </member>
  28201. <member name="M:Org.BouncyCastle.X509.Store.X509CollectionStoreParameters.GetCollection">
  28202. <summary>Returns a copy of the <code>ICollection</code>.</summary>
  28203. </member>
  28204. <member name="M:Org.BouncyCastle.X509.Store.X509CollectionStoreParameters.ToString">
  28205. <summary>Returns a formatted string describing the parameters.</summary>
  28206. </member>
  28207. <member name="P:Org.BouncyCastle.X509.Store.X509CrlStoreSelector.Issuers">
  28208. <summary>
  28209. An <code>ICollection</code> of <code>X509Name</code> objects
  28210. </summary>
  28211. </member>
  28212. <member name="P:Org.BouncyCastle.X509.Store.X509CrlStoreSelector.AttrCertChecking">
  28213. The attribute certificate being checked. This is not a criterion.
  28214. Rather, it is optional information that may help a {@link X509Store} find
  28215. CRLs that would be relevant when checking revocation for the specified
  28216. attribute certificate. If <code>null</code> is specified, then no such
  28217. optional information is provided.
  28218. @param attrCert the <code>IX509AttributeCertificate</code> being checked (or
  28219. <code>null</code>)
  28220. @see #getAttrCertificateChecking()
  28221. </member>
  28222. <member name="P:Org.BouncyCastle.X509.Store.X509CrlStoreSelector.CompleteCrlEnabled">
  28223. If <code>true</code> only complete CRLs are returned. Defaults to
  28224. <code>false</code>.
  28225. @return <code>true</code> if only complete CRLs are returned.
  28226. </member>
  28227. <member name="P:Org.BouncyCastle.X509.Store.X509CrlStoreSelector.DeltaCrlIndicatorEnabled">
  28228. Returns if this selector must match CRLs with the delta CRL indicator
  28229. extension set. Defaults to <code>false</code>.
  28230. @return Returns <code>true</code> if only CRLs with the delta CRL
  28231. indicator extension are selected.
  28232. </member>
  28233. <member name="P:Org.BouncyCastle.X509.Store.X509CrlStoreSelector.IssuingDistributionPoint">
  28234. The issuing distribution point.
  28235. <p>
  28236. The issuing distribution point extension is a CRL extension which
  28237. identifies the scope and the distribution point of a CRL. The scope
  28238. contains among others information about revocation reasons contained in
  28239. the CRL. Delta CRLs and complete CRLs must have matching issuing
  28240. distribution points.</p>
  28241. <p>
  28242. The byte array is cloned to protect against subsequent modifications.</p>
  28243. <p>
  28244. You must also enable or disable this criteria with
  28245. {@link #setIssuingDistributionPointEnabled(bool)}.</p>
  28246. @param issuingDistributionPoint The issuing distribution point to set.
  28247. This is the DER encoded OCTET STRING extension value.
  28248. @see #getIssuingDistributionPoint()
  28249. </member>
  28250. <member name="P:Org.BouncyCastle.X509.Store.X509CrlStoreSelector.IssuingDistributionPointEnabled">
  28251. Whether the issuing distribution point criteria should be applied.
  28252. Defaults to <code>false</code>.
  28253. <p>
  28254. You may also set the issuing distribution point criteria if not a missing
  28255. issuing distribution point should be assumed.</p>
  28256. @return Returns if the issuing distribution point check is enabled.
  28257. </member>
  28258. <member name="P:Org.BouncyCastle.X509.Store.X509CrlStoreSelector.MaxBaseCrlNumber">
  28259. The maximum base CRL number. Defaults to <code>null</code>.
  28260. @return Returns the maximum base CRL number.
  28261. @see #setMaxBaseCRLNumber(BigInteger)
  28262. </member>
  28263. <member name="T:Org.BouncyCastle.X509.SubjectPublicKeyInfoFactory">
  28264. <summary>
  28265. A factory to produce Public Key Info Objects.
  28266. </summary>
  28267. </member>
  28268. <member name="M:Org.BouncyCastle.X509.SubjectPublicKeyInfoFactory.CreateSubjectPublicKeyInfo(Org.BouncyCastle.Crypto.AsymmetricKeyParameter)">
  28269. <summary>
  28270. Create a Subject Public Key Info object for a given public key.
  28271. </summary>
  28272. <param name="publicKey">One of ElGammalPublicKeyParameters, DSAPublicKeyParameter, DHPublicKeyParameters, RsaKeyParameters or ECPublicKeyParameters</param>
  28273. <returns>A subject public key info object.</returns>
  28274. <exception cref="T:System.Exception">Throw exception if object provided is not one of the above.</exception>
  28275. </member>
  28276. <member name="M:Org.BouncyCastle.X509.X509AttrCertParser.ReadAttrCert(System.Byte[])">
  28277. <summary>
  28278. Create loading data from byte array.
  28279. </summary>
  28280. <param name="input"></param>
  28281. </member>
  28282. <member name="M:Org.BouncyCastle.X509.X509AttrCertParser.ReadAttrCerts(System.Byte[])">
  28283. <summary>
  28284. Create loading data from byte array.
  28285. </summary>
  28286. <param name="input"></param>
  28287. </member>
  28288. <member name="M:Org.BouncyCastle.X509.X509AttrCertParser.ReadAttrCert(System.IO.Stream)">
  28289. Generates a certificate object and initializes it with the data
  28290. read from the input stream inStream.
  28291. </member>
  28292. <member name="M:Org.BouncyCastle.X509.X509AttrCertParser.ReadAttrCerts(System.IO.Stream)">
  28293. Returns a (possibly empty) collection view of the certificates
  28294. read from the given input stream inStream.
  28295. </member>
  28296. <member name="T:Org.BouncyCastle.X509.X509Attribute">
  28297. Class for carrying the values in an X.509 Attribute.
  28298. </member>
  28299. <member name="M:Org.BouncyCastle.X509.X509Attribute.#ctor(Org.BouncyCastle.Asn1.Asn1Encodable)">
  28300. @param at an object representing an attribute.
  28301. </member>
  28302. <member name="M:Org.BouncyCastle.X509.X509Attribute.#ctor(System.String,Org.BouncyCastle.Asn1.Asn1Encodable)">
  28303. Create an X.509 Attribute with the type given by the passed in oid and
  28304. the value represented by an ASN.1 Set containing value.
  28305. @param oid type of the attribute
  28306. @param value value object to go into the atribute's value set.
  28307. </member>
  28308. <member name="M:Org.BouncyCastle.X509.X509Attribute.#ctor(System.String,Org.BouncyCastle.Asn1.Asn1EncodableVector)">
  28309. Create an X.59 Attribute with the type given by the passed in oid and the
  28310. value represented by an ASN.1 Set containing the objects in value.
  28311. @param oid type of the attribute
  28312. @param value vector of values to go in the attribute's value set.
  28313. </member>
  28314. <member name="T:Org.BouncyCastle.X509.X509Certificate">
  28315. <summary>
  28316. An Object representing an X509 Certificate.
  28317. Has static methods for loading Certificates encoded in many forms that return X509Certificate Objects.
  28318. </summary>
  28319. </member>
  28320. <member name="P:Org.BouncyCastle.X509.X509Certificate.IsValidNow">
  28321. <summary>
  28322. Return true if the current time is within the start and end times nominated on the certificate.
  28323. </summary>
  28324. <returns>true id certificate is valid for the current time.</returns>
  28325. </member>
  28326. <member name="M:Org.BouncyCastle.X509.X509Certificate.IsValid(System.DateTime)">
  28327. <summary>
  28328. Return true if the nominated time is within the start and end times nominated on the certificate.
  28329. </summary>
  28330. <param name="time">The time to test validity against.</param>
  28331. <returns>True if certificate is valid for nominated time.</returns>
  28332. </member>
  28333. <member name="M:Org.BouncyCastle.X509.X509Certificate.CheckValidity">
  28334. <summary>
  28335. Checks if the current date is within certificate's validity period.
  28336. </summary>
  28337. </member>
  28338. <member name="M:Org.BouncyCastle.X509.X509Certificate.CheckValidity(System.DateTime)">
  28339. <summary>
  28340. Checks if the given date is within certificate's validity period.
  28341. </summary>
  28342. <exception cref="T:Org.BouncyCastle.Security.Certificates.CertificateExpiredException">if the certificate is expired by given date</exception>
  28343. <exception cref="T:Org.BouncyCastle.Security.Certificates.CertificateNotYetValidException">if the certificate is not yet valid on given date</exception>
  28344. </member>
  28345. <member name="P:Org.BouncyCastle.X509.X509Certificate.Version">
  28346. <summary>
  28347. Return the certificate's version.
  28348. </summary>
  28349. <returns>An integer whose value Equals the version of the cerficate.</returns>
  28350. </member>
  28351. <member name="P:Org.BouncyCastle.X509.X509Certificate.SerialNumber">
  28352. <summary>
  28353. Return a <see cref="T:Org.BouncyCastle.Math.BigInteger">BigInteger</see> containing the serial number.
  28354. </summary>
  28355. <returns>The Serial number.</returns>
  28356. </member>
  28357. <member name="P:Org.BouncyCastle.X509.X509Certificate.IssuerDN">
  28358. <summary>
  28359. Get the Issuer Distinguished Name. (Who signed the certificate.)
  28360. </summary>
  28361. <returns>And X509Object containing name and value pairs.</returns>
  28362. </member>
  28363. <member name="P:Org.BouncyCastle.X509.X509Certificate.SubjectDN">
  28364. <summary>
  28365. Get the subject of this certificate.
  28366. </summary>
  28367. <returns>An X509Name object containing name and value pairs.</returns>
  28368. </member>
  28369. <member name="P:Org.BouncyCastle.X509.X509Certificate.NotBefore">
  28370. <summary>
  28371. The time that this certificate is valid from.
  28372. </summary>
  28373. <returns>A DateTime object representing that time in the local time zone.</returns>
  28374. </member>
  28375. <member name="P:Org.BouncyCastle.X509.X509Certificate.NotAfter">
  28376. <summary>
  28377. The time that this certificate is valid up to.
  28378. </summary>
  28379. <returns>A DateTime object representing that time in the local time zone.</returns>
  28380. </member>
  28381. <member name="M:Org.BouncyCastle.X509.X509Certificate.GetTbsCertificate">
  28382. <summary>
  28383. Return the Der encoded TbsCertificate data.
  28384. This is the certificate component less the signature.
  28385. To Get the whole certificate call the GetEncoded() member.
  28386. </summary>
  28387. <returns>A byte array containing the Der encoded Certificate component.</returns>
  28388. </member>
  28389. <member name="M:Org.BouncyCastle.X509.X509Certificate.GetSignature">
  28390. <summary>
  28391. The signature.
  28392. </summary>
  28393. <returns>A byte array containg the signature of the certificate.</returns>
  28394. </member>
  28395. <member name="P:Org.BouncyCastle.X509.X509Certificate.SigAlgName">
  28396. <summary>
  28397. A meaningful version of the Signature Algorithm. (EG SHA1WITHRSA)
  28398. </summary>
  28399. <returns>A sting representing the signature algorithm.</returns>
  28400. </member>
  28401. <member name="P:Org.BouncyCastle.X509.X509Certificate.SigAlgOid">
  28402. <summary>
  28403. Get the Signature Algorithms Object ID.
  28404. </summary>
  28405. <returns>A string containg a '.' separated object id.</returns>
  28406. </member>
  28407. <member name="M:Org.BouncyCastle.X509.X509Certificate.GetSigAlgParams">
  28408. <summary>
  28409. Get the signature algorithms parameters. (EG DSA Parameters)
  28410. </summary>
  28411. <returns>A byte array containing the Der encoded version of the parameters or null if there are none.</returns>
  28412. </member>
  28413. <member name="P:Org.BouncyCastle.X509.X509Certificate.IssuerUniqueID">
  28414. <summary>
  28415. Get the issuers UID.
  28416. </summary>
  28417. <returns>A DerBitString.</returns>
  28418. </member>
  28419. <member name="P:Org.BouncyCastle.X509.X509Certificate.SubjectUniqueID">
  28420. <summary>
  28421. Get the subjects UID.
  28422. </summary>
  28423. <returns>A DerBitString.</returns>
  28424. </member>
  28425. <member name="M:Org.BouncyCastle.X509.X509Certificate.GetKeyUsage">
  28426. <summary>
  28427. Get a key usage guidlines.
  28428. </summary>
  28429. </member>
  28430. <member name="M:Org.BouncyCastle.X509.X509Certificate.GetPublicKey">
  28431. <summary>
  28432. Get the public key of the subject of the certificate.
  28433. </summary>
  28434. <returns>The public key parameters.</returns>
  28435. </member>
  28436. <member name="M:Org.BouncyCastle.X509.X509Certificate.GetEncoded">
  28437. <summary>
  28438. Return the DER encoding of this certificate.
  28439. </summary>
  28440. <returns>A byte array containing the DER encoding of this certificate.</returns>
  28441. <exception cref="T:Org.BouncyCastle.Security.Certificates.CertificateEncodingException">If there is an error encoding the certificate.</exception>
  28442. </member>
  28443. <member name="M:Org.BouncyCastle.X509.X509Certificate.Verify(Org.BouncyCastle.Crypto.AsymmetricKeyParameter)">
  28444. <summary>
  28445. Verify the certificate's signature using the nominated public key.
  28446. </summary>
  28447. <param name="key">An appropriate public key parameter object, RsaPublicKeyParameters, DsaPublicKeyParameters or ECDsaPublicKeyParameters</param>
  28448. <returns>True if the signature is valid.</returns>
  28449. <exception cref="T:System.Exception">If key submitted is not of the above nominated types.</exception>
  28450. </member>
  28451. <member name="M:Org.BouncyCastle.X509.X509Certificate.Verify(Org.BouncyCastle.Crypto.IVerifierFactoryProvider)">
  28452. <summary>
  28453. Verify the certificate's signature using a verifier created using the passed in verifier provider.
  28454. </summary>
  28455. <param name="verifierProvider">An appropriate provider for verifying the certificate's signature.</param>
  28456. <returns>True if the signature is valid.</returns>
  28457. <exception cref="T:System.Exception">If verifier provider is not appropriate or the certificate algorithm is invalid.</exception>
  28458. </member>
  28459. <member name="T:Org.BouncyCastle.X509.X509CertificatePair">
  28460. <remarks>
  28461. This class contains a cross certificate pair. Cross certificates pairs may
  28462. contain two cross signed certificates from two CAs. A certificate from the
  28463. other CA to this CA is contained in the forward certificate, the certificate
  28464. from this CA to the other CA is contained in the reverse certificate.
  28465. </remarks>
  28466. </member>
  28467. <member name="M:Org.BouncyCastle.X509.X509CertificatePair.#ctor(Org.BouncyCastle.X509.X509Certificate,Org.BouncyCastle.X509.X509Certificate)">
  28468. <summary>Constructor</summary>
  28469. <param name="forward">Certificate from the other CA to this CA.</param>
  28470. <param name="reverse">Certificate from this CA to the other CA.</param>
  28471. </member>
  28472. <member name="M:Org.BouncyCastle.X509.X509CertificatePair.#ctor(Org.BouncyCastle.Asn1.X509.CertificatePair)">
  28473. <summary>Constructor from a ASN.1 CertificatePair structure.</summary>
  28474. <param name="pair">The <c>CertificatePair</c> ASN.1 object.</param>
  28475. </member>
  28476. <member name="P:Org.BouncyCastle.X509.X509CertificatePair.Forward">
  28477. <summary>Returns the certificate from the other CA to this CA.</summary>
  28478. </member>
  28479. <member name="P:Org.BouncyCastle.X509.X509CertificatePair.Reverse">
  28480. <summary>Returns the certificate from this CA to the other CA.</summary>
  28481. </member>
  28482. <member name="T:Org.BouncyCastle.X509.X509CertificateParser">
  28483. class for dealing with X509 certificates.
  28484. <p>
  28485. At the moment this will deal with "-----BEGIN CERTIFICATE-----" to "-----END CERTIFICATE-----"
  28486. base 64 encoded certs, as well as the BER binaries of certificates and some classes of PKCS#7
  28487. objects.</p>
  28488. </member>
  28489. <member name="M:Org.BouncyCastle.X509.X509CertificateParser.ReadCertificate(System.Byte[])">
  28490. <summary>
  28491. Create loading data from byte array.
  28492. </summary>
  28493. <param name="input"></param>
  28494. </member>
  28495. <member name="M:Org.BouncyCastle.X509.X509CertificateParser.ReadCertificates(System.Byte[])">
  28496. <summary>
  28497. Create loading data from byte array.
  28498. </summary>
  28499. <param name="input"></param>
  28500. </member>
  28501. <member name="M:Org.BouncyCastle.X509.X509CertificateParser.ReadCertificate(System.IO.Stream)">
  28502. Generates a certificate object and initializes it with the data
  28503. read from the input stream inStream.
  28504. </member>
  28505. <member name="M:Org.BouncyCastle.X509.X509CertificateParser.ReadCertificates(System.IO.Stream)">
  28506. Returns a (possibly empty) collection view of the certificates
  28507. read from the given input stream inStream.
  28508. </member>
  28509. <member name="M:Org.BouncyCastle.X509.X509CertPairParser.ReadCertPair(System.Byte[])">
  28510. <summary>
  28511. Create loading data from byte array.
  28512. </summary>
  28513. <param name="input"></param>
  28514. </member>
  28515. <member name="M:Org.BouncyCastle.X509.X509CertPairParser.ReadCertPairs(System.Byte[])">
  28516. <summary>
  28517. Create loading data from byte array.
  28518. </summary>
  28519. <param name="input"></param>
  28520. </member>
  28521. <member name="T:Org.BouncyCastle.X509.X509Crl">
  28522. The following extensions are listed in RFC 2459 as relevant to CRLs
  28523. Authority Key Identifier
  28524. Issuer Alternative Name
  28525. CRL Number
  28526. Delta CRL Indicator (critical)
  28527. Issuing Distribution Point (critical)
  28528. </member>
  28529. <member name="M:Org.BouncyCastle.X509.X509Crl.Verify(Org.BouncyCastle.Crypto.IVerifierFactoryProvider)">
  28530. <summary>
  28531. Verify the CRL's signature using a verifier created using the passed in verifier provider.
  28532. </summary>
  28533. <param name="verifierProvider">An appropriate provider for verifying the CRL's signature.</param>
  28534. <returns>True if the signature is valid.</returns>
  28535. <exception cref="T:System.Exception">If verifier provider is not appropriate or the CRL algorithm is invalid.</exception>
  28536. </member>
  28537. <member name="M:Org.BouncyCastle.X509.X509Crl.GetEncoded">
  28538. <summary>
  28539. Return the DER encoding of this CRL.
  28540. </summary>
  28541. <returns>A byte array containing the DER encoding of this CRL.</returns>
  28542. <exception cref="T:Org.BouncyCastle.Security.Certificates.CrlException">If there is an error encoding the CRL.</exception>
  28543. </member>
  28544. <member name="M:Org.BouncyCastle.X509.X509Crl.ToString">
  28545. Returns a string representation of this CRL.
  28546. @return a string representation of this CRL.
  28547. </member>
  28548. <member name="M:Org.BouncyCastle.X509.X509Crl.IsRevoked(Org.BouncyCastle.X509.X509Certificate)">
  28549. Checks whether the given certificate is on this CRL.
  28550. @param cert the certificate to check for.
  28551. @return true if the given certificate is on this CRL,
  28552. false otherwise.
  28553. </member>
  28554. <member name="T:Org.BouncyCastle.X509.X509CrlEntry">
  28555. The following extensions are listed in RFC 2459 as relevant to CRL Entries
  28556. ReasonCode Hode Instruction Code Invalidity Date Certificate Issuer
  28557. (critical)
  28558. </member>
  28559. <member name="M:Org.BouncyCastle.X509.X509CrlEntry.#ctor(Org.BouncyCastle.Asn1.X509.CrlEntry,System.Boolean,Org.BouncyCastle.Asn1.X509.X509Name)">
  28560. Constructor for CRLEntries of indirect CRLs. If <code>isIndirect</code>
  28561. is <code>false</code> {@link #getCertificateIssuer()} will always
  28562. return <code>null</code>, <code>previousCertificateIssuer</code> is
  28563. ignored. If this <code>isIndirect</code> is specified and this CrlEntry
  28564. has no certificate issuer CRL entry extension
  28565. <code>previousCertificateIssuer</code> is returned by
  28566. {@link #getCertificateIssuer()}.
  28567. @param c
  28568. TbsCertificateList.CrlEntry object.
  28569. @param isIndirect
  28570. <code>true</code> if the corresponding CRL is a indirect
  28571. CRL.
  28572. @param previousCertificateIssuer
  28573. Certificate issuer of the previous CrlEntry.
  28574. </member>
  28575. <member name="M:Org.BouncyCastle.X509.X509CrlParser.ReadCrl(System.Byte[])">
  28576. <summary>
  28577. Create loading data from byte array.
  28578. </summary>
  28579. <param name="input"></param>
  28580. </member>
  28581. <member name="M:Org.BouncyCastle.X509.X509CrlParser.ReadCrls(System.Byte[])">
  28582. <summary>
  28583. Create loading data from byte array.
  28584. </summary>
  28585. <param name="input"></param>
  28586. </member>
  28587. <member name="M:Org.BouncyCastle.X509.X509CrlParser.ReadCrl(System.IO.Stream)">
  28588. Generates a certificate revocation list (CRL) object and initializes
  28589. it with the data read from the input stream inStream.
  28590. </member>
  28591. <member name="M:Org.BouncyCastle.X509.X509CrlParser.ReadCrls(System.IO.Stream)">
  28592. Returns a (possibly empty) collection view of the CRLs read from
  28593. the given input stream inStream.
  28594. The inStream may contain a sequence of DER-encoded CRLs, or
  28595. a PKCS#7 CRL set. This is a PKCS#7 SignedData object, with the
  28596. only significant field being crls. In particular the signature
  28597. and the contents are ignored.
  28598. </member>
  28599. <member name="M:Org.BouncyCastle.X509.X509ExtensionBase.GetNonCriticalExtensionOids">
  28600. <summary>
  28601. Get non critical extensions.
  28602. </summary>
  28603. <returns>A set of non critical extension oids.</returns>
  28604. </member>
  28605. <member name="M:Org.BouncyCastle.X509.X509ExtensionBase.GetCriticalExtensionOids">
  28606. <summary>
  28607. Get any critical extensions.
  28608. </summary>
  28609. <returns>A sorted list of critical entension.</returns>
  28610. </member>
  28611. <member name="M:Org.BouncyCastle.X509.X509ExtensionBase.GetExtensionValue(System.String)">
  28612. <summary>
  28613. Get the value of a given extension.
  28614. </summary>
  28615. <param name="oid">The object ID of the extension. </param>
  28616. <returns>An Asn1OctetString object if that extension is found or null if not.</returns>
  28617. </member>
  28618. <member name="T:Org.BouncyCastle.X509.X509KeyUsage">
  28619. A holding class for constructing an X509 Key Usage extension.
  28620. <pre>
  28621. id-ce-keyUsage OBJECT IDENTIFIER ::= { id-ce 15 }
  28622. KeyUsage ::= BIT STRING {
  28623. digitalSignature (0),
  28624. nonRepudiation (1),
  28625. keyEncipherment (2),
  28626. dataEncipherment (3),
  28627. keyAgreement (4),
  28628. keyCertSign (5),
  28629. cRLSign (6),
  28630. encipherOnly (7),
  28631. decipherOnly (8) }
  28632. </pre>
  28633. </member>
  28634. <member name="M:Org.BouncyCastle.X509.X509KeyUsage.#ctor(System.Int32)">
  28635. Basic constructor.
  28636. @param usage - the bitwise OR of the Key Usage flags giving the
  28637. allowed uses for the key.
  28638. e.g. (X509KeyUsage.keyEncipherment | X509KeyUsage.dataEncipherment)
  28639. </member>
  28640. <member name="M:Org.BouncyCastle.X509.X509SignatureUtilities.GetDigestAlgName(Org.BouncyCastle.Asn1.DerObjectIdentifier)">
  28641. Return the digest algorithm using one of the standard JCA string
  28642. representations rather than the algorithm identifier (if possible).
  28643. </member>
  28644. <member name="T:Org.BouncyCastle.X509.X509V1CertificateGenerator">
  28645. <summary>
  28646. Class to Generate X509V1 Certificates.
  28647. </summary>
  28648. </member>
  28649. <member name="M:Org.BouncyCastle.X509.X509V1CertificateGenerator.#ctor">
  28650. <summary>
  28651. Default Constructor.
  28652. </summary>
  28653. </member>
  28654. <member name="M:Org.BouncyCastle.X509.X509V1CertificateGenerator.Reset">
  28655. <summary>
  28656. Reset the generator.
  28657. </summary>
  28658. </member>
  28659. <member name="M:Org.BouncyCastle.X509.X509V1CertificateGenerator.SetSerialNumber(Org.BouncyCastle.Math.BigInteger)">
  28660. <summary>
  28661. Set the certificate's serial number.
  28662. </summary>
  28663. <remarks>Make serial numbers long, if you have no serial number policy make sure the number is at least 16 bytes of secure random data.
  28664. You will be surprised how ugly a serial number collision can get.</remarks>
  28665. <param name="serialNumber">The serial number.</param>
  28666. </member>
  28667. <member name="M:Org.BouncyCastle.X509.X509V1CertificateGenerator.SetIssuerDN(Org.BouncyCastle.Asn1.X509.X509Name)">
  28668. <summary>
  28669. Set the issuer distinguished name.
  28670. The issuer is the entity whose private key is used to sign the certificate.
  28671. </summary>
  28672. <param name="issuer">The issuers DN.</param>
  28673. </member>
  28674. <member name="M:Org.BouncyCastle.X509.X509V1CertificateGenerator.SetNotBefore(System.DateTime)">
  28675. <summary>
  28676. Set the date that this certificate is to be valid from.
  28677. </summary>
  28678. <param name="date"/>
  28679. </member>
  28680. <member name="M:Org.BouncyCastle.X509.X509V1CertificateGenerator.SetNotAfter(System.DateTime)">
  28681. <summary>
  28682. Set the date after which this certificate will no longer be valid.
  28683. </summary>
  28684. <param name="date"/>
  28685. </member>
  28686. <member name="M:Org.BouncyCastle.X509.X509V1CertificateGenerator.SetSubjectDN(Org.BouncyCastle.Asn1.X509.X509Name)">
  28687. <summary>
  28688. Set the subject distinguished name.
  28689. The subject describes the entity associated with the public key.
  28690. </summary>
  28691. <param name="subject"/>
  28692. </member>
  28693. <member name="M:Org.BouncyCastle.X509.X509V1CertificateGenerator.SetPublicKey(Org.BouncyCastle.Crypto.AsymmetricKeyParameter)">
  28694. <summary>
  28695. Set the public key that this certificate identifies.
  28696. </summary>
  28697. <param name="publicKey"/>
  28698. </member>
  28699. <member name="M:Org.BouncyCastle.X509.X509V1CertificateGenerator.SetSignatureAlgorithm(System.String)">
  28700. <summary>
  28701. Set the signature algorithm that will be used to sign this certificate.
  28702. This can be either a name or an OID, names are treated as case insensitive.
  28703. </summary>
  28704. <param name="signatureAlgorithm">string representation of the algorithm name</param>
  28705. </member>
  28706. <member name="M:Org.BouncyCastle.X509.X509V1CertificateGenerator.Generate(Org.BouncyCastle.Crypto.AsymmetricKeyParameter)">
  28707. <summary>
  28708. Generate a new X509Certificate.
  28709. </summary>
  28710. <param name="privateKey">The private key of the issuer used to sign this certificate.</param>
  28711. <returns>An X509Certificate.</returns>
  28712. </member>
  28713. <member name="M:Org.BouncyCastle.X509.X509V1CertificateGenerator.Generate(Org.BouncyCastle.Crypto.AsymmetricKeyParameter,Org.BouncyCastle.Security.SecureRandom)">
  28714. <summary>
  28715. Generate a new X509Certificate specifying a SecureRandom instance that you would like to use.
  28716. </summary>
  28717. <param name="privateKey">The private key of the issuer used to sign this certificate.</param>
  28718. <param name="random">The Secure Random you want to use.</param>
  28719. <returns>An X509Certificate.</returns>
  28720. </member>
  28721. <member name="M:Org.BouncyCastle.X509.X509V1CertificateGenerator.Generate(Org.BouncyCastle.Crypto.ISignatureFactory)">
  28722. <summary>
  28723. Generate a new X509Certificate using the passed in SignatureCalculator.
  28724. </summary>
  28725. <param name="signatureCalculatorFactory">A signature calculator factory with the necessary algorithm details.</param>
  28726. <returns>An X509Certificate.</returns>
  28727. </member>
  28728. <member name="P:Org.BouncyCastle.X509.X509V1CertificateGenerator.SignatureAlgNames">
  28729. <summary>
  28730. Allows enumeration of the signature names supported by the generator.
  28731. </summary>
  28732. </member>
  28733. <member name="T:Org.BouncyCastle.X509.X509V2AttributeCertificate">
  28734. <summary>An implementation of a version 2 X.509 Attribute Certificate.</summary>
  28735. </member>
  28736. <member name="M:Org.BouncyCastle.X509.X509V2AttributeCertificate.Verify(Org.BouncyCastle.Crypto.IVerifierFactoryProvider)">
  28737. <summary>
  28738. Verify the certificate's signature using a verifier created using the passed in verifier provider.
  28739. </summary>
  28740. <param name="verifierProvider">An appropriate provider for verifying the certificate's signature.</param>
  28741. <returns>True if the signature is valid.</returns>
  28742. <exception cref="T:System.Exception">If verifier provider is not appropriate or the certificate algorithm is invalid.</exception>
  28743. </member>
  28744. <member name="T:Org.BouncyCastle.X509.X509V2AttributeCertificateGenerator">
  28745. <remarks>Class to produce an X.509 Version 2 AttributeCertificate.</remarks>
  28746. </member>
  28747. <member name="M:Org.BouncyCastle.X509.X509V2AttributeCertificateGenerator.Reset">
  28748. <summary>Reset the generator</summary>
  28749. </member>
  28750. <member name="M:Org.BouncyCastle.X509.X509V2AttributeCertificateGenerator.SetHolder(Org.BouncyCastle.X509.AttributeCertificateHolder)">
  28751. <summary>Set the Holder of this Attribute Certificate.</summary>
  28752. </member>
  28753. <member name="M:Org.BouncyCastle.X509.X509V2AttributeCertificateGenerator.SetIssuer(Org.BouncyCastle.X509.AttributeCertificateIssuer)">
  28754. <summary>Set the issuer.</summary>
  28755. </member>
  28756. <member name="M:Org.BouncyCastle.X509.X509V2AttributeCertificateGenerator.SetSerialNumber(Org.BouncyCastle.Math.BigInteger)">
  28757. <summary>Set the serial number for the certificate.</summary>
  28758. </member>
  28759. <member name="M:Org.BouncyCastle.X509.X509V2AttributeCertificateGenerator.SetSignatureAlgorithm(System.String)">
  28760. <summary>
  28761. Set the signature algorithm. This can be either a name or an OID, names
  28762. are treated as case insensitive.
  28763. </summary>
  28764. <param name="signatureAlgorithm">The algorithm name.</param>
  28765. </member>
  28766. <member name="M:Org.BouncyCastle.X509.X509V2AttributeCertificateGenerator.AddAttribute(Org.BouncyCastle.X509.X509Attribute)">
  28767. <summary>Add an attribute.</summary>
  28768. </member>
  28769. <member name="M:Org.BouncyCastle.X509.X509V2AttributeCertificateGenerator.AddExtension(System.String,System.Boolean,Org.BouncyCastle.Asn1.Asn1Encodable)">
  28770. <summary>Add a given extension field for the standard extensions tag.</summary>
  28771. </member>
  28772. <member name="M:Org.BouncyCastle.X509.X509V2AttributeCertificateGenerator.AddExtension(System.String,System.Boolean,System.Byte[])">
  28773. <summary>
  28774. Add a given extension field for the standard extensions tag.
  28775. The value parameter becomes the contents of the octet string associated
  28776. with the extension.
  28777. </summary>
  28778. </member>
  28779. <member name="M:Org.BouncyCastle.X509.X509V2AttributeCertificateGenerator.Generate(Org.BouncyCastle.Crypto.AsymmetricKeyParameter)">
  28780. <summary>
  28781. Generate an X509 certificate, based on the current issuer and subject.
  28782. </summary>
  28783. </member>
  28784. <member name="M:Org.BouncyCastle.X509.X509V2AttributeCertificateGenerator.Generate(Org.BouncyCastle.Crypto.AsymmetricKeyParameter,Org.BouncyCastle.Security.SecureRandom)">
  28785. <summary>
  28786. Generate an X509 certificate, based on the current issuer and subject,
  28787. using the supplied source of randomness, if required.
  28788. </summary>
  28789. </member>
  28790. <member name="M:Org.BouncyCastle.X509.X509V2AttributeCertificateGenerator.Generate(Org.BouncyCastle.Crypto.ISignatureFactory)">
  28791. <summary>
  28792. Generate a new X.509 Attribute Certificate using the passed in SignatureCalculator.
  28793. </summary>
  28794. <param name="signatureCalculatorFactory">A signature calculator factory with the necessary algorithm details.</param>
  28795. <returns>An IX509AttributeCertificate.</returns>
  28796. </member>
  28797. <member name="P:Org.BouncyCastle.X509.X509V2AttributeCertificateGenerator.SignatureAlgNames">
  28798. <summary>
  28799. Allows enumeration of the signature names supported by the generator.
  28800. </summary>
  28801. </member>
  28802. <member name="T:Org.BouncyCastle.X509.X509V2CrlGenerator">
  28803. class to produce an X.509 Version 2 CRL.
  28804. </member>
  28805. <member name="M:Org.BouncyCastle.X509.X509V2CrlGenerator.Reset">
  28806. reset the generator
  28807. </member>
  28808. <member name="M:Org.BouncyCastle.X509.X509V2CrlGenerator.SetIssuerDN(Org.BouncyCastle.Asn1.X509.X509Name)">
  28809. Set the issuer distinguished name - the issuer is the entity whose private key is used to sign the
  28810. certificate.
  28811. </member>
  28812. <member name="M:Org.BouncyCastle.X509.X509V2CrlGenerator.AddCrlEntry(Org.BouncyCastle.Math.BigInteger,System.DateTime,System.Int32)">
  28813. Reason being as indicated by CrlReason, i.e. CrlReason.KeyCompromise
  28814. or 0 if CrlReason is not to be used
  28815. </member>
  28816. <member name="M:Org.BouncyCastle.X509.X509V2CrlGenerator.AddCrlEntry(Org.BouncyCastle.Math.BigInteger,System.DateTime,System.Int32,System.DateTime)">
  28817. Add a CRL entry with an Invalidity Date extension as well as a CrlReason extension.
  28818. Reason being as indicated by CrlReason, i.e. CrlReason.KeyCompromise
  28819. or 0 if CrlReason is not to be used
  28820. </member>
  28821. <member name="M:Org.BouncyCastle.X509.X509V2CrlGenerator.AddCrlEntry(Org.BouncyCastle.Math.BigInteger,System.DateTime,Org.BouncyCastle.Asn1.X509.X509Extensions)">
  28822. Add a CRL entry with extensions.
  28823. </member>
  28824. <member name="M:Org.BouncyCastle.X509.X509V2CrlGenerator.AddCrl(Org.BouncyCastle.X509.X509Crl)">
  28825. Add the CRLEntry objects contained in a previous CRL.
  28826. @param other the X509Crl to source the other entries from.
  28827. </member>
  28828. <member name="M:Org.BouncyCastle.X509.X509V2CrlGenerator.SetSignatureAlgorithm(System.String)">
  28829. <summary>
  28830. Set the signature algorithm that will be used to sign this CRL.
  28831. </summary>
  28832. <param name="signatureAlgorithm"/>
  28833. </member>
  28834. <member name="M:Org.BouncyCastle.X509.X509V2CrlGenerator.AddExtension(System.String,System.Boolean,Org.BouncyCastle.Asn1.Asn1Encodable)">
  28835. add a given extension field for the standard extensions tag (tag 0)
  28836. </member>
  28837. <member name="M:Org.BouncyCastle.X509.X509V2CrlGenerator.AddExtension(Org.BouncyCastle.Asn1.DerObjectIdentifier,System.Boolean,Org.BouncyCastle.Asn1.Asn1Encodable)">
  28838. add a given extension field for the standard extensions tag (tag 0)
  28839. </member>
  28840. <member name="M:Org.BouncyCastle.X509.X509V2CrlGenerator.AddExtension(System.String,System.Boolean,System.Byte[])">
  28841. add a given extension field for the standard extensions tag (tag 0)
  28842. </member>
  28843. <member name="M:Org.BouncyCastle.X509.X509V2CrlGenerator.AddExtension(Org.BouncyCastle.Asn1.DerObjectIdentifier,System.Boolean,System.Byte[])">
  28844. add a given extension field for the standard extensions tag (tag 0)
  28845. </member>
  28846. <member name="M:Org.BouncyCastle.X509.X509V2CrlGenerator.Generate(Org.BouncyCastle.Crypto.AsymmetricKeyParameter)">
  28847. <summary>
  28848. Generate an X.509 CRL, based on the current issuer and subject.
  28849. </summary>
  28850. <param name="privateKey">The private key of the issuer that is signing this certificate.</param>
  28851. <returns>An X509Crl.</returns>
  28852. </member>
  28853. <member name="M:Org.BouncyCastle.X509.X509V2CrlGenerator.Generate(Org.BouncyCastle.Crypto.AsymmetricKeyParameter,Org.BouncyCastle.Security.SecureRandom)">
  28854. <summary>
  28855. Generate an X.509 CRL, based on the current issuer and subject using the specified secure random.
  28856. </summary>
  28857. <param name="privateKey">The private key of the issuer that is signing this certificate.</param>
  28858. <param name="random">Your Secure Random instance.</param>
  28859. <returns>An X509Crl.</returns>
  28860. </member>
  28861. <member name="M:Org.BouncyCastle.X509.X509V2CrlGenerator.Generate(Org.BouncyCastle.Crypto.ISignatureFactory)">
  28862. <summary>
  28863. Generate a new X509Crl using the passed in SignatureCalculator.
  28864. </summary>
  28865. <param name="signatureCalculatorFactory">A signature calculator factory with the necessary algorithm details.</param>
  28866. <returns>An X509Crl.</returns>
  28867. </member>
  28868. <member name="P:Org.BouncyCastle.X509.X509V2CrlGenerator.SignatureAlgNames">
  28869. <summary>
  28870. Allows enumeration of the signature names supported by the generator.
  28871. </summary>
  28872. </member>
  28873. <member name="T:Org.BouncyCastle.X509.X509V3CertificateGenerator">
  28874. <summary>
  28875. A class to Generate Version 3 X509Certificates.
  28876. </summary>
  28877. </member>
  28878. <member name="M:Org.BouncyCastle.X509.X509V3CertificateGenerator.Reset">
  28879. <summary>
  28880. Reset the Generator.
  28881. </summary>
  28882. </member>
  28883. <member name="M:Org.BouncyCastle.X509.X509V3CertificateGenerator.SetSerialNumber(Org.BouncyCastle.Math.BigInteger)">
  28884. <summary>
  28885. Set the certificate's serial number.
  28886. </summary>
  28887. <remarks>Make serial numbers long, if you have no serial number policy make sure the number is at least 16 bytes of secure random data.
  28888. You will be surprised how ugly a serial number collision can Get.</remarks>
  28889. <param name="serialNumber">The serial number.</param>
  28890. </member>
  28891. <member name="M:Org.BouncyCastle.X509.X509V3CertificateGenerator.SetIssuerDN(Org.BouncyCastle.Asn1.X509.X509Name)">
  28892. <summary>
  28893. Set the distinguished name of the issuer.
  28894. The issuer is the entity which is signing the certificate.
  28895. </summary>
  28896. <param name="issuer">The issuer's DN.</param>
  28897. </member>
  28898. <member name="M:Org.BouncyCastle.X509.X509V3CertificateGenerator.SetNotBefore(System.DateTime)">
  28899. <summary>
  28900. Set the date that this certificate is to be valid from.
  28901. </summary>
  28902. <param name="date"/>
  28903. </member>
  28904. <member name="M:Org.BouncyCastle.X509.X509V3CertificateGenerator.SetNotAfter(System.DateTime)">
  28905. <summary>
  28906. Set the date after which this certificate will no longer be valid.
  28907. </summary>
  28908. <param name="date"/>
  28909. </member>
  28910. <member name="M:Org.BouncyCastle.X509.X509V3CertificateGenerator.SetSubjectDN(Org.BouncyCastle.Asn1.X509.X509Name)">
  28911. <summary>
  28912. Set the DN of the entity that this certificate is about.
  28913. </summary>
  28914. <param name="subject"/>
  28915. </member>
  28916. <member name="M:Org.BouncyCastle.X509.X509V3CertificateGenerator.SetPublicKey(Org.BouncyCastle.Crypto.AsymmetricKeyParameter)">
  28917. <summary>
  28918. Set the public key that this certificate identifies.
  28919. </summary>
  28920. <param name="publicKey"/>
  28921. </member>
  28922. <member name="M:Org.BouncyCastle.X509.X509V3CertificateGenerator.SetSignatureAlgorithm(System.String)">
  28923. <summary>
  28924. Set the signature algorithm that will be used to sign this certificate.
  28925. </summary>
  28926. <param name="signatureAlgorithm"/>
  28927. </member>
  28928. <member name="M:Org.BouncyCastle.X509.X509V3CertificateGenerator.SetSubjectUniqueID(System.Boolean[])">
  28929. <summary>
  28930. Set the subject unique ID - note: it is very rare that it is correct to do this.
  28931. </summary>
  28932. <param name="uniqueID"/>
  28933. </member>
  28934. <member name="M:Org.BouncyCastle.X509.X509V3CertificateGenerator.SetIssuerUniqueID(System.Boolean[])">
  28935. <summary>
  28936. Set the issuer unique ID - note: it is very rare that it is correct to do this.
  28937. </summary>
  28938. <param name="uniqueID"/>
  28939. </member>
  28940. <member name="M:Org.BouncyCastle.X509.X509V3CertificateGenerator.AddExtension(System.String,System.Boolean,Org.BouncyCastle.Asn1.Asn1Encodable)">
  28941. <summary>
  28942. Add a given extension field for the standard extensions tag (tag 3).
  28943. </summary>
  28944. <param name="oid">string containing a dotted decimal Object Identifier.</param>
  28945. <param name="critical">Is it critical.</param>
  28946. <param name="extensionValue">The value.</param>
  28947. </member>
  28948. <member name="M:Org.BouncyCastle.X509.X509V3CertificateGenerator.AddExtension(Org.BouncyCastle.Asn1.DerObjectIdentifier,System.Boolean,Org.BouncyCastle.Asn1.Asn1Encodable)">
  28949. <summary>
  28950. Add an extension to this certificate.
  28951. </summary>
  28952. <param name="oid">Its Object Identifier.</param>
  28953. <param name="critical">Is it critical.</param>
  28954. <param name="extensionValue">The value.</param>
  28955. </member>
  28956. <member name="M:Org.BouncyCastle.X509.X509V3CertificateGenerator.AddExtension(System.String,System.Boolean,System.Byte[])">
  28957. <summary>
  28958. Add an extension using a string with a dotted decimal OID.
  28959. </summary>
  28960. <param name="oid">string containing a dotted decimal Object Identifier.</param>
  28961. <param name="critical">Is it critical.</param>
  28962. <param name="extensionValue">byte[] containing the value of this extension.</param>
  28963. </member>
  28964. <member name="M:Org.BouncyCastle.X509.X509V3CertificateGenerator.AddExtension(Org.BouncyCastle.Asn1.DerObjectIdentifier,System.Boolean,System.Byte[])">
  28965. <summary>
  28966. Add an extension to this certificate.
  28967. </summary>
  28968. <param name="oid">Its Object Identifier.</param>
  28969. <param name="critical">Is it critical.</param>
  28970. <param name="extensionValue">byte[] containing the value of this extension.</param>
  28971. </member>
  28972. <member name="M:Org.BouncyCastle.X509.X509V3CertificateGenerator.CopyAndAddExtension(System.String,System.Boolean,Org.BouncyCastle.X509.X509Certificate)">
  28973. <summary>
  28974. Add a given extension field for the standard extensions tag (tag 3),
  28975. copying the extension value from another certificate.
  28976. </summary>
  28977. </member>
  28978. <member name="M:Org.BouncyCastle.X509.X509V3CertificateGenerator.CopyAndAddExtension(Org.BouncyCastle.Asn1.DerObjectIdentifier,System.Boolean,Org.BouncyCastle.X509.X509Certificate)">
  28979. add a given extension field for the standard extensions tag (tag 3)
  28980. copying the extension value from another certificate.
  28981. @throws CertificateParsingException if the extension cannot be extracted.
  28982. </member>
  28983. <member name="M:Org.BouncyCastle.X509.X509V3CertificateGenerator.Generate(Org.BouncyCastle.Crypto.AsymmetricKeyParameter)">
  28984. <summary>
  28985. Generate an X509Certificate.
  28986. </summary>
  28987. <param name="privateKey">The private key of the issuer that is signing this certificate.</param>
  28988. <returns>An X509Certificate.</returns>
  28989. </member>
  28990. <member name="M:Org.BouncyCastle.X509.X509V3CertificateGenerator.Generate(Org.BouncyCastle.Crypto.AsymmetricKeyParameter,Org.BouncyCastle.Security.SecureRandom)">
  28991. <summary>
  28992. Generate an X509Certificate using your own SecureRandom.
  28993. </summary>
  28994. <param name="privateKey">The private key of the issuer that is signing this certificate.</param>
  28995. <param name="random">You Secure Random instance.</param>
  28996. <returns>An X509Certificate.</returns>
  28997. </member>
  28998. <member name="M:Org.BouncyCastle.X509.X509V3CertificateGenerator.Generate(Org.BouncyCastle.Crypto.ISignatureFactory)">
  28999. <summary>
  29000. Generate a new X509Certificate using the passed in SignatureCalculator.
  29001. </summary>
  29002. <param name="signatureCalculatorFactory">A signature calculator factory with the necessary algorithm details.</param>
  29003. <returns>An X509Certificate.</returns>
  29004. </member>
  29005. <member name="P:Org.BouncyCastle.X509.X509V3CertificateGenerator.SignatureAlgNames">
  29006. <summary>
  29007. Allows enumeration of the signature names supported by the generator.
  29008. </summary>
  29009. </member>
  29010. <member name="T:Org.BouncyCastle.Apache.Bzip2.BZip2Constants">
  29011. Base class for both the compress and decompress classes.
  29012. Holds common arrays, and static data.
  29013. @author <a href="mailto:keiron@aftexsw.com">Keiron Liddle</a>
  29014. </member>
  29015. <member name="T:Org.BouncyCastle.Apache.Bzip2.CBZip2InputStream">
  29016. An input stream that decompresses from the BZip2 format (with the file
  29017. header chars) to be read as any other stream.
  29018. @author <a href="mailto:keiron@aftexsw.com">Keiron Liddle</a>
  29019. <b>NB:</b> note this class has been modified to read the leading BZ from the
  29020. start of the BZIP2 stream to make it compatible with other PGP programs.
  29021. </member>
  29022. <member name="T:Org.BouncyCastle.Apache.Bzip2.CBZip2OutputStream">
  29023. An output stream that compresses into the BZip2 format (with the file
  29024. header chars) into another stream.
  29025. @author <a href="mailto:keiron@aftexsw.com">Keiron Liddle</a>
  29026. TODO: Update to BZip2 1.0.1
  29027. <b>NB:</b> note this class has been modified to add a leading BZ to the
  29028. start of the BZIP2 stream to make it compatible with other PGP programs.
  29029. </member>
  29030. <member name="M:Org.BouncyCastle.Apache.Bzip2.CBZip2OutputStream.WriteByte(System.Byte)">
  29031. modified by Oliver Merkel, 010128
  29032. </member>
  29033. <member name="T:Org.BouncyCastle.Apache.Bzip2.CRC">
  29034. A simple class the hold and calculate the CRC for sanity checking
  29035. of the data.
  29036. @author <a href="mailto:keiron@aftexsw.com">Keiron Liddle</a>
  29037. </member>
  29038. <member name="M:crypto.Security.ComputeHash(System.String,System.String)">
  29039. <summary>
  29040. Return a salted hash based on PBKDF2 for the UTF-8 encoding of the argument text.
  29041. </summary>
  29042. <param name="text">Provided key text</param>
  29043. <param name="salt">Base64 encoded string representing the salt</param>
  29044. <returns></returns>
  29045. </member>
  29046. </members>
  29047. </doc>