Compartilhar via


StorageEncryptionProviderCustomFactory Members

Include Protected Members
Include Inherited Members

Retired Content

This content is outdated and is no longer being maintained. It is provided as a courtesy for individuals who are still using these technologies. This page may contain URLs that were valid when originally published, but now link to sites or pages that no longer exist.

The StorageEncryptionProviderCustomFactory type exposes the following members.

Constructors

  Name Description
Public method StorageEncryptionProviderCustomFactory

Methods

  Name Description
Public method Create Overloaded.
Public method CreateObject
This method supports the Enterprise Library infrastructure and is not intended to be used directly from your code. Returns a new instance of a concrete subtype of TObject, described by the matching configuration object of a concrete subtype of TConfiguration found in the configurationSource under the name name.
(Inherited from AssemblerBasedCustomFactory<TObject, TConfiguration>.)
Public method Equals (Inherited from Object.)
Protected method Finalize (Inherited from Object.)
Protected method GetConfiguration
Returns the configuration object that represents the named IStorageEncryptionProvider instance in the configuration source.
(Overrides AssemblerBasedCustomFactory<TObject, TConfiguration>.GetConfiguration(String, IConfigurationSource).)
Public method GetHashCode (Inherited from Object.)
Public method GetType (Inherited from Object.)
Protected method MemberwiseClone (Inherited from Object.)
Public method ToString (Inherited from Object.)

Fields

  Name Description
Public fieldStatic member Instance
This field supports the Enterprise Library infrastructure and is not intended to be used directly from your code.

See Also

StorageEncryptionProviderCustomFactory Class

Microsoft.Practices.EnterpriseLibrary.Caching.BackingStoreImplementations Namespace

Retired Content

This content is outdated and is no longer being maintained. It is provided as a courtesy for individuals who are still using these technologies. This page may contain URLs that were valid when originally published, but now link to sites or pages that no longer exist.