123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711 |
- <?xml version="1.0"?>
- <doc>
- <assembly>
- <name>System.Security.Cryptography.Pkcs</name>
- </assembly>
- <members>
- <member name="M:System.Security.Cryptography.Pkcs.EnvelopedCms.Decode(System.ReadOnlySpan{System.Byte})">
- <summary>
- Decodes the provided data as a CMS/PKCS#7 EnvelopedData message.
- </summary>
- <param name="encodedMessage">
- The data to decode.
- </param>
- <exception cref="T:System.Security.Cryptography.CryptographicException">
- The <paramref name="encodedMessage"/> parameter was not successfully decoded.
- </exception>
- </member>
- <member name="P:System.Security.Cryptography.Pkcs.CmsSigner.SignaturePadding">
- <summary>
- Gets or sets the RSA signature padding to use.
- </summary>
- <value>The RSA signature padding to use.</value>
- </member>
- <member name="M:System.Security.Cryptography.Pkcs.CmsSigner.#ctor(System.Security.Cryptography.Pkcs.SubjectIdentifierType,System.Security.Cryptography.X509Certificates.X509Certificate2,System.Security.Cryptography.RSA,System.Security.Cryptography.RSASignaturePadding)">
- <summary>
- Initializes a new instance of the CmsSigner class with a specified signer
- certificate, subject identifier type, private key object, and RSA signature padding.
- </summary>
- <param name="signerIdentifierType">
- One of the enumeration values that specifies the scheme to use for identifying
- which signing certificate was used.
- </param>
- <param name="certificate">
- The certificate whose private key will be used to sign a message.
- </param>
- <param name="privateKey">
- The private key object to use when signing the message.
- </param>
- <param name="signaturePadding">
- The RSA signature padding to use.
- </param>
- </member>
- <member name="M:System.Security.Cryptography.Pkcs.Pkcs12CertBag.#ctor(System.Security.Cryptography.Oid,System.ReadOnlyMemory{System.Byte})">
- <summary>
- Create a CertBag for a specified certificate type and encoding.
- </summary>
- <param name="certificateType">The identifier for the certificate type</param>
- <param name="encodedCertificate">The encoded value</param>
- <remarks>
- No validation is done to ensure that the <paramref name="encodedCertificate"/> value is
- correct for the indicated <paramref name="certificateType"/>. Note that for X.509
- public-key certificates the correct encoding for a CertBag value is to wrap the
- DER-encoded certificate in an OCTET STRING.
- </remarks>
- </member>
- <member name="M:System.Security.Cryptography.Pkcs.Rfc3161TimestampRequest.CreateFromHash(System.ReadOnlyMemory{System.Byte},System.Security.Cryptography.Oid,System.Security.Cryptography.Oid,System.Nullable{System.ReadOnlyMemory{System.Byte}},System.Boolean,System.Security.Cryptography.X509Certificates.X509ExtensionCollection)">
- <summary>
- Create a timestamp request using a pre-computed hash value.
- </summary>
- <param name="hash">The pre-computed hash value to be timestamped.</param>
- <param name="hashAlgorithmId">
- The Object Identifier (OID) for the hash algorithm which produced <paramref name="hash"/>.
- </param>
- <param name="requestedPolicyId">
- The Object Identifier (OID) for a timestamp policy the Timestamp Authority (TSA) should use,
- or <c>null</c> to express no preference.
- </param>
- <param name="nonce">
- An optional nonce (number used once) to uniquely identify this request to pair it with the response.
- The value is interpreted as an unsigned big-endian integer and may be normalized to the encoding format.
- </param>
- <param name="requestSignerCertificates">
- Indicates whether the Timestamp Authority (TSA) must (<c>true</c>) or must not (<c>false</c>) include
- the signing certificate in the issued timestamp token.
- </param>
- <param name="extensions">RFC3161 extensions to present with the request.</param>
- <returns>
- An <see cref="T:System.Security.Cryptography.Pkcs.Rfc3161TimestampRequest"/> representing the chosen values.
- </returns>
- <seealso cref="M:System.Security.Cryptography.Pkcs.Rfc3161TimestampRequest.Encode"/>
- <seealso cref="M:System.Security.Cryptography.Pkcs.Rfc3161TimestampRequest.TryEncode(System.Span{System.Byte},System.Int32@)"/>
- </member>
- <member name="M:System.Security.Cryptography.Pkcs.Rfc3161TimestampToken.AsSignedCms">
- <summary>
- Get a SignedCms representation of the RFC3161 Timestamp Token.
- </summary>
- <returns>The SignedCms representation of the RFC3161 Timestamp Token.</returns>
- <remarks>
- Successive calls to this method return the same object.
- The SignedCms class is mutable, but changes to that object are not reflected in the
- <see cref="T:System.Security.Cryptography.Pkcs.Rfc3161TimestampToken"/> object which produced it.
- The value from calling <see cref="M:System.Security.Cryptography.Pkcs.SignedCms.Encode"/> can be interpreted again as an
- <see cref="T:System.Security.Cryptography.Pkcs.Rfc3161TimestampToken"/> via another call to <see cref="M:System.Security.Cryptography.Pkcs.Rfc3161TimestampToken.TryDecode(System.ReadOnlyMemory{System.Byte},System.Security.Cryptography.Pkcs.Rfc3161TimestampToken@,System.Int32@)"/>.
- </remarks>
- </member>
- <member name="T:System.Security.Cryptography.Pkcs.Rfc3161TimestampTokenInfo">
- <summary>
- Represents the timestamp token information class defined in RFC3161 as TSTInfo.
- </summary>
- </member>
- <member name="M:System.Security.Cryptography.Pkcs.Rfc3161TimestampTokenInfo.#ctor(System.Security.Cryptography.Oid,System.Security.Cryptography.Oid,System.ReadOnlyMemory{System.Byte},System.ReadOnlyMemory{System.Byte},System.DateTimeOffset,System.Nullable{System.Int64},System.Boolean,System.Nullable{System.ReadOnlyMemory{System.Byte}},System.Nullable{System.ReadOnlyMemory{System.Byte}},System.Security.Cryptography.X509Certificates.X509ExtensionCollection)">
- <summary>
- Initializes a new instance of the <see cref="T:System.Security.Cryptography.Pkcs.Rfc3161TimestampTokenInfo" /> class with the specified parameters.
- </summary>
- <param name="policyId">An OID representing the TSA's policy under which the response was produced.</param>
- <param name="hashAlgorithmId">A hash algorithm OID of the data to be timestamped.</param>
- <param name="messageHash">A hash value of the data to be timestamped.</param>
- <param name="serialNumber">An integer assigned by the TSA to the <see cref="T:System.Security.Cryptography.Pkcs.Rfc3161TimestampTokenInfo"/>.</param>
- <param name="timestamp">The timestamp encoded in the token.</param>
- <param name="accuracyInMicroseconds">The accuracy with which <paramref name="timestamp"/> is compared. Also see <paramref name="isOrdering"/>.</param>
- <param name="isOrdering"><see langword="true" /> to ensure that every timestamp token from the same TSA can always be ordered based on the <paramref name="timestamp"/>, regardless of the accuracy; <see langword="false" /> to make <paramref name="timestamp"/> indicate when token has been created by the TSA.</param>
- <param name="nonce">The nonce associated with this timestamp token. Using a nonce always allows to detect replays, and hence its use is recommended.</param>
- <param name="timestampAuthorityName">The hint in the TSA name identification. The actual identification of the entity that signed the response will always occur through the use of the certificate identifier.</param>
- <param name="extensions">The extension values associated with the timestamp.</param>
- <remarks>If <paramref name="hashAlgorithmId" />, <paramref name="messageHash" />, <paramref name="policyId" /> or <paramref name="nonce" /> are present in the <see cref="T:System.Security.Cryptography.Pkcs.Rfc3161TimestampRequest"/>, then the same value should be used. If <paramref name="accuracyInMicroseconds"/> is not provided, then the accuracy may be available through other means such as i.e. <paramref name="policyId" />.</remarks>
- <exception cref="T:System.Security.Cryptography.CryptographicException">ASN.1 corrupted data.</exception>
- </member>
- <member name="P:System.Security.Cryptography.Pkcs.Rfc3161TimestampTokenInfo.Version">
- <summary>
- Gets the version of the timestamp token.
- </summary>
- <value>The version of the timestamp token.</value>
- </member>
- <member name="P:System.Security.Cryptography.Pkcs.Rfc3161TimestampTokenInfo.PolicyId">
- <summary>
- Gets an OID representing the TSA's policy under which the response was produced.
- </summary>
- <value>An OID representing the TSA's policy under which the response was produced.</value>
- </member>
- <member name="P:System.Security.Cryptography.Pkcs.Rfc3161TimestampTokenInfo.HashAlgorithmId">
- <summary>
- Gets an OID of the hash algorithm.
- </summary>
- <value>An OID of the hash algorithm.</value>
- </member>
- <member name="M:System.Security.Cryptography.Pkcs.Rfc3161TimestampTokenInfo.GetMessageHash">
- <summary>
- Gets the data representing the message hash.
- </summary>
- <returns>The data representing the message hash.</returns>
- </member>
- <member name="M:System.Security.Cryptography.Pkcs.Rfc3161TimestampTokenInfo.GetSerialNumber">
- <summary>
- Gets an integer assigned by the TSA to the <see cref="T:System.Security.Cryptography.Pkcs.Rfc3161TimestampTokenInfo"/>.
- </summary>
- <returns>An integer assigned by the TSA to the <see cref="T:System.Security.Cryptography.Pkcs.Rfc3161TimestampTokenInfo"/>.</returns>
- </member>
- <member name="P:System.Security.Cryptography.Pkcs.Rfc3161TimestampTokenInfo.Timestamp">
- <summary>
- Gets the timestamp encoded in the token.
- </summary>
- <value>The timestamp encoded in the token.</value>
- </member>
- <member name="P:System.Security.Cryptography.Pkcs.Rfc3161TimestampTokenInfo.AccuracyInMicroseconds">
- <summary>
- Gets the accuracy with which <see cref="P:System.Security.Cryptography.Pkcs.Rfc3161TimestampTokenInfo.Timestamp"/> is compared.
- </summary>
- <seealso cref="P:System.Security.Cryptography.Pkcs.Rfc3161TimestampTokenInfo.IsOrdering" />
- <value>The accuracy with which <see cref="P:System.Security.Cryptography.Pkcs.Rfc3161TimestampTokenInfo.Timestamp"/> is compared.</value>
- </member>
- <member name="P:System.Security.Cryptography.Pkcs.Rfc3161TimestampTokenInfo.IsOrdering">
- <summary>
- Gets a value indicating if every timestamp token from the same TSA can always be ordered based on the <see cref="P:System.Security.Cryptography.Pkcs.Rfc3161TimestampTokenInfo.Timestamp"/>, regardless of the accuracy; If <see langword="false" />, <see cref="P:System.Security.Cryptography.Pkcs.Rfc3161TimestampTokenInfo.Timestamp"/> indicates when the token has been created by the TSA.
- </summary>
- <value>A value indicating if every timestamp token from the same TSA can always be ordered based on the <see cref="P:System.Security.Cryptography.Pkcs.Rfc3161TimestampTokenInfo.Timestamp"/>.</value>
- </member>
- <member name="M:System.Security.Cryptography.Pkcs.Rfc3161TimestampTokenInfo.GetNonce">
- <summary>
- Gets the nonce associated with this timestamp token.
- </summary>
- <returns>The nonce associated with this timestamp token.</returns>
- </member>
- <member name="P:System.Security.Cryptography.Pkcs.Rfc3161TimestampTokenInfo.HasExtensions">
- <summary>
- Gets a value indicating whether there are any extensions associated with this timestamp token.
- </summary>
- <value>A value indicating whether there are any extensions associated with this timestamp token.</value>
- </member>
- <member name="M:System.Security.Cryptography.Pkcs.Rfc3161TimestampTokenInfo.GetTimestampAuthorityName">
- <summary>
- Gets the data representing the hint in the TSA name identification.
- </summary>
- <returns>The data representing the hint in the TSA name identification.</returns>
- <remarks>
- The actual identification of the entity that signed the response
- will always occur through the use of the certificate identifier (ESSCertID Attribute)
- inside a SigningCertificate attribute which is part of the signer info.
- </remarks>
- </member>
- <member name="M:System.Security.Cryptography.Pkcs.Rfc3161TimestampTokenInfo.GetExtensions">
- <summary>
- Gets the extension values associated with the timestamp.
- </summary>
- <returns>The extension values associated with the timestamp.</returns>
- </member>
- <member name="M:System.Security.Cryptography.Pkcs.Rfc3161TimestampTokenInfo.Encode">
- <summary>
- Encodes this object into a TSTInfo value
- </summary>
- <returns>The encoded TSTInfo value.</returns>
- </member>
- <member name="M:System.Security.Cryptography.Pkcs.Rfc3161TimestampTokenInfo.TryEncode(System.Span{System.Byte},System.Int32@)">
- <summary>
- Attempts to encode this object as a TSTInfo value, writing the result into the provided buffer.
- </summary>
- <param name="destination">The destination buffer.</param>
- <param name="bytesWritten">When this method returns <see langword="true" />, contains the bytes written to the <paramref name="destination" /> buffer.</param>
- <returns><see langword="true" /> if the operation succeeded; <see langword="false" /> if the buffer size was insufficient.</returns>
- </member>
- <member name="M:System.Security.Cryptography.Pkcs.Rfc3161TimestampTokenInfo.TryDecode(System.ReadOnlyMemory{System.Byte},System.Security.Cryptography.Pkcs.Rfc3161TimestampTokenInfo@,System.Int32@)">
- <summary>
- Decodes an encoded TSTInfo value.
- </summary>
- <param name="encodedBytes">The input or source buffer.</param>
- <param name="timestampTokenInfo">When this method returns <see langword="true" />, the decoded data. When this method returns <see langword="false" />, the value is <see langword="null" />, meaning the data could not be decoded.</param>
- <param name="bytesConsumed">The number of bytes used for decoding.</param>
- <returns><see langword="true" /> if the operation succeeded; <see langword="false" /> otherwise.</returns>
- </member>
- <member name="T:System.Security.Cryptography.SafeHashHandle">
- <summary>
- SafeHandle representing HCRYPTHASH handle
- </summary>
- </member>
- <member name="T:System.Security.Cryptography.SafeCapiKeyHandle">
- <summary>
- Safe handle representing a HCRYPTKEY
- </summary>
- <summary>
- Since we need to delete the key handle before the provider is released we need to actually hold a
- pointer to a CRYPT_KEY_CTX unmanaged structure whose destructor decrements a refCount. Only when
- the provider refCount is 0 it is deleted. This way, we loose a race in the critical finalization
- of the key handle and provider handle. This also applies to hash handles, which point to a
- CRYPT_HASH_CTX. Those structures are defined in COMCryptography.h
- </summary>
- </member>
- <member name="T:System.Security.Cryptography.SafeProvHandle">
- <summary>
- Safehandle representing HCRYPTPROV
- </summary>
- </member>
- <member name="P:System.HexConverter.CharToHexLookup">
- <summary>Map from an ASCII char to its hex value, e.g. arr['b'] == 11. 0xFF means it's not a hex digit.</summary>
- </member>
- <member name="P:System.SR.Arg_EmptyOrNullString_Named">
- <summary>The `{0}` string cannot be empty or null.</summary>
- </member>
- <member name="P:System.SR.Arg_RankMultiDimNotSupported">
- <summary>Only single dimensional arrays are supported for the requested action.</summary>
- </member>
- <member name="P:System.SR.Argument_EncodeDestinationTooSmall">
- <summary>The destination is too small to hold the encoded value.</summary>
- </member>
- <member name="P:System.SR.Argument_InvalidOffLen">
- <summary>Offset and length were out of bounds for the array or count is greater than the number of elements from index to the end of the source collection.</summary>
- </member>
- <member name="P:System.SR.Argument_InvalidOidValue">
- <summary>The OID value was invalid.</summary>
- </member>
- <member name="P:System.SR.Argument_InvalidValue">
- <summary>Value was invalid.</summary>
- </member>
- <member name="P:System.SR.Argument_InvalidRsaSignaturePadding">
- <summary>The RSA padding must be Pkcs1 or Pss.</summary>
- </member>
- <member name="P:System.SR.ArgumentOutOfRange_IndexMustBeLess">
- <summary>Index was out of range. Must be non-negative and less than the size of the collection.</summary>
- </member>
- <member name="P:System.SR.ArgumentOutOfRange_IndexMustBeLessOrEqual">
- <summary>Index was out of range. Must be non-negative and less than or equal to the size of the collection.</summary>
- </member>
- <member name="P:System.SR.ArgumentOutOfRange_NeedPosNum">
- <summary>Positive number required.</summary>
- </member>
- <member name="P:System.SR.Cryptography_AlgKdfRequiresChars">
- <summary>The KDF for algorithm '{0}' requires a char-based password input.</summary>
- </member>
- <member name="P:System.SR.Cryptography_BadHashValue">
- <summary>The hash value is not correct.</summary>
- </member>
- <member name="P:System.SR.Cryptography_BadSignature">
- <summary>Invalid signature.</summary>
- </member>
- <member name="P:System.SR.Cryptography_Cms_CannotDetermineSignatureAlgorithm">
- <summary>Could not determine signature algorithm for the signer certificate.</summary>
- </member>
- <member name="P:System.SR.Cryptography_Cms_IncompleteCertChain">
- <summary>The certificate chain is incomplete, the self-signed root authority could not be determined.</summary>
- </member>
- <member name="P:System.SR.Cryptography_Cms_Invalid_Originator_Identifier_Choice">
- <summary>Invalid originator identifier choice {0} found in decoded CMS.</summary>
- </member>
- <member name="P:System.SR.Cryptography_Cms_Invalid_Subject_Identifier_Type">
- <summary>The subject identifier type {0} is not valid.</summary>
- </member>
- <member name="P:System.SR.Cryptography_Cms_InvalidMessageType">
- <summary>Invalid cryptographic message type.</summary>
- </member>
- <member name="P:System.SR.Cryptography_Cms_InvalidSignerHashForSignatureAlg">
- <summary>SignerInfo digest algorithm '{0}' is not valid for signature algorithm '{1}'.</summary>
- </member>
- <member name="P:System.SR.Cryptography_Cms_Key_Agree_Date_Not_Available">
- <summary>The Date property is not available for none KID key agree recipient.</summary>
- </member>
- <member name="P:System.SR.Cryptography_Cms_MessageNotEncrypted">
- <summary>The CMS message is not encrypted.</summary>
- </member>
- <member name="P:System.SR.Cryptography_Cms_MessageNotSigned">
- <summary>The CMS message is not signed.</summary>
- </member>
- <member name="P:System.SR.Cryptography_Cms_MissingAuthenticatedAttribute">
- <summary>The cryptographic message does not contain an expected authenticated attribute.</summary>
- </member>
- <member name="P:System.SR.Cryptography_Cms_NoCounterCounterSigner">
- <summary>Only one level of counter-signatures are supported on this platform.</summary>
- </member>
- <member name="P:System.SR.Cryptography_Cms_NoRecipients">
- <summary>The recipients collection is empty. You must specify at least one recipient. This platform does not implement the certificate picker UI.</summary>
- </member>
- <member name="P:System.SR.Cryptography_Cms_NoSignerCert">
- <summary>No signer certificate was provided. This platform does not implement the certificate picker UI.</summary>
- </member>
- <member name="P:System.SR.Cryptography_Cms_NoSignerCertSilent">
- <summary>No signer certificate was provided.</summary>
- </member>
- <member name="P:System.SR.Cryptography_Cms_NoSignerAtIndex">
- <summary>The signed cryptographic message does not have a signer for the specified signer index.</summary>
- </member>
- <member name="P:System.SR.Cryptography_Cms_RecipientNotFound">
- <summary>The enveloped-data message does not contain the specified recipient.</summary>
- </member>
- <member name="P:System.SR.Cryptography_Cms_RecipientType_NotSupported">
- <summary>The recipient type '{0}' is not supported for encryption or decryption on this platform.</summary>
- </member>
- <member name="P:System.SR.Cryptography_Cms_Sign_Empty_Content">
- <summary>Cannot create CMS signature for empty content.</summary>
- </member>
- <member name="P:System.SR.Cryptography_Cms_Sign_No_Signature_First_Signer">
- <summary>CmsSigner has to be the first signer with NoSignature.</summary>
- </member>
- <member name="P:System.SR.Cryptography_Cms_SignerNotFound">
- <summary>Cannot find the original signer.</summary>
- </member>
- <member name="P:System.SR.Cryptography_Cms_Signing_RequiresPrivateKey">
- <summary>A certificate with a private key is required.</summary>
- </member>
- <member name="P:System.SR.Cryptography_Cms_Ktri_RSARequired">
- <summary>An RSA key is required to decrypt for a RecipientInfo with a KeyTransport recipient type.</summary>
- </member>
- <member name="P:System.SR.Cryptography_Cms_Recipient_RSARequired_RSAPaddingModeSupplied">
- <summary>An RSA certificate is required for a CmsRecipient when used with RSAEncryptionPadding.</summary>
- </member>
- <member name="P:System.SR.Cryptography_Cms_TrustFailure">
- <summary>Certificate trust could not be established. The first reported error is: {0}</summary>
- </member>
- <member name="P:System.SR.Cryptography_Cms_UnknownAlgorithm">
- <summary>Unknown algorithm '{0}'.</summary>
- </member>
- <member name="P:System.SR.Cryptography_Cms_UnknownKeySpec">
- <summary>Unable to determine the type of key handle from this keyspec {0}.</summary>
- </member>
- <member name="P:System.SR.Cryptography_Cms_WrongKeyUsage">
- <summary>The certificate is not valid for the requested usage.</summary>
- </member>
- <member name="P:System.SR.Cryptography_NotValidPublicOrPrivateKey">
- <summary>Key is not a valid public or private key.</summary>
- </member>
- <member name="P:System.SR.Cryptography_Pkcs12_CannotProcessEncryptedSafeContents">
- <summary>This operation is not valid on an encrypted or enveloped Pkcs12SafeContents.</summary>
- </member>
- <member name="P:System.SR.Cryptography_Pkcs12_CertBagNotX509">
- <summary>The Pkcs12CertBag contents are not an X.509 certificate.</summary>
- </member>
- <member name="P:System.SR.Cryptography_Pkcs12_PfxIsSealed">
- <summary>The Pkcs12Builder can no longer be modified because one of the Seal methods was already invoked.</summary>
- </member>
- <member name="P:System.SR.Cryptography_Pkcs12_PfxMustBeSealed">
- <summary>One of the Seal methods must be invoked on the Pkcs12Builder before invoking an Encode method.</summary>
- </member>
- <member name="P:System.SR.Cryptography_Pkcs12_SafeContentsIsEncrypted">
- <summary>Cannot enumerate the contents of an encrypted or enveloped Pkcs12SafeContents.</summary>
- </member>
- <member name="P:System.SR.Cryptography_Pkcs12_SafeContentsIsReadOnly">
- <summary>New Pkcs12SafeBag values cannot be added to a Pkcs12SafeContents that was read from existing data.</summary>
- </member>
- <member name="P:System.SR.Cryptography_Pkcs12_WrongModeForDecrypt">
- <summary>This decryption operation applies to 'Pkcs12ConfidentialityMode.{0}', but the target object is in 'Pkcs12ConfidentialityMode.{1}'.</summary>
- </member>
- <member name="P:System.SR.Cryptography_Pkcs12_WrongModeForVerify">
- <summary>This verification operation applies to 'Pkcs12IntegrityMode.{0}', but the target object is in 'Pkcs12IntegrityMode.{1}'.</summary>
- </member>
- <member name="P:System.SR.Cryptography_Pkcs_InvalidSignatureParameters">
- <summary>Invalid signature parameters.</summary>
- </member>
- <member name="P:System.SR.Cryptography_Pkcs8_EncryptedReadFailed">
- <summary>The EncryptedPrivateKeyInfo structure was decoded but was not successfully interpreted, the password may be incorrect.</summary>
- </member>
- <member name="P:System.SR.Cryptography_Pkcs9_AttributeMismatch">
- <summary>The parameter should be a PKCS 9 attribute.</summary>
- </member>
- <member name="P:System.SR.Cryptography_Pkcs9_MultipleSigningTimeNotAllowed">
- <summary>Cannot add multiple PKCS 9 signing time attributes.</summary>
- </member>
- <member name="P:System.SR.Cryptography_Pkcs_PssParametersMissing">
- <summary>PSS parameters were not present.</summary>
- </member>
- <member name="P:System.SR.Cryptography_Pkcs_PssParametersHashMismatch">
- <summary>This platform requires that the PSS hash algorithm ({0}) match the data digest algorithm ({1}).</summary>
- </member>
- <member name="P:System.SR.Cryptography_Pkcs_PssParametersMgfHashMismatch">
- <summary>This platform does not support the MGF hash algorithm ({0}) being different from the signature hash algorithm ({1}).</summary>
- </member>
- <member name="P:System.SR.Cryptography_Pkcs_PssParametersMgfNotSupported">
- <summary>Mask generation function '{0}' is not supported by this platform.</summary>
- </member>
- <member name="P:System.SR.Cryptography_Pkcs_PssParametersSaltMismatch">
- <summary>PSS salt size {0} is not supported by this platform with hash algorithm {1}.</summary>
- </member>
- <member name="P:System.SR.Cryptography_TimestampReq_BadNonce">
- <summary>The response from the timestamping server did not match the request nonce.</summary>
- </member>
- <member name="P:System.SR.Cryptography_TimestampReq_BadResponse">
- <summary>The response from the timestamping server was not understood.</summary>
- </member>
- <member name="P:System.SR.Cryptography_TimestampReq_Failure">
- <summary>The timestamping server did not grant the request. The request status is '{0}' with failure info '{1}'.</summary>
- </member>
- <member name="P:System.SR.Cryptography_TimestampReq_NoCertFound">
- <summary>The timestamping request required the TSA certificate in the response, but it was not found.</summary>
- </member>
- <member name="P:System.SR.Cryptography_TimestampReq_UnexpectedCertFound">
- <summary>The timestamping request required the TSA certificate not be included in the response, but certificates were present.</summary>
- </member>
- <member name="P:System.SR.InvalidOperation_DuplicateItemNotAllowed">
- <summary>Duplicate items are not allowed in the collection.</summary>
- </member>
- <member name="P:System.SR.InvalidOperation_WrongOidInAsnCollection">
- <summary>AsnEncodedData element in the collection has wrong Oid value: expected = '{0}', actual = '{1}'.</summary>
- </member>
- <member name="P:System.SR.PlatformNotSupported_CryptographyPkcs">
- <summary>System.Security.Cryptography.Pkcs is only supported on Windows platforms.</summary>
- </member>
- <member name="P:System.SR.Cryptography_AlgorithmNotSupported">
- <summary>Algorithm '{0}' is not supported on this platform.</summary>
- </member>
- <member name="P:System.SR.Cryptography_Der_Invalid_Encoding">
- <summary>ASN1 corrupted data.</summary>
- </member>
- <member name="P:System.SR.Cryptography_Invalid_IA5String">
- <summary>The string contains a character not in the 7 bit ASCII character set.</summary>
- </member>
- <member name="P:System.SR.Cryptography_UnknownAlgorithmIdentifier">
- <summary>The algorithm identified by '{0}' is unknown, not valid for the requested usage, or was not handled.</summary>
- </member>
- <member name="P:System.SR.Cryptography_UnknownHashAlgorithm">
- <summary>'{0}' is not a known hash algorithm.</summary>
- </member>
- <member name="P:System.SR.Cryptography_Cms_NoAttributeFound">
- <summary>Attribute not found.</summary>
- </member>
- <member name="P:System.SR.Cryptography_Cms_NoCertificateFound">
- <summary>Certificate not found.</summary>
- </member>
- <member name="P:System.SR.Cryptography_Cms_CertificateAlreadyInCollection">
- <summary>Certificate already present in the collection.</summary>
- </member>
- <member name="P:System.SR.Cryptography_Cms_InvalidSymmetricKey">
- <summary>The key in the enveloped message is not valid or could not be decoded.</summary>
- </member>
- <member name="P:System.SR.Cryptography_X509_PfxWithoutPassword_MaxAllowedIterationsExceeded">
- <summary>PKCS12 (PFX) without a supplied password has exceeded maximum allowed iterations. See https://go.microsoft.com/fwlink/?linkid=2233907 for more information.</summary>
- </member>
- <member name="P:System.SR.Cryptography_X509_PfxWithoutPassword_ProblemFound">
- <summary>There was a problem with the PKCS12 (PFX) without a supplied password. See https://go.microsoft.com/fwlink/?linkid=2233907 for more information.</summary>
- </member>
- <member name="T:System.Runtime.InteropServices.LibraryImportAttribute">
- <summary>
- Attribute used to indicate a source generator should create a function for marshalling
- arguments instead of relying on the runtime to generate an equivalent marshalling function at run-time.
- </summary>
- <remarks>
- This attribute is meaningless if the source generator associated with it is not enabled.
- The current built-in source generator only supports C# and only supplies an implementation when
- applied to static, partial, non-generic methods.
- </remarks>
- </member>
- <member name="M:System.Runtime.InteropServices.LibraryImportAttribute.#ctor(System.String)">
- <summary>
- Initializes a new instance of the <see cref="T:System.Runtime.InteropServices.LibraryImportAttribute"/>.
- </summary>
- <param name="libraryName">Name of the library containing the import.</param>
- </member>
- <member name="P:System.Runtime.InteropServices.LibraryImportAttribute.LibraryName">
- <summary>
- Gets the name of the library containing the import.
- </summary>
- </member>
- <member name="P:System.Runtime.InteropServices.LibraryImportAttribute.EntryPoint">
- <summary>
- Gets or sets the name of the entry point to be called.
- </summary>
- </member>
- <member name="P:System.Runtime.InteropServices.LibraryImportAttribute.StringMarshalling">
- <summary>
- Gets or sets how to marshal string arguments to the method.
- </summary>
- <remarks>
- If this field is set to a value other than <see cref="F:System.Runtime.InteropServices.StringMarshalling.Custom" />,
- <see cref="P:System.Runtime.InteropServices.LibraryImportAttribute.StringMarshallingCustomType" /> must not be specified.
- </remarks>
- </member>
- <member name="P:System.Runtime.InteropServices.LibraryImportAttribute.StringMarshallingCustomType">
- <summary>
- Gets or sets the <see cref="T:System.Type"/> used to control how string arguments to the method are marshalled.
- </summary>
- <remarks>
- If this field is specified, <see cref="P:System.Runtime.InteropServices.LibraryImportAttribute.StringMarshalling" /> must not be specified
- or must be set to <see cref="F:System.Runtime.InteropServices.StringMarshalling.Custom" />.
- </remarks>
- </member>
- <member name="P:System.Runtime.InteropServices.LibraryImportAttribute.SetLastError">
- <summary>
- Gets or sets whether the callee sets an error (SetLastError on Windows or errno
- on other platforms) before returning from the attributed method.
- </summary>
- </member>
- <member name="T:System.Runtime.InteropServices.StringMarshalling">
- <summary>
- Specifies how strings should be marshalled for generated p/invokes
- </summary>
- </member>
- <member name="F:System.Runtime.InteropServices.StringMarshalling.Custom">
- <summary>
- Indicates the user is suppling a specific marshaller in <see cref="P:System.Runtime.InteropServices.LibraryImportAttribute.StringMarshallingCustomType"/>.
- </summary>
- </member>
- <member name="F:System.Runtime.InteropServices.StringMarshalling.Utf8">
- <summary>
- Use the platform-provided UTF-8 marshaller.
- </summary>
- </member>
- <member name="F:System.Runtime.InteropServices.StringMarshalling.Utf16">
- <summary>
- Use the platform-provided UTF-16 marshaller.
- </summary>
- </member>
- <member name="P:Internal.Cryptography.DecryptorPal.RecipientInfos">
- <summary>
- Return the managed representation of the recipients.
-
- .NET Framework compat: Unlike the desktop, we compute this once and then latch it. Since both RecipientInfo and RecipientInfoCollection are immutable objects, this should be
- a safe optimization to make.
- </summary>
- </member>
- <member name="M:Internal.Cryptography.DecryptorPal.TryDecrypt(System.Security.Cryptography.Pkcs.RecipientInfo,System.Security.Cryptography.X509Certificates.X509Certificate2,System.Security.Cryptography.AsymmetricAlgorithm,System.Security.Cryptography.X509Certificates.X509Certificate2Collection,System.Security.Cryptography.X509Certificates.X509Certificate2Collection,System.Exception@)">
- <summary>
- Attempt to decrypt the CMS using the specified "cert". If successful, return the ContentInfo that contains the decrypted content. If unsuccessful, return null and set "exception"
- to a valid Exception object. Do not throw the exception as EnvelopedCms will want to continue decryption attempts against other recipients. Only if all the recipients fail to
- decrypt will then EnvelopedCms throw the exception from the last failed attempt.
- </summary>
- </member>
- <member name="M:Internal.Cryptography.PkcsHelpers.Resize(System.Byte[],System.Int32)">
- <summary>
- This is not just a convenience wrapper for Array.Resize(). In DEBUG builds, it forces the array to move in memory even if no resize is needed. This should be used by
- helper methods that do anything of the form "call a native api once to get the estimated size, call it again to get the data and return the data in a byte[] array."
- Sometimes, that data consist of a native data structure containing pointers to other parts of the block. Using such a helper to retrieve such a block results in an intermittent
- AV. By using this helper, you make that AV repro every time.
- </summary>
- </member>
- <member name="M:Internal.Cryptography.PkcsHelpers.TryFindMatchingCertificate(System.Security.Cryptography.X509Certificates.X509Certificate2Collection,System.Security.Cryptography.Pkcs.SubjectIdentifier)">
- <summary>
- .NET Framework compat: We do not complain about multiple matches. Just take the first one and ignore the rest.
- </summary>
- </member>
- <member name="M:Internal.Cryptography.PkcsHelpers.ToSkiBytes(System.String)">
- <summary>
- Asserts on bad or non-canonicalized input. Input must come from trusted sources.
-
- Subject Key Identifier is string-ized as an upper case hex string. This format is part of the public api behavior and cannot be changed.
- </summary>
- </member>
- <member name="M:Internal.Cryptography.PkcsHelpers.ToSerialBytes(System.String)">
- <summary>
- Asserts on bad or non-canonicalized input. Input must come from trusted sources.
-
- Serial number is string-ized as a reversed upper case hex string. This format is part of the public api behavior and cannot be changed.
- </summary>
- </member>
- <member name="M:Internal.Cryptography.PkcsHelpers.UpperHexStringToByteArray(System.String)">
- <summary>
- Asserts on bad input. Input must come from trusted sources.
- </summary>
- </member>
- <member name="M:Internal.Cryptography.PkcsHelpers.UpperHexCharToNybble(System.Char)">
- <summary>
- Asserts on bad input. Input must come from trusted sources.
- </summary>
- </member>
- <member name="M:Internal.Cryptography.PkcsHelpers.CreateBestPkcs9AttributeObjectAvailable(System.Security.Cryptography.Oid,System.ReadOnlySpan{System.Byte})">
- <summary>
- Useful helper for "upgrading" well-known CMS attributes to type-specific objects such as Pkcs9DocumentName, Pkcs9DocumentDescription, etc.
- </summary>
- </member>
- <member name="M:Internal.Cryptography.PkcsPal.Encrypt(System.Security.Cryptography.Pkcs.CmsRecipientCollection,System.Security.Cryptography.Pkcs.ContentInfo,System.Security.Cryptography.Pkcs.AlgorithmIdentifier,System.Security.Cryptography.X509Certificates.X509Certificate2Collection,System.Security.Cryptography.CryptographicAttributeObjectCollection)">
- <summary>
- Encrypt and encode a CMS. Return value is the RFC-compliant representation of the CMS that can be transmitted "on the wire."
- </summary>
- </member>
- <member name="M:Internal.Cryptography.PkcsPal.Decode(System.ReadOnlySpan{System.Byte},System.Int32@,System.Security.Cryptography.Pkcs.ContentInfo@,System.Security.Cryptography.Pkcs.AlgorithmIdentifier@,System.Security.Cryptography.X509Certificates.X509Certificate2Collection@,System.Security.Cryptography.CryptographicAttributeObjectCollection@)">
- <summary>
- Decode an encoded CMS.
- Call RecipientInfos on the returned pal object to get the recipients.
- Call TryDecrypt() on the returned pal object to attempt a decrypt for a single recipient.
- </summary>
- </member>
- <member name="M:Internal.Cryptography.PkcsPal.GetEncodedMessageType(System.ReadOnlySpan{System.Byte})">
- <summary>
- Implements the ContentInfo.GetContentType() behavior.
- </summary>
- </member>
- <member name="M:Internal.Cryptography.PkcsPal.AddCertsFromStoreForDecryption(System.Security.Cryptography.X509Certificates.X509Certificate2Collection)">
- <summary>
- EnvelopedCms.Decrypt() looks for qualifying certs from the "MY" store (as well as any "extraStore" passed to Decrypt()).
- This method encapsulates exactly what a particular OS considers to be "the MY store."
- </summary>
- </member>
- <member name="M:Internal.Cryptography.PkcsPal.CreateRecipientsNotFoundException">
- <summary>
- If EnvelopedCms.Decrypt() fails to find any matching certs for any recipients, it throws CryptographicException(CRYPT_E_RECIPIENT_NOT_FOUND) on Windows.
- This method encapsulates what other OS's decide to throw in this situation.
- </summary>
- </member>
- <member name="M:Internal.Cryptography.PkcsPal.CreateRecipientInfosAfterEncryptException">
- <summary>
- If you call RecipientInfos after an Encrypt(), the framework throws CryptographicException(CRYPT_E_INVALID_MSG_TYPE) on Windows.
- This method encapsulates what other OS's decide to throw in this situation.
- </summary>
- </member>
- <member name="M:Internal.Cryptography.PkcsPal.CreateDecryptAfterEncryptException">
- <summary>
- If you call Decrypt() after an Encrypt(), the framework throws CryptographicException(CRYPT_E_INVALID_MSG_TYPE) on Windows.
- This method encapsulates what other OS's decide to throw in this situation.
- </summary>
- </member>
- <member name="M:Internal.Cryptography.PkcsPal.CreateDecryptTwiceException">
- <summary>
- If you call Decrypt() after a Encrypt(), the framework throws CryptographicException(CRYPT_E_INVALID_MSG_TYPE) on Windows.
- This method encapsulates what other OS's decide to throw in this situation.
- </summary>
- </member>
- <member name="M:Internal.Cryptography.PkcsPal.GetSubjectKeyIdentifier(System.Security.Cryptography.X509Certificates.X509Certificate2)">
- <summary>
- Retrieve the certificate's subject key identifier value.
- </summary>
- </member>
- <member name="M:Internal.Cryptography.PkcsPal.GetPrivateKeyForSigning``1(System.Security.Cryptography.X509Certificates.X509Certificate2,System.Boolean)">
- <summary>
- Retrieve a private key object for the certificate to use with signing.
- </summary>
- </member>
- <member name="M:Internal.Cryptography.PkcsPal.GetPrivateKeyForDecryption``1(System.Security.Cryptography.X509Certificates.X509Certificate2,System.Boolean)">
- <summary>
- Retrieve a private key object for the certificate to use with decryption.
- </summary>
- </member>
- <member name="P:Internal.Cryptography.PkcsPal.Instance">
- <summary>
- Get the one instance of PkcsPal.
- </summary>
- </member>
- <member name="M:Internal.Cryptography.Pal.Windows.HelpersWindows.GetContentInfo(Microsoft.Win32.SafeHandles.SafeCryptMsgHandle)">
- <summary>
- Returns the inner content of the CMS.
-
- Special case: If the CMS is an enveloped CMS that has been decrypted and the inner content type is Oids.Pkcs7Data, the returned
- content bytes are the decoded octet bytes, rather than the encoding of those bytes. This is a documented convenience behavior of
- CryptMsgGetParam(CMSG_CONTENT_PARAM) that apparently got baked into the behavior of the managed EnvelopedCms class.
- </summary>
- </member>
- <member name="M:Internal.Cryptography.Pal.Windows.HelpersWindows.ToAlgId(System.String)">
- <summary>
- Returns (AlgId)(-1) if oid is unknown.
- </summary>
- </member>
- <member name="T:Microsoft.Win32.SafeHandles.SafeHandleCache`1">
- <summary>Provides a cache for special instances of SafeHandles.</summary>
- <typeparam name="T">Specifies the type of SafeHandle.</typeparam>
- </member>
- <member name="M:Microsoft.Win32.SafeHandles.SafeHandleCache`1.GetInvalidHandle(System.Func{`0})">
- <summary>
- Gets a cached, invalid handle. As the instance is cached, it should either never be Disposed
- or it should override <see cref="M:System.Runtime.InteropServices.SafeHandle.Dispose(System.Boolean)"/> to prevent disposal when the
- instance represents an invalid handle: <see cref="P:System.Runtime.InteropServices.SafeHandle.IsInvalid"/> returns <see language="true"/>.
- </summary>
- </member>
- <member name="M:Microsoft.Win32.SafeHandles.SafeHandleCache`1.IsCachedInvalidHandle(System.Runtime.InteropServices.SafeHandle)">
- <summary>Gets whether the specified handle is invalid handle.</summary>
- <param name="handle">The handle to compare.</param>
- <returns>true if <paramref name="handle"/> is invalid handle; otherwise, false.</returns>
- </member>
- <member name="M:Interop.Kernel32.GetMessage(System.Int32)">
- <summary>
- Returns a string message for the specified Win32 error code.
- </summary>
- </member>
- <member name="T:Interop.NCrypt.ErrorCode">
- <summary>
- Result codes from NCrypt APIs
- </summary>
- </member>
- </members>
- </doc>
|