Share via


KeyedHashAlgorithm Class

[This documentation is for preview only, and is subject to change in later releases. Blank topics are included as placeholders.]

Represents the abstract class from which all implementations of keyed hash algorithms must derive.

Inheritance Hierarchy

System. . :: . .Object
  Microsoft.SPOT.Cryptoki. . :: . .SessionContainer
    System.Security.Cryptography. . :: . .HashAlgorithm
      System.Security.Cryptography..::..KeyedHashAlgorithm

Namespace:  System.Security.Cryptography
Assembly:  System.Security (in System.Security.dll)

Syntax

'Declaration
Public Class KeyedHashAlgorithm _
    Inherits HashAlgorithm
public class KeyedHashAlgorithm : HashAlgorithm
public ref class KeyedHashAlgorithm : public HashAlgorithm
type KeyedHashAlgorithm =  
    class
        inherit HashAlgorithm
    end
public class KeyedHashAlgorithm extends HashAlgorithm

The KeyedHashAlgorithm type exposes the following members.

Constructors

  Name Description
Public method KeyedHashAlgorithm(KeyedHashAlgorithmType, Session) Initializes a new instance of the KeyedHashAlgorithm class with the specified algorithm and session context.
Public method KeyedHashAlgorithm(KeyedHashAlgorithmType, CryptoKey) Initializes a new instance of the KeyedHashAlgorithm class with the specified algorithm and key object.
Public method KeyedHashAlgorithm(KeyedHashAlgorithmType, String) Initializes a new instance of the KeyedHashAlgorithm class with the specified algorithm and service provider.

Top

Properties

  Name Description
Public property CanReuseTransform Gets a value indicating whether the current transform can be reused. (Inherited from HashAlgorithm.)
Public property CanTransformMultipleBlocks When overridden in a derived class, gets a value indicating whether multiple blocks can be transformed. (Inherited from HashAlgorithm.)
Public property Hash Gets the value of the computed hash code. (Inherited from HashAlgorithm.)
Public property HashSize Gets the size, in bits, of the computed hash code. (Inherited from HashAlgorithm.)
Public property HashType Gets the hash algorithm type. (Inherited from HashAlgorithm.)
Public property InputBlockSize When overridden in a derived class, gets the input block size. (Inherited from HashAlgorithm.)
Public property IsDisposed (Inherited from SessionContainer.)
Public property Key Gets or sets the key to use in the hash algorithm.
Public property KeyedHashType Gets the keyed hash algorithm type.
Public property OutputBlockSize When overridden in a derived class, gets the output block size. (Inherited from HashAlgorithm.)
Public property Session (Inherited from SessionContainer.)

Top

Methods

  Name Description
Public method Clear Releases all resources used by the HashAlgorithm class. (Inherited from HashAlgorithm.)
Public method ComputeHash(array<Byte> [] () [] []) Computes the hash value for the specified byte array. (Inherited from HashAlgorithm.)
Public method ComputeHash(Stream) Computes the hash value for the specified Stream object. (Inherited from HashAlgorithm.)
Public method ComputeHash(array<Byte> [] () [] [], Int32, Int32) Computes the hash value for the specified region of the specified byte array. (Inherited from HashAlgorithm.)
Public method Dispose() () () () (Inherited from SessionContainer.)
Protected method Dispose(Boolean) Releases the unmanaged resources used by the KeyedHashAlgorithm and optionally releases the managed resources. (Overrides HashAlgorithm. . :: . .Dispose(Boolean).)
Public method Equals(Object) Determines whether the specified Object is equal to the current Object. (Inherited from Object.)
Protected method Finalize (Inherited from SessionContainer.)
Public method GetHashCode Serves as a hash function for a particular type. (Inherited from Object.)
Public method GetType Gets the Type of the current instance. (Inherited from Object.)
Public method Initialize Initializes an implementation of the HashAlgorithm class. (Inherited from HashAlgorithm.)
Protected method MemberwiseClone Creates a shallow copy of the current Object. (Inherited from Object.)
Public method ToString Returns a string that represents the current object. (Inherited from Object.)
Public method TransformBlock Computes the hash value for the specified region of the input byte array and copies the specified region of the input byte array to the specified region of the output byte array. (Inherited from HashAlgorithm.)
Public method TransformFinalBlock Computes the hash value for the specified region of the specified byte array. (Inherited from HashAlgorithm.)

Top

Fields

  Name Description
Protected field HashValue Represents the value of the computed hash code. (Inherited from HashAlgorithm.)
Protected field KeyValue The key to use in the hash algorithm.
Protected field m_digest Contains the digest. (Inherited from HashAlgorithm.)
Protected field m_hashSize Contains the hash size. (Inherited from HashAlgorithm.)
Protected field m_isDisposed (Inherited from SessionContainer.)
Protected field m_isSessionClosing (Inherited from SessionContainer.)
Protected field m_mechanism Contains the mechanism. (Inherited from HashAlgorithm.)
Protected field m_ownsSession (Inherited from SessionContainer.)
Protected field m_session (Inherited from SessionContainer.)
Protected field OwnsKey Represents the value that indicates whether algorithm owns the key.
Protected field State Represents the state of the hash computation. (Inherited from HashAlgorithm.)

Top

Remarks

Hash functions map binary strings of an arbitrary length to small binary strings of a fixed length. A cryptographic hash function has the property that it is computationally infeasible to find two distinct inputs that hash to the same value. Small changes to the data result in large, unpredictable changes in the hash.

A keyed hash algorithm is a key-dependent, one-way hash function used as a message authentication code. Only someone who knows the key can verify the hash. Keyed hash algorithms provide authenticity without secrecy.

Thread Safety

Any public static (Shared in Visual Basic) members of this type are thread safe. Any instance members are not guaranteed to be thread safe.

See Also

Reference

System.Security.Cryptography Namespace