Jaa


KeyedHashAlgorithmProviderSetting Members

Include Protected Members
Include Inherited Members

Retired Content

This content is outdated and is no longer being maintained. It is provided as a courtesy for individuals who are still using these technologies. This page may contain URLs that were valid when originally published, but now link to sites or pages that no longer exist.

The KeyedHashAlgorithmProviderSetting type exposes the following members.

Methods

  Name Description
Public method Equals (Inherited from Object.)
Protected method Finalize (Inherited from Object.)
Public method GetHashCode (Inherited from Object.)
Public method GetType (Inherited from Object.)
Protected method MemberwiseClone (Inherited from Object.)
Public method ToString (Inherited from Object.)

Properties

  Name Description
Public property AlgorithmType
Gets the name of the algorithm type for the represented configuration object.
Public property ApplicationName
Gets the name of the application to which the ConfigurationSetting instance represents configuration information.
(Inherited from ConfigurationSetting.)
Public property Name
Gets the name that identifies the represented configuration information.
(Inherited from NamedConfigurationSetting.)
Public property ProtectedKeyFilename
Gets the name of the protected key file for the represented configuration object.
Public property ProtectedKeyProtectionScope
Gets the name of the protected key scope value for the represented configuration object.
Public property SaltEnabled
Gets the value of the salt enabled property for the represented configuration object.
Public property SectionName
Gets the name of the section where the ConfigurationSetting instance represented configuration information resides.
(Inherited from ConfigurationSetting.)

See Also

KeyedHashAlgorithmProviderSetting Class

Microsoft.Practices.EnterpriseLibrary.Security.Cryptography.Configuration.Manageability Namespace

Retired Content

This content is outdated and is no longer being maintained. It is provided as a courtesy for individuals who are still using these technologies. This page may contain URLs that were valid when originally published, but now link to sites or pages that no longer exist.