Compartilhar via


SymmetricCryptoProviderCustomFactory Class

Retired Content

This content is outdated and is no longer being maintained. It is provided as a courtesy for individuals who are still using these technologies. This page may contain URLs that were valid when originally published, but now link to sites or pages that no longer exist.

This type supports the Enterprise Library infrastructure and is not intended to be used directly from your code. Represents the process to build an instance of ISymmetricCryptoProvider described by a SymmetricProviderData configuration object.

Namespace:  Microsoft.Practices.EnterpriseLibrary.Security.Cryptography
Assembly:  Microsoft.Practices.EnterpriseLibrary.Security.Cryptography (in Microsoft.Practices.EnterpriseLibrary.Security.Cryptography.dll)

Syntax

'Declaration
PublicClassSymmetricCryptoProviderCustomFactory _
    Inherits AssemblerBasedCustomFactory(Of ISymmetricCryptoProvider, SymmetricProviderData)
publicclassSymmetricCryptoProviderCustomFactory : AssemblerBasedCustomFactory<ISymmetricCryptoProvider, SymmetricProviderData>
publicref classSymmetricCryptoProviderCustomFactory : public AssemblerBasedCustomFactory<ISymmetricCryptoProvider^, SymmetricProviderData^>
publicclass SymmetricCryptoProviderCustomFactory extends AssemblerBasedCustomFactory<ISymmetricCryptoProvider, SymmetricProviderData>

Inheritance Hierarchy

System.Object
  Microsoft.Practices.EnterpriseLibrary.Common.Configuration.ObjectBuilder.AssemblerBasedObjectFactory<ISymmetricCryptoProvider, SymmetricProviderData>
    Microsoft.Practices.EnterpriseLibrary.Common.Configuration.ObjectBuilder.AssemblerBasedCustomFactory<ISymmetricCryptoProvider, SymmetricProviderData>
      Microsoft.Practices.EnterpriseLibrary.Security.Cryptography.SymmetricCryptoProviderCustomFactory

See Also

SymmetricCryptoProviderCustomFactory Members

Microsoft.Practices.EnterpriseLibrary.Security.Cryptography Namespace

Retired Content

This content is outdated and is no longer being maintained. It is provided as a courtesy for individuals who are still using these technologies. This page may contain URLs that were valid when originally published, but now link to sites or pages that no longer exist.